Aware — Module 01

What Is a
Digital Footprint?

Every action you take online leaves data behind. Your digital footprint is the trail of information you create, share, and leave exposed, whether you know it or not.

The Three Types

Understanding your
digital trail

Not all digital footprints are created the same way. Understanding the difference between active, passive, and persistent data is the foundation of awareness.

Active
What You Choose to Share
Social media posts, online forms, profile information, comments, and anything you deliberately publish. You control this, but most people share far more than they intend to.
Passive
Collected Without You Knowing
Browsing history, location data, device information, ad tracking pixels, and behavioral data collected silently in the background. You did not choose to share this. It was taken.
Persistent
Stays Even After Deletion
Cached pages, data broker records, screenshots, and information already sold to third parties. Deletion does not equal erasure. Data can outlive your account by years.
Exposure Sources

Where your
data comes from

Your digital footprint is built across five primary sources, most of which operate in the background without your awareness.

01

Location Services

Your movements tracked each time an app accesses your GPS. Many continue tracking in the background when not in use.

02

Apps and Platforms

The average smartphone has 80 or more apps. Many request access to camera, microphone, and contacts far beyond what they need to function.

03

Wi-Fi Connections

The networks you join reveal your location patterns and browsing behavior. Public Wi-Fi networks are particularly risky for sensitive activity.

04

Search History

Every query builds a profile of your interests, health concerns, and financial situation. This profile is sold to advertisers and retained indefinitely.

05

Data Brokers

Third-party trackers follow you across websites. Data brokers compile and sell your personal information legally, without your knowledge or consent.

Biometric Data

Protect what cannot
be changed.

Your face, iris, voice, and behavioral patterns are unique identifiers that, unlike passwords, cannot be reset if compromised.

Face
Facial Recognition
Used in law enforcement, retail surveillance, and social media tagging. Your facial structure is a permanent identifier.
Behavior
Behavioral Patterns
How you type, scroll, and move through apps creates a behavioral fingerprint used to verify and track identity.
Why It Matters

Your data is worth
more than you think.

Your digital footprint is used by advertisers to target you, employers to evaluate you, insurers to assess you, and bad actors to exploit you.

99%
Of attacks blocked by 2FA
One setting. Maximum impact.
80+
Apps on avg smartphone
Most request too much access.
4B
Records breached in 2024
Yours may be included.
29%
Attacks targeting N. America
Highest rate in six years.

Awareness is power.

Stay aware. Stay protected.