{"id":1193,"date":"2013-07-10T20:09:12","date_gmt":"2013-07-10T20:09:12","guid":{"rendered":"http:\/\/www.compuclever.com\/posts\/?p=1193"},"modified":"2013-07-11T00:24:16","modified_gmt":"2013-07-11T00:24:16","slug":"privacy-dont-give-it-away","status":"publish","type":"post","link":"https:\/\/www.compuclever.com\/posts\/privacy-dont-give-it-away\/","title":{"rendered":"Privacy &#8211; Don&#8217;t Give It Away"},"content":{"rendered":"<div class=\"top_p\">\n<div class=\"quick_facts\">Synopsis:\u00a0 We have founded a nation established on individual freedoms and rights.\u00a0 Our right to privacy is fundamental.\u00a0 But what about data that we make available in some manner such as with social media services like Facebook or Twitter?\u00a0 Are we entering into a fuzzy area when we submit and share our content?\u00a0 What is at risk when we open ourselves to digital communications?\u00a0 We\u2019re going to take a look at these questions and attempt some solutions for keeping our digital information from being used in ways we do not intend.\u00a0 In part, we have to take responsibility for making good choices with data that is available to others and can be used for unethical or malicious purpose.<\/div>\n<\/div>\n<h2>Privacy:<\/h2>\n<p><a href=\"https:\/\/www.compuclever.com\/posts\/wp-content\/uploads\/Fotolia_37681744_S_resize.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-1204\" title=\"Don't give away your privacy\" src=\"https:\/\/www.compuclever.com\/posts\/wp-content\/uploads\/Fotolia_37681744_S_resize.jpg\" alt=\"\" width=\"200\" height=\"300\" \/><\/a>We begin with answering the question: What is privacy?\u00a0 David Banisar of the Electronic Privacy Information Center and Simon Davies of Privacy International authored a report on privacy.\u00a0 They begin with:<\/p>\n<div class=\"indent_left\">Privacy is a fundamental human right recognized in the UN Declaration of Human Rights, the International (Covenant) on Civil and Political Rights and in many other international and regional treaties.\u00a0 Privacy underpins human dignity and other key values such as freedom of association and freedom of speech. It has become one of the most important human rights issues of the modern age.<\/div>\n<p>If you are unfamiliar with your human rights we implore you to take a moment to read the Universal Declaration of Human Rights<sup>[1]<\/sup>.\u00a0 From the start it is stated that the \u201cinherent dignity\u201d and \u201cequal and inalienable rights of all members of the human family is the foundation of freedom, justice and peace in the world.\u201d\u00a0 It is written in article 12: \u201cNo one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks.\u201d<\/p>\n<h2>At Risk:<\/h2>\n<p>With the age of information technology (IT), we have seen greater technological capabilities with respect to collection of data.\u00a0 There are numerous devices that are mobile to meet our needs which can record video, audio, and image with ease.\u00a0 We can communicate across the world using email, text messages, video chatting, and of course telecommunications.\u00a0 The level of information generated by each of us has dramatically increased.\u00a0 And yet, the findings of the fifth annual IDC Digital Universe study as reported by ComputerWorld<sup>[2]<\/sup> states that: \u201cthe amount of data people create by writing email messages, taking photos, and downloading music and movies is minuscule compared to the amount of data being created about them\u2026\u201d.<\/p>\n<p>So what\u2019s the harm?\u00a0 What do any of us stand to lose?\u00a0 Good questions!\u00a0 We need to look at two very important factors in this new age of data creation:<\/p>\n<div class=\"indent_left\">\n<ol>\n<li>How is this data being used without my knowledge in ways that impact me and,<\/li>\n<li>How safe is my personal and private information.<\/li>\n<\/ol>\n<\/div>\n<p>Here, in part, are the answers:<\/p>\n<div class=\"indent_left\">\n<p>Computers linked together by high speed networks with advanced processing systems can create comprehensive dossiers on any person without the need for a single central computer system. New technologies developed by the defense industry are spreading into law enforcement, civilian agencies, and private companies.