{"id":102,"date":"2013-03-11T10:56:06","date_gmt":"2013-03-11T14:56:06","guid":{"rendered":"https:\/\/www.mysecuritysign.com/blog\/?p=102"},"modified":"2025-03-18T07:50:55","modified_gmt":"2025-03-18T11:50:55","slug":"internet-privacy-market-for-your-information","status":"publish","type":"post","link":"https:\/\/www.mysecuritysign.com/blog\/internet-privacy-market-for-your-information\/","title":{"rendered":"Internet privacy and the market for your information"},"content":{"rendered":"<p><a href=\"https:\/\/www.mysecuritysign.com\/blog\/wp-content\/uploads\/2013\/03\/Wikimedia_Servers-0051_19.jpeg\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"533\" class=\" wp-image-105 \" src=\"https:\/\/www.mysecuritysign.com\/blog\/wp-content\/uploads\/2013\/03\/Wikimedia_Servers-0051_19.jpeg\" alt=\"Photo of computer servers. \" srcset=\"https:\/\/www.mysecuritysign.com/blog\/wp-content\/uploads\/2013\/03\/Wikimedia_Servers-0051_19.jpeg 800w, https:\/\/www.mysecuritysign.com/blog\/wp-content\/uploads\/2013\/03\/Wikimedia_Servers-0051_19-300x199.jpeg 300w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/a><\/p>\n<p>Telescopes may have been invented to gaze at the stars, but they also gave peeping toms the ability to invade privacies from a comfortable distance, rather than just window-adjacent tree branches. And although outdoor security cameras were an achievement in the durability of electronics, they raise major privacy concerns that rage <a href=\"https:\/\/www.guardian.co.uk\/world\/2012\/sep\/11\/cctv-cameras-school-changing-rooms\" rel=\"nofollow\">to this day<\/a>. Google street view took away the anxiety of finding a new address, but it also froze and publicized private moments, making people feel like they couldn\u2019t stand on the street stuffing a pizza into their face outside 555 Main Street without getting caught. Or <a href=\"https:\/\/www.telegraph.co.uk\/technology\/google\/5041999\/Google-Street-View-formal-privacy-complaint.html\" rel=\"nofollow\">worse<\/a>.<\/p>\n<p>And the internet, one of the most incredible technological innovations ever, is also one of the most pernicious tools for violating our privacy.<\/p>\n<p>Ever used <a href=\"https:\/\/www.spokeo.com\/\">Spokeo<\/a>? If not, look up your name and brace yourself for a creepy eye-opener. Then immediately go about <a href=\"https:\/\/www.sileo.com\/spokeo-scary-bad-how-to-opt-out\/\" rel=\"nofollow\">privatizing your information<\/a>.<\/p>\n<p>Innocuously called \u201c<a href=\"https:\/\/www.cbs42.com\/content\/localnews\/story\/Theyre-making-predictions-about-you\/9Bc67P5f0kuSCLPQVudcMg.cspx?rss=1659\" rel=\"nofollow\">analytics<\/a>,\u201d the mining of user data is already a massive industry. There are data brokers and marketing specialists. The industry (and perceptions of it) have matured enough to catalyze a $1 million public relations <a href=\"https:\/\/bits.blogs.nytimes.com\/2012\/10\/15\/the-data-mining-industry-kicks-off-a-public-relations-campaign\/\" rel=\"nofollow\">campaign<\/a>, poised\u00a0to make the idea of data collection more appealing.<\/p>\n<p>Often, analytics translates to more targeted ads. By analyzing a person\u2019s search or online purchasing history, ads can be tailored so that teenagers don\u2019t have to see ads for denture cream. This seems convenient, and may make for a better ad experience for the viewers, and a more efficient way for companies to spend money.<\/p>\n<div style=\"width: 310px\" class=\"wp-caption alignright\"><a href=\"https:\/\/www.mysecuritysign.com\/blog\/wp-content\/uploads\/2013\/03\/Computer_keyboard.gif\"><img loading=\"lazy\" decoding=\"async\" title=\"typing-on-keyboard\" src=\"https:\/\/www.mysecuritysign.com\/blog\/wp-content\/uploads\/2013\/03\/Computer_keyboard.gif\" alt=\"A person typing on a keyboard\" width=\"300\" height=\"198\" \/><\/a><p class=\"wp-caption-text\">Careful what you type. Photo by <a href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Computer_keyboard.gif\" rel=\"nofollow\">Nicke L<\/a>, used under a Creative Commons license.<\/p><\/div>\n<p>But <a href=\"https:\/\/online.wsj.com\/article\/SB10001424052702304458604577488822667325882.html\" rel=\"nofollow\">why stop<\/a> there? The sheer amount of information we transmit every time we enter a search term, visit a site or make an online purchase is fruit too low, plentiful and ripe not to be picked. Target was already the subject of an <a href=\"https:\/\/www.nytimes.com\/2012\/02\/19\/magazine\/shopping-habits.html?pagewanted=6&amp;_r=1&amp;hp&amp;pagewanted=all\" rel=\"nofollow\">investigation<\/a> published by the New York Times, about how they use customers\u2019 buying habits to predict purchases.<\/p>\n<p>Special efforts went into capturing data of when a woman was expecting a child \u2014 prime time for making a million purchases, from maternity pants to diapers, every week. Catch them early, the corporate reasoning goes, and they\u2019ll keep coming back to Target throughout the entire season of the rapid consumption that comes with new parenting.<\/p>\n<p>Retail stores are shockingly good at gathering and analyzing information. Did a woman buy a pregnancy test, followed by a purse large enough to double as a diaper bag, and some pastel blue carpet? Send her coupons for maternity clothes! Coupon campaigns would be targeted to each stage of pregnancy. Seven months after Target figured out that a woman pregnant, they\u2019d send coupons for cribs, nine months later came coupons for infant diapers and baby bottles.<\/p>\n<p>The result was while many people got great deals, many also got creeped out. Having a kid is a private, personal thing, and women didn\u2019t really want Target knowing things they didn\u2019t tell them. They didn\u2019t like the feeling of being watched.<\/p>\n<div style=\"width: 370px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/www.mysecuritysign.com\/blog\/wp-content\/uploads\/2013\/03\/No-Private-Property-Security-Sign-K-1253.gif\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.mysecuritysign.com\/blog\/wp-content\/uploads\/2013\/03\/No-Private-Property-Security-Sign-K-1253.gif\" alt=\"Sign reading Security notice private property keep out\" width=\"360\" height=\"255\" \/><\/a><p class=\"wp-caption-text\">Mining someone&#8217;s personal data can feel nearly as invasive as physical trespassing (via <a href=\"https:\/\/www.mysecuritysign.com\/no-trespassing-signs\/private-property-keep-out-sign\/sku-k-1253\" rel=\"nofollow\">MySecuritySign.com<\/a>).<\/p><\/div>\n<p>Many companies, like <a href=\"https:\/\/www.fastcompany.com\/1381747\/data-mining-mintcom-demographic\" rel=\"nofollow\">Mint.com<\/a>, a personal finance website that peeks into your bank account then makes colorful pie charts of what you\u2019re spending\/wasting your money on, give their service away for free in exchange for your data. The data is made anonymous, but that $0 price tag doesn\u2019t mean they\u2019re getting nothing for letting you use their service \u2014 they\u2019re selling your data to companies who will use the information to make money.<\/p>\n<p>What these companies do however, <a href=\"https:\/\/www.reuters.com\/article\/2011\/06\/23\/us-usa-healthcare-privacy-idUSTRE75M3T720110623\" rel=\"nofollow\">isn\u2019t illegal<\/a> in most states. Like a greasy middle aged man with a packed lunch on his lap, grinning at you from a park bench across the way, data mining is creepy but it doesn\u2019t break any laws. At least not yet.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Telescopes may have been invented to gaze at the stars, but they also gave peeping toms the ability to invade privacies from a comfortable distance, rather than just window-adjacent tree branches. And although outdoor security cameras were an achievement in the durability of electronics, they raise major privacy concerns that rage to this day. Google [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":105,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,11],"tags":[],"class_list":["post-102","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-trespassing"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Internet privacy and the market for your information -<\/title>\n<meta name=\"description\" content=\"Internet, one of the most incredible technological innovations ever, is also one of the most pernicious tools for violating our privacy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mysecuritysign.com/blog\/internet-privacy-market-for-your-information\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Internet privacy and the market for your information -\" \/>\n<meta property=\"og:description\" content=\"Internet, one of the most incredible technological innovations ever, is also one of the most pernicious tools for violating our privacy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mysecuritysign.com/blog\/internet-privacy-market-for-your-information\/\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/trespassingsignscctvsigns\" \/>\n<meta property=\"article:published_time\" content=\"2013-03-11T14:56:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-18T11:50:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mysecuritysign.com/blog\/wp-content\/uploads\/2013\/03\/Wikimedia_Servers-0051_19.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"533\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kanika Pareek\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@mysecuritysign\" \/>\n<meta name=\"twitter:site\" content=\"@mysecuritysign\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kanika Pareek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/internet-privacy-market-for-your-information\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/internet-privacy-market-for-your-information\\\/\"},\"author\":{\"name\":\"Kanika Pareek\",\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/#\\\/schema\\\/person\\\/1100729452b5677e8629cd9004725070\"},\"headline\":\"Internet privacy and the market for your information\",\"datePublished\":\"2013-03-11T14:56:06+00:00\",\"dateModified\":\"2025-03-18T11:50:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/internet-privacy-market-for-your-information\\\/\"},\"wordCount\":663,\"image\":{\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/internet-privacy-market-for-your-information\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/wp-content\\\/uploads\\\/2013\\\/03\\\/Wikimedia_Servers-0051_19.jpeg\",\"articleSection\":[\"News\",\"Trespassing\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/internet-privacy-market-for-your-information\\\/\",\"url\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/internet-privacy-market-for-your-information\\\/\",\"name\":\"Internet privacy and the market for your information -\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/internet-privacy-market-for-your-information\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/internet-privacy-market-for-your-information\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/wp-content\\\/uploads\\\/2013\\\/03\\\/Wikimedia_Servers-0051_19.jpeg\",\"datePublished\":\"2013-03-11T14:56:06+00:00\",\"dateModified\":\"2025-03-18T11:50:55+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/#\\\/schema\\\/person\\\/1100729452b5677e8629cd9004725070\"},\"description\":\"Internet, one of the most incredible technological innovations ever, is also one of the most pernicious tools for violating our privacy.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/internet-privacy-market-for-your-information\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/internet-privacy-market-for-your-information\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/wp-content\\\/uploads\\\/2013\\\/03\\\/Wikimedia_Servers-0051_19.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/wp-content\\\/uploads\\\/2013\\\/03\\\/Wikimedia_Servers-0051_19.jpeg\",\"width\":800,\"height\":533,\"caption\":\"Computer servers remember everything you've ever done on the internet. Photo by Helpameout, used under a creative commons license.\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/\",\"name\":\"\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/#\\\/schema\\\/person\\\/1100729452b5677e8629cd9004725070\",\"name\":\"Kanika Pareek\",\"description\":\"Kanika is a literature admirer, art lover, and a freelance content developer for SmartSign. She holds bachelor degrees in life sciences and education and as well as a masters degree in zoology. She is passionate about exploring and writing on various subjects including environment, life sciences, jewelry, fashion and education. She is also an active theater and radio artiste, a dancer by passion and a social worker who is associated with a couple of local and international NGOs. Kanika lives in the beautiful city of Jaipur, India.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Internet privacy and the market for your information -","description":"Internet, one of the most incredible technological innovations ever, is also one of the most pernicious tools for violating our privacy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mysecuritysign.com/blog\/internet-privacy-market-for-your-information\/","og_locale":"en_US","og_type":"article","og_title":"Internet privacy and the market for your information -","og_description":"Internet, one of the most incredible technological innovations ever, is also one of the most pernicious tools for violating our privacy.","og_url":"https:\/\/www.mysecuritysign.com/blog\/internet-privacy-market-for-your-information\/","article_publisher":"https:\/\/www.facebook.com\/trespassingsignscctvsigns","article_published_time":"2013-03-11T14:56:06+00:00","article_modified_time":"2025-03-18T11:50:55+00:00","og_image":[{"width":800,"height":533,"url":"https:\/\/www.mysecuritysign.com/blog\/wp-content\/uploads\/2013\/03\/Wikimedia_Servers-0051_19.jpeg","type":"image\/jpeg"}],"author":"Kanika Pareek","twitter_card":"summary_large_image","twitter_creator":"@mysecuritysign","twitter_site":"@mysecuritysign","twitter_misc":{"Written by":"Kanika Pareek","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mysecuritysign.com/blog\/internet-privacy-market-for-your-information\/#article","isPartOf":{"@id":"https:\/\/www.mysecuritysign.com/blog\/internet-privacy-market-for-your-information\/"},"author":{"name":"Kanika Pareek","@id":"https:\/\/www.mysecuritysign.com/blog\/#\/schema\/person\/1100729452b5677e8629cd9004725070"},"headline":"Internet privacy and the market for your information","datePublished":"2013-03-11T14:56:06+00:00","dateModified":"2025-03-18T11:50:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mysecuritysign.com/blog\/internet-privacy-market-for-your-information\/"},"wordCount":663,"image":{"@id":"https:\/\/www.mysecuritysign.com/blog\/internet-privacy-market-for-your-information\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mysecuritysign.com/blog\/wp-content\/uploads\/2013\/03\/Wikimedia_Servers-0051_19.jpeg","articleSection":["News","Trespassing"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mysecuritysign.com/blog\/internet-privacy-market-for-your-information\/","url":"https:\/\/www.mysecuritysign.com/blog\/internet-privacy-market-for-your-information\/","name":"Internet privacy and the market for your information -","isPartOf":{"@id":"https:\/\/www.mysecuritysign.com/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mysecuritysign.com/blog\/internet-privacy-market-for-your-information\/#primaryimage"},"image":{"@id":"https:\/\/www.mysecuritysign.com/blog\/internet-privacy-market-for-your-information\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mysecuritysign.com/blog\/wp-content\/uploads\/2013\/03\/Wikimedia_Servers-0051_19.jpeg","datePublished":"2013-03-11T14:56:06+00:00","dateModified":"2025-03-18T11:50:55+00:00","author":{"@id":"https:\/\/www.mysecuritysign.com/blog\/#\/schema\/person\/1100729452b5677e8629cd9004725070"},"description":"Internet, one of the most incredible technological innovations ever, is also one of the most pernicious tools for violating our privacy.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mysecuritysign.com/blog\/internet-privacy-market-for-your-information\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mysecuritysign.com/blog\/internet-privacy-market-for-your-information\/#primaryimage","url":"https:\/\/www.mysecuritysign.com/blog\/wp-content\/uploads\/2013\/03\/Wikimedia_Servers-0051_19.jpeg","contentUrl":"https:\/\/www.mysecuritysign.com/blog\/wp-content\/uploads\/2013\/03\/Wikimedia_Servers-0051_19.jpeg","width":800,"height":533,"caption":"Computer servers remember everything you've ever done on the internet. Photo by Helpameout, used under a creative commons license."},{"@type":"WebSite","@id":"https:\/\/www.mysecuritysign.com/blog\/#website","url":"https:\/\/www.mysecuritysign.com/blog\/","name":"","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mysecuritysign.com/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.mysecuritysign.com/blog\/#\/schema\/person\/1100729452b5677e8629cd9004725070","name":"Kanika Pareek","description":"Kanika is a literature admirer, art lover, and a freelance content developer for SmartSign. She holds bachelor degrees in life sciences and education and as well as a masters degree in zoology. She is passionate about exploring and writing on various subjects including environment, life sciences, jewelry, fashion and education. She is also an active theater and radio artiste, a dancer by passion and a social worker who is associated with a couple of local and international NGOs. Kanika lives in the beautiful city of Jaipur, India."}]}},"_links":{"self":[{"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/posts\/102","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/comments?post=102"}],"version-history":[{"count":4,"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/posts\/102\/revisions"}],"predecessor-version":[{"id":4734,"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/posts\/102\/revisions\/4734"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/media\/105"}],"wp:attachment":[{"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/media?parent=102"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/categories?post=102"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/tags?post=102"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}