Today, individuals are expected to be capable of guarding their privacy though there is no way in which someone can achieve it. It is believed that, if anyone wants to achieve absolute privacy, it means that he or she has to forfeit a place in the whole world. Such expectations and beliefs are attributed to the fact that personal information is more readily accessible on the internet, making protection of internet privacy a lost cause. Recently, privacy violation cases via the web have increased. As a result, privacy still becomes the primary concern for the internet operators who remain insecure, easy targets for dishonest scammers, data collectors, competitors and other users, among other risks.
Internet privacy entails the right of personal privacy regarding repurposing, storing, disseminating personal details to third parties and display of data that belongs to oneself through the internet. In most cases, internet privacy is divided into two categories namely; non-PII (non- Personal Identifying Information) and PII (Personal Identifying Information). PII does not necessarily give personal details such as social security number or date of birth but only provides age and physical address, which are enough to identify a particular individual. On the other hand, non-PII involves showing tendencies and caches on a particular web. Here, files contain information that the operator would be reasonably kept protected. The information comprises of credit card numbers, passwords and where the history of the operator’s location (Crombe, Pereira & Canini, 2016).
According to Pookulangara (2015), there are various reasons as to why human beings need to protect their privacy. Everyone has a right to privacy provided that the right is applied within law’s limits. Therefore, privacy should be demanded and expected. One of the reasons for privacy protections is the urge to preserve one’s right to communicate sensitive business matters such as lawful conversation with an accountant, giving credit card numbers and so on. The communication should be done without the information being leaked by the competitors or to protect a person’s right to express shunned ideas without being exposed to persecution and hiding one’s identity from enemies. Protection from cyber bullying can also be another reason as to why a person requires privacy protection. Cyber bullying occurs when child’s privacy is not well protected. The crime (cyber bullying) can be conducted through emails, text messages, rumors, videos or images. Also, it can take place at any time of the day provided the child is exposed to the internet. Here, the child is mentally and emotionally harassed, tormented, embarrassed and humiliated. It is hard for the children who have been bullied to get over it because it can be hard to delete or trace the source of information intended for bullying. Moreover, once an image or message is posted, it distributes at a faster rate to a wide range of audience.
Privacy protects people from abuse by the individuals in authority even if they have committed no crime. Research indicates that many internet users are not bothered by the dangers associated with the information they display on the social media, which is easily accessed by their enemies (Mendel, Hawtin & UNESCO, 2012). According to Mendel, Hawtin, & UNESCO (2012), complete anonymity is not worth the price and might occur in the process of being conservative with their private information and their true identity. The application of non-personal identifiable profiling, internet protocol address, and other related data might become generally accepted trade-offs; the internet users can otherwise lose using required workarounds to inhibit such details severely. On the other hand, supporters of complete privacy on the internet may try as much as possible to attain anonymity. Supporters use the internet without providing or disclosing their valuable information to the third party that can be used to connect the internet activities to PII of the internet operator (Mendel, Hawtin, & UNESCO, 2012).
Several issues including the current user accountability arrangement are related to the internet and its modern privacy systems. Here, people are responsible for fixing their personal breaches. The implication is that if a problem occurs and internet user’s privacy is infringed, the user would be more accountable for several restoring activity. The challenge here is that most internet users do not notice when a breach of privacy takes place. This can be as result of numerous online scammer experts who can steal individual’s personal data secretly such that the victim does not notice the theft. Also, keeping a track of problems to their sources is difficult since the scammers are experienced in terms of their immoral operations (Mendel, Hawtin, & UNESCO, 2012). Internet protection is necessary today following the frequent cases of personal privacy attack. Also, it can be easier for a person to interrupt a person’s personal information or messages if they need it. The individual behind such attacks might be a legal foe, a business competitor or government agency with serious motives.
There exist both complex and simple measures to help curb the attack of private information on the internet (Pookulangara, 2015). For instance, if someone intends to hide his/her true identity, The Onion Router can be of great help. The router uses large computer networks to route a person’s website traffic via several encrypted layers that obscure its origin. The Onion Router is an essential tool for whistleblowers to share personal information anonymously. Abandoning smart phones and Windows entirely and staying away from MacOS is also indispensable for privacy protection. Smartphones can no longer be trusted with information since they can be easily trapped as compared to the outdated models of cell phones, which are highly recommended in matters of securing personal information. It is advisable not to say anything important that one would not want the entire world to know via smartphones (Crombe, Pereira &, Canini, 2016).
To conclude, seeking for privacy should not in any way make one feel guilty. Protecting personal or private information from the public is common. Human beings are supposed to make sure that they go an extra mile so as to attain their privacy on the internet. Many nonprofit organizations, which specialize in the protection of privacy to the internet users, are formed, with a focus on creating relevant websites that create awareness on matters of internet privacy to the public. Through visiting these sites, a person can learn the updates on laws concerning personal privacy on the internet, what is being proposed concerning internet privacy and what is being practiced to help individuals in protecting their privacy online.