Lee & White

Dedicated to Excellence

  • Home
  • About Us
  • Services
  • Blog
  • Press
  • Publications
  • News
Home > Blog
Go Back
  • House for Sale

    Wednesday, October 14, 2009

    You are in search of a house. You visit real estate agents, you drive around, you enter the World Wide Web.

    The Internet. A good place to gather as much information as you need without having to leave your home. Perfect. Let's get started.
    You begin your search using the search engines available. Hundreds and thousands of links appear on your screen giving you information about houses available for sale, for rent, and other connected information. You are pleased.

    You dig deeper - looking for the right area, for the right number of rooms, for the best price.

    Ah, you finally find a few potentials in these websites.
    You begin contacting the agent or the property owner via email or the contact form.

    You divulge your personal information such as name, email address and contact number for a viewing.

    At the same time, note that the property owner has given his personal information such as name, address of the house for sale/rent, email address and contact number on the website too.

    Basically, if you have used the website's contact form, then that website has collected your personal information. It now has both yours and the property owner's personal information.

    You wait for an answer.

    Some time later, one of the property owners contacts you - surprised that you have his contact information and asking about his house which has been sold - 2 years ago!

    Another email you receive is from the postmaster stating that the message you have sent has been delayed - the email address is probably no longer in use.

    Now think. What is the website doing with all these personal information stored? Why isn't old information being removed? Contact information and pictures of houses of property owners who have sold their houses ages ago are still advertised on the website and misleads the visitor. And through this misleading information, the website collects your personal information as well. So what is going to happen to your personal information? Are third parties getting hold of your personal information? There is no privacy statement informing you of the handling of your data. You contact the website but you receive no answer.

    The property owner is also not happy. He contacts the website for his information to be removed. Days later, he checks the website. His information is still there! Spammers happily clog his mailbox using his email address advertised on the website and he keeps getting phone calls about his sold house.

    It is a nightmare.

    Read the Full Story

    Posted by: Lee & White

    Category:

    Tags Private Persons Personal Data Spam Internet

  • Tattletale gadgetry

    Friday, August 14, 2009

    Location based servicesWe have all gotten so used to our gadgets that we are willing to sacrifice basic human rights to get our hands on them. People do not always know the value of their personal data, or value it so low that they are willing to give it up for peanuts (or a chocolate bar).

    Often it is ignorance, and we are not aware that our gadgets or services are giving away important personal data. And then there are those of us who are aware of this fact, and are counting on our provider to treat our personal data properly, or at least according to their privacy statement, which of course we check thoroughly before buying or starting to use such gadget or service.

    A few examples:
    • Mobile phone Did you know that our mobile phones are 'anonymously' tracked for a range of services?
      For example: the traffic report, which informs you of the total length of traffic jams in your country, calculates such information based on tracking of mobile phones, checking how fast the phones are moving - if at all - from point A to point B.
      The mobile phone service providers promise us that the information they gather is anonymized before use.

    • Location based services You can now surf from your mobile phone to a service such as Google Maps which calculates your position - possibly using your built in GPS receiver - to inform you of the services that are available in your immediate vicinity.
      This of course, requires that your location is sent to the service provider first.
      It was recently discovered that some of the new generation smartphones covertly sends important information back to the manufacturer on a daily basis.

    • High street store loyalty card (and other credit cards) We are lured into using these cards, because they make us feel pampered by giving us a few small perks which the other customers do not get.
      Of course, every time you use the card, the store registers what you buy, how much you buy, where, when and how often you buy.
      Using this data, they can, through data mining techniques deduce a lot of information about you and your family: if you respond properly to their campaigns, if and when you deviate from your routine (holidays?), how loyal you are to certain brands, financial information, ...
      This information is then, amongst others, used - by the store itself or third parties - for targeted campaigns.

    • Mobile Payments So convenient, we do not have to use coins anymore, or card. We can simply sms a message and the amount we want to pay for is automatically charged to our mobile phone bill.

      Think a little bit further, and you'll know who will get their hands on the personal data hovering in the chain between you and the receiver of the payment.

    I know that we cannot and should not stop technological evolution, but we need to ensure that every party involved treats personal data properly and always informs and gives the owner access to their personal data - which in the end remains their most personal property.

    Read the Full Story

    Posted by: Lee & White

    Category:

    Tags Private Persons Personal Data Internet IT

  • Permission is the key

    Tuesday, November 18, 2008

    Whilst unwanted electronic messages to natural persons are already taboo in the Netherlands, as of July 2009, spam will be completely prohibited - extending the illegality of spam to cover companies and other organisations. Indeed, this is the result of a modification to the existing Telecoms law.

    Companies or organisations continuing to spam after the 1st of July 2009 can be punished with a maximum fine of 450,000€. If spam is still sent, then a complaint is possible on the spamklacht.nl site. The OPTA (Independent Post and Telecoms Authority, the Netherlands) will be supervising compliance to the law. Only upon explicit permission to receive such electronic messages (including SMS and faxes), can these be sent to the receiving party.

    And what is the situation in Belgium?

    In Belgium, permission is the general rule, with a limited number of exceptions.

    With the Belgian E-commerce law, the opt in rule for publicity electronic messages is in effect. One can only send electronic messages for publicity purposes where there is a preceding authorisation. Also, the commercial communication, including its presentation, must be immediately recognisable to the receiving party as being such upon receipt of that communication. If this is followed, then it is technically not spam.

    However, the opt-in rule is subject to a few exceptions, making it a soft opt-in approach:

    First Exception: Own customers/clients
    The rule is exempted where the commercial communication is aimed at the organisation's own customers/clients (natural or legal persons). This exception only applies in the following conditions:

    a) The organisation has directly obtained the contact data of the person concerned in the course of a sale of a good/service. [NB: The privacy law concerning the collection of such data must be respected].

    b) The electronic contact data are exclusively used for similar products and/or services which the organisation itself provides.

    c) The organisation gives the customers (when the electronic data are collected) the possibility of objecting to the use of such data in an easy manner and free of charge.

    Second Exception: Legal persons
    The opt-in rule is exempted if the following 2 conditions are met:>

    a) If the contact data is impersonal, and

    b) If the product promoted is intended for that legal person.

    Hence, by laying down these ground rules, one can surely see that there is no room for spamming.

    So get the intended recipient's permission first if you can't resist sending that commercial communication of yours! 

    Read the Full Story

    Posted by: Lee & White

    Category:

    Tags Private Persons Personal Data Spam Organisations Internet IT

  • When Friends Sell You Out for a Date

    Wednesday, August 27, 2008

    A Belgian dating website known as nicepeople.be has been sued by its competitor, toietmoi.be for requiring anyone who registers with them to give e-mail addresses of 5 friends. These people are then spammed with invitations to join nicepeople.be. It is nice to know that your friends can sell out your e-mail addresses in exchange for a bit of fun on a dating site - NOT.

    Nevertheless, applause goes to the Belgian court for convicting nicepeople.be of sending unsolicited e-mails and spamming these third parties' inboxes. Punishing them with a 10,000 EUR fine is a good start and indeed, it is high time precedence is set for these privacy law-breaking websites and the people behind them.

    The only question is, is there any way of stopping your friends from throwing in your e-mail addresses and any other personal information to the wolves? We know that the data protection law does not cover handling of personal data in the course of household activities, but what can we truly consider as being a strictly household activity and where do we draw the line? If it were up to me, the law should apply to these friends as well.

    Read the Full Story

    Posted by: Lee & White

    Category:

    Tags Private Persons Personal Data Spam Organisations Internet

  • How your personal data is collected on a website.

    Wednesday, July 30, 2008

    The InternetWhen you surf on the Internet, and browse through a website, do you realise some of the methods by which your personal data are collected?

    Well, there are several ways:

    Personal data visibly collected on the website
    If you are aware that you are providing personal details on a website, then the website is visibly or explicitly processing personal data. To that extent, you can control the type of personal data you wish to divulge.

    Some ways in which personal data can be visibly collected include:

    Forms
    Most websites have more than one type of form, depending on the purpose of the form. Since forms are usually designed for a particular purpose, they are a good way of ensuring only relevant data is collected. At the same time, you can easily deduce and have a minimum form of control over the personal data you wish to provide - based on the fields you must fill in prior to submitting the form.

    Email forms however, may be contentious. Using an email to send the form is not a good system as it gives rise to the possibility of collecting another email address which is not disclosed by the user for some reason. For example, the sample below marks Name, Surname, Street and number, Postcode and Municipality as mandatory whilst email is amongst the optional fields.

    Online FormHence, whilst testing this form, I opted to leave out my email address. However, upon clicking SUBMIT, the message as seen below appeared and my email address would nevertheless be collected by the website despite negating to disclose it initially.

    Email
    Whether it is a mail-to function (an email link on the website) which enables you to contact the organization by clicking on the email link, or it is an email address given on the website for contact without the link, you will divulge your personal data such as your email address and name in the email you send. Postal address, phone and fax, phone calls made, faxes sent, or letters written to the organization, will also lead to personal data being divulged by you in the course of obtaining more information about the organization.

    To that extent, it does not differ from online forms on the website as the purpose is the same, and you should be informed that your personal data will/may be collected through these means as well.

    Personal data invisibly collected on the website
    This is where you are unaware of the collection - usually where a specific technology is used to perform the collection, unknown to you.

    Technology per se is advantageous, but it can unfortunately, prove to be a menace as
    well - sometimes by design, at other times by surreptitious use.

    Cookies are a common method of invisible collection and are widely used on websites. Here, it is important that you are informed of the technology used to collect your personal data. Otherwise, being unaware, you are no longer in control of your personal data and such act is a breach of privacy.

    Hopefully, this brief information on the subject will give you a hint on what to look out for before disclosing your personal data.

    For an in-depth read on the subject, please consider the Privacy Report 2006 on the compliance of Belgian non-profit organizations' and political parties' websites with regard to the processing of personal data in accordance with the Belgian Law on Privacy Protection in relation to the Processing of Personal Data, implementing European Union Directive 95/46/EC.

    Read the Full Story

    Posted by: Lee & White

    Category:

    Tags Private Persons Personal Data Organisations Internet IT

  • Spam Not

    Tuesday, May 20, 2008

    SpamAbout 75% of mail in Belgium is spam, usually associated with shady products or dodgy deals. But spam is just another word for unsolicited publicity mail - an email which you didn't ask for and which is completely useless to you or your business.

    If you are sending out emails, be it just one email or in bulk, then consider very carefully if your email is going to be useful to the recipient. The best - and only legal - way is to actually have that recipient ask for the email in the first place - the opt-in. At any time the recipient must be able to revoke his request, and stop receiving further emails - the opt-out.

    The law governing this is quite clear, the repercussions of not complying with that law aren't. In Belgium, BIPT - The Belgian Institute of Postal Services and Telecommunications - is concentrating on forcing ISPs - Internet Service Providers - to filter out unsolicited mail. BIPT confirms that they are unable to punish non-compliant ISP's. In any case, it is a useless exercise, as it only protects those companies or individuals who use the ISP's own email service. Those who use external email providers such as Gmail, Live or have their own email server are not benefiting from this.

    Companies which send out unsolicited mail are neither targeted nor punished. In practice, the best that Belgium can do is to reprimand non-complying companies.

    In the Netherlands, in a landmark case, Opta, the Dutch Independent Post and Telecoms Authority, reprimanded two companies and imposed a total of 510,000 euro fine for sending out unsolicited mail. This seems to be the highest fine ever imposed by Opta for spamming.

    Belgium can certainly learn a lesson from its fellow EU member state.

