Your Online Identity is Not Your Own!

by | Oct 4, 2023 | Security | 0 comments

Here’s how companies use information about you and what you can do to protect it

One of the most valuable things you own is YOU.

Your identity and related information includes the basics – where you live, your age, and your gender. But it also includes your interests, who you know, and what you buy.

And while some companies are on record saying they don’t sell collected information, your data can still be used to help advertisers and third parties push targeted information in your direction.

So, do you know who has data about you? Here’s the life cycle of your personal data and what to do to protect it.

It gets collected. Think about the organizations that legally collect information about your identity – your employer, government entities, insurance companies, banks, credit reporting agencies, and non-profit organizations. And then add those companies you give your identity to freely – like Google, Facebook, LinkedIn, X, and any other website or social media platform you visit.

It gets stored. Once your identity gets collected, it then needs to be stored somewhere. Storage is most often on servers or locally on a computer or mobile device. This is one of the core concerns with Tik-Tok, a Chinese-originated short video service. The concern is that a foreign entity will have stored U.S. citizen’s interests and behaviors that can help identify potential targets that can be manipulated.

It gets analyzed. Once information related to your identity and interests are collected, it is analyzed. While many companies now say they don’t sell your information to other companies, your data is still being monetized. Your viewing behavior can also be actively manipulated by the sites you view. So if you read articles about cats, you are going to get a lot more articles about cats and get ads that relate to cat-lover behavior. This is often so subtle, you do not realize it is happening.

It gets accessed. If your information is considered a public record, anybody can see it. Business licenses, property tax records and real estate ownership are just a few examples of personal information that anyone can access.

It gets stolen. Identity thieves are always looking for ways to access your information. Thieves either hack one of the organizations that collects your confidential information or find a way to trick you into giving them your information, with techniques such as phishing emails.

What you can do

  • Opt-out of providing personal information. The best place to start with protecting your identity is knowing who has access to it and asking if they really need it. Consider opting out of providing information if possible. This includes using private browser settings when on the internet.
  • Be vigilant with the data you possess. While you can’t control how secure an insurance company’s servers are, you can control how secure you handle the information and documents you possess. Be on the lookout for phishing emails, verify requests for your information and don’t forget about getting rid of documents the old-fashioned way with a shredder.
  • Deliberately monetize YOUR identity. If companies can monetize your identity, then so can you! Stop giving away your identity without a thought. Consider how these tech companies are using your identity, then see if you can think of several ideas about how YOU can make money from your own personal experiences instead of these companies.

At Integrated Tax Services, we have a commitment to your privacy.

During the process of our work, we’ll collect non-public, personal information. We do not disclose your personal and confidential information to anyone outside our firm without your written permission, or unless required by law.