DIGITAL FOOTPRINT An interactive eBook experience by: Brittany Czodli Claire Williams John Wegener Joey Visco

Table of Contents

. Foreword . Chapter 1: The New Digital Age . Chapter 2: and the . Chapter 3: Your Digital Footprint Matters . Chapter 4: Protecting Your Digital Footprint . End of Book

Foreword This online, open-access eBook tackles one of the most important concepts on the modern internet: your digital footprint. We take a comprehensive look at the evolution of the internet age and how that has shaped the way that we view our online habits. It goes into detail on where your information can be found, accessed, and sold by data brokers to large corporations. Additionally, it explains why you should care about protecting your footprint and constructive habits that will allow you to keep your information secure. Ultimately, this book will inform the reader that the use of online technology does not go without its consequences, so we should do our part to inform everybody of them.

Introductory Video

Chapter One: The New Digital Age By: Claire Williams

Abstract Chapter one of our ebook details how technology has grown and expanded in the last twenty years. The Internet has evolved to be smarter, more widespread and more accessible to people no matter where they are. Even in the most remote and underdeveloped regions throughout the world, the Internet is starting to provide more connection and knowledge to those previously unable to access it. Although this interconnection and accessibility provides many benefits, there are also growing concerns about privacy and the potential to have your identity and finances stolen. In a world where an online presence is inevitable, even unavoidable at this point, how do you protect yourself?

Introduction The past twenty years has seen an enormous amount of progress in technology. The Internet changed from something only reserved for the privileged and well-educated to something that now everyone uses on a daily basis. Computers and portable phones evolved overnight and are still rapidly changing with the yearly releases of popular devices, such as iPhones. Each year brings another surge of advancement that most people did not think possible twenty years ago. Now, it seems with each year, so much more is offered in the word of technology and with this also comes new concerns, questions and ideas about what it can be used for.

The Growth of Technology Twenty years ago, there were only 10,000 websites and only 2 million computers connected to the Internet. Today, there are over 1 billion websites and over 2 billion computers. Until the mid-1990’s computers were only used for research, today computers are used for everything. Twelve years ago, there was one popular site, MySpace. Today, there are so many different ways to connect to social media with and Twitter for example, that MySpace barely gets used at all. Initially, technology was meant to be educational. The World Wide Web was to be a connection to information that everyone could share in. However, over the years, that purpose changed in more ways than one. The incredibly rapid growth of what was once a limited resource has now become a daily part of everyone’s lives in some way. Businesses use websites to advertise products, politicians campaign online through videos and websites, music and art is shared and created online. Science and research is shared online so that ideas can spread and influence others throughout the world to improve on and continue work. Twenty years ago, no one could have predicted that the Internet would become as essential to daily life as it is now. And as it continues to progress, people can only speculate as to what it will change and dictate in the future of technology. For now, however, just the progression of how people connect online and how devices have been created so quickly to keep up with the advancement of technology continues to astound individuals who have witnessed the evolution of the Internet since the 1990’s. Below is an info graphic that shows how the Internet and Internet-devices have grown to become such a normalized part of everyday life in the United States and around the world.

The Growth of Accessibility Every year, people all around the world wait with anticipation over what the new phone and computer companies will bring to the table. Apple, a company recognized globally for its revolutionary products releases new phones, computers, smart watches and tablets twice a year. Andrew Meola wrote an article in ‘Business Insider’ describing how because of the products like the iPhone and related smart-phones have become a necessity and cheaper to buy, it has only increased the amount of people who have access to online world. Apple and companies similar to it are constantly trying to stay ahead in a business of technology where their customers want the “latest and greatest”. Because this technology, social media platforms like Facebook, Twitter and Instagram are also constantly competing for the attentions of their users. Digital technology it seems, is always on the lookout for the next best thing. In a world that used to be so private and separated, phones, social media have made people’s lives so much more accessible. In her book “”, Joy Crelin describes how connected and small the world seems now compared to when this technology was just beginning. It’s accessible to everyone with the means, and even in places where it is harder to buy smart phones and computers, public spaces like libraries or universities still offer individuals the ability to see and experience the lives of others out there that they themselves might never meet. She specifically says that it is almost impossible to have no kind of track record on the Internet, even if you yourself do not openly put your life out there. While this connects and brings different peoples of the world together and allows families or friends separated to remain close, there are and always have been concerns about online security and privacy in a society where the motto is to post first and think later, not always thinking of consequences. In 2016, the average age of a person who gets their first smart phone is around ten and a half years old. To the newer generation, technology is a consistent part of their childhood and upbringing. It is nearly impossible to not have a cyber footprint because of how young people are when they first start out on the Internet. An email address, web searches, gaming and social media use, all of this leaves a mark online.

