Global social media platforms’ contract with members are broken as most have disclosed major confidentiality breaches allowing unauthorized companies access to billions of members’ data and information without knowledge nor consent. In June 2018, Facebook disclosed giving dozens of companies special access to user data, detailing for the first time a host of deals that contrasted with the digital network giant's previous public statements that it restricted personal information to outsiders. Mitigating these kind of large scale data privacy breaches is now a top imperative for most companies today.
Another growing issue is Intellectual Property (IP) theft. IP refers to creations of the mind, such as inventions, literary and artistic works, and designs, symbols, names and images used in commerce, according to the World Intellectual Property Organization. IP is protected in law by patents, copyright and trademarks, enabling people to earn recognition or financial benefit from what they invent or create. The root cause for IP theft is inadequate computing encryption and data protection tools as private content continue to be accessed, disclosed, modified and/or distributed by unauthorized parties.
Thanks to the greater awareness of data protection issues and growing stringent regulatory laws like Europe’s General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA), there is now a growing interest to improve and to move ahead of today’s vulnerable legacy network security and encryption protocols. Future security and encryption technologies will adopt new authentication (verification) schemes for better personal identity protection, while other advancing technologies will use healthy AI mechanisms to power encryption systems that yield ecosystem-positive data privacy and IP rights behaviors.
These emerging technologies will have a direct and beneficial impact on global social media platforms such as Facebook, Twitter, YouTube, Instagram and LinkedIn. This future security / encryption paradigm shift will provide a private person the ability to be in more CONTROL of their data privacy and intellectual property rights.
Joseph K. Hopkins
This publication is distributed with the understanding that the author, publisher, and distributor of this publication and any linked publication are not rendering legal, accounting, or other professional advice or opinions on specific facts or matters and, accordingly, assume no liability whatsoever in connection with its use.