Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Taking a Trip Through Data Privacy, Part II

Taking a Trip Through Data Privacy, Part II

Earlier this week, you may have seen the first part of this article, where we discussed how robocallers collect your information. Today, we continue our discussion on data privacy and what you can do to keep your organization and personal data safe.

Pay Attention to What You Agree To
When you install an application or sign up for a service, they will provide you with a terms of use that includes what they can or can’t do with your information. Android, for instance, requires you to opt in to any information the app wants access to. Instagram wants access to your device’s camera and photo storage, but it might also request access to view and access your contacts, SMS, location, microphone, and even phone calls. This is used to improve the user experience through geotagging for photos and sharing images based on the location, but you should always be wary of what these apps are asking of you. After all, situations like Facebook’s sharing of personal information with Cambridge Analytica is a perfect example of what could go wrong. We don’t want to point fingers at any apps in particular, just to caution you to be careful about what data you share with your applications.

Marketers Love Big Data
This personal data is used by marketers to identify potential consumers and to generate customized advertisements to entice them. Many find targeted ads annoying, but the fact of the matter is that they work; why would they be used if they didn’t?

Even if you aren’t going to give in to the robocaller, for example, there are plenty of people out there who won’t think twice about doing so. When a business has access to the technology that sends out countless messages to prospective buyers, it’s no surprise that there will be at least a couple of takers--even for shady business like this. Of course, a business can just pay money to target only the most valuable customers with their personal data, making it more profitable than even the smaller targets.

All of the data shared in this manner adds fuel to the fire. Businesses need to ask themselves if they would take advantage of these technologies to connect with potential customers who would pay for their goods or services. It certainly might be tempting.

This is a double-edged sword in a sense, as people might have good experiences from using apps and websites, but they are doing so at the cost of their personal privacy. On the business end of things, you might enjoy the data for the purposes of collecting clientele, but you don’t know where the data comes from, who has access to it, and whether or not someone has given consent.

Hackers and Cybercriminals Aren’t Completely out of the Picture
A cybercriminal could easily steal data while it’s in transit from an app to a website, but this isn’t even necessarily the case here. The truth of the matter is that it’s not always clear how data is collected, who has access to it, and where it ultimately ends up. We’ve seen this countless times when a large organization is hacked, and millions of customer records are stolen or leaked online. Sony, Target, Marriott, and Equifax are only a few of the notables here. The data may have been collected normally, but was stolen by nefarious users. Hackers might even be willing to scrape together some funds to purchase some of this data from the dark web.

Privacy Continues to Be an Issue
It might just be tempting to get rid of social media, the smartphone, and live far away from the Internet, but this simply isn’t the answer. Technology is so ingrained in the way that society functions that it’s borderline impossible. The answer is being more mindful of the data and services used. It’s understandable why data sharing is helpful for so many organizations, even if we don’t like it.