The Issues of Progress The expansion of the Internet has been one of arguably the most important advances in human history. In ‘Cyber Security and Privacy’, author Massimo Felici describes how revolutionary these advances have become. The Internet has become a place where everyone has a voice and information is readily available at the tips of your fingertips. He goes on to talk about the initial intention for the Internet, that it was designed to be used for research and communication throughout the world, but all that has come out of it is both surprising and troubling to some degree. In some of the most remote regions of the world, people are getting easier access to smart-devices and the digital world. However, while there are many benefits to more people joining the web every day, there are also growing concerns about how to keep one’s digital profile and presence safe and secure. One of the largest problems online today is . According to Rafi Goldberg, there are nearly 15 million people per year who fall victim to identity theft. A lot of this is because many people do not know how to protect themselves online. With the ever-changing Internet, while personal protection increases, the amount of creativity to get around these protections also goes up. The numerous amounts of devices and many public places where Wi-Fi are available are why Scott Peppet believe the influx of identity theft and personal information leakage is so common. He argues that because there is so much accessibility it is making it so much easier for hackers to pick and choose who and what information they want to steal.

Conclusion While the expansion of the Internet has proved both beneficial and exciting to many throughout the years, there are also many rising concerns in the United States and globally about what can potentially happen to one’s personal privacy online. While more and more people join the Internet every year, there are also those who prey upon those who are new and unsure of how to traverse and protect oneself online. This can include how to better protect your identity with passwords, how to erase cookies and scramble information so that hackers have a harder time decrypting your information, or just being a more informed Internet user. Throughout the rest of this ebook, each chapter will be dedicated to clarification of digital and Internet privacy and how to protect yourself online.

References:

Crelin, Joy. "Internet Privacy." Applied Science: Information Systems (2016): 1. Science Reference Center. Web. 23 Oct. 2016.

Erwin, Derek. "How to Maintain Your Privacy on the Internet." The Mac Security Blog. Intego, 15 Dec. 2015. Web. 23 Oct. 2016.

Felici, Massimo. Cyber Security And Privacy. [Electronic Resource]: Trust In The Digital World And Cyber Security And Privacy EU Forum 2013, Brussels, Belgium, April 2013 : Revised Selected Papers. n.p.: Heidelberg : Springer, [2013], 2013. MU Library Catalog. Web. 23 Oct. 2016.

Goldberg, Rafi. "Lack of Trust in Internet Privacy and Security May Deter Economic and Other Online Activities." Home Page. National Telecommunications & Information Administration, 13 May 2016. Web. 23 Oct. 2016.

Khan, Shahidul Islam, and Abu Sayed Md. Latiful Hoque. "Digital Health Data: A Comprehensive Review Of Privacy And Security Risks And Some Recommendations." Computer Science Journal Of Moldova 24.2 (2016): 273-292. Academic Search Complete. Web. 23 Oct. 2016.

Meola, Andrew. "How the Internet of Things Will Affect Security & Privacy." Business Insider. Business Insider, Inc, 24 Aug. 2016. Web. 23 Oct. 2016.

Peppet, Scott R. "Regulating The Internet Of Things: First Steps Toward Managing Discrimination, Privacy, Security, And Consent." Texas Law Review 93.1 (2014): 85- 178. Risk Management Reference Center. Web. 23 Oct. 2016.

Chapter 2: Privacy and the Internet By: Joey Visco

Absract With the ever growing presence of the internet in our daily lives, more and more of our personal information has begun to make its way onto digital records. This paper takes a look at the increasing importance of every user’s digital footprint, what that information means for companies that are willing to sell it, and how individuals view their own privacy habits.

Introduction Ever since its introduction to the world, the internet has become an integral core in the lives of over 3 billion people across the globe. From social media to online banking and medical records, all the information we’ll ever need is right at our fingertips. And yet, we’re not the only ones who are privy to our own personal data. There are countless companies that see such information as a valuable commodity, resulting in a wide range of data broking firms that seek out and sell the information we think is being kept private. Thus, privacy as it pertains to the internet has become more important than ever, as its wide range of users need to take a much more involved role in the protection of their personal information.

