{"id":1905,"date":"2010-06-21T15:22:27","date_gmt":"2010-06-21T15:22:27","guid":{"rendered":"http:\/\/www.markwilson.co.uk\/blog\/?p=1905"},"modified":"2010-09-21T16:51:26","modified_gmt":"2010-09-21T16:51:26","slug":"how-to-be-an-internet-private-eye","status":"publish","type":"post","link":"https:\/\/www.markwilson.co.uk\/blog\/2010\/06\/how-to-be-an-internet-private-eye.htm","title":{"rendered":"How to be an Internet private eye"},"content":{"rendered":"<p><em>This post makes me slightly uneasy&#8230; most of the information is taken from a presentation I saw recently &#8211; so I would like to give credit to the original presenter, except that he specifically asked me not to.\u00c2\u00a0 The reason for this is that he&#8217;s not a lawyer, and he was worried that perhaps some of this advice may not be legal in certain jurisdictions.\u00c2\u00a0 I&#8217;m not a lawyer either, so I&#8217;ll make a statement up front: I think the activities suggested in this post are legal in the UK (where I live), but I&#8217;m not qualified to give advice on this.\u00c2\u00a0 Before carrying out any of the actions in this post, it may be advisable to check the legal situation in the country where you live (and\/or where the websites you are checking out are hosted).\u00c2\u00a0 I can not be held responsible for any actions taken by others based on the advice I have published here and my sole purpose in publishing this information is to share what may be useful to others when trying to protect their personal or professional identity online&#8230; in short, I am aiming to do the right thing here&#8230;<\/em><\/p>\n<p>Your identity (whether it&#8217;s personal, or a corporate brand) is precious.\u00c2\u00a0 Sometimes, unscrupulous individuals, or those who may have a grudge against you, may impersonate you or your brand online.\u00c2\u00a0 When that happens, it can be useful to know a little more about who is using your identity as you attempt to reclaim it. Hopefully some of these suggestions will be useful in tracking down who is using your identity, whether it&#8217;s to send unsolicited e-mails, to (mis-) use your brand or trademark online, or just to get some idea of your own online footprint.<\/p>\n<p>It can be quite interesting to understand your Internet footprint &#8211; and automated tools such as <a href=\"http:\/\/www.rapleaf.com\/\">RapLeaf<\/a> can be used to see the social profile for given e-mail address(es) on a number of popular sites across the web.\u00c2\u00a0 Companies can find out about their customers, but individuals can check their details too &#8211; I was surprised to find when I logged in that it had already identified me on Flickr and WordPress previously (suggesting that\u00c2\u00a0one of RapLeaf&#8217;s\u00c2\u00a0customer had already run a search on me)&#8230; it&#8217;s far from complete but may provide a few more clues about who someone is (or highlight to you the information that you publish online).\u00c2\u00a0Even more of an eye-opener was <a href=\"http:\/\/gist.com\/\">Gist<\/a>\u00c2\u00a0which, once supplied with my public Facebook and Twitter accounts, found a huge amount of information about me from a variety of online sources and most of it was accurate (it had linked me to my employer&#8217;s sister company &#8211; probably because that was the information it gained on me from one of my contacts).<\/p>\n<p>The next tool that may be useful <a href=\"http:\/\/www.opensiteexplorer.org\/\">Open Site Explorer<\/a>.\u00c2\u00a0 This link popularity checker and backlink analysis tool can be used to understand where links to a given URL originate from, including the URL&#8217;s page authority, domain authority, linking domains and total links. So, if you find an anonymous blog, it will show where links to that blog &#8211; which may provide a clue as to whose site it is (i.e. an anonymous blogger may also have other online personas).<\/p>\n<p>If you want to find something on the &#8216;net, Google is your friend: by\u00c2\u00a0searching for snippets of text, comments, etc. it&#8217;s possible to identify the original source of an item.\u00c2\u00a0 And Google&#8217;s cache is a goldmine &#8211; even after a website has been taken offline, its contents may well still exist in the Google cache!<\/p>\n<p>Sites like <a href=\"http:\/\/knowem.com\/\">Knowem<\/a>\u00c2\u00a0can be used to see who is using a particular name (or trademark) on a variety of sites across the Web &#8211; that can be useful if you want to protect your brand.<\/p>\n<p><a href=\"http:\/\/www.iptools.com\/\">IP tools<\/a> can provide all sorts of information for would-be\u00c2\u00a0Internet sleuths. Many are just standard Unix tools, exposed via a website and not everything can be relied on (for example my IP address belongs to my ISP, who are several hundred miles away, but they know who I am if I&#8217;ve been up to no good). <a href=\"http:\/\/whois.domaintools.com\/\">Domain tools<\/a> information can provide a detailed site profile as well as whois information including reverse IP lookups to understand who else shares my server (noting that they may or may not be affiliated in some way).\u00c2\u00a0 You can also find out which sites share a given IP address using a decision engine such as Bing.\u00c2\u00a0 Try searching for <code>ip:<em>ipaddress<\/em><\/code> to see all of the sites at a given address.<\/p>\n<p>E-mail headers can be useful to find out where an e-mail originated (or which servers it passed through).\u00c2\u00a0 <a href=\"http:\/\/www.slipstick.com\/mail1\/viewheaders.htm\">In Microsoft Outlook, view the message headers<\/a> or, in Google Mail, select Show Original.\u00c2\u00a0 The resulting information (IP addresses, etc.) can be fed into some of the IP tools (e.g. <code>traceroute<\/code> or <code>whois<\/code>) to find out more about the message &#8211; e.g. to track down a spammer (and block them!).<\/p>\n<p>Of course, if you wanted to find out who someone was, you could send them an e-mail and try and trap them using the same techniques that the phishers use&#8230; that wouldn&#8217;t be a good idea &#8211; it&#8217;s almost certainly illegal, and I&#8217;m not condoning it &#8211; indeed, the only reason I mention it here is to say &#8220;don&#8217;t do it&#8221;.<\/p>\n<p>One more\u00c2\u00a0clue as to who is watching you online (unfortunately not free, but potentially useful when tracking down an impersonator) is a dashboard called Trovus, which can be used to build a profile of who accesses your website and from where.<\/p>\n<p>If you discover that your identity is being used inappropriately, the first thing to do is to contact the relevant service providers (perhaps a hosting company for a website or mail server, or maybe a public website) and, even though you may not see a response, they may be taking action that&#8217;s not visible to you (e.g. offline, via another medium, or using lawyers) &#8211; hopefully you&#8217;ll at least get a response to say &#8220;thanks, we&#8217;ll be in touch&#8221;.\u00c2\u00a0 Whilst the actions in this post may not provide all the answers on who is impersonating you, they are at least the first steps to allow you to contact the appropriate organisations for further assistance.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This post makes me slightly uneasy&#8230; most of the information is taken from a presentation I saw recently &#8211; so I would like to give credit to the original presenter, except that he specifically asked me not to.\u00c2\u00a0 The reason for this is that he&#8217;s not a lawyer, and he was worried that perhaps some &hellip; <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2010\/06\/how-to-be-an-internet-private-eye.htm\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">How to be an Internet private eye<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[],"tags":[5],"class_list":["post-1905","post","type-post","status-publish","format-standard","hentry","tag-internet"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to be an Internet private eye - markwilson.it<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.markwilson.co.uk\/blog\/2010\/06\/how-to-be-an-internet-private-eye.htm\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to be an Internet private eye - markwilson.it\" \/>\n<meta property=\"og:description\" content=\"This post makes me slightly uneasy&#8230; most of the information is taken from a presentation I saw recently &#8211; so I would like to give credit to the original presenter, except that he specifically asked me not to.\u00c2\u00a0 The reason for this is that he&#8217;s not a lawyer, and he was worried that perhaps some &hellip; Continue reading How to be an Internet private eye\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.markwilson.co.uk\/blog\/2010\/06\/how-to-be-an-internet-private-eye.htm\" \/>\n<meta property=\"og:site_name\" content=\"markwilson.it\" \/>\n<meta property=\"article:published_time\" content=\"2010-06-21T15:22:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2010-09-21T16:51:26+00:00\" \/>\n<meta name=\"author\" content=\"Mark Wilson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:site\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mark Wilson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2010\\\/06\\\/how-to-be-an-internet-private-eye.htm#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2010\\\/06\\\/how-to-be-an-internet-private-eye.htm\"},\"author\":{\"name\":\"Mark Wilson\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"headline\":\"How to be an Internet private eye\",\"datePublished\":\"2010-06-21T15:22:27+00:00\",\"dateModified\":\"2010-09-21T16:51:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2010\\\/06\\\/how-to-be-an-internet-private-eye.htm\"},\"wordCount\":1077,\"commentCount\":3,\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"keywords\":[\"Internet\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2010\\\/06\\\/how-to-be-an-internet-private-eye.htm#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2010\\\/06\\\/how-to-be-an-internet-private-eye.htm\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2010\\\/06\\\/how-to-be-an-internet-private-eye.htm\",\"name\":\"How to be an Internet private eye - markwilson.it\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\"},\"datePublished\":\"2010-06-21T15:22:27+00:00\",\"dateModified\":\"2010-09-21T16:51:26+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2010\\\/06\\\/how-to-be-an-internet-private-eye.htm#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2010\\\/06\\\/how-to-be-an-internet-private-eye.htm\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2010\\\/06\\\/how-to-be-an-internet-private-eye.htm#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to be an Internet private eye\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/\",\"name\":\"markwilson.it\",\"description\":\"get-info -class technology | write-output &gt; \\\/dev\\\/web\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\",\"name\":\"Mark Wilson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"width\":800,\"height\":800,\"caption\":\"Mark Wilson\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\"},\"description\":\"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.\",\"sameAs\":[\"http:\\\/\\\/www.markwilson.co.uk\\\/\",\"https:\\\/\\\/www.instagram.com\\\/markwilsonuk\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/markawilson\\\/\",\"https:\\\/\\\/x.com\\\/markwilsonit\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCWHlZCoHRTocdvtrOJ2IL4A\"],\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/author\\\/mark-wilson\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to be an Internet private eye - markwilson.it","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.markwilson.co.uk\/blog\/2010\/06\/how-to-be-an-internet-private-eye.htm","og_locale":"en_GB","og_type":"article","og_title":"How to be an Internet private eye - markwilson.it","og_description":"This post makes me slightly uneasy&#8230; most of the information is taken from a presentation I saw recently &#8211; so I would like to give credit to the original presenter, except that he specifically asked me not to.\u00c2\u00a0 The reason for this is that he&#8217;s not a lawyer, and he was worried that perhaps some &hellip; Continue reading How to be an Internet private eye","og_url":"https:\/\/www.markwilson.co.uk\/blog\/2010\/06\/how-to-be-an-internet-private-eye.htm","og_site_name":"markwilson.it","article_published_time":"2010-06-21T15:22:27+00:00","article_modified_time":"2010-09-21T16:51:26+00:00","author":"Mark Wilson","twitter_card":"summary_large_image","twitter_creator":"@markwilsonit","twitter_site":"@markwilsonit","twitter_misc":{"Written by":"Mark Wilson","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.markwilson.co.uk\/blog\/2010\/06\/how-to-be-an-internet-private-eye.htm#article","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2010\/06\/how-to-be-an-internet-private-eye.htm"},"author":{"name":"Mark Wilson","@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"headline":"How to be an Internet private eye","datePublished":"2010-06-21T15:22:27+00:00","dateModified":"2010-09-21T16:51:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2010\/06\/how-to-be-an-internet-private-eye.htm"},"wordCount":1077,"commentCount":3,"publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"keywords":["Internet"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.markwilson.co.uk\/blog\/2010\/06\/how-to-be-an-internet-private-eye.htm#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.markwilson.co.uk\/blog\/2010\/06\/how-to-be-an-internet-private-eye.htm","url":"https:\/\/www.markwilson.co.uk\/blog\/2010\/06\/how-to-be-an-internet-private-eye.htm","name":"How to be an Internet private eye - markwilson.it","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#website"},"datePublished":"2010-06-21T15:22:27+00:00","dateModified":"2010-09-21T16:51:26+00:00","breadcrumb":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2010\/06\/how-to-be-an-internet-private-eye.htm#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.markwilson.co.uk\/blog\/2010\/06\/how-to-be-an-internet-private-eye.htm"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.markwilson.co.uk\/blog\/2010\/06\/how-to-be-an-internet-private-eye.htm#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.markwilson.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"How to be an Internet private eye"}]},{"@type":"WebSite","@id":"https:\/\/www.markwilson.co.uk\/blog\/#website","url":"https:\/\/www.markwilson.co.uk\/blog\/","name":"markwilson.it","description":"get-info -class technology | write-output &gt; \/dev\/web","publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.markwilson.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":["Person","Organization"],"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468","name":"Mark Wilson","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","url":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","width":800,"height":800,"caption":"Mark Wilson"},"logo":{"@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1"},"description":"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.","sameAs":["http:\/\/www.markwilson.co.uk\/","https:\/\/www.instagram.com\/markwilsonuk\/","https:\/\/www.linkedin.com\/in\/markawilson\/","https:\/\/x.com\/markwilsonit","https:\/\/www.youtube.com\/channel\/UCWHlZCoHRTocdvtrOJ2IL4A"],"url":"https:\/\/www.markwilson.co.uk\/blog\/author\/mark-wilson"}]}},"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":1056,"url":"https:\/\/www.markwilson.co.uk\/blog\/2008\/04\/accessing-unsecured-wi-fi-is-it-a-crime.htm","url_meta":{"origin":1905,"position":0},"title":"Accessing unsecured Wi-Fi &#8211; is it a crime?","author":"Mark Wilson","date":"Monday 21 April 2008","format":false,"excerpt":"Whilst I was researching my earlier post about WiMax in Milton Keynes, I came across an article on The Register about a couple of guys who got themselves arrested for accessing someone's open Wi-Fi connection. The comments make interesting reading - I recommend a read but will warn you that\u2026","rel":"","context":"In \"IT law\"","block_context":{"text":"IT law","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/it-law"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":7498,"url":"https:\/\/www.markwilson.co.uk\/blog\/2018\/06\/markwilson-it-gdpr-and-no-more-ads.htm","url_meta":{"origin":1905,"position":1},"title":"markwilson.it, GDPR and no more ads","author":"Mark Wilson","date":"Tuesday 12 June 2018","format":false,"excerpt":"You probably noticed that a new European regulation came into effect last month: the General Data Protection Regulation (GDPR). I'd been inclined to follow the advice of Matt Ballantine (@Ballantine70), who expressed a view (I think on the WB-40 podcast) that, if you were compliant with existing data protection regulation,\u2026","rel":"","context":"In &quot;Site notices&quot;","block_context":{"text":"Site notices","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/site-notices"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":3947,"url":"https:\/\/www.markwilson.co.uk\/blog\/2012\/05\/half-baked-cookies.htm","url_meta":{"origin":1905,"position":2},"title":"Half-baked cookies&#8230;","author":"Mark Wilson","date":"Monday 14 May 2012","format":false,"excerpt":"I don't know if this website uses cookies. I think it probably does beacuse I have Google Adsense code and Google Analytics code in place. It wouldn't surprise me if WordPress uses some cookies too but, like many bloggers, I use off-the-shelf software and, as long as it works, I\u2026","rel":"","context":"In &quot;Site notices&quot;","block_context":{"text":"Site notices","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/site-notices"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/images\/markwilson-it-cookie-opt-in.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":3543,"url":"https:\/\/www.markwilson.co.uk\/blog\/2011\/07\/it-and-the-law-is-misalignment-an-inevitable-consequence-of-progress.htm","url_meta":{"origin":1905,"position":3},"title":"IT and the law \u2013 is misalignment an inevitable consequence of progress?","author":"Mark Wilson","date":"Tuesday 26 July 2011","format":false,"excerpt":"Yesterday evening, I had the pleasure of presenting on behalf of the Office of the CTO to the\u00a0Society for Computers and Law (SCL)'s Junior Lawyers Group. It was a slightly unsual presentation in that David [Smith] often speaks to CIOs and business leaders, or to aspiring young people who will\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/technology"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1621,"url":"https:\/\/www.markwilson.co.uk\/blog\/2010\/02\/safer-internet-day-educating-parents-on-internet-safety-for-their-children.htm","url_meta":{"origin":1905,"position":4},"title":"Safer Internet Day: Educating parents on Internet safety for their children","author":"Mark Wilson","date":"Tuesday 9 February 2010","format":false,"excerpt":"A few weeks ago, I mentioned that today is European Safer Internet Day and, here in the UK a number of organisations are working with the Child Exploitation and Online Protection centre (CEOP) to educate parents and children in safe use of the Internet.\u00a0 I don't work for Microsoft but,\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/technology"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1533,"url":"https:\/\/www.markwilson.co.uk\/blog\/2009\/09\/how-much-is-your-personal-information-worth.htm","url_meta":{"origin":1905,"position":5},"title":"How much is your personal information worth?","author":"Mark Wilson","date":"Tuesday 22 September 2009","format":false,"excerpt":"We've all heard the horror stories about personal information, such as credit card details, falling into the wrong hands and, thankfully, in many cases the banking system limits the damage but it's a growing problem. Now Symantec have issued the results of some research which shows that this information may\u2026","rel":"","context":"In \"Security\"","block_context":{"text":"Security","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/security"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1905","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=1905"}],"version-history":[{"count":3,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1905\/revisions"}],"predecessor-version":[{"id":2060,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1905\/revisions\/2060"}],"wp:attachment":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=1905"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=1905"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=1905"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}