What is the GDPR?
On April 27, 2016, the General Data Protection Regulation (GDPR) was adopted in the European Union after four years of negotiations. This law will strengthen data protection for individuals residing in the European Union (EU).
The remaining battery power on your smartphone may reveal your location to websites, concerning privacy-conscious web users. This occurs from a simple HTML web script that repeatedly monitors the status of identifiers and obtains information from the Battery Status API.
Internet-based applications are building up privacy concerns worldwide. The UN has even named privacy in its Universal Declaration of Human Rights. How exactly does privacy regulation differ in the United States and in the European Union? See below for the top ways in which privacy regulation varies between these two large economies.
UR is a web browser focused on user privacy. Learn more more about the privacy feature here.
If you are traveling through the US border, you may be subjected to an invasive device search. This is beginning to raise questions amongst those who want to protect the private data on our computers, phones, and other digital devices.
On these grounds, the Electronic Frontier Foundation (EFF) has released a new guide for those traveling to the US. In a long or short format, this guide gives travelers the facts they need in order to prepare for border crossings while protecting their digital information.
See more on the EFF website: https://www.eff.org/press/releases/digital-privacy-us-border-new-how-guide-eff
“Big Data” is an umbrella phrase used to mean a massive volume of both structured and unstructured data that is so large, it is difficult to process using traditional database and software techniques.
Big Data has the potential to improve operations and make faster, more intelligent decisions. It’s not just companies that are collecting and analyzing these massive stores of data.
This data, once captured, formatted, manipulated, stored, and analyzed can help a company or organization gain useful insight to predict behavior, increase revenues, obtain or retain customers and recognize emerging patterns, among others.
First-party data is the data you give away willingly to websites. Advertisers and publishers can extract and compile data by requiring you to register online and by then analyzing your activity.
Example: your email address, name, pages you like, ads you click, etc.
Third-party data is information that’s collected by an entity that doesn’t have a direct relationship with consumers. This data is normally compiled by specialist firms who pay websites to collect information about their visitors. This data is then used to piece together detailed profiles about users’ tastes and behaviors as they browse the Internet.
Example: an advertising tracker will place a cookie on your browser and see where you go so you see ads for things you want. (Maybe those shoes?)
Second-party data is the newcomer to the scene. It is essentially first-party data that another party obtains directly from the source. This data isn’t given away directly—it usually is obtained through a direct relationship with another entity. Deals can be made between publishers or a Data Management Platform (DMP). Or simply between two parties who could benefit from each other’s first-party data.
Example: a pet store sharing data with a veterinarian, who both have similar clients.
Collecting and dealing with all that information requires a wide range of different players. Data brokers earn their living by helping advertisers and publishers manage their own first-party data, as well as selling them more data about users.
“Companies stress that they do not know users’ names. But they identify them by numbers, and as they build up detailed profiles about those numbered users, there is concern that the information might be traced to individuals.”
– The Economist
All this data is divided into segments defined by location, device, marital status, income, job, shopping habits, travel plans and many other factors. These segments are then are then auctioned off to buyers of ad space in real time.
While data sharing can lead to products and services that make your life easier, more entertaining, economical or even informational, it is important to be aware of your data. So, whether it’s your first-, second- or third-party data, it is important to understand where your data goes, and how it is used.
It’s no secret that the Trump administration is causing a big stir in the global, political soup. Initially enacted in July 2016, the EU-US Privacy Shield set out to regulate what data can be shared between businesses on both sides of the Atlantic Ocean and how that data can be utilized. It is inherently designed so data protection laws can be sustained between European Union member states and the United States.
The Privacy Shield is crucial for both American and European businesses to guarantee citizens of both countries to have protected transfer of data that it is not subject to mass surveillance. The European Commission outlines it in their Citizen’s Guide:
“The Privacy Shield allows your personal data to be transferred from the EU to a company in the United States, provided that the company there processes (e.g. uses, stores and further transfers) your personal data according to a strong set of data protection rules and safeguards. The protection given to your data applies regardless of whether you are an EU citizen or not.”
On January 25th, just a few days into his presidency, Trump signed an Executive Order ensuring that “…privacy policies exclude persons who are not United States citizens or lawful permanent residents from the protections of the Privacy Act regarding personally identifiable information.”
The new administration brings up questions concerning privacy and what this means for technology companies based in the US.
Read more on TechCrunch.
With its headquarters in Europe, UR abides by strict EU laws which strongly favor user privacy. Your private data is yours—nothing is collected or stocked. Learn more here.
A Virtual Private Network (VPN) is a group of discrete, private networks linked together over a public network—namely, the internet. For anyone who is concerned about keeping his or her online data private, a VPN is a must-have.
A VPN scrambles all the data that passes through the networks by acting as a secure “tunnel” between your computer and the sites you visit online. By encrypting your computer’s internet connection, sites that you visit and data that you send and receive is safe from prying eyes.
Overall, using a VPN secures your internet browsing and gives you more autonomy with the sites you can visit.
With a VPN built right into it, UR makes staying private online easy! Access the VPN with just a click—look for the ninja icon in the upper right corner of the browser.
Think of UR as an armored car for your online traffic. We respect privacy and created a web browser to keep you safe and private as you navigate the internet highways. 🚗 Learn more here.