The Digital Footprint On the Internet, virtually every aspect of our lives is being recorded in a variety of formats; what websites we visit, what terms we search for, and even extremely personal details about ourselves. In recent years, this phenomenon has been referred to as our “digital footprint,” the mark that we leave on the internet as we browse it. Of course, the most obvious source of this kind of information is social media sites like Facebook or Twitter, where users willingly post data about themselves that they probably would not be comfortable with sharing anywhere else. Specifically, 91% of younger users are willing to share their real names, 60% their relationship status, 82% their birthday, 71% where they live and attend school, 53% their email address, and 20% their mobile phone number (Henley). Browsing one’s social media page for even a passing amount of time can give an intricately detailed look into their life and how they conduct themselves. And yet, social media is not the only facet of the internet that is collecting data from its users. Even basic information, such as the websites we visit on a consistent basis and the terms we input into popular search engines such as Google, can be considered highly valuable data by advertisers (Sisk 101-105). For example, if a user is consistently searching for terms related to weight loss or dieting, ad networks can see that as the perfect opportunity to display targeted ads for weight loss programs or special diet food brands. For many people, this would seem like a fairly invasive look into their lives and habits. For others, it is a prime money-making opportunity.

Data Brokers With internet users sharing increasingly large amounts of personal information, many data broker agencies have formed in recent years in order to profit off of that trend by collecting and selling the data to other companies. Returning to the previous example, if a certain data broker was to have a large list of 100,000 users that are potentially seeking weight loss or dieting solutions based off of their internet usage, many companies would pay a lot of money for that information. The following infographic details more information about these sorts of brokers that profit off of users’ personal information:

An ongoing issue with these data brokers on the internet is the absolute lack of federal regulations on how they collect information and the amount they are permitted to take. Most would assume that, due to the Fourth Amendment, they are guaranteed to privacy in areas where they can reasonably expect it. However, due to the Third Party Doctrine, which removes a user’s right to privacy when they share information with a third party (such as Facebook), these data brokers are given free rein to access this data (Sisk 101-107). From that point onward, there are virtually no regulations or restrictions in place to limit how much data they take or sell. Given that the Third Party Doctrine was introduced for the collection of evidence in criminal cases, it’s obvious that the freedom it grants to data brokers is an unintended loophole in its application. Despite this, there’s been no attempts to introduce anything that would mitigate or regulate this effect. Unfortunately, the only way to keep personal information out of the hands of data brokers is to ensure it doesn’t end up on the internet in the first place.

Good Data Habits Keeping important information off of the internet is a surprisingly difficult task, as virtually anything you do on it is going to be tracked or detailed in some way. Yet, there are a number of positive habits that users can take to help curb the amount of data that they reveal. The ultimate source of information for brokers is, of course, social media. In the search for the level of social interaction that these sites provide, users willingly share intimate information that be accessed by virtually anyone, even if their profiles are set to “private” (Khey & Zemmels). Even then, other users can potentially tag users in photos or mention them in posts, making attempts to limit personal information on these sites a Sisyphean task. Outside of social media, information can still be collected through a user’s search history and cookies that they have accumulated over time. Cookies might be small bits of information saved by a website, such as your name or email address, but that data adds up. Even just knowing your email address can allow companies to trace any sites you’ve used it on right back to you. Given that, as in the infographic, only 59% of users clear their browsers of this data on a regular basis, it is still an incredible amount of information (Pew). While it may seem trivial, keeping your browser fresh of cookies or overly large search histories can do wonders to keep your internet habits from falling into the wrong hands. But even taking all of these steps might not help, as this privacy concern needs to be dealt with on a larger scale.

What Needs to be Done The issue of privacy on the internet is everyone’s problem, as data brokers do not discriminate when taking and selling the intimate data of internet users. And yet, referring back to the infographic, 91% of surveyed users have not made any change to their browsing habits to curb this growing industry (Pew). Even worse, the lack of any regulations on these data brokers basically allows them to conduct their business however they see fit, at the expense of everyday internet users. To top it all off, there is no real reason for brokers to be transparent about their business, as many people aren’t even aware that they exist. First, more internet users need to become aware of the consequences that their actions on the internet can have and who can be potentially observing their every move. Secondly, these users need to take steps to protect their own information, such as clearing cookies or using throwaway emails unrelated to their main one. Lastly, people need to start demanding action be taken to curb the uninhibited data collection industry and demand more transparency from those companies. We need to know how this information is being collected and where it will eventually end up. Until then, the internet is far from being a private place.

