{"id":10433,"date":"2018-02-21T09:00:53","date_gmt":"2018-02-21T14:00:53","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=10433"},"modified":"2020-02-26T19:00:05","modified_gmt":"2020-02-26T15:00:05","slug":"privacy-vs-relationships","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/privacy-vs-relationships\/10433\/","title":{"rendered":"When love backfires"},"content":{"rendered":"<p>We <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/give-me-your-money\/19208\/\" rel=\"noopener noreferrer nofollow\">often talk<\/a> about the <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/session-replay-scripts\/19301\/\" rel=\"noopener noreferrer nofollow\">importance of protecting<\/a> your personal data from other people. Modern technologies are great for sharing all sorts of things, but there\u2019s a flip side to the coin: keeping secrets is becoming increasingly difficult.<a href=\"https:\/\/me-en.kaspersky.com\/blog\/files\/2018\/03\/privacy-vs-relationships-featured-1.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/me-en.kaspersky.com\/blog\/files\/2018\/03\/privacy-vs-relationships-featured-1-1024x672.jpg\" alt=\"\" width=\"1024\" height=\"672\" class=\"aligncenter size-large wp-image-10434\"><\/a><\/p>\n<p>A recent <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/connected-love-privacy-report\/\" rel=\"noopener noreferrer nofollow\">global study<\/a> by Kaspersky Lab and the research company Toluna found that 8 out of 10 people agree that everyone should have their own personal space, and yet people are <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/nine-bad-online-habits\/20074\/\" rel=\"noopener noreferrer nofollow\">prone to oversharing<\/a> and not being vigilant about their private information.<\/p>\n<p>The boundaries of personal space are particularly blurred in romantic relationships. Our research shows that about half of all couples share passwords and PIN codes for their accounts and devices, and a quarter can unlock their partner\u2019s gadgets with their own fingerprint. What\u2019s more, a solid majority (70%) believes that a relationship is more important than privacy. Is that really the case? In this post, we\u2019ll divulge where excessive \u201cinformation intimacy\u201d can lead.<\/p>\n<p><strong><\/strong><\/p>\n<h2>Privacy for two<\/h2>\n<p><\/p>\n<p>Starry-eyed couples share access to their devices to show they have nothing to hide. A great way to build trust, right? But what will a guy think about frank messages about him between his girlfriend and her friends? And how annoying for both partners would it be if one finds out in advance about a Valentine\u2019s Day surprise! Would a photographer be able to explain to his beloved that an album full of younger models is for work, not pleasure? And could she convince him that she has no lingering feelings for an ex-classmate she\u2019s meeting up with tomorrow?<\/p>\n<p>Explanations will likely be needed: The study showed that about a third of respondents take a peek into their other half\u2019s virtual life every once in a while. And of those who start to harbor doubts about the future of the relationship, almost half turn to spying.<\/p>\n<p>Homegrown detectives occasionally get caught red-handed, resulting in a verbal shoot-out, or put their partner on the spot after stumbling across some compromising materials. One-third of respondents admitted to having quarreled after their other half saw information not intended for them.<\/p>\n<p><strong><\/strong><\/p>\n<h3>What if things go really pear-shaped?<\/h3>\n<p><\/p>\n<p>As you can see, blurring the boundaries of privacy does not make for a healthier relationship. Sometimes a tiff caused by a partner finding out something can lead to a breakup. What\u2019s more, our study showed that one in four has materials of an intimate nature (messages, photos, videos) on their sweetheart\u2019s device, and some trust their partner with financial and business data. After the split, all of this will likely remain in the possession of a potential enemy.<\/p>\n<p>A jilted lover may have revenge on their mind. Consequently, 12% of respondents make \u2014 or have thought about making \u2014 their partners\u2019 private information public, and just as many try to ruin their partners\u2019 gadgets. Post-breakup, approximately one in five continues to spy on their ex through social media accounts \u2014 forgetfulness or laziness make it unlikely that the passwords have been changed. And 10% of broken hearts confessed that they had spent an ex-partner\u2019s money online \u2014 probably in the grip of an emotional frenzy.<\/p>\n<p>Interestingly, it\u2019s mostly men who seek to punish former partners. About 17% of them post something private about their former partner after a breakup, and roughly the same number attempts to profit from their ex\u2019s personal data. Among women, the figures are 7% and 8%, respectively. But spying on a former partner is (slightly) more of a female thing: one-third admitted to doing so; the stat for men was 28%. At the same time, the fairer sex is slightly more inclined to wipe their gadgets of all reminders of past relationships.<\/p>\n<p><strong><\/strong><\/p>\n<h3>What to do?<\/h3>\n<p><\/p>\n<p>Both men and women are advised to be less trigger-happy about sharing personal information. Preserving your reputation and finances \u2014 and cordial relations with a former partner \u2014 isn\u2019t impossible. But remember that love doesn\u2019t mean sharing everything, especially when it comes to sensitive information. We recommend that budding soulmates follow a few simple rules:<\/p>\n<ul>\n<li>Set the boundaries of your personal space from the get-go. You each have information that only you should know. It\u2019s important that both of you understand that partners in a trusting relationship have secrets.<\/li>\n<li>Think carefully about which passwords you want to share with your other half, and which ones you don\u2019t. In the event of a breakup, don\u2019t forget to change the passwords your partner knows. Managing passwords is far easier with the help of a password manager \u2014 for example, <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/advert\/password-manager?redef=1&amp;THRU&amp;reseller=gl_kdaily_acq_ona_smm__onl_b2c_kasperskydaily_ban____kpm___\" rel=\"noopener noreferrer nofollow\">Kaspersky Password Manager<\/a>.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kpm-download\">\n<ul>\n<li>Don\u2019t leave compromising information on your partner\u2019s devices. Should they become an ex, make sure files are erased \u2014 and use File Shredder in <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/advert\/total-security-multi-device?redef=1&amp;THRU&amp;reseller=gl_socmed_pro_ona_smm__onl_b2c_kasperskydaily_lnk____ktsmd___\" rel=\"noopener noreferrer nofollow\">Kaspersky Total Security<\/a> to make sure the files can\u2019t be retrieved and used against you.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kts-trial\">\n","protected":false},"excerpt":{"rendered":"<p>We investigate how couples often neglect privacy \u2014 and the consequences.<\/p>\n","protected":false},"author":2484,"featured_media":10434,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1225,9],"tags":[2088,1672,1673,43,1674,700,97],"class_list":{"0":"post-10433","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-privacy","8":"category-tips","9":"tag-tips","10":"tag-connected-love","11":"tag-personal-information","12":"tag-privacy","13":"tag-relationships","14":"tag-research","15":"tag-security-2"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/privacy-vs-relationships\/10433\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/privacy-vs-relationships\/12591\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/privacy-vs-relationships\/14731\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/privacy-vs-relationships\/13045\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/privacy-vs-relationships\/12511\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/privacy-vs-relationships\/15386\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/privacy-vs-relationships\/15107\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/privacy-vs-relationships\/19768\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/privacy-vs-relationships\/21221\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/privacy-vs-relationships\/10044\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/privacy-vs-relationships\/8980\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/privacy-vs-relationships\/15967\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/privacy-vs-relationships\/9361\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/privacy-vs-relationships\/19645\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/privacy-vs-relationships\/19658\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/privacy-vs-relationships\/19675\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/privacy\/","name":"privacy"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/10433","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2484"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=10433"}],"version-history":[{"count":4,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/10433\/revisions"}],"predecessor-version":[{"id":16050,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/10433\/revisions\/16050"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/10434"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=10433"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=10433"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=10433"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}