{"id":223208,"date":"2025-10-31T04:00:54","date_gmt":"2025-10-31T11:00:54","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=223208"},"modified":"2025-10-28T08:49:45","modified_gmt":"2025-10-28T15:49:45","slug":"frankenstein-data-how-data-brokers-stitch-together-and-sell-your-digital-self","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/frankenstein-data-how-data-brokers-stitch-together-and-sell-your-digital-self\/","title":{"rendered":"Frankenstein Data: How Data Brokers Stitch Together\u2014and Sell\u2014Your Digital Self"},"content":{"rendered":"<p>Your digital life is being stitched together\u2014one purchase, one search, one swipe at a time.<\/p>\n<p><strong>Data brokers collect and combine fragments of your personal information<\/strong> to build detailed profiles they can sell to advertisers, employers, and anyone willing to pay.<\/p>\n<p>While you <em>can<\/em> request that these brokers delete your data, <strong>many make it almost impossible to do so<\/strong>.<\/p>\n<p>A joint investigation by <em>CalMatters<\/em> and <em>The Markup<\/em> found that 35 data brokers had <strong>intentionally hidden their opt-out pages from search results<\/strong>, making it harder for people to remove their information.<\/p>\n<p>The result: a patchwork version of you exists online\u2014<strong>a Frankenstein of your data<\/strong>, stitched together without your consent.<\/p>\n<p>Moreover, practically anyone can purchase this sensitive info. That ranges from advertisers to law enforcement and from employers to anyone on the street who wants to know a lot more about you.<\/p>\n<p>Here\u2019s what\u2019s happening, and what you can do about it.<\/p>\n<h2><strong>Data brokers making it tougher to remove personal data from their sites <\/strong><\/h2>\n<p>As part of the article, reporters analyzed 499 data broker sites registered in the state of California. Of them, 35 had search-blocking code. Additionally per the article, many opt out pages \u201crequired scrolling multiple screens, dismissing pop-ups for cookie permissions, and newsletter sign-ups and then finding a link that was a fraction the size of other text on the page.\u201d<a href=\"#_edn1\" name=\"_ednref1\">[i]<\/a><\/p>\n<p>Once the publications contacted the data brokers in question, multiple companies halted the practice, some responding that they were unaware their site had search-blocking code. Several others didn\u2019t respond by the time the article was published and kept their practices in place.<\/p>\n<h2><strong>Where do data brokers get such personal info?<\/strong><\/h2>\n<p>There are several ways\u00a0information brokers\u00a0can get your info about you \u2026<\/p>\n<p><strong>Sources available to the public:<\/strong>\u00a0Some of your personal records are easily available to the public.\u00a0Data brokers\u00a0can collect\u00a0public records\u00a0like your\u00a0voter\u00a0registration records, birth certificate, criminal record, and even bankruptcy records.\u00a0By rounding them up from multiple sources and gathering them in one place, it takes someone seconds to find out all these things about you, rather than spending hours poring over public records.<\/p>\n<p><strong>Search, browsing, and app usage:<\/strong>\u00a0Through a combination of data collected from internet service providers (ISPs), websites, and apps, data brokers can get access to all kinds of activity. They can see what content you\u2019re interested in, how much time you spend on certain sites, and even your daily travels thanks to location data. They also use web scraping tools (software that pulls info from the web), to gather yet more. All this data collecting makes up a multi-billion-dollar industry where personal data is gathered, analyzed, sold, and then sold again and again\u2014all without a person\u2019s knowledge.<\/p>\n<p><strong>Online agreements:<\/strong>\u00a0As it is with smartphone apps, you\u2019ll usually have to sign an agreement when signing up for a new online service. Many of these agreements have disclosures in the fine print that give the company the right to collect and distribute your personal info.<\/p>\n<p><strong>Purchase history:<\/strong> Data brokers want to know what products or services you\u2019ve purchased, how you paid for them (credit card, debit card, or coupon), and when and where you purchased them. In some cases, they get this info from loyalty programs at places like supermarkets, drugstores, and other retailers. Kroger, one of the largest grocery chains, is a good example of how purchasing insights end up in the hands of others. According to Consumer Reports, the company draws 35% of its net income from selling customer data to other companies.<\/p>\n<h2><strong>What can I do about companies collecting my data?<\/strong><\/h2>\n<p>For starters, there aren\u2019t any data privacy laws on the federal level. That, so far, has fallen to individual states to enact. As such, data privacy laws vary from state-to-state, with California having some of the earliest and strongest protections on record, via the California Consumer Privacy Act (CCPA) and the California Privacy Rights Act (CPRA).<\/p>\n<p>In all, 20 states currently have comprehensive privacy laws in place, with five others that have put narrower privacy protections in place, covering data brokers, internet service providers, and medical\/biometric data.<\/p>\n<p><strong>States with Comprehensive Data Privacy Laws<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"134\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 California<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Virginia<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Colorado<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Connecticut<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Utah<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Iowa<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Indiana<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Tennessee<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Texas<\/td>\n<td width=\"160\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Florida<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Montana<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Oregon<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Delaware<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 New Hampshire<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 New Jersey<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Kentucky<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Nebraska<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Rhode Island<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>For specific laws in your state and how they can protect you, we suggest doing a search for \u201cdata privacy laws [your state]\u201d for more info.<\/p>\n<p>Even if your state has no or narrow data privacy laws in place, you still have several ways you can take back your privacy.<\/p>\n<h2><strong>How to protect your data from data brokers.<\/strong><\/h2>\n<p>The first thing you can do is keep a lower profile online. That can limit the amount of personal info they can get their hands on:<\/p>\n<ul>\n<li><strong>Be selective about what you share online.<\/strong>Don\u2019t overshare personal info on social media. Avoid things like online quizzes and sweepstakes. And be aware that some data brokers indeed scour the web with scraping tools that gather up info from things like forum posts.<\/li>\n<li><strong>Go private.<\/strong> Even better, lock down your privacy on social media. Social media platforms like Facebook, Instagram, and others have several settings that keep your profile from being scraped in the ways mentioned above. Features like our<\/li>\n<li><strong>Use a virtual private network (VPN) whenever possible.<\/strong>A VPN hides your IP address and encrypts your data while you surf the web. McAfee\u2019s\u00a0<a href=\"https:\/\/www.mcafee.com\/en-us\/vpn.html\">Secure VPN<\/a>\u00a0protects your\u00a0personal data\u00a0and\u00a0credit card\u00a0information so you can browse, bank, and shop online without worrying about prying eyes, like\u00a0data brokers and internet service providers (ISPs) that collect info about what you do online.<\/li>\n<\/ul>\n<h2><strong>Remove your info from data brokers quickly with McAfee.<\/strong><\/h2>\n<p>The list of data brokers is long. Cleaning up your\u00a0personal data\u00a0online can quickly eat up your time, as it requires you to reach out to multiple\u00a0data brokers\u00a0and opt out.<\/p>\n<p>Rather than removing yourself one-by-one from the host of data broker sites out there, you have a solution: our <a href=\"https:\/\/www.mcafee.com\/learn\/personal-data-cleanup\/?path=blogs\">Personal Data Cleanup<\/a>.<\/p>\n<p>Personal Data Cleanup scans data broker and people search sites and shows you which ones are selling your personal info. It also provides guidance on how you can remove your data from those sites. And if you want to save time on manually removing that info, you have options. Our <a href=\"https:\/\/www.mcafee.com\/en-us\/identity-theft\/family.html?path=blogs\">McAfee+ Advanced and Ultimate plans<\/a> come with full-service Personal Data Cleanup, which sends requests to remove your data automatically.<\/p>\n<p>If the thought of your personal info getting bought and sold in such a public way bothers you, our Personal Data Cleanup can put you back in charge of it.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Your digital life is being stitched together\u2014one purchase, one search, one swipe at a time. Data brokers collect and combine&#8230;<\/p>\n","protected":false},"author":1440,"featured_media":223388,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661],"tags":[],"coauthors":[16632],"class_list":["post-223208","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Frankenstein Data: How Data Brokers Stitch Together\u2014and Sell\u2014Your Digital Self | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Your digital life is being stitched together\u2014one purchase, one search, one swipe at a time. Data brokers collect and combine fragments of your personal\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Frankenstein Data: How Data Brokers Stitch Together\u2014and Sell\u2014Your Digital Self | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Your digital life is being stitched together\u2014one purchase, one search, one swipe at a time. Data brokers collect and combine fragments of your personal\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/frankenstein-data-how-data-brokers-stitch-together-and-sell-your-digital-self\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-31T11:00:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/10\/Frankenstein-Data-600x600-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Brooke Seipel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Brooke Seipel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/frankenstein-data-how-data-brokers-stitch-together-and-sell-your-digital-self\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/frankenstein-data-how-data-brokers-stitch-together-and-sell-your-digital-self\/\"},\"author\":{\"name\":\"Brooke Seipel\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/e0177129df164a74082f47397af3e729\"},\"headline\":\"Frankenstein Data: How Data Brokers Stitch Together\u2014and Sell\u2014Your Digital Self\",\"datePublished\":\"2025-10-31T11:00:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/frankenstein-data-how-data-brokers-stitch-together-and-sell-your-digital-self\/\"},\"wordCount\":1121,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/frankenstein-data-how-data-brokers-stitch-together-and-sell-your-digital-self\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/10\/Frankenstein-Data-600x600-1.jpg\",\"articleSection\":[\"Internet Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/frankenstein-data-how-data-brokers-stitch-together-and-sell-your-digital-self\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/frankenstein-data-how-data-brokers-stitch-together-and-sell-your-digital-self\/\",\"name\":\"Frankenstein Data: How Data Brokers Stitch Together\u2014and Sell\u2014Your Digital Self | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/frankenstein-data-how-data-brokers-stitch-together-and-sell-your-digital-self\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/frankenstein-data-how-data-brokers-stitch-together-and-sell-your-digital-self\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/10\/Frankenstein-Data-600x600-1.jpg\",\"datePublished\":\"2025-10-31T11:00:54+00:00\",\"description\":\"Your digital life is being stitched together\u2014one purchase, one search, one swipe at a time. Data brokers collect and combine fragments of your personal\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/frankenstein-data-how-data-brokers-stitch-together-and-sell-your-digital-self\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/frankenstein-data-how-data-brokers-stitch-together-and-sell-your-digital-self\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/frankenstein-data-how-data-brokers-stitch-together-and-sell-your-digital-self\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/10\/Frankenstein-Data-600x600-1.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/10\/Frankenstein-Data-600x600-1.jpg\",\"width\":600,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/frankenstein-data-how-data-brokers-stitch-together-and-sell-your-digital-self\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Frankenstein Data: How Data Brokers Stitch Together\u2014and Sell\u2014Your Digital Self\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/e0177129df164a74082f47397af3e729\",\"name\":\"Brooke Seipel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/ac03c1083bbdcd2cbb0675dc29c62cbe\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg\",\"caption\":\"Brooke Seipel\"},\"description\":\"Brooke Seipel is the Content Editor in Chief at McAfee, where she leads the company's content strategy with a focus on cybersecurity education. With a decade of experience in audience development and digital content, Brooke has a strong understanding of online audiences, emerging trends, and the evolving cyber landscape. Before joining McAfee, Brooke led audience teams and served as both a reporter and editor at numerous award-winning publications including Fortune, The Hill, International Business Times, New Republic, and The OC Register. Brooke is dedicated to providing insightful, actionable content that empowers readers to make informed decisions about their digital safety. When she's not immersed in the world of cybersecurity, you can find her scrolling social media endlessly, soaking up the latest trends, and also volunteering as a naturalist.