Week after week, thieves break into corporate computer systems to steal customer lists, email addresses and credit card numbers. Large data breaches get overshadowed by even larger ones.
Yet people are turning over personal information to online retailers, social networks and other services in growing numbers. The point at which people lose trust in the websites they deal with appears further away than ever before, if it exists at all, as shopping, socializing and gaming online becomes deeply embedded in modern life.
People have come to accept that sharing information is the price of a meaningful, connected life online — even if they don't like it.
"We are clearly schizophrenic about this technology," said Jim Dempsey, an expert on Internet privacy at the Center for Democracy & Technology. "We love it, we use it, we expect it to work, and we've woven it into our daily lives, professionally, socially and personally. But we really don't trust it, and we do get upset when our data is lost or stolen."
Companies collecting the personal details have little incentive to offer the best privacy protections. So far, people haven't demanded that companies do better by walking away from their gadgets, online retailers or social networks.
The South Florida banker said he buys almost everything online, despite the fact that hackers got into both his iTunes and Amazon accounts in the past few months.
Jim Pachetti, 47, a laid-off carpenter looking at an iPhone at an Apple store outside Buffalo, N.Y., said he's resigned to the fact that breaches happen.
"I've accepted the fact that all my information is out there and someone has it, and that's just the way it is," he said.
James McCartney, an identity theft expert, said his smartphone has become an integral part of his life and business, despite the security concerns.
"The velocity of business precludes me from going without it," he said. "It's the rules of the game. It's not something I can change."
"For many companies, it's easier and cheaper to deal with the repercussions of a data breach that's already occurred, rather than taking steps to prevent it," said Ioana Rusu, regulatory counsel for Consumers Union, publisher of Consumer Reports. "Companies need to be held accountable so they protect your data up front."
Information that distinguishes one faceless Internet surfer from another is so valuable that companies have been hurt when they limit what they collect.
Yahoo Inc., for example, will soon keep logs on people's searches for 18 months, the same amount of time as Google Inc. That's a reversal of its vow in late 2008 to strip out personally identifiable details after 90 days. In making an industry-leading privacy pledge, Yahoo said it became less competitive in offering personalized services enabled by long-term tracking.
Companies also face lawsuits and penalties by promising more than they can deliver. If companies are vague, their biggest risk is bad publicity when a hacking attack or a technical error exposes customers' information.
"The lack of meaningful liability for breaches reduces the incentive for making sure that they don't happen," said Susan Grant, director of consumer protection for the Consumer Federation of America.
Businesses only have to be as good as their competitors. They know customers have nowhere else to go as long as everyone sets the bar low.
The number of records exposed in data breaches is staggering — more than half a billion in the past six years, according to the Privacy Rights Clearinghouse.
At the same time, people are sharing more online. More than half a billion people are on Facebook, and billions of people search Google and Yahoo each month and accept tracking data files known as cookies. The Pew Internet & American Life Project found that 61 percent of adult Internet users in the U.S. have used social networks, up from less than a third in 2008.
When they aren't sharing on social networks, they are leaving their marks with online gaming services, shopping sites and retail loyalty programs.
The dependence on technology explains why the reputations of technology companies are remarkably resilient, even after embarrassing breaches.
For example, hackers last year uncovered a security hole on AT&T Inc.'s website and exposed the email addresses of more than 100,000 iPad owners who had signed up for AT&T's wireless Internet service. At that point, Apple had sold more than 2 million iPads. Despite the breach, the company sold some 17 million more iPads since then.
Apple CEO Steve Jobs emerged Thursday from medical leave to try to quash a controversy over secret recordings of location information by iPhones. Apple denied directly tracking people, but said it is building a database of known Wi-Fi hot spots and cell towers to improve location-based services. Google Inc.'s Android phones do something similar.
Apple's disclosure came a day after Sony Corp. said a hacker may have stolen credit card numbers and other valuable information on the 77 million players using its PlayStation online gaming network. That would make it one of the biggest known credit card breaches.
A few weeks ago, a little-known company behind the email campaigns of Chase, Best Buy, Hilton, Walgreens and other big brands revealed that potentially millions of names and email addresses of consumers were stolen. Epsilon sends more than 40 billion emails a year on behalf of those brands for services such as customer loyalty programs.
Other big attacks included some 130 million card numbers stolen from payment processor Heartland Payment Systems in 2008 and as many as 100 million accounts lifted in a break-in at TJX Cos. in 2005 and 2006. Many smaller ones go unpublicized.
Consumers are at a disadvantage because companies often leave their privacy policies intentionally vague, yet lengthy with legalese.
In any case, few people bother to read them at all. Carnegie Mellon University researchers found it would take the average person 40 minutes per day to read through all the privacy policies that person encounters online.
"Sadly, the consumer can do absolutely nothing to protect themselves," said Bruce Schneier, a prominent security blogger and chief security technology officer at the British telecommunications operator BT. "When you give your data to someone else, you are forced to trust them."