SlideShare ist ein Scribd-Unternehmen logo
1 von 35
WELCOME
TO

A

MORNING OF MOBILE PRIVACY
Restoring the Faith
PRESENTED BY:

Jules Polonetsky
Executive Director & Co-Chair
The Future of Privacy Forum
Houston…we have a problem
Not Just the Media –
It’s Become a National Joke
We Don’t Learn From Our Mistakes
How Has Industry Responded?
Regulators Respond
Sen. Rockefeller legislation to set mandatory
Do Not Track Rules
 New FTC COPPA rules
 EU Cookie Directive
 And states get into the privacy game…

Platforms/Browsers Respond
Cookie Blocking
 iOS 7 MAC address changes
 Do Not Track settings
 Remember IE tracking Protection Lists?

Ecosystem Reactions



Pop up problem
50% click through rate so must be working!
Over thirty years, consumers
have consistently fit into 3
groups:




17% privacy fundamentalists
56% pragmatic majority
27% marginally concerned

- Westin Surveys
Consumers Are Complicated
“We’ve found that individuals assign
radically different values to their
personal information depending on
whether they’re focusing on protecting
data from exposure or selling away
data that would be otherwise
protected.”
Acquisti, L. John, and G. Loewenstein,
“What is Privacy Worth?,” tech. report,
Heinz College, Carnegie Mellon University,
2009.
We are OK with sharing when what
is being done is for me, not to me
Icons that mean something

smart data @
work for you
Native Advertising…
…Native Permissions?
It’s only going to get more interesting
and challenging…

Smart phones
 Smart cars
 Smart stores
 Smart grid

Jules Polonetsky, Executive
Director
JulesPol@futureofprivacy.org
• www.futureofprivacy.org
• Facebook.com/futureofprivacy
• @julespolonetsky
IT’S THE END OF THE WORLD AS
WE KNOW IT…AND I FEEL FINE!
PRESENTED BY:

Jaka Jancar
Chief Technology Officer
Celtra
Celtra & privacy
• We’re RM company, new to privacy
• It’s hard to know what’s OK and what’s not
• Why don’t offline businesses have as many
privacy concerns?
What is different online?
• Unknowingly generated data online is much
greater in number and level of detail
(e.g. web activity, app usage, geo, …)

• Evilness levels are identical, just capabilities
larger
• Yet, expectations of privacy are the same
People: a healthy dose of ignorance
• Normal people don’t proactively think about
privacy
• “Being informed”, “having options” …meh
• They just don’t want to be negatively
surprised
• And that’s fine!
Ad tech: “cover your ass” strategy
• Constant obsession
• Putting up a show
–
–
–
–
–

Non-PII, probabilistic identifiers
Not storing data
Transparency: disclaimers
Control: opt-outs
Self-regulation

• Good for staving off media and regulators, but
that’s all
Thought: it’s not Ad Tech’s role
• We have our goal: to improve efficiency
• It might conflict with users’ privacy
• We might not be the best to represent users
Who, then?
• For most egregious of cases, and for a
framework, governments are probably fine
• For “good taste” — who has the most to lose?
– Not ad tech companies (what are those?)
– Platform vendors (OS, browser)
– Publishers (at risk)

• They are who users entrust with their digital
lives, and who they will resent if betrayed.
Rash platform changes don’t help
• Disabling 3rd party cookies
• Removing UDID
• Enabling DNT by default on IE10
All-or-nothing, not legitimate (user will)
Good example: IDFA
• Under user control
(resettable, configurable privacy level, platform-wide, even crossdevice)

• Not all-or-nothing
(never fully removes identifier and always allows basic uses)

• Limits uses, not collection
(more data available in the future?)

• Allowed uses very clear + legitimate
(no philosophical questions, no excuse to ignore or bypass)
Recap
• Privacy push will come from
users → platforms -> publishers → ad tech → advertisers

It will not be magically born in the middle
• Parties near the user will be the “good taste”.
There is a big opportunity for differentiation.
• Permissions will move from “cover your asses”
complete opt-out, to more granular ones
• We will lose freedom, but gain simplicity and
accuracy in exchange
What will we do at Celtra?
• Focus on empowering users
• Very specifically:
– Always collect <identifier, permissions>
– In absence of permissions, assume very little is OK
by default
CREATING DIGITAL AUDIENCES IN
A WORLD WITHOUT COOKIES
PRESENTED BY:

Alan Chapell
President
Chapell & Associates
To Access These Slides
Contact Alan Chapell
President
Chapell & Associates
achapell@chapellassociates.com

Weitere ähnliche Inhalte

Andere mochten auch

A Marketers guide to gaming in display ads
A Marketers guide to gaming in display adsA Marketers guide to gaming in display ads
A Marketers guide to gaming in display adsCeltra Inc
 
Mojiva Why Were Here Narrative Sales Eu June 2011
Mojiva   Why Were Here   Narrative   Sales Eu June 2011Mojiva   Why Were Here   Narrative   Sales Eu June 2011
Mojiva Why Were Here Narrative Sales Eu June 2011Nick Marsh
 
