<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.zwirentitle.com/blogs/tag/privacy/feed" rel="self" type="application/rss+xml"/><title>Zwiren Title Agency, Inc - ZTA Blog #Privacy</title><description>Zwiren Title Agency, Inc - ZTA Blog #Privacy</description><link>https://www.zwirentitle.com/blogs/tag/privacy</link><lastBuildDate>Fri, 03 Apr 2026 06:05:00 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Unlocking the Power of QR Codes]]></title><link>https://www.zwirentitle.com/blogs/post/Unlocking-the-Power-of-QR-Codes</link><description><![CDATA[QR Codes, short for "Quick Response code", have become ubiquitous in our digital age, facilitating a wide range of applications from marketing to contactless payments. A QR code is a two-dimensional matrix barcode in a visually scannable format...]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_SdX__yuSTUyJWTwNXBxbXw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_WcqX3vwvR4iEwR6LvEpH-A" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_D30ewmUqQ_6_x3121CL9UA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_D30ewmUqQ_6_x3121CL9UA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_mhCFyBHvScammPdVK7hvfw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_mhCFyBHvScammPdVK7hvfw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;"><b><span style="font-size:30pt;">Unlocking the Power of QR Codes:</span></b></span><br><span style="font-size:30pt;color:inherit;">​</span><b><span style="font-size:20pt;">A Comprehensive Guide</span></b><br></h2></div>
<div data-element-id="elm_7ybm0empQvaij_ublEU-gQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_7ybm0empQvaij_ublEU-gQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;">QR Codes, short for &quot;Quick Response code&quot;, have become ubiquitous in our digital age, facilitating a wide range of applications from marketing to contactless payments. A QR code is a two-dimensional matrix barcode in a visually scannable format. Standard barcodes can only be read in one direction (top to bottom) which means they can only store a small amount of information. Alternatively, QR Codes are read in two directions, top to bottom and left to right, and can be scanned in any direction. This makes them to be easier to capture and allows these codes to store significantly more data than a standard barcode. Additionally, QR codes have an error correction function that makes the code readable even if parts of the code are stained or damaged. QR codes can store a website URL, phone number, digital business card, shipping label, or up to 4,000 characters of text.</p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);"><br></span></p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);">History of QR Codes</span><br></p><p style="text-align:justify;">QR codes were first developed in Japan in 1994 by a company called Denso Wave, a subsidiary of the Toyota Group, as a means of tracking vehicle parts during the manufacturing process. The company declared they would not exercise patent rights, making their QR code technology available to the public. While they were slow to gain popularity, the first mobile devices with QR code readers were created in 2002.As smartphones gained popularity, QR codes became more common. In 2020, Denso Wave continued to improve their original design, adding traceability, brand protection and anti-forgery technology into QR codes.</p><p style="text-align:justify;">&nbsp;</p><p style="text-align:justify;">Today, their use has expanded far beyond automotive manufacturing, with applications across various industries. Marketers started using QR codes in ad campaigns to direct consumers to product information or special offers by putting the codes on posters inside or outside of stores, billboards, and even in commercials. During the COVID-19 pandemic, many restaurants replaced hard copies of printed menus with QR codes to comply with CDC guidance and create a “touchless” environment. Interestingly, there is even a company based in the UK, called QR Memories, that creates QR codes for use on gravestones, allowing people to scan the code to read more about that deceased person’s life (typically linking to an obituary or news story relating to them online).</p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);"><br></span></p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);">How QR Codes Work</span></p><p style="text-align:justify;">QR codes function as a bridge between the physical and digital worlds. They can store a variety of data, such as text, URLs, contact information, or even Wi-Fi network credentials. The patterns within QR codes represent binary codes that can be interpreted to reveal the codes data. A QR code reader can identify a standard QR code based on the three large squares within the code. Once it has identified these shapes, it knows that everything contained inside the square is a QR code. To analyze the code, the scanner breaks the code down into a grid looking at the individual grid squares. Each square in the grid is assigned one a value based on whether it is black or white. It then groups the grid squares to create larger patterns.</p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);"><br></span></p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);">Are QR Codes Safe?