Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Do Google’s New Policies on User Data Privacy Indicate Larger Changes?

Do Google’s New Policies on User Data Privacy Indicate Larger Changes?

Just in case you haven’t been paying attention, online privacy has been highlighted significantly in recent years—in no small part due to the sale of our profiles by the tech giants that provide today’s most (in)famous websites… including and especially Google. Having said this, it is also important to acknowledge that some of Google’s recent policy changes could suggest that this may change at some point.

Let’s dive in and see what we can piece together.

How Google Makes Its Money

In fairness, there are a lot of answers to this question. For our purposes, we’ll focus on just one.

The short answer is simple: by selling advertisements.

Make no mistake about it: whenever you use the Internet, you are being watched. Giant platforms, including and especially Google, monitor your activities while using their services and use it to create a knowledge base of user behavior.

For instance, by using a combination of Google Search, Google Analytics, and Google Maps, Google could likely deduce that a user in Anytown, USA looking up “best pizza in anytown” would be interested in the most popular pizzeria. By analyzing which websites, phone numbers, and navigational directions got the most positive reaction after coming up as a search result, Google’s algorithms can figure out that this user would be happy to get the result for “Mario Rossi’s Fine Italian Ristorante and Pizzeria” and continue through the link to the establishment’s website.

This is that website’s goal—for more users to click into it, where they’ll be more encouraged to do whatever that website is trying to get them to do. As it stands, Google’s search results are organized based on an extensive list of factors far too numerous to go into depth with here… basically, it depends on how much Google likes how your website is put together, how other users have behaved after clicking the link to your website, and again, so much more. 

As a result, Google has some leverage here, effectively serving as the gatekeeper for a staggering amount of Internet traffic. This puts them in the position to profit from these other websites.

One way that they do so: selling advertisement space in key positions on their search results pages. Another way: selling ads that are personalized to your web browsing history.

Google’s Recent Announcement, and What it Means

Google’s revelation that they will no longer create or support trackers that can follow an individual’s behavior and activity across the Internet has some significant ramifications regarding privacy and the Internet as a whole.

This is a sizable shock, as it seems to say that Google plans to hamstring one of its profit centers. However, it is important to clarify that this isn’t the entire truth.

Rather than eliminating tracking altogether, Google is simply shifting its approach to doing so. Instead of using cookies to compose in-depth profiles for each user, Google is shifting over to evaluating trends amongst groups of similar users and phasing out the comprehensive data collection that their past efforts were based in.

This “privacy sandbox,” as it is called, will allow users to be anonymously bundled together by browsing behaviors and other interests, with the data these groups generate being sold to advertisers. The idea is that this way, an advertiser can still target their most likely prospects, without that prospect’s information changing hands more than they may anticipate.

Caveats and Conditions

Of course, Google has left themselves a few loopholes in their new strategy. First, if a user signs into a website using their Google account, that information can still be tracked and used to shape advertising. Plus, this change only applies to the websites—mobile apps are still fair game as well.

This new sandboxing approach has already inspired scrutiny from regulatory bodies, with officials in the United Kingdom investigating these tools to catch any anticompetitive features. This comes as Google is also facing numerous antitrust lawsuits stateside, suggesting that this change in tack could be construed as an effort to show how important customer data security is to the corporation.

So Really, What Does This All Mean?

In terms of Google, these tactics seem to telegraph that the company is preparing for a future where data collection is much more controlled than it is now—and that Google is in a place where the downsides of such tracking have overtaken the value that these activities once net them.

In terms of the Internet as a whole, a player as large as Google might inspire other large providers who have not yet addressed how they balance data collection and data privacy. Having said this, Facebook’s current battle against Apple’s privacy-boosting features show that this approach will certainly not be universally accepted, either.

One way or another, this move will likely create some shifts to the Internet as a whole—and should reinforce how you need to be careful about your own organization’s data collection and storage practices.

415 IT can help you out in that regard. To find out how our solutions and services can make your company more secure, efficient, and compliant, reach out to us at (415) 295-4898.

