facebook linkedin twitter

Computerware Blog

Taking a Trip Through Data Privacy, Part II

Taking a Trip Through Data Privacy, Part II

Earlier this week, you may have seen the first part of this article, where we discussed how robocallers collect your information. Today, we continue our discussion on data privacy and what you can do to keep your organization and personal data safe.

Pay Attention to What You Agree To
When you install an application or sign up for a service, they will provide you with a terms of use that includes what they can or can’t do with your information. Android, for instance, requires you to opt in to any information the app wants access to. Instagram wants access to your device’s camera and photo storage, but it might also request access to view and access your contacts, SMS, location, microphone, and even phone calls. This is used to improve the user experience through geotagging for photos and sharing images based on the location, but you should always be wary of what these apps are asking of you. After all, situations like Facebook’s sharing of personal information with Cambridge Analytica is a perfect example of what could go wrong. We don’t want to point fingers at any apps in particular, just to caution you to be careful about what data you share with your applications.

Marketers Love Big Data
This personal data is used by marketers to identify potential consumers and to generate customized advertisements to entice them. Many find targeted ads annoying, but the fact of the matter is that they work; why would they be used if they didn’t?

Even if you aren’t going to give in to the robocaller, for example, there are plenty of people out there who won’t think twice about doing so. When a business has access to the technology that sends out countless messages to prospective buyers, it’s no surprise that there will be at least a couple of takers--even for shady business like this. Of course, a business can just pay money to target only the most valuable customers with their personal data, making it more profitable than even the smaller targets.

All of the data shared in this manner adds fuel to the fire. Businesses need to ask themselves if they would take advantage of these technologies to connect with potential customers who would pay for their goods or services. It certainly might be tempting.

This is a double-edged sword in a sense, as people might have good experiences from using apps and websites, but they are doing so at the cost of their personal privacy. On the business end of things, you might enjoy the data for the purposes of collecting clientele, but you don’t know where the data comes from, who has access to it, and whether or not someone has given consent.

Hackers and Cybercriminals Aren’t Completely out of the Picture
A cybercriminal could easily steal data while it’s in transit from an app to a website, but this isn’t even necessarily the case here. The truth of the matter is that it’s not always clear how data is collected, who has access to it, and where it ultimately ends up. We’ve seen this countless times when a large organization is hacked, and millions of customer records are stolen or leaked online. Sony, Target, Marriott, and Equifax are only a few of the notables here. The data may have been collected normally, but was stolen by nefarious users. Hackers might even be willing to scrape together some funds to purchase some of this data from the dark web.

Privacy Continues to Be an Issue
It might just be tempting to get rid of social media, the smartphone, and live far away from the Internet, but this simply isn’t the answer. Technology is so ingrained in the way that society functions that it’s borderline impossible. The answer is being more mindful of the data and services used. It’s understandable why data sharing is helpful for so many organizations, even if we don’t like it.

Thankfully, there are methods being put into place to protect the privacy of users, like the stringent policies put into place by the EU’s GDPR. While it has established policies to help privacy, it has also created issues for businesses that can’t afford to comply. To this end, we want to help your organization best understand how to protect the data it collects. To learn more about how we can help your organization ensure data privacy, reach out to us at (703) 821-8200.

Tip of the Week: Handy Google Chrome Shortcuts
Taking a Trip Through Data Privacy, Part I


