top of page
  • Writer's pictureEvo-user

The Hidden Costs of Discounts: A Cautionary Tale on Data Privacy.

In our fast-paced digital age, it's all too easy to exchange our personal information for the allure of small discounts and special offers. But is it worth it? Let me share a recent experience that underscored the importance of being vigilant about data privacy.

The Tempting offer

A few days ago, I visited a local store to purchase a motorcycle accessory. After making my selection, I proceeded to the billing counter, ready to complete my purchase. As I handed over my items to the sales executive, she mentioned a tempting offer: a 10% discount on my total bill if I downloaded their app.

The App Investigation

Intrigued by the prospect of saving some money, I took out my smartphone and browsed the Google Play Store to locate the app. Before downloading, I decided to check the app's data collection and security practices. This is where things took a turn for the worse.

Data Collection and Security Practices

As I delved into the app's details, I discovered several concerning points:

We can clearly see the snapshot of what type of information is being collected by the app from our device.

Further more, when i expanded the details in this section, we can see a more detailed view of the data security practices and data collection by this application.

Data Collection: The app collected a vast amount of personal information, including my name, contact details, and even access to my phone's storage.

Lack of Data Encryption: Shockingly, the data was not encrypted. This means that any data transmitted or stored by the app could potentially be accessed by unauthorized parties.

Data Deletion Policy: Even more alarming was the fact that the data could not be deleted upon request. Once the information was in their system, it stayed there indefinitely.

Understanding the Risks

Lack of Encryption

  • Data Breaches: Unencrypted data is highly vulnerable to breaches. Hackers can easily access and exploit sensitive information, leading to identity theft, financial fraud, and other malicious activities.

  • Interception: Without encryption, data transmitted over networks can be intercepted by cybercriminals. This is particularly risky when using public Wi-Fi or other unsecured connections.

  • Unauthorized Access: Unencrypted data stored on servers or devices can be accessed by anyone with physical or network access to those systems, leading to potential misuse of personal information.

Irretrievable Data

The inability to delete collected data poses significant privacy concerns:

  • Permanent Exposure: Once your data is collected and stored, the inability to delete it means that it remains accessible indefinitely. This permanent exposure increases the likelihood of misuse or unauthorized access over time.

  • Data Misuse: Organizations may use or sell your data for purposes beyond your initial consent. This can include targeted advertising, profiling, or even sharing data with third parties without your knowledge.

  • Regulatory Compliance: Many regions have strict data protection regulations, such as the GDPR in the European Union, which grant individuals the right to request the deletion of their data. Companies that do not comply with these regulations risk legal repercussions and damage to their reputation.

The Takeaway

This experience serves as a crucial reminder: always scrutinize the data collection and security practices of any app before downloading it. Here are a few tips to keep in mind:

  • Read Privacy Policies: Take the time to read the app's privacy policy. Look for information on what data is collected and how it is used.

  • Check for Encryption: Ensure that any data you provide is encrypted. This protects your information from being accessed by unauthorized parties.

  • Understand Data Deletion Policies: Verify that you can request the deletion of your data if you no longer wish for the organization to have access to it.

  • Evaluate the Need: Consider whether the benefits of the app outweigh the potential risks to your privacy. Sometimes, a small discount isn't worth the compromise.

Practical Tips for Protecting Your Privacy

Given the risks highlighted, here are some practical tips to help you protect your privacy in similar scenarios:

  • Read Privacy Policies Thoroughly: Before downloading any app, read its privacy policy carefully. Look for information on what data is collected, how it is used, and with whom it is shared.

  • Check for Data Encryption: Ensure the app uses encryption to protect your data. This is often mentioned in the app's security practices or privacy policy.

  • Evaluate Data Deletion Policies: Verify that you can request the deletion of your data. Apps that do not allow data deletion pose a significant risk to your privacy.

  • Use Minimal Data Sharing: Only provide the minimum amount of information necessary. Avoid apps that ask for excessive permissions or data that seem irrelevant to their function.

  • Avoid Public Wi-Fi: When accessing apps that handle sensitive data, avoid using public Wi-Fi. Use a secure, private connection instead.

  • Regularly Review App Permissions: Periodically review the permissions granted to apps on your device and revoke any that seem unnecessary.

  • Consider Alternative Discounts: Sometimes, stores offer similar discounts through membership cards or email sign-ups that do not require extensive personal information.

  • Stay Informed: Keep yourself updated on data privacy trends and best practices. Being aware of potential risks and how to mitigate them is your best defense.


In an era where data breaches and privacy concerns are increasingly common, it's essential to be proactive about protecting your personal information. My experience at the store was a valuable lesson in the hidden costs of discounts. By staying informed and vigilant, we can make smarter decisions that safeguard our data privacy.

Remember, your personal information is priceless. Don't trade it away for a mere 10% discount. Stay safe, stay informed, and always prioritize your data privacy.

43 views0 comments


Post: Blog2_Post
bottom of page