Protecting Privacy Identity Online Guide
The Internet has become an essential resource for all of us. We rely on the Internet to send/receive emails, post/share photos and messages on social networking sites, shop for clothes, search for information, etc.
YOUR ISP (INTERNET SERVICE PROVIDER)
Each time you use the Internet, your activities are logged by your ISP.
Your ISP assigns an IP address to your device each time you connect to the Internet. From your IP address, your ISP knows everything you do online, including the browser you use, the websites you visit, the emails you send and receive, the files you download, etc.
And since your ISP knows your IP address, they can also identify your name and location.
In most cases, it’s nothing to worry about. However, it’s possible that a government official can invoke a court order to demand access to the logs and your ISP will need to hand over any information requested. As the recent NSA privacy scandal reveals, this happens more often than we thought.
ADVERTISERS AND CORPORATIONS
Your personal information and online browsing behavior data are very valuable to advertisers and corporations. These data, which companies mine and then sell or trade without your consent, help advertisers determine which products or services to promote to you and which ads to show to you.
Your employer wants you to be productive at work and can monitor your online activities to make sure you don’t waste too much time on social media sites, dating sites, or doing other personal activities.
HACKERS AND CYBER CRIMINALS
Hackers and cyber criminals make a living out of stealing people’s private and financial information. They use a variety of tools and methods available to collect your private information little by little.
Over time, they might just have enough information about you to steal your identity. Once that happens, it becomes very easy for them to use your identity to transfer money from your bank account to their accounts, purchase expensive items online, apply for credit cards in your name, file fake tax returns or perpetrate other crimes.
Tags :Protecting Privacy Identity Online Guide