Do you manage your own personal data?

We often talk about how the data is used or could be used. We argue about the sensitivity of when data becomes so detailed it becomes ‘stalking’. We hurry to move past the introduction of the ‘terms and conditions’ just to get the app, the game, the connection.  We hear a lot about identity hacking and stolen personal information.  We talk a lot about keeping your data safe. Your network secured.

So their customer data is your data, data collected about you. Your likes, your behaviors, your preferences, your triggers, your digital footprint. Not only is it used to keep you safe, it is used to predict the future. But what happens when you are ‘done’ with the equipment or vehicle, is your mile by mile driving history in someone else’s hand? I want to talk to you about these things, from our perspective. Not from the perspective of customer data, but from mine and yours – personal information. Who controls it? – you know who controls your finance and money, why not your own personal information.

There are rules and laws that companies must be transparent in their terms and conditions. They have to be clear on how to opt out or into communications.  But each channel has different rules and even the largest of companies haven’t figured out how to manage the communications across their business units.  Making it necessary for you to manage multiple user ids and passwords. Is a digital wallet easy and safe? I want to have open conversations with you on what information exchange is happening between you and the information about you.

What information is aggregated and what is uniquely tied to you as an individual.

WHAT MAKES YOU UNIQUE

When you give an email with an online order, what happens to the email information? What are the rules? I think if more individuals know what to expect, and how to turn off ‘unwanted’ emails and exchange or their own contact details, and the companies are forced to oblige then we can really make the system work for us – the individual.

I like to think this is a conversation between my friends and family and myself. I want people to know what options are out there, what to do with personal digital content

Our digital world is running at lightning speed. This change in our ecosystem has us opting in and out, for what? Our digital world gives us wearables, vehicles and smart homes. All the same time it is collecting and measuring inputs and outputs.  I want individuals to understand the laws and how these companies are ‘allowed’ to store and use it.

Identity theft

password

With the use of digital data – we expose ourselves to digital identity theft. And it is not just your financial information. Through a  couple of (fairly) easy questions a hacker can access your email. And it not just your email they now have access too, think off how often you have had to retrieve your security password for an account and they sent the link to your email. A password can be just as valuable as a financial account number to a hacker.

HOW MANY TIMES HAS YOUR DIGITAL DATA BEEN EXPOSED?

My corporate credit card number was stolen this week. All is okay, it was a card that only gets used for business expenses and the credit company is issuing me a new number and dealing with the fraudulent charges themselves. Somehow the thief was able to create a new card using my card number. Not total sure how that works, but it happened. That kind of vulnerability got me thinking, time to beef up my own security…

  1. Change your passwords. If you have been using the same passwords for ‘years’ it is time to upgrade. When you are creating your password think bank security – strong and unique.

There are password managers out there. Some store your passwords in a digital safe. Some help you manage your logins across devices.

LEARN ABOUT TWO FACTOR AUTHENTICATION

2. Monitor your accounts online and off line. Be sure to monitor your account statements. Set up text messaging alerts for high risk accounts.

I personally purchase identify theft monitoring systems. I’ve had my house broken into and my personal laptop stolen. Although the computer itself was password protected. I’m sure if you looked hard enough I had one time downloaded a financial statement of two, and my emails accounts were ‘always’ logged-in.’ I get a monthly updated on an activity that uses my identity, such as credit reports.

ON AN ODD NOTE: A friend of mines knows the passwords to her son’s accounts (he is over 21 and graduating from college this spring). I’m guessing he doesn’t know he is being stalked by his own mother. She has access to his Facebook account, both school and personal emails and uses Apple’s Track My iPhone app regularly to know where he is at all times.

It is probably never safe to allow your device to safe your password or auto login. But I have to admit I do it, who has time to re-enter this information every day. If your device is lost/stolen it only takes accessing the device to enter/access private sites.

So take a couple of minutes this week to reconsider how you create and save your password and account information. And then create your password strategy:

  1. Create a couple of different passwords to use.
  2. Use two factor authentication when available.
  3. Update your contact details on old accounts.
  4. Delete old accounts not being used.
  5. Spend some time looking at security applications provided by the products you use today.

Yahoo has a process to create an app password that enables a Second Sign-In Verification. Apple has iCloud Keychain. And there are numerous free apps that provide password management tools.