Conclusion In conclusion, the ideal relationship between privacy and the internet is not even close to being realized, as users are too lax with their personal information and data brokers are too free to collect that information however they want. There’s a litany of reasons why this relationship needs to be changed as soon as possible, yet there’s been zero action from anywhere on the matter. Unfortunately, as more and more users begin to access the internet, their data is far from private just about anywhere on the web.

Bibliography

Henley, Jon. "Are Teenagers Really Careless About Online Privacy?" Theguardian.com. Guardian News and Media Limited, 21 Oct. 2013. Web.

Laggui, Drexx D. "Digital Privacy vs. Public Security." Inquirer.net. The Inquirer, 11 Sept. 2016. Web

Richards, Neil. Intellectual Privacy : Rethinking Civil Liberties in the Digital Age. 1st ed. Oxford: Oxford UP, 2015. Print.

Schneier, Bruce. Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. 1st ed. New York, NY: W. W. Norton, 2015. Print.

Sisk, Edward P. "Technical Difficulties: Protecting Privacy Rights in the Digital Age." New England Journal on Criminal & Civil Confinement 42.1 (2016): 101-19. Web.

Troni, Naomi. "Social Media Privacy: A Contradiction in Terms?" Forbes.com. Forbes, 24 Apr. 2012. Web.

Zemmels, David R., and David N. Khels. "Sharing of Digital Visual Media: Privacy Concerns and Trust Among Young People." American Journal of Criminal Justice 40.2 (2014): 285-302. Web.

Chapter 3: Your Digital Footprint Matters By John Wegener

Abstract Our digital footprint is the trail we leave behind when we surf the internet. Our digital footprint is the key to what we like to do on the web and while we consume information when connected to the internet. If this information is accessed by companies, their tendency is to utilize this information to get a better understanding as to how we think. That is why it is important to manage our digital footprints—to protect our privacy and increase our sense of security.

Introduction The components of internet privacy and security in the United States are controlled by the court system, judging what “privacy” means under the constitution. If the constitution is interpreted liberally, the right to privacy is implicitly stated in amendments one, four, and nine. If the constitution is interpreted conservatively, the right to privacy is not explicitly stated in the constitution, therefore there is no guarantee of privacy from the government. It is important that people are aware of how the nature of security and privacy operate in our democracy because the landscape of the Supreme Court is subject to change with one vacancy currently and likely more to come. This brings issues to the table such as , internet privacy, and other unforeseen internet data usage exploits against our privacy coming in the future.

Surveillance and Cell Phone Privacy

Surveillance is the act of watching someone or a group of people for the purpose of gathering information about them. Governments do this to prevent crime from occurring, detect crime as it happens, reduce citizen’s fear that crimes will happen, gathering information on criminals and countering terrorism among others. Unrestricted access to surveillance creates a society with a lot of security, but very little privacy. If we are constantly being watched, there is no private life and therefore we act differently than we normally would. Privacy in the eyes of the law is very important in the government arguments over the amendments that don’t clearly state a position on privacy. “A community’s use of surveillance cameras could potentially implicate both types of privacy interests. For example, if the compilation of information in these databases had a significant chilling effect on First Amendment rights, such as discouraging citizens from attending political rallies, if it impinged on fundamental rights of decisional privacy, or if the information were insufficiently safeguarded against unauthorized disclosure, then the maintenance of such databases could potentially run afoul of the law” (Woodward). The more people accept violations of privacy by surveillance and data mining systems, the more traction the corporations that use them get in the eyes of the law. Corporations with these technologies and algorithms can create a profile of data for each person that passes through the net, and sell that information to other companies. This creates incentives for the government to work with these companies if the public is supporting programs that use surveillance technology, and before you know it our government is in the business of taking information about all of us. When this occurs, surveillance technology could be used in law enforcement, creating a police state. As cell phones are concerned, they are the perfect devices to collect data on our shopping habits, our whereabouts, who we talk to, how we interact with people, how we learn, and pretty much everything about us can be found out through our phones. Cases of phone surveillance and security have pervaded the courts since the invention of the telephone prompted wiretapping scandals, and it is still being debated because of recent school shootings in San Bernadino. “Take, for example, the 1928 case Olmstead v. United States, in which the Supreme Court ruled that wiretapping could be conducted without a warrant; then compare it with the 1967 case Katz v. United States, when the court essentially said the opposite. ‘The justices had phones [by 1967], and they knew that they talked about their most private stuff on those phones," says Jennifer Stisa Granick, director of civil liberties at the Stanford Center for Internet and Society. "So a case that considered warrantless wiretapping looks a lot different. ... And I think that same exact dynamic is happening here.’ It's unclear when or if the legal dispute over the San Bernardino iPhone will reach the Supreme Court, but the court's past opinions are informative as the Apple-FBI legal clash continues. Below are some of the key cases in which the top court has been asked to evaluate similar concerns” (Lachance). Privacy questions go back and forth in court cases over the course of history, and with the new interconnected society, privacy questions at the Supreme Court level will become increasingly important.

