Protecting Your Online Privacy

Information is the currency of the Internet. Your online privacy depends on controlling what personal information you provide and who can access it.

Is Your Data at Risk Online?

Daily online activities may expose personal information that criminals can exploit. This includes sensitive data like your IP address, email, physical location, home/work address. Online shopping often requires credit card details and home address.

How Your Information Gets Online

Companies, government agencies and others collect data when you:

  • Create online accounts
  • Shop online
  • Enter contests
  • Take surveys
  • Download free software
  • Browse websites
  • Use computer/mobile apps
  • Post photos/statuses on social media

What Happens to Your Data

Microsoft and responsible companies use personal data to improve your experience with their products/services - like remembering preferences for transactions or offering personalized content.

Online transactions (registrations/purchases) link to you via shipping addresses or credit cards. Most companies collect general non-identifying data. Websites track visited pages/clicks without personal tracking.

Personal data may appear online via resumes, chats, social media (Facebook), or Twitter discussions.

Others may publish information about you. Friends might post about you or share family photos. Public records are often searchable: home photos/values, birth certificates, signatures. Churches, clubs and professional associations may disclose your name, employer and donation history.

Why Online Data Matters

Available online information matters because:

  • Companies/employers may use your online reputation to assess job suitability
  • Criminals can use online data for phishing scams, identity theft and other crimes. Follow this article's tips to reduce risks

Online information is searchable and often permanent. Unlike paper records, powerful search engines/data aggregators can easily compile complete profiles.

Once published online, data remains forever. Depending on the company's privacy policy, anyone may access it. Sites may archive everything you post plus collected data. Friends/ex-friends might share information, or it could leak via hacks/security breaches.

Online Sharing Tips

First review website privacy policies

Privacy policies (usually in website statements) should clearly explain what data is collected, how it's used/shared/protected, and how to edit/delete it. Privacy statements should always be visible (e.g., Microsoft's appears at every page bottom). No privacy statement? Don't deal with them!

Don't overshare

  • Never post anything online you wouldn't make public
  • Minimize identifying/location details. Sharing event attendance seems harmless but reveals your whereabouts
  • Keep account numbers, usernames/passwords private
  • Share primary email/IM usernames only with trusted people/organizations. Avoid listing them in directories/job sites
  • Enter only required fields (often starred *) in registration forms
  • Check app permissions, especially on phones. Carefully grant location/photo/camera/microphone access

Choose friends carefully

Add social media friends/contacts cautiously. Verify accounts belong to who they claim. When unsure, limit what they can see in your profile.

Set profile/blog privacy levels

Review website settings controlling who sees your online profile/photos, how people find you, who views/comments on posts, and how to block unwanted access. Check social media privacy settings to avoid oversharing.

Monitor Others' Posts

  • Google yourself using major search engines. Check text/images. If you find sensitive information, contact the site to request removal
  • Regularly check what others post about you in blogs/social media. Ask friends not to share family photos without permission. Request unwanted information/photos be removed
  • Enable tag review on Facebook/social media so others can't tag you without approval