Now go and create a digitally secure world for yourself.

Credit Card Charges – Part I

money on trees
Balancing your credit card statement

 

Not many people balance their credit card statements. (Not sure who balances their checkbook today, besides my mom – she says it is therapeutic?!??!)  I have always given my credit card statements a quick glance, looking for charges I didn’t make. But recently I met someone who religiously balances his charge statements, in a course of one year, he found approximately $500 in overcharges, not in his favor.  (Oh, of course there were some charges that were in his favor – he didn’t bother to correct these.)

So I started watching my credit card charges more carefully. Here are the 3 mistakes I caught in 3 months:

Continue reading Credit Card Charges – Part I

Wi-Fi or your data plan, what’s the difference?

wifi usage

A data plan and a Wi-Fi network basically let you do the same thing: use the Internet wirelessly. Wi-Fi in your home can be secured. But free Wi-Fi from your favorite mall, airport or grocery store, although may be secure to outside hackers, may be collecting data from your device. but remember who is paying for the service. Using your data plan does not require connection to the Wi-Fi hot-spot. When you are paying for the service, data plans or your own router and Wi-Fi you can limit the amount of activity or behavior activity that is collects.

If you

If it’s free, you are the product. Are you giving it away for free?

Today when you use a wi-fi network to they have the ability to collect more than your browsing history while using their connect. Today algorithms are being created to predict your behavior using your location data while connected to their network.

Analyzing breadcrumbs created by Wi-Fi devices could provide never-before seen analysis for large-scale institutions, like universities… and marketers.

 

So just to be safe:

  • Looking for security, use your data plan.
  • When you’re streaming lots of movies and music to your tablet or engaging in other data-heavy activities, it makes sense to use Wi-Fi, if it’s available and trustworthy.
  • But if you’re checking work email or balancing your checkbook on the road, consider turning off Wi-Fi and using your data plan to protect your privacy.

If time flies; then technology development is lightning fast.

Technology moves fast these days.  What was built yesterday has new features today. There are always new features and functions  readily available to try. But not long ago, when the internet was a new shiny toy, we were consumers, unsure of the Internet’s benefit, use or how we could live life without it.

This great story on NPR talks about the 1996 Dole Presidential Campaign and their use of a website. As you listen, how often during your day, do you think ‘what are the possibilities.’

NPR: 1996 PRESIDENTIAL CAMPAIGN WEBSITE

What data should you provide to a retailer at checkout?

It can get tricky getting out of a checkout line. You have to show your id, the back of the credit card and possibly your loyalty/rewards card. But what information is for your protection and what information is for the retailers back end analysis?

Policies are created differently by state. As well as the vast differences in the retailer’s own polices and equipment. So each retailer may require a different process for credit validation, loyalty update or simple enrollment into their loyalty/rewards card.

Here is my recent story that I thought I should share. As a customer I was confused as to the way I was being treated. As a customer data expert I was concerned as to the use of my data. Why was it being captured, how was it being stored/used AND most importantly was I being put at any risk?

I was shopping a couple days ago at the mall. (Somerset in Troy, MI) , I was asked for my driver’s license for my transaction using my Macy’s credit card (cashier Shirley) .  During this time the cashier collected my driver’s license number and entered into the register.  I requested that this information not be captured.  She informed me that it was only used to validate I am who I am.  After I walked out of the store, I begin thinking, validate against what?  Macy’s uses my last 4 social and zip code to validate over the phone.  And I don’t believe I ever gave Macy’s my driver’s license number (as this is not usual a required piece of information for credit).  I called the call center number on my card and asked (to Gerard) the question – how is Macy’s using my driver’s license number? is it a requirement to use Macy’s credit, and what do they plan on use this for in the future?  The call center could not answer any of these questions.  I began questioning if there is concern to be alarmed. Did the cashier (Shirley) do something fishy?  So I returned to the store to talk to the store manager (Judy) , she was unsure of why this particular transaction required a confirmation with a driver’s license number.  She called (I assume the call center) privately.  After a short time, she handed me the phone and explained the call center wanted to explain to me Macy’s credit policy.  He (Mario) informed me that it is Macy’s policy to have a valid driver’s license number on file to use a Macy’s credit card. When I hung up the phone I asked the store manager of this is true? Does Macy’s require 100% of all Macy’s charge customers to have a valid and updated driver’s license number on Macy’s files in order to use the card?  (She could not look me straight in the face) And said if that is what the call center said it must be true. And then said good night, turned her back and walked away.

