Computerworld - Concerned that Google knows too much about you? The company provides many ways to protect your privacy online -- you just need to find them. Here are six good ones.
1. Know your privacy rights: Use the Google Privacy Center. This site includes all of Google's privacy policies, as well as privacy best practices for each of its products and services. Although the "legalese" of privacy policies can be difficult to understand, Google's Privacy Channel offers a library of short YouTube videos with practical tips on protecting your data when using Google products and services. Try the "Google Search Privacy" and "Google Privacy Tips" series.
2. Protect your content on the services you use. Some content that Google stores for you, such as photos uploaded in Picasa Web Albums, are public by default. You can protect your privacy when you upload photos by choosing the appropriate checkbox.
Choices include "unlisted" (accessible only if you have the Web link, and not indexed by Web search engines) or private (viewable only by named users who must sign in).
Another example: You can take a Google Chat "off the record" if you don't want the instant messaging transcript stored.
In contrast, Google Latitude, which tracks your whereabouts by way of GPS-enabled cell phones, does not share your location data by default. You must authorize others to see it. Latitude stores your last known location, but not your history.
3. Turn off the suggestion feature in the Chrome browser. Chrome uses Google Suggest to try to guess which Web address you want as you type into the "Omnibox," the address bar in Chrome that doubles as a search engine query bar. It makes suggestions for where you want to go based both on popular Web sites and searches and on the text that you type in. That text is transferred to Google's servers and may be logged in some cases. The service is turned on by default.
You can turn the feature off by going to "Under the Hood" under Options and unchecking the "Use a suggestion service" box. You can also select other privacy options, including surfing in Chrome's "incognito" mode, which ensures that Web history, cookies and records of downloads are not stored on your computer when the session ends.
4. Turn off Web History. You may have turned on the Web History option, also called Personalized Search, when you first created your Google account. If so, Google may be maintaining a "personalized" search history for your use.
Google does not use this data to target ads. It uses a separate search history, stored in Google's server logs and associated with a browser cookie, for that purpose. That data is "anonymized" after nine months. But your Web History is retained forever, unless you turn it off or delete the contents.
5. Opt out of interest-based ad serving. As of March 11, Google and third parties in its AdSense network are using not just contextual information (what you're searching for) but a history of previously viewed Web pages to serve up targeted advertising. The idea is to serve up ads that are more relevant to your interests.
You can remove interest categories Google has attributed to you or add others by visiting its Ad Preferences page. You can also opt out. To make the opt-out setting permanent, however, you'll need to install a plug-in for each browser you use. It's available for IE, Firefox, Chrome and Safari.
6. Add SSL to Gmail. You can encrypt e-mails you read and create in Gmail. Your log-in data is encrypted by default by SSL encryption, but SSL is turned off when you interact with your e-mail, because it can slow performance.
You'll find the option in Settings under the General tab. Scroll to the bottom of the screen and select the "Always use https" option under the Browser Connection setting.
Correction: The story initially said that Google Chrome's Omnibox suggests Web sites it thinks you might want to visit based on your Web history. Instead, it makes suggestions based on popular Web sites and searches and as well as the text that you type into the Omnibox.
Read more about Networking in Computerworld's Networking Topic Center.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- The Critical Role of Support in Your Enterprise Mobility Management Strategy Most business leaders underestimate the importance of tech support when they choose an EMM solution. Here's what to put on your checklist.
- Separating Work and Personal at the Platform Level: How BlackBerry Balance Works BlackBerry® Balance™ separates work from personal on the same mobile device, right at a platform level. Find out how it can work for...
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of... All Networking White Papers | Webcasts