Data use policy in Social Medial

Hello, myself Aakash Subba and this is my Seventh Blog writing for week 7 and in this blog, I am about to share my personal thought on Data use policy and its different form on What is the data use policy? What are the privacy settings? What is the security policy? What are your rights regarding your data? Can you request a copy of your data? What can the provider do with the data you upload? What happens to your data when you close your account?

Data use policy is an agreement between consumer and any digital company to designed to let user know how they collect, use, and disclose information through the websites, mobile applications, and other online services and products (collectively, the “Services”) that link to this Policy. Nowadays data use policy is being popular and many companies use this policy in whenever user open any websites or mobile application. The company try to get access through this agreement of many private information of user like Storage, Camera, Location, Microphone etc. In some cases, websites and application won’t run until or unless user agree with the policy or agree with the statement release by the company through this policy.  

Privacy settings are “the part of a social networking website, internet browser, piece of software, etc. that allows you to control who sees information about you”. With the growing prevalence of social networking services (SNS), opportunities for privacy exposures also grows. Privacy settings allow a person to control what information is shared on these platforms. Many Social Networking Services(SNS) such as Facebook, have default privacy settings that leave users more prone to sharing personal information. Privacy settings are contributed to by users, companies, and external forces. Contributing factors that influence user activity in privacy settings include the privacy paradox and the third person effect. The third person effect explains why privacy settings can remain unchanged throughout time. Companies can enforce a Principle of Reciprocity (PoR) where users have to decide what information they are willing to share in exchange for others’ information. With the growing focus on internet privacy, there are technologies and programs designed to enhance and encourage more privacy setting activity. Applications such as the Personal Data Manager(PDM) are used to improve the efficiency of privacy setting management. Privacy by design can enhance privacy settings through incorporating privacy notifications or prompting users to occasionally manage their privacy settings.

Security policy is a definition of what it means to be secure for a system, organization or other entity. For an organization, it addresses the constraints on behavior of its members as well as constraints imposed on adversaries by mechanisms such as doors, locks, keys and walls. For systems, the security policy addresses constraints on functions and flow among them, constraints on access by external systems and adversaries including programs and access to data by people. If it is important to be secure, then it is important to be sure all of the security policy is enforced by mechanisms that are strong enough. There are organized methodologies and risk assessment strategies to assure completeness of security policies and assure that they are completely enforced. In complex systems, such as information systems, policies can be decomposed into sub-policies to facilitate the allocation of security mechanisms to enforce sub-policies. However, this practice has pitfalls. It is too easy to simply go directly to the sub-policies, which are essentially the rules of operation and dispense with the top-level policy. That gives the false sense that the rules of operation address some overall definition of security when they do not. Because it is so difficult to think clearly with completeness about security, rules of operation stated as “sub-policies” with no “super-policy” usually turn out to be rambling rules that fail to enforce anything with completeness. Consequently, a top-level security policy is essential to any serious security scheme and sub-policies and rules of operation are meaningless without it.

 One of the most fundamental rights in data protection laws around the world developed laws that regulate access to personal data as privacy protection. Some of the rights regarding the data are listed below:

-You have the right to ask an organization whether or not they are using or storing your personal information. You can also ask them for copies of your personal information, verbally or in writing.

-This is called the right of access and is commonly known as making a subject access request or SAR. You can make a subject access request to find out:

  • what personal information service provider holds about you;
  • how they are using it;
  • who they are sharing it with; and?
  • where they got your data from.

Of course, they have all the data that you post, or download on the internet. That’s the reason, they came up with bigdata, where they can keep, anyone’s data, no matter how much it is? They keep your, location, messages, your browsing habits, data you receive on the personal chats, emails, WhatsApp, your conversations. Everything that you can think of. On the internet everything is Vulnerable. As you can see Facebook is even keeping the record of your mood, as you are not feeling well, you may use, sick emoticon, for anger its subsequent emoticon, loved, sad, etc. Everything is stored. Remember this, when, government data is leaked, or even private pics of Celebrities. Noting is secure and will never will be.

Keep in mind that when closing a user, it will affect access to certain user data. What can the service provider can do with your data are listed below:

The user’s Inbox, Sent and Deleted items are still preserved within the account. Administrators on the account can gain access to these through User Sharing. Note: The Administrator will not be able to take action on envelopes in the user’s Inbox. 

-Custom (Tags/Fields)
These will no longer be accessible to any user on the account once the Creator/Owner is closed.

Users that have templates shared with them and Account Administrators will still have access to a closed user’s templates. If an Administrator needs to delete a closed user’s templates, they would have to transfer the templates ownership to themselves.

-Scheduled Reporting
Any scheduled reporting provisioned under the user will be deleted. There is not currently a way for administrators to see other users scheduled reporting settings. If your account is reliant on a scheduled report and you are not the sender, you may want to confirm who is before closing the user. Only Account Administrators are able to report data for all users on the account.

Data use policy can be very advantageous if the user read out all the agreements and carefully agree with the statements released by the provider. The privacy settings can play very crucial role to private every data or information on user’s decision. Also, the security policy should be implemented very carefully to secure the data and information.  User have every right regarding their data that how user can use their data in every possible cases. So, user should use the trusted application or trusted websites to secure data from the company by reading the data use policy carefully to provide limited access to the provider.

Published by anchangboyyy19

If my jokes offend you then sorry you lack sense of humour.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Create your website with
Get started
%d bloggers like this: