• About Us
  • Contact
  • Careers
  • Send Us a Tip
Menu
  • About Us
  • Contact
  • Careers
  • Send Us a Tip
CyberNews logo
Newsletter
  • Home
  • News
  • Editorial
  • Security
  • Privacy
  • Resources
Menu
  • Home
  • News
  • Editorial
  • Security
  • Privacy
  • Resources
CyberNews logo

Home » Privacy » 6 examples of online privacy violation

6 examples of online privacy violation

by Kayla Matthews
15 April 2020
in Privacy
0
a man typing on a keyboard
0
SHARES

Most people share data without thinking about it. They provide information to companies while purchasing merchandise, signing up for email lists, downloading apps and more. They also expect the respective enterprises to safeguard those details. 

Unfortunately, the businesses in question often fall short of the task, exposing valuable data. The resulting violation of privacy laws can lead to huge fines and eroded public trust. 

Here are six recent examples of companies that failed to do everything they could to respect users’ privacy. 

1. Zoom gave data to third parties without users’ knowledge

An April 2020 piece from The New York Times alleged that popular video conferencing site Zoom engaged in undisclosed data mining during user conversations. The coverage asserted that when a person signed into a meeting, Zoom transmitted their data to a system that matched individuals with their LinkedIn profiles. 

The incident happened via a subscription-based tool called LinkedIn Sales Navigator that Zoom offered customers to assist with their marketing needs. 

Moreover, when someone signed into a Zoom meeting with an anonymous name, the tool still connected that person to their respective LinkedIn profile. Thus, the person had their real name revealed to a fellow user despite efforts to keep it private. Zoom promised to disable the tool and remove it from the company’s offerings. 

2. Google violated children’s privacy laws

Google is under fire for violation of privacy laws, recent reports say. A California federal court received a lawsuit from two children suing the tech giant through their father. The pair assert that the G Suite for Education platform unlawfully collects biometric data from kids who use it. If so, that action would likely mean Google disregarded the Children’s Online Privacy Protection Act (COPPA), a federal mandate that requires getting parental consent before gathering data from minors under 13. Moreover, the company may face allegations of violations associated with state biometric laws. The issues could affect millions of kids and their privacy.

3. Hackers dump confidential law firm data

A law firm’s document management system (DMS) contains all the legal documents about its clients. Some include records spanning 10 to 20 years, making it especially necessary to protect the data. Privacy violations sometimes occur due to inadequate cybersecurity. For example, the Maze hacker group targeted Texas law firm Baker Wotring and published a “full dump” of the organization’s data. The incident was a ransomware attack, and the leak likely happened when the cybercriminals did not receive the requested payment. The compromised records included case diaries, consent forms and more. 

4. Facebook fined for its role in Cambridge Analytica data harvesting 

Federal officials in the United States carried out a 16-month investigation and determined Facebook repeatedly misled its users and compromised efforts to safeguard privacy. That decision came after Cambridge Analytica used a third-party app to harvest data from a Facebook quiz for political purposes. 

The Federal Trade Commission (FTC) fined Facebook $5 billion for the infractions, the largest amount ever imposed on a company for a consumer privacy regulation.

5. Ring Doorbell app allegedly loaded with trackers

The Ring doorbell has an accompanying app that lets people see, hear and speak to individuals who arrive on their doorsteps — even without being home. Unfortunately, when the Electronic Frontier Foundation (EFF) investigated the Android version, it discovered numerous third-party trackers. The researchers say that Ring sent data to four outside entities, providing them with personally identifiable information.

The transmitted details include names, IP addresses and data from users’ device sensors. The EFF warned that recipients could combine all the information to get a unique user picture. 

6. WhatsApp flaw sacrificed the privacy of top government officials

Privacy violations also happen if malicious parties exploit weaknesses in widely used apps. Such a situation unfolded when NSO Group, an Israeli hacking tool developer, allegedly built and sold a product that allowed the infiltration of WhatsApp’s servers due to an identified weakness. This problem caused at least 1,400 users to have their mobile phones hacked within approximately two weeks in April and May 2019. 