<sup>[3]<\/sup><\/p>\n<p>\u2026though 75% of data today is generated by individuals, enterprises will have some liability for 80% of it at some point in its digital life. And less than one-third of all stored data today has even minimal security or protection; only about half the information that should be protected is protected at all\u2026<sup>[4]<\/sup><\/p>\n<\/div>\n<h2>Giving It Away:<\/h2>\n<p>In recent news we have seen considerable attention placed on Edward Snowden, a 29-year-old former technical assistant for the CIA, and his leaking information on data collection by the US government.\u00a0 A CNN report<sup>[5]<\/sup> clearly lays out many examples of data mining that go on without our knowledge or consent.\u00a0 Let\u2019s take a closer look at some of the 10 ways you give up data without knowing it; how data is being used in ways we are seldom aware.<\/p>\n<div class=\"indent_left\">\n<ul>\n<li>Earlier this year, Facebook purchased information on 70 million US households from a data mining company called Datalogix.\u00a0 Facebook went public with a statement that confirmed what many users were noticing: they were tracking user\u2019s behaviours for advertising purposes.\u00a0 The creators of adverts have been given the opportunity to select their audience targeting options.\u201d<\/li>\n<li>Twitter is partnering with WPP, a leading advertising firm, to analyze Twitter data so as to better monitor consumer behaviour in real-time.\u00a0 This will enable advertisement to better market to you.<\/li>\n<li>Amazon was one of the first companies to start using cookie trackers.\u00a0 Cookies are downloaded to your device or computer to track and analyze where you are browsing and what you are looking at online.\u00a0 The Amazon advertisements then are matched accordingly.\u00a0 Fortunately, there are methods of turning cookie tracking off.<\/li>\n<li>Target made use of a mailer system to track purchases \u2013 a system that would send coupons by mail based on analyzing what purchases are made.\u00a0 The system was so accurate that in one case it predicted a teenage girl was pregnant based on the purchase of toiletries and groceries. Unfortunately the teenager and her family did not know of the pregnancy prior to receiving the coupons.<\/li>\n<li>Law enforcement agencies across the country are constructing DNA databases under the radar.\u00a0 Previously this was in the domain of FBI agencies.\u00a0 These local agencies however, operate with considerable more leeway and police are able in some cases to collect samples from innocent victims of crimes.\u00a0 In some case these people do not realize their DNA will be saved for future searches.<\/li>\n<\/ul>\n<\/div>\n<p>We pay the price for taking advantage of what we consider \u201cfree\u201d services such as email, social networking, and other digital services including simply browsing online.\u00a0 In the latter case we are exposed to tracker cookies, advertisements, and a host of files that are downloaded to our systems without knowledge or consent.\u00a0 As we have clearly pointed out in this month\u2019s articles, there are those that can access our information including the data we simply volunteer from regular use and the items that may be more personal or confidential.\u00a0 If the government can access our data, you can bet that cyber criminals can.\u00a0 Next, we point out how to guard your information.<\/p>\n<h2>How To Be PC Secure:<\/h2>\n<p>We are going to look at closing some security holes ranging from web browsers to encryption and back again to cleaning up what private information you unknowingly make available.<\/p>\n<h3>Step 1 \u2013 The Web Browser:<\/h3>\n<p>There are many websites that offer you the option of using a secure connection when you browse on their site.\u00a0 Security experts agree that this is a good decision when the option is available.\u00a0 The technology for this is referred to as \u201cTransport Layer Security\u201d (TLS), its predecessor is \u201cSecure Sockets Layer\u201d (SSL).\u00a0 Here is what you can do:<\/p>\n<div class=\"indent_left\">\n<ol>\n<li>When you are browsing (try it with Wikipedia for example), change the URL in the address bar from \u201chttp:\/\/ \u201c to: \u201chttps:\/\/\u201d.<\/li>\n<li>You can with some browsers such as Google Chrome, see an icon at the left side (it may appear as a padlock) or on the right side with Internet Explorer.\u00a0 You can click this and get all sorts of information and options including permissions about using cookies.\u00a0 You can also view certificate information and configure certificates.<\/li>\n<\/ol>\n<p>Note:<\/p>\n<ul>\n<li>You may have to type \u201chttps:\/\/\u201d when no preface appears.<\/li>\n<li>A certificate is a digitally signed statement that binds the value of a public key to the a person, device, or service with the corresponding private key.<\/li>\n<\/ul>\n<\/div>\n<p>Further to this:\u00a0 For some browsers you can check the options or settings to configure the Security or Privacy settings.<\/p>\n<p>For an advanced option:\u00a0 you can try HTTPS Everywhere<sup>[6]<\/sup> an extension that works with Firefox and Chrome browsers to encrypt your communications when connecting to many major websites.<\/p>\n<p><strong>Search Engine<\/strong>:\u00a0 All of Google\u2019s data is aggregated and used to customize and target advertising (among other things) aimed at you the user.\u00a0 To use a search engine that does not use tracking you can try the following suggestions.\u00a0 You can disable all your Google, YouTube, Chat (and more) history tracking.\u00a0 However, we find it is sometimes useful to use your history to find something you viewed in your recent past.\u00a0 We recommend trying out <a href=\"https:\/\/duckduckgo.com\/\" target=\"_blank\">Duckduckgo<\/a> which uses:<\/p>\n<div class=\"indent_left\">\u2026several mechanisms to try to ensure\u00a0user privacy: It keeps cookies only if a user wants to change settings on the site, such as turning off ads; it saves searches but does not link them to a user\u2019s IP address or with any unique numbers, and the search engine says it has no way of figuring out what queries came from where. For advertising, the site may put its own code into ads to get credit for the clicks, but it doesn\u2019t track who clicks what\u2026<sup>[7]<\/sup><\/div>\n<h3>Step 2 \u2013 Email:<\/h3>\n<p>Most major email services (including Outlook and Gmail), offer encryption of some kind.\u00a0 You can open your settings and review the security settings and options.\u00a0 Unfortunately with some (like Google mail), you have to dig deep and you may end up with statements of how they may share aggregated information that is non-personally identifiable to their partners including advertisers.<\/p>\n<p>For an advanced option:\u00a0 Read more about <a href=\"http:\/\/www.pcworld.com\/article\/254338\/how_to_encrypt_your_email.html\" target=\"_blank\">how to encrypt your email connection, content, and stored copies<\/a>.<\/p>\n<h3>Step 3 \u2013 Data Encryption:<\/h3>\n<p>You can also encrypt the entire data content of your system or a portion thereof.\u00a0 This would be useful in the event that someone steals your laptop or you risk losing it.\u00a0 All content you choose to encrypt is scrambled and would require a password.\u00a0 With some data encryption tools you can encrypt a USB key, an entire hard drive, or the partition where Windows is installed so that you have to use a password to pre-boot the system.<\/p>\n<p>We recommend checking out <a href=\"http:\/\/www.truecrypt.org\" target=\"_blank\">TrueCrypt<\/a> a free open-source disk encryption software for Windows 7\/Vista\/XP, Mac OS X, and Linux.<\/p>\n<div class=\"indent_left\">Note:\u00a0 As with any of our recommendations we suggest checking out the online reviews for it \u2013 see what other customers and reputable websites say about the vendor and what they offer.<\/div>\n<h3>Step 4 &#8211; VPN:<\/h3>\n<p>Now if you want to get serious \u2013 try out a VPN, a Virtual Private Network.\u00a0 You can group a number of computers over a public network so as to encrypt data being sent back and forth.\u00a0 Many businesses use this to connect remote datacenters and to get access to resources.\u00a0 For more information on this and for a list of reputable VPN providers <a href=\"http:\/\/lifehacker.com\/5940565\/why-you-should-start-using-a-vpn-and-how-to-choose-the-best-one-for-your-needs\" target=\"_blank\">follow this link<\/a>.<\/p>\n<h3>Step 5 \u2013 Clean Up:<\/h3>\n<p>The reality is&#8230; if you have something worth stealing or to warrant surveillance, if you have information that is confidential and available in digital form, you put yourself in a place of being vulnerable to data capturing and potential abuse of information.\u00a0 The greatest measure you can take is to take what is valuable out of harm\u2019s way when possible.<\/p>\n<p>Take action: <a title=\"Secure Computing Practices\" href=\"https:\/\/www.compuclever.com\/posts\/secure-computing-practices\/\" target=\"_blank\">Refer to our previous article on \u201cSecurity\u201d<\/a>.\u00a0 Once you have read information on backing up data, go the section \u201cThe Personal Security and Privacy Scan\u201d.\u00a0 You get good instruction and information on how PC Clean Maestro can detect personal data items that are automatically stored on your PC and \u201cclean\u201d these to keep your computing practices safe and private.<\/p>\n<p>You can keep your digital information secure and away from the wrong hands \u2013 or just \u201cother\u201d hands entirely.\u00a0 We hope you are well on your way to taking full advantage of current technologies without the loss of privacy and confidentiality.<\/p>\n<div class=\"bottom_p\">\n<hr size=\"1\" \/>&nbsp;<br \/>\n[1] <a href=\"http:\/\/www.un.org\/en\/documents\/udhr\/#atop\">www.un.org<\/a><br \/>\n[2] <a href=\"http:\/\/www.computerworld.com\/s\/article\/9217988\/World_s_data_will_grow_by_50X_in_next_decade_IDC_study_predicts?pageNumber=1\">www.computerworld.com<\/a><br \/>\n[3] <a href=\"http:\/\/gilc.org\/privacy\/survey\/intro.html\">www.gilc.org<\/a><br \/>\n[4] <a href=\"http:\/\/www.computerworld.com\/s\/article\/9217988\/World_s_data_will_grow_by_50X_in_next_decade_IDC_study_predicts?pageNumber=1\">www.computerworld.com<\/a><br \/>\n[5] <a href=\"http:\/\/www.cnn.com\/2013\/06\/13\/living\/buzzfeed-data-mining\/index.html?iid=article_sidebar\">www.cnn.com<\/a><br \/>\n[6] <a href=\"https:\/\/www.eff.org\/https-everywhere\">www.eff.org<\/a><br \/>\n[7] <a href=\"http:\/\/www.washingtonpost.com\/business\/technology\/duckduckgo-sees-user-base-jump-fueled-by-tracking-concerns\/2013\/07\/01\/628ed58a-e242-11e2-a11e-c2ea876a8f30_story.html\">www.washingtonpost.com<\/a><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p><p> We have founded a nation established on individual freedoms and rights.  Our right to privacy is fundamental.  But what about data that we make available in some manner such as with social media services like Facebook or Twitter?  Are we entering into a fuzzy area when we submit and share our content?  What is at risk when we open ourselves to digital communications?  We\u2019re going to take a look at these questions and attempt some solutions for keeping our digital information from being used in ways we do not intend.  In part, we have to take responsibility for making good choices with data that is available to others and can be used for unethical or malicious purpose.<\/p>\n<\/p>","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[5,56,54,59,55],"tags":[],"class_list":{"0":"post-1193","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-blog","7":"category-newsletter","8":"category-pc-clean-maestro","9":"category-pc-security","10":"category-protect-online-privacy","11":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Privacy - Don&#039;t Give It Away - CompuClever<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.compuclever.com\/posts\/privacy-dont-give-it-away\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Privacy - Don&#039;t Give It Away - CompuClever\" \/>\n<meta property=\"og:description\" content=\"We have founded a nation established on individual freedoms and rights. Our right to privacy is fundamental. But what about data that we make available in some manner such as with social media services like Facebook or Twitter? Are we entering into a fuzzy area when we submit and share our content? What is at risk when we open ourselves to digital communications? We\u2019re going to take a look at these questions and attempt some solutions for keeping our digital information from being used in ways we do not intend. In part, we have to take responsibility for making good choices with data that is available to others and can be used for unethical or malicious purpose.