Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Taking a Trip Through Data Privacy, Part II

Taking a Trip Through Data Privacy, Part II

Earlier this week, you may have seen the first part of this article, where we discussed how robocallers collect your information. Today, we continue our discussion on data privacy and what you can do to keep your organization and personal data safe.

Pay Attention to What You Agree To
When you install an application or sign up for a service, they will provide you with a terms of use that includes what they can or can’t do with your information. Android, for instance, requires you to opt in to any information the app wants access to. Instagram wants access to your device’s camera and photo storage, but it might also request access to view and access your contacts, SMS, location, microphone, and even phone calls. This is used to improve the user experience through geotagging for photos and sharing images based on the location, but you should always be wary of what these apps are asking of you. After all, situations like Facebook’s sharing of personal information with Cambridge Analytica is a perfect example of what could go wrong. We don’t want to point fingers at any apps in particular, just to caution you to be careful about what data you share with your applications.

Marketers Love Big Data
This personal data is used by marketers to identify potential consumers and to generate customized advertisements to entice them. Many find targeted ads annoying, but the fact of the matter is that they work; why would they be used if they didn’t?

Even if you aren’t going to give in to the robocaller, for example, there are plenty of people out there who won’t think twice about doing so. When a business has access to the technology that sends out countless messages to prospective buyers, it’s no surprise that there will be at least a couple of takers--even for shady business like this. Of course, a business can just pay money to target only the most valuable customers with their personal data, making it more profitable than even the smaller targets.

All of the data shared in this manner adds fuel to the fire. Businesses need to ask themselves if they would take advantage of these technologies to connect with potential customers who would pay for their goods or services. It certainly might be tempting.

This is a double-edged sword in a sense, as people might have good experiences from using apps and websites, but they are doing so at the cost of their personal privacy. On the business end of things, you might enjoy the data for the purposes of collecting clientele, but you don’t know where the data comes from, who has access to it, and whether or not someone has given consent.

Hackers and Cybercriminals Aren’t Completely out of the Picture
A cybercriminal could easily steal data while it’s in transit from an app to a website, but this isn’t even necessarily the case here. The truth of the matter is that it’s not always clear how data is collected, who has access to it, and where it ultimately ends up. We’ve seen this countless times when a large organization is hacked, and millions of customer records are stolen or leaked online. Sony, Target, Marriott, and Equifax are only a few of the notables here. The data may have been collected normally, but was stolen by nefarious users. Hackers might even be willing to scrape together some funds to purchase some of this data from the dark web.

Privacy Continues to Be an Issue
It might just be tempting to get rid of social media, the smartphone, and live far away from the Internet, but this simply isn’t the answer. Technology is so ingrained in the way that society functions that it’s borderline impossible. The answer is being more mindful of the data and services used. It’s understandable why data sharing is helpful for so many organizations, even if we don’t like it.

