A Day Online: Julie’s Digital Footprint.

Every time you use the internet or your phone, you leave behind tiny clues about yourself. Let's look at what information is collected, how it's used, and why it matters.

May 8, 2025

I. What is a Digital Footprint?

Like millions of people, Julie's day starts not with the sun, but with her phone screen lighting up.

She reaches over and turns off her alarm. It's just a simple clock app doing its job.

But even this small action starts creating a huge amount of digital information about her day.

This simple app might collect details about her phone (like the model and operating system), her language, and when she sets and turns off her alarm. It might also grab special codes used to show her ads, depending on what the app is allowed to do.   

Some apps collect even more. They might record when the app crashes to help fix it, or even make lists of other apps on her phone.   

This simple start to the day begins a life where her digital actions are constantly watched, often without her even realizing it.

This constant stream of information makes up a person's "digital trail" – the unique set of clues left behind from online activities. Almost everything you do with technology leaves some kind of trace.   

We can think about these clues in two ways:

  • Active Clues: These are left when you mean to share something. Think about posting on social media, filling out an online form, sending an email, or clicking "accept" on those website cookie messages.   

  • Passive Clues: These clues are left behind without you doing anything specific, often without you even knowing. This includes things like your web browsing history, special files called cookies that websites put on your device, or apps tracking your location in the background.   

We leave these clues all the time, from the moment we wake up. People use devices and apps for convenience, talking to friends, and having fun, often without thinking about how their information is being collected in the background.   

This article will follow Julie through her day to see how this digital trail is made. We'll look at:

  • What kinds of information her activities create.

  • The technology used to collect it.   

  • How companies gather this information, put it together, and use it to make money.   

  • What this means for our privacy, fairness, and the chance of being treated unfairly by computer programs.

II. Following the Clues: A Day of Digital Activity

Let's follow Julie and see how her daily actions leave digital clues that are carefully recorded and studied.

(A) Morning Routine: Coffee, Commute, and Phone Checks

Coffee Purchase (Tap-to-Pay): At the coffee shop, Julie pays by tapping her bank card or phone on the payment machine. This "contactless" payment uses a technology called Near-Field Communication (NFC) and creates a digital record.   

NFC lets devices talk to each other using radio waves when they are very close (just a few inches apart). To keep things safe, the payment information is often turned into a secret code (called a "token") for that one purchase, so the shop might never see Julie's actual card number.   

Even with this safety step, the payment creates useful information: how much was spent, the time and date, who the shop is, and maybe where the payment machine was located. This info is recorded by the payment company (like Visa or Mastercard) and Julie's bank.   

If she uses her phone to pay (like Apple Pay or Google Pay), her phone company might also collect some general information about the payment. So, buying coffee isn't just about getting a drink; it's an event that adds information to her financial profile.   

Commute (Transit App/Smart Card): Julie takes the bus to work. She might use a transit app on her phone or a special travel card.

  • Transit App (like the Transit app): Apps like this need to know her phone's location (using GPS) to show nearby bus stops, track buses in real-time, and help plan trips. So, the app collects detailed location information: where trips start and end, the routes taken, and where she is right now. It also records when she uses the app, info about her phone, and things she does in the app, like saving favorite places. Some apps even use location data shared by other users to make real-time tracking more accurate. While popular apps say they don't sell personal information , the general travel patterns (with names removed) are very useful for bus companies and city planners.   

  • Smart Card: If Julie uses a travel card from the bus company, the company usually controls the data collection.Every time she taps her card, the system records the card's unique code, the time, and the bus stop location. This helps figure out fares and tells the bus company how busy routes are at different times. Even if the company tries to keep the data anonymous , the unique card code allows them to track one person's travel over time. If she can pay directly with her bank card, then the bank is also involved.   

Smartphone Doing Nothing?: Even when Julie isn't actively using it, her smartphone collects information in the background. The phone's main software (like iOS or Android) keeps track of things.   

This includes her location using GPS, nearby Wi-Fi networks, and cell towers. It records phone details like the model, software version, language, battery level, and special codes (like an advertising ID). It knows the network connection details, including the phone's internet address (IP address). Sensors inside the phone track movement.   

