How to Protect Your Privacy as More Apps Harvest Your Data

How to Protect Your Privacy as More Apps Harvest Your Data

A New York Times Personal Tech series article by Brian X. Chen

A quote from the original article in the New York Times:

"It’s worthwhile to periodically check your primary online accounts, like Facebook, Twitter or Google, to see which apps are hooked into them. Chances are you have used those accounts to quickly sign up for a web tool or app. The ones you never use may still be leeching off your personal data, so you should disable them.

On Facebook, go to the settings page and click on the Apps tab to see which apps are connected to the account. On your Google account page, you can find a similar apps list labeled “Connected apps & sites.” And on Twitter, go to the Apps page under “Settings and privacy.”

Ms. Sandvik recommended pruning apps that you don’t recognize or have not used in the last six months. Once you have narrowed down the list, take a deeper dive on the ones that remain and read up on how they use your personal data. If their data-sharing practices sound offensive, remove the apps."

Use the link below to access the full article on nytimes.com

Next Article Stay Private: How to Hide Your Webcam, Mute Your Mic, and Turn Off Notifications
Print
15640 Rate this article:
5.0
0Upvote 0Downvote
Please login or register to post comments.

How to Protect Your Privacy as More Apps Harvest Your Data

A New York Times Personal Tech series article by Brian X. Chen

Retrieved By Health eConsultation 0 15640 Article rating: 5.0

In this article written by Brian X. Chen from the New York Times he discusses some of the potential ways in which mobile apps that you download to your phone may be collecting and using your personal data in ways you did not know.

One of the key takeaways is that there are ways in which to protect yourself and tools that can help you figure out which apps are collecting your data and how to remove their ability to do so.

Stay Private: How to Hide Your Webcam, Mute Your Mic, and Turn Off Notifications

An article from Zapier

Nathan E Botts 0 15560 Article rating: 5.0

One consideration as you gather and store more personal health information on your computer and devices is making sure that you are not inadvertently sharing this information (or some other aspect of your personal health) through your webcam or mic.

This article from Zapier outlines several different ways and some handy applications that can help you control this on your PC or MAC.

Determining the Value of Compromising Your Privacy

An article from Engadget

Nathan E Botts 0 10542 Article rating: No rating

This article from the Engadget web magazine discusses how your online searching behaviors might be monitored by different companies that you are unaware about. This data is likely used to build profiles that may impact the advertisements you see, credit ratings received, and other potential social network aspects as of yet identified. 

Sharing Sensitive Health Information: Protect Your Privacy and Improve Your Health

A guide from the Office of the National Coordinator for Health Information Technology

Nathan E Botts 0 54128 Article rating: 5.0

This 2-page ONC published graphic novel (aka comic book) is a short guide that helps illustrate why protecting your health privacy is important and issues to consider when sharing sensitive health information.

RSS

What is Health eDefense?

Health eDefense is the act of protecting your personal health information. This not only protects your privacy, security, and safety, but also protects the data of your family, friends, and others in your community.

The Health eDefense platform is dedicated to providing consumers with actionable information on how to protect their personal health information effectively from cyber threats. Health eDefense provides informational content and education related to cyber security, privacy and consent, security, and related topics and policies such as HIPAA and GDPR.

Cyber security is impacting our daily lives, and our personal and protected health information is a target for hackers and criminals looking to make money off of our personal data. Your personal health data will always be about your health, demographics, social, lifestyle, financial history, and other related details. Once taken, they cannot be taken back.

We think the best cybersecurity tool is education and awareness, and we hope to provide users with tools and insight to protect themselves and their data better.