No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe
No Result
View All Result
Corporate Compliance Insights
Home Data Privacy

5 Hidden Privacy Dangers

by Greg Sparrow
November 8, 2018
in Data Privacy, Featured
close up of remote with smart TV in background

Lesser-Known Risks for Corporations and Consumers

Big data corporations are always seeking new ways to capture data from consumers, and some of those tactics they employ can expose their targets – and at times, their employers – to significant privacy risk. Greg Sparrow discusses some of the most unknown privacy dangers consumers face today.

Now more than ever before, “big data” is a term that is widely used by businesses and consumers alike. Consumers have begun to better understand how their data is being used, but many fail to realize the hidden dangers in every day technology. From smartphones to smart TVs, location services and speech capabilities, oftentimes user data is stored without your knowledge. Here are some of the most common, yet least-known privacy dangers facing consumers today.

1. Geolocation

Geolocation can be convenient, especially when you’re lost or need GPS services. However, many fail to realize that any information surrounding your location is stored and archived, and then oftentimes sold to a third party who wants to use that information for a myriad of reasons. For example, are you aware that data is often collected during your shopping experiences? A variety of stores will purchase location information to determine how long a customer browsed in a particular aisle so they can further market to those customers in the future, promoting similar products. The information may seem harmless, but would you feel the same way if you saw a physical person following you around collecting the same information?

2. Social Media

Facebook, Google, Twitter and Instagram are all social media services provided to individuals for “free,” but have you ever wondered what the real cost might be? It is often said that if you don’t have to PAY for the service, then you probably ARE the service.

The hidden cost for utilizing these social media sites is the forfeit of personal information for the social media sites to sell and thus profit from. In fact, Google and Yahoo can actually read their customers’ personal email. Some individuals might say they don’t mind because they have “nothing to hide,” but wouldn’t you be wary of publicly posting your login credentials, not knowing who might have access?

Giving these large organizations rights to your private messages can be interpreted as pretty much the same thing.  After all, isn’t your personal email just that – personal? Another unknown fact about Facebook is that they can create “ghost profiles” using facial recognition for people who do not have an account but appear in someone else’s photos. During the Dakota Pipeline Protests, Facebook sold the private chat messages of its users who were discussing the matter to the FBI and local police, as well as private security companies who further reported inside information directly to the pipeline company. Because the information was “for sale,” the police didn’t need a warrant to obtain confidential information; they simply needed to buy it. This is just one of the many ways social media affects those who don’t realize the implications.

3. Web Browsers and Apps

Before smartphones existed, “apps” were nonexistent. Anything accessed now through an app was before accessed through an internet browser. The web browser on a smartphone is what is referred to in the cybersecurity industry as “sandboxed,” meaning it cannot access general data on the system or control hardware. An installed app, however, can be coded to do anything it wants to gain access to any hardware the user has control of.

Take the History Channel for example: If a user accesses the site from a laptop, they can access the entire website without a problem. However, if accessed through a web browser on a smartphone, the user is prompted to “download the app.” Many times, if you do not download the app, the website will disable you from viewing or using it, forcing you to download the app and giving up your personal information in the process. The app will ask for permission to access the camera and the microphone on your device. This is because the app is storing personal information of its users outside of what happens within the History Channel app you just downloaded.

4. Speech Software and Smart TVs

Speech software such as Cortana, Alexa and Siri have become increasingly popular in the past few years. However, if you are running these services in your home or office, then you have an active listening device running at all times. Essentially, you are “bugged.” These services are running, tapping and sending your audio steams to remote servers daily. Many fail to realize that the cameras on these devices can be turned on without the light being activated, meaning your smart TV can be watching you even when you aren’t watching it. All of this can be done without downloading any related software because the software is already built in. Some smart TVs will not turn on if the camera is covered with tape or if the microphone has been disabled.  If you’re living in the United States and utilizing a smart TV, it’s likely monitoring and watching you.

5. Shopping & Savings Cards

Are these just great programs to help you save a little money at various stores? What is in it for the business offering these savings? There are some little-known privacy dangers inherent in the “frequent shopper” or savings cards offered by many grocery stores and retailers. These organizations are saving, analyzing and sharing information on what you buy and when you buy it in order to predict future sales. The savings passed on to the consumer are far less than the amount of money these companies are making by selling the information to outside resources regarding your purchasing history and habits. Specifically, Kroger and Ingles make over 200 percent more profit from the data that they sell than the savings the consumer experiences. The best way to protect oneself from the sharing of personal information is to limit the number of programs you participate in.


Tags: Big DataSocial Media Risk
Previous Post

TRACE: Do We Need an International Anti-Corruption Court?

Next Post

Goldman Sachs and the 1MDB Criminal Prosecutions

Greg Sparrow

Greg Sparrow

Greg Sparrow is Senior Vice President and General Manager at CompliancePoint. Greg has enjoyed over 17 years of experience in privacy, information security and risk management. Greg has had the pleasure of working on both US based and international projects. He was responsible for the development and implementation of the security program’s responsible for protecting billions of dollars in annual transaction volume. Greg’s most recent work includes security and certification work for Samsung Pay, enterprise risk management for multiple NFL and MLB sports teams and helping to secure critical infrastructure at some of the nation’s largest transit hubs. Greg holds multiple IT and security certifications covering the Healthcare Industry, Payment Card Industry and federal banking standards.

Related Posts

risk tunnel

From Regulation to Volume, There Is No Light at the End of the Data Privacy Tunnel

by Jim DeLoach
March 15, 2023

Data proliferation and data privacy regulatory activity across the globe have created the need for focused boardroom discussions. An underpinning...

ai bias_f

Still Racist After All These Datasets: Once Bias Is Baked Into Your AI, It’s Hard to Root Out

by Nigel Cannings
November 9, 2022

Spending on artificial intelligence across all sectors is expected to more than double by 2025, but Nigel Cannings of Intelligent...

whistleblower congress

Blowing the Whistle: Exploring Federal Protections After Twitter Testimony

by Katherine Krems
September 28, 2022

Twitter’s been in the news of late thanks to Elon Musk’s (failed?) takeover bid, but another recent bit of Twitter...

sec messaging apps investment firms

SEC Sanctions Warn Investment Firms That Good Intentions Aren’t Enough on Messaging Apps

by Mark J. Tarallo
May 24, 2022

Think your firm’s policies will protect against sanctions for failing to meet the books and records requirements? If your rules...

Next Post
former Malaysian Prime Minister, Najib Razak

Goldman Sachs and the 1MDB Criminal Prosecutions

Compliance Job Interview Q&A

Jump to a Topic

AML Anti-Bribery Anti-Corruption Artificial Intelligence (AI) Automation Banking Board of Directors Board Risk Oversight Business Continuity Planning California Consumer Privacy Act (CCPA) Code of Conduct Communications Management Corporate Culture COVID-19 Cryptocurrency Culture of Ethics Cybercrime Cyber Risk Data Analytics Data Breach Data Governance DOJ Download Due Diligence Enterprise Risk Management (ERM) ESG FCPA Enforcement Actions Financial Crime Financial Crimes Enforcement Network (FinCEN) GDPR HIPAA Know Your Customer (KYC) Machine Learning Monitoring RegTech Reputation Risk Risk Assessment SEC Social Media Risk Supply Chain Technology Third Party Risk Management Tone at the Top Training Whistleblowing
No Result
View All Result

Privacy Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2022 Corporate Compliance Insights

No Result
View All Result
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe

© 2022 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT