Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Data detoxing in the New Year

By Gal Ringel
dataprivacy
January 29, 2021

It is time to balance the playing field when it comes to our personal data.  As we all moved our lives online as a result of COVID-19, our average digital footprint increased by 55%. Companies hold more data on us today than ever before, and many of us are left in the dark on just where our personal, often sensitive, information lives. The daily headlines on data breaches and the mainstream attention in the form of documentaries like Netflix’s “The Great Hack” and “The Social Dilemma” have made clear to the public: it’s time we all do a data detox.

More consumers than ever before, believe that data ownership is a fundamental right.

But where does one start? Many of us have accepted the fact that “privacy is dead” long ago. Protecting our privacy was always about putting fences around us, keeping us from sharing our personal data with others, but then we miss out on all the benefits of the internet. One needs to provide data in order to access the majority of our online lives - think, email address, phone number, and in some cases, financial information to access day-to-day sites.  So let’s start with reframing the issue. What if, instead of thinking about data privacy, we begin to think about data ownership?

Stop sharing our personal data to use the internet would be just avoiding the problem. What if, instead, we shift mindset to data ownership, which puts access and choice at the center of the data privacy debate. It’s about being selective about what and who we share our data with.  Now, with the GDPR, CCPA, LGPD, and other privacy regulations in place, we can do something about it and live without fences and share whatever we want with whoever we wish to - as these regulations allow us to take it back whenever we choose! By leaving our data only where needed, we can minimize risks like data breaches and identity theft without changing our behavior.

What would a data detox look like?

  • A data detox should start with facing reality and being aware of your current situation: it all starts with understanding where your data currently is.
    • This is why the first step with Mine’s data ownership product is discovery.  Mine allows users to discover the companies that are holding their data, what kind of data they have about them, and what that means for them in terms of associated digital risks.
    • Understanding this is the first step to cleaning up your digital footprint.
  •  The second step is about value. You should ask yourself a simple question about all the companies that hold your personal data, does this service provide me with value? Am I still using this service? Do I still need it?
    • If the answer to this question is no, then there is no reason for you to keep your data there and put yourself at unnecessary risk of data exposure. 
    • We already see some companies giving people a choice on specific data they are willing to share with them. By providing users with the choice to reclaim specific data, such as location, etc., we can take privacy beyond the binary, outdated view and into a new future of data ownership - where everyone can utilize the internet without fences and fear of breaches.

Exercise your right to be forgotten.  Lawmakers in many places like Europe (GDPR), California (CCPA), and Brazil (LGPD) have decided to implement data privacy regulations to protect users’ data privacy rights. These regulations are here to restore the balance, but the only way for them to work is if users will actually use them. Understanding of these protections must come first.

 Unfortunately, more than 60% of Americans don’t understand privacy regulations, and even in places with access to these rights like California, many fail to use them to their advantage. Don’t let your privacy rights stay on paper and turn them into reality by actively asking companies to delete any information you don’t longer feel comfortable sharing. By using services like Mine, you can send official deletion requests to companies, asking them to delete your data. Obviously, these rights are not absolute and companies can decide how to approach it, but in most cases, your data would be deleted.

Remember that data ownership is an ongoing effort. With the tools at our disposal today,  future footprint management won't require a once-yearly cleanse; users are now able to check-in and reclaim their sensitive information seamlessly and as they see fit.  But this is not a heavy task. With tools like Mine’s that help you stay on track through notifications, personal recommendations, and alerts about potential threats, all you have to do as a consumer is decide where you want to keep your data and where you don’t.

2021 looks promising for data ownership. We expect to see many new regions around the world offering data privacy regulations for their citizens, with federal privacy legislation on the horizon in the US that would provide data privacy rights for all Americans.  A recent report by Gartner states that ”by 2023, 65% of the world’s population will have its personal data covered under modern privacy regulations, up from 10% in 2020.” Making the decision to take back ownership is the first step to finding - and detoxing - your data footprint. A fresh start to 2021 has never been more accessible, so what are you waiting for? 

KEYWORDS: cyber security data protection risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Gal Ringel is CEO and Co-Founder at Mine.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber-data-protection.jpg

    3 in 5 organizations lost data over email in the past year

    See More
  • SEC0819-Edu-Feat-slide1_900px

    2020 Cybersecurity Predictions: Four 2019 Trends That Will Solidify in the New Year

    See More
  • careers in 2022

    Security careers in the new year

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products

Events

View AllSubmit An Event
  • April 23, 2025

    Employee Perceptions of Workplace Safety in 2025

    ON DEMAND: Workplace safety continues to be a critical concern in 2025, with employees across industries expressing growing concerns about their safety at work.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing