Posts

data breach claims

Has Google put your privacy at risk?

Last week, Google admitted giving hundreds of firms access to your Gmail inbox. Our data breach solicitors look at what happened, and what you can do to protect your data.

In a letter to lawmakers in the US, the multinational technology giant said that third-party developers could both access and share data from Gmail accounts. This means that hundreds of apps (and their human employees) might be able to read your messages and share data from your inbox. Often for marketing purposes.

Google says that it thoroughly vets any third parties that are granted access. But this revelation is bound to concern anyone worried about their data privacy. Especially following the Facebook/Cambridge Analytica scandal.

In a letter, first published in the Wall Street Journal, Google’s head of US public policy revealed that: “Developers may share data with third parties so long as they are transparent with the users about how they are using the data”.

However, our data breach solicitors are very concerned about this revelation. And, in particular, how it impacts users in the UK. And there are fears that the process of sharing data is not compliant with the Data Protection Act (the UK’s interpretation of the GDPR).

At Hayes Connor, we are very worried that data protection regulation has been breached and will be seeking urgent clarification on this matter. If we find that Goggle has put the privacy of its UK customers at risk, our data breach solicitors may launch a group action compensation claim against the company.

What should you do now?

According to Google, you have options around how you grant access to apps. However many people may not be aware that they’ve given apps such access to their accounts.

If you are in any way concerned it is vital that you review your Gmail permissions immediately.

To do this:

  1. Select “Account” from the app menu in the top right-hand corner of your Gmail account
  2. Under “Sign in & Security, click on “Apps with account access”
  3. See the apps which you’ve given access to since you created your account
  4. Select ‘Manage Apps’ to review in more details
  5. If you see an app you don’t trust, you can block it by clicking “Remove Access.”

Only a year ago, Google pledged to protect its user’s privacy and prohibit email scanning. And, while Google has itself stopped scanning Gmail users’ email, this latest revelation is bound to cause distress.

Industry experts have called the practice a “dirty secret” while other security experts are surprised that Google permits this practice. Especially when considering the recent increases in data breaches.

If you are in any way concerned we would encourage you to report this issue to the ICO for further investigation. You can do this here.

You call also (securely) register your data with Hayes Connor Solicitors, and we will keep you updated as the outcome of any investigation into this matter.

REGISTER HERE

data
,

Disposing personal data? Do so carefully

With human error the leading cause of data breaches, the Information Commissioner’s Office (ICO) has produced a handy toolkit to help businesses communicate the importance of information security to staff.

At Hayes Connor, we’re sharing some of the tips included in this toolkit to raise awareness of the importance of this issue, and to help organisations across the UK improve their data protection processes.

Tip: All information you work with has value. Dispose of it carefully

The risk of not disposing data carefully

When personal and sensitive information is not disposed of correctly, it can fall into the wrong hands. As such, organisations of all kinds must make sure that they correctly destroy and get rid of any such data. Not least because where they don’t, they could face huge fines.

For example, in 2018 the Bayswater Medical Centre in London was found guilty of a serious data protection breach and fined £35,000 by the Information Commissioner’s Office (ICO) after it left highly sensitive medical records, registration forms and repeat prescription information unsecured in an empty building for a year and a half. The data was left on decks, in unlocked cabinets, on windowsills, and in bins. Find out more about this case.

Quick tips

  • Employers must understand the importance of data protection and make sure that strict policies and procedures are put place to ensure the safe disposal of information
  • Simply binning paper-based personal information is not good enough. Un-shredded documents left in the bin or thrown outside for collection could be stolen and used to commit identity theft or corporate fraud. Any organisation that doesn’t have and adhere to a corporate shredding policy could also be in breach of the GDPR
  • Likewise, confidential waste should always be properly disposed of and separated from regular recyclable waste
  • Electronic information held on hard drives and PCs must also be disposed of correctly. This can be done by a professional hard drive and media destruction service
  • In many cases, data breaches can be avoided by staff abiding by the data protection principles of their businesses. But it is up to employers to make sure that all staff receive regular data protection training to make sure they understand the potential consequences of breaching data protection laws.

Not just hackers

Data breaches are not just caused by cybercriminals. For more advice on how to keep your data safe, follow our #notjusthackers campaign on Twitter and Facebook.

Alternatively, if you have been the victim of a data breach or cyber fraud, find out how we can help you to recover any losses or give us a call on 0151 363 5895 to discuss your case in more depth.

,

Police gangs database breached data protection laws

A Metropolitan Police database of suspected gang members has seriously breached data protection laws. That’s the findings of an investigation by the Information Commissioner’s Office (ICO).

What is the Gangs Matrix?

The Gangs Matrix was set up following the 2011 London riots. It contains the names and personal details of thousands of people. According to the Met, these individuals either pose a risk of committing gang violence, or of becoming victims.

In total, the matrix holds details of around 3,500 people, some of who are as young as 12. It stores their full name, date of birth, home address, and information on whether someone is a firearms offender or a knife carrier. Also, each individual is allocated a green, amber or red rating indicating their apparent risk of violence.

There are a significant number of children and vulnerable individuals on the list.

What was the problem with the Gangs Matrix?

Concerns were raised that the matrix violated human rights. Not least because young black men and boys made up more than three-quarters of the list.  What’s more, the Guardian newspaper found that in one London borough, 40% of young people on the list had “zero” risk of causing harm.

In response, the ICO undertook a review of the database.

What did the ICO find?

While the ICO acknowledged the severity of gang crime, its investigation into the police database found that a failure to adhere to data protection principles potentially caused “damage and distress” to the disproportionate number of black men on it.

According to the ICO, some boroughs also operated informal lists of people who no longer met the criteria for being on the matrix. This meant that the police continued to monitor people that intelligence indicated were not gang members.

Also, data on the list was inappropriately shared with other public bodies such as local councils, housing associations, and education authorities. And there was no guidance on how this data should be used. As a result, people faced sanctions relating to housing, jobs and other public services. The Information Commissioner said that: “simply being on this database could lead to denial of services and other adverse consequences”.

The investigation also found that the matrix failed to distinguish between victims of crime and offenders, leading to confusion among officers.

Amnesty International welcomed the report stating that: “The investigation by the Information Commissioner’s Office confirms a lot of our own findings into the gangs matrix: namely, that it is currently not fit for purpose”.

What was the outcome of the investigation?

The Metropolitan Police force was ordered to radically reform the matrix.

The ICO’s recommendations included:

  • Conducting an impact assessment on the Gangs Matrix
  • Ensuring people are clearly identified to distinguish between victims of crime and suspects
  • Improving guidance to explain what constitutes a gang member
  • Removing people from the matrix where necessary
  • Erasing any informal lists of people
  • Conducting a full review to establish how information on the list is being shared and used
  • Developing guidance setting out how information on the list can be used
  • Training officers and staff who have access to and use the database
  • Putting more robust data security systems and access restrictions in place.

The Met said it accepted the findings and was working to address them. The ICO also launched a separate investigation into how police information was being used by other public bodies, such as local councils.

However, concerns have now been raised about Concern Hub – a new criminal database similar to the Gangs Matrix. Not least because information gathered by Concern Hub will be shared with other agencies.

A spokesperson for Amnesty International said: “Any police database being developed must comply with human rights standards and conform to data protection laws and needs to be far more than a rebrand of the deeply problematic Gangs Matrix”.

What can you do if you have suffered because of the Gangs Matrix?

It is the job of the police to protect us, and in a digital society that also means protecting our data. However, where this trust is being undermined, it is vital to hold them to account.

According to the ICO, problems with the Gangs Matrix go back to 2011 and created a plausible risk to this data.

There is also real concern about the impact on its mainly black and ethnic minority data subjects (people on the database). And, while the investigation focused on London, this issue could be more widespread.

If you have suffered damage or distress caused by the Gangs Matrix you have a right to claim compensation. To find out how we can help you recover any losses, give us a call on 0151 363 5895 to discuss your case in more depth.

Find out more about how we are helping to reduce the impact of police data breach violations. Or, for more advice on how to keep your data safe, follow us on Twitter and Facebook.

VICTIMS
,

Businesses must invest in cyber insurance to protect victims of data breaches

It’s almost impossible to pick up a newspaper or turn on the television without finding out about how some big company has been hacked. But, while it might seem that data breaches are a new and pressing concern, the issue of how to maintain the integrity of information stored on computers is nothing new.

In fact, in a recent article by the Financial Times, the author shares how, as far back as 1979, economist (and former CIA analyst), Mark Skousen published the ‘Complete Guide to Financial Privacy’. In this book, he warned about the relentless collection of information and the need to recognise the need to protect against “unwarranted intrusion into sensitive information”.

