wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Email Privacy

profile
Heet Parmar
Aug 28, 2022
0 Likes
0 Discussions
78 Reads

Email privacy is a broad topic dealing with issues of unauthorized access to, and inspection of, electronic mail, or unauthorized tracking when a user reads an email. This unauthorized access can happen while an email is in transit, as well as when it is stored on email servers or on a user's computer, or when the user reads the message.

An email has to go through potentially untrustworthy intermediate computers (email servers, ISPs) before reaching its destination, and there is no way to verify if it was accessed by an unauthorized entity. Through the process of information being sent from the user's computer to the email service provider, data acquisition is taking place, most of the time without the user knowing. There are certain data collection methods (routers) that are used for data privacy concerns, but there are others that can be harmful to the user. This is different from a letter sealed in an envelope, where, by close inspection of the envelope, it might be possible to determine if it had been previously opened. In that sense, an email is much like a postcard, the contents of which are visible to anyone who handles it.

There are certain technological workarounds that make unauthorized access to email difficult, if not impossible. However, since email messages frequently cross national boundaries, and different countries have different rules and regulations governing who can access an email, email privacy is a complicated issue.

Companies may have email policies requiring employees to refrain from sending proprietary information and company classified information through personal emails or sometimes even work emails. Co-workers are restricted from sending private information such as company reports, slide show presentations with confidential information, or email memos.


Comments ()


Sign in

Read Next

Smart Homes | Zigbee Alliance

Blog banner

Article on team management software

Blog banner

objectives and function of operating system

Blog banner

" THE ANSWERS THAT LED INDIAN BEAUTIES TO THE MISS UNIVERSE HISTORIC WIN. "

Blog banner

The Evolution of Operating Systems

Blog banner

Direct memory access (DMA)

Blog banner

Cyber Forensics on IOT Devices

Blog banner

Why Data Security Is Important

Blog banner

Decision Tree: A Diagram Model

Blog banner

THE LEGAL ISSUES OF COMPUTER FORENSICS IN INDIA

Blog banner

RAID

Blog banner

LINUX

Blog banner

LIMITED EDITION

Blog banner

Confidence Building Activities for the New School Year

Blog banner

CYBER FORENCIS: PAST, PRESENT AND FUTURE.

Blog banner

CYBER SECURITY CHALLENGES

Blog banner

Disk Management

Blog banner

ACHIEVEMENTS IN OPERATING SYSTEMS

Blog banner

Anomaly Detection in Behavioral Data Using Machine Learning

Blog banner

Big Data

Blog banner

Measuring IT Risk

Blog banner

Network Footprinting in Cybersecurity

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Review on Recovering Deleted Files

Blog banner

Virtual Machine

Blog banner

Technical Challenges and Directions for Digital Forensics

Blog banner

What is a Malware ?

Blog banner

Memory Management

Blog banner

?Why Social and Emotional Skills Matter More Than ABCs in Early Years?

Blog banner

Memory

Blog banner

Malware Defense

Blog banner

Photography

Blog banner

Footprinting

Blog banner

Reclaim Your Bite and Beauty: All About Dental Restorative Treatments

Blog banner

How social media affect

Blog banner

Cyber Crime Investigation In The Era Of Big Data

Blog banner

AI & Data Science in Healthcare – Predicting diseases, medical imaging analysis

Blog banner

Buffer Overflow

Blog banner

Buffering

Blog banner

GIS in Disaster Management

Blog banner

Jamming Attacks in Network Security: Disrupting Communication Signals

Blog banner

virtual machine

Blog banner