The company that made the phone's software (Apple or Google) might collect general information about app use and crashes to make things work better. This background information (location, time, phone status) is used for things like improving services, offering helpful features (like location reminders), and sometimes showing targeted ads or sharing data with other app makers.   

This background collection creates a base layer of information about where Julie is and what her phone is doing. It makes the clues collected from the apps she does use even more detailed.

(B) The Digital Workday: Emails, Chats, and Browsing

Julie's job involves using digital tools all day, and each one leaves its own trail of clues.

Work Emails (like Gmail/Outlook on a company account): Julie uses her company email a lot. The emails she writes and receives, plus any files attached, are stored by the email company (like Google or Microsoft).   

Besides the message content, lots of other details (called "metadata") are recorded: who sent the email, who received it, when it was sent and received, the subject line, information about how the email traveled online, and the internet addresses (IP addresses) of the computers involved.   

Email companies use this data to make the service work better – for example, to catch spam emails, check for viruses, sort emails into folders, or even suggest words as you type.   

But here's a key point for work email: Julie's employer, not Julie, usually controls the account. This means the company often has the right to look at work messages on company computers or accounts. They might do this to follow rules, check for security problems, protect company secrets, or see how productive people are, depending on company rules and local laws.   

Work Chat (like Slack/Teams): Chat programs like Slack and Microsoft Teams are common for work communication. Like email, these programs store messages sent in public and private chats, plus any shared files, pictures, or links.   

They also record details like when messages were sent and read, user information, who is in which chat group, emoji reactions, and if messages were edited or deleted. Slack, for example, might keep messages forever unless the company changes the setting.   

Importantly, for companies using paid versions of these chat programs, managers can often download the chat records.This might include private messages, usually for legal reasons or company investigations. These work chat tools usually don't have the highest level of privacy (called end-to-end encryption) turned on by default, meaning the chat company or the employer can potentially read the messages. Some programs even let employers see reports on how much employees are chatting or meeting online.   

While these tools help teams work together, they also turn workplace chats into a permanent, searchable record that could be monitored. This can make employees feel like they are always being watched.   

Web Browsing (Work/Personal): During the day, Julie uses the internet for work research and maybe some personal tasks. Every time she visits a website, different tracking tools start collecting information:

  • Cookies: These are small text files stored on Julie's web browser. First-party cookies come from the website she's visiting. They remember things like if she's logged in, her language choice, or items in her shopping cart. Third-party cookies come from other companies, usually advertisers or companies that measure website traffic (like Google Analytics). They track Julie's browsing across many different websites to build a picture of her interests for showing ads. Some cookies disappear when she closes her browser (session cookies), while others stay until they expire or she deletes them (persistent cookies).   

  • Tracking Pixels (Web Beacons): These are tiny, invisible pictures (often just one pixel wide) hidden on web pages or in emails. When the page or email loads, her computer asks for the pixel image from its home server, which records that the page was viewed or the email was opened. This helps track website visits, email opens, and ad views. They are often used for website statistics and ad campaigns, including showing ads for things you previously looked at (like the Meta Pixel, used by Facebook).   

  • Browser/Device Fingerprinting: As people learn about cookies, companies use "fingerprinting" as another way to track them. This involves collecting lots of technical details about Julie's web browser and device – like the operating system, browser version, screen size, installed fonts, language, and time zone – to create a unique "fingerprint". This fingerprint can identify her browser across different websites, even if she blocks or deletes cookies. There are fancy types like Canvas fingerprinting (seeing how her browser draws graphics) and Audio fingerprinting (checking sound settings).   

  • IP Address Tracking: Every device connected to the internet has an IP address (like a mailing address for the internet). Websites record the IP addresses of visitors, which gives clues about their general location (country, city) and the network they're using.   

  • Other Storage: Modern browsers have LocalStorage, which lets websites store more data (up to 5MB) directly in the browser, and it stays there until cleared. Server-Side Tracking means the website's own computer collects user data (like IP address, browser type) when a request is made, instead of just relying on things like cookies on Julie's computer.   

Using many tracking methods together (cookies, pixels, fingerprinting, IP addresses, LocalStorage) makes it hard to avoid being tracked. Blocking cookies might not stop fingerprinting. This shows how determined the online tracking industry is to keep collecting user information, which is essential for the business of showing targeted ads.   

Search Engine Use (e.g., Google Search): When Julie uses Google, she types in her search words, but she also gives away other information without typing. Google records the words she searches for, the links she clicks, the date and time, her IP address, and details about her device and browser.   

Google figures out her location using her IP address, GPS from her phone (if allowed), saved places like 'home' or 'work' in Google Maps, and nearby Wi-Fi signals or cell towers.   

If Julie is signed into her Google Account and has "Web & App Activity" turned on, her searches are linked to her account. Google uses all this information to:   

  • Make search work better (like improving spelling corrections ).   

  • Personalize results and suggestions (like YouTube videos ).   

  • Build a profile of her interests to show targeted ads on Google sites and other websites that partner with Google.   

Even if she's not signed in, Google might use cookies to store some location and search information linked to her browser to offer some personalization, unless she turns off settings like "Search customization".   

(C) Leisure and Lifestyle: Socializing, Shopping, and Self-Tracking

What Julie does after work – shopping online, using social media, going to the gym, listening to music – also adds clues to her digital trail, often revealing more personal details.

Online Shopping (e.g., Amazon): Buying something on Amazon, or even just looking around, creates a lot of data. Amazon collects account details (name, address, payment info) and tracks everything Julie does on its site: products she looks at, how long she spends on pages, words she searches for, items she adds to her cart or wish list, what she buys, and any reviews she writes. If she talks to customer support, that might be recorded too. If she uses Alexa (Amazon's voice assistant), her voice commands are collected and usually stored forever. Amazon uses cookies and other trackers on its site and potentially across other websites to show targeted ads.   

Amazon uses this data for several things:

  • Its recommendation system suggests products based on what Julie (and people like her) have looked at or bought before.   

  • It shows very specific ads, both on Amazon and other sites.   

  • It uses the data to improve its services, personalize the website, and stop fraud.   

  • Amazon makes guesses based on this data, like estimating income from shipping addresses , figuring out family situations from gift registries (like baby lists ), and building detailed profiles of interests. While Amazon says it doesn't sell information that directly identifies Julie for ads , it does share data with sellers to ship orders and gives general or coded data to advertisers so they can target specific groups.   

Social Media (e.g., Facebook/Instagram): Scrolling through Facebook or Instagram also generates data. Meta (the company that owns them) collects the information Julie puts in her profile (name, age, location, etc.) and everything she posts – status updates, photos, videos, messages – including hidden details like when and where a photo was taken.   

It tracks her interactions: what she likes, comments on, shares, views (and for how long), clicks on, and which people or pages she interacts with. It logs when she's active, how often she visits, and which features she uses.   

Meta also collects technical details about her devices (IP address, device codes, operating system, browser type, network info, cookies) and precise location using GPS, Wi-Fi, and Bluetooth signals.   

Even more, using tools like the Meta Pixel (bits of code on millions of other websites) and software kits in other mobile apps, Meta tracks Julie's activity off Facebook and Instagram – websites she visits, products she looks at elsewhere, other apps she uses.   

All this information is the core of Meta's business. It's used to create very detailed profiles, guessing interests, political views, life events, what she might buy, and more. These profiles allow for super-specific targeted advertising, which is how Meta makes most of its money. The data also decides what she sees in her news feed, trying to keep her scrolling longer. Meta doesn't usually sell Julie's raw data directly to advertisers, but it sells access to groups of people based on that data.   

Gym Visit (Fitness Tracker): At the gym, Julie's fitness tracker watch monitors her workout. These watches have sensors to collect body and activity data.   

They commonly track steps taken, distance covered (using motion sensors called accelerometers), heart rate (using light sensors), and calories burned. Many also track sleep (how long, different sleep stages). GPS sensors track location for outdoor runs or bike rides. Some fancier trackers might measure temperature, stress levels, or even try to measure blood pressure.   

This sensor data is usually sent to an app on Julie's phone. The app uses computer programs (algorithms), often combined with details Julie entered (like age and weight ), to turn the raw data into useful information, track goals, and show charts. The data is stored on the company's computers.   

Privacy rules vary. Companies often use general or anonymous data for research. But they might also share data with others – like employers with wellness programs, insurance companies, or advertisers – sometimes needing permission, sometimes not. This health data collected by fitness trackers usually isn't protected by strict health privacy laws like HIPAA in the US, which mainly cover doctors and insurance companies. Also, these companies' databases could be hacked, exposing sensitive health details.   

Music Streaming (e.g., Spotify): Listening to music on Spotify also creates data. Spotify records every song, artist, album, and podcast Julie listens to, including how long she listens, if she skips or repeats songs, or saves them. It records her searches and when and how often she listens. It also collects technical info like her device type, operating system, IP address (which shows general location), and network connection. If she uses voice commands, the words might be stored.   

Spotify uses this information to build a detailed "taste profile" for Julie. This profile helps create personalized playlists like "Discover Weekly" and "Release Radar". It's also used for the popular "Spotify Wrapped" year-end summary.   

If Julie uses the free version with ads, this data is used to target those ads. Even for paying users, Spotify might use data from advertisers to guess interests for personalization or other reasons. Spotify's privacy policy says data might be shared with advertisers and researchers, often in a combined or anonymous form. The amount of listening data allows platforms like Spotify to make smart guesses about users' moods, routines, and even personalities.   

Recipe Search (Web Search): Looking up a recipe online adds to Julie's digital profile, similar to other web searches (see II.B). The search words ("vegan lasagna recipe," "low-carb dessert") reveal food preferences, cooking interests, and maybe lifestyle choices or health issues. This information, collected by the search engine and possibly tracked across websites, helps refine her advertising profile. She might see ads for specific foods, kitchen tools, or health products later.

Video Streaming (e.g., Netflix): Watching Netflix at the end of the day adds more clues. Netflix tracks exactly what Julie watches: movies, shows, when she watches, for how long (did she finish?), and on which device.   

It records interactions like pausing, rewinding, re-watching scenes, or fast-forwarding. It captures searches within Netflix and how she scrolls through suggestions. Ratings and adding shows to her list give clear signals about her preferences. Technical data like IP address (location) and device info help make streaming smoother and are used for analysis.   

This data is vital for Netflix. It powers the recommendation system that suggests content (Netflix says about 80% of watching comes from recommendations). It helps Netflix decide which new shows to make or cancel, based on what similar shows people watched. Netflix even uses data to test different pictures (thumbnails) for the same show to see which one makes people like Julie click 'play'. While Netflix mainly uses this data internally , these detailed viewing profiles are very valuable information about consumers.   

The apps and websites Julie uses don't just collect the information she gives them; they make smart guesses. Small clues – an Amazon purchase , a Spotify playlist , a Facebook 'like' , fitness tracker heart rate patterns , or Netflix shows watched – are analyzed by computer programs to figure out much more about her life.   

These programs guess her likely income, family situation, health worries, political views, moods, and relationships. This guessed information, which Julie often doesn't see or confirm, becomes part of her profile and is often more valuable to companies than the information she provides directly, because it tries to predict what she'll do or like next.   

Also, the information collected about Julie in one area doesn't stay separate. Data from her fitness tracker might affect insurance costs or health ads she sees. What she browses on shopping sites influences the ads she sees on social media because of tracking tools like the Meta Pixel.   

Special companies called data brokers work to gather information from many different places – public records, store loyalty programs, online activities, app usage, and data bought from other companies – to build single, detailed profiles.This connected system of data sharing means information easily flows between different parts of Julie's life, creating one big digital profile that knows about her across many different situations.   

Table: Julie's Digital Day - A Data Inventory

This table summarizes the main types of information created, how it's collected, who uses it, and why, for Julie's activities.

Activity

Key Data Types Generated

Collection Mechanisms

Primary Data Users

Main Purpose

Wake-up Alarm (App)

Time, Device ID, OS, Language, Usage stats, Crash data, [Identifiers, Location if allowed]

App permissions, Device Sensors, User Input

App Developer, OS Provider, [Advertisers]

Making app work, Improving service, [Ads]

Coffee Purchase (Tap)

Amount spent, Time, Shop ID/Type,

NFC, Payment Network, Shop Terminal

Bank, Payment Network, Shop, [Phone Wallet Provider]

Processing payment, Stopping fraud, Building financial picture

Commute (Transit App)

Real-time GPS location, Trip history, App usage times, Device info, Saved places, Searches 

GPS, App Usage, User Input

App Developer, Transit Agency, [City Planners]

Real-time info, Trip planning, Improving service, Usage analysis

Commute (Smart Card)

Unique Card ID, Tap time, Station/Stop location, Fare cost 

NFC/RFID Reader, Agency System

Transit Agency

Collecting fares, Planning service, Usage analysis

Work Email (Company)

Email content, Attachments, Details (sender, receiver, time, IP address), Routing info 

Email Program/Server, Company Network

Email Provider, Employer

Communication, Spam filtering, Improving service, Employee monitoring

Work Chat (Company)

Messages, Files shared, Details (users, time, group), Reactions, Edit/Delete history 

Chat Program Client/Server, Company Network

Chat Program Provider, Employer

Teamwork, Rule following, Saving records, Employee monitoring

Web Browsing/Search

Search words, Websites visited, Clicks, Time on site, IP address, Location, Device/Browser info 

Browser, Cookies, Pixels, Fingerprinting, IP

Search Engine, Websites, Advertisers, Analytics Companies, Data Brokers

Search results, Personalization, Site stats, Targeted ads, Building profiles

Online Shopping (Amazon)

Account info, Purchase history, Browsing history, Searches, Wish lists, Reviews, Alexa chats 

Website Activity, Cookies, Account, Alexa

Amazon, Advertisers

Sales, Recommendations, Targeted ads, Improving service, Building profiles

Social Media (FB/Insta)

Profile info, Posts, Photos/Videos (+details), Likes, Comments, Shares, Messages, Friends, Usage patterns, Location, Device info, Activity elsewhere 

App Usage, User Input, GPS, Wi-Fi, Cookies, Pixels (Meta Pixel), App Kits

Meta, Advertisers, Data Brokers

Keeping users engaged, Personalizing content, Targeted ads, Building profiles

Gym (Fitness Tracker)

Steps, Distance, Heart rate, Calories burned (guess), Sleep patterns, GPS route (workouts), [Other body data]

Device Sensors (Motion, Heart Rate, GPS), App Sync

Tracker Company, App Developer, User

Health/Fitness tracking, Setting goals

Music Streaming (Spotify)

Listening history (songs, artists, time, skips), Playlists, Searches, Saved songs, Time/Device/Location info, [Voice commands]

App Usage, Account Activity, Cookies, IP, Device Sensors

Spotify, Advertisers, [Music Labels, Partners]

Recommendations, Personalization, Targeted ads (free version), Wrapped summary

Video Streaming (Netflix)

Viewing history (shows, time, completion), Ratings, Searches, Device info, Time/Location (IP), Interactions (pause, rewatch) 

App Usage, Account Activity, IP

Netflix

Recommendations, Deciding on new shows, Personalizing site, Improving service

  

III. Putting the Clues Together: Building Profiles

The bits of information created during Julie's day don't stay separate. A large, hidden industry exists to collect these pieces, put them together, and build detailed profiles of people. This is done by the companies Julie uses directly, but also by special companies called data brokers that work mostly unseen.   

Data brokers get information from many places:

  • Public Records: Things like names, addresses, birth dates, marriage records, property ownership, voter lists, and court documents.   

  • Shopping Data: What people buy from stores (often tracked through loyalty cards), credit card use (usually made anonymous), product registrations, and subscriptions.   

  • Online Activity: Browsing history, search terms, social media activity (likes, shares, posts), app usage, and data collected by cookies and other trackers.   

