Page 360 -
P. 360

SeCUrity GUiDe  Digital Is Forever






                       And cybercriminals aren’t the only ones trying to take   black market to other nefarious characters or (2) legally ac-  359
                    advantage of your personal data. Companies see the value   cessed by companies and sold to other companies. The good
                    in accessing and running various analyses on everything   news  is  that high-profile  privacy breaches like  the  iCloud
                    you digitally say or do. Google, for example, scans the con-  incident raise awareness for everyone concerning the risks
                    tents of your emails sent through Gmail so it can serve you   of storing or sharing personal information online.
                    targeted ads. Google looks at more than just your emails,   For  example, a  recent  poll  conducted  by  the  Pew
                    too. Google also looks at your search queries, the sites you   Research Center found that “86% of Internet users have
                    visit, and your Google profile in an effort to make its ads   taken steps online  to remove or mask  their digital foot-
                    more relevant. 51                                  prints—ranging from clearing cookies to encrypting their
                                                                       email, from avoiding using  their name  to using  virtual
                    Big Data = Big Money                               networks that mask their internet protocol (IP) address.”
                                                                                                                    52
                    Taking into account the actions of both cybercriminals and   This is encouraging,  but  they can do more. Rather  than
                    corporations, we can infer one thing—accessing the private   spending time trying to erase their digital footprint, users
                    data of Internet users equals big money as personal data   need to keep from making tracks in the first place. Think
                    can be (1) illegally accessed by criminals and sold on the   before you click, share, or post. Digital is forever.







                                QUeStionS



                    1.  The guide emphasizes that criminals and corporations   3.  Stolen or compromised devices can also be used to ac-
                      both seek out the private data of Internet users for their   cess your  private data. Even if  that data has been de-
                      own gains, but they are not the only ones trying to ac-  leted. Search  the Web for information about software
                      cess your data. Why do you think employers might seek   used to recover deleted files. Does normal deletion per-
                      out data about applicants  when making  their  hiring   manently remove a file from the memory of your device?
                      decisions?                                          Can it be recovered? How?
                    2.  You  likely  heard news reports about  the iCloud and   4.  Take a few minutes  to reflect on  your online  habits.
                      Sony breaches, both of which resulted in private pho-  Have you sent emails or posted messages or images that
                      tos and emails  being shared  with  the masses on  the   could be perceived as controversial in nature? Are there
                      Internet. But can you recall hearing about the perpetra-  posts that you wouldn’t want a future employer to see?
                      tors being brought to justice? If not, why do you think   How might your emails or posts affect your career?
                      this is the case?
   355   356   357   358   359   360   361   362   363   364   365