{"id":15695,"date":"2020-02-28T11:48:44","date_gmt":"2020-02-28T11:48:44","guid":{"rendered":"https:\/\/www.engineernewsnetwork.com\/blog\/?p=15695"},"modified":"2020-02-28T11:48:46","modified_gmt":"2020-02-28T11:48:46","slug":"how-companies-legally-harvest-your-data-and-how-to-stop-them","status":"publish","type":"post","link":"https:\/\/www.engineernewsnetwork.com\/blog\/how-companies-legally-harvest-your-data-and-how-to-stop-them\/","title":{"rendered":"How companies legally harvest your data (and how to stop them)"},"content":{"rendered":"\n<p><strong>Reincubate founder Aidan Fitzpatrick, in this\u00a0<a href=\"https:\/\/reincubate.com\/blog\/how-companies-harvest-your-data\/\"><em>Guarding Data report<\/em>,\u00a0<\/a>analyses how large corporations collect and use your personal data. The report aims to help you protect your data by making you aware of how vulnerable your data is and lists the steps you can take to safeguard your data<\/strong><\/p>\n\n\n\n<p>In 2018, it was discovered that Cambridge Analytica had harvested the data of at least 87 million Facebook users without their knowledge after obtaining it via a few thousand accounts that had used a quiz app.<\/p>\n\n\n\n<p>There is no getting away from how incredibly valuable our data is.&nbsp;<\/p>\n\n\n\n<p>In 2018, the Global Data Mining Tools Market was valued at $591.2 million and is projected to reach $1.21 billion by 2025. That\u2019s why online data collection is increasingly insidious and continuous.&nbsp;<\/p>\n\n\n\n<p>Today, more data can be collected than ever before; people create as much data every two days as they did from the beginning of time until the year 2000. <\/p>\n\n\n\n<p>When looked at on this scale, personal data can seem innocuous. Buried in the mind-boggling waves of new data being created, is your personal internet search history really all that interesting?<\/p>\n\n\n\n<p>The answer is yes, according to companies such as Facebook, Google, and Amazon who have paid extraordinary amounts in fines and reputational hits to gain access to this sort of information. <\/p>\n\n\n\n<p>Data collected by Facebook via the use of programs such Onavo and Facebook Research (who paid teenagers and other Facebook users for near limitless access to their data) led to the discovery that WhatsApp was used more than twice as often as Facebook Messenger, giving Facebook the drive to purchase WhatsApp for $19.6 billion in 2014 &#8211; a move that would prove to be extremely successful.<\/p>\n\n\n\n<p>The unfortunate reality is that data protection is not something you can trust other companies to do for you. Instead, protecting your data requires a proactive approach.<\/p>\n\n\n\n<p><strong>Beware dark patterns<\/strong><\/p>\n\n\n\n<p>Many Onavo users were likely unaware that so much of their data could be accessed and that this data would be used by Facebook. Onavo required root permissions to users phones, and VPN access to computers, allowing Facebook intimate access to user data.&nbsp;<\/p>\n\n\n\n<p>Private messages on social media apps; chats from instant messaging apps (including photos and videos sent in these chats); emails; internet browsing history; and location information were all accessible to Facebook while using Onavo.<\/p>\n\n\n\n<p>Of course, in order for apps and websites to legally gain access to this data, they first need to obtain permission from the user. If companies asked for such permission openly and explicitly, users would be more likely to deny these requests. <\/p>\n\n\n\n<p>As a result, many companies make use of complex mazes of \u2018dark patterns\u2019 to shrewdly and legally gain access to user data.\u00a0<\/p>\n\n\n\n<p>Dark patterns are used because they garner results. Users are more likely to grant permissions to companies if one or more of the following is true:<\/p>\n\n\n\n<p>The user feels there is no other alternative, or that granting permission is the quickest and easiest way forward.<\/p>\n\n\n\n<p>Companies often make it difficult for the user to avoid granting access, by taking the steps to deny access during signup unclear and complicated. This \u2018roach motel\u2019 method of obtaining permissions can be seen in the infamously complicated path LinkedIn required users to take in order to deny the company access to their contact list.<\/p>\n\n\n\n<p>To remove access that has already been granted is often more complicated than granting access in the first place. Data or cookie tracking permissions settings are not often located in the areas you might logically expect (such as the \u2018Privacy\u2019 section). Misleading wording or unusual actions may also be used to cause confusion, for example, users may be asked to tick a box in order to \u2018opt-out\u2019 of providing permissions.&nbsp;<\/p>\n\n\n\n<p><strong>The user is not aware they are granting access\u00a0<\/strong><\/p>\n\n\n\n<p>Granting permissions is often tacked onto another, more evident step, such as creating a password. Employing this method may make users less likely to identify that they have agreed to certain data permissions. The use of small print also increases the likelihood that such agreements may be overlooked.