Being Data-Conscious: Protecting More Than Just Your PII (PART 1)
Would you believe that even without sharing your name or email, you can still be tracked online? Have you ever searched for a product on Google, only to find your social media flooded with related ads shortly after?
What’s happening here? Many assume that protecting their Personally Identifiable Information (PII)—such as names, emails, or social security numbers—is enough to maintain privacy. However, the reality is far more complex. Beyond PII, a vast amount of seemingly harmless data can still expose you to risks, from targeted ads to digital profiling and even security threats.
This article explores the hidden data you may be unknowingly sharing while part two will provide practical steps to enhance your privacy. Being data-conscious means looking beyond PII and taking control of your digital footprint—let’s dive in.
What is PII and Why Do We Focus on It?
PII (Personally Identifiable Information) refers to any data that can be used to identify an individual. For instance, if your name is mentioned within an organization where multiple people share the same name, it may or may not be unique enough to identify you immediately. However, when combined with details such as your address, it becomes significantly easier to pinpoint exactly who you are.
There are two main categories of PII:
Why Is PII the Primary Focus of Data Protection Laws?
PII is the core focus of major privacy regulations, such as the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA), and the Health Insurance Portability and Accountability Act (HIPAA). These laws impose strict guidelines on how organizations collect, store, process, and share PII because it directly links to an individual's identity, making it highly sensitive and valuable.
However, while these regulations play a crucial role in protecting identifiable data, they often overlook non-PII data—such as metadata, behavioural analytics, browsing history, and device information. When aggregated, these data points can be just as revealing, enabling companies and bad actors to track, profile, and manipulate individuals without directly using their PII.
This brings us to a critical question: What other types of data, beyond PII, could put your privacy at risk?
The Overlooked Data That Puts You at Risk
1) Behavioural Data
Unlike PII, which could easily identify you, behavioural data are obtained from your actions, preferences, and interactions across digital platforms. Like the example that was given at the beginning of this article, where you search for something on Google only to realize that your searched products are appearing on your social media timeline. This type of data allows companies, advertisers, and even malicious actors to predict behaviours, influence decisions, and personalize experiences—often without explicit consent. Examples of this are:
Why Is Behavioral Data a Privacy Concern?
2) MetaData
This is another overlooked piece of data that puts you at risk. Metadata is information that describes other data and provides details about how, when, and where that data was created, modified, or transmitted. It is often referred to as the data about data. Metadata doesn’t contain the actual content of your emails, calls, or messages, but it provides crucial contextual details that can still be used to track, profile, and even de-anonymize individuals.
Examples of Metadata:
Why Is Metadata a Privacy Concern?
3) Device & Location Data
When Twitter was banned in Nigeria following the EndSARS protests in 2020, many people turned to VPNs to bypass restrictions and regain access to the internet. This incident highlighted an important truth: even when Personally Identifiable Information (PII) is protected, your device and location data can still be used to track, restrict, or manipulate access to digital services. Device and location data refer to the information collected from your phone, laptop, or other smart devices about your identity, habits, and whereabouts.
Examples of Device Data:
Examples of Location Data:
Why Is Device & Location Data a Privacy Concern?
What’s Next?
Now that we’ve uncovered how behavioural data, metadata, and device/location data can be just as revealing as PII, the next step is learning how to protect yourself. In part two of this series, we’ll explore practical strategies to reduce digital tracking, enhance privacy, and take back control of your data. Stay tuned!
Cell Biologist & Geneticist | Researcher & Passionate Data Analyst | Committed to Humanity & Community Development | Aspiring to Impact Global Health with the World Health Organization
6moVery informative
Lawyer | Finance | Tech. & Software Licensing | Advisory | Compliance
7moThis is very informative!
Law | Data Privacy | AI | Compliance
7moThis is a really expository article.