1.432.520.3539
Toll Free 1.844.520.3539

 

 

Flexnet Networks LLC

Flexnet Networks LLC has been serving the Midland area since 2010, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What Would Happen if All Data Was Publically Available?

What Would Happen if All Data Was Publically Available?

What if I were to tell you that, by the time you finished reading this sentence, all personal data in existence was exposed? If every text sent, every Google search executed, every website visited, everything we had ever done online, was made public? Gizmodo recently reached out to an assortment of experts for their insights. Here, we’ve assembled their responses for you to consider.

Expectation: Short-Lived Outrage, Long-Term Adjustment

One hypothesis essentially boils down the aftermath of such an event down to these two environments. Let’s consider what could be safely anticipated as immediate results of a complete loss of data privacy:

  • Widespread firings
  • Widespread marital issues and divorces
  • Widespread lawsuits and arrests
  • Widespread shaming

However, it is important that we also consider what is known as the Privacy Paradox, or the tendency that people exhibit to quickly adapt to revealed secrets. While there would certainly be a period characterized by outrage and general shellshock, this would quickly be adopted as the new status quo. In the long term, many of these hidden actions and behaviors may grow to be more socially acceptable, as it would be made clear how many people actively participated in them.

Basically, we would collectively grow tired of scandal, and victimless behaviors that are now taboo would become more acceptable as it was revealed how many people actually partake in them.

This acceptance, of course, wouldn’t be an all-encompassing rule. There are plenty of behaviors that are frowned upon despite their prevalence, like lying. However, many shameful secrets would become less of a burden once people knew how many others shared that shame.

It is also important to consider whose data we would collectively be most interested in reviewing. While we might assume that most people would look to dig up dirt on those around them, it is far more likely that the first step most would take would be to look themselves up to find out what other people will soon learn. Most people experience what is known as a positivity bias about the other people they care for and wouldn’t risk that bias being disproven without some serious consideration and emotional fortification.

Expectation: Increased Wealth Disparity

Another theory dove more into the influence that such a shift would have on the business landscape. Defining a secret as nothing more than intentional “information asymmetry” (a situation where one person knows more than the other), the idea here is that every human interaction relies on some level of information asymmetry. While these asymmetries can be used to cause harm, most of their use comes in the form of relationship management. In other words, our ability to keep information to ourselves is beneficial to our relationships.

As this pertains to business, consider what would happen if there was no such thing as a trade secret from this point on. Right now, the very concept of a trade secret allows new businesses to be created and grow, disrupting the status quo and carving out their own piece of the market. Without these secrets, however (and remember, all secrets are now exposed) existing corporations and large businesses could latch onto these innovative ideas and develop them more quickly.

The result: big businesses get bigger, rich people get richer. Not ideal for society, as history has shown.

Expectation: Complete Societal Reset in Three Parts

Yet another prediction incorporates a few phases into describing the overall impact of such a data dump. First and foremost (and most predictably), there would likely be chaos. This is dependent upon how all information was presented. If it was all in a single file… good luck. If it were somehow searchable, the massive influx of queries would likely result in a huge Denial-of-Service incident. The searches that are successful would likely have some tragic consequences.

Secondly, any systems that rely on secrecy and privacy would shut down to avoid a massive influx of abusive behaviors. The financial systems we have in place would have to freeze immediately, and modern voting systems would be nullified.

Third, everyone on Earth would have to adapt to the knowledge that was shared, and deal with the resulting consequences as best they could. Any information that can be made invalid, like passwords, should be changed, and others (infidelities and the like) would have to be processed.

This would all be influenced by the likelihood of a repeat incident. If it could repeat, new security protocols would need to be devised, and society would likely see some fundamental changes in response. Otherwise, life would continue, with a few hurdles as new tidbits from the disclosure came to light.

Expectation: Unification

Finally, another theory posited that—contrary to what might be assumed—complete disclosure would ultimately bring people closer together. In many ways, this theory is like the one we reviewed first. This one just skips over the outrage.

In a way, this makes sense. After all, if you were suddenly made aware that someone in your life had x, y, and z secrets, while your secrets q, r, and s were revealed at the same time, the social balance wouldn’t likely shift all that much. Furthermore, these secrets being exposed could ultimately help to resolve many of them. The endgame here would be an increase in common ground between people.

The Importance of Secrets Today

Of course, because we still have personal data, it is important that you do everything you can to protect that which your business has collected from its clients and staff. Flexnet Networks LLC is here to help you implement the security solutions and best practices that help to prevent you becoming the cause of a data leak.

To learn more about what we can do, give our team a call at 1.432.520.3539 (or toll free 1.844.520.3539).

