  {"id":744,"date":"2025-07-17T08:00:35","date_gmt":"2025-07-17T12:00:35","guid":{"rendered":"https:\/\/www.montclair.edu\/phish-files\/?p=744"},"modified":"2026-02-16T16:22:13","modified_gmt":"2026-02-16T21:22:13","slug":"your-digital-footprint","status":"publish","type":"post","link":"https:\/\/www.montclair.edu\/phish-files\/2025\/07\/17\/your-digital-footprint\/","title":{"rendered":"What Does the Internet Know About You?"},"content":{"rendered":"<p data-start=\"286\" data-end=\"601\">Every time you post a photo, sign up for a class forum, or \u201clike\u201d a video, you\u2019re adding to your <strong data-start=\"383\" data-end=\"404\">digital footprint<\/strong>\u2014the trail of data that follows you online. It\u2019s easy to overlook just how much information we give away every day, especially on a college campus where life is fast-paced and increasingly digital.<\/p>\n<p data-start=\"603\" data-end=\"786\">But whether you&#8217;re a student, faculty member, or staff, your online activity has real-world consequences\u2014and understanding your footprint is the first step to protecting your privacy.<\/p>\n<hr data-start=\"788\" data-end=\"791\" \/>\n<h2 data-start=\"793\" data-end=\"828\">What Is a Digital Footprint?<\/h2>\n<p data-start=\"830\" data-end=\"1069\">Your <strong data-start=\"835\" data-end=\"856\">digital footprint<\/strong> is the sum of all the information about you that exists online. That includes things you post or share yourself (<strong data-start=\"970\" data-end=\"990\">active footprint<\/strong>) and data collected about you behind the scenes (<strong data-start=\"1040\" data-end=\"1061\">passive footprint<\/strong>), like:<\/p>\n<ul data-start=\"1070\" data-end=\"1230\">\n<li data-start=\"1070\" data-end=\"1095\">\n<p data-start=\"1072\" data-end=\"1095\">Location data from apps<\/p>\n<\/li>\n<li data-start=\"1096\" data-end=\"1130\">\n<p data-start=\"1098\" data-end=\"1130\">Cookies and trackers on websites<\/p>\n<\/li>\n<li data-start=\"1131\" data-end=\"1172\">\n<p data-start=\"1133\" data-end=\"1172\">Login credentials used across platforms<\/p>\n<\/li>\n<li data-start=\"1173\" data-end=\"1230\">\n<p data-start=\"1175\" data-end=\"1230\">Public comments or usernames on class discussion boards<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"1232\" data-end=\"1235\" \/>\n<h2 data-start=\"1237\" data-end=\"1268\">Why It Matters on Campus<\/h2>\n<p data-start=\"1270\" data-end=\"1336\">Your digital footprint can affect more than just your social life:<\/p>\n<ul data-start=\"1337\" data-end=\"1644\">\n<li data-start=\"1337\" data-end=\"1403\">\n<p data-start=\"1339\" data-end=\"1403\"><strong data-start=\"1339\" data-end=\"1372\">Job and internship recruiters<\/strong> often search applicants online<\/p>\n<\/li>\n<li data-start=\"1404\" data-end=\"1470\">\n<p data-start=\"1406\" data-end=\"1470\"><strong data-start=\"1406\" data-end=\"1439\">Scholarships or grad programs<\/strong> may review your public content<\/p>\n<\/li>\n<li data-start=\"1471\" data-end=\"1564\">\n<p data-start=\"1473\" data-end=\"1564\"><strong data-start=\"1473\" data-end=\"1498\">Scammers and phishers<\/strong> target personal details from social media and student directories<\/p>\n<\/li>\n<li data-start=\"1565\" data-end=\"1644\">\n<p data-start=\"1567\" data-end=\"1644\"><strong data-start=\"1567\" data-end=\"1594\">Sensitive academic info<\/strong> may be shared unintentionally on public platforms<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"1646\" data-end=\"1812\">For example, sharing your schedule or travel plans on Instagram may seem harmless\u2014but it can also reveal when you&#8217;re not home or on campus, opening the door to risks.<\/p>\n<hr data-start=\"1814\" data-end=\"1817\" \/>\n<h2 data-start=\"1819\" data-end=\"1848\">Who Can See Your Data?<\/h2>\n<p data-start=\"1850\" data-end=\"1945\">You might be surprised. Here\u2019s a quick list of who might have access to your digital footprint:<\/p>\n<ul data-start=\"1946\" data-end=\"2222\">\n<li data-start=\"1946\" data-end=\"2014\">\n<p data-start=\"1948\" data-end=\"2014\"><strong data-start=\"1948\" data-end=\"1990\">Social media platforms and advertisers<\/strong> analyzing your behavior<\/p>\n<\/li>\n<li data-start=\"2015\" data-end=\"2075\">\n<p data-start=\"2017\" data-end=\"2075\"><strong data-start=\"2017\" data-end=\"2033\">Data brokers<\/strong> collecting and selling your personal info<\/p>\n<\/li>\n<li data-start=\"2153\" data-end=\"2222\">\n<p data-start=\"2155\" data-end=\"2222\"><strong