</span></p><p style="text-align:justify;">While many people are aware that QR codes can open a website, they can be less aware of the other actions that QR codes are capable of initiating on a user’s device. Aside from opening a website, a QR code can be used to execute code. Therefore, it is possible for spammers to program QR codes with URL's that lead to phishing websites used for obtaining unsuspecting user’s personal information or login credentials. It is also possible for cybercriminals to program a QR code with custom malware which could be used to exfiltrate data from a mobile device when scanned, add contacts to your device or even compose emails. A typical “attack” would involve scammers placing malicious QR codes in public places, or even covering up legitimate QR codes. </p><p style="text-align:justify;">&nbsp;</p><p style="text-align:justify;">With all the possible malicious uses of QR codes and the fact that users cannot determine what a QR code will do just by looking at it, do the benefits outweigh the risks? As with most technology these days, it seems there is always a risk. If you know for sure that a QR code is from a trusted source, then it is probably safe to scan. However, if you are out in public and see a random QR code stuck to a pole on the side of the road, with no context, scanning that code may not be the best idea. Alternatively, there are secure QR code scanners that you can download to your smartphone. For example, Kaspersky QR Scanner instantly checks that a scanned link is safe before providing any information to the user and will alert the user of phishing scams and dangerous links. It also creates a log of past scans so, if necessary, users can look back to see where and when they were compromised. </p><p style="text-align:justify;">&nbsp;</p><p style="text-align:justify;">Additionally, users may be concerned about QR Codes collecting personal data however, the only data that QR codes do collect (which is only available to the QR code’s creator) includes location, number of times the code has been scanned, the time of day the code was scanned and the operating system of the device that scanned the code.</p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);"><br></span></p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);">Conclusion</span></p><p style="text-align:justify;">QR codes have evolved from their origin in the automotive industry to become versatile tools used in marketing, retail, healthcare, and more. Understanding how QR codes work and implementing best practices in their use can enhance customer engagement and convenience. As technology continues to advance, QR codes are likely to remain a valuable asset in bridging the physical and digital realms.</p></div>
</div></div><div data-element-id="elm_mzh-oRdEaTyo8Z0pUbSxrg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_mzh-oRdEaTyo8Z0pUbSxrg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-size:8pt;">Kaspersky (n.d.) <i>QR Code Security: What are QR Codes and are they safe to use</i>. Kaspersky. Retrieved from&nbsp;https://usa.kaspersky.com/resource-</span><span style="font-size:8pt;color:inherit;">center/definitions/what-is-a-qr-code-how-to-scan. Accessed 2023.</span></p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 02 Nov 2023 11:26:00 -0400</pubDate></item><item><title><![CDATA[The Internet of Things - Smart Fitness]]></title><link>https://www.zwirentitle.com/blogs/post/The-Internet-of-Things-Smart-Fitness</link><description><![CDATA[Some examples of fitness industry IoT devices include wearable devices, internet-connected cardio machines, and even virtual reality headsets. According to a Statista report, the number of connected wearable devices increased from 326 million in 2016 to 722 million in 2019.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_VLRBZOAySSKZTEl93J-_xg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_B2LAAK9wSf276H45FzEvXA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_JWsw3RGZTSKTz8n5HuBawA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_YBsn1PsGQmWKjHQJFJOI7A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_YBsn1PsGQmWKjHQJFJOI7A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div><p style="font-size:11pt;text-align:left;"><span style="font-size:12pt;color:rgb(0, 0, 0);">The Internet of Things (IoT) is a term encompassing everything connected to the internet, but increasingly defines objects that connect. Essentially, an IoT device is any device with an &quot;on/off switch&quot; that connects to the internet, or to another device that uses the internet. Examples include smart phones, smart light bulbs, kitchen appliances, security cameras, wearable devices, industrial manufacturing robots, cars, navigation systems, GPS trackers, and so much more. A February 2020 report found there are 30 billion connected IoT devices on the planet, which is projected to double over the next five years.</span></p><p style="font-size:11pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">Some examples of fitness industry IoT devices include wearable devices, internet-connected cardio machines, and even virtual reality headsets. According to a Statista report, the number of connected wearable devices increased from 326 million in 2016 to 722 million in 2019.&nbsp; The development and mass production of such devices has changed where and how people get exercise with devices that allow people to get a &quot;gym-like&quot; workout from the comfort of their home and innovative methods that make physical activity fun and engaging.</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:14pt;text-align:left;"><span style="font-weight:bold;color:rgb(0, 0, 0);">Wearable Devices</span></p><p style="font-size:11pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">Modern wearable devices were first introduced in 1965, the Manpo-kei pedometer which translates to &quot;10,000 steps meter&quot; along with research that stated 10,000 steps per day along with the proper caloric intake, was the key to maintain a healthy body. In the 1980s, Polar watches introduced the wireless heart rate monitor.&nbsp; Today, wearable devices can track much more than just an individual's step count and heart rate. Some of the more advanced devices are able to detect body temperature, activity level, speed, calories burned, distance traveled, changes in elevation and sleep patterns. Sensors for collecting data have been added to various wearable objects transforming them into a data-tracking device, such as bracelets, rings, anklets, clip-on devices, and sneakers.