Fast forward to today, and as the FT article states, “there is no company or product that doesn’t have cyber risk attached to it.”

The impact of data breaches on business

A data breach can be devastating for victims. And, at Hayes Connor, every day we hear about how privacy violations are causing misery and upset to people across the UK. Crucially, in most cases, these breaches aren’t caused by scammers trying to hack big businesses, but by simple human errors.

But it’s not just victims of data breaches that suffer long-term effects following a cyber problem. Organisations of all types and sizes can also find it difficult to recover.

Here are just some of the possible consequences faced by companies that fail to keep their data safe:

  • Loss of time and money due to having to repair affected systems and disruption to trading
  • Loss of reputational damage and sales (lack of trust from current and potential customers)
  • Loss due to the legal consequences of a data breach (e.g. fines, legal fees and compensation payments)
  • Loss of competitive advantage due to the theft of trade secrets or copyrighted material
  • Having to pay fraudsters (cyber extortion)
  • Rises in insurance premiums.

Worryingly, according to the latest statistics, almost 30 million cyber-related crimes were launched in the last quarter of last year.[1] And nearly half of all UK businesses fell victim to cyberattacks or security breaches[2].

43% of UK organisations surveyed had experienced a cyber security breach or attack in the last 12 months

  2018 Cyber Security Breaches Survey

Standard insurance policies do not cover cyber risk

Despite the rise in cybercrime, many UK organisations are still failing to insure themselves against the threat of a data breach. In fact, according to the article in the FT, only 9% of UK companies are said to have specific cyber insurance. Standard insurance policies do not cover cyber risk.

When it comes to data privacy violations, it is clear the problem isn’t going away. And with prevention better than cure, as well as improving security processes and IT governance, every business, regardless of size or ownership, must now consider cyber insurance. Because if a data breach claim is made against a company, and it is found liable for data privacy errors, the consequences of not being covered could be catastrophic.

The impact on individuals

The introduction of the General Data Protection Regulation (GDPR) in May 2018 coincided with a significant increase in reported data breaches. So the GDPR has created greater public awareness about individual rights.

Indeed, at Hayes Connor, we are currently dealing with over 200 enquiries per month from consumers. Complaints range from the inappropriate use of email to the deliberate or inadvertent disclosure of sensitive, financial, and medical information to third parties.

We’ve seen cases where experiencing a data breach has resulted in adverse life events such as having to move house or area, losing a job, relationship stress and separation, and dislocation from friends and family. All of which can lead to a diagnosable psychological injury.

In most of these cases, the victim of the data breach will have tried to engage with the organisation that has committed the violation and been either rebuffed or provided with a wholly inadequate excuse. In almost all cases the organisation at fault fails to recognise the damage caused by the breach and loss.

Often this failure to provide adequate redress to the victims of data breaches comes from fear. Fear that giving proper compensation could put an organisation out of business. But, with the right insurance in place – alongside improved data security processes – both companies and individuals would be better protected.

Leading by example

At Hayes Connor, we want to reduce the number of data violations taking place across the UK. To do this, we are helping to raise awareness of this issue and educating people and businesses to prevent similar mistakes from happening.

For more advice on how to keep your data safe, follow our #notjusthackers campaign on Twitter and Facebook.

Alternatively, if you have been the victim of a data breach or cyber fraud, find out how we can help you to recover any losses or give us a call on 0151 363 5895 to discuss your case in more depth.

[1] Kaspersky

[2] 2018 Cyber Security Breaches Survey

data breach
,

Out of office. Think before you do

With human error the leading cause of data breaches, the Information Commissioner’s Office (ICO) has produced a handy toolkit to help businesses communicate the importance of information security to staff.

At Hayes Connor, we’re sharing some of the tips included in this toolkit to raise awareness of the importance of this issue, and to help organisations across the UK improve their data protection processes.

Tip: All information you work with has value. Think before you take it out of the office.

The risk of mobile working

When personal and sensitive data is retained in offices, it’s easier to keep it safe and prevent unauthorised access. But today, more and more employees are enjoying the benefits of mobile working and this comes with additional data security risks.

For example, in a recent case, we saw the impact of what can happen when an individual’s personal information was left on a train by their solicitor. Following this shocking data breach, the woman suffered severe psychological effects including stress, anxiety and trauma.

Quick tips

  • Employers must understand the importance of data protection and make sure that strict policies and procedures are put place to ensure the safe processing of information – both in and out of the office.
  • In many cases, data breaches can be avoided by staff abiding by the data protection principles of their businesses. But it is up to employers to make sure that all staff receive regular data protection training to make sure they understand the potential consequences of breaching data protection laws.

Not just hackers

Data breaches are not just caused by cybercriminals. For more advice on how to keep your data safe, follow our #notjusthackers campaign on Twitter and Facebook.

Alternatively, if you have been the victim of a data breach or cyber fraud, find out how we can help you to recover any losses or give us a call on 0151 363 5895 to discuss your case in more depth.

data breach
,

What can you do if you are a victim of tech abuse?

The Victoria Derbyshire programme has highlighted how domestic abusers are using technology to stalk, trap, control, isolate and hunt down their victims.

Sharing her experience, domestic abuse survivor Ellen said how her ex-husband tracked her down after she had moved to a secure refuge in a new town by hacking into her Gmail account and accessing her diary. Although her ex is no longer tracking her movements, the experience is still affecting Ellen physiologically.

Watch Ellen share her experience here.

Speaking to the BBC programme, Refuge – a charity that supports women and children experiencing domestic violence – said that 95% of the cases they see involve tech abuse.

How are abusers using technology?

In some cases, abusers sow location trackers into the linings of a child’s coat or toy in a bid to keep track of their ex-partner’s movements. Also, the charity says that it has found “a rise in the number of women whose children’s IPads, Xboxes and PlayStations have been hacked by the perpetrator to gain full access to their accounts.”

Other common abuse includes hacking email accounts, using social media channels as tools to harass and stalk, monitoring calls and messages, exploiting phone tracking software, and installing cameras around the home.

Are you experiencing tech abuse?

In some cases, people might not know that they are the victim of tech abuse. To help identify the problem, Refuge as provided a quick checklist on its website. People who answer yes to these questions may be experiencing domestic violence.

This includes things like:

  • Has your partner/abuser threatened to share any information about you online
  • Does your partner/abuser seem to know about conversations that you have had without being present?
  • Does your partner/abuser know your whereabouts or turn up unexpectedly wherever you go?
  • Does your partner/abuser stalk and harass you via social media?
  • Has your partner/abuser installed any apps such as ‘find my iPhone’ onto your device?

You can see the list in full here.

What can you do to protect yourself from tech abuse?

Refuge also provides a range of helpful guides and tips for domestic abuse survivors. These include:

  • Technology safety quick tips
  • How to document tech abuse (this is critical for a number of reasons, including if you ever want to pursue legal action)
  • An iPhone privacy and safety guide
  • Tips on how to stay safe on Facebook and Twitter
  • Advice on how privacy could be compromised on online gaming platforms (and what to do to stop this from happening)
  • A guide on spyware and surveillance tools and how breached privacy and security can be re-established
  • A guide on how to create a technology safety plan
  • A list of questions and considerations to go through when looking at using apps
  • A guide to how home devices can be used to facilitate tech abuse.

You can access all of these resources here.

For more advice on how to keep your personal data safe, you can also follow us on Twitter and Facebook.

The tech abuse and empowerment service

Refuge has launched a nationwide tech abuse and empowerment service to support women who have had technology used against them as a weapon of domestic abuse. The service was created to empower survivors so they can use technology positively and safely. You can find out more about this service here.

Taking legal action following tech abuse

In some cases, taking legal action is necessary to end cyberstalking, cyberabuse and harassment. And, if someone is convicted of a cybercrime against you, as well as putting measures in place to stop the unwanted behaviour, the court may also order them to pay you compensation. Where the authorities are not interested, we can assist with a private prosecution.

It’s also possible to take legal action where poor data security processes have allowed someone to access your personal information and carry out tech abuse against you.

If you have been the victim of tech abuse give us a call on 0151 363 5895  or complete our contact form to discuss your case in more depth. Our sensitive, expert team is on hand to answer any questions you might have.

 

hayes connor
,

Is the law is evolving when it comes to data protection?

Last year, our managing director Kingsley Hayes revealed the key data privacy trends that our firm has seen since the General Data Protection Regulation (GDPR) came into force. You can read more about these trends here.

One of these insights is that the law is still evolving when it comes to data protection.

What are we seeing?

Data privacy is still a relatively new area of law. So alterations are to be expected. But, over the past two decades, privacy and data protection laws have changed significantly. Not least because of advancements in technology which have transformed the way we all use personal data.

