How Companies Get Your Data â And What They Can Do With It
Curious about what kinds of personal and even private data you may be exposing through the course of a normal day on the internet? How about using âall kindsâ as a starting point?
Here, adapted from my new book, Keeping Up: Backgrounders to all the big technology trends you can’t afford to ignore, is a way to break down the scope and nature of the problem by platform.
Financial transactions
Take a moment to visualize whatâs involved in a simple online credit card purchase. You probably signed into the merchantâs website using your email address as an account identifier and a (hopefully) unique password. After browsing a few pages, youâll add one or more more items to the siteâs virtual shopping cart.
When youâve got everything you need, youâll begin the checkout process, entering shipping information, including a street address and your phone number. You might also enter the account number of the loyalty card the merchant sent you and a coupon code you received in an email marketing message.
Of course, the key step involves entering your payment information. For a credit card, this will probably include the card ownerâs name and address, and the cardâs number, expiration date, and a security code.
Assuming the merchant’s infrastructure is compliant with Payment Card Industry Data Security Standard (PCI-DSS) protocols for handling financial information, then itâs relatively unlikely that this information will be stolen and sold by criminals. But either way, it will still exist within the merchantâs own database.
To flesh all this out a bit, understand that using your loyalty card account and coupon code can communicate a lot of information about your shopping and lifestyle preferences. Not to mention records of some of your previous activities. And your site account comes with contact information and your home location.
All of that information can, at least in theory, be stitched together to create a robust profile of you as a consumer and citizen.
ââItâs for these reasons that I personally prefer using third-party e-commerce payment systems like PayPal because such transactions leave no record of my specific payment method on the merchantâs own databases.
Devices
Modern operating systems are built from the ground up to connect to the internet in multiple ways. Theyâll often automatically query online software repositories for patches and updates and âaskâ for remote help when something goes wrong.
Some performance diagnostics data is sent and stored online, where it can contribute to statistical analysis or bug diagnosis and fixes. Individual software packages might connect to remote servers independently of the OS to get their own things done.
All thatâs fine. Except that you might have a hard time being sure whether all the data coming and going between your device and the internet is stuff youâre OK sharing.
Can you know that private files and personal information arenât being swept in with all the other data? And are you confident that none of your data will ever accidentally find its way into some unexpected application lying beyond your control?
To illustrate the problem, Iâd refer you to devices powered by digital assistants like Amazonâs Alexa and the Google Assistant (âOK Googleâ). Since, by definition, the microphones used by digital assistants are constantly listening for their key word (âAlexaâ¦â), everything anyone says within range of the device is registered.
At least some of those conversations are also recorded and stored online and, as it turns out, some of those have eventually been heard by human beings working for the vendor. In at least one case, an inadvertently-recorded conversation was used to convict a murder suspect (not that weâre opposed to convicting murderers).
Amazon, Google, and other players in this space are aware of the issue and are trying to address it. But itâs unlikely theyâll ever fully solve it. Remember, convenience, security, and privacy donât work well together.
Now if you think the information from computers and tablets that can be tracked and recorded is creepy, wait âtill you hear about thermostats and light bulbs.
As more and more household appliances and tools are adopted as part of âsmart homeâ systems, more and more streams of performance data will be generated alongside them.
And, as has already been demonstrated in multiple real-world applications, all that data can be programmatically interpreted to reveal significant information about whatâs going on in a home and whoâs doing it.ââ
Mobile devices
Have you ever stopped in the middle of a journey, pulled out your smartphone, and checked a digital map for directions? Of course you have.
Well, the map application is using your current location information and sending you valuable information but, at the same time, youâre sending some equally valuable information back. What kind of information might that be?
I once read about a mischievous fellow in Germany who borrowed a few dozen smartphones, loaded them up on a kidsâ wagon, and slowly pulled the wagon down the middle of an empty city street. It wasnât long before Google Maps was reporting a serious traffic jam where there wasnât one.
How does the Google Maps app know more about your local traffic conditions than you do? One important class of data that feeds their system is obtained through constant monitoring of the location, velocity, and direction of movement of every active Android phone they can reach – including your Android phone.
I, for one, appreciate this service and I donât much mind the way my data is used. But Iâm also aware that, one day, that data might be used in ways that sharply conflict with my interests. Call it a calculated risk.
Of course, itâs not just GPS-based movement information that Google and Apple – the creators of the two most popular mobile operating systems – are getting. They, along with a few other industry players, are also handling the records of all of our search engine activity and the data returned by exercise and health monitoring applications.
In other words, should they decide to, many tech companies could effortlessly compile profiles describing our precise movements, plans, and health status. And from there, itâs not a huge leap to imagine the owners of such data predicting what weâre likely to do in the coming weeks and months.
Web browsers
Most of us use web browsers for our daily interactions with the internet. And, all things considered, web browsers are pretty miraculous creations. They often act as an impossibly powerful concierge, bringing us all the riches of humanity without even breaking into a sweat.
But, as Iâm sure you can already anticipate, all that power comes with a trade-off.
For just a taste of the information your browser freely shares about you, take a look at the Google Analytics page shown in the figure below.


