wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Email Privacy

profile
Heet Parmar
Aug 28, 2022
0 Likes
0 Discussions
78 Reads

Email privacy is a broad topic dealing with issues of unauthorized access to, and inspection of, electronic mail, or unauthorized tracking when a user reads an email. This unauthorized access can happen while an email is in transit, as well as when it is stored on email servers or on a user's computer, or when the user reads the message.

An email has to go through potentially untrustworthy intermediate computers (email servers, ISPs) before reaching its destination, and there is no way to verify if it was accessed by an unauthorized entity. Through the process of information being sent from the user's computer to the email service provider, data acquisition is taking place, most of the time without the user knowing. There are certain data collection methods (routers) that are used for data privacy concerns, but there are others that can be harmful to the user. This is different from a letter sealed in an envelope, where, by close inspection of the envelope, it might be possible to determine if it had been previously opened. In that sense, an email is much like a postcard, the contents of which are visible to anyone who handles it.

There are certain technological workarounds that make unauthorized access to email difficult, if not impossible. However, since email messages frequently cross national boundaries, and different countries have different rules and regulations governing who can access an email, email privacy is a complicated issue.

Companies may have email policies requiring employees to refrain from sending proprietary information and company classified information through personal emails or sometimes even work emails. Co-workers are restricted from sending private information such as company reports, slide show presentations with confidential information, or email memos.


Comments ()


Sign in

Read Next

operating system

Blog banner

Memory management

Blog banner

Classification Vs Clustring? What's the diffrence?

Blog banner

Deadlock

Blog banner

I Personally

Blog banner

LinkedIn: Watch out for these 7 upcoming updates in 2023

Blog banner

Deming’s Process

Blog banner

How Laughing Gas Makes Your Dental Visit So Much Easier

Blog banner

Zomato's Secret Digital Marketing Techniques!

Blog banner

Subnet Masking

Blog banner

Cache Memory in Operating Systems

Blog banner

KEAP MANAGEMENT SYSTEM

Blog banner

INSTAGRAM

Blog banner

Threads

Blog banner

Memory Hierarchy

Blog banner

What is Internet

Blog banner

FRIENDSHIP

Blog banner

IT security management

Blog banner

File Organization and Access

Blog banner

DATA SCIENCE IN BUSINESS AND MARKETING

Blog banner

Sessions In OS.

Blog banner

Virtual memory in os

Blog banner

semaphores in os

Blog banner

INTRODUCTION

Blog banner

Virtual memory

Blog banner

Importance of self defence for girls

Blog banner

Assignment-3

Blog banner

Deadlock Prevention

Blog banner

Mumbai

Blog banner

The Importance of Data Quality Management in Data Science

Blog banner

Virtualization

Blog banner

From Loom to Luxury: How Patola Elevates Modern Wardrobes

Blog banner

Stories Woven in Silk: The Meaning Behind Patola Motifs

Blog banner

Why Data Privacy Is Changing Online Advertising

Blog banner

Royal enfield

Blog banner

Why Skipping Afternoon Meals Affects More Than Just Your Hunger?

Blog banner

15 Websites that will make your life easier ...!!!

Blog banner

Volatile Memory & Non-Volatile Memory Explained

Blog banner

Process states

Blog banner

Modern Operating System - Khush bagaria

Blog banner

Google App Engine

Blog banner

Automating OSINT tasks for efficient Cyber Forensics Investigations

Blog banner