wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Email Privacy

profile
Heet Parmar
Aug 28, 2022
0 Likes
0 Discussions
78 Reads

Email privacy is a broad topic dealing with issues of unauthorized access to, and inspection of, electronic mail, or unauthorized tracking when a user reads an email. This unauthorized access can happen while an email is in transit, as well as when it is stored on email servers or on a user's computer, or when the user reads the message.

An email has to go through potentially untrustworthy intermediate computers (email servers, ISPs) before reaching its destination, and there is no way to verify if it was accessed by an unauthorized entity. Through the process of information being sent from the user's computer to the email service provider, data acquisition is taking place, most of the time without the user knowing. There are certain data collection methods (routers) that are used for data privacy concerns, but there are others that can be harmful to the user. This is different from a letter sealed in an envelope, where, by close inspection of the envelope, it might be possible to determine if it had been previously opened. In that sense, an email is much like a postcard, the contents of which are visible to anyone who handles it.

There are certain technological workarounds that make unauthorized access to email difficult, if not impossible. However, since email messages frequently cross national boundaries, and different countries have different rules and regulations governing who can access an email, email privacy is a complicated issue.

Companies may have email policies requiring employees to refrain from sending proprietary information and company classified information through personal emails or sometimes even work emails. Co-workers are restricted from sending private information such as company reports, slide show presentations with confidential information, or email memos.


Comments ()


Sign in

Read Next

Vulnerabilities in OnePlus Devices

Blog banner

DATA SCIENCE IN BUSINESS AND MARKETING

Blog banner

Types of Malware in Cyber Security

Blog banner

Pandas Matrix Applications

Blog banner

EVOLUTION OF MICROPROCESSOR

Blog banner

Memory Management

Blog banner

Explain the concept of ( MIS) Management information systems

Blog banner

USES OF WHATSAPP

Blog banner

How To Invest In Indian Stock Market @ BSE & NSE ~ Tutorial 3

Blog banner

RAID

Blog banner

Interrupts

Blog banner

Deadlock

Blog banner

Water Resources are about to exhaust...

Blog banner

When Is the Right Time to Enrol My Toddler Into Preschool? NEP

Blog banner

Health and fitness in technology

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Deadlock

Blog banner

Docker Framework

Blog banner

Memory input output management

Blog banner

This too shall pass

Blog banner

10 Unsolved Mysteries all over the world

Blog banner

Lemon and Chilli Pickle (Limbu Mirchi Achar)

Blog banner

Zomato (Income Sources)

Blog banner

Threats To Computer System

Blog banner

Key to success in Sports

Blog banner

Service transistion under difficult conditions

Blog banner

What if COVID does not exist!

Blog banner

A True Friendship

Blog banner

File management

Blog banner

Top 5 Benefits of Artificial Intelligence

Blog banner

Social Engineering

Blog banner

Virtual Machine's

Blog banner

Modern Operating System - Suren Kotian

Blog banner

Multiprocessor

Blog banner

Solving Problems with AI: The Power of Search Algorithms

Blog banner

Deadlock

Blog banner

Building Confidence in Children Through Daily Routines and Play

Blog banner

Importance Of Education.

Blog banner

Memory management

Blog banner

Article on IT development trends

Blog banner

Topic: Sessions in Operating system

Blog banner

Paging

Blog banner