Privacy vs. Mobility

Publish date:

This appears to be a worrying trend whereby mobile devices are playing an increasing role in the erosion of personal privacy. Why does privacy not translate very well for mobile technology? Starting from easily accessible and recoverable SMS text messages, to mobile apps that secretly send your data to 3rd parties, it would seem that […]

This appears to be a worrying trend whereby mobile devices are playing an increasing role in the erosion of personal privacy. Why does privacy not translate very well for mobile technology?
Starting from easily accessible and recoverable SMS text messages, to mobile apps that secretly send your data to 3rd parties, it would seem that most people are not really aware of, or concerned with, what goes on under the hood when it comes to mobile technology.
This is a topic that’s well explored in a book I recently reviewed for the BCS, entitled My Digital Footprint, which makes a good argument for why multi-capable mobile devices will soon become the primary source of information from and about the user, as opposed to the information hungry device they currently are. However, the problem with this scenario is that unless users are aware / in control of their own Digital Footprints, along with the capability to choose who they wish to manage it on their behalf (perhaps in exchange for some appropriate benefit); they will most certainly be ripped off by unscrupulous third parties.
Interestingly, this would appear to be a reversal of the usual “consumers are stealing our digital content” mantra that we have become accustomed to hearing from the content industry. Clearly, if personal data, identity and privacy really belong to the individual, as in “My Digital Footprint”, then such parties that solicit and use surreptitiously gathered mobile data are themselves guilty of stealing “My digital footprint”. No?
Perhaps the UK’s Digital Economy Act, and other such rules, should also make provision for individuals that wish to pursue mobile operators / advertisers / and other co-beneficiaries of such an illicit activity, for invasion of privacy and theft of their Digital Footprint. Or am I just barking up the wrong tree?
========
Jude Umeh is a senior consultant and enterprise architect, and you can follow him on Twitter, LinkedIn, or on his WordPress blog where this post was previously published.

Related Posts

#SAPCloudPlatform

Capgemini SAP2Cloud Transformation – reap the full benefits

Date icon January 28, 2022

Moving traditional SAP architectures to cloud requires a strategic plan to unleash...

bpo

Delivering frictionless digital customer service in healthcare

Tanya Sharma
Date icon January 27, 2022

The global pandemic has upended many things in our lives. But how has it impacted digital...

Public Sector

2022 Key Trends in Welfare

Date icon January 27, 2022

In an era of fundamental change, technology is helping the public sector to transform its...