A sizeable segment of the identified victims were reportedly high-profile government officials located in at least 20 countries. Early investigative efforts failed to confirm the perpetrators that used the tool from NSO Group. 

How to protect online privacy

There’s a good chance that most of the companies mentioned here are familiar. It’s understandable, then, to worry whether it is safe to keep using products from the brands. That’s a highly personal decision. Companies and individuals alike can take decisive steps to protect their privacy by: 

  • and unscrupulous behavior
  • Reading all privacy and user agreements before signing up for a service or app
  • Restricting the type and number of permissions that installed apps have on devices
  • Reviewing all current privacy settings for apps and sites at least monthly, and tweaking them as necessary
  • Staying abreast of cybersecurity news to learn about relevant violations of privacy laws, breaches Downloading apps from reputable sources, such as official websites or app stores that vet content and remove harmful software

Knowing how to protect your privacy increases the chances that valuable details will remain in your control. Otherwise, the likelihood goes up of private data falling into the wrong hands and getting misused. 

ShareTweetShareShare

Related Posts

Uploading on mobile screen and Data Protection on desktop screen

Privacy and data protection trends in 2021

20 January 2021
An unintended consequence: can deepfakes kill video evidence?

An unintended consequence: can deepfakes kill video evidence?

14 January 2021
Red Personal data drawer

Is your data your personal property?

13 January 2021
Data collection cheat sheet: how Parler, Twitter, Facebook, MeWe’s data policies compare

Data collection cheat sheet: how Parler, Twitter, Facebook, MeWe’s data policies compare

12 January 2021
Next Post
Busting myths around bug bounty platforms

Busting myths around bug bounty platforms

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Popular News

  • 70TB of Parler users’ messages, videos, and posts leaked by security researchers

    70TB of Parler users’ messages, videos, and posts leaked by security researchers

    83012 shares
    Share 83002 Tweet 0
  • The ultimate guide to safe and anonymous online payment methods in 2021

    13 shares
    Share 13 Tweet 0
  • Bitwarden Review

    0 shares
    Share 0 Tweet 0
  • Best alternatives to Gmail to protect your privacy

    427 shares
    Share 427 Tweet 0
  • ProtonMail review: have we found the most secure email provider in 2021?

    69 shares
    Share 69 Tweet 0
Elon Musk

Elon Musk to offer $100 million prize for ‘best’ carbon capture tech

22 January 2021
Is there life on Mars?

Is there life on Mars?

22 January 2021
Covid-19 vaccine

Covid vaccines are now an excuse to launch phishing attacks

22 January 2021
Alphabet shutting Loon, which used balloon alternative to cell towers

Alphabet shutting Loon, which used balloon alternative to cell towers

22 January 2021
what is wireguard

WireGuard protocol: everything you need to know

22 January 2021
Parler loses bid to require Amazon to restore service

Parler loses bid to require Amazon to restore service

22 January 2021
Newsletter

Subscribe for security tips and CyberNews updates.

Email address is required. Provided email address is not valid. You have been successfully subscribed to our newsletter!
Categories
  • News
  • Editorial
  • Security
  • Privacy
  • Resources
  • VPNs
  • Password Managers
  • Secure Email Providers
  • Antivirus Software Reviews
Tools
  • Personal data leak checker
  • Strong password generator
About Us

We aim to provide you with the latest tech news, product reviews, and analysis that should guide you through the ever-expanding land of technology.

Careers

We are hiring.

  • About Us
  • Contact
  • Send Us a Tip
  • Privacy Policy
  • Terms & Conditions
  • Vulnerability Disclosure

© 2021 CyberNews

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.

Home

News

Editorial

Security

Privacy

Resources

  • In the News
  • Contact
  • Careers
  • Send Us a Tip

© 2020 CyberNews – Latest tech news, product reviews, and analyses.

Subscribe for Security Tips and CyberNews Updates
Email address is required. Provided email address is not valid. You have been successfully subscribed to our newsletter!