{"id":82430,"date":"2018-12-03T00:12:08","date_gmt":"2018-12-03T05:12:08","guid":{"rendered":"https:\/\/davescomputertips.com\/?p=82430"},"modified":"2018-12-03T00:12:08","modified_gmt":"2018-12-03T05:12:08","slug":"your-personal-data-is-being-collected","status":"publish","type":"post","link":"https:\/\/davescomputertips.com\/your-personal-data-is-being-collected\/","title":{"rendered":"Your Personal Data Is Being Collected"},"content":{"rendered":"<div id=\"daves-2600618864\" class=\"daves-single-post-before-content\" style=\"margin-bottom: 25px;\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-7205184075006101\" crossorigin=\"anonymous\"><\/script><ins class=\"adsbygoogle\" style=\"display:block;\" data-ad-client=\"ca-pub-7205184075006101\" \ndata-ad-slot=\"2700504761\" \ndata-ad-format=\"auto\" data-full-width-responsive=\"false\"><\/ins>\n<script> \n(adsbygoogle = window.adsbygoogle || []).push({}); \n<\/script>\n<\/div><h2>Is It Piracy When They Steal From You?<\/h2>\n<p><a href=\"https:\/\/davescomputertips.com\/wp-content\/uploads\/2018\/12\/Data-Pirate.jpg\"><img decoding=\"async\" class=\"alignleft wp-image-82433\" title=\"\" src=\"https:\/\/davescomputertips.com\/wp-content\/uploads\/2018\/12\/Data-Pirate-292x400.jpg\" alt=\"data-pirate\" width=\"223\" height=\"305\" srcset=\"https:\/\/davescomputertips.com\/wp-content\/uploads\/2018\/12\/Data-Pirate-292x400.jpg 292w, https:\/\/davescomputertips.com\/wp-content\/uploads\/2018\/12\/Data-Pirate-110x150.jpg 110w, https:\/\/davescomputertips.com\/wp-content\/uploads\/2018\/12\/Data-Pirate-600x821.jpg 600w, https:\/\/davescomputertips.com\/wp-content\/uploads\/2018\/12\/Data-Pirate.jpg 616w\" sizes=\"(max-width: 223px) 100vw, 223px\" \/><\/a>It seems ironic that every software company out there cries about \u201cSoftware Piracy\u201d and then turns around and steals your personal data. I know that some companies claim transparency but in truth, simple acts like signing your smartphone contract give them access to your personal data.<\/p>\n<p>In a recent article published by Ashampoo, they were surprised that Microsoft Windows was not the biggest collector of your personal data but rather Microsoft Office, Particularly the newest versions. Exactly what data is taken is hard to determine because it is all encrypted.<\/p>\n<p>The Dutch Government has currently initiated an investigation into the data collection procedures by Microsoft Office and <a href=\"https:\/\/privacy.microsoft.com\/en-US\/privacystatement\" rel=\"noopener\" target=\"_blank\">published a report.<\/a>\u00a0 Right after their report, Microsoft released its\u00a0<a href=\"https:\/\/privacy.microsoft.com\/en-US\/privacystatement\" rel=\"noopener\" target=\"_blank\">data collection policy<\/a>.<\/p>\n<p>The EU has been very aggressive in defending the Privacy laws of their individuals. I believe this helps all of us even though the US lags behind. My one bone of contention is they only seem to sue the big boys like Google, Microsoft, Facebooks, etc. That obviously provides a bigger payday for them. I have yet to hear of them going after any company that has an annual income of less than billions.<\/p><div id=\"daves-1490437982\" class=\"daves-single-post-in-content\" style=\"margin-bottom: 25px;\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-7205184075006101\" crossorigin=\"anonymous\"><\/script><ins class=\"adsbygoogle\" style=\"display:block;\" data-ad-client=\"ca-pub-7205184075006101\" \ndata-ad-slot=\"2700504761\" \ndata-ad-format=\"auto\" data-full-width-responsive=\"false\"><\/ins>\n<script> \n(adsbygoogle = window.adsbygoogle || []).push({}); \n<\/script>\n<\/div>\n<h2>Exactly Who Is Collecting Data<\/h2>\n<p>The simple answer is just about everyone. Even privacy-conscious Apple admits to collecting data on users and according to one security firm\u2019s report, over 24,000 Apple Apps collect personal data. We all know that <a href=\"https:\/\/www.facebook.com\/about\/privacy\" rel=\"noopener\" target=\"_blank\">Facebook<\/a>, <a href=\"https:\/\/policies.google.com\/\" rel=\"noopener\" target=\"_blank\">Google<\/a>, <a href=\"https:\/\/policies.yahoo.com\/xa\/en\/yahoo\/privacy\/index.htm\" rel=\"noopener\" target=\"_blank\">Yahoo<\/a>, and Microsoft do it. Even Linux users are no longer immune. Canonical had decided that it will include data collection tools in the <a href=\"https:\/\/www.ubuntu.com\/legal\/data-privacy\" rel=\"noopener\" target=\"_blank\">Ubuntu<\/a> 18.04 installer. As far as phone and computer Apps, let\u2019s face it, we have all seen the list of what an App is going to collect and click on \u201cOK\u201d anyway.