</span></p><p style="font-size:11pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">Wearable fitness tracking devices typically connect to a smart phone and share the collected data with its mobile application counterpart. Within the mobile application, the user can create an account where their data is stored and they can set personal goals for themselves. Mobile applications can include a journal of daily activity or charts of their collected data over a period of time, allowing users to identify when they are making progress towards their goals.&nbsp;Some wearable device’s mobile application allows users to share their fitness analytics with others, adding a social component that can be used to compete with friends and family. Data collected on wearable devices can also be shared with other applications such as apps that host virtual races or virtual fitness events and challenges.&nbsp;</span></p><p style="font-size:11pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:14pt;text-align:left;"><span style="font-weight:bold;color:rgb(0, 0, 0);">Smart Cardio Machines</span></p><p style="font-size:11pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">Cardio machines have progressively advanced into internet-connected machines with touch screens, interactive interfaces, and user accounts. By setting up an account on a smart machine, the user's data is collected by the machine's built in sensors and saved to their account. The user can then login to their account on any other machine, of that brand, and their data is always stored to their account. Some cardio machines with built in screens give the user the choice of viewing a scenic route as they workout, giving them the illusion of running or biking through different parts the world.&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">Additionally, many companies have developed subscription based applications that utilize live streaming technology or on-demand streaming, allowing people to participate in a fitness class from the comfort of their home. While a streaming app is not an IoT device, companies have implemented their applications into devices that connect to the internet, including, stationary bikes, treadmills, ellipticals and even rowing machines.</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:14pt;text-align:left;"><span style="font-weight:bold;color:rgb(0, 0, 0);">Virtual&nbsp;Reality Workouts</span></p><p style="font-size:11pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">With the rise of virtual reality (VR) technology, an individual can engage in physical activity with a VR gaming headset, such as the Sony's PlayStation&nbsp;VR or the Oculus Quest. Utilizing the VR headset and controls held in each hand, a person becomes immersed in a computer-generated world that responds to the movement of sensors located in the headset and hand controllers, allowing them to interact with&nbsp;their virtual&nbsp;environment. Some of the games created for VR technology include dancing, boxing, racquetball, and rock climbing, which require the user to dance or move around as if they were actually in the ring, on the court or scaling the side of a mountain.</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">For the many people who enjoy gaming, the VR headset gets them off of the couch and into a simulated world, where they have to physically move around in order to progress through the game. Many of the games require the player to move laterally, jump or squat to avoid an object that is headed toward them, or swing their arms around, using motions comparable to a tennis swing, to engage with an object or another character in the game. While these types of games may not be considered “fitness” by a regular gym-goer, they certainly increase an individual’s&nbsp; physical activity, especially when the alternative for that individual is sitting on the couch and playing a video game.&nbsp;</span></p><p style="font-size:11pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:14pt;text-align:left;"><span style="font-weight:bold;color:rgb(0, 0, 0);">Privacy and Security</span></p><p style="font-size:14pt;text-align:left;"><span style="font-weight:bold;color:rgb(0, 0, 0);"><br></span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">IoT fitness devices have changed the fitness industry, empowering people to track their activity and find alternative ways to get active. However, as with any internet connected device, it is essential to be aware of the IoT device’s security and privacy settings.&nbsp;Wearable fitness tracking devices store basic personal health information.&nbsp;When such information is collected at a doctor’s office or hospital it is protected by the Health Insurance Portability and Accountability Act (HIPAA); however, HIPAA does not extend its protections to health data accumulated by personal fitness tracking devices. While basic health information may not seem like much of a privacy concern, when wearable devices are used for long periods of time, the information collected begins to paint accurate picture of an person’s health, lifestyle, habits, and identity.</span></p><p style="font-size:11pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">Fortunately, companies are building strong security measures into the devices, making the actual device difficult to hack. However, security weaknesses typically occur when user profiles within the device's corresponding mobile applications are not secured with strong unique passwords. Easy-to-guess passwords give hackers the ability to compromise a user's account. Therefore, when creating a password for your health mobile application, it is imperative to make it unique from other account passwords, and utilize a combination of upper and lower case characters, a number, and special character (i.e. !, @, #, &amp;, *, ?, etc.). Additionally, enabling multi-factor authentication, if available, improves account security significantly.</span></p><p style="font-size:11pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">Privacy is a major concern for a many people. While the IoT devices may be secure, and the user’s password may be strong and unique, to ensure the information stored within the account remains private, it is important to read the company’s privacy policy. While the data accumulated from fitness tracking devices alone pose no great risk to an individual’s privacy, when the data is associated with other information, there are greater privacy implications if the data is misused or shared with third parties.</span></p><p style="font-size:11pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">IoT devices in the fitness industry are innovative and offer people new approaches to work out, giving them the freedom to get active outside of a gym. Plus, detailed tracking of various metrics, keep people informed of their progress overtime. The benefits of such devices outweigh the risk of security and privacy, when the user is informed of the privacy policy and settings and&nbsp;actively securing their user accounts.</span></p></div></div>
