Show Notes: You may not have been around when your ancestors lived, but there were witnesses to the important events in their life. Genealogist Robyn Smith shares her 3 step process from her new Family Tree Magazine article called Witness Testimony.
Pin it on Pinterest! Free Genealogy Video
Get ready to find out how the witnesses named on your ancestors’ records can help you bust brick walls in your genealogy research!
Watch the Video Interview
Show Notes
(This interview has been minimally edited for clarity) Downloadable ad-free handout with time stamps and links. (Premium Membership required)
Why You Should be Researching Witnesses
Lisa: I learned a lot from your article in family tree magazine. And I wanted to chat with you a little bit about that, because I think researching our ancestors’ witnesses is fascinating, and it’s something that people don’t always think about. We may focus on the names we recognize and not so much on the ones that we don’t. I’d love to have you give your “elevator speech” if you will, as to why people should be taking the time to research witnesses.
Robyn: Most of us in the genealogy community eventually hear about this thing called “cluster research”. We hear this phrase, the FAN club that genealogist Elizabeth Shown Mills describes, where we take a look at the Friends, Associates and Neighbors of our ancestors. I would consider witnesses and bondsman in that FAN club, in that cluster.
Simply put, witnesses can help us find more family. That’s the benefit of researching these individuals and the records in which they find them. We can break through some brick walls. And this type of research can also tell us about the community ties and some of the customs in that time and place. So, witnesses and bondsman are always my secret research strategy.
What is a Bondsman?
Lisa: You mentioned bondsman, and that might be a new term for some folks. We might be used to seeing perhaps an immigration record or a birth record, and we see witness. What is a bondsman?
Robyn: This is one of those terms in genealogy that has a slightly different meaning historically than it does today. By bondsman we just mean someone who pledges a sum of money as a bond for another. Sometimes in these records, we might see that they’re called a Surety. You might see that term used. The difference between that and a witness is that there’s a financial obligation involved. I always try to tell people, it’s similar to cosigning a loan today. Most of us would probably not cosign a loan for people that we didn’t trust or that we didn’t know very well. And so, if you can keep that concept in your mind, that’s the value and the benefit of researching those witnesses and bondsman.
Lisa: Yes, when there’s a financial tie, there’s some kind of relationship there. And I guess if we can research them, that might lead us back to even more records about our own ancestor.
Genealogical Records that Include Witnesses
What kind of records will we find them in? In what type of records are we going to find witnesses and even more specifically, this term bondsman?
Robyn: The big one we think of, of course, is marriage bonds. We hear that phrase a lot. We may see them in marriage records, almost all deeds are going to have some sort of witness involved, and wills. Also, in probate records we will see executors and administrators often have to have bonds. If you’re going to serve as guardian to someone, typically, that person has to have a bond as well. And so those are sort of the big ones.
We can also think of court cases, civil court cases when you’re trying to secure someone’s appearance at a future court meeting. And I actually have seen the courts go after that bondsman if that person doesn’t show up. So, some of these records can get pretty juicy.
And of course, I think a lot of us are probably familiar with pension, military pension records and southern claims.
The only thing that I would caution people to watch out for is sometimes the witness is really just the county clerk, a local lawyer or local justice of the peace. So, it’s in researching that witness or that bondsman that you’ll find out the relationship if there is any, to the person of interest that you’re researching.
Lisa: That’s a really good point.
The Goal of Researching Witnesses in Records
Do you go after witnesses primarily because you’re wondering if they are related? Or is it also about that FAN principle where they may not be related, but researching them might actually lead me to more records about my own ancestor because of their will, depending on what the relationship was? Do both of those play into the way you approach them?
Robyn: I would say both. I’m actually really excited when I see a witness or bondsman because the curiosity serves you very well, in genealogical research, as we know. It’s a good thing to be a nosy genealogist. I want to know, why is that person there? That’s the question that I’m trying to answer. And more than a few times, it has led me to more family that I didn’t know about, particularly if that individual had a different surname.
Now, another gotcha is that sometimes they end up in the records with just their initials. So, we first have got to confirm who that person is before we’re ready to say that they’re related to our person of interest. So, there are some cautions that we may need to be aware of as we’re doing this research. But it’s another stone to overturn as you’re doing your research. And I love it when I see a person listed in a record. I’m excited!
Lisa: Me too! I feel like oh, my gosh, I finally have another avenue that I can pursue, particularly in a brick wall situation.
3 Step Process for Researching Witnesses
In the article, you provide a three-step research process. Will you walk us briefly through that process?
Step 1: Transcribe the Document
Robyn: The first thing that I do when I find a document concerning my ancestor that has a witness or bondsman, is to transcribe the document. I want to make sure that we all are comfortable with the practice of transcribing. Transcription ensures that you are actually reading every single word in that document. It’s going to help you notice all of the details that you might miss if you are just looking at it in its current format.
There are a lot of great free tools available to us for transcribing. There’s GenScriber, or there’s Trint. I would also recommend Family Tree Magazine’s cheat sheet on reading old handwriting. That becomes very handy when you’re doing this transcription.
Step 2: Do the Research
The second step is to then do the research. I always say you want to research in a variety of records. I actually research the person as if they were my ancestor already. That means I’m looking in census records and deed records and court records and everything else trying to establish who this person is. And the things that we learn along the way, are not just that this person is in this time and place, which is very important to us as genealogists, but it also gives us a hint as to how old the person was. It also gives us a hint about their literacy in terms of whether they sign with their mark or whether they sign with a signature. It is in this second step, doing the deep research, that you probably will uncover whether or not the person is related to your family.
Step 3: Research the Law
The third step is to research the laws because as we know, laws governed everything about the sources that we use a genealogy. They’re going to govern who can serve as a witness and a bondsman, how old that person has to be, and also how many were necessary.
We need to be aware that these laws are going to differ from state to state or colony or a locale and also throughout time. I look at the published date laws that I can find in databases like Internet Archive and Hathi Trust and Google Books but you and also visit your local library, law library, or archive. You may have to do some deep digging.
Those are the three steps that I recommend: transcribe the document, research the individuals you find, and make sure that you research the laws.
Lisa: Fantastic advice!
The Power of Transcribing Genealogy Records
I’d love to ask you a little bit more about transcription because I think that is a step that can be tempting to skip. People think, oh, well, I read it, I want to get going! I want to add people to my tree, and they are tempted to not take the time to transcribe. Will you tell us a little bit more about transcription? Why should we take that time? And what are we looking for, instead of just typing the words?
Robyn: Transcription to me is one of the basics of one of the basic genealogical skills I think we need to master in order to be successful, particularly once we start going back further in time and encountering those much more complicated problems. And it’s one of those basics that will remind you, if you don’t do it over and over again, that there’s a reason why it’s recommended in genealogy.
I can’t tell you how many phrases I’ve realized that I don’t fully understand as I’m transcribing. And Step one is to understand what that document is telling you. So, if there’s a phrase that I come across, I might email an archivist, or I might call one of my genealogy friends who’s got a little bit more experience in that particular time and place. Transcribing helps us to do that, and it helps us to understand.
When I transcribe, I also typically turn it into an abstract. I’m also making sure that I do a citation. So, to me, those are the building blocks of successful genealogical research.
I would also include keeping a research log and have a research plan. Those to me are very critical research building blocks to long-term success in genealogy.
I understand the impulse to want to skip transcribing. But I can tell you over and over again that I come across phrases that I thought I knew, but once I’m transcribing it, I really realized that I don’t. There are lots of wonderful webinars and classes that you can take on transcription that can teach you simple rules when you’re transcribing, and they’re easy to learn. They’re not complicated rules. And I think that once you start doing it, you’ll get more comfortable with the process. It will really become second nature.
I hope that I can encourage everyone with our conversation to do more of that transcribing. I did a lot of it earlier, not necessarily knowing or understanding all the rules, and now I’m going back and sort of revisiting those documents. It’s always amazing when things will jump out at you that you didn’t notice before, or it just didn’t resonate.
I always recommend having a genealogy buddy. You can say to them, hey, can you take a look at this and tell me what you see? You can have a fresh set of eyes look at it and ask you a question. I’m a genealogy junkie, so I find all of this really, really exciting to me. I kind of lean into it. We’ve all got other things to do in our lives. I try to do an hour here and there; it might be an hour this weekend. But I’m sort of just always working towards a goal. And that transcription, I tell you, that’s a key first step!
Witness Research Example
Lisa: I don’t mean to put you on the spot, but do you have a witness story or just something that you spotted that you just would love to share with us?
Robyn: I do! My mother’s family, my maternal family is from Tennessee. I was researching my second great-grandfather, Mike Fenricks in Tennessee, where he lived. Almost every source in his life asserts that he was born in Alabama. And so, this is a problem that a lot of genealogists have. I had no idea where in Alabama I’m even though I thoroughly went through all of the sources that were available in that time and place.
I noticed that he served as bondsman to a man named Dee Suggs. And then I noticed that he jointly took a couple of sharecropping deeds with this same man Dee Suggs.
Sharecropping Deed: JM Fenrick and Dee Suggs
I also found him living in Dee Suggs’ house in 1920. So, the wheels start turning! Why is he interacting with this man and Dee Suggs who was also born in Alabama?
The Dee Suggs household in the 1920 U.S. Federal Census
So, when the records ran out, for my ancestor, I started researching Dee Suggs. And where did this witness lead me? Dee Suggs led me back to Lawrence County, Alabama. And in that 1870 census household was a man named Mike. And that man ended up being his brother, it was his half-brother. And the same man is my second great, great grandfather. They had migrated to Tennessee together. They had been formerly enslaved, and I found a Freedmen’s Bureau contract that their mother signed where she calls all of them, her children. The 1870 census doesn’t provide relationships, so I had that critical labor contract that said, Sofrona and her four children. And so, it makes all the sense in the world why he’s associating with him and living with him, and jointly, promising bond for him. It is because they were half-brothers!
Lisa: I knew you’d have a great story!
Robyn: That story is the crux of my cluster genealogy lecture that I do. I go into more details, but following Dee is what led me to that community and his place of origin in northern Alabama. It was very exciting.
Learn more about Robyn Smith
Lisa: And I know you bring many stories to your readers at Reclaiming Kin. Please tell us the URL address and what they will find there at your website.
Robyn: Thank you so much. The URL is www.reclaimingkin.com. I call it a genealogy teaching blog, and what I mean by that is, I might start off with something from my family history, but every single post is meant to teach a skill. And so, every post there talks about a methodology, a strategy or resource. It’s not just about my family history, it’s about helping all genealogists to grow their skills, and also meet the special challenges of researching the enslaved. I’d be really happy if your listeners would come to the blog, take a look, sign up for my mailing list. And I’ll send you a free PDF, all my favorite research tips.
Lisa: Robyn, thank you so much. We’ll all look forward to your article Witness Testimony in the Family Tree Magazine Jan / Feb 2023 issue. And I look forward to hopefully talking to you again soon.
Robyn: Thank you so much for having me on today, Lisa.
Learn more about Transcription
There’s so much more to learn about doing transcriptions! Check out my full-length Premium video class called Transcribing and Analyzing Historical Documents. It’s part of Premium Membership, and it is going to tell you everything you need to know about how to do transcription, the tools that I recommend, and so much more. And along with that video class, you also get the downloadable handout. Becoming a premium member has a lot of perks. Learn more here.
When I’m not at the podcast microphone, you can usually find me on a plane. And on one of those recent flights I had the privilege travelling along side a few of the last of the Tuskegee Airmen of WWII.
The History of the Tuskegee Airmen
The Tuskegee Airmen was the common name given to a group of African-American military pilots who fought in World War II. Before the 1940’s, African-Americans had not been admitted to the U.S. Army Air Corps flight training program. In 1940, this changed with the formation of a segregated unit to train black pilots and ground crews at Tuskegee Institute in Alabama.
The 996 pilots and more than 15,000 ground crew of the Tuskegee Airmen are credited with over 150 Distinguished Flying Crosses for their service. The Tuskegee Airmen continued flying and fighting until the end of the war in 1945.
Meeting A Tuskegee Airman
After the flight, I collected my luggage and found a spot on the curb outside to wait for my husband to pick me up. It was then I noticed I was standing next to one of the Tuskegee group who was sitting quietly alone waiting for his ride. I couldn’t resist the opportunity to shake his hand and thank him for his service. A warm, friendly grin greeted me from under the Tuskegee baseball cap and we easily fell into conversation.
He explained that a handful of retired Airmen were returning home from a national conference held each year. I also learned, to my great surprise after looking at the patch on his suit coat, that I was speaking with Brigadier General James T. Boddie! Tim (as he likes to be called) is a retired deputy director for operations J-3 of the National Military Command Center and Organization of the Joint Chiefs of Staff in Washington, D.C.
