{"id":2860,"date":"2020-05-26T01:53:00","date_gmt":"2020-05-26T01:53:00","guid":{"rendered":"https:\/\/accessaccountability.org\/?p=2860"},"modified":"2022-03-14T11:55:37","modified_gmt":"2022-03-14T02:55:37","slug":"digital-privacy","status":"publish","type":"post","link":"https:\/\/accessaccountability.org\/index.php\/2020\/05\/26\/digital-privacy\/","title":{"rendered":"Digital Privacy"},"content":{"rendered":"<p>[et_pb_section fb_built=&#x201D;1&#x2033; _builder_version=&#x201D;3.19.18&#x2033; custom_padding=&#x201D;50px|0px|30px|0px|false|false&#x201D;][et_pb_row custom_padding=&#x201D;0|0px|27px|0px|false|false&#x201D; _builder_version=&#x201D;3.19.18&#x2033;][et_pb_column type=&#x201D;4_4&#x2033; _builder_version=&#x201D;3.19.18&#x2033;][et_pb_text _builder_version=&#x201D;3.19.18&#x2033;]<\/p>\n<h3><span face=\"Times New Roman, serif\" style=\"color: #ff0000;\"><span size=\"3\">What is Digital Privacy? <\/span><\/span><\/h3>\n<p><span face=\"Times New Roman, serif\"><span size=\"3\">Have you ever CC&#x2019;d your recipient contacts in an email, rather than using BCC? Connected to unsecured public Wi-Fi networks? Had an advertisement follow you from site to site? Given a game on your smartphone unjustified permission to access your microphone and photos? Posted information online that could allow someone to easily find your home address and phone number? <\/span><\/span><\/p>\n<p><span face=\"Times New Roman, serif\"><span size=\"3\">If you have answered yes to any of these questions, your digital privacy may be at risk. In fact, your information could be used to harm you or the people you contact. Any compromise makes you or your contacts vulnerable to an attack or misuse of information. This is especially true if your organization handles information that could potentially put people&#x2019;s lives at risk. <\/span><\/span><\/p>\n<p><span face=\"Times New Roman, serif\"><span size=\"3\">As more of our personal and professional lives are lived online, it is important to understand how to protect our communication and data from falling into the wrong hands. To do so effectively, we need to understand two interconnected concepts: <\/span><\/span><a href=\"https:\/\/us.norton.com\/internetsecurity-privacy-privacy-vs-security-whats-the-difference.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span color=\"#cc0000\"><span face=\"Times New Roman, serif\"><span size=\"3\">digital security and digital privacy<\/span><\/span><\/span><\/a><span face=\"Times New Roman, serif\"><span size=\"3\">. Digital security is about the protection of data and guarding against unauthorized access. Security measures, such as the use of strong passwords, VPNs, and security software, limit who can access certain information. Digital privacy refers to the protection of personally identifiable information, such as names, demographics, addresses, photos, and contact information. <\/span><\/span><\/p>\n<p><span face=\"Times New Roman, serif\"><span size=\"3\">An overlap between digital security and digital privacy is inevitable, since an important part of security is protecting the personal information of individuals in a database. However, here we will focus on digital privacy &#x2013; why it is important to protect and how to do so. For practical digital security measures, see <\/span><\/span><span color=\"#cc0000\"><span face=\"Times New Roman, serif\"><span size=\"3\">this <a href=\"https:\/\/accessaccountability.org\/index.php\/2018\/09\/12\/digital-security-checklist-for-human-rights-defenders\/\">digital security checklist<\/a><\/span><\/span><\/span><span face=\"Times New Roman, serif\"><span size=\"3\">.<\/span><\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#x201D;3.19.18&#x2033;][et_pb_column type=&#x201D;4_4&#x2033; _builder_version=&#x201D;3.19.18&#x2033;][et_pb_text _builder_version=&#x201D;3.19.18&#x2033;]<\/p>\n<h3><span style=\"color: #ff0000;\">Why Does It Matter?