wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Email Privacy

profile
Heet Parmar
Aug 28, 2022
0 Likes
0 Discussions
78 Reads

Email privacy is a broad topic dealing with issues of unauthorized access to, and inspection of, electronic mail, or unauthorized tracking when a user reads an email. This unauthorized access can happen while an email is in transit, as well as when it is stored on email servers or on a user's computer, or when the user reads the message.

An email has to go through potentially untrustworthy intermediate computers (email servers, ISPs) before reaching its destination, and there is no way to verify if it was accessed by an unauthorized entity. Through the process of information being sent from the user's computer to the email service provider, data acquisition is taking place, most of the time without the user knowing. There are certain data collection methods (routers) that are used for data privacy concerns, but there are others that can be harmful to the user. This is different from a letter sealed in an envelope, where, by close inspection of the envelope, it might be possible to determine if it had been previously opened. In that sense, an email is much like a postcard, the contents of which are visible to anyone who handles it.

There are certain technological workarounds that make unauthorized access to email difficult, if not impossible. However, since email messages frequently cross national boundaries, and different countries have different rules and regulations governing who can access an email, email privacy is a complicated issue.

Companies may have email policies requiring employees to refrain from sending proprietary information and company classified information through personal emails or sometimes even work emails. Co-workers are restricted from sending private information such as company reports, slide show presentations with confidential information, or email memos.


Comments ()


Sign in

Read Next

Memory management

Blog banner

THE ACTORS LIFE

Blog banner

DNS Cache

Blog banner

What is Segmentation?

Blog banner

Importance Of Time

Blog banner

Broken Authentication Attacks

Blog banner

Network Security Risks

Blog banner

APACHE KAFKA

Blog banner

semaphores in os

Blog banner

5 Things I As A Dentist Would Never Do (And What You Can Learn From It)

Blog banner

Honeypot in cyber security

Blog banner

?What Your Dentist Notices The Moment You Sit In The Chair

Blog banner

Virtual Machine

Blog banner

Why Friendship at Work is Important

Blog banner

What are Tenders its various types

Blog banner

DATA SCIENCE IN BUSINESS AND MARKETING

Blog banner

Inventory management software system

Blog banner

Buffering

Blog banner

Health and fitness in technology

Blog banner

Guidelines for a Low sodium Diet.

Blog banner

Security Issues and Countermeasures

Blog banner

Depression

Blog banner

Digital Marketing - The new way to reach end consumer

Blog banner

Study of Backdoor and Trojan tools

Blog banner

Corporate Discipline.

Blog banner

A Happier Workplace Starts with Healthy Lunches by Meal Maharaj

Blog banner

DATA BREACH CAUSES CHALLENGES PREVENTION AND FUTURE DIRECTIONS

Blog banner

Khau Galli – Vile Parle

Blog banner

Zero Trust Security Model: Revolutionizing Cybersecurity in the Digital Age

Blog banner

SWEET SHREDDED MANGO CHUNDA (MANGO CHUNDA)

Blog banner

You Get Everyone, But No One Gets You: The Lonely Side of High Emotional Intelligence

Blog banner

Fudgy Tahini Date Chocolate Bars

Blog banner

Booting Process In Operating System

Blog banner

How to invest in Indian Stock Market ? ~ Tutorial 1

Blog banner

SPAM

Blog banner

Autonomy Vehicles: Future Ki Gadiya

Blog banner

Photorec - media recovery tool

Blog banner

Which Smartphone Company Has the Largest Market Share in India?

Blog banner

Top 5 Post-Wedding Skin Care Tips

Blog banner

E-learning

Blog banner

The application udemy

Blog banner

Article on different management system

Blog banner