Boddie was born in Baltimore in 1931 and graduated from Frederick Douglass High School in 1949, just behind the Tuskegee Airmen of WWII. Later in his career (starting in 1961,) Tim served as the Air Force Reserve Officers’ Training Corps program commandant of cadets at Tuskegee Institute, Alabama. He also taught military aspects of world political geography and international relations to senior cadets.
When I asked him what some of his most cherished memories were, he didn’t hesitate. Although he has a long and decorated history of service, he fondly reminisced about the young men he has met and assisted along the way. “Our country needs good men now more than ever,” he stated emphatically. He said that he has made it his mission since retiring in 1983 to mentor servicemen in their military careers. He pulled out his smartphone and happily whisked through a series of photographs he had taken with young up-and-coming cadets.
Great! He likes pictures, I thought. There was no flinching when I asked the 85-year-old to take a selfie with me. “Absolutely!” he said enthusiastically as he set down his own smartphone.
Boddie’s face radiated with pride and patriotism, wisdom and strength. This brought my thoughts to the United States heroes who bravely faced peril and sacrificed their lives for our country. Wouldn’t it be stunning to be able to see the faces of our ancestors who fought in the American Revolutionary War, The War of 1812, and the wars that followed? Well, it’s not as unlikely as you might think.
The American Revolutionary War
I didn’t think it was possible to find pictures of the faces of American Revolutionary War heroes, but it is! The pictures are exceptionally rare because few of them lived long enough to have their faces captured on film.
A Utah journalist named Joe Bauman spent three years collecting images of the faces of these veterans. To view his collection of these great men, click here.
The last known Patriots of the American Revolutionary War were John Gray, who died in 1868 and Daniel Frederick Bakeman, who died in 1869. [1]
Sometimes considered the “second war for independence,” the War of 1812 was in part due to the desire for Americans to expand west.
The fighting that originally started between the U.S. and Britain, soon included the American Native tribes. The defeat of the British at the Battle of Tippacanoe convinced many Indians in the Northwest Territory (including the celebrated Shawnee chief Tecumseh) that they needed British support to prevent American settlers from pushing them further out of their lands.
The valiant faces of the this war can be more readily found, perhaps even in your own family history. Many wonderful images can be found by simply Googling War of 1812 Veteran, and then clicking the Images results tab.
Hiram Cronk was the last surviving veteran of the War of 1812 at the time of his death in 1905.He died at the age of 105.[2]
Not only will you find inspiration in the children’s stories, but the stories of many Civil War Veterans who lived to tell their remarkable tales. You can see faces of Civil War veterans in many places online, but the collection of Portraits of Named Civil War Enlisted Men at the Library of Congress is especially moving.
The last known surviving Union Army soldier was Albert Henry Woolson. He died in August 1956. [3]
Spanish American War
The Spanish American War of 1898 led to the U.S. control of Cuba (who later became an independent nation), Guam, the Philippine Islands, and Puerto Rico. The war only lasted a short 10 weeks.
The handsome Frank Buckles born in Bethany, Missouri was the last surviving veteran of WWI, dying at 110 years of age. You can see his name among a list of last surviving WWI veterans by country here.
WWI, also known as the Great War, ravaged the European continent for nearly three years before the United States joined their allies to fight in the war. Many of our young men and women lost their lives to serve and protect in the first of two World Wars.
I hope my story of meeting Brigadier General James T. Boddie has inspired you to look for the faces of your family’s military veterans. Even if you never find a photograph of your veteran hero, it is important to learn their stories of bravery and sacrifice, both on and off the battlefield.
Do you have a special veteran hero in your family history? We would love to hear about them in the comments below. While you are at it, if you have a picture of your veteran, please post it to our Genealogy Gems Facebook page. We love to hear from you. Thanks for reading, friends!
Among the types of Personal Data that this Application collects, by itself or through third parties, there are: Cookies, Usage Data and email address.
Complete details on each type of Personal Data collected are provided in the dedicated sections of this privacy policy or by specific explanation texts displayed prior to the Data collection.
Personal Data may be freely provided by the User, or, in case of Usage Data, collected automatically when using this Application.
Unless specified otherwise, all Data requested by this Application is mandatory and failure to provide this Data may make it impossible for this Application to provide its services. In cases where this Application specifically states that some Data is not mandatory, Users are free not to communicate this Data without consequences to the availability or the functioning of the Service.
Users who are uncertain about which Personal Data is mandatory are welcome to contact the Owner.
Any use of Cookies – or of other tracking tools – by this Application or by the owners of third-party services used by this Application serves the purpose of providing the Service required by the User, in addition to any other purposes described in the present document and in the Cookie Policy, if available.
Users are responsible for any third-party Personal Data obtained, published or shared through this Application and confirm that they have the third party’s consent to provide the Data to the Owner.
Mode and place of processing the Data
Methods of processing
The Owner takes appropriate security measures to prevent unauthorized access, disclosure, modification, or unauthorized destruction of the Data.
The Data processing is carried out using computers and/or IT enabled tools, following organizational procedures and modes strictly related to the purposes indicated. In addition to the Owner, in some cases, the Data may be accessible to certain types of persons in charge, involved with the operation of this Application (administration, sales, marketing, legal, system administration) or external parties (such as third-party technical service providers, mail carriers, hosting providers, IT companies, communications agencies) appointed, if necessary, as Data Processors by the Owner. The updated list of these parties may be requested from the Owner at any time.
Legal basis of processing
The Owner may process Personal Data relating to Users if one of the following applies:
Users have given their consent for one or more specific purposes. Note: Under some legislations the Owner may be allowed to process Personal Data until the User objects to such processing (“opt-out”), without having to rely on consent or any other of the following legal bases. This, however, does not apply, whenever the processing of Personal Data is subject to European data protection law;
provision of Data is necessary for the performance of an agreement with the User and/or for any pre-contractual obligations thereof;
processing is necessary for compliance with a legal obligation to which the Owner is subject;
processing is related to a task that is carried out in the public interest or in the exercise of official authority vested in the Owner;
processing is necessary for the purposes of the legitimate interests pursued by the Owner or by a third party.
In any case, the Owner will gladly help to clarify the specific legal basis that applies to the processing, and in particular whether the provision of Personal Data is a statutory or contractual requirement, or a requirement necessary to enter into a contract.
Place
The Data is processed at the Owner’s operating offices and in any other places where the parties involved in the processing are located.
Depending on the User’s location, data transfers may involve transferring the User’s Data to a country other than their own. To find out more about the place of processing of such transferred Data, Users can check the section containing details about the processing of Personal Data.
Users are also entitled to learn about the legal basis of Data transfers to a country outside the European Union or to any international organization governed by public international law or set up by two or more countries, such as the UN, and about the security measures taken by the Owner to safeguard their Data.
If any such transfer takes place, Users can find out more by checking the relevant sections of this document or inquire with the Owner using the information provided in the contact section.
Retention time
Personal Data shall be processed and stored for as long as required by the purpose they have been collected for.
Therefore:
Personal Data collected for purposes related to the performance of a contract between the Owner and the User shall be retained until such contract has been fully performed.
Personal Data collected for the purposes of the Owner’s legitimate interests shall be retained as long as needed to fulfill such purposes. Users may find specific information regarding the legitimate interests pursued by the Owner within the relevant sections of this document or by contacting the Owner.
The Owner may be allowed to retain Personal Data for a longer period whenever the User has given consent to such processing, as long as such consent is not withdrawn. Furthermore, the Owner may be obliged to retain Personal Data for a longer period whenever required to do so for the performance of a legal obligation or upon order of an authority.
Once the retention period expires, Personal Data shall be deleted. Therefore, the right to access, the right to erasure, the right to rectification and the right to data portability cannot be enforced after expiration of the retention period.
The purposes of processing
The Data concerning the User is collected to allow the Owner to provide its Services, as well as for the following purposes: Interaction with external social networks and platforms, Analytics and Managing contacts and sending messages.
Users can find further detailed information about such purposes of processing and about the specific Personal Data used for each purpose in the respective sections of this document.
Detailed information on the processing of Personal Data
Personal Data is collected for the following purposes and using the following services:
Analytics
The services contained in this section enable the Owner to monitor and analyze web traffic and can be used to keep track of User behavior.
Google Analytics (Google Inc.)
Google Analytics is a web analysis service provided by Google Inc. (“Google”). Google utilizes the Data collected to track and examine the use of this Application, to prepare reports on its activities and share them with other Google services.
Google may use the Data collected to contextualize and personalize the ads of its own advertising network.
Personal Data collected: Cookies and Usage Data.
Place of processing: United States – Privacy Policy – Opt Out. Privacy Shield participant.
Interaction with external social networks and platforms
This type of service allows interaction with social networks or other external platforms directly from the pages of this Application.
The interaction and information obtained through this Application are always subject to the User’s privacy settings for each social network.
This type of service might still collect traffic data for the pages where the service is installed, even when Users do not use it.
Facebook Like button and social widgets (Facebook, Inc.)
The Facebook Like button and social widgets are services allowing interaction with the Facebook social network provided by Facebook, Inc.
Personal Data collected: Cookies and Usage Data.
Place of processing: United States – Privacy Policy. Privacy Shield participant.
Pinterest “Pin it” button and social widgets (Pinterest)
The Pinterest “Pin it” button and social widgets are services allowing interaction with the Pinterest platform provided by Pinterest Inc.
This type of service makes it possible to manage a database of email contacts, phone contacts or any other contact information to communicate with the User.
These services may also collect data concerning the date and time when the message was viewed by the User, as well as when the User interacted with it, such as by clicking on links included in the message.
Constant Contact (Constant Contact, Inc.)
Constant Contact is an email address management and message sending service provided by Constant Contact, Inc.
This type of service allows you to view content hosted on external platforms directly from the pages of this Application and interact with them.
This type of service might still collect web traffic data for the pages where the service is installed, even when Users do not use it.
YouTube video widget (Google Inc.)
YouTube is a video content visualization service provided by Google Inc. that allows this Application to incorporate content of this kind on its pages.
Personal Data collected: Cookies and Usage Data.
Place of processing: United States – Privacy Policy. Privacy Shield participant.
Vimeo video (Vimeo, LLC)
Vimeo is a video content visualization service provided by Vimeo, LLC that allows this Application to incorporate content of this kind on its pages.
Users may exercise certain rights regarding their Data processed by the Owner.
In particular, Users have the right to do the following:
Withdraw their consent at any time.Users have the right to withdraw consent where they have previously given their consent to the processing of their Personal Data.
Object to processing of their Data.Users have the right to object to the processing of their Data if the processing is carried out on a legal basis other than consent. Further details are provided in the dedicated section below.
Access their Data.Users have the right to learn if Data is being processed by the Owner, obtain disclosure regarding certain aspects of the processing and obtain a copy of the Data undergoing processing.
Verify and seek rectification.Users have the right to verify the accuracy of their Data and ask for it to be updated or corrected.
Restrict the processing of their Data.Users have the right, under certain circumstances, to restrict the processing of their Data. In this case, the Owner will not process their Data for any purpose other than storing it.
Have their Personal Data deleted or otherwise removed.Users have the right, under certain circumstances, to obtain the erasure of their Data from the Owner.
Receive their Data and have it transferred to another controller.Users have the right to receive their Data in a structured, commonly used and machine readable format and, if technically feasible, to have it transmitted to another controller without any hindrance. This provision is applicable provided that the Data is processed by automated means and that the processing is based on the User’s consent, on a contract which the User is part of or on pre-contractual obligations thereof.
Lodge a complaint.Users have the right to bring a claim before their competent data protection authority.
Details about the right to object to processing
Where Personal Data is processed for a public interest, in the exercise of an official authority vested in the Owner or for the purposes of the legitimate interests pursued by the Owner, Users may object to such processing by providing a ground related to their particular situation to justify the objection.
Users must know that, however, should their Personal Data be processed for direct marketing purposes, they can object to that processing at any time without providing any justification. To learn, whether the Owner is processing Personal Data for direct marketing purposes, Users may refer to the relevant sections of this document.
How to exercise these rights
Any requests to exercise User rights can be directed to the Owner through the contact details provided in this document. These requests can be exercised free of charge and will be addressed by the Owner as early as possible and always within one month.
Additional information about Data collection and processing
Legal action
The User’s Personal Data may be used for legal purposes by the Owner in Court or in the stages leading to possible legal action arising from improper use of this Application or the related Services.
The User declares to be aware that the Owner may be required to reveal personal data upon request of public authorities.
Additional information about User’s Personal Data
In addition to the information contained in this privacy policy, this Application may provide the User with additional and contextual information concerning particular Services or the collection and processing of Personal Data upon request.