  • Buying Data: Data brokers also buy information directly from other companies, like apps, websites, or even other data brokers.   

Data brokers take all this raw information, clean it up, organize it, and analyze it to create products they can sell. A major product is detailed consumer profiles and audience groups.   

By combining demographics (like age and location), purchase history, online behavior, location data, and guessed interests, brokers can put people into very specific categories. Examples include "likely home buyers," "people who travel internationally often," "eco-friendly shoppers," "people interested in losing weight," or groups based on guessed political views or even sensitive health topics.   

These profiles and groups are then sold or rented to other businesses. They are mainly used for marketing and advertising, but also for:

  • Checking risk (like deciding if someone should get a loan or insurance)

  • Stopping fraud

  • Verifying identity

  • Creating people-search websites.   

Some big data brokers are companies you might know, like the credit reporting agencies Experian and Equifax (who sell data beyond just credit info), and others like Acxiom and Oracle Data Cloud.   

This industry isn't very open. People like Julie usually don't deal directly with data brokers, often don't know they exist or how much information they have, and find it hard to see, fix, or delete their profiles. This lack of openness means people often don't know who has their information, if it's correct, or how it's being used to make important decisions about them, like getting loans, insurance, or jobs.   

A key part of building these detailed profiles is linking a person's activity across all their different devices – phone, work computer, tablet, smart TV. This is called cross-device tracking. Without it, Julie's information would look like it came from different people on different devices. Cross-device tracking connects these pieces using two main methods:   

  • Deterministic Tracking (Surefire Matching): This links devices using information the user provides on multiple platforms, like logging in with the same email address or username. When Julie logs into her Google account on both her phone and laptop, Google knows for sure that the activity on both devices belongs to her. This method is very accurate.   

  • Probabilistic Tracking (Educated Guessing): When someone isn't logged in, this method uses computer programs and statistics to guess that multiple devices probably belong to the same person. It looks at clues like shared internet (IP) addresses (like in a home), device types, operating systems, browser settings, location patterns (devices often seen at the same home or work), and browsing habits. If enough clues match, the program calculates the probability that the devices belong to the same person. It's less exact but can track more people.   

Companies often create complex "ID graphs" or "device graphs" using both methods to map connections between users, devices, and online identifiers. Linking activity across devices is essential for creating a complete and valuable user profile. It overcomes the problem of scattered information and creates a lasting digital identity that follows the user everywhere. This makes tracking, understanding behavior, and showing targeted ads much more effective.   

All this collecting, guessing, and linking across devices results in a detailed, constantly updated "digital twin" for people like Julie. This profile goes way beyond basic facts, including her behaviors, guessed interests, friends, movements, shopping habits, and possibly sensitive details – often put together and used without her knowing or agreeing.   

IV. Clicks for Cash: How Your Data Makes Money

The huge amount of information collected from people like Julie isn't just stored away; it's the main fuel for much of today's digital economy. This data is used to make money in many ways, shaping the online services people use and the information they see.

Making Services Better and Personal: One clear use of user data is to improve online services and make them feel more personal. Companies say collecting data helps them give users a better experience.   

  • Netflix looks at what you watch to suggest shows you might like.   

  • Spotify creates personal playlists like "Discover Weekly" based on your listening habits.   

  • Amazon suggests products based on what you've bought or looked at before.   

  • Facebook adjusts your news feed based on what you interact with.   

  • Google Maps uses your location to give directions and show nearby places.   

Basically, data lets these services change from being the same for everyone to being customized for each person.

Targeted Ads: Paying for the "Free" Internet: The main way many "free" online services (like Google search and social media like Facebook) make money is through targeted advertising. The detailed user profiles built from collected data let advertisers reach very specific groups of people.   

Instead of showing ads to everyone, companies can target people based on:

  • Demographics (age, gender, location)

  • Guessed interests (travel, cooking, fitness)

  • Online behavior (websites visited, products searched)

  • Purchase history

  • Life events (getting married, having a baby)

A key technology behind this is Real-Time Bidding (RTB). Here's how it works, very quickly:   

  1. When Julie visits a website or opens an app with ad space, a super-fast auction starts.   

  2. The website sends out a "bid request" to an online ad marketplace. This request includes info about the ad space and clues about Julie (like an advertising ID, location, device type, interests).   

