Skip to main content

The privacy and laws

 


The privacy and laws


If some company collects the data of the personal use of the Internet, that company should have the ability to store and secure that data. So why there are not strict regulations of the standards, what those companies should follow, if they are collecting the personal data. Collecting personal data should be made to need the subject of the license. 


That standard is known as GDPR, and it's the law of data security in the European Union(1). The thing in the data protection is that those companies should follow those regulations also in their overseas offices, and everywhere where is the access to that data. The thing is that the remote use of the servers must follow the standards of the GDPR. And that data must be confirmed secured in all the points, where it is visible. 



(1) https://www.dlapiperdataprotection.com/index.html?t=law&c=DE


Image: https://dc.mynetworkinsights.com/wp-content/uploads/2019/11/What-is-data-center.jpg


----------------------------------------------------


All data must handle and store in protected places


When some data is stored in the server that is operated by some company, the data is not automatically secured. That thing means that the data can be shared over the same network segment and controlling that data is impossible. The thing that people should concern about their data security is that somebody has been stolen the surveillance programs from the intelligence services, and then use those codes in their purposes. 


So the problem with private corporations is that they don't operate their servers with themselves, and that means that the operators of the servers can backup data to every place on Earth. Or another problem is that the physical servers or network routers can be alone in a long time, and the hackers can adjust those routers to route a copy of the entire data flow to the third party. 


And the problem is that the laws are not stopping hackers. The thing in the laws is that there should be standards, that the operators must use for guarding their networks, and the other thing is that those regulations must be updated simultaneously and following those regulations must be followed. 


When we are thinking about the possibility to collect the data, we must understand that the firms, that are collecting the user data must have value and ability to handle personal data. If some company doesn't follow the standards and instructions the license for collecting the data should be denied. The strict laws and orders should make strict regulations, which must be followed by companies, which are collecting personal data, which can be very vulnerable. 

Comments

Popular posts from this blog

Plasmonic waves can make new waves in quantum technology.

"LSU researchers have made a significant discovery related to the fundamental properties and behavior of plasmonic waves, which can lead ot the development of more sensitive and robust quantum technologies. Credit: LSU" (ScitechDaily, Plasmonics Breakthrough Unleashes New Era of Quantum Technologies) Plasmonic waves in the quantum gas are the next-generation tools. The plasmonic wave is quite similar to radio waves. Or, rather say it, a combination of acoustic waves and electromagnetic waves. Quantum gas is an atom group. In those atom groups, temperature and pressure are extremely low.  The distance of atoms is long. And when an electromagnetic system can pump energy to those atoms. But the thing in quantum gas is that the atoms also make physical movements like soundwaves. It's possible. To create quantum gas using monoatomic ions like ionized noble gas. In those systems, positive (or negative) atoms push each other away.  When the box is filled with quantum gas and som...

What is the difference between TR-3A and TR-3B? And are those planes real?

What is the difference between TR-3A and TR-3B? And are those planes real? Is TR-3B (0) "Black Triangle UFO" or is it only the piece of paper?  The study project, what is used to create advanced ideas for use of the nuclear-powered aircraft. Or is it the study project or black budget aircraft, where lost 2,3 trillion dollars (1)of the stealth bomber were gone. In this text is things, that might seem very difficult to accept, and when we are thinking about things like doubling the object or making it smaller by using huge layers of energy, nothing denies to test those things. But were those tests successful, there is no data about that in public Internet, so we must say that things like doubling the human or aircraft can be tested, but the results can be unknown.  But in the source two is the tale, what seems like impossible, those men, who got Noble Prize put at first time one atom to the box, and hit it with photon one photon in the box and hit it with t...

The interesting coincidence between USS Sea Shadow (1982) and CSS Virginia (1862)

Image I The interesting coincidence between  USS Sea Shadow (1982) and CSS Virginia (1862) Far away from its time is the thing, that you might notice when you see those two images. The upper one (Image I) is portraying the modern naval USS Sea Shadow (IX-529)(1) experimental Stealth ship, which was created by Lockheed-Martin, and the image below (Image II) is portraying the CSS Virginia (2), the ironclad from the Civil War Era. The thing why the hull of the CSS Virginia, what is ironclad from 1862 is that the ammunition of the cannons would not transfer their impact energy to the hull of the ship. And the reason why Sea Shadows hull has this form is that it should point the radar echo away from the hull.  The thing that I must say that CSS Virginia is far ahead its time because that structure is effective against the explosive ammunition, and the slanting armor of tanks like T-34 and Sherman have made them effective. But for some reason, the use of slanting ...