Get Started Today!  217-475-0226

croom new

Decatur Computers Inc. Blog

Taking a Trip Through Data Privacy, Part II

Taking a Trip Through Data Privacy, Part II

Earlier this week, you may have seen the first part of this article, where we discussed how robocallers collect your information. Today, we continue our discussion on data privacy and what you can do to keep your organization and personal data safe.

Pay Attention to What You Agree To
When you install an application or sign up for a service, they will provide you with a terms of use that includes what they can or can’t do with your information. Android, for instance, requires you to opt in to any information the app wants access to. Instagram wants access to your device’s camera and photo storage, but it might also request access to view and access your contacts, SMS, location, microphone, and even phone calls. This is used to improve the user experience through geotagging for photos and sharing images based on the location, but you should always be wary of what these apps are asking of you. After all, situations like Facebook’s sharing of personal information with Cambridge Analytica is a perfect example of what could go wrong. We don’t want to point fingers at any apps in particular, just to caution you to be careful about what data you share with your applications.

Marketers Love Big Data
This personal data is used by marketers to identify potential consumers and to generate customized advertisements to entice them. Many find targeted ads annoying, but the fact of the matter is that they work; why would they be used if they didn’t?

Even if you aren’t going to give in to the robocaller, for example, there are plenty of people out there who won’t think twice about doing so. When a business has access to the technology that sends out countless messages to prospective buyers, it’s no surprise that there will be at least a couple of takers--even for shady business like this. Of course, a business can just pay money to target only the most valuable customers with their personal data, making it more profitable than even the smaller targets.

All of the data shared in this manner adds fuel to the fire. Businesses need to ask themselves if they would take advantage of these technologies to connect with potential customers who would pay for their goods or services. It certainly might be tempting.

This is a double-edged sword in a sense, as people might have good experiences from using apps and websites, but they are doing so at the cost of their personal privacy. On the business end of things, you might enjoy the data for the purposes of collecting clientele, but you don’t know where the data comes from, who has access to it, and whether or not someone has given consent.

Hackers and Cybercriminals Aren’t Completely out of the Picture
A cybercriminal could easily steal data while it’s in transit from an app to a website, but this isn’t even necessarily the case here. The truth of the matter is that it’s not always clear how data is collected, who has access to it, and where it ultimately ends up. We’ve seen this countless times when a large organization is hacked, and millions of customer records are stolen or leaked online. Sony, Target, Marriott, and Equifax are only a few of the notables here. The data may have been collected normally, but was stolen by nefarious users. Hackers might even be willing to scrape together some funds to purchase some of this data from the dark web.

Privacy Continues to Be an Issue
It might just be tempting to get rid of social media, the smartphone, and live far away from the Internet, but this simply isn’t the answer. Technology is so ingrained in the way that society functions that it’s borderline impossible. The answer is being more mindful of the data and services used. It’s understandable why data sharing is helpful for so many organizations, even if we don’t like it.

Thankfully, there are methods being put into place to protect the privacy of users, like the stringent policies put into place by the EU’s GDPR. While it has established policies to help privacy, it has also created issues for businesses that can’t afford to comply. To this end, we want to help your organization best understand how to protect the data it collects. To learn more about how we can help your organization ensure data privacy, reach out to us at 217-475-0226.

Tip of the Week: Handy Google Chrome Shortcuts
Taking a Trip Through Data Privacy, Part I


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, March 26 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Network Security Privacy Business Computing Tech Term Hackers Productivity IT Support Efficiency Data Backup Innovation Data Software Cybersecurity User Tips Google Android Business Management Malware Email Data Recovery Computer Internet Communications Collaboration Smartphone Windows 10 Small Business IT Services Communication Backup Cloud Managed IT Services Mobile Device Hardware Ransomware Phishing Hosted Solutions Mobile Devices Facebook IT Management Social Media Business Artificial Intelligence Microsoft Office Outsourced IT BDR Business Technology Browser VoIp Information Cost Management Smartphones Blockchain App Access Control Office 365 Managed Service Mobile Device Management Cloud Computing Automation Applications Cybercrime Gadgets Server Workplace Tips Internet of Things Network Two-factor Authentication Data Management Hard Drive Maintenance Managed IT Services Saving Money Disaster Recovery Update Antivirus Vulnerabilities Microsoft Passwords Apps Holiday Patch Management Data Security Encryption Scam Websites Vulnerability Vendor Bitcoin Operating System Mobility Users SaaS Analytics Social Engineering Conferencing Data loss Remote Monitoring Hacking Apple Tech Terms Business Continuity Gmail Quick Tips Money Project Management Cooperation Saving Time Search Spam Save Money Big Data Alert Data Breach Word Touchscreen Digital Managed Service Provider Augmented Reality Data Protection Document Management Google Maps Law Enforcement Bandwidth Windows Healthcare Start Menu VPN Printer Laptop Windows 7 Accountants Running Cable Spyware Microchip Mouse Telephone Systems Company Culture IBM Professional Services Unified Communications Cortana HTML Administration Trends Redundancy Budget Best Practice Cleaning Solid State Drive Social Network Modem Audit IT Support Network Management Help Desk Wireless Business Cards Virtualization Monitoring Term Knowledge News Paperless Office Tablet Software as a Service Microsoft 365 eWaste Training Cabling Travel Processor DDoS Consultant Identity Theft Corporate Profile Time Management Sports Printing Virtual Assistant Employer-Employee Relationship Gamification Entertainment Unsupported Software Information Technology Computers Customer Resource management SSID Voice over Internet Protocol Service Level Agreement Vendor Management Managed IT Password Management Google Play Fake News Multi-factor Authentication Database How to Government Solutions Robot Equifax Username Navigation Desktop Chromebook Devices Data Analysis Comparison Mobile Technology Nanotechnology Uninterrupted Power Supply Google Drive Telephone System Computer Care Excel iPhone Virus Going Green Google Calendar Downtime Emails Computing Security Cameras Device security Tactics Legal Integration Startup Worker Evernote SharePoint Backup and Disaster Recovery Unified Threat Management User Tip Samsung Retail Hard Drive Disposal Compliance Content Fileless Malware Specifications Upgrades Telephony Electronic Medical Records Medical IT Tip of the week YouTube Download Bookmark Outlook Unified Threat Management Piracy Bluetooth Vendor Mangement Error Social Microsoft Excel Website Downloads Computing Infrastructure Miscellaneous Disaster Distributed Denial of Service Twitter Addiction email scam Regulations Access BYOD Directions Emergency Television Virtual Reality Screen Reader History VoIP Health IT PowerPoint Settings Upload Browsers Google Docs Software License Wireless Headphones Business Mangement Telephone Router Cryptocurrency Machine Learning Proxy Server WiFi Networking Legislation Tech Freedom of Information Automobile Mobile Security Office CrashOverride Office Tips Managing Stress Multi-Factor Security Printers Upgrade Windows 10 Marketing Regulation

Latest Blog

Productivity is something that either happens or it doesn’t, but it’s important to keep in mind that nobody can work at optimal efficiency at all times. This doesn’t mean you can’t leverage some best practices to make better use of your time, though. Today we’ll examine thre...

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.