Online Activities that May Expose Your Privacy

by · August 18, 2015

We all use the internet in so many aspects of our daily lives, from knowing the directions to a particular address and booking travel reservations, to making banking transactions. The challenge that every online user faces is to enjoy the benefits and facilities the internet provides while protecting their privacy online. The digital world is witnessing a transition from computers and laptops to mobile phone and tablets; however, the mechanism for protecting online privacy is still evolving.

The following are few online activities that can reveal your personal information. Let’s explore some best practices of handling these online services effectively.

1. Registering for internet services: To access use the internet, you need to register with an Internet Service Provider (ISP) for a certain subscription fee. Once you sign up with them, you are allotted an IP address. Though the IP address does not provide your personal information, ISP holds your personal information and may share your information with online companies and online advertisers. When you open a website, your IP address traces your geolocation.

2. Surfing the internet: While browsing the internet, you may think that you are not disclosing your personal information. However, the fact is that you are placing personal information on websites, i.e. your IP address determines you and online companies trace your IP address and examine your browsing behavior. Based on your browsing activities, they assess your choice/need and decide which products to advertise. For example, if you search for games on the internet, they show you advertisements of new 3D games that appear as pop-up messages on the webpage.


Countermeasure: You can block your IP address by using online software. You can also use a proxy server or Virtual Private Network that will conceal your IP address online.

3. Search engines: Most of us use the search engine to find information online. These search engines have and use the ability to track our search activities. They can record your IP address, the search items you browse, access to social media, online shopping items you keep checking, etc. This information can be collaborated and be used to gather more information about you.

Search Globe

Countermeasure: You need to review the search engine’s privacy policy and make sure that they keep no records of your activities.

4. Cookies: When we browse the internet and visit various websites, many websites store the data about your visit; this is referred to as ‘cookies’. Cookies are saved on your hard drive. Cookies are bits and pieces of information sent by a web server to a user’s browser. For example, you purchase an electronic product online, by registering on an e-commerce site providing your name and bank details. These details will then be stored as cookies. Legitimate websites use cookies to make special offers to regular online users and to track the results of their advertising. These cookies are called first-party cookies. However, third-party cookies, share data about us with online advertising companies that in turn communicate that data with other online marketers. These third-party cookies include “tracking cookies” which use your browsing history to deliver other ads.

Delete Cookies

Countermeasure: Delete cookies regularly from your computer, laptop and smart phone.

5. Using mobile apps: Today, all online activities have been customized to be accessible on mobile in the form of apps. User have to install the app to be able to process their services anytime and anywhere over the mobile device. There are thousands of apps available and in development process including numerous free or low-priced choices.  The concern is that apps can collect all sorts of data and can share it with the app-maker and/or third-party advertisers. This data may then be shared or sold.

Mobile Applications

Countermeasure: Before you install an app, check the app terms of service and privacy policy to know what data it collects, how it stores the data and where your data will be.




Post By Editorial Team (18 Posts)


Add a Comment