<\/span><\/h3>\n<p><span face=\"Times New Roman, serif\"><span size=\"3\">Many people believe that privacy is not important to them either because they have nothing to hide or there is nothing they can do about it. Privacy, however, is not about hiding anything but protecting yourself and those around you. If privacy is not protected, any information can be misused to threaten, harm, or bring down the reputation of a person or individual. Private information is private and should not be shared unknowingly. <\/span><\/span><\/p>\n<p><span face=\"Times New Roman, serif\"><span size=\"3\">In an organization, the digital privacy of each individual matters because once the individual&#x2019;s privacy is breached, it can compromise the security of the entire organization. As we are interconnected in our communication, we can only keep our contacts safe if we protect our personal privacy. A failure to protect your own privacy compromises the privacy of your contacts, organization, and clients. <\/span><\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding=&#x201D;30px|0px|0|0px|false|false&#x201D; _builder_version=&#x201D;3.19.18&#x2033;][et_pb_column type=&#x201D;4_4&#x2033; _builder_version=&#x201D;3.19.18&#x2033;][et_pb_text _builder_version=&#x201D;3.19.18&#x2033;]<\/p>\n<h3><span face=\"Times New Roman, serif\"><span size=\"3\"><span style=\"color: #ff0000;\">What could happen to you without sufficient digital privacy?<\/span> <\/span><\/span><\/h3>\n<p><span face=\"Times New Roman, serif\"><span size=\"3\">In one instance, a member of a human rights group in South Korea reused the same password for multiple sites, a habit common to many. One website experienced a digital security breach. The attacker claimed to have his password and contact list and threatened to send his browsing history to his contacts if he refused to pay a fee in bitcoin. Once your information has been leaked, intentionally or unintentionally, it cannot be undone. However, it is not too late to begin protecting your information now. If you suspect that you have received a malicious email, you can contact experts at <a href=\"https:\/\/www.accessnow.org\/help\/\" target=\"_blank\" rel=\"noopener noreferrer\">Access Now&#xA0;<\/a><\/span><\/span><a href=\"https:\/\/www.accessnow.org\/help\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span color=\"#cc0000\"><span face=\"Times New Roman, serif\"><span size=\"3\">Digital Security Helpline<\/span><\/span><\/span><\/a><span face=\"Times New Roman, serif\"><span size=\"3\">.<\/span><\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#x201D;1&#x2033; _builder_version=&#x201D;3.19.18&#x2033;][et_pb_row custom_padding=&#x201D;0|0px|0|0px|false|false&#x201D; _builder_version=&#x201D;3.19.18&#x2033;][et_pb_column type=&#x201D;4_4&#x2033; _builder_version=&#x201D;3.19.18&#x2033;][et_pb_image src=&#x201D;https:\/\/accessaccountability.org\/wp-content\/uploads\/2020\/05\/30235-1.jpg&#x201D; _builder_version=&#x201D;3.19.18&#x2033; box_shadow_style=&#x201D;preset1&#x2033;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#x201D;1&#x2033; _builder_version=&#x201D;3.19.18&#x2033;][et_pb_row custom_padding=&#x201D;0|0px|27px|0px|false|false&#x201D; _builder_version=&#x201D;3.19.18&#x2033;][et_pb_column type=&#x201D;4_4&#x2033; _builder_version=&#x201D;3.19.18&#x2033;][et_pb_text _builder_version=&#x201D;3.19.18&#x2033;]<\/p>\n<p style=\"text-align: right;\"><span style=\"color: #ff0000;\"><strong>Actual screenshot of the <a class=\"glossaryLink\"  aria-describedby=\"tt\"  data-cmtooltip=\"&lt;div class=glossaryItemTitle&gt;incident&lt;\/div&gt;&lt;div class=glossaryItemBody&gt;an event or disagreement that is likely to cause serious problems in relations between countries&amp;lt;br \/&amp;gt;Source:&nbsp;&amp;lt;span style=&amp;quot;color: #000000;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;font-family: Cambria, serif;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;Merriam-Webster Learner&rsquo;s Dictionary&amp;lt;\/span&amp;gt;&amp;lt;\/span&amp;gt;&amp;lt;\/span&amp;gt;&lt;\/div&gt;\"  href=\"https:\/\/accessaccountability.org\/index.php\/glossary\/incident\/\"  data-gt-translate-attributes='[{\"attribute\":\"data-cmtooltip\", \"format\":\"html\"}]'  tabindex='0' role='link'>incident<\/a><\/strong><\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#x201D;1&#x2033; _builder_version=&#x201D;3.19.18&#x2033;][et_pb_row _builder_version=&#x201D;3.19.18&#x2033;][et_pb_column type=&#x201D;4_4&#x2033; _builder_version=&#x201D;3.19.18&#x2033;][et_pb_text _builder_version=&#x201D;3.19.18&#x2033;]<\/p>\n<h3><span face=\"Times New Roman, serif\"><span size=\"3\"><span style=\"color: #ff0000;\">What can human rights documentation groups do?<\/span> <\/span><\/span><\/h3>\n<p><span face=\"Times New Roman, serif\"><span size=\"3\">While there is never 100% protection, there are things you can do to better protect your own and your organization&#x2019;s privacy. Below are several practical steps you can take to guard your privacy. <\/span><\/span><\/p>\n<p>&#xA0;<\/p>\n<h4><span face=\"Times New Roman, serif\" style=\"color: #ff0000;\"><span size=\"3\">Websites<\/span><\/span><\/h4>\n<p><span face=\"Times New Roman, serif\"><span size=\"3\">You can control the private information that websites see when you are browsing online. Websites often run scripts and load content from other sites, and share your information with other sites without your knowledge. An example of this is when <a href=\"https:\/\/www.lifewire.com\/ads-online-why-are-they-following-you-around-the-web-4063788\" target=\"_blank\" rel=\"noopener noreferrer\">an <\/a><\/span><\/span><a href=\"https:\/\/www.lifewire.com\/ads-online-why-are-they-following-you-around-the-web-4063788\" target=\"_blank\" rel=\"noopener noreferrer\"><span color=\"#cc0000\"><span face=\"Times New Roman, serif\"><span size=\"3\">ad follows you from site to site<\/span><\/span><\/span><\/a><span face=\"Times New Roman, serif\"><span size=\"3\">. <\/span><\/span><span face=\"Times New Roman, serif\"><span size=\"3\">Here are several browser plug-ins that allow you to control what information websites see: <\/span><\/span><a href=\"https:\/\/addons.mozilla.org\/en-US\/firefox\/addon\/cookie-autodelete\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span color=\"#cc0000\"><span face=\"Times New Roman, serif\"><span size=\"3\">Cookie Auto Delete<\/span><\/span><\/span><\/a><span face=\"Times New Roman, serif\"><span size=\"3\">, <\/span><\/span><a href=\"https:\/\/privacybadger.org\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span color=\"#cc0000\"><span face=\"Times New Roman, serif\"><span size=\"3\">Privacy Badger<\/span><\/span><\/span><\/a><span face=\"Times New Roman, serif\"><span size=\"3\">, <\/span><\/span><a href=\"https:\/\/www.eff.org\/https-everywhere\" target=\"_blank\" rel=\"noopener noreferrer\"><span color=\"#cc0000\"><span face=\"Times New Roman, serif\"><span size=\"3\">HTTPS Everywhere<\/span><\/span><\/span><\/a><span face=\"Times New Roman, serif\"><span size=\"3\">, <\/span><\/span><span color=\"#cc0000\"><span face=\"Times New Roman, serif\"><span size=\"3\"><a href=\"https:\/\/noscript.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">No Script<\/a>,<\/span><\/span><\/span><span face=\"Times New Roman, serif\"><span size=\"3\"> and <\/span><\/span><a href=\"https:\/\/getublock.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span color=\"#cc0000\"><span face=\"Times New Roman, serif\"><span size=\"3\">uBlock Origin<\/span><\/span><\/span><\/a><span face=\"Times New Roman, serif\"><span size=\"3\">.&#xA0;&#xA0;<\/span><\/span><span face=\"Times New Roman, serif\"><span size=\"3\">Another thing to be mindful of is websites asking users to accept cookies. Make sure to <\/span><\/span><a href=\"https:\/\/www.allaboutcookies.org\/manage-cookies\/clear-cookies-installed.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span color=\"#cc0000\"><span face=\"Times New Roman, serif\"><span size=\"3\">delete unwanted cookies<\/span><\/span><\/span><\/a><span face=\"Times New Roman, serif\"><span size=\"3\"> <\/span><\/span><span face=\"Times New Roman, serif\"><span size=\"3\">or <\/span><\/span><a href=\"https:\/\/www.howtogeek.com\/269265\/how-to-enable-private-browsing-on-any-web-browser\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span color=\"#cc0000\"><span face=\"Times New Roman, serif\"><span size=\"3\">use private browsing<\/span><\/span><\/span><\/a><span face=\"Times New Roman, serif\"><span size=\"3\">, in which cookies are automatically deleted upon the closing of the session. <\/span><\/span><\/p>\n<p>&#xA0;<\/p>\n<h4><span face=\"Times New Roman, serif\" style=\"color: #ff0000;\"><span size=\"3\">Apps<\/span><\/span><\/h4>\n<p><span face=\"Times New Roman, serif\"><span size=\"3\">Apps are another common area in which digital privacy is often breached. It is important to delete any unnecessary apps from your phone and carefully manage permissions. If an <\/span><\/span><a href=\"https:\/\/www.smh.com.au\/technology\/if-in-doubt-say-no-why-phone-apps-want-permission-to-use-your-personal-data-20191106-p53813.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span color=\"#cc0000\"><span face=\"Times New Roman, serif\"><span size=\"3\">app asks for permissions that are not necessary to the function<\/span><\/span><\/span><\/a><span face=\"Times New Roman, serif\"><span size=\"3\">, be cautious about installing it.<\/span><\/span><span face=\"Times New Roman, serif\"><span size=\"3\">&#xA0;Has an app asked for permission to access your contact list? This app could knowingly or unknowingly share this information, which, in the case of the dating site\/app <\/span><\/span><a href=\"https:\/\/www.theguardian.com\/world\/2015\/jul\/21\/canada-ottawa-ashley-madison-hacking\" target=\"_blank\" rel=\"noopener noreferrer\"><span color=\"#cc0000\"><span face=\"Times New Roman, serif\"><span size=\"3\">Ashley Madison leak<\/span><\/span><\/span><\/a><span face=\"Times New Roman, serif\"><span size=\"3\">, potentially exposed the private lives of Canadian government workers.&#xA0;<\/span><\/span><\/p>\n<p>&#xA0;<\/p>\n<h4><span face=\"Times New Roman, serif\" style=\"color: #ff0000;\"><span size=\"3\">Email\/Social Media <\/span><\/span><\/h4>\n<p><span face=\"Times New Roman, serif\"><span size=\"3\">Q: Have you ever CC&#x2019;d a group of people?<\/span><\/span><\/p>\n<p><span face=\"Times New Roman, serif\"><span size=\"3\">Risk: Anyone with a compromised email account could use that list to target group members into opening a malicious email. <\/span><\/span><\/p>\n<p><span face=\"Times New Roman, serif\"><span size=\"3\">Solution: <\/span><\/span><a href=\"https:\/\/defendingdigital.com\/use-bcc-blind-carbon-copy-to-protect-privacy-in-email\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span color=\"#cc0000\"><span face=\"Times New Roman, serif\"><span size=\"3\">Use BCC in emails<\/span><\/span><\/span><\/a><span face=\"Times New Roman, serif\"><span size=\"3\">, especially when sending an email to a group of individuals. <\/span><\/span><\/p>\n<p>&#xA0;<\/p>\n<p><span face=\"Times New Roman, serif\"><span size=\"3\">Q: Have you ever shared details such as your home address or phone number on your social media profile? <\/span><\/span><\/p>\n<p><span face=\"Times New Roman, serif\"><span size=\"3\">Risk: Such data is private and could be used to target you. <\/span><\/span><\/p>\n<p><span face=\"Times New Roman, serif\"><span size=\"3\">Solution: <\/span><\/span><a href=\"https:\/\/www.nortonsecurityonline.com\/security-center\/15-social-networking-safety-tips.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span color=\"#cc0000\"><span face=\"Times New Roman, serif\"><span size=\"3\">Be mindful of the information that you share on your social media<\/span><\/span><\/span><\/a><span face=\"Times New Roman, serif\"><span size=\"3\">, especially information that can be used to track or locate you. <\/span><\/span><\/p>\n<p>&#xA0;<\/p>\n<p><span face=\"Times New Roman, serif\"><span size=\"3\">Q: Have you checked your social media settings? <\/span><\/span><\/p>\n<p><span face=\"Times New Roman, serif\"><span size=\"3\">Risk: Social media settings are often set to public by default, meaning anyone can see your profile and posts. Content shared on social media is often personal and can be used for malicious purposes. <\/span><\/span><\/p>\n<p><span face=\"Times New Roman, serif\"><span size=\"3\">Solution: <\/span><\/span><a href=\"https:\/\/www.nortonsecurityonline.com\/security-center\/15-social-networking-safety-tips.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span color=\"#cc0000\"><span face=\"Times New Roman, serif\"><span size=\"3\">Make sure your privacy settings are set appropriately<\/span><\/span><\/span><\/a><span face=\"Times New Roman, serif\"><span size=\"3\"> and you know who is in your contact list. <\/span><\/span><\/p>\n<p>&#xA0;<\/p>\n<p><span face=\"Times New Roman, serif\"><span size=\"3\">Q: Have you ever used unsecured public Wi-Fi networks? <\/span><\/span><\/p>\n<p><span face=\"Times New Roman, serif\"><span size=\"3\">Risk: Your web traffic connected to that network could be at risk. <\/span><\/span><\/p>\n<p><span face=\"Times New Roman, serif\"><span size=\"3\">Solution: Use secured Wi-Fi networks whenever possible. If it is absolutely necessary to <\/span><\/span><a href=\"https:\/\/www.wired.com\/story\/public-wifi-safety-tips\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span color=\"#cc0000\"><span face=\"Times New Roman, serif\"><span size=\"3\">connect to a public Wi-Fi network<\/span><\/span><\/span><\/a><span face=\"Times New Roman, serif\"><span size=\"3\">, use a VPN. <\/span><\/span><\/p>\n<p>&#xA0;<\/p>\n<p><span face=\"Times New Roman, serif\"><span size=\"3\">Q: Do you frequently make new online accounts? <\/span><\/span><\/p>\n<p><span face=\"Times New Roman, serif\"><span size=\"3\">Risk: Every time you create an account, you entrust your private information to more people. <\/span><\/span><\/p>\n<p><span face=\"Times New Roman, serif\"><span size=\"3\">Solution: Create a separate email account for online accounts. Create new passwords for each site, using <a href=\"https:\/\/www.wired.com\/story\/best-password-managers\/\" target=\"_blank\" rel=\"noopener noreferrer\">a <\/a><\/span><\/span><a href=\"https:\/\/www.wired.com\/story\/best-password-managers\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span color=\"#cc0000\"><span face=\"Times New Roman, serif\"><span size=\"3\">password manager<\/span><\/span><\/span><\/a>&#xA0;<span face=\"Times New Roman, serif\"><span size=\"3\">to keep track. <\/span><\/span><\/p>\n<p>&#xA0;<\/p>\n<p><span face=\"Times New Roman, serif\"><span size=\"3\">Q: Have you checked your geolocation settings? <\/span><\/span><\/p>\n<p><span face=\"Times New Roman, serif\"><span size=\"3\">Risk: By keeping your geolocation settings on by default (phone location, camera, delivery apps, social media), you make yourself relatively easy to track, potentially putting yourself and loved ones at risk. <\/span><\/span><\/p>\n<p><span face=\"Times New Roman, serif\"><span size=\"3\">Solution: Review your camera and app geo-tagging functions and turn them off whenever you can. <a href=\"https:\/\/info.phishlabs.com\/blog\/geolocation-risk\" target=\"_blank\" rel=\"noopener noreferrer\">Be mindful of mentioning your location or travel plans in public posts. <\/a><\/span><\/span><\/p>\n<p>&#xA0;<\/p>\n<p><span face=\"Times New Roman, serif\"><span size=\"3\">Q: Have you confirmed that the video and messaging platforms that you use are secure? <\/span><\/span><\/p>\n<p><span face=\"Times New Roman, serif\"><span size=\"3\">Risk: If you communicate sensitive information over unsecured platforms, you could possibly be <\/span><\/span><a href=\"https:\/\/www.nytimes.com\/2019\/01\/28\/technology\/personaltech\/facetime-bug-iphone-hack.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span color=\"#cc0000\"><span face=\"Times New Roman, serif\"><span size=\"3\">giving away that information unknowingly<\/span><\/span><\/span><\/a><span face=\"Times New Roman, serif\"><span size=\"3\">. Even chats with friends and family could be sources of sensitive information. <\/span><\/span><\/p>\n<p><span face=\"Times New Roman, serif\"><span size=\"3\">Solution: Make sure that you use secure platforms, especially when you handle sensitive information. Check out <\/span><\/span><span color=\"#cc0000\"><span face=\"Times New Roman, serif\"><span size=\"3\">this list<\/span><\/span><\/span><span face=\"Times New Roman, serif\"><span size=\"3\"> for encrypted text and video chat options.<\/span><\/span><\/p>\n<p><span face=\"Times New Roman, serif\"><span size=\"3\"><\/span><\/span><\/p>\n<p><em><span face=\"Times New Roman, serif\"><span size=\"3\">Last Updated: May 26, 2020<\/span><\/span><\/em><\/p>\n<p><em><span face=\"Times New Roman, serif\"><span size=\"3\">Sarah Kim<\/span><\/span><\/em><\/p>\n<p><span face=\"Times New Roman, serif\"><span size=\"3\"><\/span><\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#x201D;3.19.18&#x2033;][et_pb_column type=&#x201D;4_4&#x2033; _builder_version=&#x201D;3.19.18&#x2033;][et_pb_blurb use_icon=&#x201D;on&#x201D; icon_placement=&#x201D;left&#x201D; use_icon_font_size=&#x201D;on&#x201D; icon_font_size=&#x201D;50px&#x201D; _builder_version=&#x201D;3.19.18&#x2033; font_icon=&#x201D;%%307%%&#x201D;]<\/p>\n<p><a href=\"https:\/\/youtu.be\/eXlBdACrak0\" target=\"_blank\" rel=\"noopener noreferrer\">You can also watch the video <\/a><\/p>\n<p><a href=\"https:\/\/youtu.be\/eXlBdACrak0\" target=\"_blank\" rel=\"noopener noreferrer\">on Access Accountability&#x2019;s Youtube Channel.<\/a><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[et_pb_section fb_built=&#x201D;1&#x2033; _builder_version=&#x201D;3.19.18&#x2033; custom_padding=&#x201D;50px|0px|30px|0px|false|false&#x201D;][et_pb_row custom_padding=&#x201D;0|0px|27px|0px|false|false&#x201D; _builder_version=&#x201D;3.19.18&#x2033;][et_pb_column type=&#x201D;4_4&#x2033; _builder_version=&#x201D;3.19.18&#x2033;][et_pb_text _builder_version=&#x201D;3.19.18&#x2033;] What is Digital Privacy? Have you ever CC&#x2019;d your recipient contacts in an email, rather than using BCC? Connected to unsecured public Wi-Fi networks? Had an advertisement follow you from site to site? Given a game on your smartphone unjustified permission to access your microphone and [&#x2026;]<\/p>\n","protected":false},"author":2,"featured_media":3861,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","footnotes":""},"categories":[160],"tags":[],"class_list":["post-2860","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digital-security"],"_links":{"self":[{"href":"https:\/\/accessaccountability.org\/index.php\/wp-json\/wp\/v2\/posts\/2860","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/accessaccountability.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/accessaccountability.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/accessaccountability.org\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/accessaccountability.org\/index.php\/wp-json\/wp\/v2\/comments?post=2860"}],"version-history":[{"count":9,"href":"https:\/\/accessaccountability.org\/index.php\/wp-json\/wp\/v2\/posts\/2860\/revisions"}],"predecessor-version":[{"id":3034,"href":"https:\/\/accessaccountability.org\/index.php\/wp-json\/wp\/v2\/posts\/2860\/revisions\/3034"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/accessaccountability.org\/index.php\/wp-json\/wp\/v2\/media\/3861"}],"wp:attachment":[{"href":"https:\/\/accessaccountability.org\/index.php\/wp-json\/wp\/v2\/media?parent=2860"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/accessaccountability.org\/index.php\/wp-json\/wp\/v2\/categories?post=2860"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/accessaccountability.org\/index.php\/wp-json\/wp\/v2\/tags?post=2860"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}