wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Email Privacy

profile
Heet Parmar
Aug 28, 2022
0 Likes
0 Discussions
78 Reads

Email privacy is a broad topic dealing with issues of unauthorized access to, and inspection of, electronic mail, or unauthorized tracking when a user reads an email. This unauthorized access can happen while an email is in transit, as well as when it is stored on email servers or on a user's computer, or when the user reads the message.

An email has to go through potentially untrustworthy intermediate computers (email servers, ISPs) before reaching its destination, and there is no way to verify if it was accessed by an unauthorized entity. Through the process of information being sent from the user's computer to the email service provider, data acquisition is taking place, most of the time without the user knowing. There are certain data collection methods (routers) that are used for data privacy concerns, but there are others that can be harmful to the user. This is different from a letter sealed in an envelope, where, by close inspection of the envelope, it might be possible to determine if it had been previously opened. In that sense, an email is much like a postcard, the contents of which are visible to anyone who handles it.

There are certain technological workarounds that make unauthorized access to email difficult, if not impossible. However, since email messages frequently cross national boundaries, and different countries have different rules and regulations governing who can access an email, email privacy is a complicated issue.

Companies may have email policies requiring employees to refrain from sending proprietary information and company classified information through personal emails or sometimes even work emails. Co-workers are restricted from sending private information such as company reports, slide show presentations with confidential information, or email memos.


Comments ()


Sign in

Read Next

Article on Zoho Corporation

Blog banner

Types of Viruses

Blog banner

OS ASSIGNMENT

Blog banner

The Role of Teachers in Building a Child’s Confidence

Blog banner

Vulnerability Assessment

Blog banner

LinkedIn

Blog banner

A BLOG ON MYSQL

Blog banner

10 Unsolved Mysteries all over the world

Blog banner

Modern Operating Systems.

Blog banner

Top Career Paths After a B.Com Degree in Mumbai: What’s Next for You?

Blog banner

UniProcessor Scheduling

Blog banner

Multiprocessor and Multicore Organization

Blog banner

OS PROCESS DESCRIPTION AND CONTROL-SARVAGYA JALAN

Blog banner

The Psychology of Diversity, Equity & Inclusion: How Inclusive Workplaces Boost Productivity

Blog banner

Understanding Regression Analysis

Blog banner

Blockchain Security Technique

Blog banner

Advanced Persistent Threats (APTs)

Blog banner

Mariana Trench: The deepest depths

Blog banner

Data Visualization

Blog banner

Deadlock

Blog banner

Getting into anime My anime suggestions

Blog banner

Deadlock

Blog banner

How Cyber Forensics help prevent Crimes

Blog banner

Business Engineering

Blog banner

Blockchain in IoT Applications

Blog banner

File and File System Structure

Blog banner

Pink sauce pasta

Blog banner

DMZ: Your Secret Weapon for Data Security

Blog banner

Virtual Memory

Blog banner

On-Page SEO

Blog banner

Electronic Funds Transfer

Blog banner

internet email and it's applications

Blog banner

Proof-of-Stake (PoS)

Blog banner

Im Photographer

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Deadlock and starvation in operating system

Blog banner

Software Piracy & Online Data Protection in Digital World

Blog banner

Principal of concurrency

Blog banner

Docker Framework

Blog banner

Inventory management software system

Blog banner

Introduction my self

Blog banner

OS Assignment 3 Deadlock

Blog banner