Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementLogical SecurityCybersecurity News

Online privacy has mostly vanished in the US

By Robert R. Ackerman Jr.
data privacy
May 11, 2022

Hard as it may be to believe in today’s internet-obsessed world — one in which hackers, companies and even the government feast on a smorgasbord of data about almost everybody — there was a time when privacy in America was king. One of many examples was a national brouhaha in the mid-1960s that attracted an avalanche of attention.

Back then, as part of his “Great Society” program, President Lyndon Johnson wanted to implement a network of social programs to combat poverty and other social ills. He knew he needed socioeconomic statistics to spotlight these problems and help determine how to address them, so he proposed a National Data Bank to collect and process this data efficiently.

The response was enormous backlash. A prominent University of Michigan law professor warned that a computerized national data bank could become a monstrous “Big Brother” with a non-stop appetite for snooping. The New York Times called it “an Orwellian threat to privacy,” and other newspapers said much the same thing.

Ultimately, the Great Society program came to be, but it was run without the help of the National Data Bank. That was deep-sixed.

Today, things are completely different. Everything is online, and privacy virtually no longer exists on the internet. Supporters of the National Data Bank decades ago would have been dumbfounded today by the explosion of personal data that rests with 21st century technology giants.

Sad to say, the American public knows that personal data is no longer secure and that, in fact, data collection probably poses more risks than benefits. A survey by Pew Research has found that a majority of Americans believe their online activities, in particular, are often being tracked and monitored by companies and the government. Six in 10 American adults told Pew they don’t think it’s possible not to have data collected about them.

The survey also noted that more than 80% of the public says that the potential risks they face because of data collection by companies outweigh the benefits.

The COVID-19 pandemic has made things even worse, initially encouraging most Americans to stay at home and adding tens of millions of remote workers. Almost every need relied on internet access. Food came from supermarket and restaurant delivery services. Purchases of almost everything else occurred on online shopping platforms. Zoom replaced in-person discussions and even attendance at weddings and funerals.

While online attacks soared, attempts to enact federal legislation to protect digital privacy were derailed, initially because of the pandemic itself and today because of politicization over how the internet should be regulated.

In fairness, it’s important to note that the internet was born as an open research tool — one never designed to provide security or privacy. Although it still has a long way to go, security has substantially improved over the years.

Privacy, however, has gotten worse. Most companies understood that users wanted their data to remain private. The meaning of privacy, however, became murky and divergent.

The lack of privacy on the internet has been a problem for a long time, but it likely became worse after two breaches of Yahoo in 2013 and 2014 were unearthed in 2016. The privacy of all 3 billion Yahoo users at the time was compromised. Fueling the privacy fire a couple of years thereafter was another large privacy breach of Marriott Corporation, impacting 500 million hotel guests. There have subsequently been a number of other sizable privacy breaches, including several at T-Mobile.

Those offended by the dearth of online privacy no doubt applaud Apple for an operating software update requiring that app developers explicitly ask for permission to track user behavior. This has particularly hurt Facebook, which heretofore relied on technology that expressly tracked users.

Unfortunately, however, this development has been more the exception than the rule. In just one example, ubiquitous cookies — small text files that websites store on computers to uniquely identify their users — remain a substantial headache. They do make the workings of websites more proficient. But there has also been an explosion of “tracking” cookies that collect personal data on behalf of a site.

Fortunately, prospects on the privacy front aren’t altogether bleak. One bright spot is the growth of so-called privacy-enhancing technologies (PETs) — a broad range of hardware and software solutions designed to extract the value of data without risking its privacy and security. One PET example is the budding growth of homomorphic encryption, which secures data while it is being processed or used. Gartner, the prominent information technology research firm, highlighted PETs as one of its top strategic technology trends in 2021 and again in 2022. It says half of large organizations will implement PETs by 2025.

Another mildly upbeat development lies on the legal front. Most states haven’t addressed the federal government’s limited adoption of privacy laws, but at least three have done just that in recent years — California, Virginia and Colorado. Companies operating in these states must inform customers if they’re selling their data and give users the right to delete it. In California, in addition, users can sue a company against certain types of data breaches.

Much obviously remains to be accomplished, and users need to play a role. When apps and websites often ask them for multiple privacy permissions the first time around, most passively provide them to avoid complications. If would be much better for all internet users, not just them, if they were far more selective.

KEYWORDS: COVID-19 cyber attack cyber security threat data breach data privacy privacy legislation

Share This Story

Bob ackerman

Robert R. Ackerman Jr. is founder and managing director of AllegisCyber Capital and co-founder of cyber startup foundry DataTribe. He was the first investor to create a venture fund focused exclusively on cybersecurity and data science and has been investing in cybersecurity for more than 15 years in the U.S. and select international markets. 

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing