removed incomplete
H0l0 (talk | contribs)
added 2 more citations
Line 36: Line 36:
A lack of transparency on a consumers ability to opt-out of data collection if even possible is quite common among popular services
A lack of transparency on a consumers ability to opt-out of data collection if even possible is quite common among popular services


For example, a usage of [[Deceptive language frequently used against consumers]] or simply hiding things in the terms of service may be enough trick a consumer into thinking there is nothing wrong with the service or may be enough to prevent/discourage a consumer from learning what a company does with their data & what data they collect.
For example, a usage of [[Deceptive language frequently used against consumers]] or simply hiding things in the terms of service may be enough trick a consumer into thinking there is nothing wrong with the service or may be enough to prevent/discourage a consumer from learning what a company does with their data & what data they collect.<ref>{{Cite web |last=Libbey |first=Madeline |last2=Micek |first2=Peter |last3=Cheng |first3=Sage |date= |title=Going dark: companies today release fewer transparency reports, less data |url=https://www.accessnow.org/going-dark-companies-today-release-fewer-transparency-reports-less-data/ |access-date=2026-02-01 |website=accessnow.org}}</ref>


====Lack of a consumers control:====
====Lack of a consumers control:====
Line 46: Line 46:
*Improved user satisfaction
*Improved user satisfaction
*The ability to opt-out allows users to prevent their sensitive data from being leaked in the event of a data breach
*The ability to opt-out allows users to prevent their sensitive data from being leaked in the event of a data breach
*The option for consumers to properly see the data being collected allows them to more easily infer what data tends to be collected without dealing with intentionally deceptive language
*The option for consumers to properly see the data being collected allows them to more easily infer what data tends to be collected without dealing with intentionally deceptive language<ref>{{Cite web |last=Podolsky |first=Michael |date=31 May 2024 |title=Why Prioritizing Consumer Rights Matters For Businesses |url=https://www.forbes.com/councils/forbesbusinesscouncil/2024/05/31/why-prioritizing-consumer-rights-matters-for-businesses/ |website=forbes.com}}</ref>


==Types(illegal/malware)<ref name=":1">{{Cite web |title=What Is Spyware? Definition, Types, And Protection |url=https://www.fortinet.com/resources/cyberglossary/spyware |access-date=19 Jan 2026 |website=Fortinet.com |type=Uses text to communicate information(with some additional imagery)}}</ref>==
==Types(illegal/malware)==


#Adware: This type of spyware monitors user activity to then sell that data to malicious advertisers.
#Adware: This type of spyware monitors user activity to then sell that data to malicious advertisers.
#Info-stealer: This type of spyware takes data from the device, such as recent actions, applications, etc.
#Info-stealer: This type of spyware takes data from the device, such as recent actions, applications, etc.
#Key-loggers: Key-loggers are a type of Info-stealer that gains access to data by observing keystrokes done by a user on an infected machine(This data is then saved onto an encrypted log file).
#Key-loggers: Key-loggers are a type of Info-stealer that gains access to data by observing keystrokes done by a user on an infected machine(This data is then saved onto an encrypted log file).
#Rootkits: Rootkits allow infiltrators extreme levels of access to a device(around administrator level).
#Rootkits: Rootkits allow infiltrators extreme levels of access to a device(around administrator level).<ref name=":1">{{Cite web |title=What Is Spyware? Definition, Types, And Protection |url=https://www.fortinet.com/resources/cyberglossary/spyware |access-date=19 Jan 2026 |website=Fortinet.com |type=Uses text to communicate information(with some additional imagery)}}</ref>


==Methods used by companies (legal)<ref>{{Cite web |last=Davis |first=Lakisha |date=11 Apr 2025 |title=Data Harvesting 101: What Companies Know About You (And How They Use It) |url=https://metapress.com/data-harvesting-101-what-companies-know-about-you-and-how-they-use-it/ |access-date=20 Jan 2025 |website=metapress.com}}</ref>==
==Methods used by companies (legal)==


#Cookies: Small pieces of data stored in files on your device(s). This type of data may include, but is not limited to: Preferences on websites, login information, & your browser history.
#Cookies: Small pieces of data stored in files on your device(s). This type of data may include, but is not limited to: Preferences on websites, login information, & your browser history.
#Tracking Pixels: Tracking pixels are incredibly small images that are embedded into websites or emails. This method allows companies to see how users interact with their content on the web.
#Tracking Pixels: Tracking pixels are incredibly small images that are embedded into websites or emails. This method allows companies to see how users interact with their content on the web.
#Accounts & Online Forms: Websites typically have users sign up with an account so they can tie data to it. Both account setup and forms similar to it tend to require data such as: Email addresses, phone numbers, Names, & sometimes data that should be optional(like your location).
#Accounts & Online Forms: Websites typically have users sign up with an account so they can tie data to it. Both account setup and forms similar to it tend to require data such as: Email addresses, phone numbers, Names, & sometimes data that should be optional(like your location).
#Device & location tracking: Some websites will request access to your geographical position(which can be declined), but what tends to be collected more often are IP addresses(usually outside of your control).
#Device & location tracking: Some websites will request access to your geographical position(which can be declined), but what tends to be collected more often are IP addresses(usually outside of your control).<ref>{{Cite web |last=Davis |first=Lakisha |date=11 Apr 2025 |title=Data Harvesting 101: What Companies Know About You (And How They Use It) |url=https://metapress.com/data-harvesting-101-what-companies-know-about-you-and-how-they-use-it/ |access-date=20 Jan 2025 |website=metapress.com}}</ref>


==See also==
==See also==