This guide is adapted from Pratt Institute Libraries' Internet and Data Privacy Guide, created by Sydni Meyer.
Social media, email, and web browsers are first-party data collection parties. When you interact with these sites, information about your behavior is stored in the company’s proprietary databases.First-party data collectors can make money selling your data to third-parties. Even if the service is "free," companies profit from your activity on their website and personal information revealed through website interaction.
While using any digital tools comes with some risk to your privacy, using selective privacy tools changing certain settings in online accounts can reduce that risk. Changing your privacy settings in your online accounts affects what information public users see about you, but the given social media company will still have all of the information you share on its platform.
Please note that because digital platforms like social media make profits from the personal information you share, the information that they share about changing privacy settings is helpful, but may not be fully transparent. It's therefore good to view not only what the platforms themselves say about their privacy settings, but also what other sources that are less likely to have a commercial interest in the platform say.
Keep in mind that technology and digital platform are continually changing, and there is no "silver bullet," or full solution to protecting digital privacy. You'll want to continue practice awareness of potential privacy risks and be mindful about what information you share online.
This page includes a non-exhaustive list of ways to better protect your privacy and data while using first-party data collectors like social media, email, and other internet services.
These simple privacy tools offer easy ways to improve your digital privacy when searching and browsing the Internet. If you feel short on time, these are good first steps. (Please note that these are offered as a starting point, not a comprehensive list.)
As mentioned above, please note that because digital platforms like social media make profits from the personal information you share, the information that they share about changing privacy settings is helpful, but may not be fully transparent. It's therefore good to view not only what the platforms themselves say about their privacy settings, but also what other sources that are less likely to have a commercial interest in the platform say.
Image Credit: https://securityboulevard.com/2020/03/vpn-a-key-to-securing-an-online-work-environment/
Encryption technologies use a mathematical formula to scramble information, rendering it unreadable unless you have a key to decrypt the encrypted information. Different forms of encryption are applied to different sorts of data. Text messages, emails, or communications with apps are examples of data in transit, while computer files, external hard drives, and information stored on a cell phone are data at rest. Data in transit requires different encryption strategies than data at rest.
Encryption technologies are a tool in your privacy toolkit, but encryption alone will not solve your privacy issues. Below is a discussion of two different kinds of encryption technologies for data in transit, Tor Browsers and the Signal messaging app. While both technologies are helpful tools with storied advocates, critical questions should be raised about the early research and development of each, particularly for users driven to use Tor and Signal to avoid government surveillance.
Image Credit: By The Tor Project, Inc. - https://media.torproject.org/image/official-images/2011-tor-logo-flat.svg, CC BY 3.0 us, https://commons.wikimedia.org/w/index.php?curid=20851621
Image Credit: https://github.com/signalapp/Signal-iOS/blob/master/Signal/iTunesArtwork%403x.png