In essence, Google is now using credit card data, to combine with the data it has already collected about us, to learn more about our purchases — those made online and those we purchase without any online connection. The goal, according to Washington Post reporters Elizabeth Dwoskin and Craig Timberg, is to discover whether Google ’s searches and its advertisements have helped people decide what to buy — even when a purchase isn’t made online.
The company continues to collect data and learn more and more about people of all ages. That’s creepy. It feels even more creepy when I consider how we use Gmail in my family to share calendars and when I look at the Google Dashboard that keeps track of and shares with me some of the data Google has collected about us.
We hear a lot of discussion about secure passwords, but now people are wondering whether we should pay more attention to the answers we give for security questions.
The article Why You Should Lie When Setting Up Password Security Questions, over at the Techlicious site, makes me wonder whether security questions — and the answers that we provide — should be re-evaluated. The article emphasizes the lack of security and privacy in our lives and notes that by giving answers to security questions that describe our personal lives we set ourselves up for potential identity theft problems when hacks do occur.
It seems so simple when we install apps. Download, click agree and OK a few times, and use. But it’s not as simple as it seems because we may be unintentionally giving free access to lots of our data. When is the last time you read the user agreement before clicking “agree?” When was the last tune you made sure your 21st Century digital kid to read the agreement? The app install process is not that simple a process after all, because your data is valuable, and not just for you.
According to officials responsible for formulating policy and implementing the directive, future government employment security clearance investigations will include a search of social media content. Applicants will not be asked for passwords and investigators will not log into (or break into) accounts. Investigators will seek to identify the range of an individual’s public content, looking for information that might raise red flags and adversely affect a decision to give a person a security clearance.