    Read the Full Story

    Posted by: Lee & White

    Category:

    Tags Personal Data Government Organisations Internet

  • What's the big deal anyway?

    Thursday, May 1, 2008

    "What's the big deal anyway?". A remark we hear very often when discussing personal data issues."Nothing to be concerned about, who would be interested in my personal data, and what can they do with it anyway?"

    Everyone agrees that a credit card number or bank account number is not something you should share (even Jeremy Clarkson eventually). But what can people do with my name and address, social security number or date of birth?

    Personal data can be used for identity theft - impersonating someone by using as much as you know about that person to get financial or other benefit in that person's name. For example you could go to a bank and request - and receive - a new credit card in the name of the person you are impersonating, with the bills of course being sent to the original person.

    How do criminals get their hands on your data? Everybody knows about skimming - a technique where a debit or credit card gets copied by attaching a small device onto an ATM machine. Another well known technique is to steal files from people's computers, by hacking them or by installing viruses or Trojan horses. And of course there is social hacking, asking seemingly harmless questions to a person online or in person, and using that information to build a complete profile.

    And criminals move with the times. A BBC team exposed, in a proof of concept, how easy it is to socially hack Facebook and harvest information on other users, including names, passwords and other information.

    How do criminals use this data? It seems that data thieves set up data supermarkets to sell stolen personal data to whomever might be interested. Yes, you can get a working credit card number for a few euro, or even buy complete corporate log files (containing names and passwords, server locations, numbers and confidential information) for as little as 200 euro. When closed down, they just reopen on another location.

    Stuff to think about. Perhaps you will consider this the next time before revealing some of your personal data to anyone.

    Read the Full Story

    Posted by: Lee & White

    Category:

    Tags Data Breach Private Persons Personal Data Organisations Internet IT

  • The privacy breach of one Dutch company

    Monday, January 14, 2008

    Dutch care insurance company, CZ, recently made the headlines as a result of a faulty online quote system. Personal information of about 55000 people with regard to past applications could be retrieved by other parties. Such information included the
    date of birth, bank numbers, social fiscal numbers, gender, name, address, post code, phone number and email address of these people. The online quote system has been removed from CZ's website.

    The blunder was first discovered by two programmers who used the system for a quote and found the leak. CZ was informed of this but five days later, the information was still accessible and this led to contact with the newspaper, Algemeen Dagblad.

    Whilst there is no proof of abuse of such personal information - or no proof yet, the fact that such a leak is happening should be sending warning bells to us. How many more websites visited are carelessly giving access to the same? How many more companies are just as negligent? This is just the privacy breach of one Dutch company - its negligence in implementing proper security measures to protect these personal information.

    Also, if you look at CZ's website, you will come to discover that the vital online privacy policy which should be available to inform visitors of CZ's privacy practice and security is lacking.

    What you should always look for when surfing on a website is its privacy policy and if you are not satisfied, do grill the organisation on it without divulging too much personal information. Use a pseudonym, or create a separate email account without using your name. Do read our previous entry Who is abusing my email? for more information on this.

    Well, just to let you know that personal information is carelessly handled everyday.

    Read the Full Story

    Posted by: Lee & White

    Category:

    Tags Private Persons Personal Data Organisations Internet IT

  • Who is abusing my email?

    Tuesday, January 8, 2008

    SpamSummary: This article will show you how to stop people abusing your email address or at least find out who did.

    You start a company, you register a domain and you get yourself a nice email address with your name in it, firstname.lastname@mydomain.com, and everything is great.

    You now have a prestigious address at your own company and as nobody knows the email address, you receive no spam.

    And then you register with a few online websites, known or not, and suddenly the spam starts to trickle in, more and more each day, until it turns into a flood that wastes your time and often contains risks such as phishing mails and viruses.

    So what can you do? You can hardly change your name or company name. Listed below are a few options:

    1. Use another email address

    There are a lot of well known free email providers such as gmail.com,yahoo.com, hotmail.com, only to name a few, where you can get a free email address to receive your registration information.