<\/p>\n<p>An example is \u201cNorton Safe Web\u201d. If you look at the permissions you agree to, it can make you question their reasons:<\/p>\n<p><a href=\"https:\/\/davescomputertips.com\/wp-content\/uploads\/2018\/12\/Norton-Web-Safe-Disclaimer.jpg\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-82432\" src=\"https:\/\/davescomputertips.com\/wp-content\/uploads\/2018\/12\/Norton-Web-Safe-Disclaimer.jpg\" alt=\"norton-web-safe-disclaimer\" width=\"647\" height=\"280\" srcset=\"https:\/\/davescomputertips.com\/wp-content\/uploads\/2018\/12\/Norton-Web-Safe-Disclaimer.jpg 647w, https:\/\/davescomputertips.com\/wp-content\/uploads\/2018\/12\/Norton-Web-Safe-Disclaimer-150x65.jpg 150w, https:\/\/davescomputertips.com\/wp-content\/uploads\/2018\/12\/Norton-Web-Safe-Disclaimer-350x151.jpg 350w, https:\/\/davescomputertips.com\/wp-content\/uploads\/2018\/12\/Norton-Web-Safe-Disclaimer-640x277.jpg 640w, https:\/\/davescomputertips.com\/wp-content\/uploads\/2018\/12\/Norton-Web-Safe-Disclaimer-600x260.jpg 600w\" sizes=\"(max-width: 647px) 100vw, 647px\" \/><\/a><\/p>\n<p>On the surface, it appears very intrusive. But is it? Frankly, it is up to the user to decide to either accept or not use the App. I don\u2019t believe they are using this information in a bad way, but honestly, that is just an assumption. I don\u2019t really know.<\/p>\n<h2>How Does Data Collection Affect You?<\/h2>\n<p>Right now, there appears to be a certain degree of awareness and fear in individuals in just what data is being collected and used against them. In reading the Ashampoo article, it does appear to steer you towards fear rather than explain how we are affected.<\/p><div id=\"daves-2298019693\" class=\"daves-single-post-in-content-2\" style=\"margin-bottom: 25px;\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-7205184075006101\" crossorigin=\"anonymous\"><\/script><ins class=\"adsbygoogle\" style=\"display:block;\" data-ad-client=\"ca-pub-7205184075006101\" \ndata-ad-slot=\"2700504761\" \ndata-ad-format=\"auto\" data-full-width-responsive=\"false\"><\/ins>\n<script> \n(adsbygoogle = window.adsbygoogle || []).push({}); \n<\/script>\n<\/div>\n<p>So, what exactly do we have to fear?\u00a0 I really don\u2019t believe that the major players out there are gathering \u201cdirt\u201d to harm us. I am not so sure about the smaller companies. I have no doubt that data collection is profitable and that is why it is done and not to gather private information for some nefarious reason. One major problem is that regardless of the purity of the reason to collect the data, it can be stolen. That is why a certain amount of security and responsibility must be in place before a company should be allowed to collect personal data.<\/p>\n<h2>Orwellian Fears<\/h2>\n<p>Any data that is collected and compiled in an anonymous way is harmless to us and helpful and profitable to software manufacturers. However, if anyone is collecting my personal data, I want much more transparency on the &#8220;what and why&#8221; part. Data that just puts you in brackets, like age, salary range, sex, and product purchases are harmless, and I don\u2019t mind them collecting that. However, I am more concerned about how they use it. If the following basic rules are used, I don\u2019t see the harm:<\/p>\n<ul>\n<li>First of all, they should make you aware that they are collecting it<\/li>\n<li>Secondly, any data collected should <strong>not<\/strong> be associated with an individual<\/li>\n<li>If they use it to improve their product or even increase their profit, we should benefit somehow<\/li>\n<li>Finally, firm laws should be made to prevent them from using it against us<\/li>\n<\/ul>\n<p>I understand the exception to this is that some governments demand companies maintain records for a period of time. Reasons like terrorists sending messages through social media, Russia and other countries flooding our sites with propaganda, and true hate-related crimes are all good reasons for that. Even that data should only be obtainable through legal warrants.<\/p>\n<h2>Pushing Back<\/h2>\n<p>When we try to push back then the more pop-ups we have to endure. Who has not seen the following lines on a webpage?