facebook linkedin twitter

Computerware Blog

Taking a Trip Through Data Privacy, Part I

Taking a Trip Through Data Privacy, Part I

Protecting your business’ data is no simple task. To make it as secure as possible, you’ll have to understand how personal data flows through online channels. We’re digging pretty deep with this one, so get ready for an informative and, if nothing else, interesting read. This topic is especially important in an age where Facebook and Google exist, but there are countless other threats to data privacy out there that we all experience on a regular basis--business or not.

DISCLAIMER: This article is written from the perspective of someone who is a heavy user of technology. We might be passionate about its use in a professional environment, but this doesn’t mean we can’t be critical of it, too.

Have you ever received a call from a robocaller? You’re not alone; some of us receive upwards of 10-to-15 robocalls on our personal cell phone a day. The product they offer will vary, but for the sake of this article, let’s say it’s health insurance. The company might not be local, but the number they are dialing from is a local number. Already sounds fishy, doesn’t it?

These aren’t the only calls you might receive. Sometimes they might be from the IRS to collect back taxes, or they might be from a car insurance company to inform you of your car’s extended warranty. The list goes on and on, but one question remains the same: how do these robocallers get your contact information in the first place?

What’s the Big Idea?
The robocallers are probably just using an auto-dialer to cast a wide net and maybe get a couple of catches, but this doesn’t excuse the behavior. It’s actually a huge enough issue that the FCC in the United States has been attempting to convince carriers to get the problem under control. While the numbers might look local, the robocallers are likely spoofing numbers based on the device’s area code. But the story doesn’t end there.

Robocallers are able to collect location information, as well. You may have noticed this, too, while out and about at a conference or other situation that requires you to travel. The callers will appear to come from locations that you have previously traveled to. Quite unnerving, to say the least.

How Far Does It Go?
It’s simple in theory - a robocaller can dial millions of random numbers - and can track the ones that are real, scraping public lists to get important information about users that might be found in any given area. Credit bureaus may give away information, and websites or local charities might have a cache of information attached to them as well. But if these callers are able to collect real-time location data, well… there must be something else going on.

Is It Your Cell Phone Carrier?
At this point, you start to suspect the people providing your cell phone service are the one disseminating your information. After all, they track the location of the device, even without using GPS, through the use of tower triangulation between cell towers. This isn’t the main issue, though; four major carriers in the United States and some in Canada have been selling location data to a company called LocationSmart for years without the consent of the consumer. This was only recently discovered (May 2018) when a Missouri sheriff was charged with using this data to track a judge and several members of the state highway patrol.

Basically, it’s likely that your cell phone carrier has been selling your location data without asking you first. While this is alarming, there is a silver lining: AT&T, Verizon, T-Mobile, and Sprint have all agreed to stop sharing location data. Whether they actually have stopped, however, is up for debate. Until there’s an official verdict to this question, it’s not a bad idea to consider the other ways your personal data is discovered by robocallers.

Simply Put, Your Apps Know Too Much
The apps on your phone are pretty telling. You can tell who is a big fan of reading or audiobooks, or even who likes mobile games or particular news sources. You can even tell a lot about someone by looking at what kind of news sources they use. Social media also doesn’t help much, either, as it collects a considerable amount of information about the user. There isn’t anything wrong with an online service collecting data to make a better user experience. The perfect example of this is Google’s search engine, which will use location to deliver local search results based on your history and the device used. Even websites that aren’t mobile-friendly will be less likely to show up on a mobile device.

It’s likely that the future will hold more ways for user data to be taken advantage of, though the real danger comes from the data being shared without the user’s consent or knowledge. To find out how you can protect your data while protecting yourself, check back later this week for part two of this thorough examination of data privacy.

Taking a Trip Through Data Privacy, Part II
5 Reasons IT is Stressed About Security


