TEDx Talks - Who Owns Your Data? Rethinking Digital Privacy | Yasmine Bhattarai | TEDxNCIT
The speaker discusses the widespread use of technology and internet services in Nepal, emphasizing how personal data is collected and sometimes misused. They cite examples like the misuse of KYC data in financial scams and the tracking capabilities of popular apps like CapCut and Meta. The speaker highlights the 2016 US election as a pivotal moment in understanding data's value, where data from social media was used to influence voter behavior. They stress the importance of being aware of how data is used to manipulate opinions and decisions, urging individuals to question and understand their data rights. The speaker also points out the lack of strong data protection laws in Nepal compared to regions like Europe with GDPR, and encourages people to demand accountability and consent in data usage.
Key Points:
- Personal data is extensively collected by digital platforms, often without explicit consent.
- Misuse of data can lead to financial scams and manipulation of public opinion.
- Awareness of data rights and questioning data usage is crucial for privacy protection.
- Strong data protection laws like GDPR are lacking in Nepal, leading to weak implementation.
- Individuals should demand accountability and ensure consent is given for data usage.
Details:
1. π Embracing Technology in Nepal
1.1. Increased Reliance on Technology Post-COVID
1.2. Digital Payments Transformation
1.3. Educational Innovations
2. π¨ Data Breaches and Security Concerns
- Insiders sold Know Your Customer (KYC) data from CTI accounts, exposing significant internal security vulnerabilities.
- The stolen KYC data facilitated the creation of new SIM cards and fraudulent accounts, enabling money transfers from scams.
- Law enforcement faced difficulties in identifying culprits due to fraudulent account creation, highlighting the need for stronger verification processes.
- Preventive measures are crucial: Companies need to enhance internal security protocols and conduct regular audits to prevent insider threats.
- The impact of data breaches extends beyond financial losses, affecting customer trust and company reputation.
- Understanding KYC processes is vital as they play a key role in preventing fraud and ensuring compliance with regulatory requirements.
3. π± Privacy Risks with Popular Applications
- Government services are prone to hacking, which raises concerns about the security of national ID systems and the trust users place in them.
- Popular applications like CapCut and Meta (Facebook) are found to track user activities extensively, sometimes without explicit user consent.
- CapCut, a top video editing app in Nepal, collects various types of user information, potentially tracking users across different apps.
- Meta (Facebook) collects comprehensive user data, including interactions with advertisers and specific user behaviors like clicks and time spent on content.
- Meta allows users to download the personal data collected about them, illustrating the extensive tracking of user activities.
- Understanding data tracking methods (e.g., clicks, time spent, interactions) is crucial for strategic advertising and user interface design.
4. π³οΈ Data Influence on Elections and Ads
- The 2016 US election demonstrated the strategic use of data, where a company leveraged Facebook data to target specific voter groups.
- Through quizzes on Facebook, data was gathered on user interests, social connections, and behaviors to tailor political ads effectively.
- This strategy involved showing ads promoting gun rights to pro-gun voters, directly influencing voter engagement and decisions.
- Facebook is not the only platform; Google also collects data through search histories and interactions, shaping the ads users see.
- Amazon Alexa and similar devices contribute to data collection by recording conversations, adding another layer to personalized advertising.
- While personalized ads streamline consumer choices, they limit exposure to diverse viewpoints, potentially skewing informed decision-making.
- Data-driven ad strategies create detailed voter profiles, which can guide and alter voter preferences, significantly impacting election results.
5. π Empowering Data Ownership and Consent
- Awareness of data usage is crucial, as many users are unaware of how their data is being used by major companies like Facebook, Twitter, and LinkedIn. This lack of awareness can lead to data manipulation if users do not question the status quo.
- Data protection laws, such as the GDPR in Europe and recent legislative efforts in India, underscore the importance of data protection. However, their implementation is weak in places like Nepal, where there is insufficient understanding of data rights and ownership.
- The importance of consent is highlighted by instances of unsolicited messages, where individuals receive marketing communications without having subscribed or given explicit consent. By questioning the source of these messages, individuals can often stop such communications.
- Common data collection practices involve gathering personal information without explicit consent, emphasizing the need for individuals to understand and question how their data is used.
- A proactive approach in questioning the use of oneβs data whenever personal information is shared can drive change and accountability, leading to better data practices and protection.