Free Online Privacy Training 101
  • Online Privacy Training
  • About this online privacy training course
  • Contents
  • Introduction
    • Disclaimer
  • Modules
    • 1. Online Privacy: an introduction
      • Lesson 1: Understanding the Digital Landscape
      • Lesson 2: Privacy Policies & User Agreements
    • 2. Privacy Basics and Background
      • Lesson 1: The Public You vs. The Private You
      • Lesson 2: Dissecting Your Digital Footprint: Data and Metadata
      • Lesson 3: Tracking (Cookies, Link Tracking and Data Aggregation)
        • Part 1: Cookies
        • Part 2: Link Tracking
        • Part 3: Data Aggregation
      • Lesson 4: Proprietary vs. Open Source
    • 3. Privacy Architecture
      • Lesson 1: Privacy Architecture
      • Lesson 2: Operating System Layer
      • Lesson 3: Networking Layer
      • Lesson 4: Application Layer and Above
      • Privacy Architecture Summary
    • 4. Private Messaging with Signal Messenger
    • 5. Private Browsing
    • 6. Data Encryption, User Name and Password Management
      • Lesson 1: User Name and Password Best Practices
      • Lesson 2: USB Disk Encryption
      • Lesson 3: Password Management with KeePassX
    • 7. Virtual Private Networks (VPNs)
    • 8. Private Email
    • Summary
Powered by GitBook
On this page

Was this helpful?

  1. Modules
  2. 1. Online Privacy: an introduction

Lesson 2: Privacy Policies & User Agreements

Lesson reviewing privacy policies, user agreements, data theft, online privacy

PreviousLesson 1: Understanding the Digital LandscapeNext2. Privacy Basics and Background

Last updated 1 year ago

Was this helpful?

Privacy Policies & User Agreements

With each intermediary come the ‘user agreement’, ‘privacy policy’ and ‘cookie consent’ with which you must agree in order to access the service. Being online isn’t as straightforward as it once seemed.

Here’s a fun fact: it is estimated that if you were to read all the User Agreements that you accepted online it would take you seventy six hours per year! No wonder no one reads them!

Embedded deep within the dense legal jargon of these user agreements and policies you will find waivers and authorizations that grant intermediaries access not only to your private data (your name, phone number, address, credit card details, etc.), but also detailed metadata (data collected about you as a result of your use of their services, such as your location information, device information, and IP address). defines it as broadly as this: “Information you give us” and “Information we get from your use of our services.”

The scariest part? The intermediaries’ user agreements and privacy policies give them the right to define what is “your data” and what is “their data.” You, as a user, don’t have a say.

Key Takeaway: Every day, corporate intermediaries collect personal information from and about their users, who have no control over how others use their own information.

The purpose, therefore, of securing your online privacy is to safeguard your ability to use the digital world while minimizing the risk of having your data used, possibly against your interests, without your consent.

Google’s privacy policy