\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/brooke-seipel\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Frankenstein Data: How Data Brokers Stitch Together\u2014and Sell\u2014Your Digital Self | McAfee Blog","description":"Your digital life is being stitched together\u2014one purchase, one search, one swipe at a time. Data brokers collect and combine fragments of your personal","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Frankenstein Data: How Data Brokers Stitch Together\u2014and Sell\u2014Your Digital Self | McAfee Blog","og_description":"Your digital life is being stitched together\u2014one purchase, one search, one swipe at a time. Data brokers collect and combine fragments of your personal","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/frankenstein-data-how-data-brokers-stitch-together-and-sell-your-digital-self\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2025-10-31T11:00:54+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/10\/Frankenstein-Data-600x600-1.jpg","type":"image\/jpeg"}],"author":"Brooke Seipel","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Brooke Seipel","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/frankenstein-data-how-data-brokers-stitch-together-and-sell-your-digital-self\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/frankenstein-data-how-data-brokers-stitch-together-and-sell-your-digital-self\/"},"author":{"name":"Brooke Seipel","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/e0177129df164a74082f47397af3e729"},"headline":"Frankenstein Data: How Data Brokers Stitch Together\u2014and Sell\u2014Your Digital Self","datePublished":"2025-10-31T11:00:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/frankenstein-data-how-data-brokers-stitch-together-and-sell-your-digital-self\/"},"wordCount":1121,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/frankenstein-data-how-data-brokers-stitch-together-and-sell-your-digital-self\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/10\/Frankenstein-Data-600x600-1.jpg","articleSection":["Internet Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/frankenstein-data-how-data-brokers-stitch-together-and-sell-your-digital-self\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/frankenstein-data-how-data-brokers-stitch-together-and-sell-your-digital-self\/","name":"Frankenstein Data: How Data Brokers Stitch Together\u2014and Sell\u2014Your Digital Self | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/frankenstein-data-how-data-brokers-stitch-together-and-sell-your-digital-self\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/frankenstein-data-how-data-brokers-stitch-together-and-sell-your-digital-self\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/10\/Frankenstein-Data-600x600-1.jpg","datePublished":"2025-10-31T11:00:54+00:00","description":"Your digital life is being stitched together\u2014one purchase, one search, one swipe at a time. Data brokers collect and combine fragments of your personal","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/frankenstein-data-how-data-brokers-stitch-together-and-sell-your-digital-self\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/frankenstein-data-how-data-brokers-stitch-together-and-sell-your-digital-self\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/frankenstein-data-how-data-brokers-stitch-together-and-sell-your-digital-self\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/10\/Frankenstein-Data-600x600-1.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/10\/Frankenstein-Data-600x600-1.jpg","width":600,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/frankenstein-data-how-data-brokers-stitch-together-and-sell-your-digital-self\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"Frankenstein Data: How Data Brokers Stitch Together\u2014and Sell\u2014Your Digital Self"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/e0177129df164a74082f47397af3e729","name":"Brooke Seipel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/ac03c1083bbdcd2cbb0675dc29c62cbe","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg","caption":"Brooke Seipel"},"description":"Brooke Seipel is the Content Editor in Chief at McAfee, where she leads the company's content strategy with a focus on cybersecurity education. With a decade of experience in audience development and digital content, Brooke has a strong understanding of online audiences, emerging trends, and the evolving cyber landscape. Before joining McAfee, Brooke led audience teams and served as both a reporter and editor at numerous award-winning publications including Fortune, The Hill, International Business Times, New Republic, and The OC Register. Brooke is dedicated to providing insightful, actionable content that empowers readers to make informed decisions about their digital safety. When she's not immersed in the world of cybersecurity, you can find her scrolling social media endlessly, soaking up the latest trends, and also volunteering as a naturalist.","url":"https:\/\/www.mcafee.com\/blogs\/author\/brooke-seipel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/223208","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1440"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=223208"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/223208\/revisions"}],"predecessor-version":[{"id":223420,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/223208\/revisions\/223420"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/223388"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=223208"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=223208"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=223208"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=223208"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}