Technology in terms you understand. Sign up for the Confident Computing newsletter for weekly solutions to make your life easier. Click here and get The Ask Leo! Guide to Staying Safe on the Internet — FREE Edition as my thank you for subscribing!

Got Privacy?

AOL’s terms of service which had it’s users “baring all” whether or not they wanted to, what privacy to expect, and what steps you might want to take.

Become a Patron of Ask Leo! and go ad-free!

Listen to the Podcast: Got Privacy?


AOL was recently called to task for wording in it’s terms of service for AOL Instant Messenger that included the phrase “You waive any right to privacy.” Now, AOL quickly backpeddled and said that the phrase was meant for information posted publicly, but it does raise a good question…

How much privacy can you expect?

The reality is that, whether it’s explicit in the terms of service or not (and it usually is), any ISP, mail, chat or instant messaging provider has the ability to look at every message it handles. And in fact they usually can be required to provide it all to law enforcement in response to a warrant. Now, given the sheer volume of messages that are traveling across these systems, it’s unlikely that any of us are important enough to gain their interest, but still … they could.

In the corporate setting things are much clearer and much worse. Companies take the position that since they own their computers, as a result they own the communications that go to and from them. They have every ability, and currently every right, to monitor your email, IM conversations and more, when you use their equipment. Your privacy ends where your paycheck begins.

And I haven’t even touched on spyware.

So what’s a person to do? I’d start with three things:

First: Relax. Unless you’re breaking the law or involved in highly secret work of some sort, or maybe if you pissed off your local computer geek, chances are no one really cares what you’re saying. Sorry to say it, but you’re probably just not that important.

Second: Use common sense. Don’t sent corporate or highly personal secrets over public networks and services. If you must, make sure that it’s encrypted in some way.

Finally: Run a spyware scan regularly. All the caution in the world does you nothing if someone’s installed a keystroke logger or other spying software directly on your machine.

I’d love to hear from you. This is article #3738 – to leave a comment, go to, enter 3738 in the go to article number box, and add your comments to the discussion.

This is a presentation of, a free on-line technical question and answer service. Hundreds of technical questions and their answers are posted online and ready to help solve your computer problems. * New questions and answers are added daily.


Do this

Subscribe to Confident Computing! Less frustration and more confidence, solutions, answers, and tips in your inbox every week.

I'll see you there!

Leave a reply:

Before commenting please:

  • Read the article.
  • Comment on the article.
  • No personal information.
  • No spam.

Comments violating those rules will be removed. Comments that don't add value will be removed, including off-topic or content-free comments, or comments that look even a little bit like spam. All comments containing links and certain keywords will be moderated before publication.

I want comments to be valuable for everyone, including those who come later and take the time to read.