Protecting Your Privacy & Personal Data
Security and privacy overlap but are not the same. Security keeps attackers out; privacy controls how much of your data exists for them to steal in the first place. The less of your personal information is floating around, the smaller a target you are. In this lesson you will reduce your digital footprint and use AI to make sense of the fine print companies hope you never read.
What You'll Learn
- The difference between security and privacy, and why both matter
- How to shrink your digital footprint and check for past data breaches
- How to use AI to decode privacy policies and app permissions
- Practical privacy settings for social media, browsers, and AI tools
Security vs. Privacy
- Security is about protection: passwords, encryption, MFA — keeping unauthorized people out.
- Privacy is about control: deciding who gets your data and how it is used.
A service can be perfectly secure and still abuse your privacy by selling your data. And every piece of personal information you give away — your address, phone number, location history, interests — becomes ammunition for targeted phishing and scams. Minimizing what you share is a security strategy, not just a preference.
Check Whether You Have Already Been Breached
Your data has probably leaked somewhere already — most people's has. The key is to know which accounts, so you can change those passwords. Use the well-known free service Have I Been Pwned (haveibeenpwned.com): enter your email and it tells you which known breaches included your data.
Then ask ChatGPT to turn the result into a plan:
The website Have I Been Pwned shows my email appeared in breaches of [Service A] and [Service B]. As a beginner, what exactly should I do now, step by step, to protect myself? Assume I use a password manager.
The answer: change those passwords (and anywhere you reused them), enable MFA, and watch for phishing referencing those services.
Shrink Your Digital Footprint
The most private data is the data you never shared. Practical moves:
- Delete dormant accounts. Old accounts you forgot about are unmonitored breach risks. Ask AI: "Give me a checklist for finding and deleting old online accounts I no longer use."
- Give minimum information. When a form asks for data it does not need (a store loyalty card asking for your birthday), leave it blank or use a secondary email.
- Use a secondary email for sign-ups and newsletters, keeping your primary email for important accounts.
- Limit location sharing. Turn off location for apps that do not genuinely need it.
- Review what is public about you. Search your own name and see what comes up.
Decode Privacy Policies and Permissions With AI
Nobody reads the 40-page privacy policy — but AI will, in seconds. This is one of the best privacy uses of AI. Copy a privacy policy (or paste its link into a tool that browses) and ask Claude:
Summarize this privacy policy for a non-expert. In plain bullet points tell me: (1) what personal data they collect, (2) whether they sell or share it with third parties, (3) how long they keep it, and (4) the biggest privacy concern I should know about. Here is the policy: [paste].
Do the same for app permissions:
An app is asking for access to my contacts, microphone, location, and camera. The app is a simple [flashlight / photo editor / game]. Which of these permissions are reasonable and which are red flags? Explain why.
If a flashlight app wants your contacts and location, that is a privacy red flag — and AI will tell you so.
Lock Down Social Media and Browsers
Social media is where over-sharing turns into risk — birthdays, locations, and routines are gifts to scammers and social engineers. Ask Gemini:
Give me a beginner privacy checklist for [Instagram / TikTok / Facebook]: which settings to change to limit who sees my posts, location, and personal info. Number the steps and tell me where to find each setting.
For browsing privacy: use a privacy-respecting browser or settings, block third-party tracking cookies, and consider a private search engine. And do not forget the AI tools themselves — check the privacy settings of ChatGPT, Claude, and others, and turn off chat history or model-training options if you prefer your conversations not be retained.
A Quick Hands-On Exercise
Do a two-part privacy check right now: (1) Run your primary email through Have I Been Pwned and note any breaches. (2) Pick the app on your phone with the most permissions and run the "decode permissions" prompt above. You will likely find one account to secure and one permission to revoke within ten minutes.
Your Homework for This Lesson
This week: change passwords for any breached accounts you found, delete two dormant accounts you no longer use, and tighten the privacy settings on your most-used social platform. Each one shrinks your attack surface and makes you a smaller, harder target.
Key Takeaways
- Security keeps attackers out; privacy controls how much data exists to be stolen — both reduce your risk.
- Check Have I Been Pwned to find which breaches include your data, then change those passwords and enable MFA.
- Shrink your footprint: delete dormant accounts, share minimum information, use a secondary email, and limit location.
- AI can summarize long privacy policies and flag unreasonable app permissions in seconds.
- Lock down social media over-sharing and review the privacy settings of the AI tools you use, too.