<\/p>\n\n\n\n<p><strong>The user feels pressured to act quickly<\/strong><\/p>\n\n\n\n<p>This is usually achieved by one of three pressure tactics:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Creating a sense of scarcity. Booking.com often falsely claims to have just \u20181 room left\u2019 in order to tempt you to book your stay quickly.<\/li><li>Introducing time pressure. We\u2019re familiar with this tactic when purchasing certain items, such as flights and tickets: booking companies place a time limit on items in your cart. Companies can use similar tactics to gain permission from your data, too. Facebook appeared to use fake red notification dots which appeared when users were prompted to agree to new privacy agreements, perhaps to tempt the user to hastily agree in order to read their messages.<\/li><li>Resorting to scare tactics. Here are the terms Facebook used when asking for access to face recognition data: \u201cIf you keep face recognition turned off, we won&#8217;t be able to use this technology if a stranger uses your photo to impersonate you.\u201d Unfortunately, scare tactics are rife in data collection, as the lines between those accessing data in order to protect it and those who intend to absorb it are blurred.<\/li><\/ul>\n\n\n\n<p>Perversely, three of Jakob Nielson\u2019s 10 Usability Heuristics, created to promote user understanding of online systems are often subverted by dark patterns designed to promote confusion and rash decisions. This coupled with guiding colours and layouts which suggest the correct items to click (highlighted sections, green buttons), make it more likely for users to follow a predetermined path laid out by those who want access to personal data.<\/p>\n\n\n\n<p>Even when laws are indisputably broken, the punishment is often not significant enough to act as a serious deterrent. Large tech companies found to be in violation of laws are typically punished by fines, such as the $170 million Google paid in late 2019 after it was found that YouTube had violated the 1998 Children\u2019s Online Privacy Protection Act (COPPA). While this is undoubtedly a large sum, it barely scratches the surface of the company\u2019s profits, calling into question the effectiveness of such penalties for colossal tech companies.&nbsp;<\/p>\n\n\n\n<p><strong>Encryption is not infallible<\/strong><\/p>\n\n\n\n<p>If you use an iPhone &#8211; and don\u2019t play around with your settings &#8211; much of your data is already encrypted. Great! Encryption means unhackable, right? Well, sort of. Theoretically powerful computers in the future will be able to decrypt encrypted data, though that\u2019s likely hundreds of years away (and they would need to have access to the encrypted data).<\/p>\n\n\n\n<p>Just because your data is encrypted doesn\u2019t mean it\u2019s always safe. Consider, for example, different approaches to encryption. \u2018End-to-end\u2019 encryption is the gold standard, as it means that data is encrypted at both ends of communication, and also in transit. However many services only encrypt data in some situations, and not necessarily whilst it\u2019s at the company\u2019s end or \u201cat rest\u201d on your device.<\/p>\n\n\n\n<p>In fact, lots of personal data isn\u2019t fully encrypted at all times. Your browser might tell you a connection to a site or service is secure, but that doesn\u2019t mean the underlying service is secure. Gmail and Evernote are examples of products that use encryption, but both aren\u2019t end-to-end encrypted, which is what enabled a Googler to read user messages.<\/p>\n\n\n\n<p>In some cases, companies may pass data that you believe is fully encrypted on to other companies. If you use a third-party email app, they may have access to your data, too. Google allows third-party apps to access your email data, meaning any third-party app with full access to your data can legally read your emails, too, without specifically requesting access from you.<\/p>\n\n\n\n<p>Recordings from smart speakers &#8211; such as Amazon\u2019s Alexa- are encrypted during transit, but aren\u2019t effectively encrypted when they reach Amazon\u2019s cloud.<\/p>\n\n\n\n<p><strong>Safeguarding encryption keys<\/strong><\/p>\n\n\n\n<p>It is possible to encrypt data in a way that makes it fully secure. If a company stores data that\u2019s encrypted with a key that only the end-user has access to, then the company and anyone else who doesn\u2019t have the key has no way to decrypt the data. <\/p>\n\n\n\n<p>If there\u2019s no way to access such data, all of the things that would otherwise require safeguards go away: the company can\u2019t get bought and change its policy, it can\u2019t slip up and leak data, and it can\u2019t share this data with others.<\/p>\n\n\n\n<p>iCloud backups of iPhones and iPads &#8211; widely assumed to be well-protected &#8211; are not completely inaccessible to others, as Apple retains a key to decrypt them. This was a conscious decision made by Apple, likely made in order to prevent customers from being permanently locked out of their data, who would not be able to view backups data were iCloud fully encrypted.<\/p>\n\n\n\n<p>Whilst iCloud backups are vulnerable, other sensitive data such as Health, iCloud Keychain and Passwords are fully end-to-end encrypted with a key that Apple doesn\u2019t hold, so this information cannot be accessed remotely. <\/p>\n\n\n\n<p>While this doesn\u2019t apply to all data Apple stores, end-to-end security without central key storage is one of Apple\u2019s unique selling points. Apple provides a framework named \u2018CloudKit\u2019 for app developers to build on, and data stored in CloudKit is end-to-end encrypted. <\/p>\n\n\n\n<p>One example of a developer putting this to good use is\u00a0 Bear, a note-taking app. As Bear uses Apple\u2019s technology for data storage, even the programmers at Bear themselves can\u2019t access your data and neither can Apple. Only you can.\u00a0<\/p>\n\n\n\n<p>Building systems like this requires caution, and it\u2019s easy for innocuous mistakes to undermine the effectiveness of encryption. Apple\u2019s \u201cMessages in iCloud\u201d service suffers from this: Apple doesn&#8217;t explicitly hold the key to this data, but a copy of the key can be included in a user\u2019s iCloud backup, and Apple does hold the keys to them. Thus one service can provide the key to unlock another.<\/p>\n\n\n\n<p><strong>Not all apps on Google Play are safe<\/strong><\/p>\n\n\n\n<p>Apps available on Apple\u2019s App Store tend to be secure, as Apple reviews them painstakingly before they\u2019re authorised for download. This is often seen as a deterrent for app developers, as getting an app on the App Store can be significantly more time consuming and costly than getting an app on Google Play.&nbsp;<\/p>\n\n\n\n<p>The reason for this is Google Play has a much less stringent app review process. This may be good for developers, but it\u2019s bad for consumers, as it makes it more likely that unsafe &#8211; and even malicious &#8211; apps will find their way onto the Google Play Store. When the scale of data mining from Facebook Research and Onavo came to light, Apple immediately pulled the app from their App Store, whilst Onavo continued to be available via Google Play weeks later until it was eventually removed by Facebook.&nbsp;<\/p>\n\n\n\n<p>In April 2018, a report by Sophos Labs looked at 200 apps on Google Play, and concluded that over 50% of all free antivirus apps available on the service could be classified as \u2018rogueware\u2019. The report noted that some apps had been downloaded 300-400 million times, and warned Android users against downloading free antivirus apps from the Google Play Store.&nbsp;<\/p>\n\n\n\n<p>While the primary aim of most of these malicious apps was to lead users to believe that they had viruses that would require payment to remove (some apps appeared to download a virus, validating their claim), many also requested access to a number of sensitive data permissions. <\/p>\n\n\n\n<p>The permissions requested by such apps were often beyond the scope of functions a typical antivirus app would need, such as location access, camera access and accessing the user&#8217;s phone without their knowledge.<\/p>\n\n\n\n<p>Since the Sophos Labs report was published, Google has made efforts towards securing their app store. In November 2019, the company put together the App Defense Alliance with three antivirus firms &#8211; ESET, Lookout, and Zimperium &#8211; in an effort to eliminate the presence of malicious apps from the Google Play Store. It\u2019s unclear, however, that the App Defense Alliance will also be concerned with protecting user data.&nbsp;<\/p>\n\n\n\n<p><strong>Antivirus software doesn\u2019t always offer protection<\/strong><\/p>\n\n\n\n<p>The use of third-party antivirus software has reduced over the past decade due to three factors:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Users are increasingly storing their data on the cloud, usually in an encrypted state, rather than locally on computers that might otherwise benefit from antivirus software.<\/li><li>Proportionally more data is on smartphones, which tend to have tighter built-in controls and regulations surrounding safety than computers.\u00a0<\/li><li>Modern operating systems include antivirus protection as standard (such as Mac\u2019s Gatekeeper, or Microsoft\u2019s Defender).\u00a0<\/li><\/ul>\n\n\n\n<p>The declining use of third-party antivirus software has left these companies in a tricky situation, leading to antivirus mergers and efforts to pivot into other spheres in order to stay afloat. <\/p>\n\n\n\n<p>As antivirus software is generally granted extensive access to data stored on computers (a necessary step if the software is to identify malware stored anywhere on the computer), these companies are granted access to a lot of sensitive data. Antivirus software has been successfully used as a tool for back-door spying due to their considerable access to data.\u00a0<\/p>\n\n\n\n<p>Almost all of the antivirus companies you see advertised today are based in countries with weak data protection laws or using shell companies to appear to be otherwise. <\/p>\n\n\n\n<p>Countries that do not have data protection laws &#8211; such as the Data Protection Act, or\u00a0 GDPR, or SafeHarbor make it easy for these companies to find additional methods of capturing value from user data.<\/p>\n\n\n\n<p>The location of these companies benefits their transition to offering VPNs alongside their typical antivirus software. VPNs funnel all of a user\u2019s data through a third-party. This can be sensible, in that it shifts a user\u2019s internet traffic into a path that may avoid some authorities, but it puts that data in the hands of private, unknown companies. <\/p>\n\n\n\n<p>A large number of popular VPNs are either based in China or have Chinese ownership, which, considering that VPNs are officially banned in China, may indicate that there are good questions to be asked about the security of this data.<\/p>\n\n\n\n<p>VPNs are aggressive in their advertising and marketing, increasingly using YouTubers for paid advertising, and Google is drowning in sites earning affiliate fees for promoting VPNs, to the extent that it\u2019s almost impossible to find authentic reviews or editorial. This seems unlikely to change. If you were a new entrant, and you wanted to build an excellent product and operate it ethically, you wouldn\u2019t go into competition against desperate offshore AV companies! <\/p>\n\n\n\n<p>Ironically, the majority of companies left in what should be a high-trust market are highly suspect.<\/p>\n\n\n\n<p>With these thoughts in mind, there are a few principles and steps one can take to safeguard their data, and which are outlined in the section below.<\/p>\n\n\n\n<p><strong>How to protect your data<\/strong><\/p>\n\n\n\n<p>Here\u2019s a brief list of steps you can implement to safeguard your data.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Be careful downloading apps, or signing up for services. Beware of dark patterns, and services run by anonymous companies, or companies outside of territories with strong data protection laws (Europe, US, Canada).<\/li><li>Don\u2019t rely on ad-based services like Facebook \u2014 at worst, don\u2019t login with Facebook or install the app &#8211; or products like Google Wi-Fi which remotely collect data. Powerful firewalls like Little Snitch (macOS) or Guardian Firewall (iOS,) can block or highlight invasive data collection.<\/li><li>When finding apps or software, don\u2019t rely on reviews other than those found in the App Store or trusted 3rd-party review sources. It\u2019s easy to fake reviews on a website, to create small fake independent review sites, and to show star ratings in Google Search results. Even larger review sites like Trustpilot can be manipulated, but they\u2019re still likely the best source of reviews.<\/li><li>Be aware of your webcam and mic: apps that use them won\u2019t necessarily make it clear. Even Mark Zuckerberg keeps his blocked when he\u2019s not using it. Consider a webcam shield and mic block which can prevent your computer from being able to record you.<\/li><li>Use two-factor authentication 2FA, but don\u2019t use it over SMS. It\u2019s relatively easy to carry out what\u2019s known as a \u2018SIM-jacking\u2019 attack to gain access to another person\u2019s SMS messages. The CEO of Twitter was successfully attacked this way in 2019.<\/li><li>Take regular backups of your iPhone or iPad using iTunes or iPhone Backup Extractor rather than using iCloud, as iCloud isn\u2019t end-to-end encrypted and has a free storage limit of 5GB .<\/li><li>Use full-disk encryption (FDE). Modern iOS and Android devices have this enabled by default, but your PC or Mac won\u2019t. On the Mac, this is called FileVault, and on Windows it\u2019s called BitLocker. Without FDE, it would be easy for anyone to simply remove the hard-drive from your computer to see your data, bypassing whatever password you use to secure your account.<\/li><li>Don\u2019t defer software updates. Whilst it can be frustrating when it seems like your computer, phone or browser wants to update and restart often, these updates often contain vital security updates.<\/li><li>Password management apps can be invaluable in helping users set and remember distinct, secure passwords for the apps and services they use. Good password managers can also detect duplicate or weak passwords, and check yours against databases of leaked passwords.<\/li><\/ul>\n\n\n\n<p>Aidan Fitzpatrick is founder of<strong> <a rel=\"noreferrer noopener\" aria-label=\"Reincubate (opens in a new tab)\" href=\"https:\/\/reincubate.com\/iphone-backup-extractor\/?gclid=Cj0KCQiAkePyBRCEARIsAMy5ScsIE_iq4H0K5RJGhqF-AS91JOF2OmAh58-G5SS84JyblIey35X3tsEaAjmqEALw_wcB\" target=\"_blank\">Reincubate<\/a><\/strong>, which helps consumers and businesses manage data on their Apple devices. He founded Reincubate in 2008 after building the world\u2019s first iPhone data recovery tool, iPhone Backup Extractor. He\u2019s led Reincubate to win the UK\u2019s highest official business honour &#8211; the Queen\u2019s Award for Enterprise &#8211; twice, has spoken at Google on entrepreneurship, and is a graduate of the Entrepreneurs\u2019 Organisation\u2019s Leadership Academy.<\/p>\n\n\n\n<p>You can view the long-form version of the report <strong><a href=\"https:\/\/reincubate.com\/blog\/how-companies-harvest-your-data\/\">HERE<\/a><\/strong>. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Reincubate founder Aidan Fitzpatrick, in this\u00a0Guarding Data report,\u00a0analyses how large corporations collect and use your personal data. The report aims to help you protect your data by making you aware of how vulnerable your data is and lists the steps you can take to safeguard your data In 2018, it was discovered that Cambridge Analytica &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[199],"tags":[7863,7864,7865],"class_list":["post-15695","post","type-post","status-publish","format-standard","","category-news-views-and-opinion","tag-protect-your-data","tag-reincubate","tag-safeguard-your-data"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How companies legally harvest your data (and how to stop them) - Engineer News Network<\/title>\n<meta name=\"description\" content=\"Reincubate founder Aidan Fitzpatrick, in this Guarding Data report, analyses how large corporations collect and use your personal data. The report aims to help you protect your data by making you aware of how vulnerable your data is and lists the steps you can take to safeguard your data\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.engineernewsnetwork.com\/blog\/how-companies-legally-harvest-your-data-and-how-to-stop-them\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How companies legally harvest your data (and how to stop them) - Engineer News Network\" \/>\n<meta property=\"og:description\" content=\"Reincubate founder Aidan Fitzpatrick, in this Guarding Data report, analyses how large corporations collect and use your personal data. The report aims to help you protect your data by making you aware of how vulnerable your data is and lists the steps you can take to safeguard your data\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.engineernewsnetwork.com\/blog\/how-companies-legally-harvest-your-data-and-how-to-stop-them\/\" \/>\n<meta property=\"og:site_name\" content=\"Engineer News Network\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-28T11:48:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-02-28T11:48:46+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"15 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/how-companies-legally-harvest-your-data-and-how-to-stop-them\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/how-companies-legally-harvest-your-data-and-how-to-stop-them\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#\\\/schema\\\/person\\\/4477342aea8e299c6a21761e513ea8e1\"},\"headline\":\"How companies legally harvest your data (and how to stop them)\",\"datePublished\":\"2020-02-28T11:48:44+00:00\",\"dateModified\":\"2020-02-28T11:48:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/how-companies-legally-harvest-your-data-and-how-to-stop-them\\\/\"},\"wordCount\":2999,\"keywords\":[\"protect your data\",\"Reincubate\",\"safeguard your data\"],\"articleSection\":[\"News, Views and Opinion\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/how-companies-legally-harvest-your-data-and-how-to-stop-them\\\/\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/how-companies-legally-harvest-your-data-and-how-to-stop-them\\\/\",\"name\":\"How companies legally harvest your data (and how to stop them) - Engineer News Network\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#website\"},\"datePublished\":\"2020-02-28T11:48:44+00:00\",\"dateModified\":\"2020-02-28T11:48:46+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#\\\/schema\\\/person\\\/4477342aea8e299c6a21761e513ea8e1\"},\"description\":\"Reincubate founder Aidan Fitzpatrick, in this Guarding Data report, analyses how large corporations collect and use your personal data. The report aims to help you protect your data by making you aware of how vulnerable your data is and lists the steps you can take to safeguard your data\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/how-companies-legally-harvest-your-data-and-how-to-stop-them\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/how-companies-legally-harvest-your-data-and-how-to-stop-them\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/how-companies-legally-harvest-your-data-and-how-to-stop-them\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How companies legally harvest your data (and how to stop them)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/\",\"name\":\"Engineer News Network\",\"description\":\"The ultimate online news and information resource for today's engineer\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#\\\/schema\\\/person\\\/4477342aea8e299c6a21761e513ea8e1\",\"name\":\"admin\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How companies legally harvest your data (and how to stop them) - Engineer News Network","description":"Reincubate founder Aidan Fitzpatrick, in this Guarding Data report, analyses how large corporations collect and use your personal data. The report aims to help you protect your data by making you aware of how vulnerable your data is and lists the steps you can take to safeguard your data","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.engineernewsnetwork.com\/blog\/how-companies-legally-harvest-your-data-and-how-to-stop-them\/","og_locale":"en_GB","og_type":"article","og_title":"How companies legally harvest your data (and how to stop them) - Engineer News Network","og_description":"Reincubate founder Aidan Fitzpatrick, in this Guarding Data report, analyses how large corporations collect and use your personal data. The report aims to help you protect your data by making you aware of how vulnerable your data is and lists the steps you can take to safeguard your data","og_url":"https:\/\/www.engineernewsnetwork.com\/blog\/how-companies-legally-harvest-your-data-and-how-to-stop-them\/","og_site_name":"Engineer News Network","article_published_time":"2020-02-28T11:48:44+00:00","article_modified_time":"2020-02-28T11:48:46+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Estimated reading time":"15 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/how-companies-legally-harvest-your-data-and-how-to-stop-them\/#article","isPartOf":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/how-companies-legally-harvest-your-data-and-how-to-stop-them\/"},"author":{"name":"admin","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1"},"headline":"How companies legally harvest your data (and how to stop them)","datePublished":"2020-02-28T11:48:44+00:00","dateModified":"2020-02-28T11:48:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/how-companies-legally-harvest-your-data-and-how-to-stop-them\/"},"wordCount":2999,"keywords":["protect your data","Reincubate","safeguard your data"],"articleSection":["News, Views and Opinion"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/how-companies-legally-harvest-your-data-and-how-to-stop-them\/","url":"https:\/\/www.engineernewsnetwork.com\/blog\/how-companies-legally-harvest-your-data-and-how-to-stop-them\/","name":"How companies legally harvest your data (and how to stop them) - Engineer News Network","isPartOf":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#website"},"datePublished":"2020-02-28T11:48:44+00:00","dateModified":"2020-02-28T11:48:46+00:00","author":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1"},"description":"Reincubate founder Aidan Fitzpatrick, in this Guarding Data report, analyses how large corporations collect and use your personal data. The report aims to help you protect your data by making you aware of how vulnerable your data is and lists the steps you can take to safeguard your data","breadcrumb":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/how-companies-legally-harvest-your-data-and-how-to-stop-them\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.engineernewsnetwork.com\/blog\/how-companies-legally-harvest-your-data-and-how-to-stop-them\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/how-companies-legally-harvest-your-data-and-how-to-stop-them\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.engineernewsnetwork.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How companies legally harvest your data (and how to stop them)"}]},{"@type":"WebSite","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#website","url":"https:\/\/www.engineernewsnetwork.com\/blog\/","name":"Engineer News Network","description":"The ultimate online news and information resource for today's engineer","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.engineernewsnetwork.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1","name":"admin","url":"https:\/\/www.engineernewsnetwork.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/15695","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/comments?post=15695"}],"version-history":[{"count":2,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/15695\/revisions"}],"predecessor-version":[{"id":15697,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/15695\/revisions\/15697"}],"wp:attachment":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/media?parent=15695"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/categories?post=15695"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/tags?post=15695"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}