No one at Macy’s could tell me their policy on collecting, using or storing data. Their call center and store manager were willing to do what ever it took to get me to leave them alone. All the while I still confused on Macy’s policy. And disturbed that one single company can have so much personal information on one single person. 

FYI – my overall experience shopping at Macy’s has been poor.  From the credit card payment errors, badly marked prices/signs, to poor customer service in the store.  On the same note; friendly, smiling faces does not equal great customer experience.  Helping the customer is great customer experience.  Your staff at Somerset knows how to smile, but not how to help.

Echo – my newest gadget

I’m not sure what exactly sparked my interest in Echo. I was listening to a podcast where the host was bragging about the thing. And then my Jawbone speaker started acting up. I’m already an Amazon Prime customer, so I went for it (without any deep research into the product).

What is an Echo? It is not as helpful as Rosie Jetson, but it can tell a joke when you ask. Echo is a gadget similar to a smart watch but for your house. She responds to the name Alexa, and responds to your verbal questions (I say she – because it is a women’s voice and a female name). It looks like a small speaker. A little bit Siri, Google, and a Radio. It is hands free, you can shout out commands (or just ask politely) as you move from room to room in your house (Alexa order soap; Alexa set timer for 5 minutes). It is an Amazon product and has a lot of features that you find on Amazon. You can order, buy and have delivered any  product from Amazon. (Alexa, ‘order my dishsoap’. A couple of ‘yes’ confirmations and your Amazon box will arrive on your porch.)

I do have a couple of disappointments regarding the Echo. First the marketing material was too grand and general (connects to any smart home devices – ‘any’ has been misused.) Second all the help and how-tos are tucked in the Echo product page on Amazon shopping site, most of the information is a sales pitch and not detailed owner instructions. and there is not a lot of information available. Ironically some of the information is found in the Alexa app – but you have to have a Echo otherwise why would you need the app.

Here are some of my thoughts on Echo:

  • The number of devices compatible with Echo are still limited. Most of the equipment I already own are non-compatible. I currently use a Comcast security system, which includes the thermostat and lights. It would nice to be able to use the Echo voice control for these setting or even play the security notifications through the Echo speaker.
  • Past tech conferences and journalist have discussed the end-less possibilities of integration. But a lot of the cool features are still in the works. I guess I still have to use my mobile app to start my car in the morning. Maybe when Echo is a little older she will be able to start the car.
  • I currently use Apple products at home. Echo connects your Google accounts for calendars and reminders. And that is the only calendar Echo connects to. So I now have to either start using Google calendar on my Apple devices. Or to use the Echo for my personal scheduling and reminders.
  • Echo is a household item, it does not recognize different voices or preferences. Everyone is equal, including company.
  • You can not talk on the phone using Echo as your Bluetooth receiver.
  • Echo will not read your incoming text to you.
  • Echo cannot read horoscopes. Not everything you ask on Google is available on Echo. Similar to mobile apps someone has to develop the app for Echo to so something (like search and read horoscopes) and then you have to download (install) that to your Echo. There will be lots of young developers (and maybe older) playing in this space. Providing joke apps, affirmation apps, recaps.
    • Although we have this information available via an internet browser, Echo has to convert it from Text to Speech.  The search results on a web page might be too ‘tangled’ for a machine to find the right content and ‘read’.
  • You can not ask Echo about Echo. It does not support questions regarding its own tech help. For example if you ask: ‘how do you connect a new device?’ Answer: I do not know who to answer that question.
  • It does record every question and answer you ask it. And on your Echo app (or Alexa App) you can rate the response. I’m confident this data is being captured and mined for machine learning.
  • Echo is learning and adding all the time. Last week they announced the integration of Domino’s and Uber. Unfortunately, I only order pizza about twice a year and not from Domino’s. And well in the D, we tend to be attached to our vehicles, so it will be a long while before I become a regular home pickup Uber user. I’m sure there will be a new feature for me to use soon.