Protecting Yourself If our government decides that privacy is not guaranteed to the citizens, we will need to be able to protect ourselves from our own government and powerful companies that have unfettered access to our data, the key to accessing how the minds of the consumer operates. If this is the new legal norm, greater data freedom among companies will allow for employers to search through much more information before hiring someone. “Employment law in most states provides little protection to workers who are punished for their online postings, said George Lenard, an employment lawyer at Harris Dowell Fisher & Harris in St. Louis. The main exceptions are workers who are covered by collective bargaining agreements or by special protections for public-sector employees; members of these groups can be dismissed only ‘for cause.’ The rest of us are ‘at will’ employees, holding on to our jobs only at the whim of our employers, and thus vulnerable” (Internet Society).

Balancing Privacy and Liberty Ben Franklin believed that there was an inverse relationship between our sense of security and our sense of liberty, saying that there is no price of security worth sacrificing any freedom for. President Obama shared similar views regarding privacy. In a speech regarding the balance between privacy and security, Obama says, “I can talk broadly about the balance that we have to strike. Leaks related to national security can put people at risk. They can put men and women in uniform that I’ve sent into the battlefield at risk. They can put some of our intelligence officers, who are in various, dangerous situations that are easily compromised, at risk. U.S. national security is dependent on those folks being able to operate with confidence that folks back home have their backs, so they're not just left out there high and dry, and potentially put in even more danger than they may already be. And so I make no apologies, and I don't think the American people would expect me as Commander-in-Chief not to be concerned about information that might compromise their missions or might get them killed. Now, the flip side of it is we also live in a democracy where a free press, free expression, and the open flow of information helps hold me accountable, helps hold our government accountable, and helps our democracy function" (Obama). President Obama chooses security over privacy, but that is generally the case in times of war. With enemies having the potential to harm Americans if they have more and more information about whereabouts and strategies, the president has no choice but to battle the spread of information with the collection of more information of the citizens to try to reinforce security. The subtext of this speech is that Edward Snowden, former CIA operative and NSA leaker, leaked information regarding US National security operations and NSA programs that he thought were an invasion of privacy. He has even made a case to be pardoned on the case that he opposes the national surveillance state. “Edward Snowden has set out the case for Barack Obama granting him a pardon before the US president leaves office in January, arguing that the disclosure of the scale of surveillance by US and British intelligence agencies was not only morally right but had left citizens better off. The US whistleblower’s comments, made in an interview with the Guardian, came as supporters, including his US lawyer, stepped up a campaign for a presidential pardon. Snowden is wanted in the US, where he is accused of violating the Espionage Act and faces at least 30 years in jail” (Friedman).

Conclusion

Privacy and security issues are very important to the future of our country in this crucial time of maturation of the internet. We have yet to acknowledge the power of freely accessible internet use for both good and for other purposes like companies making profit, and hackers exploiting the technology. The US Government will face a myriad of choices as the Supreme Court will be forced to decide on the issue of internet privacy in the coming years.

Bibliography

Lachance, Naomi. "At Supreme Court, Debate Over Phone Privacy Has A Long History." NPR. NPR, 8 Mar. 2016. Web. 03 Nov. 2016.

"Internet Society." Protecting Your Identity. Web. 04 Nov. 2016.

Friedman, Mark. "Edward Snowden: Hero Or Traitor? Considering The Implications For Canadian National Security And Whistleblower Law." Dalhousie Journal Of Legal Studies 24.(2015): 1-23. Academic Search Complete. Web. 4 Nov. 2016.

Woodward, John D., Jr. Privacy Vs. Security : Electronic Surveillance In The Nation's Capital. n.p.: Santa Monica, CA. : RAND, 2002, 2002. MU Library Catalog. Web. 4 Nov. 2016.

Bahadur, Gary, William, M.S Chan, and Chris Weber. Privacy Defended. [Electronic Resource] : Protecting Yourself Online. n.p.: Indianapolis, IN : Que, 2002, 2002. MU Library Catalog. Web. 4 Nov. 2016.

OBAMA, BARACK. "Security And Privacy: In Search Of A Balance." Vital Speeches Of The Day 80.3 (2014): 102-107. Academic Search Complete. Web. 4 Nov. 2016.

Stross, Randall. "How to Lose Your Job on Your Own Time." The New York Times. The New York Times, 29 Dec. 2007. Web. 04 Nov. 2016.

Chapter 4: Protecting Your Digital Footprint By: Brittany Czodli

Abstract: Today’s people are spending enormous amounts of time and giving out enormous amounts of information via the Internet. This brings about questions relating to privacy such as; how protected is the data you are putting online? Who is looking at your data? And how can you protect it? These are all questions that you should be asking yourself if you are an avid Internet user. The following research paper seeks to answer these questions for you by examining what an individual’s digital footprint is and the steps that can be taken in order to protect one’s . Research for this paper was gathered over a three to four- week time period.

Introduction: There are currently more than 3 billion Internet users in the world today and that number is growing every single second (David Gorodyansky). With the rise of the Internet and digital communication through smart phones, laptops, tablets and so on the concern for one’s digital privacy rose with it. Today people are giving out more personal information about themselves online than ever before. They are sharing their locations, contact information, credit card numbers on sites such as Facebook, Twitter, LinkedIn, Amazon, and many other websites. Beyond just these personal facts about one’s self being let out online people are also sharing their interest, what they are looking at, what they like, and what they don’t with people online, whether they are aware of it or not (David Gorodyansky). Whether it someone is shopping for a new sweater or looking up information about a project they are working on, a marketer, government official, hacker, or data miner is watching, saving, tracking, and even selling your clicks, likes and so on for one reason or another. Internet users are not aware of what is going on behind their computer and just how much data is being generated. Cioccheti, a writer on digital privacy, stated, “once digitized, such information is virtually irretrievable and may be intercepted or purchased by commercial entities, governments, or individuals for marketing or other purposes” (Markwick, Dias, & Palfery, 2010, p 7). It is important in this day in age that Internet users know how the information they are putting online may be being used as well as how to protect it.

Digital Definitions: So before we dive into who may be looking at your digital footprint and how you can go about protecting it we first must understand what a person’s digital footprint is exactly. According to the Internet Society, “Your digital footprint is all the stuff you leave behind as you use the Internet. Comments on social media, Skype calls, applications used, emails delivered and sent- it’s part of your online history and can potentially be seen by other people, or tracked in a database” (Internet Society). So how do our digital footprints get left online? If you are an online shopper, a social media user, or own a mobile phone, laptop or tablet you are leaving behind a digital footprint.

Some ways that your digital footprint is left behind according to the Internet Society are through retailers leaving cookies on your system to track your movement while you travel from site to site. The main purpose of companies doing this is so that they can put advertisements on your browsers for products you have recently looked at or may be interested based on your online history (Internet Society). It is not just retail websites that track what you are doing online, every comment, status, or picture you post on social media is being tracked and recorded, therefore, making up your online identity. The use and privacy of your social media accounts is very crucial in this day in age. Although we will dive into this topic in more detail later on, make sure that you are always careful about what you post online; once it is published it stays online forever. What you do, look at, and put online makes up your online identity. Although this online identity may not always be a true justification of our actual identity companies are seeking to get closer to you through this online identity (Britton, Katherine). According to findings from Pew and Research Center, nearly half of online users are becoming more aware of their digital footprints and starting to protect their digital privacy (Britton, Katherine). If you haven’t already it is time for you to join this half percent and start protecting yours. Digital privacy is the protection of the information of individual’s private information online. It should be your decision if what you put online is sold or used by a third party and there are many ways that you as an individual internet user can make sure you are protecting yourself and personal information and documents online.

