The document discusses information security and internet snooping. It defines security and notes that security risks can come from many sources like fire, theft, or loss. It then explores how technology like the internet, mobile devices, and digitization of information has expanded security risks, especially around personal information theft and exposure. The document outlines the many ways personal information can be collected, from public records to social media to purchases. It also discusses how collected information can be used, sold to third parties, or exposed. Finally, it provides some security best practices around awareness, limiting exposure, securing devices and networks, and establishing security policies.