Personal information or financial data will not be exposed

Assignment Help Basic Computer Science
Reference no: EM132388971

Delete yourself from the internet (is it possible and how it can be accomplished?)

Do you feel you are vulnerable to hackers or identity thieves because you have a large online presence? Have you ever thought of removing your personal data from the net? Well, it's not quite as simple as it should be. There are a few easy-to-follow steps that should point you in the right direction that can be found online, but the story does not end there. How can you make sure your personal information or financial data will not be exposed on sites that do not have your written permission? Is it possible to completely remove yourself from the web?

Facebook's practices were under scrutiny when it was revealed that the data of more than 50 million Facebook users found its way into the hands of UK-based Cambridge Analytica, which reportedly used it to better target political ads for the Trump campaign during the US 2016 presidential election.

The more troubling aspect of the story is that your personal data on these free services is often somewhat exposed because you opted-in to all sorts of onerous provisions when you first signed up for these "free" services. That's exactly why some users are choosing to completely delete or deactivate accounts when and where possible.

So, how can deleting yourself from the internet prevent these companies from acquiring your information? Some say there is no sure way to completely remove your information, but there are ways to minimize your online footprint, which would lower the chances of your data getting compromised.

====

Project Plan

In this case project, we will determine the many options and the companies that collect your personal information. They're called data brokers and they have names like Spokeo, Whitepages.com, PeopleFinder, BeenVerified, as well as plenty of others.

1) In addition to the sites named above, list 5 additional agencies you find that collect this type of personal data. Hint: Many claim to be marketing agencies.

2) Provide a list of the companies that you find that claim to be able to remove your personal information from the data broker sites and the methods they use to delete this information.

3) Write a report on these findings with a step-by-step written summary of the processes and the methods discovered.

Reference no: EM132388971

Questions Cloud

Field of view at total magnification power : Knowing that the magnification power of the ocular lens is 10X, and the diameter of the field of view at total magnification power of 400X is 500um.
Why the quote is significant and has a strong meaning : Write a college level paragraph explaining: why the quote is significant and has a strong meaning behind the information Use evidence and examples from the text
Discuss means to cope with the complexity of computer : Discuss means to cope with the complexity of computer and communication systems other than modularity, layering and hierarchy.
What would be the next step in development : Describe which gross and fine motor skills the child has reached. What has the child already achieved and what would be the next step in development?
Personal information or financial data will not be exposed : How can you make sure your personal information or financial data will not be exposed on sites that do not have your written permission?
Examine cultural dimensions and compare it with yours : Please go to the websites below. I want you to select 5 different countries, examine their cultural dimensions and compare it with yours. I want you to print.
Explain qualitative and quantitative forecasting : In 750-1000 words, explain qualitative and quantitative forecasting, and then come up with an original example of each taken from your own professional.
What is binary fission : 1. What is binary fission, and what kinds of cells use it as their principal means of reproduction?
Important aspect of IT Application Development process : What is System Architecture? Do you think it is an important aspect of the IT Application Development process?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Clear explanation of the program

Write a program in a programming language of your choice to simulate routing using flooding for a network of your choice with at least ten nodes (different from the example in the lecture notes). Each packet should contain a counter that is decrem..

  Find the standard error of the mean

Botany A botanist is studying the effects of a drought on the size of acorns produced by the oak trees. A random sample of 50 acorns reveals a mean diameter of 16.2 millimeters and a standard deviation of 1.4 millimeters.

  Explain how a blue pill functions

Explain how a Blue Pill functions. What are the weaknesses that this malware exploits and how?

  Show the shortest-path multicast trees for each source

Consider the example internet shown in Figure 4.59, in which sources D and E send packets to multicast group G, whose members are shaded in gray. Show the shortest-path multicast trees for each source

  Sequence diagram for field officer

Draw a sequence diagram for the following use case. Draw only the first five messages sent. The FieldOfficer activates the "Report Emergency" function of her terminal. The system responds by presenting a form to the officer.

  Calculate the macaulay duration of the bond in years

The yield to matuarity is an annual effective rate of 6%. Calculate the Macaulay duration of the bond in years.

  Focused on decision support systems

focused on decision support systems (DSS) and business intelligence (BI). Provide an example of a DSS with a visually effective graphical user interface (GUI),

  Calculate the price elasticity if demand involved

a) Calculate the price elasticity if demand involved here (correct to 2 decimal places)

  Distance-based vs density-based outlier detection

"Explain the difference between Distance-Based vs. Density-Based Outlier Detection".

  Required yield to maturity on a? comparable-risk

The? market's required yield to maturity on a? comparable-risk bond is 10 percent. The current market price for the bond is $1,080.

  Give cfg for the following language

Give CFG for the language L={x %u03F5 {0,1}*/x has unequal number of 0's and 1's}

  Explaining power over ethernet and transfer power over fiber

A recent article in industry magazine discussed the ability to transfer Power over Ethernet (PoE) and emerging technology that is able to transfer Power over Fiber (PoF).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd