Your information footprint is larger than you think
You’re Leaving Footprints
Your information footprint is not just what you intentionally post online. It consists of all of the information that you post or that others post about you, the hidden data attached to those posts by the services you use, the record of your online activities, and also the inferences that can be drawn from putting that collective information together.
Periodically check your privacy settings and update them, if possible, to limit unintentional information sharing.
How It Works:
It can be surprising to realize how much hidden information about your activities is stored and transferred in modern systems. To begin with, every Internet connection automatically transmits the sender’s IP address along with whatever information the user sends — whether the user is sending an email message or just “sending” a request to view a webpage. In other words, every time you visit a website, you leave a trace! Websites and apps store this and other data about users’ behavior — in some cases, even very detailed information like where your mouse hovers or how your finger moves on the screen.
In addition, many apps and devices (such as TVs, tablets, and mobile phones) exchange information, often without the user knowing. Mobile apps often communicate the device’s location, as well as configuration information hidden from the user. Multimedia content, such as images, sound, and video, often contains metadata that is not typically visible without a specialized reader. For example, EXIF is one common metadata format for images (like JPEG or TIFF files) that can contain unique identifiers like the location where the picture was taken, the time, and even the serial number of the camera.
Even when you’re not using the Internet directly, your everyday activities generate data. (See: You Can’t Escape) Going to the doctor, making a purchase with a credit card, or even turning on the TV — all of these things generate bits of data that usually end up in online systems, making your information footprint bigger.
Finally, data collected about someone from many sources, including information they post intentionally, metadata attached to those posts, and information provided by others, can be combined to infer even more information about that person. For example, a tweet saying you’re on vacation, the name in your Twitter profile, and a public record linking that name to the address of the house you own, could be used by a criminal to identify a good target for a robbery. Data mining techniques based on statistics and mathematical logic can be used to find patterns and draw these kinds of inferences on a large scale.
What Could Happen? Real-World Stories:
What You Can Do About It:
Customize the Technology:
- Check your privacy settings on your mobile apps, computer software, and online accounts. The default is often to share every type of information with the widest audience possible; you have to “opt out” if you don’t want to share. Some settings that can typically be turned off:
Communicate About Preferences:
- Check your privacy status with companies. Banks, insurance providers, hospitals, and other companies are often legally bound to let you opt out of at least some types of data sharing.
Choose What You Use:
How to Better Control Your Privacy — Guides:
Where to Learn More — Related Resources and Educational Tools:
What Do You Think? Discussion Questions:
- What is an information footprint? What’s in it?
- How would you measure the size of your information footprint?
- Where does all this information live?
- Who “owns” the information?
- What actions make your information footprint bigger?
- Can you make your information footprint smaller?
- How do your privacy settings on different websites affect your information footprint?
- How do your friends’ actions affect your information footprint?
- Does the size of your information footprint affect the power others have over you?
- Can websites and online services make copies of your information without asking you? How do you know if they’ve duplicated it?
- What is metadata, and what is it used for? What can it be used for?
- Could someone use information about you online to figure out things about you that aren’t online?