System logs and maintenance
For operation and maintenance purposes, this Application and any third-party services may collect files that record interaction with this Application (System logs) use other Personal Data (such as the IP Address) for this purpose.
Information not contained in this policy
More details concerning the collection or processing of Personal Data may be requested from the Owner at any time. Please see the contact information at the beginning of this document.
How “Do Not Track” requests are handled
This Application does not support “Do Not Track” requests.
To determine whether any of the third-party services it uses honor the “Do Not Track” requests, please read their privacy policies.
Changes to this privacy policy
The Owner reserves the right to make changes to this privacy policy at any time by giving notice to its Users on this page and possibly within this Application and/or – as far as technically and legally feasible – sending a notice to Users via any contact information available to the Owner. It is strongly recommended to check this page often, referring to the date of the last modification listed at the bottom.
Should the changes affect processing activities performed on the basis of the User’s consent, the Owner shall collect new consent from the User, where required.
Definitions and legal references
Personal Data (or Data)
Any information that directly, indirectly, or in connection with other information — including a personal identification number — allows for the identification or identifiability of a natural person.
Usage Data
Information collected automatically through this Application (or third-party services employed in this Application), which can include: the IP addresses or domain names of the computers utilized by the Users who use this Application, the URI addresses (Uniform Resource Identifier), the time of the request, the method utilized to submit the request to the server, the size of the file received in response, the numerical code indicating the status of the server’s answer (successful outcome, error, etc.), the country of origin, the features of the browser and the operating system utilized by the User, the various time details per visit (e.g., the time spent on each page within the Application) and the details about the path followed within the Application with special reference to the sequence of pages visited, and other parameters about the device operating system and/or the User’s IT environment.
User
The individual using this Application who, unless otherwise specified, coincides with the Data Subject.
Data Subject
The natural person to whom the Personal Data refers.
Data Processor (or Data Supervisor)
The natural or legal person, public authority, agency or other body which processes Personal Data on behalf of the Controller, as described in this privacy policy.
Data Controller (or Owner)
The natural or legal person, public authority, agency or other body which, alone or jointly with others, determines the purposes and means of the processing of Personal Data, including the security measures concerning the operation and use of this Application. The Data Controller, unless otherwise specified, is the Owner of this Application.
This Application
The means by which the Personal Data of the User is collected and processed.
Service
The service provided by this Application as described in the relative terms (if available) and on this site/application.
European Union (or EU)
Unless otherwise specified, all references made within this document to the European Union include all current member states to the European Union and the European Economic Area.
Cookies
Small sets of data stored in the User’s device.
Legal information
This privacy statement has been prepared based on provisions of multiple legislations, including Art. 13/14 of Regulation (EU) 2016/679 (General Data Protection Regulation).
This privacy policy relates solely to this Application, if not stated otherwise within this document.
Among the types of Personal Data that this Application collects, by itself or through third parties, there are: Cookies, Usage Data and email address.
Complete details on each type of Personal Data collected are provided in the dedicated sections of this privacy policy or by specific explanation texts displayed prior to the Data collection.
Personal Data may be freely provided by the User, or, in case of Usage Data, collected automatically when using this Application.
Unless specified otherwise, all Data requested by this Application is mandatory and failure to provide this Data may make it impossible for this Application to provide its services. In cases where this Application specifically states that some Data is not mandatory, Users are free not to communicate this Data without consequences to the availability or the functioning of the Service.
Users who are uncertain about which Personal Data is mandatory are welcome to contact the Owner.
Any use of Cookies – or of other tracking tools – by this Application or by the owners of third-party services used by this Application serves the purpose of providing the Service required by the User, in addition to any other purposes described in the present document and in the Cookie Policy, if available.
Users are responsible for any third-party Personal Data obtained, published or shared through this Application and confirm that they have the third party’s consent to provide the Data to the Owner.
Mode and place of processing the Data
Methods of processing
The Owner takes appropriate security measures to prevent unauthorized access, disclosure, modification, or unauthorized destruction of the Data.
The Data processing is carried out using computers and/or IT enabled tools, following organizational procedures and modes strictly related to the purposes indicated. In addition to the Owner, in some cases, the Data may be accessible to certain types of persons in charge, involved with the operation of this Application (administration, sales, marketing, legal, system administration) or external parties (such as third-party technical service providers, mail carriers, hosting providers, IT companies, communications agencies) appointed, if necessary, as Data Processors by the Owner. The updated list of these parties may be requested from the Owner at any time.
Legal basis of processing
The Owner may process Personal Data relating to Users if one of the following applies:
Users have given their consent for one or more specific purposes. Note: Under some legislations the Owner may be allowed to process Personal Data until the User objects to such processing (“opt-out”), without having to rely on consent or any other of the following legal bases. This, however, does not apply, whenever the processing of Personal Data is subject to European data protection law;
provision of Data is necessary for the performance of an agreement with the User and/or for any pre-contractual obligations thereof;
processing is necessary for compliance with a legal obligation to which the Owner is subject;
processing is related to a task that is carried out in the public interest or in the exercise of official authority vested in the Owner;
processing is necessary for the purposes of the legitimate interests pursued by the Owner or by a third party.
In any case, the Owner will gladly help to clarify the specific legal basis that applies to the processing, and in particular whether the provision of Personal Data is a statutory or contractual requirement, or a requirement necessary to enter into a contract.
Place
The Data is processed at the Owner’s operating offices and in any other places where the parties involved in the processing are located.
Depending on the User’s location, data transfers may involve transferring the User’s Data to a country other than their own. To find out more about the place of processing of such transferred Data, Users can check the section containing details about the processing of Personal Data.
Users are also entitled to learn about the legal basis of Data transfers to a country outside the European Union or to any international organization governed by public international law or set up by two or more countries, such as the UN, and about the security measures taken by the Owner to safeguard their Data.
If any such transfer takes place, Users can find out more by checking the relevant sections of this document or inquire with the Owner using the information provided in the contact section.
Retention time
Personal Data shall be processed and stored for as long as required by the purpose they have been collected for.
Therefore:
Personal Data collected for purposes related to the performance of a contract between the Owner and the User shall be retained until such contract has been fully performed.
Personal Data collected for the purposes of the Owner’s legitimate interests shall be retained as long as needed to fulfill such purposes. Users may find specific information regarding the legitimate interests pursued by the Owner within the relevant sections of this document or by contacting the Owner.
The Owner may be allowed to retain Personal Data for a longer period whenever the User has given consent to such processing, as long as such consent is not withdrawn. Furthermore, the Owner may be obliged to retain Personal Data for a longer period whenever required to do so for the performance of a legal obligation or upon order of an authority.
Once the retention period expires, Personal Data shall be deleted. Therefore, the right to access, the right to erasure, the right to rectification and the right to data portability cannot be enforced after expiration of the retention period.
The purposes of processing
The Data concerning the User is collected to allow the Owner to provide its Services, as well as for the following purposes: Interaction with external social networks and platforms, Analytics and Managing contacts and sending messages.
Users can find further detailed information about such purposes of processing and about the specific Personal Data used for each purpose in the respective sections of this document.
Detailed information on the processing of Personal Data
Personal Data is collected for the following purposes and using the following services:
Analytics
The services contained in this section enable the Owner to monitor and analyze web traffic and can be used to keep track of User behavior.
Google Analytics (Google Inc.)
Google Analytics is a web analysis service provided by Google Inc. (“Google”). Google utilizes the Data collected to track and examine the use of this Application, to prepare reports on its activities and share them with other Google services.
Google may use the Data collected to contextualize and personalize the ads of its own advertising network.
Personal Data collected: Cookies and Usage Data.
Place of processing: United States – Privacy Policy – Opt Out. Privacy Shield participant.
Interaction with external social networks and platforms
This type of service allows interaction with social networks or other external platforms directly from the pages of this Application.
The interaction and information obtained through this Application are always subject to the User’s privacy settings for each social network.
This type of service might still collect traffic data for the pages where the service is installed, even when Users do not use it.
Facebook Like button and social widgets (Facebook, Inc.)
The Facebook Like button and social widgets are services allowing interaction with the Facebook social network provided by Facebook, Inc.
Personal Data collected: Cookies and Usage Data.
Place of processing: United States – Privacy Policy. Privacy Shield participant.
Pinterest “Pin it” button and social widgets (Pinterest)
The Pinterest “Pin it” button and social widgets are services allowing interaction with the Pinterest platform provided by Pinterest Inc.
This type of service makes it possible to manage a database of email contacts, phone contacts or any other contact information to communicate with the User.
These services may also collect data concerning the date and time when the message was viewed by the User, as well as when the User interacted with it, such as by clicking on links included in the message.
Constant Contact (Constant Contact, Inc.)
Constant Contact is an email address management and message sending service provided by Constant Contact, Inc.
This type of service allows you to view content hosted on external platforms directly from the pages of this Application and interact with them.
This type of service might still collect web traffic data for the pages where the service is installed, even when Users do not use it.
YouTube video widget (Google Inc.)
YouTube is a video content visualization service provided by Google Inc. that allows this Application to incorporate content of this kind on its pages.
Personal Data collected: Cookies and Usage Data.
Place of processing: United States – Privacy Policy. Privacy Shield participant.
Vimeo video (Vimeo, LLC)
Vimeo is a video content visualization service provided by Vimeo, LLC that allows this Application to incorporate content of this kind on its pages.
Users may exercise certain rights regarding their Data processed by the Owner.
In particular, Users have the right to do the following:
Withdraw their consent at any time.Users have the right to withdraw consent where they have previously given their consent to the processing of their Personal Data.
Object to processing of their Data.Users have the right to object to the processing of their Data if the processing is carried out on a legal basis other than consent. Further details are provided in the dedicated section below.
Access their Data.Users have the right to learn if Data is being processed by the Owner, obtain disclosure regarding certain aspects of the processing and obtain a copy of the Data undergoing processing.
Verify and seek rectification.Users have the right to verify the accuracy of their Data and ask for it to be updated or corrected.
Restrict the processing of their Data.Users have the right, under certain circumstances, to restrict the processing of their Data. In this case, the Owner will not process their Data for any purpose other than storing it.
Have their Personal Data deleted or otherwise removed.Users have the right, under certain circumstances, to obtain the erasure of their Data from the Owner.
Receive their Data and have it transferred to another controller.Users have the right to receive their Data in a structured, commonly used and machine readable format and, if technically feasible, to have it transmitted to another controller without any hindrance. This provision is applicable provided that the Data is processed by automated means and that the processing is based on the User’s consent, on a contract which the User is part of or on pre-contractual obligations thereof.
Lodge a complaint.Users have the right to bring a claim before their competent data protection authority.
Details about the right to object to processing
Where Personal Data is processed for a public interest, in the exercise of an official authority vested in the Owner or for the purposes of the legitimate interests pursued by the Owner, Users may object to such processing by providing a ground related to their particular situation to justify the objection.
Users must know that, however, should their Personal Data be processed for direct marketing purposes, they can object to that processing at any time without providing any justification. To learn, whether the Owner is processing Personal Data for direct marketing purposes, Users may refer to the relevant sections of this document.
How to exercise these rights
Any requests to exercise User rights can be directed to the Owner through the contact details provided in this document. These requests can be exercised free of charge and will be addressed by the Owner as early as possible and always within one month.
Additional information about Data collection and processing
Legal action
The User’s Personal Data may be used for legal purposes by the Owner in Court or in the stages leading to possible legal action arising from improper use of this Application or the related Services.
The User declares to be aware that the Owner may be required to reveal personal data upon request of public authorities.
Additional information about User’s Personal Data
In addition to the information contained in this privacy policy, this Application may provide the User with additional and contextual information concerning particular Services or the collection and processing of Personal Data upon request.
System logs and maintenance
For operation and maintenance purposes, this Application and any third-party services may collect files that record interaction with this Application (System logs) use other Personal Data (such as the IP Address) for this purpose.
Information not contained in this policy
More details concerning the collection or processing of Personal Data may be requested from the Owner at any time. Please see the contact information at the beginning of this document.
How “Do Not Track” requests are handled
This Application does not support “Do Not Track” requests.
To determine whether any of the third-party services it uses honor the “Do Not Track” requests, please read their privacy policies.
Changes to this privacy policy
The Owner reserves the right to make changes to this privacy policy at any time by giving notice to its Users on this page and possibly within this Application and/or – as far as technically and legally feasible – sending a notice to Users via any contact information available to the Owner. It is strongly recommended to check this page often, referring to the date of the last modification listed at the bottom.
Should the changes affect processing activities performed on the basis of the User’s consent, the Owner shall collect new consent from the User, where required.
Definitions and legal references
Personal Data (or Data)
Any information that directly, indirectly, or in connection with other information — including a personal identification number — allows for the identification or identifiability of a natural person.