Certainly, the GDPR altered the legal landscape forever. The most significant change to data privacy regulations in over two decades, its purpose is to strengthen and unify data protection for all. But the GDPR was only the start of the data privacy evolution. And recently we have seen even more amendments.

Data privacy and data protection are more closely connected

Data privacy and data protection are very closely interconnected, but they are not the same thing.

  • The Data Protection Act (the UK’s interpretation of the GDPR) provides rules for how an organisation can collect, use and disclose personal information
  • Privacy laws in the UK create a balance between an organisation’s need to collect personal information and an individual’s right to maintain their personal privacy.

Today there is more emphasis on the relationship between privacy rights and data protection from a legal perspective. And this is good news for individuals as it means we can start a claim based on more than one ground (i.e. for the misuse of private information and for breach of data protection obligations).

It is possible to bring a compensation claim for distress?

Until recently, a person who suffered damage (e.g. a financial loss) might have had their compensation increased to take into account any associated distress, but in most cases, payment would not have been awarded for suffering alone.

However, in December 2017, the landmark High Court ruling in the Morrisons supermarket data breach case paved the way for those affected by data breaches to claim damages for distress, even if they have not suffered any financial loss.

Organisations can be held accountable for breaches caused by employees

The Morrison’s data breach case had another far-reaching implication. In this case, a disgruntled employee published the payroll data of almost 100,000 staff online.

Despite acknowledging that Morrisons had taken all the appropriate steps to prevent a breach, the High Court found that the company was primarily liable for its own acts and omissions (such as not ensuring the proper security measures to protect the data).

Crucially, the judge also ruled that Morrisons was “vicariously liable” for the employee’s actions. In a workplace context, an employer can be vicarious liability for the actions of its employees, as long as it can be shown that they took place in the course of their employment.

This means that it is now possible to hold organisations to account for data breaches caused by employees.

Furthermore, the Ticketmaster data breach case is also addressing the issue of whether it is possible to hold a company responsible for violations by third-parties.

Indeed, over the last few months we’ve talked to hundreds of people who have been affected by this shocking privacy breach, and our Ticketmaster compensation claim on behalf of 650 claimants is now ready to proceed. So, if you want to be included in our NO WIN, NO FEE claim, it’s vital that you act now.

No two cases are the same

Crucially the law now realises how important it is that cases are assessed in detail and on their unique merits. As such, the courts looking at a wider-range of factors when deciding on appropriate compensation (e.g. the consequences of the misuse of data, what information was breached, etc.).

Leading by example

At Hayes Connor, we want to reduce the number of data breaches taking place across the UK. To do this, we are helping to raise awareness of this issue and educating people and businesses to prevent data privacy violations from happening.

For more advice on how to keep your data safe, follow us on Twitter and Facebook.

Alternatively, if you have been the victim of a data breach or cyber fraud, find out how we can help you to recover any losses or give us a call on 0330 995 0070 to discuss your case in more depth.

 

notjusthackers
,

Could a simple email error cause a serious data breach?

With human error the leading cause of data breaches, the Information Commissioner’s Office (ICO) has produced a handy toolkit to help businesses communicate the importance of information security to staff.

At Hayes Connor, we’re sharing some of the tips included in this toolkit to raise awareness of the importance of this issue, and to help organisations across the UK improve their data protection processes.

Tip: Most security breaches happen because of distractions or mistakes. Always check email addresses, content and attachments before you click ‘Send’

The problem with email

Most of us hand over our email addresses in return for services. And we do so willingly. But our email addresses provide a way into our digital life so organisations must keep them safe.

Common mistakes when sending emails include:

  • Misspelling an email address and sending it to the wrong person
  • Not using the bcc functionality when sending to multiple recipients
  • Attaching the wrong information to an email.

For example, an independent inquiry into child sexual abuse was fined £200,000 by the ICO after sending a bulk email that identified possible abuse victims. In this case, an officer sent an email to 90 people involved in a review without using the blind carbon copy (bcc) functionality. This allowed the recipients to see each other’s email addresses and identified them as possible victims of child sexual abuse.

Furthermore, in many cases, the wrong email addresses are being supplied in the first place. So individuals should also do more to protect their data.

For example, in another case, a person signed up to a credit service, but when doing so, entered a slightly incorrect email address. This email address then doubled as the account username. When an email was sent from the credit service to confirm the account, it was, therefore, sent to the wrong person. Because this stranger had full access to the account, they could get into the account and even change the password. So, one small mistake let the wrong person see a huge range of personal information including the date of birth and previous addresses of the actual account holder, as well as information about their applications for credit.

