Categories: Resources

Limiting Location Data Exposure: 8 Best Practices

Limiting Location Data Exposure: 8 Best Practices

Limiting location data exposure can be a huge challenge in a generation that relies heavily on apps and mobile devices with built-in location trackers.

If you’re like me who grew up consuming spy movies, you would have already been familiar with the notion of geolocation trackers in all sorts of digital devices (which both heroes and villains can use to their advantage). On the flip side, you would also have gotten hold of some tips on limiting location data exposure whenever this need arises for our hero.

Action stunts aside, it’s true that the moment you acquire any type of mobile device, you already set yourself up for location exposure. Yes, including that fitness tracker you bought to complement your New Year’s resolution. By design default, all mobile devices share and store device geolocation.

For mobile devices to work, they inherently require cellular networks and providers, and these cellular providers receive real-time location information for a mobile device each time it connects to a network.

This important chunk of information was recently released by the National Security Agency in its Limiting Location Data Exposure Cybersecurity Information Sheet, to guide mobile device users from National Security System (NSS) and Department of Defense (DoD) on how they could reduce risk associated with sharing sensitive data. While this guide is geared more toward those working on high risk missions involving covert operations, ordinary civilians like you and I can still pick up best practices from this guide.

Also Read: How PII Data Works In Businesses and Its Advantages

Before getting there though, here’s a rundown on some other hard truths we need to digest about locations, trackers, and whatnot:

  • Your mobile device provides geolocation data as a service to apps. Also known as location services, this is how your favourite delivery app knows where to deliver your milk tea and your grilled chicken.
  • Think you’re safe when you turn off your cellular service? Think again. Even Wi-Fi and BT can be used to know a user’s location.
  • The risk of getting tracked isn’t limited to mobile devices. Anything that sends and receives wireless signals has location risks pretty much similar to mobile devices. Trust me, you won’t look at a smart refrigerator the same way again.
  • Your apps and social media may collect, aggregate, and transmit information that exposes your location. How else could that Facebook ad on a nearby salon show up on your feed then, reminding you of how badly you need a haircut?
Even if you’re no James Bond, you should still know how to work on limiting location data exposure to your advantage

8 Best Practices on Limiting Location Data Exposure

At Privacy Ninja, we always advocate for best practices on keeping your personal data safe and your cyber security healthy and in check. Hence, we’re also excited to share with you these practices on limiting location data exposure, even if you’re not dealing with any secret mission.

Whenever applicable and depending on your level of comfort and risk, here are 8 actions you can take with regard to location sensitivities as outlined by the NSA:

  1. Not ordering or swiping at the moment? Disable location services settings on the device.
  2. If not needed, disable radios when they are not actively in use.
  3. Apps should be given as few permissions as possible.
  4. Disable advertising permissions to the greatest extent possible.
  5. Turn off settings that allow a lost, stolen, or misplaced device to be tracked.
  6. Hold that convenient Google search! Minimise web-browsing on the device as much as possible, and set browser privacy/permission location settings to not allow location data storage.
  7. Use an anonymising VPN to help obscure location.
  8. No matter how convenient, minimise the amount of data with location information that is stored in the cloud, if possible.

Also Read: CCTV Law Singapore Edition: Know Your Rights and Responsibilities

Let’s admit it, mobile devices are as very much a part of our lives as our churned out data and identities. While we cannot put the brakes on this digital progress, we can limit its access to our personal lives, beginning with limiting location data exposure.

Privacy Ninja

Recent Posts

Enhancing Website Security: The Importance of Efficient Access Controls

Importance of Efficient Access Controls that every Organisation in Singapore should take note of. Enhancing…

3 weeks ago

Prioritizing Security Measures When Launching Webpage

Prioritizing Security Measures When Launching a Webpage That Every Organisation in Singapore should take note…

3 weeks ago

The Importance of Regularly Changing Passwords for Enhanced Online Security

Importance of Regularly Changing Passwords for Enhance Online Security that every Organisation in Singapore should…

4 weeks ago

Mitigating Human Errors in Organizations: A Comprehensive Approach to Data Protection and Operational Integrity

Comprehensive Approach to Data Protection and Operational Integrity that every Organsiation in Singapore should know…

4 weeks ago

The Importance of Pre-Launch Testing in IT Systems Implementation

Here's the importance of Pre-Launch Testing in IT Systems Implementation for Organisations in Singapore. The…

1 month ago

Understanding Liability in IT Vendor Relationships

Understanding Liability in IT Vendor Relationships that every Organisation in Singapore should look at. Understanding…

1 month ago