Skip to Main Content

Digital Tools

Core concepts

Internet Privacy

Digital tools have opened a world of possibilities to every individual with a desire to augment his or her natural potentials; one can now work smarter and faster. Having said this, we cannot loose sight of the fact that cloud-based platforms as well as downloadable applications and programs are products produced by programmers, technology entrepreneurs, companies and institutions. This means that we operate within an environment, the digital sphere, that requires our trust vis-à-vis our service providers; we enter into business agreements when we accept perks of the provided services. In return, we give these platforms access to our personal information.

It is important to acknowledge the fact that there are good and bad actors; every day, individuals and institutions make decisions about where they will situate themselves with respect to ethics related to digital tools. Our society and civilization do a good job in making sure that service providers are held accountable to their users. Canada's Personal Information Protection and Electronic Documents Act (PIPEDA), the PROTECT IP Act (PIPA), the Freedom of Information and Protection of Privacy Act (FIPPA), the Access to Information and Protection of Privacy Office (ATIPPA), the Personal Health Information Protection Act (PHIPA), and the European Union's General Data Protection Regulation (GDPR) are policies that ensure that established and clear rules protect Internet users.

Technology environment

The Internet is a system of interconnected networks that enclose an ocean of information and information sharing tools. It has a particular structure, one that is like a labyrinth. It is possible to guarantee personal privacy through security controls and encryption. Because of its intangible nature, the cost of criminal activities is minimal compared to the benefits one gets when committing cyber-theft. Nowadays, cybersecurity experts tend to be busier than professionals working in an analog environment similar to theirs. Accidents occur. For this reason, making the Internet safe is a long lasting job that requires a team effort. Critics and advocates of the digital economy contribute in conversations that allow technologists to make the Internet safer for everyone. The digital environment, like its analog counterpart, is a realm in which various types of entities interact. It is a virtual domain powered by natural beings who have an imperfect essence.

Personal information, also known as personal data or sensitive personal information, refers to any information that can be used in order to help identify a particular individual.

Personal information includes:

  • Personally Identifiable Information (social security number, contact information, birth date, etc)
  • Financial Information (bank accounts, investment details, etc.)
  • Health Information (details on health conditions, prescription drugs, treatments and medical records)
  • Intellectual Property (your academic research results and other manuscripts)
  • Legal Information (Affidavit of Residence, Child Medical Consent, Cohabitation Agreement, etc.)

Digital footprints

Digital footprints are the data that Internet users create when they perform actions online (i.e. sending an email, actively providing personal information to their service providers and visiting websites).

There are two kinds of digital footprints: passive and active. The first type is generated unintentionally and automatically; they are records of one's activities online (i.e. websites you visit, emails you send, etc.). The second type is intentionally produced; they are produced when one performs activities such as publishing a blog and updating social media accounts with quotes, pictures and personal thoughts.

The main point to remember is that, in the long run and because you have control only over a parcel of all the digital footprints you create, it pays to demonstrate civility at all times; the Internet, like civil society, is a shared sphere. This was true yesterday, it is true today, and it will remain as such tomorrow.

Digital assistants

Digital assistants are configured in a way that allows them to launch actions when they hear keywords and go to sleep right after each task or command is completed. In order to do what they are asked for, they listen to natural sounds. To improve their systems, these platforms record interactions between users and their digital assistants. This helps to measure success rates and learn about areas that require improvements. Service providers guarantees that they don't listen to their users' naturally produced sounds when digital assistants are not performing requested tasks or when keywords are not uttered. This is the stated agreement between users and their service providers. One can opt-out of certain features built-in into these systems. Digital assistants contribute in your digital footprints.

Smart Devices

Smart devices like digital assistants need to receive commands before they start listing and recording interactions. Smart devices include doorbell cameras, smart thermostats or any other Internet-connected devices that require interactions between the analog and the digital environments. It is important to use trusted digital tools for your own peace of mind.

Smart devices contribute in your digital footprints.

Virtual private network (VPN)

Virtual private network (VPN) is a technology that allows users to extend a private network and, by the same token, remotely access it as if they were physically present where the private network has been establish. A VPN is nothing more than the extension of a private network across a public network. It allows users to interact with data as if their computing devices were directly connected to the private network. VPNs use encryption and other security features, which allow users to access their private networks via a public one; it's a shield against an unwanted or unintended audience.

Let's illustrate this technique
Currently, to access University of Ottawa Library's databases, resources available in a private network, you can simply connect to the university's network through one of its high-speed Internet and network connections. When you click on an online resource (a book, an article, etc.), the full document appears on your screen via a pdf or any other available format. By physically being at a uO location, the system recognized your IP's type of connection and grants you access to requested items.

Your location matters

If you are not at one of the Saint Paul University or University of Ottawa locations, you can use a VPN or an off-campus access. VPN will virtually grant a remote access to a uO network as if you were physically located at a uO location. An off-campus access is a log in type of access where the system recognizes your credentials and account information, and grants you access to its resources. Only a VPN will give you full privacy when you interact with data from a private network, and this through a public one.

Click HERE for additional information on VPNs.

Cisco AnyConnect is a trusted VPN service provider. It is recommended to pay a particular attention into details about where your data will transit before they are delivered to you via your computer devices. For obvious reasons, it is best to use trusted VPN service providers.