Why Protection is Important: Your privacy on the Internet depends on a number of things, your ability to protect your data, the amount of data you are releasing, who allow seeing your personal information, and what websites you are sharing personal information on. You must remember that when you are looking at all this stuff online, it is looking back at you (Britton, Katherine). Extensive research was done before finalizing this paper on the absolute necessary and best practices when protecting your digital footprint. The following steps listed below are in no particular order but should all be considered and utilized in order to maintain a good online, private, identity.

A common argument that online users state when talking about their digital footprint and digital privacy is. “Why should I care, I have nothing to hide” (Mansfield-Devine, Steve). However, as stated before you should care because digital footprints contain a lot about you and that information about you is distributed to third parties, sometimes for monetary value (Mansfield-Devine, Steve). Before I go on I want to address that your digital footprint is not all bad although it does have its cost to your privacy it also has its benefits for quickly navigating the Web. Some specific benefits are that it saves you time when visiting frequently used websites. Websites that you use almost every day can save your log in name and password so all you have to do is click and you are logged into your account. This also applies to online stores who save your credit card on file for speedy check out (Mansfield-Devine, Steve). Although these can guarantee convince they also pose a threat to your privacy. Through my studies I narrowed it down to four reasons why Internet users should care about their digital privacy. First, you want to maintain your . Like I have stated numerous times your online usage creates your own personal online identity, do you want everyone knowing what you are doing online and forming an opinion of you based on that? Sometimes opinions can be gathered from data of your online activities that are taken out of context. For example, Internet Society, said that if you are out to dinner with friends at a bar and pay for the bill and then go and pay for your parking it could form a person looking at your bank records to believe that you drove after spending a decent amount of money at a bar, when that could’ve not been the case at all (Internet Society). The second reason is maintaining the ability to decide where and how your personal information is shared. Let’s say that you have a health issue going on by searching your medical issue, booking doctors’ appointments online, and even messaging a family member or friend about it means that a third party could get this information through cookies and other forms of data gathering (Internet Society). You may want your family knowing about your personal life but do you want a random company, or even your boss knowing? Thirdly, having an unprotected digital footprint can make you more vulnerable to financial loss and theft (Mansfield-Devine, Steve). Just like we talked about earlier how it’s convenient for online retail stores to keep your credit card number saved for a quick purchase it can also be extremely risky. A hacker could break into a company’s database and steal your card number. Take for example in 2013 when Targets online database was hacked and millions of people’s emails and credit card information was stolen (Ziener, C.). Over 40 million target customers became the victims of a breach in their digital privacy and theft because they added their credit cards into the Target website to be saved (Ziener, C.). Finally, and although this is not as prevalent for most Americans, protecting your digital privacy also means protecting your freedom. In many countries outside America social media platforms are monitored or even forbidden in order to limit what users are saying online (Ziener, C.). So even though you may not have anything to hide you may be at risk by just giving your location, credit card number, or personal information.

Steps to Protection: There are many ways to protect your digital footprint online, however I just want to share a few of the overall most important ones I found while conducting my research. The following list of six steps has all been credited to scholars who dedicate their time to researching online privacy and how we can protect it. A computer programmer at Microsoft came out with an article recently on what he believes are the crucial steps to take when protecting your digital privacy. Let us look into some of these steps in more detail. The first step to always consider when thinking about your online privacy is to make sure the website you are on is credible and safe. All credible websites should have a Privacy & Policy section that states what data the website may be gathering, how they use, share, and secure your data. If you are not able to find the Privacy & Policy statement of the website or it does not seem credible, move on to a different website (Buchmann, Johannes). The second step is to create strong passwords and keep all important and private files, even just on your desktop, under a secure password protected folder. So what is a strong password? According to an article from the ACM Digital Library, there are certain steps to take when creating a strong password. First, don’t use anything about you that could easily be guessed like your moms madden name, your first pets name, etc. Secondly, your password shouldn’t a dictionary word or combination of dictionary words. Finally, your password should contain at least 12 characters, some of those including symbols, numbers, capital letters and lower case letters. Having strong passwords can lead to a stronger protection against data miners and hackers (Buchmann, Johannes).

