· Opsfolio Community · data integrity · 2 min read

Data Collection Is Reaching New Heights. Here’s What You Need To Know

Most people who have used social media have experienced the process of searching for something online only to find it show up as an advertisement on their social media feed.

Data Collection Is Reaching New Heights. Here’s What You Need To Know

Most people who have used social media have experienced the process of searching for something online only to find it show up as an advertisement on their social media feed.

It has become commonplace for people to have their internet searches automatically coincide with other parts of their internet experience. In some cases, people may have even become numb to the phenomenon. Some individuals may even enjoy targeted ads that connect them with products and services that they may have a genuine interest in.

But is this harmless data collection, or are internet platforms and apps crossing lines in terms of people’s personal information? And, are they gathering more information than people are aware of or would be comfortable with if they knew it was happening?

What is Data Collection?

Data collection here refers to the information that websites, servers, social media sites, businesses, etc. gather when people browse the internet.

While browser privacy settings will adjust the amount of information that is available for data collection, there are some things that are often collected regardless, such as a person’s local and public IP address, and what type of browser they’re using. The IP address may be able to reveal your approximate physical location.

Other information that may be collected is your operating system, the CPU or GPU you’re using, and your screen resolution. Data collection may also reveal browser plugins, internet service provider, and download speed. To learn more about the information collected from your browser, you can visit Webkay to see what information is accessible about you.

What Major Players are Collecting Data

There are many companies and governments with a growing interest in collecting data. Below is a short list of some of the biggest data collectors currently in action.

Read more

    Share:
    Back to Blog

    Related Posts

    View All Posts »

    Is Zero Trust Reinventing or Reaffirming CISO Strategies?

    Zero Trust is an evolution of traditional security principles like least privilege, separation of duties, and Defense in Depth. Rather than replacing these strategies, Zero Trust refines them to meet modern challenges. For CISOs, Zero Trust offers an opportunity to enhance existing security measures, integrating continuous verification and granular controls for a more resilient defense.

    What Is Independent Verification and Validation (IV&V)?

    With a 239% surge in large breaches (reported to HHS, Office for Civil Rights) involving hacking over the past four years and healthcare data breaches, the stakes for technology in healthcare are at an all-time high. The average costs of a studied breach in healthcare reached nearly $11 million in 2023 – a 53% price increase since 2020.

    Cambridge Healthtech Institute's Inaugural Healthcare Internet of Things

    Bringing together hospitals and physician networks, payers, regulators, as well as device/sensor makers, data analytics and security providers, cloud and app developers etc., Cambridge Healthtech Institute's inaugural Healthcare Internet of Things will present use case examples and interactive discussion panels that showcase the healthcare industry's collaborative efforts toward the implementation of IoT, while sharing the challenges and obstacles that need to be overcome to enable its wider adoption.