    Another option is to use a disposable email address, which saves you the hassle of having to close down your email address once you received what you needed to receive. A few of these: Mailinator, NoClickEmail, or10MinuteMail. Just Google for 'temporary email' to find more providers.

    The downside of this method is that once your free or disposable email address is closed down, critical and genuine information can be missed.

    2. Track usage of your email address

    A little known fact is that you can append information before the @ sign in your address by using the + sign.

    An example: you visit a website called spammersite.net and you are asked to register your email address.

    For this, append +spammersite.net to your name, registering firstname.lastname+spammersite.net@mydomain.com. Emails sent to that address will be received on firstname.lastname@mydomain.com, but you will be able to see the extra information in the 'to:' field, showing you who has been messing with your information.

    Note that although most providers support this, it will not work with some. Send a test mail to yourself (with the + suffix) to test if it works.

    The downside of this method is that you are not stopping spam, but at least you can learn where it came from, taking legal steps to stop them.

    If you have any questions regarding this or other articles in this blog, send an email to comments@leeandwhite.com after reviewing our Privacy Policy.

    Read the Full Story

    Posted by: Lee & White

    Category:

    Tags Personal Data Internet IT

  • 'Tis the season to be spamming - Not!

    Wednesday, December 19, 2007

    Christmas MouseIt is remarkable how far Christmas and New Year celebrations have been utilised for commercial gain. From selling ridiculous products under the pretext of Christmas gifts to spamming, Christmas has become nothing more than a time for advertising and marketing.

    So what is Christmas spamming? Well, under the guise of sending you a Christmas and New Year wish through an email, these companies are actually trying to lure you into some new product or service. Yes, it is a commercial email and in many cases, there is no opportunity to unsubscribe from such emails and you might find yourself receiving it again in the following years if you don't put a stop to it instantly. A typical message would be something like:

    "We at XABCX wish you a very Merry Christmas and a prosperous 2008!

    By the way, do check our website http://www.xabcx.com as we are having some great promotions on VVVVV...
    "

    Now, note that it is spam if you never asked or subscribed for such commercial emails. It is spam if you are not a customer of theirs and if you are a company, it is also spam if such goods/services offered are not similar to the ones in your company - meaning they are not intended for you. Oh and one more spam point. If the email is sent to your company at your personal email address, then that is spam too.

    So, do look out for such emails and please, do your bit and get them to stop spamming! Happy Christmas and a great 2008 everyone!

    Read the Full Story

    Posted by: Lee & White

    Category:

    Tags Private Persons Personal Data Organisations Internet

1    2    3   

Archive

  • 2014
    • March 2014
  • 2013
    • October 2013
    • July 2013
    • May 2013
  • 2012
    • March 2012
    • February 2012
    • January 2012
  • 2011
    • December 2011
    • July 2011
    • June 2011
    • May 2011
    • April 2011
    • February 2011
  • 2010
    • December 2010
    • September 2010
    • June 2010
    • May 2010
    • April 2010
    • February 2010
  • 2009
    • October 2009
    • August 2009
    • June 2009
    • April 2009
  • 2008
    • November 2008
    • October 2008
    • August 2008
    • July 2008
    • June 2008
    • May 2008
    • April 2008
    • March 2008
    • February 2008
    • January 2008
  • 2007
    • December 2007
    • November 2007



Tags

  • Best Practices (11)
  • Business Incentive (1)
  • Data Breach (8)
  • Data Handling Manual (5)
  • Data Protection Officer (1)
  • EU (4)
  • FSA (1)
  • Government (13)
  • Human Rights (6)
  • Internet (21)
  • IT (21)
  • Organisations (40)
  • Personal Data (48)
  • Private Persons (30)
  • Spam (4)

 

Copyright © 2003-2025 Lee & White®. All rights reserved.

Legal Notice  -  Privacy Policy  -  Contact