Usage Data
Information collected automatically through this Application (or third-party services employed in this Application), which can include: the IP addresses or domain names of the computers utilized by the Users who use this Application, the URI addresses (Uniform Resource Identifier), the time of the request, the method utilized to submit the request to the server, the size of the file received in response, the numerical code indicating the status of the server’s answer (successful outcome, error, etc.), the country of origin, the features of the browser and the operating system utilized by the User, the various time details per visit (e.g., the time spent on each page within the Application) and the details about the path followed within the Application with special reference to the sequence of pages visited, and other parameters about the device operating system and/or the User’s IT environment.
User
The individual using this Application who, unless otherwise specified, coincides with the Data Subject.
Data Subject
The natural person to whom the Personal Data refers.
Data Processor (or Data Supervisor)
The natural or legal person, public authority, agency or other body which processes Personal Data on behalf of the Controller, as described in this privacy policy.
Data Controller (or Owner)
The natural or legal person, public authority, agency or other body which, alone or jointly with others, determines the purposes and means of the processing of Personal Data, including the security measures concerning the operation and use of this Application. The Data Controller, unless otherwise specified, is the Owner of this Application.
This Application
The means by which the Personal Data of the User is collected and processed.
Service
The service provided by this Application as described in the relative terms (if available) and on this site/application.
European Union (or EU)
Unless otherwise specified, all references made within this document to the European Union include all current member states to the European Union and the European Economic Area.
Cookies
Small sets of data stored in the User’s device.
Legal information
This privacy statement has been prepared based on provisions of multiple legislations, including Art. 13/14 of Regulation (EU) 2016/679 (General Data Protection Regulation).
This privacy policy relates solely to this Application, if not stated otherwise within this document.
I’m also concerned about my privacy and security online. Chances are you are too. VPNs add an important layer or online protection and are one of the hottest tech trends right now. I receive a lot of questions about what tech tools I use, so in this episode I’ll explain:
why I’m using a VPN (don’t worry, you don’t need to be techy at all to use a VPN!)
what I looked for in a VPN
how I set it up (oh my gosh, it was so easy!)
how it protects my online activity
the surprising BONUS benefits that I love and you will too.
My goal is to help you find your family history safely and privately. I took a deep dive into VPNs and I can’t wait to share with you what I’ve learned so you can do it yourself.
Click the play button below to watch or click “Watch on YouTube” to watch at the Genealogy Gems YouTube channel.
Episode 56 Show Notes
What is a VPN?
VPN stands for Virtual Private Network. It’s a top tech trend right now, although their origins can be traced back to the 1990s.
According to the top tech blogs VPNs usage in the U.S. jumped by 41% between March 13 and March 23, 2021 and is expected to continue to surge. Today I’m going to explain what that is, and the top reasons why I use a VPN and why you might want to start using one too.
What Does a VPN Do?
Sending data over an unencrypted internet connection is like mailing a postcard. Your message is wide open for the mailman and any other nosy people to see.
Whenever you’re connected to an unencrypted internet network on your phone, computer, tablet, TV, etc., you’re sending countless pieces of information out into the digital world that can be seen and intercepted by many different parties before they get to their intended destinations.
While not every message and piece of data I send out over the internet is sensitive (such as banking information) I like knowing that my activity is private. It’s a lot like why we always protect the identity of living people in our family tree. It’s always best to err on the side of privacy and security when working online.
A VPN creates a secure encrypted tunnel between your device and the internet. In other words, it puts an envelope around your postcard so that no one can sneak a peek at your private correspondence. That way none of your data going in and out of your devices can be seen – not the government, hackers, your internet service provider, or even by the VPN.
The best VPNS also don’t create or keep activity logs or connection logs. This means if they are asked by government or law enforcement to hand them over, there’s nothing to hand over.
Since every device has a unique IP address, your device can be traced back to you. However, when you use a VPN, your connection gets routed through one of thousands of servers, hiding your real IP address and replacing it with one of their own. This allows you to browse the web anonymously.
Top Reasons I Decided to Use a VPN
There’s no one way to make everything you do completely private. But a VPN does add a nice layer plus some great added benefits. I’ve been thinking about doing something more for a long time, and then my brother-in-law who worked for years for one of the largest tech companies in the world told me he set up a VPN and that I should too. I did my own homework, and here are the top reasons why I use a VPN:
1. I want to be able to use public Wi-Fi safely
Libraries, archives, traveling to speaking engagements, visiting ancestral locations, vacation. Public Wi-Fi is often provided and it’s really convenient, plus I don’t have to use my phone as a hot spot which uses up cellular data not to mention battery. Your favorite coffee shop could be a favorite spot for hackers who steal personal information. And you can even get hacked on your own home Wi-Fi. With only basic computer knowledge, the hacker could gain access to your passwords, financial details, or even your emails!
Any time you’re on public Wi-Fi a VPN hides your IP address encrypts your internet connection using encryption.
2. I want my privacy and don’t want to be tracked by my ISP
Your internet service provider (known as an ISP) can see everything you do.
In the US, ISPs can legally sell your data to ad companies.
In the UK and Australian ISPs are required to keep logs of the websites you visit, the apps you use for around a year.
Governments, large corporations, and websites potentially surveil your activity regularly to harvest your data for their own agendas.
A VPN makes your online activity private and secure with tunneling and encryption. Your messages go through a tunnel of sorts so others, including your ISP, can’t see where you’re located, or that the data is from you. It also applied encryption (AEs-256 is what you’re looking for in encryption) so that your message is essentially locked by you and the service delivering the data for you doesn’t have the key. Only the recipient does (such as the website you’re trying to communicate with.)
But you may be wondering, isn’t your activity safe because you only visit secure “HTTPS” websites?
In an interview with TechRadar.com Dan Pomerantz, Co-Founder of ExpressVPN explains it this way: “Many of those companies know your identity, and they might store and resell those data about you without your knowledge or approval. Why is that the case even when you use https? Because technologies called DNS and SNI transmit those data in plain text, and because the pipe operators can still see the destination of your traffic.”
3. I want the best deals when online shopping
Many websites offer deals based on your location. Countless times I’ve been shopping for airlines tickets and watched the price go up each time I checked the price. It’s an effort to get me to buy before the price goes up more. The website can do this because it knows who I am and my location.
Have you noticed more and more websites asking you to allow them to know your location? You can click “Don’t allow” but if you’re not using a VPN you can’t be sure they don’t know who and where you are. Using a VPN means you’re accessing their website through that tunnel which hides your location, opening up opportunities for deals you might not have gotten otherwise.