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, March 26, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Hackers Business Management Software Microsoft Data Workplace Tips Managed Service Provider Backup Productivity Hardware Network Security Business Email Saving Money Hosted Solutions Malware IT Services Efficiency Google IT Support Small Business User Tips Computer Smartphones Mobile Devices Quick Tips Innovation Business Continuity Gadgets Disaster Recovery Microsoft Office VoIP Android Productivity Data Backup Network Social Media Mobile Office Collaboration Virtualization Server Communication Smartphone Data Recovery Mobile Device Management communications Miscellaneous Tech Term IT Support Upgrade Ransomware Windows 10 Cybersecurity Unified Threat Management Windows Vendor Management Remote Monitoring Passwords Operating System Facebook Holiday Mobile Computing Phishing BYOD Remote Computing Apps Managed IT services WiFi BDR Automation Users Analytics Data Management Outsourced IT The Internet of Things Marketing Apple Mobile Device History Firewall Internet of Things App Browser Managed IT Services Save Money Alert Artificial Intelligence Big data IT Consultant Encryption Health Bring Your Own Device Antivirus Office 365 Spam Gmail Bandwidth Content Filtering Maintenance Going Green Cloud Computing Printer Office Windows 10 Cost Management Help Desk Wireless Technology Search Training Budget Hiring/Firing Windows 8 Two-factor Authentication Outlook Hard Drives Business Technology Lithium-ion Battery Managed IT Best Practice Information Technology Saving Time Cybercrime Tech Support Virus Update Hacking Phone System Healthcare Access Control Money Document Management It Management Blockchain Computers Recovery VPN IBM Employer-Employee Relationship Travel Networking Legal Risk Management Regulations Administration Information Save Time SaaS File Sharing Customer Service Law Enforcement iPhone Hard Drive Proactive IT Applications Running Cable Government Compliance Mobility Website Data storage Managed Service Humor Intranet Twitter Education Augmented Reality PowerPoint Digital Project Management Hacker Websites Management Machine Learning Current Events Paperless Office Business Intelligence Telephone Systems Sports Vulnerabilities Digital Payment Router Downtime User Computing Disaster End of Support Avoiding Downtime Hosted Solution Robot Comparison Tablet Social Securty Company Culture Fax Server Wireless Data Security Google Maps DDoS Computer Repair Patch Management Solid State Drive Social Networking Social Engineering Excel Data Loss Flexibility Scam Black Market Word Customer Relationship Management Retail Cryptocurrency Laptop Data Breach Value Password Cortana Business Growth Monitors Cleaning Office Tips Telephony Webcam Text Messaging Microchip Taxes Net Neutrality Processors Start Menu Tech Terms USB Mobile Technology YouTube Chrome Distributed Denial of Service Co-managed IT Presentation Software as a Service Unified Communications Settings User Error Cooperation Public Cloud Uninterrupted Power Supply Inbound Marketing Virtual Desktop Computer Accessories Vendor Specifications Safety Vulnerability Bitcoin Identity Theft Windows 7 IT service Trending Lifestyle Documents Data Protection Heating/Cooling Mouse Pain Points Entertainment Distribution Politics Storage Virtual Reality Programming Emails Bluetooth Statistics Automobile Chromebook Conferencing Network Congestion Redundancy Computing Infrastructure Hack Google Docs How To eWaste Download Evernote Monitoring Private Cloud Gaming Console Experience Streaming Media Entrepreneur Technology Tips Legislation Error Books Workers Harddrive Electronic Medical Records Troubleshooting Virtual Assistant IT Plan Enterprise Resource Planning Product Reviews Trojan Wi-Fi Administrator Debate Term CIO Accountants A.I. Read Organize Supercomputer Recording HIPAA Fake News email scam Advertising Addiction Flash GPS Directions Environment Audit External Harddrive SSID Competition Data Warehousing Windows XP Worker Dark Web Electronic Payment Staffing Multi-factor Authentication Google Wallet Processing Access Wireless Headphones Displays Telephone Device Management Reading Samsung Health IT Business Owner Emergency Hard Drive Disposal Migration Society Connected Devices Computer Care Equifax Micrsooft Fleet Tracking Content Management Employer Employee Relationship Thin CLient Logistics IP Address Microsoft Excel Network Management Business Managemenet G Suite 3D Ebay Managed IT Service Drones MSP Webinar Hacks Physical Security Smart Phones Application Google Drive Windows Server 2008 Licensing Bookmark Human Resources Device security Google Play Spyware Mobile Payment Nanotechnology Social Network online Currency Relocation Tablets Desktop Finance Banking Botnet Electricity Printing Startup Asset Tracking Leadership Microsoft 365 Business Cards Permissions Service Level Agreement Language Sync Adminstration Pirating Information Processor Username Notifications CCTV Medical IT Digital Signature Unified Threat Management Backup and Disaster Recovery LinkedIn Browsers Computer Malfunction Security Cameras Teamwork cache Television switches Screen Reader Writing Customer Resource management Reliable Computing User Tip Music Gamification Business Metrics WannaCry Downloads Smart Tech Upgrades Archive Solutions Piracy Upload Skype Best Practives In Internet of Things Navigation HTML Professional Services Time Management Freedom of Information Fiber-Optic LiFi Database Data Analysis PDF Corporate Profile Motion Sickness GDPR Best Available Keyboard Assessment SharePoint Telephone System Microserver Scalability Upselling Mobile Security Point of Contact Google Calendar Multi-Factor Security Deep Learning Cost Messenger Tracking Integration Domains Tip of the week Software License Trends Work/Life Balance Video Surveillance Tech Devices Rental Service Meetings Saving ZTime Voice over Internet Protocol Public Speaking Touchscreen News Fraud Visible Light Communication Tactics Memory Get More Done Fileless Malware VoIP Analytic Printer Server Web Server Modem Shortcut Consultation IT consulting Recycling Turn Key Cabling Proxy Server Knowledge UTM Content Capital Productuvuty Printers Managing Stress CrashOverride Regulation 3D Printing