Data Security | Basic Principle of Data World
Data Security and Basic Principle of Data World! Data is changing our world at an unprecedented pace. Depending on our point of view, we can say that we are at the beginning of something incredibly exciting, or that our every move can be traced. Every two days, we generate more data than we did from the beginning of time until 2003. The amount of data we generate continues to increase day by day. Every move we make on the internet (shopping with a credit card, sending emails, taking photos, reading articles online, social media) leaves behind digital traces without realizing it. But can the world’s giant technology companies that use our data protect our data sufficiently? Or where can they use our data with our “permission”? Let’s look for the answers to these questions together.
Data Security! Where is our data used?
Data has reached all points of our daily lives, from health to space. That being the case, companies have engaged in a fierce struggle to collect data. On top of that, our data was shared with various agreements. So why do tech companies need data? The answer, as you can imagine, is money income returns. Companies collect user data of different sizes (such as web, digital cards, social media) and this data is processed and made meaningful and the simplest example is agreed with an advertising company to direct the appropriate ads to the appropriate users.
Let’s take a look at examples of how our data is processed in daily life.
Data Processed!
Google knows your age and gender without you telling them, and it also performs various analyzes about your search and creates ads tailored to your interests. By analyzing your Facebook likes, you can see who you are friends with and location-specific ads thanks to your location information.
In the U.S.A and China, nationwide cameras scan license plates, take photos of drivers, and transfer that information to a network so that police with access to the network know where you’re going.
The market you shop at (coffee chains, personal care, food) can follow your favorite brands and products with the cards it defines specifically for you and offer you more interactive services or ads in other words.
Is Our Data Adequately Protected?
The developing technology (IoT, cloud computing, artificial intelligence) with the modern world has enabled our data to increase rapidly day by day and this has brought data security concerns and threats. This made it inevitable to create a legal basis for data security and privacy.
Our country has taken this step with the Law on the Protection of Personal Data No. 6698 dated March 24, 2016. With this law, “It aims to ensure the protection of personal data in our country and to raise awareness for this by creating awareness.” In this law, detailed explanations were provided on the basic principles in the processing of personal data, the obligations of the data controller (the real or legal person who determines the purposes and means of processing personal data, is responsible for the establishment and management of the data recording system.), transfer and deletion of personal data.
Data Security Report!
According to the KVKK 2021 Annual Report, 10 thousand 60 complaints were received and the administrative fine imposed on 193 data controllers was 31 million 1,587,000 USD. This is a deterrent approach to personal data.
The situation is not much different in Europe. On 25 May 2018, the General Data Protection Regulation (GDPR), which covers the member states of the European Union, came into force. With this regulation, it covers all enterprises and institutions within the borders of the European Union. If it is not complied with, it faces heavy penalties and deterrent sanctions.
What is an Open Consent Text?
According to the Personal Data Protection Law, “consent related to a specific subject, based on information and disclosed with free will.” When we approve this text, we inform the data controller of our legal decision on the subject.
Finally, in the digital world, our data can be used by third parties for commercial purposes or for other malicious purposes. Although countries take deterrent steps with various laws or sanctions, they should increase personal awareness on this issue, read users’ explicit consent texts carefully, refrain from sharing important information to unreliable sites, and follow the data shared with companies or institutions.