{"id":2522,"date":"2017-07-07T13:00:07","date_gmt":"2017-07-07T13:00:07","guid":{"rendered":"https:\/\/tsisupport.com\/?p=2522"},"modified":"2021-07-07T05:09:32","modified_gmt":"2021-07-07T09:09:32","slug":"online-privacy-dead","status":"publish","type":"post","link":"https:\/\/tsisupport.com\/tsistaging\/?p=2522","title":{"rendered":"Digital Privacy &#038; Digital Security: Is Online Privacy Dead?"},"content":{"rendered":"<p>Privacy\u2026we all talk about it and we\u2019re all concerned with losing it, but does it really matter?\u00a0 There are <a href=\"http:\/\/money.cnn.com\/2017\/05\/03\/technology\/facebook-earnings\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">1.94 billion<\/a> active monthly Facebook users, <a href=\"http:\/\/www.internetlivestats.com\/google-search-statistics\/\" target=\"_blank\" rel=\"noopener noreferrer\">3.5 billion<\/a> daily Google searches, and over <a href=\"http:\/\/www.wordstream.com\/blog\/ws\/2017\/04\/20\/instagram-statistics\" target=\"_blank\" rel=\"noopener noreferrer\">95 million<\/a> photos &amp; videos shared on Instagram each day.\u00a0 These are a few examples of the many apps, fun quizzes &amp; surveys, or even online purchases, we conduct while granting third party access to our information in exchange to use.\u00a0 What many fail to realize is that your privacy is the currency being traded to have these innovations at your fingertips. Which is why I feel that we\u2019ve reached a pivotal point where privacy the way we understand it is pretty much lost. Your information is out there regardless of how hard you demand complete anonymity.\u00a0 In fact, despite the calls for increased discretion, I feel we will continue to move toward even more openness, and here\u2019s why\u2026<\/p>\n<p><strong><span style=\"color: #800000;\">Terms &amp; Conditions Apply<\/span><\/strong><\/p>\n<p>According to an EMC Privacy Index study that involved over 15K participants across the globe, nearly 51% of respondents said they would be unwilling to trade some privacy in order to have greater convenience &amp; ease.\u00a0 Yet, what many do not realize is that they are already granting access every single day. When you install a free web browser, email, social media account, stream a video, or even use a purchased device like an iPhone, you can almost guarantee there are legal agreements and\/or terms &amp; conditions you must accept prior to using.\u00a0 Rarely do we spend time reading this information, which is what most organizations rely on really.<\/p>\n<p>Take a recent <a href=\"https:\/\/www.blog.google\/products\/gmail\/g-suite-gains-traction-in-the-enterprise-g-suites-gmail-and-consumer-gmail-to-more-closely-align\/\" target=\"_blank\" rel=\"noopener noreferrer\">press release<\/a> from Google that made headlines for what appeared to be a step in the right direction for consumer privacy.\u00a0 Their free Gmail product will no longer mine your emails to personalize advertising.\u00a0 Now consider just for a moment, how many users were likely unaware their emails were being scanned in the first place.\u00a0 Further, ponder why the decision was made to stop. Google\u2019s ever-expanding portfolio of products were not mentioned in the release, so it is fair to say that a more effective method for acquiring data was determined. A few examples which come to mind are users who remain logged into their Google account while browsing the web, conducting searches, making purchases, or go through their social feeds.<\/p>\n<p><span style=\"color: #800000;\"><strong>Smart Devices? Think Data Collection&#8230;<\/strong><\/span><\/p>\n<p>Take the growing popularity for the Internet of Things (IOT), products like <a href=\"https:\/\/www.amazon.com\/Amazon-Echo-And-Alexa-Devices\/b?ie=UTF8&amp;node=9818047011\" target=\"_blank\" rel=\"noopener noreferrer\">Amazon Alexa<\/a>, <a href=\"https:\/\/madeby.google.com\/home\/\" target=\"_blank\" rel=\"noopener noreferrer\">Google Home<\/a>, and countless others, are experiencing incredible consumer adoption rates.\u00a0 These connected devices are precisely the type of convenience respondents were so unwilling to barter their privacy away for. Smart devices and digital assistants are only as effective as the amount of data they have stored to query from.\u00a0 Information such as user travel patterns, dialects, previous searches, purchase history, as well as any other behavioral transactions input into these devices are collected. The public position promotes building predictive algorithms that are more competently responsive to your request. Details pertaining to the length of time your <a href=\"https:\/\/www.wired.com\/2016\/12\/alexa-and-google-record-your-voice\/\" target=\"_blank\" rel=\"noopener noreferrer\">activity is stored<\/a> however, remain intentionally opaque, leaving many wondering just what the corporations know about us.<\/p>\n<p><span style=\"color: #800000;\"><strong>So What Are The Choices?<\/strong><\/span><\/p>\n<p>It may seem at times that there are only two choices.\u00a0 Either accepting the status quo of privacy being obsolete, or continue to fight for privacy and security.