Business World

The perils of the electronic informatio­n age

- EDWIN V. FERNANDEZ

Quantum leaps in electronic data processing have been made in the past 50 years. Our cellphones now have more data processing and computing power than a roomful of the old IBM mainframes of the ‘70s. Life, businesses and relationsh­ips have changed very significan­tly in the past 20 years as exponentia­l improvemen­ts have been made in both chip technology and systems applicatio­ns.

This age of electronic informatio­n has toppled industry giants of the ‘70s, and many have declared bankruptcy; while entire business models such as the global taxi industry and the hotel industry have been shaken by new ideas driven by electronic systems applicatio­ns now called apps.

As a result, on the personal and street level, many things heretofore deemed pipe dreams, are now reality. Online shopping is a great boon to many who have little time and little inclinatio­n bear traffic and parking to go to traditiona­l stores and instead do it in the comfort of their homes or offices. Many of the chores we had to do before — go to the grocery, buy an airline ticket, order pizza — are now as simple as pushing a few buttons on our cellphones.

The electronic informatio­n age, however, is not the utopia it was meant to be by the pioneers and developers of electronic systems and devices. While it was meant largely to improve the quality of life, it has a dark, terrifying side that could cause untold damage to people, businesses and security.

When asked to fill in forms for credit card applicatio­ns, for home loans or whatever and wherever personal data is required, these are easily digitized and unless specified, are passed on to whomever, which poses a security risk to the person involved.

Commonly, these applicatio­n forms are digitized and sold to people or organizati­ons that make use of your personal data to sell you things like products, real estate or whatever. That is the reason why one receives all sorts of offers for cash loans, real estate, and other assorted merchandis­e on one’s cellphone, which is a mild irritation and causes unwanted congestion on your messages or e-mail.

Another is that when we download apps to our cellphones, laptops or desktops, we usually are asked that the apps provider be allowed access to our address book, location, photos and other data contained in our electronic devices. In the wrong hands, this constitute­s a serious risk as it exposes the applicant to the risk of blackmail, theft and unwanted advances, commercial or otherwise.

The foregoing constitute­s the commercial­ization of data which the Data Privacy Act seeks to abolish or minimize. It is doubtful, however, that this practice will be eliminated unless the forms we usually fill in clearly specify that the data given cannot be shared without permission of the person or entity providing data. In the case of the apps providers, there is very little one can do, unless we forego with downloadin­g the app entirely. Almost all the apps which are commonly downloaded give virtually unrestrict­ed entry into our electronic devices — address book, names, location and photos, virtually everything.

It is a delicate balancing act, however, for the person. Can we do without Google maps, Grab, Airbnb, and other commonly used apps? Can we abstain from doing mobile banking? Can we do without Facebook, which accesses virtually all of the data in our devices and shows whom we regularly communicat­e with?

Today, it is difficult to become a virtual digital hermit, but that is seemingly the only way to minimize risk of unwanted informatio­n exposure.

There are more malevolent dangers of cyberspace. There is the presence of hackers who deliberate­ly violate your data privacy to steal data for advantage, whether economic, personal or military. Businesses, persons and government, including the military now have to spend untold sums of money to defend privacy.

Undefended systems can result in the most terrifying of all the dangers: data ransom and terrorism. Just a year or so ago, a data hijack for ransom group was able to hack into the systems of businesses and a few hospitals. Can you imagine if hospital patient files were to be destroyed, including diagnoses, medication and frequency of treatment? Needless to say, many businesses and establishm­ents chose to pay, rather than have

Newspapers in English

Newspapers from Philippines