wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Email Privacy

profile
Heet Parmar
Aug 28, 2022
0 Likes
0 Discussions
78 Reads

Email privacy is a broad topic dealing with issues of unauthorized access to, and inspection of, electronic mail, or unauthorized tracking when a user reads an email. This unauthorized access can happen while an email is in transit, as well as when it is stored on email servers or on a user's computer, or when the user reads the message.

An email has to go through potentially untrustworthy intermediate computers (email servers, ISPs) before reaching its destination, and there is no way to verify if it was accessed by an unauthorized entity. Through the process of information being sent from the user's computer to the email service provider, data acquisition is taking place, most of the time without the user knowing. There are certain data collection methods (routers) that are used for data privacy concerns, but there are others that can be harmful to the user. This is different from a letter sealed in an envelope, where, by close inspection of the envelope, it might be possible to determine if it had been previously opened. In that sense, an email is much like a postcard, the contents of which are visible to anyone who handles it.

There are certain technological workarounds that make unauthorized access to email difficult, if not impossible. However, since email messages frequently cross national boundaries, and different countries have different rules and regulations governing who can access an email, email privacy is a complicated issue.

Companies may have email policies requiring employees to refrain from sending proprietary information and company classified information through personal emails or sometimes even work emails. Co-workers are restricted from sending private information such as company reports, slide show presentations with confidential information, or email memos.


Comments ()


Sign in

Read Next

BUSINESS MODELS OF E COMMERCE

Blog banner

Virtual Memory

Blog banner

How to lose belly fat

Blog banner

Virtual machine.

Blog banner

How I use google in my daily life

Blog banner

Deadlocks

Blog banner

Microsoft Windows Overview

Blog banner

Deadlock

Blog banner

Student Grade Calculator in LISP

Blog banner

Data Exfiltration

Blog banner

The Joy of Giving: How Festivals Teach Children Empathy and Gratitude

Blog banner

INTERNET

Blog banner

Importance of business process documentation

Blog banner

Service Design Model

Blog banner

PROCESS CONTROL BLOCK IN OS

Blog banner

Apple

Blog banner

Zomato's Secret Digital Marketing Techniques!

Blog banner

File management

Blog banner

Blockchain Security Technique

Blog banner

Dental Problems That Start Small But Should Never Be Ignored

Blog banner

A-B-C of Networking: Part-2 (Components)

Blog banner

What is Segmentation?

Blog banner

Operating system evolution

Blog banner

Models of Information Security.

Blog banner

5 Stages of Digital Marketing

Blog banner

Geographic Information Systems(By aditi Unnikrishnan)

Blog banner

CoWIN

Blog banner

Critical success factors

Blog banner

PERSONALITY DEVELOPMENT

Blog banner

**THE MUJAWARR: Transforming the Logistics Industry**

Blog banner

Understanding Endometriosis and Its Psychological Impact on Quality of Life

Blog banner

Deadlock

Blog banner

operating system

Blog banner

Beyond the Track: Why the Best Hotel in Arcadia, Florida, Completes Your IMSA Sebring Getaway

Blog banner

Artificial Intelligence (AI)

Blog banner

Linux Memory Management

Blog banner

Multiprocessor

Blog banner

Electronic Funds Transfer

Blog banner

Instagram

Blog banner

A Heartfelt Act of Kindness

Blog banner

All you need to know about “Off-page SEO”

Blog banner

File management

Blog banner