The explosive uptake of mobile devices including smartphones and tablets has us immersed in a complex, volatile soup of hyper-connected digital technologies, where not only is the perception of time being compressed, but privacy protections are being reshaped.
Smartphones and mobile devices are highly sophisticated micro computers packed with tightly integrated geospatial, optical, voice synthesis, radio transceivers, motion detectors and other technologies, glued together by very smart software.
The concentration and integration of these technologies into a single handheld device transforms the smartphone into a truly multifunctional device. This concentration, however then becomes a serious threat to privacy protection, as we are seemingly inseparable from our smartphones.
For the most part, we still appear to be concerned about our own privacy online.
The 2013 Office of the Australian Information Commissioner (OAIC) Community Attitudes to Privacy study found the majority of those sampled were concerned about the loss of protection of their personal information online whether through identity fraud, theft, misuse or other means. These findings are also mirrored elsewhere.
Notwithstanding our concerns about privacy, will our love of smartphones lead us to willingly trade off our concerns of privacy for this convenience?
Privacy Legislation Meets The Smartphone – Who Wins?
Legislation may be passed, but how effective it is in a virtual, volatile and jurisdiction agnostic digital world remains to be seen. The rapid pace of development and change in digital technologies stands in stark contrast to the comparatively glacial rate of change in legal and regulatory frameworks. The effectiveness of any legislation is based on considerations such as the deterrence factor, the actual protections afforded under the law and the practicalities of enforcing the law.
But when it comes to new and emerging digital technologies - which cut across conventional legal jurisdictions - the effectiveness of legislation is sadly lacking.
The effectiveness of privacy and data breach legislation is questionable, at best. The volume and severity of data breaches continues apace, despite the substantial increases in spending on information security measures as well as the existence of privacy protection legislation and mandatory data breach reporting in many countries.
The dismal rate of successful convictions of elusive cybercriminals is testament to the comparative ineffectiveness of our jurisdiction-bound legal frameworks in the face of rapidly evolving digital technologies and their associated applications.
A Rich Target
Given the ubiquitous nature of mobile devices, they are rich targets for legitimate information harvesting as well as cybercrime as they concentrate, generate and broadcast a wealth of personal information about our lifestyle patterns and habits in one place. The array of systems and apps on your smartphone that continually harvest, interrogate and report back to their masters on the various types of your usage data including geospatial, phone call details, contacts and hardware information is where the real value lies to others.
Internet security company Kaspersky Labs, recently uncovered an extensive legal cyber sleuthing network with over 300 servers dedicated to the collection of information from users located in over 40 countries including Kazakhstan, Ecuador, Colombia, China, Poland, Romania and the Russian Federation. A number of these countries, however, are also associated with known cybercriminal activities.
The bottom line is that, as an individual consumer of smartphone and tablet based technologies loaded with apps, we are relatively powerless to do anything about protecting our privacy.
Your ultimate protection lies in your choice whether to download that app or not, or to limit the use of your smartphone to only making phone calls.
When deciding to load any smartphone services, in the majority of cases, you have to agree with non-negotiable terms and conditions of the provider. A Hobson’s choice at its best.
Tips For Protection
Despite this, there are nevertheless a few fundamental steps you can take to help mitigate the risks to your privacy. These include:
Purchase reputable mobile device security software and install it to your mobile device. This will not only help keep your device clear of known malware and viruses, but also scan all apps and other software for known privacy risks.
If you are no longer using an app, remove it from your device.
Download apps from reputable sources only. If the originator is a real, legitimate business, delivering a real service using their bespoke app the risks of mal- and spyware are minimal. The challenge is that reading the standard “terms and conditions” of the app (if offered) can be not only onerous, but the full ramifications from accepting that the app will access other services on your mobile device (such as location, contacts, call details or any unique network or hardware identifiers) may not be fully understood.
Mobile devices are easily lost or stolen. Ensure you setup your power-on and screen lock security, as well as a other security measures including remote wipe and location identification services.
When disposing your mobile device, ensure you remove any SIM and data cards then perform a hard factory reset. This will return the device to its original ex-factory settings, and remove all traces of your data from the device.
Rob Livingstone has no financial interests in, or affiliations with any organisation mentioned in this article. Other than his role at UTS, he is also the owner and principal of an independent Sydney based IT advisory practice.
About the Author
Rob is a Fellow at the University of Technology, Sydney (UTS) and is lecturing Master’s Degree students in the Information Technology Management Program (ITMP) . Rob is also contributing to the research activities at UTS: Leadership for Innovation in the Digital Age (LIDA) research centre. He is the Principal and owner of Rob Livingstone Advisory Pty Ltd which offers Independent Advisory, Consulting, Mentoring and coaching services. He is also an authority on Cloud computing, and author of the book 'Navigating through the Cloud'
Book by the above author:
Navigating through the Cloud: A plain English guide to surviving the risks, costs and governance pitfalls of Cloud computing
by Rob Livingstone.
Written by an experienced CIO with substantial real-world experience in the design, implementation and management of Cloud technologies, this book is a practical, plain English guide that discusses the commercial, governance, risk and cost issues of Cloud for your business, and provides you with an easy to understand framework to assess the cost and risk of moving to the Cloud. Realise the value of Cloud by avoiding the real and hidden pitfalls.