Fuse Networks Blog

Taking a Trip Through Data Privacy, Part I

Taking a Trip Through Data Privacy, Part I

Protecting your business’ data is no simple task. To make it as secure as possible, you’ll have to understand how personal data flows through online channels. We’re digging pretty deep with this one, so get ready for an informative and, if nothing else, interesting read. This topic is especially important in an age where Facebook and Google exist, but there are countless other threats to data privacy out there that we all experience on a regular basis--business or not.

DISCLAIMER: This article is written from the perspective of someone who is a heavy user of technology. We might be passionate about its use in a professional environment, but this doesn’t mean we can’t be critical of it, too.

Have you ever received a call from a robocaller? You’re not alone; some of us receive upwards of 10-to-15 robocalls on our personal cell phone a day. The product they offer will vary, but for the sake of this article, let’s say it’s health insurance. The company might not be local, but the number they are dialing from is a local number. Already sounds fishy, doesn’t it?

These aren’t the only calls you might receive. Sometimes they might be from the IRS to collect back taxes, or they might be from a car insurance company to inform you of your car’s extended warranty. The list goes on and on, but one question remains the same: how do these robocallers get your contact information in the first place?

What’s the Big Idea?
The robocallers are probably just using an auto-dialer to cast a wide net and maybe get a couple of catches, but this doesn’t excuse the behavior. It’s actually a huge enough issue that the FCC in the United States has been attempting to convince carriers to get the problem under control. While the numbers might look local, the robocallers are likely spoofing numbers based on the device’s area code. But the story doesn’t end there.

Robocallers are able to collect location information, as well. You may have noticed this, too, while out and about at a conference or other situation that requires you to travel. The callers will appear to come from locations that you have previously traveled to. Quite unnerving, to say the least.

How Far Does It Go?
It’s simple in theory - a robocaller can dial millions of random numbers - and can track the ones that are real, scraping public lists to get important information about users that might be found in any given area. Credit bureaus may give away information, and websites or local charities might have a cache of information attached to them as well. But if these callers are able to collect real-time location data, well… there must be something else going on.

Is It Your Cell Phone Carrier?
At this point, you start to suspect the people providing your cell phone service are the one disseminating your information. After all, they track the location of the device, even without using GPS, through the use of tower triangulation between cell towers. This isn’t the main issue, though; four major carriers in the United States and some in Canada have been selling location data to a company called LocationSmart for years without the consent of the consumer. This was only recently discovered (May 2018) when a Missouri sheriff was charged with using this data to track a judge and several members of the state highway patrol.

Basically, it’s likely that your cell phone carrier has been selling your location data without asking you first. While this is alarming, there is a silver lining: AT&T, Verizon, T-Mobile, and Sprint have all agreed to stop sharing location data. Whether they actually have stopped, however, is up for debate. Until there’s an official verdict to this question, it’s not a bad idea to consider the other ways your personal data is discovered by robocallers.

Simply Put, Your Apps Know Too Much
The apps on your phone are pretty telling. You can tell who is a big fan of reading or audiobooks, or even who likes mobile games or particular news sources. You can even tell a lot about someone by looking at what kind of news sources they use. Social media also doesn’t help much, either, as it collects a considerable amount of information about the user. There isn’t anything wrong with an online service collecting data to make a better user experience. The perfect example of this is Google’s search engine, which will use location to deliver local search results based on your history and the device used. Even websites that aren’t mobile-friendly will be less likely to show up on a mobile device.

It’s likely that the future will hold more ways for user data to be taken advantage of, though the real danger comes from the data being shared without the user’s consent or knowledge. To find out how you can protect your data while protecting yourself, check back later this week for part two of this thorough examination of data privacy.

Taking a Trip Through Data Privacy, Part II
5 Reasons IT is Stressed About Security
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, March 19 2019

Captcha Image

Newsletter Sign Up

  • No-Spam Guarantee: We hate spam as much or more than you do and will NEVER rent, share or give your information away to anyone else. We will only use your information to communicate with you direct, and you can also remove yourself from our list at any time with a simple click..
  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Tech Term Network Security Business Computing Hackers Privacy Innovation Data Backup Productivity Android Cybersecurity Collaboration Data Software IT Support User Tips Data recovery Computer Communication Communications Google Efficiency Email IT Services Business Management Mobile Device Malware Internet Small Business Office 365 Hardware VoIP Mobile Devices Smartphone Hosted Solutions Cloud Phishing Blockchain Microsoft Office Browser Cybercrime Backup Applications Cost Management Social Media Managed Service Smartphones Facebook Artificial Intelligence Access Control Information Business Technology Passwords Workplace Tips Apps BDR Maintenance Vulnerability Internet of Things Saving Money Ransomware Business Scam Vulnerabilities Cloud Computing Mobile Device Management Automation Data Security Two-factor Authentication Holiday Windows 10 Bitcoin Conferencing Tech Terms Document Management Augmented Reality Mobility Network Vendor Data Breach Healthcare Bandwidth Alert Patch Management Users IT Management Disaster Recovery Google Maps Social Engineering Quick Tips Hacking Remote Monitoring App Update Data loss Managed IT services Gmail Apple Outsourced IT Saving Time Cooperation Websites Printer Microsoft Desktop Monitoring Evernote Networking Compliance Startup Going Green NCSAM iPhone Operating System Travel Cortana Cost email scam HTML Machine Learning Analytics Medical IT News Mobile Technology WiFi Digital Multi-factor Authentication Paperless Office Customer Resource management Television Social project management Piracy Bluetooth Retail Management Business Continuity Google Docs Business Cards Regulations Productivity Download Managed Service Provider Unified Communications IT Budget Username Disaster Microchip eWaste VPN Network Management Audit Proxy Server Data Management Fake News Virtual Reality Gadgets Entertainment Virtual Assistant Device security Database Telephone System Mouse Sports Router Money Software License Wireless Headphones Content Support Windows 7 Excel Antivirus Chromebook Computing Tech Big Data Upload Printing Fuse Networks Emergency Processor Robot Data Protection Website Accountants Encryption Help Desk PowerPoint Microsoft Excel Company Culture BYOD Data Analysis Miscellaneous Tactics Electronic Medical Records Modem Cleaning CIO Microsoft 365 Tip of the week Backup and Disaster Recovery Error Term Legislation Trends Government Navigation Training Computer Care Vendor Management Professional Services Identity Theft Computers Virtualization Fileless Malware Hard Drive Addiction User Tip SSID Distributed Denial of Service Information Technology Spam Bookmark Managed IT Services Mobile Security Twitter Telephone Comparison Google Play Windows 10 Gamification Legal Laptop Screen Reader Knowledge Google Calendar Computing Infrastructure Devices Equifax Service Level Agreement Voice over Internet Protocol Cryptocurrency Nanotechnology Server Downloads Directions Hard Drive Disposal Freedom of Information Law Enforcement Browsers Social Network Specifications Health IT Security Cameras SharePoint Downtime Emails Wireless Technology 5G Tech Support Safety IBM Managing Stress Marketing Hacker The Internet of Things Multi-Factor Security Hiring/Firing Competition Customer Relationship Management IP Address Fun Employer-Employee Relationship Customer Service Mobile Office Upgrade Domains Wireless Solutions Hard Drives Regulation Public Speaking Search Presentation Wi-Fi Printers Integration Lithium-ion battery