A VPN allows you to select from servers in different location to be your “location”. So, I may live in Texas but my internet traffic might be by way of London. And by going through the “tunnel” the website doesn’t know it’s me. This gives me more flexibility to shop for the best deals.
Will a VPN slow my connection speed?
I was a little worried about a VPN slowing down my connection speed. But I’ve not found that at all, and in fact if your ISP is throttling your speed, which many do, it can actually speed up your connection because again your ISP can’t tell where you’re located. Connecting to a server closer to your location increases the speed, and switching servers is super easy in the app. Smart location will automatically pick the best server to you too.
What to Look for in a VPN
Lots of global servers – The VPN I chose has 3,000+ servers in 160 VPN server locations in 94 countries.
High speed
Best encryption – Look for AES-256 encryption
Usable on all your devices – If you’re like me, you have multiple devices and a variety of platforms. I have Windows computer, iOS mobile devices and a smart TV. ExpressVPN has super easy-to-use apps for Windows, Mac, Android, and iOS, as well as platforms that other VPN companies don’t support, like Linux, Android TV, Amazon Fire TV, and routers.
24/7 customer support – Look for live chat with a real person.
Ease of use – You should be able to fire up the app and connect with just one click. And it should be super easy to change servers.
Privacy / No activity logs – They should have a transparent privacy policy and state out right they don’t create or store logs.
Trusted as Secure – Look for high start ratings from a large number of users. It should also be highly-ranked by trusted tech review sites.
Affordable – It’s normally $12.95 a month, but I’ve arranged with ExpressVPN to get my viewers and listeners 3 extra free months with the 12 month plan. Comes out to just over $8.00 a month plus the first 3 months free.
Money-back guarantee – ExpressVPN offers a 30-day money-back guarantee so there was no risk in trying it.
The VPN I Chose
There are tons of VPNs out there but it’s important to know they don’t all offer the same features, especially the free ones. (My theory is that nothings ever really free particularly when it comes to security.) After doing my homework I decided to use ExpressVPN. It’s top-rated and has all the features I was looking for. I’ve been using it for a while now and I’m really happy with it. It’s super easy to use. So I reached out to ExpressVPN and they’ve agreed to extend a special offer to us. This is an affiliate link so I’ll receive compensation when you use my link. That helps make this free show possible, so thank you! Plus you’re going to save money.
Special Deal for Genealogy Gems Viewers: Get 3 extra free months with the discounted 12-month plan.
Comes out to just over $8.00 a month (+ 3 months free) Gosh, I feel like I would have spent more than that just to gain access to the additional shows it gives me access to with ExpressVPN. Keep reading below to learn more about that. ExpressVPN offers a 30-day money back guarantee so there’s no risk to try it.
Rated #1 by CNET, The Verge, Wired, TechRadar, & many more! Learn more about their approach to security at the ExpressVPN Trust Center. (Includes Network Lock which protects you if there’s an interruption in your internet connection.)
BONUS Reason #4: Access to regionally specific online content.
And speaking of being able to access the internet through any global server, this allows you to access regionally specific content. Did you know that many websites or apps are blocked or restricted depending on where you are located?
I discovered this while on the road for some genealogy speaking engagements. I was keynoting in London several years ago, and at the end of the day in my hotel room I sat down to watch my favorite show on Netflix. But when I logged in it said that I was not allowed to watch the show in England. My iPad was telling the internet provider that I was in London, and the ISP told Netflix. Had I had a VPN at that time, I could have rerouted my server connection through England and binged watched as many episodes as I pleased.
So is this helpful even if you aren’t traveling right now? You bet it is!
Remember when the UK version of Who Do You Think You Are? came out. We were going crazy over here in the U.S. because we would go to the website to watch it only to get an access denied message. It said you had to be in the UK to use the BBC iPlayer. A VPN allows you to switch locations and enjoy the show.
This is true of subscriptions like Disney+, Hulu, HBO Max, ITV, Sky Go, and more.
You’ll also find that various subscription services offer different content based on your ISP location. By switching locations you can get access to shows not available in your home country with the same subscription.
My experience specifically with Amazon:
It may tell you to turn off your VPN. Try a different server. Thanks to the ExpressVPN live chat I found a server that allowed me to stream on Amazon.
Amazon restricts your access by your billing address.
Servers that let me access Amazon videos were San Francisco, Jersey 1, and Jersey 2.
Download the app from the website to your computer.
Install the ExpressVPN extension on your web browser (Chrome, Firefox)
More about Web Browser Settings:
Spoof Your Location When you visit a website and it wants to know your location, it asks because it’s not getting that information based on your IP address. It’s based on nearby Wi-Fi networks, your systems location settings, or your device’s GPS. This means in that situation your location can still be potentially revealed via your web browser. If you decline the request for your location, you might find that some websites or content will be blocked for you. The Spoof Your Location feature helps solve the problem. When you’re connected and it’s turned on, the extension hides your location by automatically sharing the ExpressVPN server location instead.
Block WebRTC WebRTC is an HTML5 specification designed to enable voices and video communication to work inside web pages without needing to install any special plugins in your web browser. (Examples include Google Meet, Facebook Messenger and GotoMeeting.) In some situations, Web RTC could potentially leak your IP address even while connected to a VPN. Block WebRTC allows you to block it entirely.
HTTPS Everywhere Automatically makes websites switch from HTTP to a secure encrypted HTTPS connection where available.
How to Set Up ExpressVPN on your smartphone and tablet:
Go to the app store and search for ExpressVPN
Download app
Open the app
Sign in with your ExpressVPN account
Tap button to connect. You will be connected to the “smart location” ExpressVPN has selected for you – typically considered the fastest connection.
Tap the three dots ( … ) to change servers. Be aware that when you change to a European server you may see different types of GDPR “cookie” pop-ups that you aren’t used to seeing. These have to be accepted / managed before visiting the website.
One of advantages of watching the show live is the chance to ask you questions. I answered many at the end of the show, but here are the remainder with my answers.
flounder1st: Does VPN only work for Wi-Fi data or Cellular Date also? Lisa: Yes.
Mary S: I may get a new computer soon, should I wait and install it on the new one? Lisa: You don’t have to. When you get the new one simply uninstall the VPN from the old computer and install and sign in on the new one.
Linda G: So I can use a VPN but my husband can continue doing his own thing through his regular ISP? Lisa: Yes.