Date post: | 13-Jul-2015 |
Category: |
Technology |
Upload: | mobcon |
View: | 161 times |
Download: | 4 times |
By Kate Bolseth
Privacy in the Next Frontier Personal or Creepy?Privacy in the Next Frontier Personal or Creepy?
31%are not aware tracking takes place on mobile
TRUSTe 2014 US Consumer Confidence Privacy Report Consumer Opinion and Business Impact
40%of smartphone users check to make sure a
mobile app has a privacy policy
TRUSTe 2014 US Consumer Confidence Privacy Report Consumer Opinion and Business Impact
39%of smartphone users research apps online
before sharing personal information
TRUSTe 2014 US Consumer Confidence Privacy Report Consumer Opinion and Business Impact
FTC“The report finds that the reviewed apps’ privacy disclosures often used
vague language, reserving broad rights to collect, use, and share
consumers’ information”
TRUSTe 2014 US Consumer Confidence Privacy Report Consumer Opinion and Business Impact
91%of adults either agreed or
strongly agreed that consumers have lost control
over their personal information
Pew Research Report - Public Perceptions of Privacy and Security in the Post-Snowden Era
88%of adults agreed or strongly
agreed that it would be “very difficult to remove inaccurate
information about them online.”
Pew Research Report - Public Perceptions of Privacy and Security in the Post-Snowden Era
Mobile Apps Access Personal Data
13
Location
Pictures
Phone Number
Contacts
Websites Visited
Apps Running
PRIVACY IN THE NEXT FRONTIER
IP Address
Device Identifier
15
Collector 1
Collector 2Collector
3
Collector 4
Collector 5
Collector 6
Birthdate
Facebook Login
Location
Shared Photos
and more!
Data Collection
Third Data Collectors
PRIVACY IN THE NEXT FRONTIER
Data Collectors and the Data They Collect?
16
Data CollectorsCollect data from or about the computer, mobile phone, or other devices one uses to install apps or to access apps.
PRIVACY IN THE NEXT FRONTIER
This can include:
• Network and communication info e.g. - IP address or mobile phone number
• One's internet service • Operating system • Location • The type (including identifiers) of the device or browser one uses • Website and page visits • Receive data sometimes through cookies
This data is typically sold or used for companies to deliver ads, understand one's online activity, and build out a user profile
17
•Name •Gender •Social Security Number •Birthdate
Personally Identifiable Information
So What is PII?
•Mother’s Maiden Name •Zip Code •More
87% of people are uniquely identifiable with date of birth, gender and zip code
PRIVACY IN THE NEXT FRONTIER https://news.ycombinator.com/item?id=2942967
Once data is out there, it is forever. Would a partner’s breach put you at risk?
Data breaches - It’s Not If, But When
18PRIVACY IN THE NEXT FRONTIER
Risks when we Don’t Protect Consumer Data?
19
1. Over 200 US Cases Settled Since 2011
2.Over $110M in Settlements
3.Regulatory & Class Action
PRIVACY IN THE NEXT FRONTIER
TRUSTe 2014 US Consumer Confidence Privacy Report Consumer Opinion and Business Impact.
Forbes Insights: The Promis of Privacy www.forbes.com/forbesinsights
Risks
35%of consumers have stopped
doing business with a company or website due to
privacy concerns
RUSTe 2014 US Consumer Confidence Privacy Report Consumer Opinion and Business
Impact.
Mobility adds another layer of privacy complexity
Consumer is the Most Important Factor to Focus On
21PRIVACY IN THE NEXT FRONTIER
Put Consumer’s In Control - Context Aware Privacy
29PRIVACY IN THE NEXT FRONTIER
Who am I interacting with and from what
device?
Context
What is my provider doing to protect me and do I trust them, their intent and execution?
What value will I get from ‘sharing’ information?
Is it really necessary?
Context ControlTransparency Respect
30
Context Enables Transparency. Control. Respect.
PRIVACY IN THE NEXT FRONTIER
34PRIVACY IN THE NEXT FRONTIER
Context
Control
Transparency
Respect
Policies
Practices
Roadmap
Value, Trust and Loyalty+ =
Privacy White Paper
35PRIVACY IN THE NEXT FRONTIER
Sign Up to receive our
Thank You