After seeing the digital footprint that the Parkland, Florida school serial killer left behind, I think it’s beyond important for all internet users to understand how our digital footprints are created and how we could use them to prevent future public attacks, mass shootings, and find predators before they find or harm anyone else. In this post, I’ve explained what a digital footprint is and why your digital footprint matters. If you prefer to skip ahead to learn what you can do to report possible predators based on their social or digital media profiles, click here.
In short, a digital footprint is everything a user inputs onto the internet, and information users unintentionally leave behind. Whether it be a comment on social media or a sent email, everyone online leaves a digital footprint behind. Before finishing this blog post, you will be thinking again about performing searches or logging in to computers that belong to employers, in hotels, and other public places.
What types of digital footprints are there?
Two types of digital footprints occur on the world wide web and devices connected to the internet – passive and active. Here is how each type of digital footprints works on all devices, including school computers, employers’ laptops, and mobile phones:
- Passive digital footprints are stored in several ways: In an online environment, a footprint may be stored in an online database by tracking the user’s IP address. Each computer or device operates on an IP Address equivalent to a “car tag.” The IP address is registered to a particular device and starts with a clean slate and no digital footprint. The passive information is also stored on the computer or device and is available for the device administrators to see. Imagine your car tag telling the department of motor vehicles exactly where your car was, for how long, how much it weighed on each journey along with other information that most would consider a violation of privacy.
- Active digital footprints occur on sites that you log into. Each computer or device has capabilities to allow numerous users. Typically when setting up a computer, an administrator provides each user his/her login. The login serves multiple purposes, including the practicality of not having to see all of your kid’s schoolwork or photos. In the background, each administrator of the device can see actions that are automatically logged into a database. Inside the computer or device log, the admin can access the Keylogger. The Keylogger tells the admin which sites the user visited, the length of time, and each click the user made. Additionally, the Keylogger monitors the clipboard for any changes that could be problematic as each user may copy passwords, take screenshots, post sensitive information, or think other things that the user may feel is private, which automatically gets logged.
How is your online content tracked + how is your digital footprint used?
1. Website browsing + how your digital footprint develops on the World Wide Web.
The worldwide web cyber footprint is also known as a cyber shadow, digital shadow, or electronic footprint. Whether the information is passive or active, every search on Google, Bing, on Facebook, on Pinterest, on Instagram, or anywhere else on the web is leaving a footprint. This information is used by search engines (ex. Google, Bing, Facebook, Safari, Firefox, Yahoo, AOL) to sell information to marketers that market on their channels like Google ads or Facebook ads.
2. How social media contributes to your digital footprint.
From Facebook likes + comments, messenger conversations, Instagram hearts and comments, Instagram direct messages, Youtube comments, Google plus circles + comments, Pinterest pins + comments, and even Secret Boards. Leave a record and become part of a user’s digital footprint. Each user is aware of this information in the Privacy Terms & Use for each website and social media site.
3. Online stores + retail e-commerce sites use your digital footprint.
E-commerce retailers allow users to review products on their sites, often leaving cookies on your computer or mobile device. The cookies track your movement around the internet. From site-to-site, those targeted Google advertisements can keep showing you products you’ve recently viewed online. To digital marketers, this method of marketing to you based on your digital footprint is called Remarketing.
4. Even tracking you via your most personal devices (mobile phones, tablets, laptops + other log-in stations.)
Often websites will build a list of all of the various devices you use to visit their sites. Most of the time, this can be a way to help secure your account and offer a faster login to your accounts and shopping carts.
Now that you understand how we each build our digital and social media footprints, click here to learn what you can do to report digital or social media content that could help stop catastrophes or help the police locate criminals online.