Laws

So what’s in my internet log files?

It’s a fair question that anyone who wants to protect their privacy should be asking. What’s in my Internet Log files and who can access them? Well I’m afraid, and you’re not going to like this, is just about everything you do online is stored in logs files.

In fact even just the phrase internet log files is confusing as there are so many of them.   Let’s focus on the main ones which contain the most information about you online and that’s the ISP logs.

You see when you connect to the internet every thing you do is routed through your ISP, they have a complete record of everything you do pretty much. One of the main problems is that we use HTTP to surf the internet, that’s Hyper Text Transport Protocol – which has helped the internet to develop so amazingly fast.

There is a problem with HTTP though, and that is because it is in completely clear text. So anyone who has access to this data like the ISP can instantly read it and see exactly what and where you go on the internet.

It’s why Governments and organisations access this information when searching for terrorists, criminals and even just people who downloaded materials under copyright.  It’s all there in the internet log files stored at your local ISP.  There’s no technical knowledge needed to learn how to view .log files as the vast majority of it’s in clear text with no encryption.  It’a all recorded at that central point simply because all your data has to go through an ISP, which is recorded and saved to the .log file extension of their choice.

Internet Log files

Who Has the Right to Access My Internet Log Files ?

You might argue that any law abiding individual has nothing to fear from having their online activity recorded.  After all normal citizens shouldn’t care even if they are engaged in a little anonymous torrenting to download a few films, that’s nothing to the Government is it? However just consider how much information there actually is stored there in those log files.  Everything web site you visit, every video you watch, every message you send or receive it’s all there in your log files.   Would you be happy to hand over a comprehensive list of everything you’ve done online?   It’s a huge intrusion to your privacy, imagine a step further one made likely by the Governments latest piece of snooping legislation – the Investigatory Powers Act.  It’s been passed in Parliament but hasn’t got Royal Assent yet, but it’s likely to become law in the near future.  It would mean a whole host of Government agencies have access to these records for a variety of reasons.

Imagine you’re sitting in an interview for a Government job?  Across the table the interviewer sits with a booklet containing every web site you’ve visited in the last 12 months.  How would that make you feel?  Does this feel like an open, democratic situation or something like the KGB or Stasi would have done?   Perhaps you have medical conditions, something about your health or sexuality, perhaps private political affiliations.  All this is likely to be known from anyone’s web history and hence the person sitting across from you with your internet log files.

Even if this information was restricted to a select few agencies, we know this would spread.  The data once out would get into more and more hands, usually under some pretext of criminality or preventing terrorism.

The solution is actually quite simple but it does require some effort – encryption.  If you use a VPN service, you can encrypt your connection so that your logs contain no useful information. Here’s one in action –

The only information accessible in your logs as long as you keep encryption enabled will be the time you are online and the IP address of the VPN server you’re connected to. there will be no other data that is legible as it will all be encrypted and no record of the web servers you visit as all requests will be channeled through the VPN server. The added benefit of this is that you can also use the VPN service to bypass the myriad internet blocks that exist online.

For example, you may have found that certain sites particularly media companies block access based on your location. It’s called region locking or geo-targeting and it’s becoming increasingly common. For example if you try and access your Hulu subscription from outside the US you’ll get blocked, or similarly if you try and watch the BBC iPlayer from outside the UK. However if you switch to a VPN server in the correct country you can bypass these blocks irrespective of your location. I use mine every single day when travelling to watch the BBC News when I’m travelling.

The 4th Amendment and our Expectation of Privacy

The 4th amendment insists on ” The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”
The expectation of privacy includes no seizure without a warrant, provides the foundation for businesses, and is the reason why the Privacy Act was created. Let’s continue on this journey and see how privacy has impacted our society.

The 4th Amendment states that their should be no violation without probable cause. No one should be forced to give up their privacy unless a situation and a warrant are issued. This is important to ensure that people are not forced to give up private information. It states that only if there is probable cause and a warrant is issued, private information shall remain private. Now that we have covered what the 4th amendment stands for we can discuss how business is conducted under this amendment.

Businesses are required to follow the 4th Amendment. When you are hired for a position with a business or company, they cannot violate your privacy unless they have probable cause. If your boss has probable cause they can have you prosecuted or fired, but they cannot violate your privacy. The 4th amendment also protects the privacy of the business, only needing to share information with employees on a need to know basis. Now that we have covered the 4th Amendments influence on businesses, we can begin to understand why the Privacy Act was created.

The expectation of privacy goes past the 4th Amendment today and lies in every household in America. Most people are unfamiliar with the 4th Amendment or only think about it on an authority level. The 4th Amendment is the reason why the Privacy Protection Act was created and reinforced today. People want their information protected and they want to feel safe especially on the internet. Today, consequences are paid for any breech in the expectation of privacy thus, instilling the basic foundation of the 4th amendment in today’s society.

Most people we’re simply unaware that the 4th amendment influenced the creation of todays Privacy Act. The expectation of privacy includes no seizure without a warrant, provides the foundation for businesses, and is the reason why the Privacy Act was created. The next time you think of the Privacy Protection Act, remember that our forefathers set it up in the 4th Amendment in the Constitution of United States.

Discover How California’s Privacy Protection Laws Can Affect Businesses In Your State?

If you are looking to fully understand how privacy laws can affect you, you need to understand California’s Privacy Laws. California’s privacy laws are listed in the state constitution, mandatory to report any breeches in security, and all states must comply in regards to business transactions. Let’s explore the importance California has made in today’s Privacy Act.

In the state of California, privacy laws have become a state wide enforcement, protecting its residents from identity theft. California has gone above the other 49 states in the union by integrating its own privacy laws in its state constitution. This state has become the leader when enforcing the privacy rights of all individuals involved. California hopes that one day every state will get involved in protecting individuals on the same level. Once you understand the high standards California has with privacy issues, you will begin to see why this state has such a low tolerance for identity theft.

How does California manage to enforce its privacy law throughout the entire state? What makes this state stand out from the other states with their implemented privacy laws? California has a no tolerance policy to anyone who breeches the privacy protection act. Any business caught violating these laws has to make a press release explaining the violations that occurred. Now that we have covered California’s policy on breech of privacy, we can continue on the individual rights of the California resident.

The Privacy Protection Act covers all residents and businesses in all 50 states in the United States. California has just taken extra precautions to ensure that all residents in the state are protected, even from businesses in other states. Privacy protection of all California’s residents requires that all businesses residing outside the states boundaries follow the same California law when involving sales to its residents. Meaning, that if a business in Ohio breeches the California Privacy Protection Act, then then that business could suffer consequences in California’s state court. All businesses, regardless of what state they reside in, should fully understand California’s Privacy Protection Laws, to prevent any future law suits.

Did you know that much about California’s Privacy Protection Laws? California’s privacy laws are listed in the state constitution, mandatory to report any breeches in security, and all states must comply in regards to business transactions. So next time you conduct business with California, remember that you are bound, and protected, by California’s Privacy Laws.