Data Tracking & Privacy Wiki

Description of some of our wiki topics
Data Privacy Standards: Information is easily vulnerable to being hijacked, and data privacy standards differ from country to country. Online store owners and businesses that store large amount of personal information should take the necessary measures to protect consumer data. In the US, many people are interested in a program called “Do Not Track”. It benefits those who do not want to be followed around on the Web and it will not solve all the privacy problems on the internet. Therefore, the Bill of Rights comes into play and help protects our privacy, but some people do not realize it is choice to give up privacy to access these contents. Most of these sites disclose information of how your privacy is handle as an exchange to use their features.

Data Protection Systems: These reduce the risk of having information compromised. Insight, Oracle, IBM, and HDS data protection services are just a few of many types of services that identify risks and secure vulnerable infrastructure. Our users need to understand the importance between them and find which one is best suited for their needs.

Data Tracking: Companies track users on the web and their affiliation with advertising firms, traffic-logging sites, and more. There are plenty of sites that collect information that “interest” you then distribute and sell the data to other companies. There are plugins that you can download for your browser to see which companies are tracking you, such as Ghostery and Adblock Plus. Also, the “Do Not Track” feature in a browser functions similarly to the plugins.

False Sites: There are a numerous amount of fake websites to be aware of in today's day and age. False websites purposely publish fake information and hoaxes in order to drive users to pages in which they assume are safe. These websites may be used for “phishing” or attempting to steal personal information from individuals.There are many examples of fake websites that one should be aware of.

Cyber Security: Penetration testing AKA Hacking. This is the field where people launch attacks and also defend against them. There are several ways to prevent hacking, which includes layering the defense system in both the code and on the computer that is being used. Hacking can take place in emails, on web pages, and simple links and false sites.

Social Media: Social media has been a large part of society’s lives since the mid-2000’s. With this, it gives people and businesses the opportunities for social interaction and allow third market parties to promote companies products through advertisements. These days, companies have web trackers on websites to see what the user have been looking at on certain websites, location data places the ads on social media such as Facebook, Instagram and Twitter to allow the user to see it once again and potentially buy the product depending on location. Social media also allows people to engage in stalking, cyber-bullying, and lets thieves know users every move. Such things are dangers that allow for hacking and identity thief.

Latest activity




Photos and videos are a great way to add visuals to your wiki. Find videos about your topic by exploring Fandom's Video Library.