An Entire Year Later, Remote Conferencing Still Ma...
Tip of the Week: Make Your Laptop Trackpad Less An...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, April 18 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://web.415it.com/

Mobile? Grab this Article

QR Code

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Business Computing IT Support Data Data Backup Network Security Privacy Cloud Internet Hosted Solutions IT Services Data Recovery Software Email Efficiency Business Managed IT Services User Tips Google Mobile Device Small Business Innovation Phishing Malware Hackers Collaboration Hardware Cybersecurity Outsourced IT Workplace Tips Upgrade Android Smartphone Cloud Computing Communication Business Management Managed Service Backup Computer Tech Term Mobile Devices Microsoft VoIp Quick Tips Business Continuity Disaster Recovery Windows 10 Covid-19 Smartphones Ransomware Passwords Communications Managed Service Provider Users Saving Money Paperless Office Encryption Browser Network Remote Work Data Management BDR Server Artificial Intelligence Wi-Fi Office 365 Business Technology Internet of Things Compliance Remote Monitoring Managed IT Social Media Help Desk Windows 7 Microsoft Office Windows Holiday Document Management Vulnerability Government Save Money Healthcare Applications Managed IT services Blockchain Managed Services Data Security Virtualization Chrome Facebook Scam Miscellaneous Remote Laptops Automation Office Tip of the week Infrastructure Vendor Management Employer-Employee Relationship Gadgets Avoiding Downtime Wireless Project Management Antivirus Mobile Office Analytics Processor Health Information Bandwidth Two-factor Authentication Redundancy Machine Learning Meetings BYOD Website Information Technology Mobility Files Access Control Company Culture Virtual Private Network OneDrive Software as a Service Net Neutrality Training Employee-Employer Relationship Regulations IT Management IoT Hard Drive Customer Relationship Management Apps WiFi Storage Data Loss Router RMM HIPAA Maintenance Time Management Proactive VPN Networking Operating System Gmail Recycling The Internet of Things Search Display Free Resource Risk Management Cooperation Electronic Health Records Money Employees Consulting Downtime Server Management Instant Messaging Professional Services Data Storage Images 101 Social Network Tablet Managed Services Provider Dark Web Augmented Reality Management Vendor Customer Service Internet Exlporer Word Assessment Patch Management Data Breach File Sharing Remote Workers Smart Technology Spam Network Management Big Data Computing Password Smart Devices Consultation Holidays Co-Managed IT Alert Bring Your Own Device Utility Computing Flexibility Mobile Security Remote Computing File Management Unified Communications Monitoring Remote Worker Financial Mobile Unified Threat Management Payment Cards Remote Monitoring and Management Voice over Internet Protocol Managed IT Service Unified Threat Management Servers Value of Managed Services Business Telephone Politics Development PowerPoint PCI DSS Teamwork Virtual Machines Private Cloud Motherboard Chromebook Cybercrime Cyber security Remote Working How To Test Black Friday Shortcut IT Technicians Proactive IT Cost Management Reviews Procurement Bluetooth Options Telephone Biometric WPA3 Mouse Language Connectivity Recovery Return on Investment Break Fix Migration eWaste IT Assessment Lenovo Cookies Cables IT Consulting Shared resources Going Green Credit Cards Bookmarks ROI Permissions Samsung Vulnerabilities Database Management Budget Cyber Monday Staff End of Support Cyberattacks Social Microsoft Excel SharePoint Managing Stress 5G Mobile VoIP Gamification Fleet Tracking Zero-Day Threat Computing Infrastructure Settings Personal Information Mobile Device Management Mail Merge Chatbots User Error Websites Manufacturing Digitize Superfish Nanotechnology Wires Virtual Assistant Bitcoin CRM Mirgation Batteries Computers Customer Relationships Favorites Google Calendar Fraud Mobile Computing GDPR Transportation Active Directory Windows Server 2008 Gifts Read Only Security Cameras Downloads Enterprise Content Management Wireless Internet Asset Tracking Backup and Disaster Recovery Alerts Wearable Technology Star Wars Point of Sale Tech Terms Virtual Reality Address Identity Theft Enterprise Resource Planning SaaS Shadow IT MSP Finance Travel App Wasting Time Current Events Content Filtering Firewall Cache CIO applications Innovations Conferencing Geography Windows Server Hacker Printing Social Networking Touchscreen Hacking Employer/Employee Relationships Apple Outsource IT Human Error Comparison Licensing Techology E-Commerce Theft Data Warehousing Identity Hard Disk Drives Sensors Outsourcing Authentication Technology Tips Screen Reader Database Distributed Denial of Service Technology Laws Heating/Cooling IT Legislation Modem High-Speed Internet Notes Peripheral Electronic Medical Records User Management Optimization CES Emergency Multi-Factor Security G Suite Trending Proactive Maintenance Solid State Drive Laptop OneNote Permission Specifications Outlook Tech Support Disaster Resistance Features Operations Printer Statistics Solid State Drives Video Conferencing Authorization Digital Payment Hotspot Smart Tech Projects Banking Daniel Stevens Videos Media Regulation Twitter Marketing Education Printers CEO YouTube Students

Latest Blog

I hope I don’t have to tell you how important your business’ data is to its continued survival, just as I hope I don’t need to explain why this makes this data a priority to protect, regardless of your business’ size. What I do want to explain is the concept of the 3-2-1 Rul...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...