</div><div data-element-id="elm_ugTYcdCxSb-y7XMPUZCAlw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 19 Jul 2022 16:40:44 -0400</pubDate></item><item><title><![CDATA[The Internet of Things - Smart Homes]]></title><link>https://www.zwirentitle.com/blogs/post/the-internet-of-things-smart-homes</link><description><![CDATA[&nbsp; &nbsp;&nbsp; The Internet of Things (IoT) is a term encompassing everything connected to the internet, but increasingly defines objects that con ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_6c42IEpTRNOKbKSVVmKQ1Q" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_zX_uIBhJQAOWvcns6rOWoA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_QTD8fyLcSv2oiSNcxFgWsQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_1F88KL3HTRq4pmKXwzKZBg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_1F88KL3HTRq4pmKXwzKZBg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="line-height:1.2;"><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="text-align:center;">&nbsp; &nbsp;&nbsp;</span><span style="font-size:12pt;">The Internet of Things (IoT) is a term encompassing everything connected to the internet, but increasingly defines objects that connect with each other. Basically, an IoT device is any device with an on/off switch that is connected to the internet, or to another device using the internet. Examples include cell phones, smart light bulbs, kitchen appliances, security cameras, wearable devices, industrial manufacturing robots, cars, navigation systems, GPS trackers, and so much more. A February 2020 report found that there are 30 billion connected devices on the planet and that number is projected to double over the next five years.</span></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="font-size:12pt;"><br></span></span></p><p></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="text-align:center;">&nbsp; &nbsp;&nbsp;</span><span style="font-size:12pt;">A smart home is defined as a home equipped with lighting, heating, appliances, and other electronic devices that are controlled remotely by phone or computer—basically a home filled with IoT devices.&nbsp;As of 2018, 130 million homes in the U.S. qualified as “smart”. &nbsp;Serving the same functionality of the regular device, smart devices are typically connected to your home’s wireless internet. Many of the devices have corresponding phone applications that allow you to receive mobile alerts and control the devices from your phone. Advancements in technology and artificial intelligence have allowed companies to produce devices that make life more convenient, save you time, and potentially, save you money.</span></span></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(0, 0, 0);"><br></span></p><p style="text-align:left;"><b><span style="font-size:14pt;color:rgb(0, 0, 0);">Smarter Energy Consumption</span></b></p><p style="text-align:left;"><br></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(0, 0, 0);">Smart Homes are designed to make the most out of available energy and are potentially saving homeowners money. Rather than restricting energy consumption, smart homes keep track of your lifestyle, find ways to conserve energy when possible and make the most out of available energy. Many devices will track the percentage of energy being used for each appliance and inform you of your consumption allowing you understand where you are wasting energy and adjust to conserve more energy. Smart thermostats, smart meters, smart power strips, smart lighting, all offer potential savings on your utility and electric bill.</span></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(0, 0, 0);"><br></span></p><blockquote style="margin-left:40px;border:none;"><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><b><span style="font-size:14pt;">Smart Thermostats</span></b><span style="font-size:14pt;">&nbsp;</span><span style="font-size:12pt;">can keep track of which rooms are being occupied and make sure the temperature is sufficient while you are in them and turned off when you aren’t. This prevents the house from unnecessarily heating or cooling itself while you are out. The app on your phone allows you to adjust the temperature settings remotely. Therefore, you can warm up or cool down the house on your way home from work or after being away, so when you arrive home, the house is already the perfect temperature.&nbsp;</span></span></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(0, 0, 0);">&nbsp;Additionally, homes that have solar panels installed, smart homes can be programmed to only use the energy the panels are producing, allowing homeowners to be self-sustaining!</span></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(0, 0, 0);"><br></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><b><span style="font-size:18px;">Smart Power Strips (outlets)</span></b><b><span style="font-size:18px;">:</span></b><span style="font-size:12pt;"> Some devices, such as TVs, laptops, and cable box, continue to consume energy when they are turned off. Smart power strips can detect when a device is off or in standby mode and cut the power to those devices allowing you to save energy. Some smart power strips can also monitor electricity consumption and report the percentage of energy being used for each smart outlet.</span></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="font-size:12pt;"><br></span></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><b><span style="font-size:14pt;">Smart Lighting</span></b><span style="font-size:12pt;">&nbsp;allows you to control the lighting throughout the house from your phone. Bulbs are LED which are more energy efficient and don’t need to be replaced often. Most bulbs offer dimming features and some even change hue, giving you the option to have a range of colors or anything from yellow light to a white natural light. Since it's all controlled from your phone, you can turn the lights on and off from your phone while you are in the house and even when your not!</span></span></p></blockquote><p style="text-align:left;"></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(0, 0, 0);"><br></span></p><p style="text-align:left;"><b><span style="font-size:14pt;color:rgb(0, 0, 0);">Smart Home Security</span></b></p><p style="text-align:left;"><b><span style="font-size:14pt;color:rgb(0, 0, 0);"><br></span></b></p><blockquote style="margin-left:40px;border:none;"><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><b><span style="font-size:16px;"><span style="font-size:18px;">Smart Locks</span>&nbsp;</span></b><span style="font-size:12pt;">offer a security as well as a solution for those who chronically&nbsp;misplace their keys, eliminating the need for spare keys hidden by the entrance or given to your neighbors. They are key-less&nbsp;door locks that allow you to lock and unlock your doors from your phone, whether you are there or not. You could unlock the door from the car so you don't have to fumble with your keys when your hands are full or even when you aren't home and need to let someone inside.</span></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="font-size:12pt;">&nbsp;</span></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><b><span style="font-size:18px;">Smart Smoke Detectors</span></b><span style="font-size:12pt;"><span style="font-size:18px;">&nbsp;</span>work as a connected system, so if one alarm is triggered, you will receive&nbsp;an alert on your phone. If it's a false alarm because you've burned something while cooking, you can easily shut the alarm off with your phone; however, if you're not home and receive a notification&nbsp;that is concerning, you can notify emergency services potentially avoid serious property damage<i>.</i> If you don't want to replace all of your smoke detectors, you can get a &quot;Listener&quot; which plugs into a standard wall outlet and listens for any alarms. If one goes off, the listener will sent a notification to your phone.&nbsp;</span></span></p></blockquote><p style="text-align:left;"><b><i><span style="font-size:12pt;color:rgb(0, 0, 0);">&nbsp;</span></i></b></p><p style="text-align:left;"><b><span style="font-size:14pt;color:rgb(0, 0, 0);">Smart Kitchen</span></b></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(0, 0, 0);"><br></span></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(0, 0, 0);">Smart kitchen appliances also offer great convenience, incredible features, and can be monitored, turned on or off all from your phone so if you've ever left the house and forgotten whether you've turned off the oven, or any other appliance, you would be able to check on your phone and turn it of if you did forget.&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(0, 0, 0);"><br></span></p><blockquote style="margin-left:40px;border:none;"><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><b><span style="font-size:14pt;">Smart Fridge </span></b><span style="font-size:12pt;">allows you to monitor the inside temperature from your phone to ensure everything is working properly. Some even have cameras inside them can be viewed from your phone allowing you to see what you're low on when your out shopping.&nbsp;</span></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="font-size:12pt;"><br></span></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><b><span style="font-size:14pt;">Smart Slow Cookers</span></b><span style="font-size:12pt;">&nbsp;offer settings that will ensure your food is ready by the time you get home by setting a time to finish. If you're delayed for some reason, you can use the app on your phone to adjust the time you'll be home and the slow cooker will adjust it's cooking settings to make sure your meal is not over cooked.&nbsp;<i>&nbsp;</i></span></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="font-size:12pt;"><i><br></i></span></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><b><span style="font-size:14pt;">Smart Coffee Makers</span></b><span style="font-size:12pt;"> can be controlled by your phone, allowing you to brew a cup or pot of coffee, just how you like. Plus, they can be programmed to brew your coffee at a specific time or when triggered by your morning alarm.&nbsp;</span></span></p></blockquote><p style="text-align:left;"><span style="font-size:12pt;color:rgb(0, 0, 0);">&nbsp;</span></p><p style="text-align:left;"><b><span style="font-size:14pt;color:rgb(0, 0, 0);">Privacy&nbsp;and Security</span></b></p><p style="text-align:left;"><b><span style="font-size:14pt;color:rgb(0, 0, 0);"><br></span></b></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="text-align:center;">&nbsp; &nbsp;&nbsp;</span><span style="font-size:12pt;">While all of these smart home gadgets are convenient, cost-effective and offer so many interesting features, they also pose potential risk, if you are not secure.&nbsp;Keeping your smart home secure, starts with the&nbsp;WiFi&nbsp;router. This is the&nbsp;foundational&nbsp;item that all of the smart devices use to connect.&nbsp;Lack of security could mean that a hacker who gains access to your&nbsp;WiFi&nbsp;would be also be able to access your smart devices. This means having access to your security camera footage, thermostat, oven, etc.