What Misconceptions Do Consumers Have About Privacy?

Control of personal information in the digital space, and particularly on mobile devices, presents a unique design challenge. Most people aren’t aware that their personal data is being collected and shared. Many users don’t take the time to validate their expectations and most never read privacy policies, only becoming aware of such concerns when something happens that doesn’t meet their expectations—such as seeing their friend’s picture in a Facebook ad or seeing banner ads that match their most recent purchase.

When people do become aware and their expectations are violated, trust in the brand is eroded. We can leverage existing technology to create new experiences around personal data collection that are both transparent and provide control. But before we can begin to think about design solutions, we need to understand consumers’ current experience and expectations of how their personal information is handled and safeguarded. And our research has shown that the experience is currently riddled with misconceptions.

Create with Context

Through our research with consumers in the U.S., Mexico and Canada, we found that consumer privacy expectations often do not map to reality. In the online interaction between consumers and companies, consumers do expect that companies access their personal data in order to complete transactions—and in that case, their expectations match reality. However, user expectations and reality diverge when it comes to companies’ storage and use of consumers’ personal data. A nearly total mismatch occurs when it comes to sharing people’s personal data: Companies do far more of it than most consumers realize.

This lack of awareness leaves consumers vulnerable. If they don’t realize that their data is being accessed and shared, they are unlikely to try to look for controls to set their preferences. While people understand that they can control what personal information other consumers see, they have little awareness of their ability to control how companies use, store and share their data.

Create with Context

What consumers do expect is that information stays in silos. Aware of all or some of the possible online data collectors—such as local service, social network, photo or shopping sites—users think that their data remains only with those sites. They don’t expect that their personal information will be transferred between them. Most consumers are also not aware of ad networks that may gather data across all sites they visit.

Create with Context

Consumers believe that companies only have access to limited personal information. In some ways, users feel that this is a form of protection, since the “real” me is made up of many components. Consumers only give each online site data about themselves that is relevant to that transaction or service and assume that sites don’t know the “whole” me.

Create with Context

People also expect they will have anonymity on sites until they provide authentication. For example, consumers believe that they are anonymous when shopping on the Internet until they choose to give their personal information. They believe that their provider or website only knows their location when they “Check In.” And while people expect to provide a password when accessing mail via a browser, they do not expect to need to enter a password when using their mail app.

Users operate under these false privacy expectations every day. False user expectations are often challenged in their own time—for many users, surprising information eventually surfaces naturally in forms we previously mentioned, like a friend’s picture in a Facebook ad or banner ads that match their most recent purchase. This new information changes how the user feels about the company, about themselves and about their role in keeping their information private.

In my next post, I will explore what happens when users DO realize their privacy expectations have been violated. How do consumers react to this new information, and what does that mean for businesses trying to gain their trust?

Written By

Ilana Westerman


If you want to comment on this post, you need to login.

  • Cindy Compert Jun 11, 2013

    Ilana, very interesting article. Did you have more details on your research methodology? Any specific statistics you can share? 
  • Ilana Westerman Jun 19, 2013

    Cindy, our Trust:It™ Research Program has been running from 2007-2013 and we have conducted a number of different types of research including: 
    1. Qualitative methodologies -- Ethnography, usability studies, eyetracking, desirability studies, and longitudinal studies. 721 1:1 sessions 1 hour - 3 hours in duration; longitudinal studies 1 week - 3 months in duration.
    2. Quantitative methodologies:  Surveys and quantitative usability.  10344 respondents overall.


Board of Directors

See the esteemed group of leaders shaping the future of the IAPP.

Contact Us

Need someone to talk to? We’re here for you.

IAPP Staff

Looking for someone specific? Visit the staff directory.

