Why Are Cookies Bad

Improved Essays
What are cookies and are they a good thing or a bad thing. Cookies, not the gooey chocolate chip type but a computer version got their name from a Unix program, Fortune Cookie, that creates a different message (fortune) each time the program runs. Messages passed to your computer’s internet browsers each time you visit websites stored in small files are what are known as cookies in the computer world. Information you’ve entered as well as other calculated information such as what pages you visited and how often is all stored in the cookie files. A good example of use of cookies, would be when shopping online and you’re not able to finish your transaction because you must leave home. You close out of your browser and shut down your computer. …show more content…
Not only user name and passwords can be stored by websites, but data such as credit card numbers, name, income, age and other information used together could give someone access to your entire livelihood. Even if one individual website only stores one piece of information, the combination of all the cookies stored on your computer could give a hacker the ability to connect the pieces and steal your identity. To open a new line of credit someone may only need to know your name, address, driver’s license number and social security number. If an individual went uses their first and last name as user name on most websites and saves them so they don’t have to enter them every time they re-visit each site, they order fast food from the same place every week and have their address saved for the delivery of their favorite pizza, they updated their driver’s license number on their car insurance website recently and verified their SSN on their personal banking website because they lost access and need to request their user name and password; a hacker now has all the information they need to steal that person’s identity stored all on that individual’s computer. That is why there are privacy laws that set out to guard this information. The bulk of the rules regulating the protection of personal privacy by federal agencies come from two laws, the Privacy Act of 1974 and the privacy provisions of …show more content…
Cookies can add positive attributes to online access, but only if the proper security and awareness is used in storing information in this way. Somethings to help to protect your PII when using cookies are as follows:
• Use a secure access to the internet, via WEP or WPA or VPN connections
• Never share your User Names and Passwords with others, use phases vs a single word or name as the base for your user name with varying additional characters added that differ for each website, vary your passwords and keep all information saved in a secure manner.
• Refrain from saving usernames and passwords for return use
• Only enter PII on a website if it is needed. Do not give information just because the website requests

Related Documents

  • Improved Essays

    The 21st century is often referred to as the era of information. This is due to the radical amount of social networking that takes place on a day to day basis. This includes everything from Facebooking your close friends to googling answers for that last minute history assignment. Information is constantly being streamed onto the internet and it only takes a matter of seconds to go viral. The question is then raised, are privacy rights being violated and if so who is to blame?…

    • 974 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    This includes shredding all paperwork that contains unnecessary confidential health information, checking the fax number before sending confidential information by fax, using closed door and privacy curtains when discussing health information with a client, and keeping medical records attended to at all times. Confidential health information that you see or hear yourself must be kept to yourself and look only at that medical information you need to do your particular job. If employees come to the healthcare facility for care, their information needs to be as protected as anyone else’s medical records. Security safeguards need to be in place at all times. Some ways to do this include the following: *…

    • 1016 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Loo1 Unit 2 Research Paper

    • 1344 Words
    • 6 Pages

    Blackboard Name: Sanya Murgai PSID: 1264832 LO1: Discuss information privacy and methods for improving the privacy of information. LO2: Explain the effects on information privacy of e-mail, data collection, and censorship. In today’s day and age, privacies definition can be manipulated to personal preferences. Once we put something on the internet, it will be accessible forever even if we delete it.…

    • 1344 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    1. Shred your documents. Don’t toss bank statements and credit card receipts in the trash. Dispose of them using a cross-cut shredder or shredding service. 2.…

    • 264 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Cookie Research Paper

    • 448 Words
    • 2 Pages

    In your hand, you hold a cookie. You are really excited about this cookie. The perfect amount of softness and warmth and cookie-to-chip ratio. You never imagined you would have a cookie so fantastic -- so fantastic, in fact, that you don't want to eat it yet. So you're walking around with the cookie.…

    • 448 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    As consumers, we trust corporations with private information like phone numbers, home addresses, SSID numbers, and in some cases interests or search history. Facebook and Google, which are tech giants, sells out your history to companies like Target to advertise merchandise on the internet that is personally tailored to you. Target and other well known stores have been hacked for customer information. A few easy rules to follow to prevent getting hacked are not shopping online and pay with cash as much as possible. According to Lee Rainie, an expert in research in internet, science and technology if one cannot, they are among “91% of Americans who say they do not have control of their personal information online”(Rainie 7).…

    • 1159 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    There were many negative and positive effects that came from 9/11. Some of these effects only lasted for a short period of time to help protect and defend the American public. However, there were also many effects that have lasted for a long time. One of those effects is how the attacks have changed America's surveillance on their citizens. The Foreign Intelligence Surveillance Act (FISA), which was put into place in 1978 and allows the government to tap into citizen's electronics and monitor them for foreign intelligence information, has changed drastically since the events of 9/11.…

    • 859 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Lobbying Exercise

    • 1168 Words
    • 5 Pages

    During Brett Gaylors DoNotTrack web series, he poses many suggestions as to what we can do in order to protect our privacy online. He explains that we all have been taken advantage of in that we are signing contracts, which allow websites to use our identity and do whatever they essentially want with it. He explains that although we are being taken advantage of, there are advantages such as security. There is no such thing as privacy without having security and that we have many opportunities to protect our identity online to a certain extent. One, being to watch what websites you’re visiting.…

    • 1168 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Most of us probably believe we have absolute freedom when it comes to what we view on the internet. However, Barbara van Schewick points out in her article ‘Network Neutrality Nuances’, that we only have access to bits and pieces of the internet (Schewick, 2009). What we are able to view is all decided upon by our ISP. Schewick states that ISPs select what we view in order to maximize profits, to ban content which they consider to be inappropriate, or to keep track of all signals on their network (Schewick, 2009). She does an excellent job of explaining why this is wrong by bringing forth real world examples, using thought-provoking literary devices, as well as by connecting with the reader (Schewick, 2009).…

    • 782 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Right to Privacy In the world today privacy is a big problem people are having to deal with. The government has abused their power and in some cases, broken the law. Not just once, but a number of times and has lied about it and tried to sweep it under the rug as if no one was around. Government and politics are two wild animals who are related.…

    • 1450 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Hazardous Cookies When you go on to a site did you ever wonder if you were being watched. Even on your own personal device. Well with cookies you are. These cookies aren't the ones you eat they are “used to track users internet surfing, record their online purchases, and greet them by name when they visit a Website” says Patrick Cunningham the author of the article “Are Cookies Hazardous to Your Privacy?” He also tells us that “a cookie is a piece of information passed between an internet server and a user’s web browser.”…

    • 455 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Cookie Inaccuracies

    • 350 Words
    • 2 Pages

    Some issues different people used same computer, Brower and user account will unavoidably share cookies. Cross-site cooking: Which help the attacker to set the cookie for a browser into the cookie domain of another site servers and attack the site itself.…

    • 350 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    This saves you from having to re-enter your data every time you visit. Cookies capture information that you don’t particularly know that’s being collected. This has its advantages and disadvantages. A cookie is a small text file saved on a customer's computer.…

    • 300 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Cookie Proliferation

    • 298 Words
    • 2 Pages

    Well it’s quite easy actually. Here are just a few threats that put our internet privacy at risk: Cookie proliferation: The invisible cookie software agents that track your browsing habits and personal data are likely to multiply in 2013. Advertising networks, marketers, and other data profiteers depend on cookies to learn more about who you are—and what you may be interested in buying. Unless legislation imposes legal restraints…

    • 298 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays