• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
AskCyber Home » News » News » GDPR – How Personal Data is Collected

GDPR – How Personal Data is Collected

2018-05-08 by Michelle Dvorak

GDPR – How is your data collected? More ways than you think

The General Data Protection Regulation (GDPR) goes into effect on May 25, 2018. The new European Union (EU) regulation affects anyone dealing with the persona data of a European Union citizen. In addition, parental consent is necessary for European children under the age of 16 years of age. In a previous blog post, I covered the definition of personal data. The post also contains some examples like email address that spell out a name making it easy to figure out who the email account belongs to. Not all data is online data. A physical street address is also personally identifiable so GDPR affects direct response mailings as well.

Data that falls under the realm of GDPR is collected from a variety of sources. Examples include medical records, air travel tickets, website cookie data, and unlimited online sources including social media accounts. Your personal data can be unknowingly gleaned from social media accounts through a process called data scrapping. Scrapping online accounts for data is generally against the terms of service of most online channels, but it happens.

GDPR is meant to address the legitimate acquisition and usage of your personal data. GDPR mandates that citizens should be able to understand, in simple language, how their data is being collected and processed. That means that social media giants such as Facebook can no longer post complicated terms of service and agreements that make it impossible to understand exactly what data is being collected and how it is used. That includes Facebook allowing advertisers to access audience behaviors and interests.

Facebook can collect quite a bit of personal data from user profiles. Adding family members and identifying children in a profile tells Facebook and it advertisers that the user is a parent. A phone numbers used to add two step authentication reveals what carrier you use. Photos of your home or automobile suggest income level.

Facebook, as well as Google, use location data to track your location. For Facebook, it is used to tag location in photos and video. It is also used to generate reports for advertisers. For example, if an advertiser shows a Facebook user an advertisement for a retail locate promotion then Facebook can use your location data form a mobile device to track and see if you actually entered a store.

Personal data tracking has many legitimate uses. The issue begins when it is also being used for purposed unbeknownst to the person who owns the data.Google uses location data from your smartphone as well. It is used for apps like Google maps, but it is also to track the effectiveness of AdWords advertisements.

Filed Under: News Tagged With: GDPR

About Michelle Dvorak

Michelle writes about cyber security, data privacy focusing on social media privacy as well as how to protect your IoT devices. She has worked in internet technology for over 20 years and owns METRONY, LLC. Michelle earned a B.S. in Engineering from Rensselaer Polytechnic Institute. Michelle published a guide to Cyber Security for Business Travelers


LinkedInTwitterFacebook

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Security Marketing Manager – Remote

Sr. Associate, Cybersecurity Architect – Pfizer

Strategic Customer Success Manager – Cybersecurity – Opportunity for Working Remotely

Top 20 Passwords Leaked on Dark Web

ISU Cybersecurity Leader Job Opening

Cyber Security News

Top 20 Passwords Leaked on Dark Web

… [Read More...] about Top 20 Passwords Leaked on Dark Web

Apple Warns of Actively Exploited Zero-Day Flaw

… [Read More...] about Apple Warns of Actively Exploited Zero-Day Flaw

IRS Stops Facial Recognition System for Online Access

… [Read More...] about IRS Stops Facial Recognition System for Online Access

National Cybersecurity Alliance Announces Data Privacy Week

… [Read More...] about National Cybersecurity Alliance Announces Data Privacy Week

More Cyber Security News

Tags

amazon Android Apple bitcoin China chrome CISA credit card DarkSide DHS DOJ Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware REvil Russia smartphone T-Mobile TikTok tutorial VPN WhatsApp WiFi Windows

Government

CBP Looks to Access Airline Passenger Data

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2023 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version