There are a lot of possibilities and apps for Echo, they are just not yet integrated into the software yet. Echo should be able to control my garage door (Craftsman), adjust my thermostat (Comcast) or even remote start my car (OnStar) via my Echo.

Echo is part of the whole environment of Internet of Things (IoT), as well as Craftsman, Comcast and OnStar. They all produce products that are controlled digital as long as you have an internet connection. And basically anything that can be connected or powered by a (mobile) app – should be able to receive commands from Echo.

You send a voice command to Echo. Echo connects to the IoT and access the digital app that controls the garage opener. This sends a command to open/close the door. To remotely access the garage opener, it will require you to set up your accounts and logins for the applications.  And along with this convenience we open digital data to be vulnerability.

As for the developers on this product, they have a so many products to connect to Echo. The list may have them working for decades. And I don’t think this technology will go out of style soon. Yes, robotics are on the rise and there will be moving smart things in our homes (beyond Roomba). But right now I’m happy with Echo has my home command center and I’m happy to get easy access to updated news stories, weather reports and scores without having to sit at the computer (or tablet) and open an app or browser.

 

 

What is DATA?

What is DATA?

Data is basically information; your name, your address, the time, a receipt. Digital data is that same data stored in a digital format. As technology advances our lives produce more and more data. With that same advancement, data storage becomes cheaper. Today data is being generated at exponential speeds. We create data every time we surf on the internet, drive a car, or purchase groceries.

A single phone call generates records of data.
A single phone call generates records of data.

Think about how much data a phone call generates. The number placing the call, the number receiving the call. The time the call was made, how long the call lasted. And even the location of the phones during the call.

See my post on how your location is tracked digitally.

 

There are different types of data and uses. Data can about any subject (or domain): customers, part numbers, inventory, sales transactions, web activities. And there are career opportunities that require experts in creating, moving, reporting, or analyzing data.

  • Moving data is called ETL (extract, transform and load)
  • Reporting data is called BI (business intelligent and is often a report or infographics)
  • Data analysis interpret the data into insights or usable actions. They can answer a simple question that may be asked over and over by a company or very complex such as looking for new trends in mass quantities of transactions.

Types of reports created by BI team.

 

There are a variety of tools and formats used by BI: Some that you may have be familiar with are: Excel, Tableau, Micro Strategy.

 

 

The digital world consists of more than just data. There is content (ie this blog), images, programming/coding – all separate disciplines but they all work together with data. Think of a webpage. It is digital and consists of these digital components:

  • Content – the text/words
  • Images – the pictures, videos
  • Programming – templates, formats, links
  • Data – tags, keywords, url, data published, # of views

Little grammar fact: the word data is both singular and plural. And a collection of data is data. The correct grammar is ‘data are’ in some instances, but for easy of reading – we used the verb incorrectly.

Credit and identity theft

data3If you are not actively monitoring and preventing your data identity theft, then it is recommend you pull your credit report every 3 months. You can find FREE credit reports from your credit card company and online, there are plenty of credit tools.

The information in a credit report includes: how often you make your payments on time, how much credit you have, how much credit you have available, how much credit you are using, and whether a debt or bill collector is collecting on money you owe. Credit reports also can contain rental repayment information if you are a property renter.

A credit report is easiest way to find out if someone else is using your credit – a sure sign of identity theft! It may take weeks or months for a credit collector to contact you regarding credit that was given to use, but spend by the thief.

FYI – everyone should know their credit score – it drives so many financial decisions; interest rates for credit cards, car loans and home mortgages. . Your credit rate scores drive your ability to get a loan, and there are some employment agencies that look at your credit score as a data point for your character assessment.

Do you have access to your data? Or does someone else?

data2

One point I want I want to re-highlight to all of you – is to know what data is out there (about you) and how it is being used. The more you know about the more control you have. We have so many laws around health care data (reception offices are required to remove your name from their sign in sheet – because it exposes medical information – the fact you were in this doctors office). Yet our transactional data is bought and sold multiple times to multiple companies for many reasons. This business is so big it has a profit connected to it. How is one set of information so secure and the next has no customer control.

Your data comes in all forms: health, purchases, apps, location, etc.