<p>One method of protecting your data is to reduce your digital footprint. Here are some tips:</p>.<p class="BulletPoint">Cut down the number of active social media accounts. Limit it to one or two. </p>.<p class="BulletPoint">Use security and privacy tools offered by social media and technology to maximum benefit. Your phone lists apps and the permissions you have given. Scrutinise it and restrict access.</p>.<p class="BulletPoint">Using a virtual private network also protects your identity on the internet. It ensures your Internet Protocol (IP) address will not be known to the outside world. </p>.<p class="BulletPoint">Use e-wallets for shopping in place of cards and bank accounts. </p>.<p class="BulletPoint">Do not let every website use your browser's ‘cookies’. Cookies are unique identifiers of your browsing behaviour, that are saved on your local disk, to enable ‘quick browsing’. </p>.<p class="BulletPoint"><strong>Also read | <a href="https://www.deccanherald.com/specials/the-gold-rush-for-data-mining-1151884.html" target="_blank">The gold rush for data mining</a></strong></p>.<p class="BulletPoint">Use 'incognito' mode for browsing when possible. In this mode, your browser will not save cookies. </p>.<p class="BulletPoint">Do not create or register accounts unless it is mandatory. You can buy something with just a ‘guest account’. </p>.<p class="BulletPoint">Do not share your phone number, email id and other identifiers anywhere, in order to get momentary offers. You can always say ‘No’ if they ask for these in a supermarket or shoe shop. </p>.<p class="BulletPoint">Finally, remember that while you are a digital identity that is used and targeted by big internet players, how you project yourself online and what you share with the outside world totally depends on you.</p>.<p><span class="italic">(With inputs from Madhusudan Y N, digital safety expert and author of Dark Web, a Kannada book on the topic)</span></p>
<p>One method of protecting your data is to reduce your digital footprint. Here are some tips:</p>.<p class="BulletPoint">Cut down the number of active social media accounts. Limit it to one or two. </p>.<p class="BulletPoint">Use security and privacy tools offered by social media and technology to maximum benefit. Your phone lists apps and the permissions you have given. Scrutinise it and restrict access.</p>.<p class="BulletPoint">Using a virtual private network also protects your identity on the internet. It ensures your Internet Protocol (IP) address will not be known to the outside world. </p>.<p class="BulletPoint">Use e-wallets for shopping in place of cards and bank accounts. </p>.<p class="BulletPoint">Do not let every website use your browser's ‘cookies’. Cookies are unique identifiers of your browsing behaviour, that are saved on your local disk, to enable ‘quick browsing’. </p>.<p class="BulletPoint"><strong>Also read | <a href="https://www.deccanherald.com/specials/the-gold-rush-for-data-mining-1151884.html" target="_blank">The gold rush for data mining</a></strong></p>.<p class="BulletPoint">Use 'incognito' mode for browsing when possible. In this mode, your browser will not save cookies. </p>.<p class="BulletPoint">Do not create or register accounts unless it is mandatory. You can buy something with just a ‘guest account’. </p>.<p class="BulletPoint">Do not share your phone number, email id and other identifiers anywhere, in order to get momentary offers. You can always say ‘No’ if they ask for these in a supermarket or shoe shop. </p>.<p class="BulletPoint">Finally, remember that while you are a digital identity that is used and targeted by big internet players, how you project yourself online and what you share with the outside world totally depends on you.</p>.<p><span class="italic">(With inputs from Madhusudan Y N, digital safety expert and author of Dark Web, a Kannada book on the topic)</span></p>