Quick tips

  • Make sure you enter your email address correctly when signing up online
  • Employers must understand the importance of data protection and make sure that strict policies and procedures are put place to ensure the safe processing of information
  • In many cases, data breaches can be avoided by staff abiding by the data protection principles of their businesses. But it is up to employers to make sure that all staff receive regular data protection training to make sure they understand the potential consequences of breaching data protection laws
  • Companies are also being urged to find other ways to check their customers are who they say they are (e.g. two-factor authentication and ensuring people signing up for a service enter their email address twice – with no cut and paste option).

Not just hackers

Data breaches are not just caused by cybercriminals. For more advice on how to keep your data safe, follow our #notjusthackers campaign on Twitter and Facebook.

Alternatively, if you have been the victim of a data breach or cyber fraud, find out how we can help you to recover any losses or give us a call on 0151 363 5895 to discuss your case in more depth.

 

, ,

Woman has her medical records unlawfully accessed by her ex

As our health and social care system becomes digital, it is vital that there are adequate and robust protections in place to secure the data held within it. And that healthcare staff have the knowledge and ability to handle such information securely.

In a recent case, we saw the impact of what can happen when an employee accessed the medical records of his ex to get hold of her personal information.

What happened in this case?

In this case, our client was informed by a mutual friend that her ex-partner had unlawfully accessed her medical records. He could do this because a local NHS Trust employed him.

Our client complained to the Trust, and it admitted the data breach.

The breach revealed our client’s home address and contact details to her ex-partner. He was also able to establish every occasion that our client had received or been discharged from services provided by the NHS Trust.

As a direct result of this data breach, our client suffered significant stress and anxiety due to the fact that the information was distributed amongst numerous other people.

Turning to Hayes Connor Solicitors for help we were able to secure damages of £3,500.  In response, our client has provided some lovely feedback describing her experience with Hayes Connor solicitor James Kelliher:

 “Would like to say the service I experienced was 110% all the way through thanks to James. I’m glad I found his service on the internet and rang ASAP for help with my data breach claim. If anyone has any doubts or worries about data breach then James is the one to help you. I appreciate what he’s done for me so very much. Fast and very friendly service and can’t speak more highly of him. Once again thank you James.”

Lessons learned

The healthcare sector handles some of our most sensitive personal data, and, as patients, we have the right to expect this will be looked after. However, all too often this isn’t the case.

Hospitals and other healthcare organisations need to do more to protect sensitive patient data. It is vital that there are adequate and robust protections in place to secure patient information and to ensure that it is only accessed by those people who need it to ensure the provision of medical care and support.

Not just hackers

At Hayes Connor, we want to reduce the number of data violations taking place across the UK. To do this, we are sharing such real-life examples of data breaches to raise awareness of this issue and educate people to prevent similar mistakes from happening.

For more advice on how to keep your data safe, follow our #NotJustHackers campaign on Twitter and Facebook.

Alternatively, if you have been the victim of a data breach or cyber fraud, find out how we can help you to recover any losses or give us a call on 0151 363 5895 to discuss your case in more depth.

 

data breach
,

How to stop your phone from tracking your every move

Did you know that some companies are using your smartphone to track you throughout the day? And quite often you will have agreed to this personal surveillance simply by agreeing to the terms and conditions of using a service.

If you are worried about the likes of Facebook and Google using your phone to keep tabs on you, there are some steps you can take to take back ownership of your personal data and privacy.

How to protect your privacy

  • Turn off location history
  • Delete your location history
  • Delete apps that you no longer use from your device
  • Avoid apps that demand access to a huge amount of personal data (e.g. Facebook Mobile). Instead you can access these services via a browser with a private mode
  • Check the default settings of all the apps you use.

However, when you turn off location history, Google still tracks your location when you use key services including Maps, search and weather. To prevent Google from doing this:

Android

  • Go to Settings
  • Select Google
  • Select Google Account
  • Select the Data & Personalisation
  • Select Web & App Activity and toggle off

IPhone

If you really want to prevent your phone from tracking you, you should also turn off location services on your iPhone or Android device and only turn this back on when needed (e.g. when you want to use Google Maps). However in doing so your phone will feel a whole lot less useful.

Check out this page to see everywhere you have been with your phone.