Privacy Protection Rights for Business and How They Are Effected

675 Words3 Pages
Switzerland is a neutral country with a long history of privacy protection. This, coupled with the political stability of the country and its high technological level, are providing the ideal conditions to develop a company focused on protecting the communications of its customers. Marketing-wise all those points can be summed to gain an edge over the competition. Switzerland is also offering clear legal bases that should guarantee the possibility of running the planned business without issues.
The recent developments concerning PRISM surveillance program are leaving U.S. based companies in a very difficult position. The image of those companies and, more in general, the perceived security of storing data in the U.S. have been compromised and we expect this situation to last. Reputational damages of that entity aren't easily absorbed and their effects are usually protracted for long periods of time. A general reassessment of the risks involved in storing data is currently taking place, and this is happening globally.
Privacy concerns have now more power in the decision making processes. The evaluation of privacy-related risks is currently advocating for emphasizing the geographical location of the actual storing hardware. That is supporting our idea to set up a business entirely based in Switzerland, without ties in other countries.


E-mail service

We want to deliver an e-mail service with automated asymmetric encryption of all messages. The transmission of the data to our server is to be executed through a Secure Socket Layer (SSL) to guarantee the safety of this phase as well.
This kind of service isn't difficult to create, doesn't need a huge amount of servers when compared for instance to a cloud storage service an...

... middle of paper ...

...o be designed by using asymmetric encryption. T

Strategical considerations

There are some companies providing a service similar to the one we intend to produce (,, We convinced our different approach can be well received by the market, as our plan to deliver an asymmetric encryption system is offering some operational advantages. An asymmetric encryption system allows the users to distribute a public key. This public key allows other users to send encrypted files that only the recipient will be able to open. A cloud can therefore be used to securely share files between users, without the need to share the passwords needed to open the files. A company can therefore publish a list of public keys so that different people within the organization can securely share sensitive information when working in different locations.
Open Document