Taking Control of Your Digital Privacy
Ages 13+Digital Guardians • 14 Pages
Privacy is your right to control what information you share, who sees it, and how it's used. In the digital age, protecting your privacy requires knowledge and active effort.
| Category | Examples | Risk Level |
|---|---|---|
| Direct Identifiers | Name, SSN, driver's license, passport | High |
| Contact Info | Address, phone, email | High |
| Financial | Bank accounts, credit cards, payment info | Critical |
| Medical | Health records, prescriptions, insurance | Critical |
| Biometric | Fingerprints, facial recognition, DNA | High |
| Digital Identity | IP address, device IDs, cookies | Medium |
| Location Data | GPS coordinates, check-ins, travel history | Medium |
| Behavioral | Browsing history, search queries, purchases | Medium |
Even "harmless" information becomes risky when combined. Your favorite coffee shop + usual visit time + home neighborhood = predictable location patterns that could be exploited.
| Category | Standard Option | Privacy Alternative |
|---|---|---|
| Search Engine | DuckDuckGo, Startpage, Brave Search | |
| Browser | Chrome | Firefox, Brave, Tor |
| Gmail | ProtonMail, Tutanota | |
| Cloud Storage | Google Drive | Tresorit, Sync.com |
| Messaging | Signal, Telegram | |
| Maps | Google Maps | OpenStreetMap, Apple Maps (privacy-focused) |
What VPNs Do:
Choosing a VPN:
Recommended VPNs: ProtonVPN, Mullvad, IVPN, NordVPN, ExpressVPN
Benefits:
Recommended: Bitwarden, 1Password, LastPass, KeePassXC (offline)
General Data Protection Regulation gives you rights to:
California Consumer Privacy Act provides rights to:
Children's Online Privacy Protection Act protects children under 13:
| Mistake | Why It's Risky | Better Alternative |
|---|---|---|
| Using same password everywhere | One breach compromises all accounts | Unique passwords with password manager |
| Public WiFi without VPN | Data can be intercepted | Use VPN or mobile hotspot |
| Accepting all cookies | Enables extensive tracking | Reject unnecessary cookies |
| Oversharing on social media | Builds detailed profile for exploitation | Share selectively, use privacy settings |
| Not updating software | Leaves security vulnerabilities open | Enable automatic updates |
| Skipping 2FA | Password alone is weak protection | Enable 2FA everywhere possible |
| Using "Sign in with Google/Facebook" | Creates data connections between services | Create separate account |
| Not reading privacy policies | Don't know what you're agreeing to | At least skim key sections |