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.compuclever.com\/posts\/privacy-dont-give-it-away\/\" \/>\n<meta property=\"og:site_name\" content=\"CompuClever\" \/>\n<meta property=\"article:published_time\" content=\"2013-07-10T20:09:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2013-07-11T00:24:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.compuclever.com\/posts\/wp-content\/uploads\/Fotolia_37681744_S_resize.jpg\" \/>\n<meta name=\"author\" content=\"Andy Thompson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andy Thompson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.compuclever.com\/posts\/privacy-dont-give-it-away\/\",\"url\":\"https:\/\/www.compuclever.com\/posts\/privacy-dont-give-it-away\/\",\"name\":\"Privacy - Don't Give It Away - CompuClever\",\"isPartOf\":{\"@id\":\"https:\/\/www.compuclever.com\/posts\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.compuclever.com\/posts\/privacy-dont-give-it-away\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.compuclever.com\/posts\/privacy-dont-give-it-away\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.compuclever.com\/posts\/wp-content\/uploads\/Fotolia_37681744_S_resize.jpg\",\"datePublished\":\"2013-07-10T20:09:12+00:00\",\"dateModified\":\"2013-07-11T00:24:16+00:00\",\"author\":{\"@id\":\"https:\/\/www.compuclever.com\/posts\/#\/schema\/person\/1aa5198ade422a26b15ccd33c5808030\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.compuclever.com\/posts\/privacy-dont-give-it-away\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.compuclever.com\/posts\/privacy-dont-give-it-away\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.compuclever.com\/posts\/privacy-dont-give-it-away\/#primaryimage\",\"url\":\"https:\/\/www.compuclever.com\/posts\/wp-content\/uploads\/Fotolia_37681744_S_resize.jpg\",\"contentUrl\":\"https:\/\/www.compuclever.com\/posts\/wp-content\/uploads\/Fotolia_37681744_S_resize.jpg\",\"width\":\"200\",\"height\":\"300\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.compuclever.com\/posts\/privacy-dont-give-it-away\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.compuclever.com\/posts\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy &#8211; Don&#8217;t Give It Away\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.compuclever.com\/posts\/#website\",\"url\":\"https:\/\/www.compuclever.com\/posts\/\",\"name\":\"CompuClever\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.compuclever.com\/posts\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.compuclever.com\/posts\/#\/schema\/person\/1aa5198ade422a26b15ccd33c5808030\",\"name\":\"Andy Thompson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.compuclever.com\/posts\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/baa90b3b3027cf479f774c33e44cacaa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/baa90b3b3027cf479f774c33e44cacaa?s=96&d=mm&r=g\",\"caption\":\"Andy Thompson\"},\"sameAs\":[\"https:\/\/plus.google.com\/u\/0\/115448182358438955555\/posts\"],\"url\":\"https:\/\/www.compuclever.com\/posts\/author\/yida\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Privacy - Don't Give It Away - CompuClever","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.compuclever.com\/posts\/privacy-dont-give-it-away\/","og_locale":"en_US","og_type":"article","og_title":"Privacy - Don't Give It Away - CompuClever","og_description":"We have founded a nation established on individual freedoms and rights. Our right to privacy is fundamental. But what about data that we make available in some manner such as with social media services like Facebook or Twitter? Are we entering into a fuzzy area when we submit and share our content? What is at risk when we open ourselves to digital communications? We\u2019re going to take a look at these