Page 360 -
P. 360
SeCUrity GUiDe Digital Is Forever
And cybercriminals aren’t the only ones trying to take black market to other nefarious characters or (2) legally ac- 359
advantage of your personal data. Companies see the value cessed by companies and sold to other companies. The good
in accessing and running various analyses on everything news is that high-profile privacy breaches like the iCloud
you digitally say or do. Google, for example, scans the con- incident raise awareness for everyone concerning the risks
tents of your emails sent through Gmail so it can serve you of storing or sharing personal information online.
targeted ads. Google looks at more than just your emails, For example, a recent poll conducted by the Pew
too. Google also looks at your search queries, the sites you Research Center found that “86% of Internet users have
visit, and your Google profile in an effort to make its ads taken steps online to remove or mask their digital foot-
more relevant. 51 prints—ranging from clearing cookies to encrypting their
email, from avoiding using their name to using virtual
Big Data = Big Money networks that mask their internet protocol (IP) address.”
52
Taking into account the actions of both cybercriminals and This is encouraging, but they can do more. Rather than
corporations, we can infer one thing—accessing the private spending time trying to erase their digital footprint, users
data of Internet users equals big money as personal data need to keep from making tracks in the first place. Think
can be (1) illegally accessed by criminals and sold on the before you click, share, or post. Digital is forever.
QUeStionS
1. The guide emphasizes that criminals and corporations 3. Stolen or compromised devices can also be used to ac-
both seek out the private data of Internet users for their cess your private data. Even if that data has been de-
own gains, but they are not the only ones trying to ac- leted. Search the Web for information about software
cess your data. Why do you think employers might seek used to recover deleted files. Does normal deletion per-
out data about applicants when making their hiring manently remove a file from the memory of your device?
decisions? Can it be recovered? How?
2. You likely heard news reports about the iCloud and 4. Take a few minutes to reflect on your online habits.
Sony breaches, both of which resulted in private pho- Have you sent emails or posted messages or images that
tos and emails being shared with the masses on the could be perceived as controversial in nature? Are there
Internet. But can you recall hearing about the perpetra- posts that you wouldn’t want a future employer to see?
tors being brought to justice? If not, why do you think How might your emails or posts affect your career?
this is the case?