DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Get Help
CyberMaterial
Home Document

Redesigning Data Privacy

By World Economic Forum

Reading Time: 2 mins read
in Document, Paper, Privacy
With every year that passes, our lives are becoming more and more dependent on digital services. More than 53.6% of the world’s population is online, while 93% of the world lives within reach of a 3G or better mobile network. From accessing vital services such as a doctor, to ordering food online or simply surfing the web, our use of and increasing reliance on digital services continues to grow at an exponential rate. At the same time, the way in which we interact with technology is continuously evolving: For example, some screen-based interactions are transitioning to voice-based interfaces; always-on sensors are increasingly embedded within our environments. But regardless of whether the interface is tangible or not, we are often asked to consent to the collection and use of data generated by us and about us.
But how many of us truly understand what this really means? And when we are asked, does the collection and use occur in a way that fundamentally protects our best interests? Further, once we grant the requested access, is there any way to change our minds?
And can consent truly be given if there is no real choice, an inability to revoke consent or lack of an informed decision because of the complexity of information provided to help make the decision more informed? When an option to consent is given to us, there is a sense that we are empowered to make a decision, a sense that we are in control of what data can be processed, who it can be processed by, where it can be processed and for which purposes.
Consent has become illusory and, through its current design and deployment, does not always operate in expected, or at times even logical, ways. As we increasingly conduct our lives online, we continue to part with more personal information, click through more boxes and increasingly seek to limit any barriers between ourselves and the service or product we intend to access. When the permissions people grant to companies and organizations at one point in time become the gateway for everything that happens to that data in the future, that moment becomes extremely important, perhaps far beyond what could be envisaged.

GET REPORT

Tags: DocumentsPrivacyPrivacy DocumentsPrivacy ReportsRedesigning Data PrivacyRegulationReportsWorld Economic Forum
ADVERTISEMENT

Related Posts

National cyber threat assessment 2023–2024

National cyber threat assessment 2023–2024

March 21, 2023
2023 SonicWall Cyber Threat Report

2023 SonicWall Cyber Threat Report

March 21, 2023
Sophos 2023 Threat Report

Sophos 2023 Threat Report

March 21, 2023
CrowdStrike 2023 Global Threat Report

CrowdStrike 2023 Global Threat Report

March 21, 2023

More Articles

Alerts

Dell security advisory (AV22-239)

May 2, 2022
CyberTips

CyberTip: Think before you click

October 26, 2020
Incidents

Harvest Keeper AI Trading App Scam

March 22, 2023
Alerts

Google Releases Security Updates for Chrome

April 22, 2021

Cyberattack hits Meliá, one of the largest hotel chains in the world

October 14, 2021
Incidents

Mozilla Releases Security Updates for Firefox, Firefox ESR, and Thunderbird

January 11, 2022
Incidents

Vulnerability found in TikTok app

September 1, 2022
Document

Cyber Terrorism and Information Security across National Policies and International Diplomacy

May 9, 2022
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.