Privacy in the Next Frontier – Personal or Creepy? | Kate Bolseth

35
By Kate Bolseth Privacy in the Next Frontier Personal or Creepy? Privacy in the Next Frontier Personal or Creepy?

Transcript of Privacy in the Next Frontier – Personal or Creepy? | Kate Bolseth

By Kate Bolseth

Privacy in the Next Frontier Personal or Creepy?Privacy in the Next Frontier Personal or Creepy?

South Park - Apple Agreement

2PRIVACY IN THE NEXT FRONTIER

3

How Many Downloaded MobCon App?

Download App

PRIVACY IN THE NEXT FRONTIER

Did You Read the Privacy Policy Agreement?

4PRIVACY IN THE NEXT FRONTIER

5

Scenario - Typical App Download

PRIVACY IN THE NEXT FRONTIER

Installing App

31%are not aware tracking takes place on mobile

TRUSTe 2014 US Consumer Confidence Privacy Report Consumer Opinion and Business Impact

40%of smartphone users check to make sure a

mobile app has a privacy policy

TRUSTe 2014 US Consumer Confidence Privacy Report Consumer Opinion and Business Impact

39%of smartphone users research apps online

before sharing personal information

TRUSTe 2014 US Consumer Confidence Privacy Report Consumer Opinion and Business Impact

FTC“The report finds that the reviewed apps’ privacy disclosures often used

vague language, reserving broad rights to collect, use, and share

consumers’ information”

TRUSTe 2014 US Consumer Confidence Privacy Report Consumer Opinion and Business Impact

Pew Research Report - Public Perceptions of Privacy and Security in the Post-Snowden Era

91%of adults either agreed or

strongly agreed that consumers have lost control

over their personal information

Pew Research Report - Public Perceptions of Privacy and Security in the Post-Snowden Era

88%of adults agreed or strongly

agreed that it would be “very difficult to remove inaccurate

information about them online.”

Pew Research Report - Public Perceptions of Privacy and Security in the Post-Snowden Era

Mobile Apps Access Personal Data

13

Location

Pictures

Phone Number

Contacts

Websites Visited

Apps Running

PRIVACY IN THE NEXT FRONTIER

IP Address

Device Identifier

14

Third Party Affiliates and Data Collection

Installing App

PRIVACY IN THE NEXT FRONTIER

15

Collector 1

Collector 2Collector

3

Collector 4

Collector 5

Collector 6

Email

Birthdate

Facebook Login

Location

Shared Photos

and more!

Data Collection

Third Data Collectors

PRIVACY IN THE NEXT FRONTIER

Data Collectors and the Data They Collect?

16

Data CollectorsCollect data from or about the computer, mobile phone, or other devices one uses to install apps or to access apps.

PRIVACY IN THE NEXT FRONTIER

This can include:

• Network and communication info e.g. - IP address or mobile phone number

• One's internet service • Operating system • Location • The type (including identifiers) of the device or browser one uses • Website and page visits • Receive data sometimes through cookies

This data is typically sold or used for companies to deliver ads, understand one's online activity, and build out a user profile

17

•Name •Gender •Social Security Number •Birthdate

Personally Identifiable Information

So What is PII?

•Mother’s Maiden Name •Zip Code •More

87% of people are uniquely identifiable with date of birth, gender and zip code

PRIVACY IN THE NEXT FRONTIER https://news.ycombinator.com/item?id=2942967

Once data is out there, it is forever. Would a partner’s breach put you at risk?

Data breaches - It’s Not If, But When

18PRIVACY IN THE NEXT FRONTIER

Risks when we Don’t Protect Consumer Data?

19

1. Over 200 US Cases Settled Since 2011

2.Over $110M in Settlements

3.Regulatory & Class Action

PRIVACY IN THE NEXT FRONTIER

TRUSTe 2014 US Consumer Confidence Privacy Report Consumer Opinion and Business Impact.

Forbes Insights: The Promis of Privacy www.forbes.com/forbesinsights  

Risks

35%of consumers have stopped

doing business with a company or website due to

privacy concerns

RUSTe 2014 US Consumer Confidence Privacy Report Consumer Opinion and Business

Impact. 

Mobility adds another layer of privacy complexity

Consumer is the Most Important Factor to Focus On

21PRIVACY IN THE NEXT FRONTIER

22

What if we changed the paradigm?

PRIVACY IN THE NEXT FRONTIER

23

Questions to ask yourself…

PRIVACY IN THE NEXT FRONTIER

24PRIVACY IN THE NEXT FRONTIER

1Will customers be

surprised at how you use their data?

25PRIVACY IN THE NEXT FRONTIER

2 Are you transparent with who your data sharing?

26PRIVACY IN THE NEXT FRONTIER

3Do you define PII

(Personally Identifiable Information)?

27PRIVACY IN THE NEXT FRONTIER

4 Do you make it easy to opt out?

28PRIVACY IN THE NEXT FRONTIER

5Are you taking

steps to secure data?

Put Consumer’s In Control - Context Aware Privacy

29PRIVACY IN THE NEXT FRONTIER

Who am I interacting with and from what

device?

Context

What is my provider doing to protect me and do I trust them, their intent and execution?

What value will I get from ‘sharing’ information?

Is it really necessary?

Context ControlTransparency Respect

30

Context Enables Transparency. Control. Respect.

PRIVACY IN THE NEXT FRONTIER

31PRIVACY IN THE NEXT FRONTIER

Tip the Scales - Consumers in Control - Value Delivered

Value

Info

32PRIVACY IN THE NEXT FRONTIER

Tip the Scales - Consumers in Control - Value Delivered

Value

Info

33

Put Charlene in the Control

PRIVACY IN THE NEXT FRONTIER

34PRIVACY IN THE NEXT FRONTIER

Context

Control

Transparency

Respect

Policies

Practices

Roadmap

Value, Trust and Loyalty+ =

Privacy White Paper

35PRIVACY IN THE NEXT FRONTIER

Sign Up to receive our

Thank You

[email protected]