Internet
Fact-checked

At WiseGEEK, we're committed to delivering accurate, trustworthy information. Our expert-authored content is rigorously fact-checked and sourced from credible authorities. Discover how we uphold the highest standards in providing you with reliable knowledge.

Learn more...

What are the Different Types of Online Privacy Protection?

Robert Grimmick
Robert Grimmick

With the Internet allowing for instant exchange of information, its not surprising that many users have become concerned about the integrity of their personal information online. Online privacy protection can be approached from either an individual or institutional basis, and can be behavioral, regulatory, or technology-driven. Comprehensive privacy protection on the Internet is often a blend of these different approaches.

Regardless of where they live, individual Internet users often have the greatest amount of control over how their information is used online. Volunteering personal data on a website or social networking service can potentially open the door to identity theft and/or credit card access. In addition, many websites that offer free goods or services collect user information and sell it to marketing companies.

A sign in interface for an Internet connection.
A sign in interface for an Internet connection.

Adjustments to online behavior can increase help preserve a user’s Internet privacy. Privacy advocacy groups recommend against revealing personal information like full names, phone numbers, and street addresses online. Social networking sites, personal homepages, and Internet forums are often insecure, and personal information posted to these online locations can often be seen by people and search engines. Workers should also be aware that in the U.S. and in other countries, many employers monitor the Internet activity of their employees on company time or with company equipment.

Online shopping sites typically have a privacy policy outlined to ensure customers that their information is secure.
Online shopping sites typically have a privacy policy outlined to ensure customers that their information is secure.

Corporations, educational institutions, and other organizations often need at least some private data to provide their users with products or services. Online shopping sites, for example, would be obviously less effective without collecting names and shipping addresses from their customers. To retain trust and build loyalty, most organizations with an online presence maintain a privacy policy outlining exactly what information the organization collects and how that information is used. Agreements to share data with third party groups such as online advertisers should also be disclosed in privacy policies.

Users may use encryption keys to send encrypted files as email attachments to enhance online privacy.
Users may use encryption keys to send encrypted files as email attachments to enhance online privacy.

Governments have also acted to enhance online privacy protection through new laws and regulatory policies. In the U.S., existing privacy laws have been reinterpreted for the digital age, with a few states enacting tougher regulations. Some countries in Europe view privacy as a basic human right, and have taken an aggressive posture in regulating corporate interaction with personal data. Industry-specific regulations, such as the U.S. Health Insurance Portability and Accountability Act (HIPAA), also contain provisions for the protection of data privacy.

Good security practices are also a part of online privacy protection for both individuals and organizations. The use of weak passwords and easy to guess security questions can put personal information at risk. A type of software known as malware is designed to be installed without a user’s consent, and is frequently used by hackers or identity thieves to collect data from a computer without permission. Malware is a problem for large corporations as well, as it can provide a back-door into a secure company network.

Technology designed to enhance online privacy protection also exists. Encryption software and firewalls are frequently used to protect data from prying eyes. Anti-spyware programs are designed to thwart attempts to track users online, and “anonymizers” try to hide the identity of an Internet user from repressive governments, identity thieves, and others who may be monitoring network traffic. Many web browsers now have a private browsing mode that, when enabled, excludes visited sites from the browser’s history.

Most groups advocating privacy online recommend using a mix of behavioral techniques and technology to maximize online privacy protection. Good behavior can be ineffective if a user’s computer can easily be accessed, and software can’t do much to protect information once its publicly available on the Web. Common behavioral suggestions include limiting the release of personal information whenever possible, avoiding posting too many intimate details on social networking sites, and using secure passwords. Privacy advocates also suggest keeping software up to date and use security programs. Many web browsers also have settings that can be changed to optimize privacy.

Discussion Comments

Markerrag

@Logicfest -- there is a way around those problems. Simply go through one of the paid sites instead of one of the many available for free (those are usually slow and spam you with ads you don't want, anyway). What's a good proxy site? Do some research and you can find your answer in a hurry.

Logicfest

One of the most popular methods used to protect your information online is to access Internet sites through a proxy server. One of those is, essentially, one that passes its own Internet protocol address (the thing that identifies your computer online) to sites you visit instead of your own.

Those work pretty well, but access tends to be slow and you really have to be careful of the ones you use because they can be used as a way to gain your online information.

Post your comments
Login:
Forgot password?
Register:
    • A sign in interface for an Internet connection.
      By: Brilt
      A sign in interface for an Internet connection.
    • Online shopping sites typically have a privacy policy outlined to ensure customers that their information is secure.
      By: Vladimir Gerasimov
      Online shopping sites typically have a privacy policy outlined to ensure customers that their information is secure.
    • Users may use encryption keys to send encrypted files as email attachments to enhance online privacy.
      By: Linux Screenshots
      Users may use encryption keys to send encrypted files as email attachments to enhance online privacy.