How to become the “owner” of your data and privacy

Background on Big Data and Privacy

In this era of the Internet of Things, data is the basis of almost everything

For example, today, WeChat(a Chinese multi-purpose messaging, social media and mobile payment app developed by Tencent) already has more than 900 million independent device users every month.

So, what is Data Privacy? And why does it matter?

How about Data Security? Is it the same as Data Privacy?

There are cases that hackers get access to your personal information through your social media (photos, videos, snaps, and other clues)

Many people like to post selfies and photos of their lives on social media. For you, it’s just an everyday photo. For hackers, it’s easy to analyze the time of taking the photo, the camera or phone model, and the location of the photo with tolls that don’t even require any technical skills.

In today’s society, data is based on the collection of events, and privacy is the key to the collection of events.

There are a lot of people who seek to minimize their online footprint in order to reduce their data production. By doing this, they believe that they can stay in a relatively safe and private zone.

Data Privacy = Who + When + Where + What

In fact, that’s what many people do in the real world as well.

dressed-down celebrities wearing face masks on the street

Become the “owner” of your data and privacy

To overcome the concern of losing data control and privacy, what must individuals be doing?

I will offer some practical advice about how to take control of our data and information.

  1. Try to use different passwords for different websites, if you can’t remember all the passwords, you can try to distinguish them by categories, for instance, different passwords for bank accounts, emails, social media accounts, etc.
  2. Do not sign up for too many personal notifications on social media.
  3. Be careful on all the agreements that relate to your personal information/data, do not provide everything they asked for.
  4. Keep tabs on suspicious activity and get an early detection by installing security apps on your devices.
  5. Control the Access to your social media accounts.
  6. Pay Attention to risks: set passwords for all of your personal devices; always log out of your social media accounts after use; be aware of unknown links/emails.
  7. Always classify your database on your understanding — know who can access it.
  8. Store your information in the right place — know where it is and how secure it is.

The Takeaway

At this point, we should understand that we can not stay in absolute private space. Data is being produced in every second around us. It is important to know how to take control of your own data and privacy.