{"id":117,"date":"2020-01-15T07:06:34","date_gmt":"2020-01-15T07:06:34","guid":{"rendered":"https:\/\/www.itminister.co.uk\/blog\/?p=117"},"modified":"2020-02-05T08:28:50","modified_gmt":"2020-02-05T08:28:50","slug":"mobile-phone-private-data-out-of-control","status":"publish","type":"post","link":"https:\/\/www.itminister.co.uk\/blog\/mobile-phone-private-data-out-of-control\/","title":{"rendered":"Mobile Phone Private Data &#8211; Out of Control"},"content":{"rendered":"\n<p>As we move around on the internet and in the real world, we are being  continually tracked and profiled for the purpose of showing targeted  advertising. Every time we use our  phones, a large number of shadowy entities that are virtually unknown to  consumers are receiving personal data about our interests, habits, and  behaviour.<\/p>\n\n\n\n<p>This information is then used to track us over time and across devices, in order to  create comprehensive profiles about individual consumers. In turn, these  profiles and groups can be used to personalize and target advertising,  but also for other purposes such as discrimination, manipulation, and  exploitation. <a href=\"https:\/\/www.forbrukerradet.no\/undersokelse\/no-undersokelsekategori\/report-out-of-control\/\">Read More<\/a><\/p>\n\n\n\n<p>iTM covers all aspects of cybersecurity from Home cyber security managed    solutions to automated, manage threat intelligence, forensic    investigations and cyber security training. Our objective is to support    organisations and consumers at every step of their cyber maturity    journey.<a href=\"https:\/\/www.itminister.co.uk\/contact.html\"> Contact Us<\/a>  <\/p>\n","protected":false},"excerpt":{"rendered":"<p>As we move around on the internet and in the real world, we are being continually tracked and profiled for the purpose of showing targeted advertising. Every time we use our phones, a large number of shadowy entities that are virtually unknown to consumers are receiving personal data about our interests, habits, and behaviour. This &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.itminister.co.uk\/blog\/mobile-phone-private-data-out-of-control\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Mobile Phone Private Data &#8211; Out of Control&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","beyondwords_generate_audio":"","beyondwords_integration_method":"","beyondwords_project_id":"","beyondwords_content_id":"","beyondwords_preview_token":"","beyondwords_player_content":"","beyondwords_player_style":"","beyondwords_language_code":"","beyondwords_language_id":"","beyondwords_title_voice_id":"","beyondwords_body_voice_id":"","beyondwords_summary_voice_id":"","beyondwords_error_message":"","beyondwords_disabled":"","beyondwords_delete_content":"","beyondwords_podcast_id":"","beyondwords_hash":"","publish_post_to_speechkit":"","speechkit_hash":"","speechkit_generate_audio":"","speechkit_project_id":"","speechkit_podcast_id":"","speechkit_error_message":"","speechkit_disabled":"","speechkit_access_key":"","speechkit_error":"","speechkit_info":"","speechkit_response":"","speechkit_retries":"","speechkit_status":"","speechkit_updated_at":"","_speechkit_link":"","_speechkit_text":""},"categories":[7],"tags":[],"class_list":["post-117","post","type-post","status-publish","format-standard","hentry","category-privacy"],"_links":{"self":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/117","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=117"}],"version-history":[{"count":2,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/117\/revisions"}],"predecessor-version":[{"id":162,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/117\/revisions\/162"}],"wp:attachment":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=117"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=117"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=117"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}