Thankfully, there are methods being put into place to protect the privacy of users, like the stringent policies put into place by the EU’s GDPR. While it has established policies to help privacy, it has also created issues for businesses that can’t afford to comply. To this end, we want to help your organization best understand how to protect the data it collects. To learn more about how we can help your organization ensure data privacy, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 16 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Email Computer Google Phishing Workplace Strategy Hosted Solutions Collaboration Backup Small Business Users Managed Service Ransomware Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money Communication AI Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Holiday Information Automation Facebook Artificial Intelligence Miscellaneous Cloud Computing Covid-19 Training Gadgets Compliance Server Managed Service Provider Remote Work Outsourced IT IT Support Employee/Employer Relationship Spam Encryption Windows 10 Office Government Data Management Business Continuity Blockchain Wi-Fi Windows 10 Business Technology Virtualization Bandwidth Mobile Office Vendor Two-factor Authentication Apps Data Security BYOD Mobile Device Management Gmail WiFi Tip of the week Chrome Budget Managed Services Employer-Employee Relationship Voice over Internet Protocol Apple Networking App Avoiding Downtime Marketing Computing HIPAA Information Technology Applications Access Control Office 365 Conferencing How To BDR Hacker Operating System Website Physical Security Risk Management Virtual Private Network Router Health Analytics Office Tips Augmented Reality 2FA Help Desk Big Data Retail Storage Password Bring Your Own Device Managed IT Services Healthcare Computers Remote Monitoring Windows 7 End of Support Vulnerability Vendor Management Cybercrime Microsoft 365 Solutions Display Printer Firewall Paperless Office Infrastructure The Internet of Things Windows 11 Monitoring Document Management Social Excel Scam Remote Workers Data loss Managed IT Service Telephone Customer Service Cooperation Free Resource Going Green Patch Management Project Management Save Money Images 101 Settings Wireless Printing Telephone System Multi-Factor Authentication Content Filtering Mobility IT Management Cost Management YouTube Meetings VPN Word Cryptocurrency Employees Computer Repair Integration Virtual Desktop Data storage User Tip LiFi Modem Mobile Security Processor Safety Outlook Holidays Machine Learning Money Data Storage Humor Smart Technology Supply Chain Video Conferencing Managed Services Provider Saving Time Maintenance Virtual Machines Professional Services Sports Antivirus Mouse Customer Relationship Management Administration Downloads iPhone Licensing Hacking Presentation Entertainment Vulnerabilities Data Privacy Robot Wireless Technology Data Analysis Alt Codes Star Wars IT Assessment IP Address Microsoft Excel IT Maintenance Downtime Unified Threat Management Staff Value Business Intelligence Gamification Flexibility Unified Threat Management Organization Hosted Solution Social Networking Legislation Shortcuts Recovery Fileless Malware Digital Security Cameras Typing Smart Devices Ransmoware Wearable Technology Memory Vendors Network Congestion Hard Drives Content Remote Working Google Drive User Error Health IT Motherboard Data Breach Knowledge Domains Comparison Google Play Be Proactive Directions Videos Assessment Electronic Health Records Permissions Workforce Point of Sale Wasting Time Threats 5G Refrigeration Google Docs Unified Communications Trend Micro Experience Public Speaking Specifications Security Cameras Workplace Strategies Microchip Bitcoin Network Management Internet Exlporer Software as a Service Running Cable Tech Support Lithium-ion battery Fraud Meta Username Managing Costs Amazon Monitors Entrepreneur Google Wallet eCommerce Black Friday SSID Virtual Assistant Outsource IT Windows 8 Database Surveillance Laptop Websites Drones IT Technicians Virtual Machine Environment Undo Media SharePoint Proxy Server Reviews Cookies Electronic Medical Records Cyber Monday Medical IT Halloween Hotspot Transportation Small Businesses Tactics Development Lenovo Mirgation Hypervisor Displays Writing Shopping Nanotechnology Optimization Virtual Reality PowerPoint Scary Stories Private Cloud Language Employer/Employee Relationships Outsourcing Application Hacks Server Management Addiction Superfish Management PCI DSS Identity Theft Chatbots Fun Navigation Gig Economy Deep Learning Screen Reader Twitter IBM Distributed Denial of Service Workplace Error Computing Infrastructure Teamwork Hiring/Firing Service Level Agreement Internet Service Provider Regulations Compliance Education Identity Social Engineering Evernote Paperless Bookmark Smart Tech Memes Remote Computing Co-managed IT Alerts SQL Server Technology Care Mobile Computing Download Net Neutrality Financial Data Tablet History Search Competition Business Communications Browsers Smartwatch Best Practice Connectivity IT Alert Break Fix Scams Buisness File Sharing Azure Hybrid Work Dark Data Managed IT Upload Procurement Legal Social Network Telework IT solutions Cyber security How To Multi-Factor Security Tech Human Resources User CES Business Growth IoT Communitications Notifications Dark Web Cables Travel Trends Supply Chain Management Techology Customer Resource management FinTech Google Maps Regulations Cortana Google Calendar Term Google Apps

Blog Archive