Thankfully, there are methods being put into place to protect the privacy of users, like the stringent policies put into place by the EU’s GDPR. While it has established policies to help privacy, it has also created issues for businesses that can’t afford to comply. To this end, we want to help your organization best understand how to protect the data it collects. To learn more about how we can help your organization ensure data privacy, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 14 December 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Backup Quick Tips Passwords Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade AI Data Recovery Business Management VoIP Smartphones communications Disaster Recovery Mobile Devices Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Automation Artificial Intelligence Facebook Miscellaneous Cloud Computing Holiday Training Covid-19 Gadgets Server Managed Service Provider Remote Work Outsourced IT Compliance IT Support Encryption Employee/Employer Relationship Spam Office Windows 10 Data Management Business Continuity Government Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Blockchain Vendor Two-factor Authentication Mobile Office Data Security Apps BYOD Managed Services Voice over Internet Protocol Mobile Device Management Tip of the week Chrome Gmail Budget Apple Networking App Employer-Employee Relationship HIPAA Computing Hacker Applications Information Technology Avoiding Downtime Access Control Marketing Office 365 Conferencing WiFi How To BDR Operating System 2FA Computers Router Virtual Private Network Risk Management Website Health Healthcare Help Desk Office Tips Analytics Augmented Reality Retail Storage Password Bring Your Own Device Big Data Managed IT Services Customer Service Vendor Management Cybercrime Excel Physical Security Display Printer Remote Workers Paperless Office Infrastructure Monitoring Free Resource Firewall Document Management Project Management Windows 7 Microsoft 365 Telephone The Internet of Things Scam Data loss Solutions Social Cooperation Going Green Patch Management Save Money Windows 11 Remote Monitoring Vulnerability End of Support Data Storage Content Filtering Supply Chain Hacking IT Management Presentation VPN YouTube Meetings Video Conferencing Managed Services Provider Virtual Machines Professional Services Cryptocurrency Wireless Technology User Tip Modem Processor Computer Repair Mobile Security Virtual Desktop Data storage LiFi iPhone Word Smart Technology Outlook Machine Learning Vulnerabilities Data Privacy Money Saving Time Humor Images 101 Managed IT Service Multi-Factor Authentication Safety Mobility Maintenance Antivirus Sports Downloads Mouse Licensing Entertainment Administration Employees Integration Telephone System Robot Customer Relationship Management Cost Management Settings Holidays Printing Wireless Hypervisor Displays Unified Threat Management Directions Hosted Solution Assessment Permissions Shopping Optimization PowerPoint Typing Employer/Employee Relationships Outsourcing Network Congestion Specifications PCI DSS Google Drive User Error Microchip Navigation User Internet Exlporer Knowledge Fraud Gig Economy Workplace Username Teamwork Hiring/Firing Point of Sale 5G Black Friday Internet Service Provider Regulations Compliance IP Address Google Docs Evernote Paperless Unified Communications Database Experience Bitcoin Network Management Running Cable Tech Support IT Technicians Memes Co-managed IT SQL Server Technology Care Google Wallet Proxy Server Cookies Monitors Cyber Monday Net Neutrality Hotspot Financial Data History Business Communications Recovery Tactics Hard Drives Windows 8 Laptop Websites Mirgation Smartwatch IT Scams Azure Hybrid Work Domains Drones Nanotechnology Procurement Electronic Medical Records Language Telework Cyber security SharePoint Tech Human Resources Addiction Refrigeration Management Halloween Chatbots CES Communitications Cables Supply Chain Management Public Speaking Lenovo Screen Reader Writing Distributed Denial of Service Virtual Reality Computing Infrastructure FinTech Lithium-ion battery Term Google Apps Service Level Agreement IT Maintenance Hacks Server Management Entrepreneur Scary Stories Private Cloud Identity IT Assessment Flexibility Value Business Intelligence Superfish Bookmark Identity Theft Smart Tech Fun Twitter Alerts Organization Shortcuts Deep Learning Download Ransmoware Undo Error Digital Security Cameras Smart Devices Remote Working Memory Vendors Browsers Education Connectivity Social Engineering Break Fix Remote Computing Data Breach Google Play Be Proactive Upload Workforce Mobile Computing Social Network Videos Multi-Factor Security Electronic Health Records Wasting Time Threats Tablet IoT Search Dark Web Alert Trend Micro Security Cameras Workplace Strategies Application Best Practice Trends Meta Managed IT Customer Resource management Buisness File Sharing Regulations Dark Data Google Calendar Software as a Service Managing Costs Amazon IBM Legal Data Analysis IT solutions Star Wars How To Microsoft Excel Notifications Staff eCommerce SSID Business Growth Gamification Virtual Assistant Outsource IT Travel Social Networking Legislation Surveillance Virtual Machine Environment Techology Fileless Malware Media Google Maps Cortana Wearable Technology Reviews Medical IT Alt Codes Content Transportation Small Businesses Competition Health IT Downtime Unified Threat Management Motherboard Comparison Development

Blog Archive