This week’s exploration of data ownership and cybersecurity brought us deep into some of the most significant issues that are defining our digital world. From discovering the responsibility of the holders and custodians of our data, to listening about the growing challenges in safeguarding it, this week’s guest speakers and readings made me appreciate the significant ethical considerations we must all grapple with.

Data Ownership and the Power Struggles

Dr. Bonnie Stewart’s talk was remarkable in outlining how datafication, the process of converting personal information into data, has altered the practice of privacy within organizations. But who really owns information on you? Are they the companies that collect it, the people whose data it is, or the governments that determine its use?

As we get more digital, data is turning into one of the most valuable things. Companies collect huge amounts of data every day: from your shopping habits to your search history, even where you physically are. In exchange, they often provide services “for free” – but at what cost?

I began to question the morals of it all: How much control do human beings have over their own data? Do they have any sort of control as to what can be done to it once collected?

  • Who gains? It is mainly corporations and governments that benefit from this information.
  • Who loses? The user, often never knowing how his or her private data is being commodified, or worse yet, sold or stolen.

It made me reflect on my own web presence and whether I am aware of how much data I generate, and more importantly, who has access to it.

Cybersecurity: Defending Data in the Age of Digital Threats

Next, we heard Wency Lum, UVic’s Associate Vice-President of University Systems, provide some informative insight into cybersecurity. Cybersecurity is no longer an afterthought – it is a necessity.

The internet is full of risks: viruses, hackers, data breaches, and even the risk of identity theft. With our lives increasing entwined with technology, it is imperative that we guard our sensitive and personal data. Wency Lum’s insights on how we can better protect ourselves were especially helpful, including:

  • Encryption of data and communications: Encryption of your data means that even if intercepted, it cannot be read.
  • Secure passwords: Using multi-factor authentication and creating unique passwords for different accounts.
  • Phishing awareness: Being cautious of suspicious websites, links, and emails.

I realized that data protection is not just the job of companies we users also have to be vigilant. The more I read, the clearer it became that cybersecurity is a two-way street, with the tech companies and us, the users, both being responsible.

Ethical Dilemmas and Digital Privacy: A Balancing Act

Amidst all these debates, I was surprised by the ethical questions of data ownership and cybersecurity. On the one hand, there’s the imperative for companies to make money off data; on the other, there’s the growing need to protect individuals’ rights and privacy.

In today’s world:

  • Companies are left with the burden of weighing profit and privacy.
  • Governments are interested in passing better data protection laws (the GDPR is a notable case in point in Europe).
  • We consumers must learn and understand how valuable our own digital footprint is.

Final Thoughts: Data Ethics and Security in a Connected World

In the age of constant information generation, the boundaries of what is acceptable are changing. Ownership of data and cybersecurity concerns are now at the forefront of digital rights discussions, and everyone from individuals to governments has a stake in protecting the flow of information.

As I find out more about these concerns, I realize that ethical use of data has to be a guiding principle in all online interactions. Whether I am signing up for a service, shopping online, or talking to people digitally, I need to be more cognizant of the data I generate and send.

  • Will I be more careful about sharing my personal information? Absolutely.
  • Will I practice better cybersecurity habits, like using stronger passwords and encrypting sensitive data? Definitely.

What’s Next?

Looking forward, I’ll continue exploring ways to stay secure online, protect my privacy, and ensure that the data I share is used ethically. It’s no longer just about being cautious, it’s about understanding how my digital footprint impacts not just me but the world around me.