ALGORITHM OF USER’S PERSONAL DATA PROTECTION AGAINST DATA LEAKS IN WINDOWS 10 OS
Olexander Zadreyko
zadereyko@onua.edu.uaNational University “Odessa Law Academy”, Department of Information technology, Odessa (Ukraine)
http://orcid.org/0000-0003-0497-9861
Olena Trofymenko
National University “Odessa Law Academy”, Department of Information technology, Odessa (Ukraine)
http://orcid.org/0000-0001-7626-0886
Nataliia Loginova
National University “Odessa Law Academy”, Department of Information technology, Odessa (Ukraine)
http://orcid.org/0000-0002-9475-6188
Abstract
In the European Union, in the first half of 2018, the General Data Protection Regulation came into force, which established the new rules for processing users’ personal data for IT companies. The operating systems (OS) are the dominant software that is responsible for collecting and processing data in computer systems. The most common OS is the Windows OS family. The authors identified Windows 10 operating systems, that collect and accumulate user's personal data; developed and tested practically an algorithm, the application of which localizes and blocks the transfer of user's personal data to official servers of the Microsoft company.
Keywords:
Windows 10, personal data collection, personal data leakage, operating system, operating system telemetry, personal data protectionReferences
Analýza Windows 10: Ve svém principu jde o pouhý terminál na sběr informací o uživateli, jeho prstech, očích a hlasu! URL: https://aeronet.cz/news/analyza-windows-10-ve-svem-principu-jde-o-pouhy-terminal-na-sber-informaci-o-uzivateli-jeho-prstech-ocich-a-hlasu. (Available: 29.09.2018).
Google Scholar
ARTICLE 29 Data Protection Working Party. https. URL: http://autoriteitpersoonsgegevens.nl/sites/default/files/atoms/files/20160112_microsoft_privacy_policy_letterpdf_0.pdf. (Available: 29.09.2018).
Google Scholar
Loginova N., Trofimenko E., Zadereyko O., Chanyshev R.: Program-Technical Aspects of Encryption Protection of Users' Data. XIIIth 2016 International Conference Modern Problems of Radio Engineering, Telecommunications, and Computer Science. Lviv 2016, 443–445.
Google Scholar
Microsoft denies Windows 8 app spying via SmartScreen. URL: https://www.theregister.co.uk/2012/08/25/windows8_smartscreen_spying/. (Available: 29.09.2018).
Google Scholar
Microsoft Monday: Leaked Windows 10 Changes, Cortana Suggested Reminders, Visual Studio 2017 Details. URL: https://www.forbes.com/sites/amitchowdhry/2017/02/13/microsoft-monday-leaked-windows-10-changes-cortana-suggested-reminders-visual-studio-2017-details/#156efd7d2dda. (Available: 29.09.2018).
Google Scholar
Microsoft Patents Big Brother AI To Monitor Everything You Do In Windows And Feed It To Bing For Search Results. URL: https://hothardware.com/news/microsoft-patents-big-brother-ai-to-monitor-everything-you-do-in-windows. (Available: 29.09.2018).
Google Scholar
Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016. URL: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX: 32016R0679#ntr4-L_2016119EN.01000101-E0004. (Available: 29.09.2018).
Google Scholar
Tools to tweak Windows 10 Privacy settings and fix privacy issues. URL: https://www.thewindowsclub.com/tools-tweak-privacy-settings-windows-10. (Available: 29.09.2018).
Google Scholar
Top 10 Reasons for Computer Freezing. URL: https://www.stellarinfo.com/blog/top-10-reasons-computer-freezing/. (Available: 29.09.2018).
Google Scholar
Veracrypt. URL: https://www.veracrypt.fr/. (Available: 29.09.2018).
Google Scholar
What Is a Firewall? URL: https://www.cisco.com/c/en/us/products/security/firewalls/what-is-a-firewall.html. (Available: 29.09.2018).
Google Scholar
What is a portable app? URL: https://portableapps.com/about/what_is_a_portable_app. (Available: 29.09.2018).
Google Scholar
Windows 10: Microsoft under attack over privacy. URL: https://www.theguardian.com/technology/2015/jul/31/windows-10-microsoft-faces-criticism-over-privacy-default-settings. (Available: 29.09.2018).
Google Scholar
Authors
Olexander Zadreykozadereyko@onua.edu.ua
National University “Odessa Law Academy”, Department of Information technology, Odessa Ukraine
http://orcid.org/0000-0003-0497-9861
Authors
Olena TrofymenkoNational University “Odessa Law Academy”, Department of Information technology, Odessa Ukraine
http://orcid.org/0000-0001-7626-0886
Authors
Nataliia LoginovaNational University “Odessa Law Academy”, Department of Information technology, Odessa Ukraine
http://orcid.org/0000-0002-9475-6188
Statistics
Abstract views: 325PDF downloads: 198
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.