Kishore Durg Accenture

Relevance at scale is the key to growth – just ask Del Monte Foods

Relevance at scale is the key to growth Consumer goods companies have seldom had things tougher. The possibilities shown to consumers by customer experience leaders such as Amazon, Google and Facebook have whet out appetites for more compelling services from all companies – including those
/
How the Oil Industry Can Benefit from IoT Technology

How the Oil Industry Can Benefit from IoT Technology

Oil Industry Can Benefit from IoT In 2010, the Deepwater Horizon oil tragedy struck and took the nation’s attention for months. Two-hundred million gallons of oil spilled, 16,000 miles is the range it spread across the coastline from Florida to Texas, 8,000 animals were killed,
/
Kayla Matthews

How to Tell If You’re Using Unethical Data

Unethical Data

When people think of unethical data, instances of knowingly tweaking information to make it show misleading conclusions often come to mind.

Indeed, that’s one kind, but the coverage here relates to the information companies get through suspect means. The data may have been stolen or otherwise obtained from people without consent.

Businesses can take several steps to tell if the data they have might be unethical — here are five of them.

Unethical Data

1. Be Cautious of Offers of Data That Come Soon After Known Breaches

Data breaches dominate news headlines in today’s society. People give their data to buy things, receive offers from the brands they like and conduct internet-based transactions, such as renewing their driver’s licenses. And, that’s just a start.

As an increasing number of companies collect data, the likelihood of hackers infiltrating systems and taking it goes up. Cybercriminals know data is lucrative, and although they don’t always sell it, they realize personal information is extremely valuable, especially if sold in bulk and the seller has lots of related information.

For example, each credit card number sells for about $1 on the black market. And, experts say the overall worth goes up in multiples of five for each piece of supplementary information, such as a name or an address. The more information a criminal has, the easier it is for them to impersonate victims. Then, they could apply for loans or even appear as eligible for someone else’s tax refund.

So, if people who use data get offers to buy some almost immediately after a major data breach gets publicized, they should be cautious and inquire about the source.

2. Show Concern If the Seller Wants to Keep Their Identity Private

If a seller obtained data through illegitimate means, they might not want to be forthcoming with their name or other details. They may also ask for payment through a method that’s hard to trace, like cryptocurrency.

Both of those things are potential warning signs associated with unethical data. The goal of the seller is to make a profit without revealing too much. Secrecy is the name of the game.

3. Prioritize Making Purchases With Established Companies

Many of the people that provide unethical data operate on the dark web, so average internet users often don’t know they exist. If businesses or data scientists need to buy data for their projects, it’s best to do business with an entity that has a proven history of providing quality leads lists.

An About Us page, contact details and customer testimonials are some of the characteristics of a company webpage that could indicate trustworthiness. Some sellers of unethical data are becoming more commercialized and set up websites or social media profiles to broaden their appeal.

But, it’s still possible to check domain name registrations or see when a business first appeared on Facebook when deciding whether to proceed with buying data.

4. Understand That Brands Knowingly Buy Unethical Data

Some individuals may assume that if a company wants to stay above-board, it does everything it can to steer clear of data that could be unethical. However, that’s not always the case. Brands including PayPal have compensated intermediaries for buying back data that criminals stole from the companies.

Taking that approach creates an ethical dilemma. Getting the data back prevents criminals from doing what they want with it, likely exploiting victims even more through their actions. But, when companies buy what criminals have to sell, they incentivize them to continue. Even when companies buy back the data that was theirs from the start, they demonstrate a demand that makes thieves feel validated.

5. Keep GDPR Regulations in Mind

In May 2018, the General Data Protection Regulation (GDPR) came into effect and changed how European Union countries or companies marketing to people in that region of the world must handle data. Several components of it relate to getting consent before processing data. People who buy data from questionable sources should be aware, then, of the possible dangers of unethical data in association with the GDPR.

For example, if a company sends an email to someone in the European Union and got their address from an entity that may have unethically acquired the data, the person could become wary and contact the company to assert they have never done business with the enterprise or even heard of them, so they certainly did not provide consent.

If so, a business could find itself in hot water and unable to answer an angry customer’s queries in a satisfying way.

Unethical Data Is Becoming More Widespread

These tips should help people evaluate data sources and decide whether to trust them. Unethical data is more common than individuals think, but awareness can avoid the potential risks of using it.

By Kayla Matthews

  • Articles
Kayla Matthews Contributor
Technology Writer

Kayla Matthews is a technology writer dedicated to exploring issues related to the Cloud, Cybersecurity, IoT and the use of tech in daily life.

Her work can be seen on such sites as The Huffington Post, MakeUseOf, and VMBlog. You can read more from Kayla on her personal website, Productivity Bytes.

follow me

CLOUD PARTNERS | SPONSOR SERVICES

Cloud Services Are Vulnerable Without End-To-End Encryption

Cloud Services Are Vulnerable Without End-To-End Encryption

End-To-End Encryption The growth of cloud services has been one of the most disruptive phenomena of the Internet era.  However, even the most popular cloud ...
Bryan Doerr

Cyber-Threats and the Need for Secure Industrial Control Systems

Secure Industrial Control Systems (ICS) Industrial Control Systems (ICS) tend to be “out of sight, out of mind.” These systems are essential to life in ...
The Five Rules of Security and Compliance in the Public Cloud Era

The Five Rules of Security and Compliance in the Public Cloud Era

Security and Compliance  With technology at the heart of businesses today, IT systems and data are being targeted by criminals, competitors and even foreign governments ...
Amazon logo

Amazon Expands Chicago Tech Hub and Announces Plans to Create 400 New Tech Jobs

/
Amazon to double its tech workforce in downtown Chicago Tomorrow, September 17th, Amazon will hold ‘Amazon Career Day’ event in Chicago for job seekers to learn more about the hundreds of open positions across Illinois—candidates can register ...
400 Million Medical Radiological Images Exposed on the Internet

400 Million Medical Radiological Images Exposed on the Internet

/
An analysis of medical image storage systems exposed to the public web reveals that almost 600 servers in 52 countries are completely unprotected against unauthorized access. Audited systems were unpatched ...
Apple

Apple says $14 billion EU tax order ‘defies reality and common sense’

/
LUXEMBOURG (Reuters) - The European Union’s order for Apple (AAPL.O) to pay 13 billion euros ($14 billion) in back taxes to Ireland “defies reality and common sense,” the U.S. company ...

TRENDING | TECH NEWS