data-start=\"2155\" data-end=\"2189\">Peers, roommates, or coworkers<\/strong> who can search your public posts<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"2224\" data-end=\"2227\" \/>\n<h2 data-start=\"2229\" data-end=\"2256\">How to Take Control<\/h2>\n<p data-start=\"2258\" data-end=\"2334\">Here are a few easy ways to protect your privacy without going off the grid:<\/p>\n<h3 data-start=\"2336\" data-end=\"2360\">1. Check Privacy Settings<\/h3>\n<p data-start=\"2513\" data-end=\"2553\">Review privacy and security settings on:<\/p>\n<ul data-start=\"2554\" data-end=\"2690\">\n<li data-start=\"2554\" data-end=\"2593\">\n<p data-start=\"2556\" data-end=\"2593\">Instagram, TikTok, LinkedIn, Facebook<\/p>\n<\/li>\n<li data-start=\"2594\" data-end=\"2642\">\n<p data-start=\"2596\" data-end=\"2642\">Class tools like Slack, Discord, Canvas forums<\/p>\n<\/li>\n<li data-start=\"2643\" data-end=\"2690\">\n<p data-start=\"2645\" data-end=\"2690\">Google or Microsoft accounts linked to school<\/p>\n<\/li>\n<\/ul>\n<h3>2. Use OSINT (Open Source Intelligence) Tools<\/h3>\n<ul>\n<li><a href=\"https:\/\/haveibeenpwned.com\/\">Have I Been Pwned<\/a>\n<ul>\n<li><strong data-start=\"807\" data-end=\"819\">Use for:<\/strong> Checking if your email or phone number has been exposed in a data breach<\/li>\n<li><strong data-start=\"895\" data-end=\"912\">How it works:<\/strong> Enter your email address to see if it was found in leaked databases<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/myactivity.google.com\/results-about-you\">Google Results About You<\/a>\n<ul>\n<li><strong data-start=\"247\" data-end=\"265\"> Use it for: <\/strong>Finding and removing personal information (like your phone number, home address, or email) that appears in Google Search results.<\/li>\n<li><strong data-start=\"0\" data-end=\"20\" data-is-only-node=\"\">How it works: <\/strong>It scans Google Search for your personal info and lets you request removal with a click.<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/www.google.com\/maps\">Google Maps + Street View<\/a>\n<ul>\n<li><strong data-start=\"1515\" data-end=\"1527\">Use for:<\/strong> Visual recon (e.g., verifying addresses, checking building entrances)<\/li>\n<li><strong data-start=\"1600\" data-end=\"1617\">How it works:<\/strong> Type in any address or location and explore via street view<\/li>\n<\/ul>\n<\/li>\n<li><a rel=\"noopener\" href=\"https:\/\/tineye.com\/\" target=\"_new\" class=\"\" data-start=\"1780\" data-end=\"1809\">TinEye<\/a> or <a rel=\"noopener\" href=\"https:\/\/images.google.com\/\" target=\"_new\" class=\"\" data-start=\"1813\" data-end=\"1870\">Google Reverse Image Search<\/a>\n<ul>\n<li><strong data-start=\"1873\" data-end=\"1885\">Use for:<\/strong> Tracing where an image has been used before (e.g., profile photos, scam job listings)<\/li>\n<li><strong data-start=\"1974\" data-end=\"1991\">How it works:<\/strong> Upload or paste image URL to find other locations it appears online<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>3. Check Your Credit<\/h3>\n<ul>\n<li><a href=\"http:\/\/AnnualCreditReport.com\">AnnualCreditReport.com<\/a>\n<ul>\n<li>\n<p data-start=\"245\" data-end=\"370\"><strong data-start=\"245\" data-end=\"260\">Use it for: <\/strong>Getting your free credit reports from <strong data-start=\"301\" data-end=\"338\">Equifax, Experian, and TransUnion<\/strong>\u2014the three major credit bureaus.<\/p>\n<\/li>\n<li>\n<p data-start=\"245\" data-end=\"370\"><strong data-start=\"372\" data-end=\"402\">How it works: <\/strong>You can request one free report from each bureau every year (or weekly through 2026).<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/www.creditkarma.com\/\">Credit Karma<\/a>\n<ul>\n<li>\n<p data-start=\"712\" data-end=\"808\"><strong data-start=\"712\" data-end=\"727\">Use it for: <\/strong>Free ongoing credit score tracking and alerts from <strong data-start=\"781\" data-end=\"807\">TransUnion and Equifax<\/strong>.<\/p>\n<\/li>\n<li>\n<p data-start=\"712\" data-end=\"808\"><strong data-start=\"810\" data-end=\"827\">How it works: <\/strong>Create an account, and Credit Karma shows your credit score, report summaries, and any changes.<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3 data-start=\"1439\" data-end=\"1480\">Bonus Tip: Set a <strong data-start=\"1463\" data-end=\"1478\">Fraud Alert<\/strong><\/h3>\n<ul data-start=\"1481\" data-end=\"1647\">\n<li data-start=\"1481\" data-end=\"1572\">\n<p data-start=\"1483\" data-end=\"1572\">You can ask any of the three major bureaus to place a <strong data-start=\"1531\" data-end=\"1551\">free fraud alert<\/strong> on your credit file.