ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Data Privacy Issues

Updated on December 2, 2009

Data Privacy Issues

Conceivably one could take up residence 'off the grid' and achieve a high level of data privacy. Unfortunately most of us have deep-seated needs for human interaction and email. Concomitant with human contact and online activities are data privacy conundrums. Email is at risk, online transactions are at risk, and even withdrawing cash from the ATM down the street becomes problematic. Herein we look closely why personal email is at risk and how it might be protected.

eMail isn't safe

Long ago a wise person suggested that all email should be composed under the assumption that the text will eventually appear on the front page of the New York Times. We hunch over our keyboards in perceived seclusion, tapping out what we want to believe are private messages. Unfortunately, we don't realize the circuitous path that our composition will take before reaching its' final destination. Clicking Send is an exercise in blind trust. Your bundle of words starts out from your ISP (Internet Service Provider) server and ends up on a computer owned by the ISP of your recipient. In between? In between we have no clue. Rarely is there a direct path between the two servers. Your confidential information may traverse 10 or more different servers in between. Each server receives a copy and relays it to a computer closer to the ultimate destination. The Internet is designed this way. Hopefully all intermediate copies are deleted shortly after being relayed. Your data is hardly private along the way. Sending the same message to the same recipient tomorrow will probably result in a completely different path. Are all the servers managed by high-minded computer experts with no interest in your personal data? Probably not. Certainly the majority IT personnel couldn't care less about your dinner plans this weekend, but it only takes one unscrupulous snooper to latch onto your private data.

Is there any way to increase data privacy when sending and receiving email? One option is to encrypt your messages using a public/private key combination. The public portion of the key is readily available to the entire digital world. The private key lives on your computer and is known only to you. Anyone wishing to send you an encrypted message simply uses the public key to obfuscate the text. Once received, you use the private component of the key to decode the information. As the message hops from server to server, anyone attempting to browse it will be presented with gibberish.

Computers are not 100% secure unless they are completely offline, but a public/private key strategy can greatly increase data privacy levels. You will need the co-operation of your correspondents; anyone who sends you a message will need your public key and along with appropriate software to encrypt their words.

Keep your data a little safer by implementing a public/private key strategy. Ask your ISP (better yet, ask a trustworthy middle-school hacker) about email encryption options. Once installed, the privacy infrastructure is mostly painless to use. Many emailers include their public key as part of their email signature. Doing this provides a method for others to reply to them in a relatively secure manner. Data privacy is increased at very little cost.

Plug-ins are software programs that enhance the capabilities of other pre-existing programs. Many plug-ins are available for adding public/private key capabilities to popular email programs. Check out this list of plug-ins for useful encryption tools. Be prepared for a little resistance; each person who desires to send you an encrypted message will also need to install a plug-in that's specific to their email program. Fortunately you don't need to 'cut over' to a totally encrypted world in one fell swoop. You will still be able to receive clear text (unencrypted) messaged along with encrypted messages.

Look for free plug-ins that are compatible with your email client. Popular email clients are Outlook, Outlook Express, Thunderbird, and Opera. Plug-ins can be identified for all of these common clients. If you use a web-based email program provided by your ISP or your employer, ask them what security options they might provide.


Be aware of the insecure nature of eMail. Look into adding public/private key encryption to your email program to increase mail security.

Some images may be courtesy of


    0 of 8192 characters used
    Post Comment

    • J  Rosewater profile image

      J Rosewater 8 years ago from Australia

      I love the wise person quote. Yes - I am conscious of the 'writing on a public blackboard' aspect of email... but also the ambiguity of brief messages unaccompanied by facial expression, vocal intonation, and body language. Even the word 'Yes!' can be interpreted wrongly or taken in the opposite context to what you mean. I practised saying yes to the mirror to mean a hundred different things. Emoticons were invented precisely because of this difficulty in interpreting a sender's state of mind when they are agreeing or disagreeing with you in an email... or a forum, for that matter.

      So I agree it's a minefield in many different ways, but hey... it's instant.


    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: ""

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)