You and your data
Do the preparation task first. Then read the article and do the exercises.
Preparation
As the internet and digital technology become a bigger part of our lives, more of our data becomes publicly accessible, leading to questions about privacy. So, how do we interact with the growing digital world without compromising the security of our information and our right to privacy?
Imagine that you want to learn a new language. You search 'Is German a difficult language?' on your phone. You click on a link and read an article with advice for learning German. There's a search function to find German courses, so you enter your city name. It asks you to activate location services to find courses near you. You click 'accept'. You then message a German friend to ask for her advice. When you look her up on social media, an advertisement for a book and an app called German for Beginners instantly pops up. Later the same day, while you're sending an email, you see an advert offering you a discount at a local language school. How did they know? The simple answer is online data. At all stages of your search, your devices, websites and applications were collecting data on your preferences and tracking your behaviour online. 'They' have been following you.
Who uses our data and why?
In the past, it was easy for people to keep track of their personal information. Like their possessions, people's information existed mostly in physical form: on paper, kept in a folder, locked in a cupboard or an office. Today, our personal information can be collected and stored online, and it's accessible to more people than ever before. Many of us share our physical location, our travel plans, our political opinions, our shopping interests and our family photos online – as key services like ordering a takeaway meal, booking a plane, taking part in a poll or buying new clothes now take place online and require us to give out our data.
Every search you make, service you use, message you send and item you buy is part of your 'digital footprint'. Companies and online platforms use this 'footprint' to track exactly what we are doing, from what links we click on to how much time we spend on a website. Based on your online activity, they can guess what you are interested in and what things you might want to buy. Knowing so much about you gives online platforms and companies a lot of power and a lot of money. By selling your data or providing targeted content, companies can turn your online activity into profit. This is the foundation of the growing industry of digital marketing.
Can you protect your data?
Yes … and no!
Some of the time our personal data is shared online with our consent. We post our birthday, our photographs and even our opinions online on social media. We know that this information is publicly accessible. However, our data often travels further than we realise, and can be used in ways that we did not intend. Certain news scandals about data breaches, where personal data has been lost, leaked or shared without consent, have recently made people much more aware of the potential dangers of sharing information online.
So, can we do anything to protect our data? Or should we just accept that in fact nothing is 'free' and sharing our data is the price we have to pay for using many online services? As people are increasingly aware of and worried about data protection, governments and organisations are taking a more active role in protecting privacy. For example, the European Union passed the General Data Protection Law, which regulates how personal information is collected online. However, there is still much work to be done.
As internet users, we should all have a say in how our data is used. It is important that we pay more attention to how data is acquired, where it is stored and how it is used. As the ways in which we use the internet continue to grow and change, we will need to stay informed and keep demanding new laws and regulations, and better information about how to protect ourselves. Safer Internet Day is an ideal time to find out more about this topic.
To protect my data, I follow several key practices. I always use strong, unique passwords and store them in a secure password manager. I enable two-factor authentication on all important accounts to add an extra layer of security. I also keep my software updated, avoid suspicious links, and regularly back up my data to prevent loss.
To protect my data, I prioritize technical security by using strong passwords and enabling two-factor authentication (2FA) for all essential accounts, including social media and medical portals. I also believe it is necessary to regularly create backups of important files, such as photos and videos, to prevent loss in the event of a device failure. It is vital to secure both information shared online and data stored directly on your phone or laptop.
I practice "digital hygiene" by being very selective about the personal information I share publicly, such as my birthday or health symptoms, to avoid potential social stigma or unintended data use. Before using new online tools, I always review the level of access they request regarding my files and personal information. Additionally, I make an effort to separate my personal and professional data to minimize risks if a data breach occurs on any single platform.
Since our "digital footprint" is now a permanent part of life, I try to stay informed about data protection laws, such as the GDPR, to understand my rights. When shopping online, I use antivirus software and verify that a seller has a physical headquarters before providing payment details. It is important to recognize that "free" services often come at the price of our data, and we should continue to demand transparency in how our information is turned into profit.
I store my personal data carefully to keep it safe. I use strong passwords for my accounts and do not share them with anyone. I also enable two-factor authentication when possible. My important files are saved on my personal devices and in secure cloud storage. I avoid sharing sensitive information online and only use trusted websites and apps. This helps protect my data from unauthorized access.
To protect my data, I always use strong passwords and enable two-factor authentication on my medical portals. I am careful about sharing my health symptoms on social media to avoid social stigma. Additionally, I only provide my sensitive information when I am sure about the informed consent and data protection laws of the organization
Today, our "digital footprint" has become an inseparable part of life, and I agree that it is essentially the currency we pay for convenience. In both my professional and academic activities, I constantly work with large volumes of information, which makes me deeply aware of how vital data structure and security truly are.
For me, data protection is primarily about digital hygiene. I try to follow a few key principles:
Conscious tool selection: When using online services for data analysis or creative projects, I always pay attention to the level of access they request regarding my files and personal information.
Separating contexts: I make an effort to clearly distinguish between my personal information and professional data. This helps minimize risks in the event of a data breach on any single platform.
Staying informed: As the text suggests, we must stay updated on new laws and regulations, such as the GDPR. Knowing our rights is the first step toward effective protection.
Of course, it is almost impossible to completely erase one's footprint in the modern world. however, we can certainly make ourselves less vulnerable. It is important not just to use services "for free," but to understand the real price of that convenience.
it's the very good article and good take you came up with
Protection of data is very important and essential for everybody.
Today, there are lots of social media platforms, and we also have massive amounts of data on our mobile phones and computers that is why, data protection is more important than before. For example, I do not put my secret data and personal information on social media, and I use two-factor authentication for my accounts on Facebook, Instagram, X (Twitter), and others.
But for non-online data like my pictures, videos, and passwords, I protect them carefully on my mobile phone or my laptop. I use very strong passwords for this data, and I always have backups of my important data.
You are right! Keep going so nothing bad will happen.
I use a software antivirus on the my laptop; moreover, I'm not on social media and, when I buy on the websites, I check if the seller has a physical headquarters.
I think that the melting point is the same as the melting point of the ice sheet and the melting point in the ice sheet is the same as that of the ice sheet itself and the ice sheet has a different temperature and temperature and temperature and temperature and temperature and temperature and temperature and temperature and temperature and temperature and the temperature is the difference between ice sheets are different and how the temperature and the water and how it changes and what it changes in a temperature that affects it in a different direction