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, March 26, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Business Management Software Hackers Microsoft Data Workplace Tips Backup Managed Service Provider Productivity Hardware Network Security Business Email Saving Money Hosted Solutions Malware IT Services Efficiency IT Support Google Small Business Computer Smartphones Mobile Devices User Tips Innovation Quick Tips Business Continuity Gadgets VoIP Disaster Recovery Microsoft Office Social Media Data Backup Productivity Android Network Collaboration Mobile Office Virtualization Communication Server Mobile Device Management Data Recovery Smartphone communications Miscellaneous IT Support Ransomware Windows 10 Tech Term Upgrade Cybersecurity Unified Threat Management Windows Operating System Vendor Management Passwords Holiday Facebook Remote Monitoring BYOD Remote Computing Managed IT services Apps Phishing Mobile Computing BDR WiFi Analytics Automation Users The Internet of Things Outsourced IT Apple Data Management Marketing Mobile Device History Internet of Things Firewall Browser Managed IT Services Save Money App Alert Artificial Intelligence IT Consultant Encryption Big data Spam Gmail Antivirus Health Windows 10 Bandwidth Cloud Computing Content Filtering Office Going Green Office 365 Maintenance Printer Bring Your Own Device Tech Support Wireless Technology Virus Hiring/Firing Search Hard Drives Cybercrime Saving Time Managed IT Cost Management Lithium-ion Battery Best Practice Information Technology Windows 8 Outlook Training Budget Business Technology Two-factor Authentication Help Desk Money Document Management Recovery Employer-Employee Relationship Healthcare Phone System Computers VPN Hacking Travel Access Control Update IBM It Management Blockchain File Sharing Information Administration Hard Drive SaaS Website Government Mobility Law Enforcement Proactive IT Running Cable Compliance iPhone Data storage Intranet Twitter Applications Education Managed Service Legal Networking Risk Management Augmented Reality PowerPoint Humor Regulations Customer Service Save Time Downtime Sports Wireless Scam Router Disaster DDoS Management Computing Hosted Solution Google Maps End of Support Comparison Tablet Data Breach Company Culture Robot Vulnerabilities Social Engineering Securty Project Management Computer Repair Digital Retail Websites Avoiding Downtime Word Social Networking Current Events Solid State Drive Password Cortana Value Black Market Flexibility Hacker Cryptocurrency Excel Laptop Business Growth Fax Server Machine Learning Customer Relationship Management Data Security Telephone Systems User Patch Management Business Intelligence Paperless Office Social Digital Payment Data Loss Webcam Documents Text Messaging Identity Theft Unified Communications Settings Entertainment Computer Accessories Redundancy Heating/Cooling Storage Cooperation Evernote Politics Trending Virtual Reality Emails Mouse Vendor Automobile IT service Inbound Marketing Chromebook Programming eWaste Statistics Start Menu Tech Terms Computing Infrastructure Hack Mobile Technology User Error How To Bluetooth Network Congestion Co-managed IT Download Software as a Service Pain Points Private Cloud Distribution Uninterrupted Power Supply Telephony Google Docs Processors Vulnerability Streaming Media Microchip Taxes Experience Lifestyle Bitcoin Conferencing USB Presentation Windows 7 Monitors Data Protection Distributed Denial of Service Cleaning Office Tips Net Neutrality Specifications Safety Chrome Gaming Console Monitoring Public Cloud Virtual Desktop YouTube SSID Assessment SharePoint Accountants A.I. Micrsooft Dark Web GPS email scam Addiction Sync Digital Signature External Harddrive Multi-factor Authentication Notifications CCTV Drones online Currency Health IT Get More Done Tip of the week Teamwork Processing Google Calendar Logistics Turn Key Touchscreen News Wireless Headphones Telephone Reliable Computing Managed IT Service Printer Server VoIP Migration Connected Devices Business Metrics Computer Malfunction Consultation Thin CLient Equifax Fleet Tracking PDF LinkedIn Bookmark Trojan Knowledge 3D Ebay Network Management In Internet of Things Permissions Language Smart Phones Device security MSP Virtual Assistant Best Available Keyboard Google Play Organize Technology Tips Motion Sickness Music Domains Archive Microsoft 365 Fake News Nanotechnology Social Network Scalability switches Writing Skype Processor Audit Desktop Finance Public Speaking Medical IT Data Warehousing Leadership Startup Asset Tracking Messenger Tracking Upgrades Browsers Adminstration Pirating Information Business Cards Service Level Agreement Username Rental Service Meetings User Tip Emergency Hard Drive Disposal Unified Threat Management Backup and Disaster Recovery LiFi Shortcut Point of Contact Security Cameras Access Gamification Web Server Troubleshooting Solutions Microsoft Excel Screen Reader Customer Resource management Cabling Entrepreneur Navigation Webinar Computer Care HIPAA Professional Services Google Drive Windows Server 2008 Smart Tech Books Workers Deep Learning Environment Data Analysis Piracy Upload Wi-Fi Administrator Work/Life Balance Spyware Mobile Payment HTML Supercomputer Electronic Payment Recycling Fiber-Optic Database Visible Light Communication Memory Competition Analytic GDPR Mobile Security Business Owner Integration Upselling Telephone System Worker IT consulting Product Reviews Tech Electricity Printing IP Address Read Voice over Internet Protocol Multi-Factor Security Cost Reading Samsung Fileless Malware Video Surveillance Software License Trends Modem cache Television Saving ZTime Devices Employer Employee Relationship CIO Human Resources Proxy Server Best Practives Fraud Tactics G Suite Advertising Flash Application UTM Content Hacks Physical Security Staffing Google Wallet Device Management Electronic Medical Records Licensing Windows XP Term WannaCry Downloads Society Content Management Recording Microserver Time Management Freedom of Information Harddrive Legislation Error Relocation Tablets Displays Business Managemenet Directions Corporate Profile Debate IT Plan Enterprise Resource Planning Banking Botnet CrashOverride Capital Productuvuty Printers Managing Stress 3D Printing Regulation