questions and attempt some solutions for keeping our digital information from being used in ways we do not intend. In part, we have to take responsibility for making good choices with data that is available to others and can be used for unethical or malicious purpose.","og_url":"https:\/\/www.compuclever.com\/posts\/privacy-dont-give-it-away\/","og_site_name":"CompuClever","article_published_time":"2013-07-10T20:09:12+00:00","article_modified_time":"2013-07-11T00:24:16+00:00","og_image":[{"url":"https:\/\/www.compuclever.com\/posts\/wp-content\/uploads\/Fotolia_37681744_S_resize.jpg","type":"","width":"","height":""}],"author":"Andy Thompson","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Andy Thompson","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.compuclever.com\/posts\/privacy-dont-give-it-away\/","url":"https:\/\/www.compuclever.com\/posts\/privacy-dont-give-it-away\/","name":"Privacy - Don't Give It Away - CompuClever","isPartOf":{"@id":"https:\/\/www.compuclever.com\/posts\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.compuclever.com\/posts\/privacy-dont-give-it-away\/#primaryimage"},"image":{"@id":"https:\/\/www.compuclever.com\/posts\/privacy-dont-give-it-away\/#primaryimage"},"thumbnailUrl":"https:\/\/www.compuclever.com\/posts\/wp-content\/uploads\/Fotolia_37681744_S_resize.jpg","datePublished":"2013-07-10T20:09:12+00:00","dateModified":"2013-07-11T00:24:16+00:00","author":{"@id":"https:\/\/www.compuclever.com\/posts\/#\/schema\/person\/1aa5198ade422a26b15ccd33c5808030"},"breadcrumb":{"@id":"https:\/\/www.compuclever.com\/posts\/privacy-dont-give-it-away\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.compuclever.com\/posts\/privacy-dont-give-it-away\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.compuclever.com\/posts\/privacy-dont-give-it-away\/#primaryimage","url":"https:\/\/www.compuclever.com\/posts\/wp-content\/uploads\/Fotolia_37681744_S_resize.jpg","contentUrl":"https:\/\/www.compuclever.com\/posts\/wp-content\/uploads\/Fotolia_37681744_S_resize.jpg","width":"200","height":"300"},{"@type":"BreadcrumbList","@id":"https:\/\/www.compuclever.com\/posts\/privacy-dont-give-it-away\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.compuclever.com\/posts\/"},{"@type":"ListItem","position":2,"name":"Privacy &#8211; Don&#8217;t Give It Away"}]},{"@type":"WebSite","@id":"https:\/\/www.compuclever.com\/posts\/#website","url":"https:\/\/www.compuclever.com\/posts\/","name":"CompuClever","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.compuclever.com\/posts\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.compuclever.com\/posts\/#\/schema\/person\/1aa5198ade422a26b15ccd33c5808030","name":"Andy Thompson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.compuclever.com\/posts\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/baa90b3b3027cf479f774c33e44cacaa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/baa90b3b3027cf479f774c33e44cacaa?s=96&d=mm&r=g","caption":"Andy Thompson"},"sameAs":["https:\/\/plus.google.com\/u\/0\/115448182358438955555\/posts"],"url":"https:\/\/www.compuclever.com\/posts\/author\/yida\/"}]}},"_links":{"self":[{"href":"https:\/\/www.compuclever.com\/posts\/wp-json\/wp\/v2\/posts\/1193","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.compuclever.com\/posts\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.compuclever.com\/posts\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.compuclever.com\/posts\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.compuclever.com\/posts\/wp-json\/wp\/v2\/comments?post=1193"}],"version-history":[{"count":19,"href":"https:\/\/www.compuclever.com\/posts\/wp-json\/wp\/v2\/posts\/1193\/revisions"}],"predecessor-version":[{"id":1218,"href":"https:\/\/www.compuclever.com\/posts\/wp-json\/wp\/v2\/posts\/1193\/revisions\/1218"}],"wp:attachment":[{"href":"https:\/\/www.compuclever.com\/posts\/wp-json\/wp\/v2\/media?parent=1193"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.compuclever.com\/posts\/wp-json\/wp\/v2\/categories?post=1193"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.compuclever.com\/posts\/wp-json\/wp\/v2\/tags?post=1193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}