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 29 September 2020
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Hackers Privacy Business Computing Cloud Network Security Internet Software Google Microsoft User Tips Innovation Efficiency Business Hardware Computer Malware Hosted Solutions Email Data Communication Workplace Tips Backup Business Management Mobile Devices Windows 10 Android Smartphones Smartphone Miscellaneous IT Services Productivity Small Business Cybersecurity VoIP Upgrade Disaster Recovery Windows 10 Tech Term Windows IT Support Browser Office 365 Data Backup Outsourced IT Apps communications Collaboration Gadgets Business Continuity Data Recovery Phishing Users Cloud Computing Virtualization Microsoft Office Internet of Things Holiday Employer-Employee Relationship Operating System Ransomware Health Passwords Network Mobile Device Management Automation Information Cybercrime Saving Money Managed IT Services Facebook Best Practice Chrome Quick Tips IT Support Server Wireless Data Security Office Covid-19 Law Enforcement Social Media Managed Service Provider Application Mobile Computing Managed IT Services Spam Bandwidth Data Management Two-factor Authentication Artificial Intelligence Mobility Information Technology Password Managed Service Money Battery Alert Mobile Device Blockchain Gmail Networking Office Tips OneNote Wi-Fi Social Telephone Systems Unsupported Software Vulnerability Shortcut The Internet of Things Antivirus Hacking Retail Managed IT Conferencing Computers Government App Google Drive Applications Risk Management Update Mobile Office Cost Management Save Money Remote Computing Settings Going Green Tech Support Bring Your Own Device Project Management History Recovery Firewall Marketing Printing Meetings Word Unified Threat Management Telephony Access Control Apple Education Patch Management Social Engineering BDR Lithium-ion battery Identity Theft Entertainment Data Storage Windows 7 Router Current Events Humor Human Resources Wireless Technology Big Data Tablet Augmented Reality Work/Life Balance Phone System User Error Excel Business Intelligence HIPAA Proactive IT Search Personal Information BYOD USB Budget Politics Hosted Solution Data Breach Encryption End of Support Disaster DDoS Evernote Hard Drive Instant Messaging Payment Cards Paperless Office Business Technology Internet Exlporer Benefits Data Protection SaaS Hybrid Cloud Private Cloud eWaste Remote Legal IT Management Audit Television Flexibility VPN Google Assistant Scam Automobile Commerce Streaming Media PowerPoint Analytics Touchscreen Storage Cleaning Managing Stress Emails Customer Service Data Loss Saving Time WiFi Devices Remote Workers Management Vendor Management Google Docs Sports Display Save Time Samsung Computer Accessories Software as a Service iPhone Mobile Security Hacker HaaS Training Fraud Virtual Reality File Sharing Voice over Internet Protocol Printer Wireless Charging IT solutions Keyboard Vendor Cortana Computer Care Biometrics Avoiding Downtime Travel PC Employee-Employer Relationship Experience IT consulting Legislation Video Conferencing Processor Chromecast HBO Holidays Wasting Time Science Transportation User Near Field Communication SharePoint Tablets Internet Service Provider Bloatware Remote Monitoring Network Congestion Music Advertising Distributed Denial of Service Comparison Organization Video Games Workers Benchmarks Administrator Copiers Accessory Chromebook Smart Technology Best Available IT budget Teamwork NFL Employee iOS Smartwatch Testing Books PDF Specifications Updates Myths Access Inventory Peripheral Upgrades Amazon Point of Sale Workstation Break/Fix Server Maintenance Camera Proactive Electronic Medical Records Text Messaging Sales Innovations Microsoft Word Threats Branding WIndows Server 2008 Hosted Desktop Hard Drives Consultant Virtual Assistant Identities Reputation Windows Ink Telework Medical IT Computer Fan Remote Working Investment Projects Websites Safety WIndows 7 Administration Scalability Uninterrupted Power Supply Maintenance Scams Data storage Smart Devices Admin Value Employer Employee Relationship Alexa for Business Language Google Maps Audits 5G WannaCry ROI Printers Data Theft Regulations Gifts How To Presentation Device Security Virtual Private Network Outlook Troubleshooting Keyboard Shortcuts Webinar Computer Forensics Wearable Technology Solutions YouTube Nanotechnology Trending Credit Cards Windows Server 2008 R2 Computing Sync CRM Payroll IT solutions Customer Relationship Management Root Cause Analysis Compliance Worker Commute Virus Relocation Running Cable PCI DSS Employees FAQ Screen Mirroring App store Spyware Managed IT Service Laptop Bluetooth AI Security Cameras Windows 10s Wireless Internet Microsoft Excel Regulations Compliance OneDrive Charger Development Cast Co-Managed Services Cameras Black Market Managed Services Provider Touchpad Fax Server Adobe Machine Learning Solid State Drive Gamification Policy Micrsosoft Files eCommerce Telephone Identity Company Culture Edge Facebook Privacy Robot Licensing Remote Work Downtime Hard Disk Drive Memory Mouse Procedure Sabotage Printer Server Digital Signage Fiber Optics Hyperlink intranet Data Privacy Hiring/Firing Ciminal Net Neutrality E-Commerce Financial

Mobile? Grab this Article!

QR-Code

Recent Comments

tim Collaboration Spans Multiple Apps
30 July 2020
This has been a standard for some time now.