By Jacob Blacksten
In an age of viral videos and AI-driven insights, small businesses often jump at the chance to reach new customers through engaging platforms. Yet amidst this excitement, data privacy concerns loom larger than ever. From TikTok’s looming ban to emerging competitors like RedNote and now the controversial AI solution DeepSeek, it’s vital to understand how these technologies handle the sensitive information that can make or break your business reputation.

TikTok: The Viral Sensation Under Scrutiny
TikTok’s rapid rise is remarkable. It offers small businesses a platform to connect with diverse audiences through engaging short-form videos. However, critics focus on what the app collects: names, emails, location data, biometric data, and detailed user behavior (likes, shares, and time spent on each video).
TikTok’s parent company, ByteDance, is headquartered in a jurisdiction with distinct regulatory practices, prompting concerns that government authorities could—according to some reports—gain access to users’ non-public data.
RedNote: Newcomer, Bigger Concerns
Many are turning to RedNote as the potential threat of a TikTok ban lingers. While it’s still establishing its reputation, it’s important to remember that all social media platforms rely on user data—and this one, in particular, stores its data abroad. The app’s terms and conditions are primarily in a language unfamiliar to many users, making it difficult to understand what data is being collected and how it’s being used.
DeepSeek: An AI Tool with Major Consequences
The latest AI tool, DeepSeek, has sparked serious concern. DeepSeek takes data collection to the next level. They not only collect data you provide but also anything they can automatically collect, as well as information from other sources. This includes:
- Personal data when setting up an account
- All data entered into the platform, including your text or audio input, prompt, uploaded files, feedback, chat history, or other content that you provide
- Device information, including model, operating system, keystroke patterns or rhythms, IP address, system language, unique device identifiers, and cookies.
- Tracking your usage across devices
While DeepSeek’s AI capabilities sound enticing, is it worth the risk that foreign government authorities may gain access to your non-public data?
Quick Steps to Protect Your Small Business
-
Collect Only What’s Necessary
The best way to protect sensitive data is not to gather it in the first place. If you do collect personal information, anonymize or encrypt it whenever possible. -
Lock Down Your Accounts
Use unique, strong passwords and enable multi-factor authentication (2FA) for all business profiles and AI software logins. -
Vet AI Providers
Whether it’s DeepSeek or another service, ask about their security certifications, data centers, and breach response protocols. If you get vague answers, think twice. -
Train Your Team
Employees can be a security weak link. Offer regular training on best practices for data handling and spotting phishing or scam attempts.
-
Collect Only What’s Necessary
Tools like TikTok, RedNote, and DeepSeek can supercharge your marketing, boost engagement, and drive sales. However, privacy and security must be at the top of everyone’s mind. By taking a proactive approach—limiting data collection, enabling strong security features, and vetting each platform’s background—you can harness modern technology without sacrificing the trust you’ve worked so hard to build.

About the Author
Jacob Blacksten
Jake is a University of Delaware graduate and holds three master’s degrees, MBA (2020), MS in Cybersecurity, and an MS in Business Analytics and Technology Management. Returning to Delaware after serving as a Digital Forensic Investigator in the Manhattan, NYC office of Stroz Friedberg. Jacob is skilled in a range of software and hardware platforms and the measures in which to secure them. With expertise in cybersecurity, database management, digital marketing, and finance, Jacob is passionate about technology. He holds two SANS GIAC certifications in both digital forensics and security essentials.