Skip to main content
Category

Strategy

Your personal data policy

Your personal data policy

By Human Development, Innovation, Strategy

Data breach obfuscation, election tampering, tech leaders being pulled in front of Congress in the US, net neutrality rules being repealed.

Our data and how it’s used is very much in the public spotlight right now.

Attention is predominantly and justifiably on “big tech”, with the notable exception of Apple, which keeps itself to mainly selling expensive shiny hardware. After all, these companies are at the centre of the bullseye when it comes to using our data to create ever more compelling and addictive products and services, monetising our attention in increasingly sophisticated ways and in some cases selling our data to third parties who do the same. The pressure is on for these organisations to up their game.

But how much attention are you paying to your own data policy?

Most of us do not read the terms of service or do any meaningful research when we sign up to a new platform or network. Most of us, if we are honest, operate in a reactive fashion, only taking action in the wake of a public scandal. Most of us are probably unaware of just how many of the devices in our homes and the services we use every day have data and privacy implications.

Fundamentally, most of us have not given any concrete and reasoned thought about our underlying data principles. The rules and behaviours, the bright lines over which we will not cross when it comes to our data sovereignty. The first order value exchanges we are happy to make, data for access or convenience, for instance. And the second order implications of those choices, the fact we now have to be more vigilant and mindful of the sophisticated way in which we are being targeted and manipulated.

Of course, not all companies are bad actors, and there is amazing potential for our data to be used to create things that truly enrich our lives. But for every organisation looking for a fair and transparent exchange of value, there are many more that will unblinkingly tug on whatever particular strings move you, just to get you to hit refresh one more time.

The best defence we have against the hacking of our personal operating system won’t come from regulation or reliance on good faith behaviour from companies. It will come from our own behaviours.