&nbsp;</span></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="font-size:12pt;"><br></span></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="text-align:center;">&nbsp; &nbsp;&nbsp;</span><span style="font-size:12pt;">When securing your WiFi router is different from securing the connected devices — A simple firewall or security software is not the answer. You should begin with the router. It is advised to give your WiFi&nbsp;router a unique name and password. When you keep the factory given name and provided password, hackers will know the exact make and model of your router, and could potentially compromise your network.</span></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="font-size:12pt;"><br></span></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="text-align:center;">&nbsp; &nbsp;&nbsp;</span><span style="font-size:12pt;">As you purchase smart devices, you can enhance their security by making a few modifications to their default settings.&nbsp;Many IoT devices come with default usernames and passwords that are the same for all devices.&nbsp;With each device, change the usernames and set unique passwords.&nbsp; Check each device's security settings because some device's default security settings benefit the manufacturer more than they benefit you. If you are not using some of the devices features, disable them. For example, if you have a smart appliance that you never plan to access remotely, disable the remote access option.&nbsp;Additionally, find out how the devices receive software updates and don't wait to update. When the company identifies any security flaws, they issue software updates that address those vulnerabilities. Neglecting to update the software makes your device vulnerable to cyber criminals who are looking to exploit that security flaw.&nbsp;</span></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="font-size:12pt;"><br></span></span></p><p></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="text-align:center;">&nbsp; &nbsp;&nbsp;</span><span style="font-size:12pt;">The fear of potentially being hacked shouldn't keep you from purchasing smart devices. By simply being proactive about smart device security, you can prevent anything bad from happening.</span></span></p></div>
</div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 09 Jun 2020 14:24:17 -0400</pubDate></item><item><title><![CDATA[Cookies! ]]></title><link>https://www.zwirentitle.com/blogs/post/cookies</link><description><![CDATA[&nbsp; &nbsp; No, not chocolate chip or sugar cookie, we're talking about HTTP cookies. These cookies, otherwise known as web cookies, are little bits ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_93oLo_AYR7GA1VbD_zeYyw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_hWhwWIw1RsiOMI3l5DFdzA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"> [data-element-id="elm_hWhwWIw1RsiOMI3l5DFdzA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_dq025p6BRiyaQKwkjYfwnA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_dq025p6BRiyaQKwkjYfwnA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_-Ixz1LfvQeGOfHqUYIcLuQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_-Ixz1LfvQeGOfHqUYIcLuQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;font-size:20px;">The ones that are good and the ones to avoid.&nbsp;</span><br></h2></div>
<div data-element-id="elm_EvEettRGTwSCqXjgvJXxWw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_EvEettRGTwSCqXjgvJXxWw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="line-height:1.2;"><p><span style="font-size:12pt;color:rgb(0, 0, 0);">&nbsp; &nbsp; No, not chocolate chip or sugar cookie, we're talking about HTTP cookies. These cookies, otherwise known as web cookies, are little bits of data that are collected by a website and saved in a tiny file on your computer and on the website’s server.&nbsp;Originally created in 1994 as a solution for making online shopping carts possible, the first application of cookies was on the Netscape website to determine whether a user had previously visited the website. Today, their purpose is to enhance your overall web browsing experience by remembering your recent activity, and tailoring your web experience to you.&nbsp;</span></p><p>&nbsp; &nbsp;&nbsp;<span style="font-size:12pt;color:rgb(0, 0, 0);">Prior to the media’s exposé on web cookies in 1996, cookies were accepted by default and people had no idea of their existence.&nbsp; Once people became aware, web cookies became a major topic of discussion as a digital villain invading everyone's privacy.&nbsp;While <b>the fear of cookies invading privacy</b>&nbsp;is valid for some in some instances, some cookies actually benefit the user while browsing the internet.&nbsp;Some web cookies contribute to the User Experience (UX) making web browsing as easy as it is today. For example, cookies are the reason e-commerce websites will remember your shopping cart when you return to a site where you never checked out. Additionally, websites can use cookies to cross reference your activity with other users who had similar activity, allowing them to create recommendations such as &quot;Customers Also Viewed&quot; on e-commerce sites, &quot;Suggested Content&quot; on video streaming platforms, or &quot;Related Searches&quot; in search engine sites.&nbsp;</span></p><p><span style="font-size:9pt;color:rgb(0, 0, 0);">&nbsp;&nbsp;</span></p><p><b><span style="font-size:14pt;color:rgb(0, 0, 0);">How Cookies Work</span></b></p><p>&nbsp; &nbsp;&nbsp;<span style="font-size:12pt;color:rgb(0, 0, 0);">Every time you connect to a website, the site will search their server for any existing cookie data.&nbsp;Your first time visiting a website, since there is no cookie data stored yet, your web browser connects to the website and a small file is created on the website's server to save your activity and preferences.&nbsp; That file is also saved within your web browser on your computer.&nbsp;</span><span style="font-size:12pt;color:rgb(0, 0, 0);">Typically a website creates a unique anonymous identifier to remember you rather than storing personal information on the server;&nbsp;</span><span style="color:rgb(0, 0, 0);font-size:12pt;">however, if you enter in personal information on the website, this information is typically encrypted and stored within the unique cookie id.&nbsp;</span></p><p></p><p>&nbsp; &nbsp;&nbsp;<span style="font-size:12pt;color:rgb(0, 0, 0);">The next visit, and any future visits to that website, your cookie data will be found in the site's initial search of their server, allowing your preferences, unpaid items in a shopping cart or login information to load automatically. Any new activity or preferences set while visiting the site is then saved to your cookie file for the next time you visit.&nbsp;</span></p></div>
