Nebo

Someheateddiscussionsbroke out after British political consulting firm, Cambridge Analitycaadmitted to be sourcing and using the data of approximately 50 million Facebook users. According to The Guardian’s interview with Chris Wylie, the Canadian data scientist and the ex-employee of the above-mentionedcompany, Cambridge Analitycahasviolated the law, hijackedprofiles, harvested and used the captured data in order to predict and influence Facebook users’ politicalpreferences, in order to rise the support of Donald Trumpduring US elections.

VeraJourova, the EuropeanCommissioner for Justice, plans on discussingthisissue with the American Government and Facebook representatives in order to clarify the given, ensuingcircumstances. It isdue to the European Union basic law and commonbeliefthatpersonal data protectionis the crucialkeystone of efficientdemocracy. Personallyindentifiableinformation, according to the law, are not allowed to be usedwithoutspecialconsent. European Union stronglypoints out that the privacy law is not only a writtenprinciple – itmight be perceived as a basicvalue of various modern politicalsystems.

As Christian Wigand, the EuropeanCommissionSpokespersonstates, Jourovaisgoing to be meetingboth US Government and Facebook representativesthisweek, duringhervisiting to the United States of America. The maingoal of thisappointmentis to estimate the most probablenumber of Europeancivil’s data numberleaked. In order to preventsimilarfutureviolations, the Commissioner of Justiceplans on enforcingtightenedEuropeanregulations on data protection in May, whichexactstates of development will be observed on the officialwebsite of the European Union and theirpresspublications. However, manyspecialistsadmit, thatconsidering 21st centurytechnology, successful and fullyeffective data protectionmightoccurimpossibleevenafterimposingnew, morestrictlaws.

Therefore, we mightonlyawait for the upcomingchanges in not onlyEuropeanlegislation but also in American one. However, therebegs the question: isitevenpossible to avoid data hijackingconsidering the indisputablepower of modern technology and the Internet?