Beyond Mere Clicks, Numbers or Letters: Analyzing the True Value of Personal Data in the Fight Towards Digital Safety

Pollicy
5 min readFeb 13, 2024

If a multibillion-dollar company regards our names, emails, addresses, cookie preferences, etc., as valuable as oil, why do we reduce such data to mere crumbs that we readily give away?

It is indisputable that our world has transformed into a closely interconnected global village. We can now for example report on events in the Western world with a level of certainty comparable to reporting on our immediate surroundings. This newfound understanding has only been made possible through the unimpeded flow of information and data across diverse digital platforms.

While there has been economic celebration surrounding the notion that “data is the new oil”, it is equally important to reflect on the potential dangers that have come with it. This observation is specifically crucial considering the historical dynamics of power between the Global North and Global South. In essence, those who enjoy easy access to this “oil” wield significant influence over our lives because they can curate the content that appears on our screens and manipulate our information according to their preferences. The analogy underscores the pivotal role data plays in shaping the power structures that impact us on a global scale.

Having been part of the second cohort of the Digital Ambassadors Program has exposed me to a new reality: power has undergone significant disintegration with the advent of technology. Though still distributed unevenly among different players in the digital industry, the free flow of data has effectively broken down power, distributing it into the hands of dangerous and self-seeking entities.

For instance, it has empowered online bullies who derive pleasure from toxic tendencies. The unrestricted flow and access to data have also granted malicious governments the power to influence citizens’ choices. Specially curated data, being a form of influence, has contributed to various distorted perceptions, impacting many young girls who now feel pressured to conform to certain beauty standards.

Data has evolved into a means through which we exercise other rights, such as freedom of expression. Now the risk lies in the fact that if someone can attach identity to a social media post that they perhaps don’t like, they might as well track you down and subject you to bullying for it.

Data is more than just words or numbers; it is now synonymous with power and control.

More disheartening than the reality that whoever possesses our data now wields control over our lives is the profound negligence of the consequence of our cavalier attitude toward information sharing. Allowing cookie settings, granting permissions when visiting websites, clicking on links, or heedlessly accepting terms and conditions in apps or on websites, places an immense amount of our data at stake and the layman doesn’t always understand this. They simply want to sign into the app or website and use the product; they just can’t be bothered by a cumbersome page of privacy settings. It is absurd!

A persistent question arises: “What can be done?” The type of information imparted in a digital rights, safety, and literacy class is truly eye-opening, as it exposes the stark reality of how limited people’s knowledge is on even their digital rights and underscores the considerable work that needs to be done to raise awareness.

One of the motivations behind my decision to join this program stems from a personal experience of being hacked. The most prevalent misconception among us is, “I am not a significant individual in my community. Why would anyone want to target or hack me?”

And perhaps this is where we can begin — by altering the narrative surrounding how individuals perceive their data. Recently, Deutsche Telekom released a documentary on YouTube. In this documentary, images of a young girl named Ella were compiled by AI to create an older version of her, delivering a cautionary message to her parents about the dangers of thoughtlessly sharing her information and pictures in her earlier years. Her data transformed beyond mere pictures and

social media posts, as someone had effortlessly assembled her entire life and projected a version of her 10 years into the future.

The profound insight from that video, especially crucial for young people, is that your name transcends mere letters, and your pictures extend beyond social media posts. Clicking to accept some random policies isn’t just a click. This data holds the potential for identity theft, as someone could effortlessly manipulate it to create AI versions of you or mimic your voice for pranks, theft, or even falsely placing you at a crime scene you’ve never been to.

If a multibillion-dollar company regards your name, email, address, cookie preferences, etc., as valuable as oil, why do you reduce it to mere crumbs that you readily give away? Our focus in promoting awareness should revolve around this understanding — that in the Information Age, Personal Data serves as currency and is actively traded, amounting to billions of dollars globally without our consent. At the very least, individuals should be compensated monetarily for every piece of information collected from them.

Beyond merely cautioning individuals about the risk of being hacked, we must foster an intrinsic appreciation for the value their data holds. Perhaps then, people will conscientiously implement safety measures and unite against online violence and data breaches, the same way we collectively fight for other human rights.

At all costs, human rights are intended to broaden, not diminish. This serves as a compelling call to action, urging us to assist as many people as possible in comprehending not only the risks associated with technological advancement but also the centrality and significance of these rights, making them potential targets. The fundamental reason we ardently fight to safeguard the right to life is rooted in our inherent understanding of the immense value of our lives. Similarly, we should approach data with the same level of regard and importance.

Birungi Primah Elizabeth

This blog is authored by Birungi Primah Elizabeth, the 1st place winner of the Digital Ambassador Program ‘Kalamu za Kidigitali’ Blog Competition, and edited by our dedicated team at Pollicy.Pollicy established the Digital Ambassador Program (DAP) to empower youth with digital resilience skills on safety and security especially women in higher learning institutions.The Digital Ambassador Program is proud to collaborate with The LaunchPad Tanzania, Tanzania AI Lab & Community, Uganda Institute of Information and Communications Technology, Centre for Technology Disputes Resolution, Internet Society Uganda Chapter, and Civil Rights Defenders

--

--