</div></div><div data-element-id="elm_E7uQu8Tpatagwh-zec_V9A" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_E7uQu8Tpatagwh-zec_V9A"].zpelem-image { border-style:none; border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/For%20Newsletter/cookieprocess_Explanation.png" size="fit" data-lightbox="true" style="height:325px;width:496.48px;"/></picture></span></figure></div>
</div><div data-element-id="elm_e30EK4GJctFeDDjbV38oeA" data-element-type="text" class="zpelement zpelem-text zp-hidden-sm zp-hidden-xs "><style> [data-element-id="elm_e30EK4GJctFeDDjbV38oeA"].zpelem-text { border-radius:1px; margin-block-start:0px; } </style><div class="zptext zptext-align-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><p style="line-height:1;"><span style="font-style:italic;color:rgb(0, 0, 0);font-size:12px;font-weight:bold;">How cookies are made.</span></p></blockquote></blockquote></blockquote></blockquote></blockquote></blockquote></blockquote></blockquote></div>
</div><div data-element-id="elm_ABWPP59iSUFIn2WoDtJGzg" data-element-type="text" class="zpelement zpelem-text zp-hidden-md zp-hidden-xs "><style> [data-element-id="elm_ABWPP59iSUFIn2WoDtJGzg"].zpelem-text { border-radius:1px; margin-block-start:0px; } </style><div class="zptext zptext-align-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><p style="line-height:1;"><span style="font-style:italic;color:rgb(0, 0, 0);font-size:12px;font-weight:bold;">How cookies are made.</span></p></blockquote></blockquote></blockquote></div>
</div><div data-element-id="elm_C_nCuT_nP9ZlEW6vI6mGJg" data-element-type="text" class="zpelement zpelem-text zp-hidden-md zp-hidden-sm "><style> [data-element-id="elm_C_nCuT_nP9ZlEW6vI6mGJg"].zpelem-text { border-radius:1px; margin-block-start:0px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="line-height:1;"><span style="font-style:italic;color:rgb(0, 0, 0);font-size:12px;font-weight:bold;">How cookies are made.</span></p></div>
</div><div data-element-id="elm_v_zZmftuWmx4dRvU1hNsug" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_v_zZmftuWmx4dRvU1hNsug"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="line-height:1.2;"><p><span style="color:rgb(0, 0, 0);"><b><span style="font-size:14pt;">Type of Cookies</span></b><br></span></p><p><span style="color:rgb(0, 0, 0);"><span style="font-size:12pt;">There are two main types of web cookies: session cookies &amp; persistent cookies.&nbsp; &nbsp; &nbsp;</span>&nbsp; &nbsp;</span></p><p>&nbsp; &nbsp;&nbsp;<span style="color:rgb(0, 0, 0);"><b><span style="font-size:13pt;">Session Cookies&nbsp;</span></b><b></b><span style="font-size:12pt;">are temporarily stored in the web browser’s memory and deleted when the web browser is closed. These types of cookies are typically used to power an e-commerce website by remembering the items in your shopping cart, even if you leave the website. Additionally, they will save any specific preferences you’ve set on a website such as language or location. These cookies are more helpful than harmful and upon closing your web browser, the cookie data is deleted.&nbsp;</span></span></p><p>&nbsp; &nbsp;&nbsp;<span style="color:rgb(0, 0, 0);"><b><span style="font-size:13pt;">Persistent Cookies</span></b><span style="font-size:12pt;"> are stored for longer time periods within the web browser and remain intact even if the browser is closed; however, they typically have an expiration date. These types of cookies are utilized every time the user visits that website. Typically, this type of cookie allows a website to remember a specific device and user login, making the login process a bit easier. For example, many banks include an option to remember your account when logging into an online banking account on a specific device. If the user checks this box, the bank will not require the tedious multi-factor authentication or answers to security questions every time the user logs in to their bank account on that one device.&nbsp;Below are three different banks that allow users to opt-in to using persistent cookies on their devices.&nbsp;</span><span style="font-size:12pt;"><br></span></span></p></div>
</div></div><div data-element-id="elm_SzgOpM0M6EDHy36wniYy9w" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_SzgOpM0M6EDHy36wniYy9w"].zprow{ border-radius:1px; } </style><div data-element-id="elm_1BJ0TQuBB2FhJkVZ1vPNzA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_1BJ0TQuBB2FhJkVZ1vPNzA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_uBNMKS_YA09BnrXhhvdQZA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_uBNMKS_YA09BnrXhhvdQZA"].zpelem-image { border-style:solid; border-color:#000000 !important; border-width:3px; border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/For%20Newsletter/BOAPersistentCookie.png" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div><div data-element-id="elm_WjN1v1pylEteuLu7ux0z0g" data-element-type="text" class="zpelement zpelem-text zp-hidden-sm zp-hidden-xs "><style> [data-element-id="elm_WjN1v1pylEteuLu7ux0z0g"].zpelem-text { border-radius:1px; margin-block-start:0px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="line-height:1;"><span style="font-style:italic;color:rgb(0, 0, 0);font-size:12px;font-weight:bold;">Examples of frequently used persistent cookies</span></p></div>
