Skip to main content
Are cookies harming your privacy?






Internet users consider that their activities on the Internet are being monitored almost every day for different reasons. Sometimes, the ads of a product that we've looked for via search engine on the previous day show up the next day and we are surprised by the suggestions offered by the internet sites as if they know us better than us. Moreover, there are even those who claim that the issues spoken during any conversation are shown as advertisements on the Internet in some ways. However, we continue to use the Internet sites without paying attention to what is written in the small boxes that we face when we first enter them. These small boxes often contain details about how our information and activities are collected and used through cookies, so that we can make better use of the websites.
Cookies are small text files with the .txt extension stored on the users' devices through the users' browsers, as opposed to a computer program that is actually believed. Contrary to what many people think, they cannot access other data stored on the hard disks of these devices when placed on a computer or mobile device.
It is useful to give an insight about the purposes and types of cookies to answer this question. Cookies may be used for a variety of purposes including the ability to continue with the information of the last page on a website, to remember our login information such as the user name and password and preferences and to present content and ads in line with our interests and needs. Different types of cookies are used to achieve these purposes.
There are two types of cookies with regards to retention period: session cookies and persistent cookies. A session cookie is stored in temporary memory and is not retained after the browser is closed. As we will explain below, the type of cookie required to provide instantly expected benefit from the website is basically these session cookies. For example, the cookies that keep your information until the session is closed on the websites providing online banking services are session cookies. As to persistent cookies, they remain in the devices until they are deleted from the browser by users or until they expire. Persistent cookies are used for provision of customized content and collection of statistical data about user's website activity.

Although there is no specific provision regarding the data processed by the cookies in the Law on the Protection of Personal Data (Law), this issue may be interpreted in the light of the European Union personal data legislation. It might be said that the data obtained by the cookies are considered as personal data to the extent that the relevant data allows to identify the natural person taking into account the General Data Protection Regulation (GDPR) and the Directive 2002/58/EC on privacy in electronic communications (e-Privacy Directive). While the e-Privacy Directive, which applies to any type of cookies whether it processes personal data or not, is always one of the main sources; GDPR also should be considered in case the cookies process personal data. Since there is no specific legislation subject to the cookies in Turkey, the important point is whether the relevant cookie is collecting personal data. Therefore, companies or individuals who provide services through an online platform and use cookies and/or thirdparty interactions such as extension/button in this platform, should evaluate in detail the information gathered by the cookies used and should obtain the consent of the related persons if they use the cookies collecting personal data. Otherwise, relevant companies or individuals would be faced with allegations that no consent has been obtained for processing of personal data.

Comments

  1. Good going Aanchal, you've got this :D

    ReplyDelete
  2. This comment has been removed by the author.

    ReplyDelete
  3. Great piece of work... Thnks fr knowledge

    ReplyDelete
  4. Actually helpful content... Provided good understanding without complicating the mattet!

    ReplyDelete
  5. Nice info 👍 i guess we all know it already because of Zuckerberg case last to last year ...and people who are watching black mirror or living in China 😂

    ReplyDelete
  6. Great info. Keep up the good work.

    ReplyDelete
  7. Very Helpful yrr I don’t this before reading this article. Thanks for the information and Keep it up❤️

    ReplyDelete
  8. THIS IS A IMPORTANT POINT WHICH YOU WROTE , AS MANY SMARTPHONE USER ARE UNAWARE ABOUT THESE FACT

    ReplyDelete

Post a Comment

Popular posts from this blog

TOP 10 CYBERSECURITY COURSES IN INDIA 1. Master Certificate in Cyber Security (Red Team) – Jigsaw Academy with HackerU Jigsaw_Cyber-Securit Jigsaw Academy is a global award-winning training provider headquartered in Bengaluru, India. Founded by the duo of Gaurav Vohra and Sarita Digumarti, Jigsaw Academy has been instrumental in shaping the careers of over 50,000 learners in 30+ countries by helping them build a successful career in emerging technologies with specialised industry oriented courses. The domain experts and educators at Jigsaw Academy offer meticulously structured courses with industry-relevant curricula. Jigsaw Academy trains professionals in the areas of analytics, data science, big data, machine learning, business analytics, and more recently, cybersecurity and cloud computing. W3Schools Flagship Cybersecurity Program: Jigsaw Academy’s Master Certificate in Cyber Security (Red Team) in association with HackerU Duration Of The Program: 600 Hours (20 Hours of
Ways to secure yourself from cyber crime  1) Education - Hackers aren’t the only ones who can gain power from information. By educating yourself about the types of scams that exist on the Internet and how to avert them, you are putting yourself one step ahead of the cybercriminals. Since phishing is prevalent, read up on the latest phishing scams and learn how to recognize a phishing attempt. Remember, phishing is when hackers attempt to lure you into revealing personal information by pretending to be a legitimate organization or person. These scams often play off major new stories, so keep informed on the latest news-related scams. 2) Use a firewall - Firewalls monitor traffic between your computer or network and the Internet and serve as a great first line of defense when it comes to keeping intruders out. Make sure to use the firewall that comes with your security software. And if you have a home wireless network, enable the firewall that comes with your router. 3) Cli
Who are cyber criminals and why do they do it?  We talk a great length about cyber crime. From trends in phishing to exploits to cyber security threats and so much in between. But we don’t often think about who is committing the cyber crime and what motivates them. The motivations for cyber criminals can be quite simple. The two that make up the huge majority are money and information. According to a Verizon Enterprise report, financial and espionage-driven motivation make up a full 93% of motivation for attacks. Aside from that, the less-frequent but broader set of motives is often categorized as  “FIG” (Fun, Ideology, and Grudges). The core motives can vary depending on what the cyber criminal is after, whether they are executing the attacks of their own initiative or if they’ve been contracted to do so, and who might benefit in what way from a successful cyber crime. This variety can be illustrated as follows: Money This can be the motive for many types of attacks,