<\/p><div id=\"daves-3218567844\" class=\"daves-single-post-in-content-3\" style=\"margin-bottom: 25px;\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-7205184075006101\" crossorigin=\"anonymous\"><\/script><ins class=\"adsbygoogle\" style=\"display:block;\" data-ad-client=\"ca-pub-7205184075006101\" \ndata-ad-slot=\"2700504761\" \ndata-ad-format=\"auto\" data-full-width-responsive=\"false\"><\/ins>\n<script> \n(adsbygoogle = window.adsbygoogle || []).push({}); \n<\/script>\n<\/div>\n<ul>\n<li>By clicking \u201cAccept All Cookies\u201d, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts<\/li>\n<li>This site would like to send you notifications<\/li>\n<li>This site uses Cookies (OK, Got It)<\/li>\n<\/ul>\n<p><a href=\"https:\/\/davescomputertips.com\/wp-content\/uploads\/2018\/12\/Cookie-Message.jpg\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-82431\" src=\"https:\/\/davescomputertips.com\/wp-content\/uploads\/2018\/12\/Cookie-Message.jpg\" alt=\"cookie-message\" width=\"596\" height=\"80\" srcset=\"https:\/\/davescomputertips.com\/wp-content\/uploads\/2018\/12\/Cookie-Message.jpg 596w, https:\/\/davescomputertips.com\/wp-content\/uploads\/2018\/12\/Cookie-Message-150x20.jpg 150w, https:\/\/davescomputertips.com\/wp-content\/uploads\/2018\/12\/Cookie-Message-350x47.jpg 350w\" sizes=\"(max-width: 596px) 100vw, 596px\" \/><\/a><\/p>\n<h2>Summary<\/h2>\n<p>I have very mixed feelings about data collection. In most cases, I really don\u2019t care. I know I haven\u2019t done anything wrong and don\u2019t mind honest data-mining tactics used by companies. Obviously, I am assuming they are taking steps to secure the data from being stolen and that they are encrypting the data so that, if stolen, it can\u2019t be used by others.<\/p>\n<p>I do not approve of any data mining that collects personal data other than what is necessary for transactions with a company. It should only be stored for a reasonable time. In no instance should they be allowed to sell it.<\/p>\n<p>Mining data just to turn around and sell that data to someone else should not be allowed unless it is just raw analytics that does not contain names or ways to identify someone.<\/p>\n<p>Finally, I would like to hear your views on data mining. Do you know of someone it has harmed? Are we giving away too much? What can we do to minimize its effect? Do you really read the Privacy policies of every App you use?<\/p><div id=\"daves-251495428\" class=\"daves-single-post-in-content-4\" style=\"margin-bottom: 25px;\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-7205184075006101\" crossorigin=\"anonymous\"><\/script><ins class=\"adsbygoogle\" style=\"display:block;\" data-ad-client=\"ca-pub-7205184075006101\" \ndata-ad-slot=\"2700504761\" \ndata-ad-format=\"auto\" data-full-width-responsive=\"false\"><\/ins>\n<script> \n(adsbygoogle = window.adsbygoogle || []).push({}); \n<\/script>\n<\/div>\n<p>&#8212;<\/p>\n<div id=\"daves-1147915211\" class=\"daves-after-content\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-7205184075006101\" crossorigin=\"anonymous\"><\/script><ins class=\"adsbygoogle\" style=\"display:block;\" data-ad-client=\"ca-pub-7205184075006101\" \ndata-ad-slot=\"3225321574\" \ndata-ad-format=\"autorelaxed\" data-full-width-responsive=\"false\"><\/ins>\n<script> \n(adsbygoogle = window.adsbygoogle || []).push({}); \n<\/script>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Is It Piracy When They Steal From You? It seems ironic that every software company out there cries about \u201cSoftware Piracy\u201d and then turns around and steals your personal data. I know that some companies claim transparency but in truth, simple acts like signing your [&hellip;]<\/p>\n","protected":false},"author":2041,"featured_media":82461,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[28,13],"tags":[127],"class_list":["post-82430","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet","category-security","tag-privacy"],"_links":{"self":[{"href":"https:\/\/davescomputertips.com\/wp-json\/wp\/v2\/posts\/82430","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/davescomputertips.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/davescomputertips.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/davescomputertips.com\/wp-json\/wp\/v2\/users\/2041"}],"replies":[{"embeddable":true,"href":"https:\/\/davescomputertips.com\/wp-json\/wp\/v2\/comments?post=82430"}],"version-history":[{"count":0,"href":"https:\/\/davescomputertips.com\/wp-json\/wp\/v2\/posts\/82430\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/davescomputertips.com\/wp-json\/wp\/v2\/media\/82461"}],"wp:attachment":[{"href":"https:\/\/davescomputertips.com\/wp-json\/wp\/v2\/media?parent=82430"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/davescomputertips.com\/wp-json\/wp\/v2\/categories?post=82430"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/davescomputertips.com\/wp-json\/wp\/v2\/tags?post=82430"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}