{"id":45619,"date":"2015-08-25T10:35:02","date_gmt":"2015-08-25T17:35:02","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=45619"},"modified":"2015-08-28T16:11:02","modified_gmt":"2015-08-28T23:11:02","slug":"how-much-is-your-privacy-worth-infographic","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/how-much-is-your-privacy-worth-infographic\/","title":{"rendered":"How Much Is Your Privacy Worth? [Infographic]"},"content":{"rendered":"<p>How much do we care about our privacy? This question is both simpler and more complicated than it appears. While the debate over data mining and privacy is not new, in recent years, Americans have become more concerned about what information is being extracted from them without consent and how it is used.<\/p>\n<p>A 2015 <a href=\"http:\/\/www.pewinternet.org\/2015\/05\/20\/americans-attitudes-about-privacy-security-and-surveillance\/\" target=\"_blank\">Pew survey<\/a> explored this issue in the wider context of online tracking and profiling that occurs in commercial arenas. The survey found that Americans feel privacy is important in their daily lives, yet most have a pervasive sense that their data is being mined, and very few people feel that they have control over the data that is collected about them and how it is used. &#8220;Most strikingly, these views are especially pronounced when it comes to knowing what information about them is being collected and who is doing the collecting,&#8221; notes Pew Research Center.<\/p>\n<p>Nowadays there are so many different ways to be tracked online, and with so many entities interested in our information, it has become increasingly difficult to maintain privacy online. Previously we told you\u00a0about how <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-maintain-your-privacy-on-the-internet\/\" target=\"_blank\">data brokers and governments are working together to collect private information about us<\/a>, and with whom data brokers sell\u00a0the information to. But what data is sold? Where do brokers get your data? And how much do Americans actually care about keeping it private?<\/p>\n<p>In the below infographic, <a href=\"http:\/\/onlinemba.unc.edu\" target=\"_blank\">MBA@UNC<\/a>\u00a0explored the types and sources of data that is collected by data brokers and what Americans say about keeping their data private.<\/p>\n<h4><strong><a href=\"https:\/\/www.intego.com\/antivirus-internet-security-x8\" target=\"_blank\">See how our Mac Internet Security X8 can help protect your privacy online \u2014\u00a0download a free trial today!<\/a><\/strong><\/h4>\n<h3>The Business of Data Brokers<\/h3>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-much-is-your-privacy-worth-infographic\/data-brokers-infographic\/\" rel=\"attachment wp-att-45631\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-45631\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/08\/Data-Brokers-Infographic.jpg\" alt=\"Data Brokers Infographic\" width=\"599\" height=\"5875\" \/><\/a><\/p>\n<p><strong>How strong are your views on the importance of privacy in your everyday life? Do you feel that you have a lot of control over how much information is collected about you in daily life and how it is used? Do you support the idea of online anonymity for certain activities?\u00a0Have something else to say? Share your comments below!\u00a0<\/strong><\/p>\n<p>Infographic source:\u00a0<a href=\"http:\/\/onlinemba.unc.edu\/blog\/data-brokers-infographic\/\" target=\"_blank\">MBA@UNC<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Where do data brokers get your information? This infographic explores the types and sources of data collected by brokers and the monetary value of your data.<\/p>\n","protected":false},"author":4,"featured_media":45712,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[2455,277,61,159,106],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Where do data brokers get your information? This infographic explores the types and sources of data collected by brokers and the monetary value of your data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/how-much-is-your-privacy-worth-infographic\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Much Is Your Privacy Worth? [Infographic] - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Where do data brokers get your information? This infographic explores the types and sources of data collected by brokers and the monetary value of your data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/how-much-is-your-privacy-worth-infographic\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-08-25T17:35:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-08-28T23:11:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/08\/data-privacy-featured-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-much-is-your-privacy-worth-infographic\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/08\/data-privacy-featured-image.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/08\/data-privacy-featured-image.jpg\",\"width\":400,\"height\":260,\"caption\":\"How Much Is Your Privacy Worth?\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-much-is-your-privacy-worth-infographic\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/how-much-is-your-privacy-worth-infographic\/\",\"name\":\"How Much Is Your Privacy Worth? [Infographic] - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-much-is-your-privacy-worth-infographic\/#primaryimage\"},\"datePublished\":\"2015-08-25T17:35:02+00:00\",\"dateModified\":\"2015-08-28T23:11:02+00:00\",\"description\":\"Where do data brokers get your information? This infographic explores the types and sources of data collected by brokers and the monetary value of your data.