  3. This request goes out to thousands of potential advertisers.   

  4. Advertisers use computer programs to instantly decide if they want to bid on showing an ad to Julie, based on her profile.   

  5. The advertiser who bids the most wins the auction, and their ad appears on Julie's screen.   

While this seems like just a way to sell ads, RTB involves spreading bits of user data widely with every auction. Even though only one advertiser wins, potentially thousands of companies receive the bid request containing user clues. This makes RTB a huge source of data collection, allowing data brokers and others to gather massive amounts of user information.   

Influencing Behavior and "Surveillance Capitalism": Analyzing user data goes beyond just showing ads. Some experts, like Shoshana Zuboff, talk about "surveillance capitalism." This idea suggests that the main goal isn't just to understand and predict what people will do, but to actively shape their behavior to make more profit.   

In this view, our personal experiences are treated like raw materials ("behavioral surplus") that are collected, analyzed, and used to create "prediction products." These products are then sold to companies that want to influence our future actions. The goal is to create systems that can gently push or guide people towards choices that make money for the companies, often without people realizing it or having much say.   

While users get services that seem free or convenient, there's often an imbalance. The value companies get from analyzing and influencing behavior might be much greater than the value the user gets from the service. This hidden imbalance is a major criticism of how much of the digital economy works.   

More Than Just Ads: Consumer data is used for other important economic tasks too:

  • Credit and Loans: Banks and lenders use data profiles, sometimes including "alternative data" (like utility bill payments or online activity), to decide if someone is likely to repay a loan and what interest rate to charge.   

  • Insurance: Insurance companies use similar data to figure out how risky a person might be and set prices for insurance policies.   

  • Fraud Prevention: Data brokers help businesses check customer identities and prevent theft.   

  • Business Decisions: Information from user data helps companies decide what new products to make, where to sell them, and understand market trends.   

V. The Cost of Convenience: Privacy Worries, Unfairness, and Data That Never Disappears

The easy access and personalized feel of the digital world come with downsides. There are big concerns about privacy, fairness, and what happens to our digital clues over time.

The Privacy Problem: People often trade their personal information for online services and convenience. But it's usually not a fair trade because people don't have all the facts.   

Users rarely know exactly:

  • What information is being collected.

  • How it's being combined and analyzed.

  • Who it's being shared with (especially hidden data brokers).

  • What might happen because of this data sharing later on.   

Privacy policies are often very long and confusing, making it hard to really know what you're agreeing to. People might say they care about privacy but still share data. This might be because they don't feel they have real control or understanding of the complex data systems around them.   

Unfair Computer Programs (Algorithmic Bias): A major problem with systems that use data to make decisions is that they can be unfair or biased. This means the computer program's decisions consistently harm certain groups of people. This unfairness doesn't have to be intentional; it can happen in several ways:   

  • Biased Information: Computer programs (algorithms) learn from the information they are given. If that information already contains unfair patterns from the real world (like past discrimination), the program will learn and repeat those unfair patterns.

    • Example: If a program used for hiring is trained on a company's past hiring records, and that company mostly hired men, the program might learn to prefer male job applicants.   

    • Example: Police programs that predict crime might be trained on arrest records from areas where police spent more time in the past (often minority neighborhoods). The program might then suggest sending more police back to those same areas, creating a cycle that reinforces the original unfairness.   

  • Flawed Program Design: Unfairness can also come from how the program is designed, like which pieces of information are considered important. Using seemingly neutral information that is closely linked to things like race or gender (like using zip codes, which can relate to race, to decide on loans) can also lead to unfair results.   

  • Human Interpretation: Sometimes, even if the program is fair, the way humans understand and use its results can be biased.   

Unfairness from these programs shows up in many important areas:

  • Hiring: AI tools have unfairly rejected job applicants based on gender.   

