Low-risk data includes information that doesn’t cause serious harm if it is shared. It’s mostly used for personal preferences, like what you like to buy or what games you play. Even though this data might be collected, it’s less likely to hurt you directly. Companies may use it to target you with ads they think you'll like, or even to improve their services for you.
Moderate-risk data includes personal information that can be used to learn more about you. If someone gets this information, they might use it to send unwanted ads, spam, or try to trick you by sending fake emails that appear to be from companies you trust. It won’t cause immediate harm, but it can still be used in ways that affect your privacy.
High-risk data is very sensitive and could cause serious problems if it is stolen or shared. This includes things like your bank account, medical records, or passwords. If this data gets out, it could lead to identity theft, financial loss, or other serious issues.
These types of data are less sensitive on their own and may not lead to significant harm if exposed. However, they could still be used for targeted marketing or profiling.
Ad interactions (clicks on advertisements)
Why: Reflects your interests but is less harmful unless combined with other data for profiling.
Fitness tracker data (steps taken, calories burned)
Why: Reveals health information but is generally not harmful unless combined with medical or location data.
Online gaming activity (games played, in-game purchases)
Why: Indicates hobbies but doesn’t reveal sensitive personal data unless linked to financial details.
Shopping cart behavior (abandoned or completed purchases)
Why: Can indicate consumer interests but isn’t sensitive without associated payment information.
Survey responses
Why: Often anonymous and dependent on the content; low risk unless sensitive personal data is requested.
Food delivery preferences (frequent orders, favorite restaurants)
Why: Indicates consumer preferences, but not highly sensitive.
Shopping wishlist items (items saved for future purchase)
Why: Shows shopping preferences but doesn’t reveal sensitive personal information.
This data, while not directly compromising financial security, can be used to gather more personal information or track behaviors, increasing the risk of targeted attacks, scams, or misuse.
Full name
Why: Can be combined with other information to track or impersonate someone but less risky on its own.
Home address
Why: Physical safety concerns arise, and location-based scams can be initiated.
Phone number
Why: Could lead to scams, phishing, or tracking, but usually requires additional information to be fully harmful.
Email address
Why: Often used in phishing schemes or data breaches, especially if combined with passwords.
Date of birth
Why: Can be used for identity verification; combined with other information, it can increase risk of identity theft.
Browsing history (websites visited)
Why: May reveal private interests or behaviors, leading to targeted ads, manipulation, or exploitation.
Purchase history (online shopping records)
Why: Reflects personal preferences and could be used for targeted scams or unwanted marketing.
Google Search History
Why: Reveals personal interests, concerns, and habits that could be exploited for targeted manipulation.
Social media activity (likes, shares, comments)
Why: Publicly available data that can be used to infer personality or preferences, enabling profiling and social engineering.
App usage patterns (which apps are used, how often)
Why: Can indicate personal habits, routines, or even sensitive activities, allowing for manipulation or profiling.
Frequented physical locations (tracked via mobile devices)
Why: Location tracking can reveal patterns and routines that might compromise physical safety or privacy.
Downloads from websites or apps
Why: Could indicate interests, but less sensitive unless combined with other data like browsing or purchase history.
These types of data can lead to serious personal, financial, or identity theft risks if exposed.
Bank account numbers
Why: Can directly lead to financial loss if compromised.
Credit card numbers
Why: Can be used for fraudulent transactions, resulting in financial theft.
Social insurance number
Why: Highly sensitive identifier used for legal and financial purposes; compromise can lead to identity theft.
Medical records
Why: Contains personal health information, which could lead to discrimination or exploitation.
Biometric data (fingerprints, facial recognition data)
Why: Difficult to change and could be used for identity theft or surveillance without consent.
Passport number
Why: Can be used to impersonate someone, leading to identity theft or fraudulent travel.
Passwords
Why: If compromised, can lead to unauthorized access to various online accounts.