Endpoint //

Privacy

5/25/2018
12:25 PM
50%
50%

Privacy Survey Says: Americans Don't Want to Sell Their Data

A new survey shows the extent to which Americans are reluctant to sell their personal information for any price.

A new study says that many of the assumptions corporations have been making about consumers and their privacy are seriously flawed. And in the new dawn of GDPR, those bad assumptions could have serious consequences.

The study, conducted by digital communications firm Syzygy, surveyed 3,000 adults in the US, UK, and Germany. Asked whether they would sell their private data to a company — even a favored brand — 55% of Americans say that they would not, no matter the price offered.

One of the major surprises in the data came from the question of whether consumers would trade private information for a smoother or more personal online experience. While it is an article of faith for many online companies and services that consumers are happy to make this trade, only 21% of  Americans are willing to do so.

For those who are willing to sell their data to companies, $150 is the median price they would accept. And when it comes to ongoing monitoring of online activity, 33% say they would be willing to let Google watch them Web-surf — in exchange for $25 a month.

For more, read here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/30/2018 | 6:02:52 PM
$25 by Google
This would not happen in my view, they may not be making that much money per personal record.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/30/2018 | 6:01:17 PM
Re: Surprised?
t paralyzes individuals into never wanting to provide personal data. That is true in my view too. Accessive data collaction is scary.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/30/2018 | 5:59:21 PM
Re: Surprised?
Unfortunately, this has been escalated to the point where too much data is acquired needlessly. I agree with this. For facebook more data is better, so result is not that great for the memebers.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/30/2018 | 5:57:54 PM
Re: Surprised?
How is this surprising in any way? It is for me partially. We tend to not care about privacy that much if we get something out of it.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/30/2018 | 5:56:30 PM
Personal data
It depends what we mean by personl data. If first name, last name and email I think i would sell it with quite low price, knowing that it is out there already.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
5/24/2018 | 1:16:43 PM
Surprised?
How is this surprising in any way? There are only certain functions that require the use of personal information. Unfortunately, this has been escalated to the point where too much data is acquired needlessly. It paralyzes individuals into never wanting to provide personal data.
How the US Chooses Which Zero-Day Vulnerabilities to Stockpile
Ricardo Arroyo, Senior Technical Product Manager, Watchguard Technologies,  1/16/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-3906
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 contains hardcoded credentials in the WCF service on port 9003. An authenticated remote attacker can use these credentials to access the badge system database and modify its contents.
CVE-2019-3907
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 stores user credentials and other sensitive information with a known weak encryption method (MD5 hash of a salt and password).
CVE-2019-3908
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 stores backup files as encrypted zip files. The password to the zip is hard-coded and unchangeable. An attacker with access to these backups can decrypt them and obtain sensitive data.
CVE-2019-3909
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 database uses default credentials. Users are unable to change the credentials without vendor intervention.
CVE-2019-3910
PUBLISHED: 2019-01-18
Crestron AM-100 before firmware version 1.6.0.2 contains an authentication bypass in the web interface's return.cgi script. Unauthenticated remote users can use the bypass to access some administrator functionality such as configuring update sources and rebooting the device.