Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Control Your Profile, Part I

Control Your Profile, Part I

If you use Facebook, you’re not alone. There are over two billion active users on the platform. Whether you are willing to accept it or not, Facebook is a huge part of a good chunk of the world’s lives. If being a well-connected, with the times, user has always described who you are, then we could have some helpful information oriented towards you in our blog today. We will be discussing your online identity, and who you have told Facebook you are. 

Collect Everything Facebook Knows About You

The world’s largest social network has collected a large amount of information about who you are. Scandals are no stranger to the platform, so exposed sensitive data better be a concern for you. Facebook has recognized their scandalous flaws, and vowed to become a more transparent network. 

Facebook allows users to view the information they have collected about you. They’ve even made it quite simple to do so. Here’s how to view this information on a computer, and a mobile app respectively. 

On a desktop or laptop:

  1. Log in to your Facebook account.
  2. If you are on a desktop or laptop, click the down arrow on the top right and go to Settings.
  3. On the left, click Your Facebook Information.
  4. Facebook will present you with five options. Look for Download Your Information.
  5. Click View, Facebook will give you a screen where you can choose the date range and format of the data. Since in this case, we want to download everything, we’re going to set the Date Range to All of my data and set Media Quality to High. This means we’ll get a higher quality version of all of our photos and videos in the download.
  6. Click Create File and Facebook will start building the download. This can take a while, but Facebook will give you a notification when your data is ready for download.
  7. Once Facebook gives you the notification, click it and Download your data.

From the Facebook mobile app:

  1. Tap the 3-bar hamburger icon in the top right of the app.
  2. Scroll down and tap Settings & Privacy, and then tap Settings.
  3. Tap Download Your Information.
  4. Leave all of the options checked, and scroll down. Ensure the Date Range is set to All of my data and that Media Quality is set to High.
  5. Tap Create File and Facebook will give you a notification when the data is ready for download.

This information takes roughly an hour before a notification is given. Are you a Facebook veteran? Being an active user since the platform’s beginning means there is an incredibly large amount of information to be shared with you. This means these files can get quite large, so several GB of storage space should be available before completing these steps. 

There are many more things to do on the Your Facebook Information page on your desktop: 

Access Your Information - Facebook breaks down all of your data in several categories here. Posts, Photos, and Location all are able to be viewed. This is great and all, however users should be particularly interested in what Facebook knows about you outside of Facebook. Seeing old posts and photos shouldn’t be news to a user.  

Activity Log - This page again shares the things you should already have seen before. It essentially is a timeline recap, which is great to relive these old moments. However, this yet again does not reveal groundbreaking information about what Facebook knows about you. 

Deactivation and Deletion - Facebook hasn’t always had the option for users to delete their account. This feature is nice if you are fed up with Facebook, and some readers might even navigate to this page by the end of this series.  

What Does Facebook Know About You?

Once this file is viewable, you are able to understand just how much this social network giant knows about you. There are some obvious things, like posts and photos, but things get much, much more interesting beyond that. 

For example, Facebook not only is able to see your location, but it also logs it. I was able to pull up a day two weeks ago, and see exactly when I left my house and came to the office. Furthermore, I could see where I went on my lunch break, and any other pitstops I made. In some cases, it even allowed me to view the store’s name that I was at. 

Under the Ads section of this file, you will be able to see a list of advertisers who uploaded a contact list with your information. The important part of this statement that was just made is uploaded. This means that these listed advertisers ALREADY had information about you, and then possibly ran ads that targeted you.

What To Make of This Information

It might seem a bit nerve wracking knowing just how accessible the online profile you have made of yourself is. However, Facebook is used by a quarter of the world's population, so despite Mark Zuckerberg knowing the exact location of your house and habitual errand route, we aren’t saying leave the platform forever. We are just wanting to share how private your privacy really is, and we go over so much more in the other parts of this series. 

This is only the tip of the iceberg of the information we will share about this social giant. Visit our blog page at Central Technology Solutions to learn more! 

What Does It Mean to Plan for the Worst?
Armored Car Cybersecurity
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, August 04 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.centraltechnologysolutions.com/

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Productivity Cloud Hosted Solutions Data Network Security Privacy IT Services Email Data Backup Malware Internet Hackers Software IT Support Business Efficiency Outsourced IT Microsoft Innovation Mobile Devices Productivity Data Recovery Computer Hardware Managed IT Services Small Business Google Upgrade Business Continuity IT Support Cloud Computing Cybersecurity Backup Collaboration Phishing Smartphone Ransomware User Tips Communication Tech Term Managed Service Provider Disaster Recovery Workplace Tips Business Management Managed IT Services VoIP Windows 10 Smartphones Managed Service Mobile Device Internet of Things Android Quick Tips Remote Monitoring Social Media Data Management Paperless Office Managed IT communications Facebook Network Browser Encryption Saving Money Windows 10 Windows Server Save Money Artificial Intelligence Office 365 Virtualization BDR Business Technology Miscellaneous Passwords Help Desk Wi-Fi Covid-19 Compliance Risk Management Holiday BYOD Remote Work Automation Healthcare Vendor Management App Password Training Users Windows 7 Mobile Device Management Health Office Microsoft Office Government Document Management Apps Recovery Bring Your Own Device Gmail Going Green Employer-Employee Relationship Avoiding Downtime Data Security Big Data Analytics Robot Chrome Firewall Laptops Bandwidth Applications Unified Threat Management Scam Data storage Computing Project Management Content Filtering Antivirus Two-factor Authentication Information Technology Wireless Infrastructure Data loss Vulnerability Information Mobility Processor Blockchain File Sharing SaaS Telephone Systems Apple Regulations Hosted Solution IT Management Website Computers Redundancy Money Tip of the week Storage Politics Employee-Employer Relationship Work/Life Balance Budget Software as a Service VPN Flexibility Router Customer Relationship Management Maintenance Operating System Printing Gadgets Virtual Private Network Customer Service Hard Drive Virtual Reality OneDrive IoT Remote Computing Settings Machine Learning Unified Communications Access Control Tablet Downtime Company Culture Meetings Files IT Service RMM Social Proactive Augmented Reality IT solutions Managed Services Provider Dark Web Digital Payment Data Storage Social Network How To Samsung Management The Internet of Things Websites Identity Theft Remote Monitoring and Management Time Management Networking File Management Chromebook Bitcoin Licensing Patch Management Sports Remote Workers Smart Technology Net Neutrality Mouse Data Breach Payment Cards Outlook Network Management Assessment Google Drive Co-Managed IT Upgrades Internet Exlporer Server Management Twitter How To Business Growth Professional Services Managed Services HIPAA Spam Electronic Health Records Consultation YouTube Display Employees Cooperation Uninterrupted Power Supply WiFi Monitoring End of Support Mobile Security Mobile Computing Hacker Mobile Office Recycling Remote Worker Monitors Solid State Drive Word Search Administration Utility Computing Consulting LiFi Electronic Medical Records Wireless Technology Legal Private Cloud Education Alert Current Events Tech Support ROI Cables Backup and Disaster Recovery Downloads Cryptocurrency Shortcut Solid State Drives Credit Cards Mobile Data Motherboard Return on Investment Enterprise Content Management Finance User Error Language Teamwork Cyber Monday technology services provider Point of Sale Firefox Typing Smart Tech Laptop Heating/Cooling IT Consulting Database Sensors Safety Theft Migration Hacks Cybercrime Database Management Shadow IT Dark Data Personal Information Telephony Notes Wires Human Error Operations Sync WannaCry Options Holidays Cost Management E-Commerce Data Warehousing Best Practice Active Directory Vulnerabilities Authentication Computing Infrastructure Public Cloud CRM Hacking Marketing Shared resources Windows Server 2008 Notifications Connectivity Technology Assurance Group ’s 18 Law Enforcement Enterprise Resource Planning Bookmarks Botnet Remote Working Servers Voice over Internet Protocol Black Market WPA3 Financial Technology Tips Chatbots Travel Buisness GDPR Outsourcing PowerPoint Value of Managed Services Writing Emoji Permission Multi-Factor Security Wearable Technology Windows 8 Save Time Mobile Device Managment Software Tips 5G IT Features Microsoft Excel Modem Windows Server Network Congestion Geography Authorization Printer Alerts Identities Automobile Computer Care Disaster Trending Distributed Denial of Service Annual Convention Gadget Video Conferencing Computer Repair Mobile Favorites Technology Laws Telephone Fleet Tracking Procurement Comparison Identity Mail Merge Cookies Google Wallet GPS Touchscreen Techology Retail Cortana Test Google Calendar VoIP Sponsor Wireless Internet Business Telephone Physical Security Cache Lenovo Security Cameras User Management High-Speed Internet Hard Drives Google Docs Manufacturing Optimization 3D Printing Star Wars Managed IT Service San Diego Biometric Conferencing Supercomputer Peripheral Statistics Transportation Mobile VoIP Processors Asset Tracking Specifications Humor Crowdsourcing Address Permissions Nanotechnology Drones Tracking Disaster Resistance Virtual Assistant Vendor MSP Legislation IT Technicians Backups G Suite History Digital Obstacle Employer/Employee Relationships IT Assessment Office Tips Cyberattacks Taxes Superfish Batteries Update Development Zero-Day Threat SharePoint Staff Google Maps Hard Disk Drives Virtual Machines Unsupported Software Virus Break Fix Deep Learning Social Networking Projects Gamification Managing Stress Instant Messaging Unified Threat Management Hotspot IT Budget PCI DSS Bluetooth Cyber security OneNote Black Friday Roanoke — Central Technology Solutions eWaste Read Only Fraud Alt Codes Screen Reader Outsource IT Proactive IT Wasting Time Virtual Desktop Smart Devices Social Engineering USB Tech Terms Mirgation Cabling Spyware Course Proactive Maintenance Digitize IT Consultant Hard Disk Drive Error Printers Emergency Web Server CrashOverride Cameras Motion Sickness Regulation Administrator CCTV Relocation Students Webcam