The next step is to turn on cookie notices in your web browser, or use cookie management software. Remember that cookies are little pieces of information that is saved on web sites or your computer. Cookies are the passwords and IDs that are saved for you on certain websites for a fast log in. However, there are other uses for cookies such as data mining and tracking your online usage for marketing and other purposes. You as an Internet user can control cookies and what pieces of information they are taking. Netscape, allows you to see a notice when a site tries to write a cookie to your hard drive. Internet Explorer also allows you to turn off cookies in a notification box. Make sure that if one of these boxes pop up you only enable cookies for sites you 100% trust (Buchmann, Johannes). The next step you can take to protect yourself online is to monitor what you trust. We have been hearing this or preaching this to our children since the rise of Facebook, Instagram and Twitter, “Be careful what you post anyone can see it!!” but it’s true, anyone can see what you post if you aren’t careful and that could backfire on you and your privacy. However, this goes for beyond posting a picture you may not want a future employer to see. You also want to make sure that you are not posting personal information on social media or other websites. You are in charge of what information about yourself you reveal. Ways to protect this is to make sure the sight you are posting is credible and it is necessary for you to give out information and also reviewing the privacy settings of your website (Internet Society). Another step that a lot of Internet users do not think about is using encryption. Again you may be asking yourself, if I have nothing to hide why would I encrypt my information? For a number of reasons, you may want to. Encrypting information such as billing, social security numbers, and credit cards can protect you from identity or financial fraud. There are websites available for free that you can use to protect your digital privacy such as PGP, which runs on almost all computers and is safe. Apple Inc. encrypts all of their customer’s information and usage. Encrypting something means that you are putting the information in a secret code that is almost impossible to crack. Don’t believe me? The FBI once tried cracking some of Apples encryption to find a serial killer, Apple would not break the customer’s encryption and the FBI couldn’t do it themselves. Talk about a tough code to break (Buchmann, Johannes).

Finally, the next step you can take to ensure online privacy is not only to make sure the website you are using is secure but also the Wi-Fi you are using is too. Public Wi-Fi should always be checked before joining. Many hackers can get onto your computer through your Wi-Fi. Just like making sure the website you are accessing is reliable make sure the Wi-Fi is too (Buchmann, Johannes). Before I conclude I want you to take a look at this infographic made about protecting your digital footprint. It gives you some more statistics and some facts about protecting yourself online:

In Conclusion After reading this essay I hope that you have a better understanding of what your digital footprint is, how marketers, data miners, and hackers are using your information and why they want them, as well as how to protect your digital privacy. Protecting your online identity is a huge issue that you have control over protecting. As our usage of the Internet continues to increase so does the threat to our privacy. Even if you have nothing to hide you should always make sure you are protecting your information online just like you would in your day to day activates

Bibliography

Britton, Katherine. "Handling Privacy And Security In The Internet Of Things." Journal Of Internet Law 19.10 (2016): 3-7. Computers & Applied Sciences Complete. Web. 23 Oct. 2016.

Mansfield-Devine, Steve. "The Battle For Privacy." Network Security 2016.6 (2016): 11-15. Computers & Applied Sciences Complete. Web. 23 Oct. 2016.

"Lack of Trust in Internet Privacy and Security May Deter Economic and Other Online Activities." Home Page. National Telecommunications & Information Administration, n.d. Web. 23 Oct. 2016

David Gorodyansky, "Internet Privacy and Security: A Shared Responsibility." Wired.com. Conde Nast Digital, n.d. Web. 23 Oct. 2016.

"Internet Society." Policy Brief: Privacy. Internet Society, n.d. Web. 23 Oct. 2016.

Ziener, C. "Protect Yourself Online: Learn Easy Ways To Keep Your PC, Your Privacy, And Your Wallet Safe On The Internet." Library Journal 126.10 (n.d.): 208. Social Sciences Citation Index. Web. 23 Oct. 2016.

Buchmann, Johannes. Internet Privacy. [Electronic Resource]: Options For Adequate Realisation. n.p.: Weisbaden : Springer, 2013, 2013. MU Library Catalog. Web. 23 Oct. 2016.

Marwick, A.E., Diaz, D.M. & Palfrey J. (2010, April 21). Youth Privacy, and Reputation. [ Electronic Paper Collection]. Cambridge, Massachusetts. Harvard.

End of Book

Thank you for reading!