{"id":3172,"date":"2022-02-08T12:02:34","date_gmt":"2022-02-08T12:02:34","guid":{"rendered":"http:\/\/blogs.kent.ac.uk\/unikentcomp-news\/?p=3172"},"modified":"2022-02-10T17:04:42","modified_gmt":"2022-02-10T17:04:42","slug":"consent-in-the-digital-age-protecting-your-information","status":"publish","type":"post","link":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/2022\/02\/08\/consent-in-the-digital-age-protecting-your-information\/","title":{"rendered":"Consent in the Digital Age: Protecting Your Information"},"content":{"rendered":"<p>As part of Safer Internet Day 2022, Kent academics share their expertise and tips on keeping ourselves and each other safe in the digital sphere<\/p>\n<p>It has been said that in 2020 the world moved online. Two years on and, although we are no longer confined to digital spaces, our digital presence is ever increasing.<\/p>\n<p>&nbsp;<\/p>\n<p>When you visit a website, what do you want the organisation running the website to know about you, and to share with other organisations? What do you feel comfortable having others \u2013 friends, family or others \u2013 share about you online? These are questions of consent. Digital consent is one of the most important considerations of using the Internet:\u00a0<strong>what do you want to share about yourself online?<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>We recognise that giving genuine and informed consent is increasingly difficult in a world where requests to \u2018accept Terms and Conditions\u2019 and \u2018Privacy Policies\u2019 are constantly showing up on our screens, so we asked the experts for tips to help us protect our information\u2026<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Who can see it?<\/strong><\/p>\n<p>If you have social media profiles, think about how they are set up: who can see them? Are they public, or private? If you want a public profile, consider what you post: what would future employers, friends or colleagues think?\u202f What information can people take from your profile about you and use elsewhere?<\/p>\n<p>&nbsp;<\/p>\n<p><strong>What do they want to know and why?<\/strong><\/p>\n<p>Consider what types of information you are prepared to give to websites and services. Terms and conditions and privacy notices can be overwhelming and opaque, but it\u2019s worth trying to think: what information might they be collecting about me? Why? What can they do with it? If you\u2019re not comfortable with sharing the information, don\u2019t. You can limit information collection by rejecting cookies (small pieces of code on websites that track your website usage), or go further by moving to more privacy preserving technologies:\u00a0<a href=\"https:\/\/duckduckgo.com\/\">Duck Duck Go<\/a>\u00a0for web searches,\u00a0<a href=\"https:\/\/signal.org\/en\/\">Signal<\/a>\u00a0for instant messaging, or\u00a0<a href=\"https:\/\/brave.com\/\">Brave<\/a>, or a\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Virtual_private_network\">VPN<\/a>\u00a0to limit the amount of information you are providing about your activities online.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Sharing about others \u2013 ask first!<\/strong><\/p>\n<p>Do you have boundaries for online sharing? Do your friends and family know what they are? People who have information about you \u2013 photos, videos, stories \u2013 may feel very differently about how widely these should be shared. You won\u2019t be able to find this out if you don\u2019t talk about it, and it is harder to try and take down something that has already been shared online than to stop it being posted in the first place.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Online information \u2013 have you thought about\u2026<\/strong><\/p>\n<ul>\n<li>Your personal information can be used to infer details about your family members and friends which they might prefer not to share.<\/li>\n<\/ul>\n<ul>\n<li>When posting an image or a video that you took on social media, how will the people (e.g., friends, others) shown in the image or video feel about it being online? Will they like being seen there? Does it present them in a way they will be unhappy with?<\/li>\n<li>Does sharing that photo\/ quote\/ video in the online world benefit you? For instance, if you don\u2019t want people to recognise you in the real world, don\u2019t use your photo as your profile image \u2013 even if the app asks for it!<\/li>\n<li>You don\u2019t need to keep all your posts online forever. Consider deleting old posts especially those containing personal information, or switch on privacy options that help you do it.<\/li>\n<li>Do you need to let the whole word know all your opinions and deepest thoughts? When discussing things that are more personal, you could use private messages or discuss them in a closed group. Remember, others could always screenshot your posts, which means that they may be available even after you delete them.<\/li>\n<li>Many service providers will ask you to create a new account \u2013 instead of giving your personal information, you could create a secondary email account without giving extensive information for example.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Worried you may have already over-shared online? Take back control!<\/strong><\/p>\n<p>You can\u2019t take back control if you don\u2019t know where your personal information is; make a note of your online accounts and delete them when you don\u2019t need them anymore.\u00a0All online platforms have privacy controls for you to use. Study them and use them. You\u2019ll also find that some platforms even provide the ability to do privacy or security \u2018check-ups\u2019 \u2013 do take this opportunity!\u00a0You can choose to use more privacy-friendly alternative tools, using\u00a0<a href=\"https:\/\/brave.com\/\">Brave<\/a>, for instance, as your default web browser.<\/p>\n<p>&nbsp;<\/p>\n<p>Want to know more about safe digital sharing? How to share with consent and be mindful of future use, what to do if you\u2019re a victim of revengeporn and more; check out our blogpost on <a href=\"https:\/\/blogs.kent.ac.uk\/staff-student-news\/2022\/02\/08\/consent-in-the-digital-age-sharing-images-and-media\/\">Consent in the Digital Age: Sharing Images and Media<\/a>.<\/p>\n<p>With contributions from: Sarah Turner, PhD Researcher in Cyber Security, School of Computing; Dr Virginia Franqueira, Lecturer in Cyber Security, School of Computing; Dr Paraskevi Triantafyllopoulou, Lecturer in Intellectual &amp; Developmental Disabilities, Tizard centre; Dr Gareth Mott, Lecturer in Security and Intelligence, School of Politics and International Relations; Dr Mu Yang, Senior Lecturer in Digital Marketing Analytics, Kent Business School; Professor Shujun Li, Professor of Cyber Security, School of Computing; Dr Jason Nurse, Senior Lecturer in Cyber Security, School of Computing.<\/p>\n<p>Written by Filipa Paes, third year student.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As part of Safer Internet Day 2022, Kent academics share their expertise and tips on keeping ourselves and each other safe in the digital sphere &hellip; <a href=\"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/2022\/02\/08\/consent-in-the-digital-age-protecting-your-information\/\">Read&nbsp;more<\/a><\/p>\n","protected":false},"author":55813,"featured_media":3171,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[124,70,122],"tags":[],"_links":{"self":[{"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/posts\/3172"}],"collection":[{"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/users\/55813"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/comments?post=3172"}],"version-history":[{"count":1,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/posts\/3172\/revisions"}],"predecessor-version":[{"id":3173,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/posts\/3172\/revisions\/3173"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/media\/3171"}],"wp:attachment":[{"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/media?parent=3172"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/categories?post=3172"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/tags?post=3172"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}