Skip to main content

Cyber Bytes: Ways To Manage Your Online Privacy

By December 5, 2024Insurance

There are plenty of reasons for an undo-and-destroy button when posting content online. An unfortunate post could get downloaded or screen captured within seconds, taking it out of your hands and leaving it for others to control forever.

Your personal data or digital footprint is larger than you realize. According to a 2023 article by Comparitech, some big tech companies may hold enough data to create a paper file as large as a skyscraper. Thatโ€™s like a 1.5-million-word document on each person.

But what if someoneโ€™s using your data in ways you didnโ€™t intend, or worse, pretending to be you?

Most people donโ€™t read the terms and conditions theyโ€™ve agreed to when checking the โ€œAccept all cookiesโ€ or โ€œI Agreeโ€ box. You might have unknowingly consented to the misuse of your own data.

Managing your data can be overwhelming.

Do you agree?

Companies can access, publish or share your data with your permission, even if you donโ€™t realize you gave it. Other data is collected from public records, like court cases or house sales. When you combine the ways personal data can be accessed and disseminated, itโ€™s easy to see how that file on you can fill a skyscraper.

What are data brokers?

Data brokers collect, aggregate and sell consumer data. Many arenโ€™t interested in how your data is used; they only want to know how much money they can charge for it. As with many things related to internet privacy, data brokering is an unregulated industry. Brokers collect information from:

  • Internet browsing histories

  • Online purchases

  • Vehicles

  • Public records (including court information)

  • Location data

  • Loyalty programs

  • Subscription services

Data brokers scrub stacks of data for accuracy and analyze and classify it. Then they repackage it for sale to third parties like:

  • Targeted marketing and sales firms

  • Credit reporting firms

  • Background check companies

  • Government agencies

  • Risk mitigation and fraud detection systems

  • People search databases

  • Banks and financial institutions

  • Insurance companies

  • Ancestry research services

  • Political campaigns and voter targeting

As artificial intelligence makes its way into everyday business use, it will also make data aggregation easier. But will its aggregation methodology be responsible and ethical?

Consumer protections and how your information is used

The Consumer Financial Protection Bureau launched an inquiry into the data brokering industry in 2023. Its main objective was to uncover what information data brokers are collecting and how, and if theyโ€™re playing by similar rules.

Consumer protection laws like the Fair Credit Reporting Act (FCRA) arenโ€™t clear on whether they apply to data brokers. The FCRA applies to companies that collect and disseminate consumer information to evaluate your creditworthiness. Some data brokers sell to marketing companies or other unregulated industries, so the FCRA offers no protection.

In response, some states have passed laws to provide some oversight of data brokers. For example, Vermont has laws requiring data brokers to provide information on their collection activities, security breaches and opt-out policies annually. But sweeping legal changes may be far away.

In the meantime, youโ€™ll need to manage your data and stay aware of its use. Banks could use your digital footprint to market you a new credit card. Conversely, cybercriminals could use data theyโ€™ve bought from brokers to create tailored schemes that can lure you in and make it easy to con you.

Fraud, cybercrimes and data misuse

Your data might get auctioned to marketing and advertising companies vying for a top position in your search return lineup. Or it might get purchased or stolen by criminals for nefarious uses. The Federal Trade Commission (FTC) received fraud reports from 2.6 million consumers last year.

According to the FTC, Americans lost $10 billion to financial scams in 2023, up 14% from 2022. They were swindled out of $4.6 billion in investment hoaxes and $2.7 billion due to imposter shams.

Regular people can use your data against you, too. Laws regarding personal privacy and cybercrimes are still being developed, so cybercrime can be frustrating for victims.

Cybercrimes include:

  • Cyberstalking, when someone monitors, tracks, intimidates or controls you online

  • Deepfakes, when someone designs videos and voice simulators to look and sound like you with the intent to do reputational harm (Revenge porn is an example of a criminal deepfake.)

  • Doxxing, when someone publishes personal information like your home address or medical records

  • Identity fraud, when someone uses your personal information and identity for malicious activities

Big data companies track you online using cookie trails

Big data companies track your habits and preferences to create a granular individual marketing profile. Mobile applications, connected vehicles, devices, GPS, social media activity and internet browsing history are some of the datasets they can use in their interconnected marketing (and remarketing) strategy.

First-party cookies

First-party cookies are unique identifiers on your device that track your preferences, settings and shopping cart items on websites. These can make your shopping or banking service easier. Web browsers need first-party cookies to interact with websites.

Third-party cookies

Third-party cookies are unique identifiers placed on your device that follow you all over the internet. Big data companies use third-party cookies to monitor your behaviors long after you leave the initial website that gave you the cookie.

You can block third-party cookies. Also, donโ€™t click โ€œAccept allโ€ when you visit a website. Many browsers will alert you to this option.

Even if data collection isnโ€™t initially malicious, you no longer have control over your data or how someone uses it once itโ€™s out there. However, you can take back control.

Taking control of your data

Decades of internet use and the transition from Web 1.0 to Web 4.0 have fueled the cry for more content control, especially related to personal and brand identity.

Itโ€™s difficult to remove data from the internet and some data may remain out of your control. But there are some best practices and ways to monitor your privacy:

Website linkWhat you can find thereApple product privacy control

Ways to manage data across Apple products:

  • Personal safety controls

  • Access information

  • App tracking, transparency and privacy reports

  • Analytics

  • Tracking and geolocation information

  • AirTag use alerts

  • Two-factor authentication

  • Account access notifications

Google product privacy guide

Ways to manage data across Google products:

  • Map histories

  • Personal information like fake images or doxxing content

  • Browsing and app histories

  • Tracking and geolocation information

  • Two-factor authentication

  • Account access notifications

Federal Trade Commission (consumers)

Information on:

  • Consumer online privacy

  • Cyberstalking, revenge porn and other crimes

  • Protecting your devices

  • Avoiding common online scams

Federal Trade Commission (children)

Information on protecting childrenโ€™s privacy:

  • Cyberbullying

  • Socializing

  • Parental controls

  • Privacy protections

Federal Trade Commission (businesses)

Information on privacy and security protections related to businesses, including:

  • Children

  • Health

  • Consumers

  • Business regulations

Get outside help to tame your digital footprint

You can enlist outside help to reduce your digital footprint. Online data removal services scan broker sites for your personal information and send them legal requests to remove your data.

When youโ€™re researching companies to reduce your digital footprint, consider:

  • The number of data broker sites they monitor for your information (The more, the better.)

  • The frequency at which they scan data broker sites for the appearance and reappearance of your information (The more often, the better.)

  • The cost of the service (Some offer family plans.)

  • The data opt-out service they use (Some use automated, some use manual and others use a combination.)

  • Value for the cost (Does the service achieve your data privacy goals?)

  • Free trial period to verify their service (The trial service they give you may be priced higher than the one youโ€™re considering, so evaluate the features youโ€™re willing to pay for.)

Personal cyber insurance

Personal cyber insurance can help after a data breach. If your insurance company offers this coverage, you can add it to your home insurance policy. Or you can buy a separate policy.

Stay cybersafe and use your deviceโ€™s built-in privacy controls to guard against data poachers.