\u00a0 The problem with the second option is that it is a bit paradoxical to think that we can have social technologies, require corporations to provide complete transparency, and be allowed to accept terms &amp; conditions with the notion that corporations will keep your best interest in mind, all at no cost or providing anything in return.<\/p>\n<p>The fact is that we have reached the point where our daily lives have become interconnected with these conveniences.\u00a0 Can anyone really say they are willing to delete their social media profiles, no longer use Google when they have a question, ditch their mobile device, or stop buying items online? Of course not, nor should they feel compelled to do so. Businesses are not inherently evil for collecting data, it\u2019s how they thrive in an increasingly complex global market.\u00a0 The real question is whether we unknowingly gave up our privacy to have these technological marvels, or if we were we a willing participant all along.<\/p>\n<div class=\"fl-builder-content fl-builder-content-8352 fl-builder-template fl-builder-row-template fl-builder-global-templates-locked\" data-post-id=\"8352\"><div class=\"fl-row fl-row-full-width fl-row-bg-photo fl-node-5ecccdbce25c0 fl-row-default-height fl-row-align-center fl-row-bg-overlay BlogCTA\" data-node=\"5ecccdbce25c0\">\n\t<div class=\"fl-row-content-wrap\">\n\t\t\t\t\t\t\t\t<div class=\"fl-row-content fl-row-fixed-width fl-node-content\">\n\t\t\n<div class=\"fl-col-group fl-node-5ecccdbce2d8e fl-col-group-equal-height fl-col-group-align-center fl-col-group-custom-width fl-col-group-responsive-reversed\" data-node=\"5ecccdbce2d8e\">\n\t\t\t<div class=\"fl-col fl-node-5ecccdbce2f49 fl-col-bg-color fl-col-small-custom-width\" data-node=\"5ecccdbce2f49\">\n\t<div class=\"fl-col-content fl-node-content\"><div class=\"fl-module fl-module-heading fl-node-5eccce25ec3d2 sec-title title-img-none\" data-node=\"5eccce25ec3d2\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<h2 class=\"fl-heading\">\n\t\t<span class=\"fl-heading-text\">Confident with Your IT Strategy?<\/span>\n\t<\/h2>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-rich-text fl-node-5eccce77546d9\" data-node=\"5eccce77546d9\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-rich-text\">\n\t<p>If you found the information in this blog post helpful and you'd like to discuss your business' technology strategy, then we'd be happy to hear from you.<\/p>\n<\/div>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-button fl-node-5ecccec3237e8 primary-btn\" data-node=\"5ecccec3237e8\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-button-wrap fl-button-width-auto fl-button-left\">\n\t\t\t<a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\"  target=\"_self\"  class=\"fl-button\" >\n\t\t\t\t\t\t\t<span class=\"fl-button-text\">Get in touch with tsi<\/span>\n\t\t\t\t\t<\/a>\n<\/div>\n\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t<div class=\"fl-col fl-node-5ecccf1e8a49c fl-col-bg-color fl-col-small fl-col-small-custom-width\" data-node=\"5ecccf1e8a49c\">\n\t<div class=\"fl-col-content fl-node-content\"><\/div>\n<\/div>\n\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<\/div><div class=\"uabb-js-breakpoint\" style=\"display: none;\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Privacy\u2026we all talk about it and we\u2019re all concerned with losing it, but does it really matter?\u00a0 There are 1.94 billion active monthly Facebook users, 3.5 billion daily Google searches, and over 95 million photos &amp; videos shared on Instagram each day.\u00a0 These are a few examples of the many apps, fun quizzes &amp; surveys,&hellip;<\/p>\n","protected":false},"author":2,"featured_media":8573,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[12],"tags":[342,33,176,178,21],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Digital Privacy &amp; Digital Security | Is Online Privacy Dead? | TSI<\/title>\n<meta name=\"description\" content=\"Learn whether online privacy is really, truly dead and understand some important details about digital privacy and digital security.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digital Privacy &amp; Digital Security | Is Online Privacy Dead? | TSI\" \/>\n<meta property=\"og:description\" content=\"Learn whether online privacy is really, truly dead and understand some important details about digital privacy and digital security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tsisupport.com\/tsistaging\/?p=2522\" \/>\n<meta property=\"og:site_name\" content=\"TSI Support\" \/>\n<meta property=\"article:published_time\" content=\"2017-07-07T13:00:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-07T09:09:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/07\/Privacy-Dead.fw_-1140x380-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\n\t<meta property=\"og:image:height\" content=\"380\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Roger Murray\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Murray\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2522\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2522\",\"name\":\"Digital Privacy & Digital Security | Is Online Privacy Dead? | TSI\",\"isPartOf\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2522#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2522#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/07\/Privacy-Dead.fw_-1140x380-1.png\",\"datePublished\":\"2017-07-07T13:00:07+00:00\",\"dateModified\":\"2021-07-07T09:09:32+00:00\",\"author\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9\"},\"description\":\"Learn whether online privacy is really, truly dead and understand some important details about digital privacy and digital security.