wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Email Privacy

profile
Heet Parmar
Aug 28, 2022
0 Likes
0 Discussions
78 Reads

Email privacy is a broad topic dealing with issues of unauthorized access to, and inspection of, electronic mail, or unauthorized tracking when a user reads an email. This unauthorized access can happen while an email is in transit, as well as when it is stored on email servers or on a user's computer, or when the user reads the message.

An email has to go through potentially untrustworthy intermediate computers (email servers, ISPs) before reaching its destination, and there is no way to verify if it was accessed by an unauthorized entity. Through the process of information being sent from the user's computer to the email service provider, data acquisition is taking place, most of the time without the user knowing. There are certain data collection methods (routers) that are used for data privacy concerns, but there are others that can be harmful to the user. This is different from a letter sealed in an envelope, where, by close inspection of the envelope, it might be possible to determine if it had been previously opened. In that sense, an email is much like a postcard, the contents of which are visible to anyone who handles it.

There are certain technological workarounds that make unauthorized access to email difficult, if not impossible. However, since email messages frequently cross national boundaries, and different countries have different rules and regulations governing who can access an email, email privacy is a complicated issue.

Companies may have email policies requiring employees to refrain from sending proprietary information and company classified information through personal emails or sometimes even work emails. Co-workers are restricted from sending private information such as company reports, slide show presentations with confidential information, or email memos.


Comments ()


Sign in

Read Next

Virtual memory in os

Blog banner

Operating Systems

Blog banner

Deadlock

Blog banner

Travelling blog

Blog banner

How to Prepare Your Child for Their First Day of School?

Blog banner

Electronic data interchange

Blog banner

AOL Mail

Blog banner

Device driver

Blog banner

Fault tolerance

Blog banner

Uniprocessor scheduling

Blog banner

GIS in Disaster Management

Blog banner

Security issues

Blog banner

SECURITY VULNERABILITIES COUNTERMEASURES IN A SMART SHIP SYSTEM

Blog banner

Paid Email

Blog banner

Title: Network Sniffing Techniques: Uncovering the Secrets of Data Transfer

Blog banner

Evolution of Operating Systems

Blog banner

Multiprocessor and Multicore Organization

Blog banner

virtual machine

Blog banner

Malicious softwares

Blog banner

DATA BREACH CAUSES CHALLENGES PREVENTION AND FUTURE DIRECTIONS

Blog banner

Virtual Machine

Blog banner

CSI and Organizational Change

Blog banner

The Right way of cooking

Blog banner

When Is the Right Time to Enrol My Toddler Into Preschool? NEP

Blog banner

Microsoft Windows Overview

Blog banner

All you need to know about “On-page SEO”

Blog banner

Operating system

Blog banner

A Deep Dive

Blog banner

Blockchain Transactions

Blog banner

Bots and Cyber Security

Blog banner

Deadlock and Starvation

Blog banner

TECHNOLOGY : BOON OR CURSE ?

Blog banner

Top 5 Benefits of Artificial Intelligence

Blog banner

Simple AI Symptom Diagnosis Using LISP – Rule-Based Expert System

Blog banner

ARTICLE ON WRIKE CORPORATION

Blog banner

Deadlock and Starvation

Blog banner

Basic Security For SOAP Services

Blog banner

LISP - Library Management System

Blog banner

Busted : Common Web Security Myths

Blog banner

computer security

Blog banner

Memory Management in Operating System

Blog banner

Virtual Memory

Blog banner