Skip to main content

Are you secure

Privacy has now earned a world class name that everyone is interested to know and see the end result. Every homo-sapiens want at least little privacy and this is totally absent in our world today. How? With the advent of technology privacy has been thrown to the sea of no return. World today can be called E-world due to the presence of technology everywhere. Imagine that human race can no longer do without product of technology…Woo that is great and magnificent. Technology is not the problem but the way it is use to violate the law of privacy is the problem in today’s world. Everyone is clamoring on security when the people dealing with security of the people are the main person behind the scene who pioneers the idea of privacy violation.
There is no total security anymore unless technology is to be story and every live embrace ancient world but if this can’t be done we should be talking on how to minimize privacy violation.
Why privacy violation? As you know there are bad guy and good guy, those who invent technology and use for security purpose and those who use it for gain or revenge. Privacy violation can result from profit making, revenge, defense, damage, power acclamation, fun/exploration etc.
People violate the law of privacy because of profit making. These people use technology tools and service, social engineering to break into people’s domain, organization by stealing important information which could cost them their lives and destroy the image of the organization. The people in this category are well inclined and expert in stealing credit cards and banks information.
Many can say that the world we are today is justice world but I can tell you is a revenge world where everyone smiling at his/her neighbor thinking there is love but within is hatred and conceived evil on how to destroy others. Seekers of revenge built and use technology to destroy fellow human being and properties as a result of what has happened between the two parties. Therefore, guilty of privacy violation Many nations today is in this state.
The powerful nation today is not in the population likewise not in their land mass and also not in the number of soldier on ground but is in the amount of technology in place. Because of the nation defense, people, properties, safety and prevention of future circumstances, nations are bridging the form human privacy.
It is obvious in today’s world and news on the air about lost of lives and properties where killing and destruction are happening due to evil intention of people to destroy what others has achieved and built. Privacy is being violated in order to bring damages to human kinds with some in-genuine reasons.
The people who are so desperate of having power violate the law of privacy. They tested their power over others in order to be recognized and become overlord. These particular entities uses various means to take down people in that position they desire thereby bridging and violating law of privacy while some violate privacy as a result of having fun in what they do.
Are we secure at all? Nope, we are not. Why? Like I said we are in e-World, technology has become part and parsel of our live, we live with it, work with and every activities depend on it. Our live is in the hand of inventor and that’s why those who are in control refuse to let go because they control human kinds irrespective of what they say in public whether directly or indirectly. For instance, Mr. A developed tools for security purpose and sold it out to Mr. B and Mrs. C. Irrespective of the training Mr. B and Mrs. C had undergone from Mr. A, Mr. A still have edge over them because he built the technology and can bypass it to monitor Mr. A and Mrs. C to get what he want or to destroy them. This illustration is for the consumer of technology products be it individual or as a nation
Let me say as a result of defense, nation contributes to violation of privacy, then what we are saying; are we not written letter to every individual to also continue the same thing. There is no way we can ensure total privacy but we can minimize the violation of privacy if we have the people of right heart towards people as our leaders, well details rule and regulation follow by justice, orientation about privacy and heart of love.
Not all privacy violation result from hacking into the database but this happened due to negligence of organization and in the parts of individual. At time we willingly gave out our information to people to probe us due to nonchalant attitude and not been alert to the situation around us and agent requesting information to access our data. People often gave out their identity on the World Wide Web for need of certain information without considering the damage on their part.
Privacy is an issue, if not dealt with properly will damper the enlargement of internet. For us to have effective internet governance which simply means bringing the (e-world) to speak the same language. Privacy must gain upper hand.


Comments

Popular posts from this blog

9TH WEST AFRICAN INTERNET GOVERNANCE FORUM REPORT BY AKINREMI PETER TAIWO

9 TH WEST AFRICAN INTERNET GOVERNANCE FORUM, JULY 27 TH AND 28 TH , 2017, COTONOU, BENIN: Digital security for socioeconomic   development and peace in West Africa The 9 th West African Internet Governance Forum was held at Golden Tulip diplomat in Cotonou, Benin. The two (2) day event attracted stakeholders across the nations for dialog on digital security for socioeconomic development. The event recorded 418 participants with full house at the closing session The conference was opened by stakeholders with beautiful welcome addresses. But the opening remarks were made by the Minister for Ministry of Digital Economy and Commission (MENC), Benin. The conference also witnessed the report from the Internet Governance Forum (IGF) countries’ representatives such as Nigeria, Benin, Chad, Gambia, Togo, Niger, Guinea Bissau, Liberia, etc. Sessions on Security, Openness and Privacy was moderated by Jacques Houngbo, FGI Bénin. Jacques gave a brief importance of security in...

ACSIS ECMAA AWARDS 2018

Dakar – Nairobi – Geneva 14/12/2018 As part of the Africa Ecommerce weekend 2018 held in Nairobi from 10 to 14 December 2018, the African Civil Society on the Company of the largest pan-African network ICT Information organized the first contest of mobile e-commerce applications (ECMAA Awards). According to the president of ACSIS, Dr. Cissé Kane, the competition aimed to stimulate creativity and innovation among young talents, students, young graduates of our continent (and its diaspora) and promote solutions for new job opportunities through the development of e-commerce mobile application. 50 applications from 15 African countries were registered. Of the 18 pre-selected teams, 11 gathered in Nairobi to participate in the final as well as 2 teams online.  The final of the Competition took place on Friday, December 14, 2018.   The International Jury consisted of:    Mrs. Nnenna Nwakanma, Web Foundation, Nigeria, President of the Jury  M. Alyoune ...

Google Map of the Area in Cross River State affected with floods

Introduction This document describe area that normally experience flood in the part of Cross River State, Nigeria which always resulted to loss of properties and valuable material and posse great danger on the communities in term of their well being. Google Map of the Area in Cross River State affected with floods Note: The area is pin with yellow place-mark in seven locations in Cross River State, Nigeria 1.1   Hazards - Floods: The major type of hazard experience in the city or the state is majorly flood/soil erosion due to heavy downpour of rain and river overflowing due to rising of sea level which resulted into looses of lives, properties, outrageous of diseases and damages etc. 1.2   Vulnerability in term of people: The people mostly affected are the people living in the area situated in the map. It comprises of babies, adults and aged people majorly the efik, the Ejagham and the bekwara. The area includes Duke town, Eja, Ogoja, Obubra,, Odukp...