Close Menu
    Facebook X (Twitter) Instagram
    Trending
    • 5 Active Malware Campaigns in Early 2025: What You Need to Know
    • 10 Critical Network Pentest Findings IT Teams Overlook
    • Report Phishing Instantly with PhishAlarm
    • Password Reuse Epidemic: Nearly Half of User Logins Compromised
    • Women in Cybersecurity: Interest, Exposure, or Just Stereotypes??
    • Stay Ahead of Scammers in 2025
    • Cybersecurity Alert: Risks of Abandoned Websites
    • DHS Unveils Playbook for the Deployment of Artificial Intelligence for the Public Sector
    Fordham University Information Security and Assurance
    • Information Security and Assurance Homepage
    • Privacy Blog
    • About
    Fordham University Information Security and Assurance
    You are at:Home»Security Awareness»Privacy and Security Risks of TikTok
    Security Awareness

    Privacy and Security Risks of TikTok

    By Jason Benedict, CISSP, CISM, C|CISOAugust 3, 2023Updated:October 19, 20234 Mins Read
    TikTok logo on phone
    Photo by Geri Tech from Pexels
    Share
    Facebook Twitter LinkedIn Pinterest Copy Link

    There has been extensive media coverage of TikTok privacy concerns. However, most social media platforms worldwide collect, use, analyze and ultimately profit from users’ personal data. TikTok argues that it collects less data than platforms such as Facebook or Google since it doesn’t track user activity across devices.

    Data Collection: TikTok, like other social media platforms, collects a vast amount of data from its users, including user content, your IP address, geolocation-related data, unique device identifiers, browsing history, and more.

    Data Storage and Transmission: TikTok’s parent company, ByteDance, is based in China, which has raised concerns about the potential for the Chinese government to access this data due to China’s data security laws. However, TikTok has stated that data on most American users is stored in the United States and Singapore, with strict access controls.

    Algorithmic Transparency: TikTok uses algorithms to suggest personalized content to users. While this is not a risk in and of itself, the lack of transparency about how these algorithms work and what data they use can raise concerns about the potential misuse of personal data and the potential spread of misinformation.

    Potential for Misinformation and Manipulation: The possible spread of misinformation and the opportunity for manipulation, while not strictly a data security risk, is a concern tied to the use of social media platforms, including TikTok. The platform’s algorithms can create echo chambers where users are exposed to increasingly extreme content, and there is potential for malicious actors to spread misinformation or manipulate user opinion.

    Potential for Data Leaks: As with any digital platform, there is a risk of data leaks or breaches, where hackers could potentially gain access to personal data. While TikTok has not had a published significant data breach, the potential for such a breach exists.

    Third-Party Data Sharing: TikTok’s privacy policy allows for data to be shared with third parties, which raises concerns about how this data could be used. Users do not have clear visibility or control over where their data goes after it has been shared with third parties.

    The risks stated are vastly similar to those for nearly all other Social Media platforms that are “free” for use. Other tech companies have data-harvesting business practices that also exploit user information.

    “If policymakers want to protect Americans from surveillance, they should advocate for a basic privacy law that bans all companies from collecting so much sensitive data about us in the first place, rather than engaging in what amounts to xenophobic showboating that does exactly nothing to protect anyone,” said Evan Greer, director of the nonprofit advocacy group Fight for the Future.

    Privacy

    Like many other social networking platforms, such as Facebook, TikTok collects a lot of information about its users, including:

    • Every TikTok video you watch and how long you watch them
    • The entire contents of every message you send through the app since messages are not encrypted
    • Your country location, internet address, and type of device you are using

    With your permission, it also captures:

    • Your exact location
    • Your phone’s contacts and other social network connections
    • Your age and phone number
    • Payment information

    This information can be used to build up a picture of you for ad targeting purposes – by understanding who you are, who your friends and family are, what you like and find entertaining, and what you say to your friends. To use the app, users grant access to their microphone and camera. If you create videos, the app captures close-ups of your face. Potentially, this provides biometric data which could be used in conjunction with other images of you which exist online. TikTok uses technical measures to encode its activity. This means that some of what it does is hidden from external researchers. TikTok says this is to disrupt hackers and other malicious actors.

    Security

    Much of the commentary around TikTok security issues focuses on the extent to which the app may share or be forced to share any data it collects with the Chinese government. TikTok has steadfastly maintained that it does not share its data in this way. According to the New York Times, the CIA reportedly investigated TikTok and found no concrete evidence that Chinese intelligence authorities were spying on users.

    TikTok US Terms of Service effective July 31, 2023

    Share this:

    • Click to share on X (Opens in new window) X
    • Click to share on Facebook (Opens in new window) Facebook
    • Click to share on LinkedIn (Opens in new window) LinkedIn

    Like this:

    Like Loading...
    News and Events Security Awareness
    Previous ArticleScam Email – Research Job Opportunity
    Next Article Malware Camping and Tagging Call of Duty Players

    Related Posts

    5 Active Malware Campaigns in Early 2025: What You Need to Know

    10 Critical Network Pentest Findings IT Teams Overlook

    Report Phishing Instantly with PhishAlarm

    Follow Us on Twitter!
    Follow @FordhamSecureIT
    My Tweets
    Archives
    Categories
    • AI (1)
    • Alerts (384)
    • CISO (19)
    • Cyber Security Awareness Month Tip (150)
    • Data Privacy Week (2)
    • Executive Director (1)
    • Exploits and Vulnerabilities (35)
    • General Information (34)
    • Identity and Access Management (12)
    • Identity Theft (26)
    • Jason Benedict (19)
    • Legitimate Email (14)
    • Malicious Email (24)
    • Mobile (25)
    • Network Security (2)
    • News and Events (143)
    • Newsletter (13)
    • Password (17)
    • Phishing (333)
    • Phishing Email (340)
    • Privacy (10)
    • Ransomware (9)
    • Scam (104)
    • Security Awareness (262)
    • Security Guides (34)
    • Social Engineering (12)
    • SPAM (40)
    • Suspicious (6)
    • Telework (2)
    • Teleworking (3)
    • Trojan (7)
    • Uncategorized (9)
    • Virtual Meeting (4)
    • Virus (28)
    • Viruses (8)
    • World Backup Day (1)
    • Zoom (6)
    Tag Cloud
    Alerts Artificial Intelligence Backups cell phones CISO Cybersecurity Awareness Month Tip Cybersecurity Month Data Privacy Device email Exploits and Vulnerabilities fordham fraud Identity and Access Management Identity Theft Information Security Guides Jason Benedict Legitimate Email malicious email Mobile Multi-Factor Authentication networks Network Security News and Events Newsletter online safety Online Shopping Password Phishing Phishing Email Privacy ransomware scam scams Security Awareness social engineering Social Media spam trojan Virus Viruses Wireless wire transfer scam World Backup Day zoom
    About
    About

    Founded in 1841, Fordham is the Jesuit University of New York, offering exceptional education distinguished by the Jesuit tradition to more than 15,100 students in its four undergraduate colleges and its six graduate and professional schools.

    Copyright © Fordham University
    Facebook X (Twitter) Instagram YouTube LinkedIn
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    %d