wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Email Privacy

profile
Heet Parmar
Aug 28, 2022
0 Likes
0 Discussions
78 Reads

Email privacy is a broad topic dealing with issues of unauthorized access to, and inspection of, electronic mail, or unauthorized tracking when a user reads an email. This unauthorized access can happen while an email is in transit, as well as when it is stored on email servers or on a user's computer, or when the user reads the message.

An email has to go through potentially untrustworthy intermediate computers (email servers, ISPs) before reaching its destination, and there is no way to verify if it was accessed by an unauthorized entity. Through the process of information being sent from the user's computer to the email service provider, data acquisition is taking place, most of the time without the user knowing. There are certain data collection methods (routers) that are used for data privacy concerns, but there are others that can be harmful to the user. This is different from a letter sealed in an envelope, where, by close inspection of the envelope, it might be possible to determine if it had been previously opened. In that sense, an email is much like a postcard, the contents of which are visible to anyone who handles it.

There are certain technological workarounds that make unauthorized access to email difficult, if not impossible. However, since email messages frequently cross national boundaries, and different countries have different rules and regulations governing who can access an email, email privacy is a complicated issue.

Companies may have email policies requiring employees to refrain from sending proprietary information and company classified information through personal emails or sometimes even work emails. Co-workers are restricted from sending private information such as company reports, slide show presentations with confidential information, or email memos.


Comments ()


Sign in

Read Next

Culture Of Ladakh

Blog banner

Android Flashlight Application

Blog banner

What is Spyware?

Blog banner

STARVATION

Blog banner

RAID

Blog banner

The Laws of Karma

Blog banner

RAID - LEVELS OF RAID

Blog banner

Tableau

Blog banner

Evolution of Operating system.

Blog banner

Recipe of Paneer Butter Masala

Blog banner

Hot Mango Pickle (Methiyu)

Blog banner

Processes: Process Description and Control.

Blog banner

THREADS (assignment 1)

Blog banner

SWEET SHREDDED MANGO CHUNDA (MANGO CHUNDA)

Blog banner

What makes Nugget RC Racing Florida’s Most Exciting Racing Events?

Blog banner

Understanding - Proof of Work!

Blog banner

Interrupts

Blog banner

What Makes Patola the Queen of Silk?

Blog banner

Deadlock

Blog banner

MORDERN UNIX SYSTEM

Blog banner

Volatile Memory & Non-Volatile Memory Explained

Blog banner

File system implementation

Blog banner

Not anti-social, but pro-solitude

Blog banner

VIRTUAL MACHINES

Blog banner

undefined

Blog banner

Domain Name System

Blog banner

File management

Blog banner

Why You Should Not Use Free VPNs

Blog banner

Spyware

Blog banner

Virtual Machine

Blog banner

Is it important to follow all the trends that come up on social media?

Blog banner

Operating system

Blog banner

Business Intelligence v/s Big Data

Blog banner

Crypto tax evasion

Blog banner

Predicting Student Performance with Data Science

Blog banner

From Procrastinator to Performer: How to Beat the Last-Minute Rush

Blog banner

Online Games

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner

Mobile Survey

Blog banner

Life

Blog banner

Fun Christmas Activities For Toddlers & Kids

Blog banner

Never give up

Blog banner