Tips For Our Privacy When Adopting New Technologies


The new technologies, the emerging are those that introduce something new, never seen or known technology but, so far, had no practical application. In other words, the new technologies are not the internet, nor the smartphone, nor the whole set of technologies that have been with us for a decade or two but are still labeled with that term.

They are also disruptive technologies, those that revolutionize the way of doing things or that introduce something so novel that they “break” in the market and have great transformative potential. Clear and recent examples are blockchain technology, 5G, the Internet of Things or smart personal assistants.

If we add to the novelty that these technologies represent for the majority of people to the uncertainty or ignorance of the new privacy and data protection regulations (such as the RGPD ), it is logical that doubts arise about whether our data will be safe, or not.

How Do We Know If New Technologies Can Affect Our Privacy?

To be sure, there is nothing better than following the recommendations of the Internet Safety Office to confidently adopt any new technology through a smartphone application, for example, through a web service.

  • Is it technology in a state of testing? Is it proven enough to offer privacy and security guarantees? Is it an official application from a reliable source? It is important to know, before launching to enter sensitive data, if the application has outdated technology, or is up to date on these issues.
  • It is very important to always read the terms and conditions of use of the applications, whatever they may be. They are usually arid texts, but they are legal texts that, if we accept without reading, can bring us problems. Knowing how the collected data will be treated is one of the first security rules that we must apply.
  • Always check all the permissions you grant to the mobile applications that you install on your smartphone.
  • If you detect any irregularity, exercise your rights of Access, Rectification, Cancellation, and Opposition (ARCO) that the law offers you.
  • Activate all additional security systems (having a good password is not enough anymore). The more you use, the more secure the application will be and the more secure your data will be.
  • Look for applications and services that adhere to the ” privacy principle ” in design, and “default privacy.” That is, applications developed by companies that comply with the RGPD from the conception of the application.

It must be said that it is mandatory for all companies to comply with the General Data Protection Regulation but provided that their registered office is in the European Union. In other words, all Spanish companies will be obliged to comply with the RGPD, but not all companies apply this law because they are located in other countries.

That said, it is vitally important to keep our devices up-to-date with regard to both the operating system and software and especially to anyone who has to do with security.

Many people are attracted to adopting novel technologies as they appear on the market, and even earlier. Early access programs or “betas” allow interested users (early adopters) to test these functionalities, technologies or applications before ordinary users. As long as we follow the recommendations outlined above, we can rest assured regarding the privacy of our data.

Tech Reviews Corner is a place where one can find all types of News, Updates, Facts about Technology, Business, Marketing, Gadgets, and Other Softwares & Applications

Leave a Reply

Your email address will not be published. Required fields are marked *

Back To Top