  • Money and Loans: Programs might unfairly deny loans or charge higher interest rates to people in certain neighborhoods or groups. Sometimes, websites might even charge different people different prices for the same thing based on their profile.   

  • Healthcare: Facial recognition programs often make more mistakes identifying people with darker skin. Medical programs trained on data mostly from one group might be less accurate for other groups, leading to wrong diagnoses or treatments. One program wrongly guessed that Black patients needed less care because it looked at how much they spent on healthcare in the past (which was lower due to unfair access).   

  • Advertising: Programs have unfairly shown certain job ads (like high-paying jobs mostly to men ) or housing ads based on race or gender. Searching for names associated with certain races was more likely to show ads about arrest records.   

  • Crime and Justice: Police prediction tools can reinforce unfair policing patterns. Programs used to help decide bail or prison sentences have shown racial bias, giving higher risk scores to Black individuals compared to white individuals with similar backgrounds.   

Importantly, this unfairness often makes existing problems in society even worse. Because computer programs can make millions of decisions quickly, biased programs can spread unfairness much faster and more secretly than biased humans could. Saying "the computer decided" can hide the unfairness, making it harder to notice and fix.   

Digital Clues That Never Fade: Unlike footprints in sand, digital clues last a very, very long time. Information collected by websites, apps, and data brokers can be stored forever, or for long periods set by company rules.   

Deleting a social media post or even your whole account doesn't mean the information is gone. Copies might still exist in company backups, server records, databases shared with partners, or saved by internet archives like the Wayback Machine. Old web pages can stay visible in search engines for months or years.   

This means things you did or said online years ago, or guesses made about you based on old information, can reappear and affect you later. An old social media post misunderstood, past browsing history used wrongly, or being put in a data broker category based on old habits could impact your reputation, job chances, loan applications, or friendships.   

It's like being stuck with a digital record of your past self, making it hard to change or move on from things you'd rather forget. In a digital world where forgetting is rare , these lasting digital trails change how we think about growing up and leaving the past behind.   

VI. Conclusion: Finding Our Way in the Digital World

Julie's day, tracked through clicks, taps, searches, and sensors, shows what life is like in our data-filled world. From her morning alarm to her evening TV show, her actions create a constant, detailed digital trail. This trail, made of things she does on purpose and information collected quietly, is gathered and analyzed by tech companies, advertisers, and data brokers, often without much openness.   

This has big effects. Data helps make online services personalized and convenient , but it also takes away privacy, making people easy to track and predict. Creating detailed "digital twins" allows for powerful targeted ads and ways to influence behavior, raising questions about our freedom and the fairness of this "surveillance capitalism".   

Also, relying on computer programs trained with this data brings risks of unfairness and discrimination. As seen in hiring, finance, and healthcare, biased data or program design can make existing inequalities worse, harming certain groups more than others. Adding to these problems, digital information lasts a very long time, creating a permanent record that can follow people throughout their lives.   

Finding our way in this digital world isn't easy. We need companies and data brokers to be more open about how they collect and use information. People need better, easier ways to control their own data, not just confusing privacy policies. We need to check computer programs carefully for unfairness and have ways to fix problems when they happen.   

New rules like Europe's GDPR and California's CCPA try to give people more rights over their data. But it's still early days, and it's hard to make sure these rules work everywhere and keep up with new technology. We also need to think about how these rules affect businesses. There's a big gap between how fast technology is moving and the rules needed to make sure it's used well.   

The challenge is to enjoy the benefits of data while setting clear rules to protect people's freedom, ensure fairness, and make sure our digital future is good for everyone. The digital clues we leave behind are no longer temporary; they shape our lives in ways we need to understand and carefully consider.

We never exploit personal data. Privacy policy

© 2023 Observable Ltd

Made with ❤️ in 🇬🇧

Get in touch

We never exploit personal data. Privacy policy

© 2023 Observable Ltd

Made with ❤️ in 🇬🇧

Get in touch

We never exploit personal data. Privacy policy

© 2023 Observable Ltd

Made with ❤️ in 🇬🇧

Get in touch