\",\"breadcrumb\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2522#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tsisupport.com\/tsistaging\/?p=2522\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2522#primaryimage\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/07\/Privacy-Dead.fw_-1140x380-1.png\",\"contentUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/07\/Privacy-Dead.fw_-1140x380-1.png\",\"width\":1140,\"height\":380},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2522#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tsisupport.com\/tsistaging\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Digital Privacy &#038; Digital Security: Is Online Privacy Dead?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/\",\"name\":\"TSI Support\",\"description\":\"TSI - Technical Support International\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9\",\"name\":\"Roger Murray\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g\",\"caption\":\"Roger Murray\"},\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?author=2\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Digital Privacy & Digital Security | Is Online Privacy Dead? | TSI","description":"Learn whether online privacy is really, truly dead and understand some important details about digital privacy and digital security.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Digital Privacy & Digital Security | Is Online Privacy Dead? | TSI","og_description":"Learn whether online privacy is really, truly dead and understand some important details about digital privacy and digital security.","og_url":"https:\/\/tsisupport.com\/tsistaging\/?p=2522","og_site_name":"TSI Support","article_published_time":"2017-07-07T13:00:07+00:00","article_modified_time":"2021-07-07T09:09:32+00:00","og_image":[{"width":1140,"height":380,"url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/07\/Privacy-Dead.fw_-1140x380-1.png","type":"image\/png"}],"author":"Roger Murray","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Roger Murray","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2522","url":"https:\/\/tsisupport.com\/tsistaging\/?p=2522","name":"Digital Privacy & Digital Security | Is Online Privacy Dead? | TSI","isPartOf":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2522#primaryimage"},"image":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2522#primaryimage"},"thumbnailUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/07\/Privacy-Dead.fw_-1140x380-1.png","datePublished":"2017-07-07T13:00:07+00:00","dateModified":"2021-07-07T09:09:32+00:00","author":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9"},"description":"Learn whether online privacy is really, truly dead and understand some important details about digital privacy and digital security.","breadcrumb":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2522#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tsisupport.com\/tsistaging\/?p=2522"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2522#primaryimage","url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/07\/Privacy-Dead.fw_-1140x380-1.png","contentUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/07\/Privacy-Dead.fw_-1140x380-1.png","width":1140,"height":380},{"@type":"BreadcrumbList","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2522#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tsisupport.com\/tsistaging\/"},{"@type":"ListItem","position":2,"name":"Digital Privacy &#038; Digital Security: Is Online Privacy Dead?"}]},{"@type":"WebSite","@id":"https:\/\/tsisupport.com\/tsistaging\/#website","url":"https:\/\/tsisupport.com\/tsistaging\/","name":"TSI Support","description":"TSI - Technical Support International","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9","name":"Roger Murray","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g","caption":"Roger Murray"},"url":"https:\/\/tsisupport.com\/tsistaging\/?author=2"}]}},"_links":{"self":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/2522"}],"collection":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2522"}],"version-history":[{"count":0,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/2522\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/media\/8573"}],"wp:attachment":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2522"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2522"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2522"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}