Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Taking a Trip Through Data Privacy, Part II

Taking a Trip Through Data Privacy, Part II

Earlier this week, you may have seen the first part of this article, where we discussed how robocallers collect your information. Today, we continue our discussion on data privacy and what you can do to keep your organization and personal data safe.

Pay Attention to What You Agree To
When you install an application or sign up for a service, they will provide you with a terms of use that includes what they can or can’t do with your information. Android, for instance, requires you to opt in to any information the app wants access to. Instagram wants access to your device’s camera and photo storage, but it might also request access to view and access your contacts, SMS, location, microphone, and even phone calls. This is used to improve the user experience through geotagging for photos and sharing images based on the location, but you should always be wary of what these apps are asking of you. After all, situations like Facebook’s sharing of personal information with Cambridge Analytica is a perfect example of what could go wrong. We don’t want to point fingers at any apps in particular, just to caution you to be careful about what data you share with your applications.

Marketers Love Big Data
This personal data is used by marketers to identify potential consumers and to generate customized advertisements to entice them. Many find targeted ads annoying, but the fact of the matter is that they work; why would they be used if they didn’t?

Even if you aren’t going to give in to the robocaller, for example, there are plenty of people out there who won’t think twice about doing so. When a business has access to the technology that sends out countless messages to prospective buyers, it’s no surprise that there will be at least a couple of takers--even for shady business like this. Of course, a business can just pay money to target only the most valuable customers with their personal data, making it more profitable than even the smaller targets.

All of the data shared in this manner adds fuel to the fire. Businesses need to ask themselves if they would take advantage of these technologies to connect with potential customers who would pay for their goods or services. It certainly might be tempting.

This is a double-edged sword in a sense, as people might have good experiences from using apps and websites, but they are doing so at the cost of their personal privacy. On the business end of things, you might enjoy the data for the purposes of collecting clientele, but you don’t know where the data comes from, who has access to it, and whether or not someone has given consent.

Hackers and Cybercriminals Aren’t Completely out of the Picture
A cybercriminal could easily steal data while it’s in transit from an app to a website, but this isn’t even necessarily the case here. The truth of the matter is that it’s not always clear how data is collected, who has access to it, and where it ultimately ends up. We’ve seen this countless times when a large organization is hacked, and millions of customer records are stolen or leaked online. Sony, Target, Marriott, and Equifax are only a few of the notables here. The data may have been collected normally, but was stolen by nefarious users. Hackers might even be willing to scrape together some funds to purchase some of this data from the dark web.

Privacy Continues to Be an Issue
It might just be tempting to get rid of social media, the smartphone, and live far away from the Internet, but this simply isn’t the answer. Technology is so ingrained in the way that society functions that it’s borderline impossible. The answer is being more mindful of the data and services used. It’s understandable why data sharing is helpful for so many organizations, even if we don’t like it.

Thankfully, there are methods being put into place to protect the privacy of users, like the stringent policies put into place by the EU’s GDPR. While it has established policies to help privacy, it has also created issues for businesses that can’t afford to comply. To this end, we want to help your organization best understand how to protect the data it collects. To learn more about how we can help your organization ensure data privacy, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 02 April 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Email Computer Google Phishing Workplace Strategy Hosted Solutions Collaboration Small Business Backup Users Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Saving Money Passwords AI Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Information Holiday Facebook Automation Miscellaneous Artificial Intelligence Training Gadgets Compliance Cloud Computing Covid-19 Remote Work Outsourced IT Server Managed Service Provider IT Support Employee/Employer Relationship Spam Encryption Windows 10 Office Data Management Business Continuity Government Wi-Fi Windows 10 Business Technology Virtualization Bandwidth Blockchain Vendor Two-factor Authentication Managed Services Apps Data Security Mobile Office Mobile Device Management Gmail WiFi Tip of the week Chrome Budget Voice over Internet Protocol Employer-Employee Relationship Networking Apple App BYOD Computing Physical Security Applications Information Technology Access Control Office 365 Conferencing Managed IT Services How To Hacker BDR Avoiding Downtime Marketing HIPAA Router Virtual Private Network Risk Management Health 2FA Help Desk Office Tips Analytics Big Data Augmented Reality Retail Storage Password Healthcare Bring Your Own Device Computers Website Operating System Firewall Display Printer Paperless Office Windows 11 Infrastructure Monitoring The Internet of Things Excel Social Document Management Remote Workers Managed IT Service Telephone Scam Data loss Customer Service Cooperation Free Resource Project Management Windows 7 Patch Management Going Green Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Cybercrime VPN Employees Meetings YouTube Integration Cryptocurrency User Tip Modem Computer Repair Mobile Security Processor Holidays Virtual Desktop Safety Data storage LiFi Data Storage Smart Technology Supply Chain Outlook Video Conferencing Machine Learning Managed Services Provider Saving Time Money Virtual Machines Professional Services Humor Maintenance Antivirus Sports Customer Relationship Management Downloads Mouse iPhone Licensing Vulnerabilities Hacking Entertainment Administration Data Privacy Presentation Images 101 Wireless Technology Telephone System Multi-Factor Authentication Robot Mobility Cost Management Settings Printing Wireless Content Filtering IT Management Word Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Fraud Meta Knowledge Refrigeration User Error Microchip Google Drive Internet Exlporer Software as a Service Username Managing Costs Amazon Public Speaking Point of Sale eCommerce Lithium-ion battery Black Friday SSID 5G Virtual Assistant Outsource IT Experience Entrepreneur Google Docs Database Surveillance Unified Communications Network Management Bitcoin Tech Support IT Technicians Virtual Machine Environment Running Cable Media Proxy Server Reviews Google Wallet Cookies Monitors Cyber Monday Medical IT Hotspot Transportation Small Businesses Undo Tactics Development Windows 8 Websites Mirgation Hypervisor Displays Laptop Shopping Drones Nanotechnology Optimization PowerPoint Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Addiction Management PCI DSS Chatbots Halloween Navigation Application Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Workplace Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Service Level Agreement Internet Service Provider Server Management Regulations Compliance Hacks Private Cloud Identity Scary Stories IBM Evernote Paperless Superfish Bookmark Identity Theft Smart Tech Memes Co-managed IT Fun Twitter Alerts SQL Server Technology Care Download Net Neutrality Deep Learning Financial Data Error History Business Communications Browsers Smartwatch Connectivity IT Education Social Engineering Break Fix Scams Upload Procurement Remote Computing Azure Hybrid Work Competition Social Network Telework Mobile Computing Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables Search CES Tablet IoT Communitications Trends Supply Chain Management Best Practice Alert Managed IT Customer Resource management FinTech File Sharing Regulations Buisness Dark Data Google Calendar Term Google Apps User How To Microsoft Excel IT Maintenance Data Analysis Legal Star Wars IT Assessment IT solutions Gamification Flexibility Business Growth Notifications Staff Value Business Intelligence Organization Travel Social Networking IP Address Legislation Shortcuts Ransmoware Cortana Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Content Remote Working Alt Codes Wearable Technology Memory Vendors Health IT Unified Threat Management Motherboard Data Breach Downtime Comparison Google Play Be Proactive Recovery Permissions Workforce Hard Drives Unified Threat Management Directions Videos Assessment Electronic Health Records Hosted Solution Typing Wasting Time Threats Domains

Blog Archive