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-much-is-your-privacy-worth-infographic\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-much-is-your-privacy-worth-infographic\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-much-is-your-privacy-worth-infographic\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Much Is Your Privacy Worth? [Infographic]\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-much-is-your-privacy-worth-infographic\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-much-is-your-privacy-worth-infographic\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"How Much Is Your Privacy Worth? [Infographic]\",\"datePublished\":\"2015-08-25T17:35:02+00:00\",\"dateModified\":\"2015-08-28T23:11:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-much-is-your-privacy-worth-infographic\/#webpage\"},\"wordCount\":350,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-much-is-your-privacy-worth-infographic\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/08\/data-privacy-featured-image.jpg\",\"keywords\":[\"data brokers\",\"Data Mining\",\"Government Surveillance\",\"Infographic\",\"Privacy\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-much-is-your-privacy-worth-infographic\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Where do data brokers get your information? This infographic explores the types and sources of data collected by brokers and the monetary value of your data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/how-much-is-your-privacy-worth-infographic\/","og_locale":"en_US","og_type":"article","og_title":"How Much Is Your Privacy Worth? [Infographic] - The Mac Security Blog","og_description":"Where do data brokers get your information? This infographic explores the types and sources of data collected by brokers and the monetary value of your data.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/how-much-is-your-privacy-worth-infographic\/","og_site_name":"The Mac Security Blog","article_published_time":"2015-08-25T17:35:02+00:00","article_modified_time":"2015-08-28T23:11:02+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/08\/data-privacy-featured-image.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-much-is-your-privacy-worth-infographic\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/08\/data-privacy-featured-image.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/08\/data-privacy-featured-image.jpg","width":400,"height":260,"caption":"How Much Is Your Privacy Worth?"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-much-is-your-privacy-worth-infographic\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/how-much-is-your-privacy-worth-infographic\/","name":"How Much Is Your Privacy Worth? [Infographic] - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-much-is-your-privacy-worth-infographic\/#primaryimage"},"datePublished":"2015-08-25T17:35:02+00:00","dateModified":"2015-08-28T23:11:02+00:00","description":"Where do data brokers get your information? This infographic explores the types and sources of data collected by brokers and the monetary value of your data.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-much-is-your-privacy-worth-infographic\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/how-much-is-your-privacy-worth-infographic\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-much-is-your-privacy-worth-infographic\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"How Much Is Your Privacy Worth? [Infographic]"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-much-is-your-privacy-worth-infographic\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-much-is-your-privacy-worth-infographic\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"How Much Is Your Privacy Worth? [Infographic]","datePublished":"2015-08-25T17:35:02+00:00","dateModified":"2015-08-28T23:11:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-much-is-your-privacy-worth-infographic\/#webpage"},"wordCount":350,"commentCount":1,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-much-is-your-privacy-worth-infographic\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/08\/data-privacy-featured-image.jpg","keywords":["data brokers","Data Mining","Government Surveillance","Infographic","Privacy"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/how-much-is-your-privacy-worth-infographic\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/08\/data-privacy-featured-image.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-bRN","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/45619"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=45619"}],"version-history":[{"count":34,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/45619\/revisions"}],"predecessor-version":[{"id":45811,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/45619\/revisions\/45811"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/45712"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=45619"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=45619"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=45619"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}