Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Control Your Profile, Part I

Control Your Profile, Part I

If you use Facebook, you’re not alone. There are over two billion active users on the platform. Whether you are willing to accept it or not, Facebook is a huge part of a good chunk of the world’s lives. If being a well-connected, with the times, user has always described who you are, then we could have some helpful information oriented towards you in our blog today. We will be discussing your online identity, and who you have told Facebook you are. 

Collect Everything Facebook Knows About You

The world’s largest social network has collected a large amount of information about who you are. Scandals are no stranger to the platform, so exposed sensitive data better be a concern for you. Facebook has recognized their scandalous flaws, and vowed to become a more transparent network. 

Facebook allows users to view the information they have collected about you. They’ve even made it quite simple to do so. Here’s how to view this information on a computer, and a mobile app respectively. 

On a desktop or laptop:

  1. Log in to your Facebook account.
  2. If you are on a desktop or laptop, click the down arrow on the top right and go to Settings.
  3. On the left, click Your Facebook Information.
  4. Facebook will present you with five options. Look for Download Your Information.
  5. Click View, Facebook will give you a screen where you can choose the date range and format of the data. Since in this case, we want to download everything, we’re going to set the Date Range to All of my data and set Media Quality to High. This means we’ll get a higher quality version of all of our photos and videos in the download.
  6. Click Create File and Facebook will start building the download. This can take a while, but Facebook will give you a notification when your data is ready for download.
  7. Once Facebook gives you the notification, click it and Download your data.

From the Facebook mobile app:

  1. Tap the 3-bar hamburger icon in the top right of the app.
  2. Scroll down and tap Settings & Privacy, and then tap Settings.
  3. Tap Download Your Information.
  4. Leave all of the options checked, and scroll down. Ensure the Date Range is set to All of my data and that Media Quality is set to High.
  5. Tap Create File and Facebook will give you a notification when the data is ready for download.

This information takes roughly an hour before a notification is given. Are you a Facebook veteran? Being an active user since the platform’s beginning means there is an incredibly large amount of information to be shared with you. This means these files can get quite large, so several GB of storage space should be available before completing these steps. 

There are many more things to do on the Your Facebook Information page on your desktop: 

Access Your Information - Facebook breaks down all of your data in several categories here. Posts, Photos, and Location all are able to be viewed. This is great and all, however users should be particularly interested in what Facebook knows about you outside of Facebook. Seeing old posts and photos shouldn’t be news to a user.  

Activity Log - This page again shares the things you should already have seen before. It essentially is a timeline recap, which is great to relive these old moments. However, this yet again does not reveal groundbreaking information about what Facebook knows about you. 

Deactivation and Deletion - Facebook hasn’t always had the option for users to delete their account. This feature is nice if you are fed up with Facebook, and some readers might even navigate to this page by the end of this series.  

What Does Facebook Know About You?

Once this file is viewable, you are able to understand just how much this social network giant knows about you. There are some obvious things, like posts and photos, but things get much, much more interesting beyond that. 

For example, Facebook not only is able to see your location, but it also logs it. I was able to pull up a day two weeks ago, and see exactly when I left my house and came to the office. Furthermore, I could see where I went on my lunch break, and any other pitstops I made. In some cases, it even allowed me to view the store’s name that I was at. 

Under the Ads section of this file, you will be able to see a list of advertisers who uploaded a contact list with your information. The important part of this statement that was just made is uploaded. This means that these listed advertisers ALREADY had information about you, and then possibly ran ads that targeted you.

What To Make of This Information

It might seem a bit nerve wracking knowing just how accessible the online profile you have made of yourself is. However, Facebook is used by a quarter of the world's population, so despite Mark Zuckerberg knowing the exact location of your house and habitual errand route, we aren’t saying leave the platform forever. We are just wanting to share how private your privacy really is, and we go over so much more in the other parts of this series. 

This is only the tip of the iceberg of the information we will share about this social giant. Visit our blog page at 415 IT to learn more! 

What Does It Mean to Plan for the Worst?
Armored Car Cybersecurity
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, December 06 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Data Backup Business Computing Data Network Security Privacy IT Support Hosted Solutions Data Recovery Cloud Software Email IT Services Outsourced IT Internet Malware Managed IT Services Tech Term Business Innovation User Tips Windows 10 Efficiency Computer Hackers Cloud Computing Microsoft Small Business Hardware Collaboration Upgrade Business Management Google Mobile Devices Phishing Ransomware Business Continuity Managed Service Cybersecurity Paperless Office Android VoIp Workplace Tips Communication Office 365 Backup Server Smartphones Encryption Managed Service Provider Remote Monitoring Communications Vulnerability Business Technology Internet of Things Passwords Managed IT Artificial Intelligence Applications Disaster Recovery BDR Saving Money Facebook Mobile Device Laptops Holiday Managed IT services Help Desk Browser Wi-Fi Document Management Quick Tips Government Save Money Data Management Healthcare Smartphone Antivirus Compliance Blockchain Scam Redundancy Social Media Processor Employer-Employee Relationship Information Microsoft Office Tip of the week Bandwidth Windows 7 Automation Avoiding Downtime Project Management Data Loss Network Two-factor Authentication Infrastructure VPN Miscellaneous RMM Chrome Router Access Control Analytics Windows Data Security Machine Learning Vendor Management IT Management Website BYOD Customer Relationship Management Gmail Users The Internet of Things Network Management Company Culture Consultation Risk Management Alert Cooperation Apps Maintenance Remote Workers Password IoT Software as a Service Net Neutrality Regulations Management File Sharing Networking Hard Drive Tablet Search Dark Web Internet Exlporer File Management Smart Technology Proactive Unified Threat Management Storage Files Monitoring HIPAA Utility Computing Virtual Private Network Mobility Bring Your Own Device Remote Monitoring and Management Financial Server Management Operating System Word Professional Services Training Mobile Security OneDrive Gadgets Patch Management Employees Unified Communications Assessment Social Network Recycling Consulting Downtime Employee-Employer Relationship Cyberattacks Social Managed IT Service GDPR Connectivity Fleet Tracking Zero-Day Threat Virtualization Batteries Wireless Internet Big Data Cookies Cables Techology Customer Service Transportation SaaS Active Directory Migration eWaste Managed Services Provider Mobile Device Management Black Friday Vulnerabilities Favorites Money Wasting Time Current Events Wireless Mouse Language Smart Devices Read Only Security Cameras Break Fix Technology Laws Asset Tracking Backup and Disaster Recovery Touchscreen CIO applications Hacking Remote Work Managing Stress Staff Employer/Employee Relationships Apple Nanotechnology Wires Outlook Disaster Resistance MSP Finance Permissions Time Management Windows Server Chatbots Emergency Multi-Factor Security Point of Sale Tech Terms Cyber Monday Mobile Computing Conferencing Microsoft Excel Database Heating/Cooling Mirgation Printer Computing Infrastructure Hard Disk Drives Sensors Printing Augmented Reality Notes Wearable Technology Star Wars Unified Threat Management Human Error Trending Spam Enterprise Content Management Proactive Maintenance Solid State Drive App Shortcut Proactive IT Authentication Google Calendar Fraud Statistics User Management Identity Theft Enterprise Resource Planning E-Commerce Theft Solid State Drives Payment Cards Geography Meetings Voice over Internet Protocol Servers Projects Cache Electronic Medical Records Computing Alerts Lenovo Remote Worker Virtual Reality PowerPoint Display OneNote Permission Travel Value of Managed Services Social Networking Firewall Recovery Cybercrime Cyber security Screen Reader IT Consulting Authorization Teamwork Bluetooth Information Technology Identity Samsung Features Options Telephone Modem High-Speed Internet Politics Return on Investment Remote Computing SharePoint Comparison Licensing Superfish Office Private Cloud Data Warehousing Flexibility Tech Support Mail Merge User Error How To Test Technology Tips Managed Services G Suite Electronic Health Records Procurement Distributed Denial of Service Database Management Smart Tech Data Breach WPA3 Legislation Shared resources Going Green Mobile 5G Mobile VoIP Development Instant Messaging Settings Websites Personal Information Downloads Specifications Bookmarks ROI Operations Virtual Assistant Bitcoin IT Technicians Cost Management Address WiFi Digital Payment Hotspot Manufacturing Vendor Motherboard Chromebook Windows Server 2008 Twitter Co-Managed IT Education Printers CEO Students Daniel Stevens Marketing Regulation

Latest Blog

We all know how important it is to protect your desktop and laptop computers from malicious threats. Installing antivirus and security software is one of the first steps you take when you get a new computer, and for good reason. An unprotected device is at great risk. With t...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...