Your personal data is out there. Every thought you tap out on Twitter, every status update you post on Facebook, and even the last credit card purchase you made is accessible via the Internet.
Although you might be happy to give up such information online for immediate gain (whether it’s convenience or fun), your perspective may change when a coveted job offer fails to come through five years from now, or when marketers pester you next week with cleverly scripted personal advertising.
Here’s a guide to privacy features that you should consider before signing up for any new online service.
Do Not Track
The U.S. Federal Trade Commission (FTC) thinks that when you surf the Internet, you should be able to do so anonymously. The Privacy Commissioner of Canada also expressed concern in a 2010 report about online tracking, and is following the FTC’s proposal for a mechanism to prevent tracking. A proposed “Do Not Track” policy, similar to the Do Not Call registry, would require online companies to respect a user’s wish to opt out of online tracking. Since advertising companies track the sites you visit, Do Not Track would exempt you from that process. Although the FTC has yet to issue official guidance, browsers from Google, Microsoft, and Mozilla already have antitracking features.
Related Story: Google adds support to ‘do not track’ movement
Unfortunately, none of their methods are ideal. Mozilla’s Firefox requires Websites to recognize an extra line of instruction–a header request–that tells the server not to track the page request. Microsoft’s Internet Explorer 9 uses trusted lists of tracking sites to block, and Google’s Chrome simply stores user preferences. Although each method has drawbacks, the World Wide Web Consortium (W3C) is considering Microsoft’s approach as a possible Internet standard.
Et Tu, Google?
Both Google and Microsoft have endured privacy storms. Google, however, has weathered them by being more transparent. The Google Privacy Center is populated with easy-to-understand FAQs and explanatory YouTube videos; meanwhile, the Microsoft Privacy page is mostly text, and without concrete examples it is harder to know what’s really going on.
LinkedIn has its own privacy settings, as well. Like Twitter, LinkedIn can shield your contact list from anyone who is not already connected to you. For further protection, LinkedIn will show only the contacts you share in common, not your entire list–at least not without your permission. Unfortunately, the ease of use of LinkedIn’s privacy settings lags behind that of both Facebook and Twitter.
Ultimately, the biggest privacy threats may come not via your browser, search engine, or social network but through sites that aggregate or “mash up” third-party content. FriendFeed, for one, displays the updates you make in both Facebook and Twitter. To use such a service, you’d have to trust all of the parties involved.
Having third parties write code for a service is dicey. Last fall Facebook disclosed that developers of apps for that social network may have leaked personal information about its users; applications such as FarmVille and Texas Hold’em apparently sent Facebook ID numbers to at least 25 advertising and data firms. A class-action lawsuit filed against Facebook concerns such third-party access to data. With more than a half million apps available on Facebook, the number of plaintiffs suing the social network may continue to grow.
Mobile application stores such as those from Apple or Google may, like Facebook, find it impossible to police every app written–although Apple, with its walled-garden approach, attempts to do just that. Here’s where third-party security applications such as Lookout Mobile Security can help. Such tools can report what privacy violations an app may commit; armed with that information, you can decide whether to delete apps that have crossed the privacy line.
Storing data via the cloud solves problems, enabling you to access your files from a remote location. But it also creates frightening scenarios of other, unauthorized people accessing your personal data. One way to mitigate that risk is to choose cloud services that include data encryption.
For example, the Dropbox remote-file-storage site employs a full-encryption Secure Sockets Layer (SSL) protocol when you upload a file, and uses strong AES 256 encryption for the data you store within the cloud. And Mozilla offers a cloud-based sync service for Firefox that encrypts your bookmark data before it leaves your computer, so the company never handles the clear-text version.
Steps to Take
Additionally, use SSL when interacting with Internet sites whenever possible. SSL ensures that when you are wireless, criminals will have a harder time eavesdropping. Not all sites currently support https:// (which indicates that SSL is being used), but Facebook, Gmail, Google, and Twitter do.
What If It’s Too Late?
If you discover that sites such as Pipl, Rapleaf, and Spokeo list too much of your personal information, you have options. First, opt out of Rapleaf directly (the company will remove you if you ask). In addition, adjust your privacy settings on sites such as Facebook, LinkedIn, and Twitter, and delete as much personal information from those social networks yourself.
If, after a few weeks, you still find too much of your personal information on Bing, Google, Pipl, or Spokeo, consider hiring a professional reputation service. Since these services can cost from $630 to $3000, however, try to do as much as you can yourself first.
To a certain degree, everyone has personal data stored somewhere beyond their immediate control. For the most part, don’t sweat the small stuff; public tweets from Twitter, for instance, are being archived by search engines and even the Library of Congress. Instead, worry about the most egregious abuses, such as identity theft, in which someone has taken your personal information and used it to commit fraud.
To protect yourself, request your free credit report, but ask for it only from one of the three credit bureaus every four months. Or, for about $150 per year, subscribe to an identity-monitoring service, such as the one that your bank likely offers. Better services include an Internet scan for your personal information, as well as experts who can help remove that data if necessary.
Robert Vamosi is a security analyst and the author of When Gadgets Betray Us: The Dark Side of Our Infatuation with New Technology (Basic Books, April 2011).