</div></div><div data-element-id="elm_H2Hi881fQZOkfMm7QV8iVg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_H2Hi881fQZOkfMm7QV8iVg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_Czvyb5DEsay_HfFqCuTRuA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_Czvyb5DEsay_HfFqCuTRuA"].zpelem-image { border-style:solid; border-color:#000000 !important; border-width:3px; border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/For%20Newsletter/CapOneLogin.png" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div></div><div data-element-id="elm_gMgYAcp99fXkzdRf8vH3Ag" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_gMgYAcp99fXkzdRf8vH3Ag"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_sSow-Qqv6iwQ6qVu3HcM9w" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_sSow-Qqv6iwQ6qVu3HcM9w"].zpelem-image { border-style:solid; border-color:#000000 !important; border-width:3px; border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/For%20Newsletter/ChaseLogin.png" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div><div data-element-id="elm_TLkuAckPiJbt2088fd6u2A" data-element-type="text" class="zpelement zpelem-text zp-hidden-md "><style> [data-element-id="elm_TLkuAckPiJbt2088fd6u2A"].zpelem-text { border-radius:1px; margin-block-start:0px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="line-height:1;"><span style="font-style:italic;color:rgb(0, 0, 0);font-size:12px;font-weight:bold;">Examples of frequently used persistent cookies</span></p></div>
</div></div></div></div></div><div data-element-id="elm_Udu2QzBDTxYqwGq9ZWmoFQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_Udu2QzBDTxYqwGq9ZWmoFQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_-OoHWeNCaDs2YWs4pAQ51g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_-OoHWeNCaDs2YWs4pAQ51g"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_7BqOZtDylhh6VcFBnljEKA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_7BqOZtDylhh6VcFBnljEKA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="line-height:1.2;"><p><span style="color:rgb(0, 0, 0);"><b><span style="font-size:14pt;">Cookie Issuers</span></b><br></span></p><p><span style="color:rgb(0, 0, 0);"><span style="font-size:12pt;">Cookies are either created by a first-party issuer or third-party issuer.&nbsp;&nbsp;</span></span></p><p>&nbsp; &nbsp;&nbsp;<span style="color:rgb(0, 0, 0);"><b><span style="font-size:13pt;">First-Party Cookies </span></b><span style="font-size:12pt;">are created by the website that you are currently visiting. Many websites offer a cookie preference tab that lets the user choose the cookies they want turned on. Some cookies are essential to utilizing the web page which cannot be turned off, while others like analytics or marketing cookies can be turned off. These types of cookies are used by the company to track the effectiveness of the site's user experience or of a marketing campaign and are typically separated from any personally identifiable information.&nbsp;</span></span></p><p>&nbsp; &nbsp;&nbsp;<b style="color:rgb(0, 0, 0);"><span style="font-size:13pt;">Third-Party Cookies</span></b><span style="color:rgb(0, 0, 0);font-size:12pt;"> are cookies created by a website that you are not currently visiting—they&nbsp;typically come from online advertisements so companies can track what website a user was visiting when they clicked on the ad. If there is an ad on the website, it is likely that the ad owner and whoever else sells the digital ad space have cookies enabled for tracking the user's activity. These are typically persistent cookies that stay on the computer and track the user's long term activity. Since Google is one of the major digital advertisement providers, Google is tracking the long term activity on a user's web browser. While it may seem like an invasion of privacy, the reason for tracking a user's activity is to provide them with a tailored ad experience where ads the user sees are relevant to their searches and internet activity.&nbsp;</span><br></p><p><span style="font-size:9pt;color:rgb(0, 0, 0);">&nbsp;</span></p><p><b><span style="font-size:14pt;color:rgb(0, 0, 0);">Cookie Stealing&nbsp;</span></b></p><p>&nbsp; &nbsp;&nbsp;<span style="font-size:12pt;color:rgb(0, 0, 0);">There are a few different methods a hacker can utilize to steal a user’s cookie data; however, they are very complex and not frequently used.&nbsp;The best way to protect yourself from cookie fraud is to keep your web browser up to date.&nbsp;Most web browsers update automatically; however, if yours does not, make sure to be regularly checking for updates because in doing so,you are ensuring your web browser has the most up-to-date security.</span></p><p><b><span style="font-size:14pt;color:rgb(0, 0, 0);"><br> Privacy</span></b></p><p>&nbsp; &nbsp;&nbsp;<span style="font-size:12pt;color:rgb(0, 0, 0);">Typically, first-party and session cookies pose little risk to privacy concerns; however, persistent and third-party cookies are relatively invasive of individuals’ privacy. Since many advertisements on websites are powered by Google Adsense, Analytics, Maps, etc, the collected cookies provide Google with your internet activity. While marketing professionals will argue that the collected cookies help tailor advertisements to the user, the information collected by third-party cookies give people a justified concern about their privacy.</span></p> &nbsp; &nbsp;&nbsp;<span style="font-size:12pt;color:rgb(0, 0, 0);">Fortunately, browsers allow users to manage their cookie settings. On a desktop computer, Google Chrome, Firefox, Edge and Internet Explorer all offer cookie settings. Mobile devices also offer cookie settings within Apple iOS Safari, Chrome, Android's built in browsers and Blackberry's web browser. Since each browser is a little different there is not one process for turning the cookies off; however, a simple Google search of, &quot;[Your Browser] Manage Cookie Preferences&quot; will give you a list of articles explaining the process.&nbsp;Ultimately,there is no way around cookies, but managing the settings in your browser will help significantly with websites creating cookie files to collect your web activity, preferences or account information.&nbsp;</span></div>
</div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 04 Feb 2020 15:42:41 -0500</pubDate></item></channel></rss>