<\/p>\n<\/li>\n<li data-start=\"1573\" data-end=\"1647\">\n<p data-start=\"1575\" data-end=\"1647\">This makes it harder for identity thieves to open accounts in your name.<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"2870\" data-end=\"2873\" \/>\n<h2 data-start=\"2875\" data-end=\"2905\">Quick Tips for Everyone<\/h2>\n<h3 data-start=\"2907\" data-end=\"2927\">For Students:<\/h3>\n<ul data-start=\"2928\" data-end=\"3078\">\n<li data-start=\"2928\" data-end=\"3005\">\n<p data-start=\"2930\" data-end=\"3005\">Keep your student email private\u2014don\u2019t use it to sign up for random sites.<\/p>\n<\/li>\n<li data-start=\"3006\" data-end=\"3078\">\n<p data-start=\"3008\" data-end=\"3078\">Use private settings for class discussion boards or project platforms.<\/p>\n<\/li>\n<\/ul>\n<h3 data-start=\"3080\" data-end=\"3107\">For Faculty &amp; Staff:<\/h3>\n<ul data-start=\"3108\" data-end=\"3265\">\n<li data-start=\"3108\" data-end=\"3178\">\n<p data-start=\"3110\" data-end=\"3178\">Don\u2019t share personal contact info in course syllabi posted online.<\/p>\n<\/li>\n<li data-start=\"3179\" data-end=\"3265\">\n<p data-start=\"3181\" data-end=\"3265\">Make sure your office\/location isn\u2019t visible in public directories unless necessary.<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"3267\" data-end=\"3270\" \/>\n<h2 data-start=\"3272\" data-end=\"3315\">Bonus: Clean Up Your Online Presence<\/h2>\n<p data-start=\"3316\" data-end=\"3336\">Take 15 minutes and:<\/p>\n<ul data-start=\"3337\" data-end=\"3578\">\n<li data-start=\"3415\" data-end=\"3450\">\n<p data-start=\"3417\" data-end=\"3450\">Untag yourself from old photos<\/p>\n<\/li>\n<li data-start=\"3451\" data-end=\"3511\">\n<p data-start=\"3453\" data-end=\"3511\">Opt out of data broker sites like Spokeo or BeenVerified<\/p>\n<\/li>\n<li data-start=\"3512\" data-end=\"3578\">\n<p data-start=\"3514\" data-end=\"3578\">Request takedowns for outdated or incorrect info, where possible<\/p>\n<\/li>\n<\/ul>\n<blockquote data-start=\"284\" data-end=\"423\"><p><strong>&#8220;Your digital footprint is like glitter. No matter how much you try to clean it up you&#8217;ll always leave some (or even most!) behind!&#8221;<\/strong><\/p>\n<p>\u2014 Emily Harris JD, CISSP, CIPP\/US<br \/>\nChief Information Security Officer<\/p><\/blockquote>\n<hr \/>\n<h2 data-start=\"553\" data-end=\"653\">Want to Know More?<\/h2>\n<p>gbhackers | <a href=\"https:\/\/gbhackers.com\/how-to-manage-your-digital-footprint\/\">ESET Details on How to Manage Your Digital Footprint<\/a><\/p>\n<p>ExpressVPN | <a href=\"https:\/\/www.expressvpn.com\/blog\/how-your-digital-footprint-can-impact-your-life\/\">How your digital footprint can impact your life<\/a><\/p>\n<p>Kaspersky | <a href=\"https:\/\/www.kaspersky.com\/blog\/minimizing-digital-footprints-2025\/53762\/\">How to shrink your digital footprint<\/a><\/p>\n<p>CyberInsider | <a href=\"https:\/\/cyberinsider.com\/data-removal\/delete-digital-footprint\/\">How to Easily Delete Your Digital Footprint in 2025<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Every time you post a photo, sign up for a class forum, or \u201clike\u201d a video, you\u2019re adding to your digital footprint\u2014the trail of data that follows you online. It\u2019s easy to overlook just how much information we give away every day, especially on a college campus where life is fast-paced and increasingly digital. But [&hellip;]<\/p>\n","protected":false},"author":349,"featured_media":222,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[5],"tags":[],"class_list":["post-744","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/posts\/744","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/users\/349"}],"replies":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/comments?post=744"}],"version-history":[{"count":7,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/posts\/744\/revisions"}],"predecessor-version":[{"id":1429,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/posts\/744\/revisions\/1429"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/media\/222"}],"wp:attachment":[{"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/media?parent=744"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/categories?post=744"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/tags?post=744"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}