Learn more about the IAPP»

Daily Dashboard

The day’s top stories from around the world

Privacy Perspectives

Where the real conversations in privacy happen

The Privacy Advisor

Original reporting and feature articles on the latest privacy developments

Privacy Tracker

Alerts and legal analysis of legislative trends

Privacy Tech

Exploring the technology of privacy

Canada Dashboard Digest

A roundup of the top Canadian privacy news

Europe Data Protection Digest

A roundup of the top European data protection news

Asia-Pacific Dashboard Digest

A roundup of the top privacy news from the Asia-Pacific region

Latin America Dashboard Digest

A roundup of the top privacy news from Latin America

IAPP Westin Research Center

Original works. Groundbreaking research. Emerging scholars.

Get more News »

IAPP Communities

Meet locally with privacy pros, dive deep into specialized topics or connect over common interests. Find your Community in KnowledgeNet Chapters, Sections and Affinity Groups.

IAPP Job Board

Looking for a new challenge, or need to hire your next privacy pro? The IAPP Job Board is the answer.

Join the Privacy List

Have ideas? Need advice? Subscribe to the Privacy List. It’s crowdsourcing, with an exceptional crowd.

Find a KnowledgeNet Chapter Near You

Talk privacy and network with local members at IAPP KnowledgeNet Chapter meetings, taking place worldwide.

Find more ways to Connect »

Find a Privacy Training Class

Two-day privacy training classes are held around the world. See the complete schedule now.

NEW! Raise Staff Awareness

Equip all your data-handling staff to reduce privacy risk, with Privacy Core™ e-learning essentials.

Online Privacy Training

Build your knowledge. The privacy know-how you need is just a click away.

The GDPR requires 75,000 DPOs

What’s the formula for DPO success? IAPP CIPP/E and CIPM training, certifications and our global privacy conferences.

Upcoming Web Conferences

See our list of upcoming web conferences. Just log on, listen in and learn!

Train Your Team

Get your team up to speed on privacy by bringing IAPP training to your organization.

Learn more »

CIPP Certification

The global standard for the go-to person for privacy laws, regulations and frameworks

CIPM Certification

The first and only privacy certification for professionals who manage day-to-day operations

CIPT Certification

The industry benchmark for IT professionals worldwide to validate their knowledge of privacy requirements

NEW! FIP Designation

Recognizing the advanced knowledge and issue-spotting skills a privacy pro must attain in today’s complex world of data privacy.

Certify Your Staff

Find out how you can bring the world’s only globally recognized privacy certification to a group in your organization.

Learn more about IAPP certification »

IAPP-OneTrust PIA Platform

Simplify privacy impact assessments with this cloud-based customizable platform - free to IAPP members!

72% say privacy is now a board-level concern

Find out more about privacy governance in the IAPP-EY Annual Privacy Governance Report 2016.

Privacy Vendor List

Find a privacy vendor to meet your needs with our filterable list of global service providers.

IAPP Communities

Meet locally with privacy pros, dive deep into specialized topics or connect over common interests. Find your Community in KnowledgeNet Chapters, Sections and Affinity Groups.

More Resources »

Time to Get to Work at the Congress

It's almost here! Thought leadership, a thriving community and unrivaled education...the Congress prepares you for the challenges ahead. Register now!

Plan for the Summit

The world’s premier privacy conference returns with the sharpest minds, unparalleled programs and preeminent networking opportunities. Registration opens December 19!

Intensive Education at the Practical Privacy Series

This year's Series spotlights Data Breach, FTC and Consumer Privacy, GDPR and Government privacy issues. It’s the education you need NOW. Early bird ends Nov. 4!

Speak at the Symposium

The call for speakers is open! The Symposium returns to Toronto this Spring and programming is now underway. Looking to share your privacy prowess? Submit by November 20!

Sponsor an Event

Increase visibility for your organization—check out sponsorship opportunities today.

More Conferences »

Become a Member

Start taking advantage of the many IAPP member benefits today

Corporate Members

See our list of high-profile corporate members—and find out why you should become one, too

Renew Your Membership

Don’t miss out for a minute—continue accessing your benefits

Join the IAPP»