Celtra AdCreator introduction
Celtra AdCreator introductionCeltra AdCreator introduction
Celtra AdCreator introductionSultan Shalakhti
 
Carlos Ponce: From MBA Theory to Real World Appilcation
Carlos Ponce: From MBA Theory to Real World AppilcationCarlos Ponce: From MBA Theory to Real World Appilcation
Carlos Ponce: From MBA Theory to Real World AppilcationAdformMarketing
 
A Career Story to Make You Green with Envy
A Career Story to Make You Green with EnvyA Career Story to Make You Green with Envy
A Career Story to Make You Green with EnvyAdformMarketing
 
Adform webinar: New Features
Adform webinar: New FeaturesAdform webinar: New Features
Adform webinar: New FeaturesAdformMarketing
 
Why have a better presentation
Why have a better presentationWhy have a better presentation
Why have a better presentationDeck Rooster
 
How to Be Awesome on Slideshare
How to Be Awesome on SlideshareHow to Be Awesome on Slideshare
How to Be Awesome on Slideshare24Slides
 
The Essentials of PowerPoint Color Theme
The Essentials of PowerPoint Color ThemeThe Essentials of PowerPoint Color Theme
The Essentials of PowerPoint Color Theme24Slides
 
10 Things To Do Before Emailing Your Sales Deck To A Potential Client
10 Things To Do Before Emailing Your Sales Deck To A Potential Client10 Things To Do Before Emailing Your Sales Deck To A Potential Client
10 Things To Do Before Emailing Your Sales Deck To A Potential ClientDeck Rooster
 

Andere mochten auch (13)

A Marketers guide to gaming in display ads
A Marketers guide to gaming in display adsA Marketers guide to gaming in display ads
A Marketers guide to gaming in display ads
 
Mojiva Why Were Here Narrative Sales Eu June 2011
Mojiva   Why Were Here   Narrative   Sales Eu June 2011Mojiva   Why Were Here   Narrative   Sales Eu June 2011
Mojiva Why Were Here Narrative Sales Eu June 2011
 
Adform certificate
Adform certificateAdform certificate
Adform certificate
 
Celtra AdCreator introduction
Celtra AdCreator introductionCeltra AdCreator introduction
Celtra AdCreator introduction
 
Carlos Ponce: From MBA Theory to Real World Appilcation
Carlos Ponce: From MBA Theory to Real World AppilcationCarlos Ponce: From MBA Theory to Real World Appilcation
Carlos Ponce: From MBA Theory to Real World Appilcation
 
A Career Story to Make You Green with Envy
A Career Story to Make You Green with EnvyA Career Story to Make You Green with Envy
A Career Story to Make You Green with Envy
 
Adform webinar: New Features
Adform webinar: New FeaturesAdform webinar: New Features
Adform webinar: New Features
 
Why have a better presentation
Why have a better presentationWhy have a better presentation
Why have a better presentation
 
Internet Marketing Quiz
Internet Marketing QuizInternet Marketing Quiz
Internet Marketing Quiz
 
How to Be Awesome on Slideshare
How to Be Awesome on SlideshareHow to Be Awesome on Slideshare
How to Be Awesome on Slideshare
 
The Essentials of PowerPoint Color Theme
The Essentials of PowerPoint Color ThemeThe Essentials of PowerPoint Color Theme
The Essentials of PowerPoint Color Theme
 
10 Things To Do Before Emailing Your Sales Deck To A Potential Client
10 Things To Do Before Emailing Your Sales Deck To A Potential Client10 Things To Do Before Emailing Your Sales Deck To A Potential Client
10 Things To Do Before Emailing Your Sales Deck To A Potential Client
 
Your Sales Pitch Sucks!
Your Sales Pitch Sucks!Your Sales Pitch Sucks!
Your Sales Pitch Sucks!
 

Ähnlich wie A Morning of Mobile Privacy - Presenter Slides

Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017Steve Mckee
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with PrivacyJason Hong
 
Data set Legislation
Data set LegislationData set Legislation
Data set LegislationData-Set
 
Data set Legislation
Data set LegislationData set Legislation
Data set LegislationData-Set
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesAdam Thierer
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation Data-Set
 
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, FedseMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, FedseMarketer
 
Data set module 4
Data set   module 4Data set   module 4
Data set module 4Data-Set
 
IoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the futureIoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the futureFacundo Mauricio
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspectiveSravan Ankaraju
 
Thierer Internet Privacy Regulation
Thierer Internet Privacy RegulationThierer Internet Privacy Regulation
Thierer Internet Privacy RegulationMercatus Center
 
Age Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAge Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAgeFriendlyEconomy
 
Ethics of Big Data
Ethics of Big DataEthics of Big Data
Ethics of Big DataMatti Vesala
 
Evolution of identity Stoyan Kenderov - MAC 2014 conference
Evolution of identity   Stoyan Kenderov - MAC 2014 conferenceEvolution of identity   Stoyan Kenderov - MAC 2014 conference
Evolution of identity Stoyan Kenderov - MAC 2014 conferenceStoyan Kenderov
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemSimon Aderinlola
 
Data Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a PositiveData Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a PositiveTargetX
 
Module 5 - Legislation - Online
Module 5 - Legislation - OnlineModule 5 - Legislation - Online
Module 5 - Legislation - Onlinecaniceconsulting
 
Why the new data laws are good for UX
Why the new data laws are good for UXWhy the new data laws are good for UX
Why the new data laws are good for UXjreay
 

Ähnlich wie A Morning of Mobile Privacy - Presenter Slides (20)

Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with Privacy
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key Issues
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
 
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, FedseMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
 
Data set module 4
Data set   module 4Data set   module 4
Data set module 4
 
IoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the futureIoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the future
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
 
Thierer Internet Privacy Regulation
Thierer Internet Privacy RegulationThierer Internet Privacy Regulation
Thierer Internet Privacy Regulation
 
Age Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAge Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data Use
 
Ethics of Big Data
Ethics of Big DataEthics of Big Data
Ethics of Big Data
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Evolution of identity Stoyan Kenderov - MAC 2014 conference
Evolution of identity   Stoyan Kenderov - MAC 2014 conferenceEvolution of identity   Stoyan Kenderov - MAC 2014 conference
Evolution of identity Stoyan Kenderov - MAC 2014 conference
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
 
Data Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a PositiveData Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a Positive
 
Module 5 - Legislation - Online
Module 5 - Legislation - OnlineModule 5 - Legislation - Online
Module 5 - Legislation - Online
 
Why the new data laws are good for UX
Why the new data laws are good for UXWhy the new data laws are good for UX
Why the new data laws are good for UX
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 

Kürzlich hochgeladen

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 

Kürzlich hochgeladen (20)

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 

A Morning of Mobile Privacy - Presenter Slides

  • 2. Restoring the Faith PRESENTED BY: Jules Polonetsky Executive Director & Co-Chair The Future of Privacy Forum
  • 4. Not Just the Media – It’s Become a National Joke
  • 5.
  • 6. We Don’t Learn From Our Mistakes
  • 7. How Has Industry Responded?
  • 8. Regulators Respond Sen. Rockefeller legislation to set mandatory Do Not Track Rules  New FTC COPPA rules  EU Cookie Directive  And states get into the privacy game… 
  • 9. Platforms/Browsers Respond Cookie Blocking  iOS 7 MAC address changes  Do Not Track settings  Remember IE tracking Protection Lists? 
  • 10. Ecosystem Reactions   Pop up problem 50% click through rate so must be working!
  • 11. Over thirty years, consumers have consistently fit into 3 groups:    17% privacy fundamentalists 56% pragmatic majority 27% marginally concerned - Westin Surveys
  • 12. Consumers Are Complicated “We’ve found that individuals assign radically different values to their personal information depending on whether they’re focusing on protecting data from exposure or selling away data that would be otherwise protected.” Acquisti, L. John, and G. Loewenstein, “What is Privacy Worth?,” tech. report, Heinz College, Carnegie Mellon University, 2009.
  • 13.
  • 14.
  • 15. We are OK with sharing when what is being done is for me, not to me
  • 16.
  • 17.
  • 18.
  • 19. Icons that mean something smart data @ work for you
  • 21. It’s only going to get more interesting and challenging… Smart phones  Smart cars  Smart stores  Smart grid 
  • 22. Jules Polonetsky, Executive Director JulesPol@futureofprivacy.org • www.futureofprivacy.org • Facebook.com/futureofprivacy • @julespolonetsky
  • 23. IT’S THE END OF THE WORLD AS WE KNOW IT…AND I FEEL FINE! PRESENTED BY: Jaka Jancar Chief Technology Officer Celtra
  • 24. Celtra & privacy • We’re RM company, new to privacy • It’s hard to know what’s OK and what’s not • Why don’t offline businesses have as many privacy concerns?
  • 25. What is different online? • Unknowingly generated data online is much greater in number and level of detail (e.g. web activity, app usage, geo, …) • Evilness levels are identical, just capabilities larger • Yet, expectations of privacy are the same
  • 26. People: a healthy dose of ignorance • Normal people don’t proactively think about privacy • “Being informed”, “having options” …meh • They just don’t want to be negatively surprised • And that’s fine!
  • 27. Ad tech: “cover your ass” strategy • Constant obsession • Putting up a show – – – – – Non-PII, probabilistic identifiers Not storing data Transparency: disclaimers Control: opt-outs Self-regulation • Good for staving off media and regulators, but that’s all
  • 28. Thought: it’s not Ad Tech’s role • We have our goal: to improve efficiency • It might conflict with users’ privacy • We might not be the best to represent users
  • 29. Who, then? • For most egregious of cases, and for a framework, governments are probably fine • For “good taste” — who has the most to lose? – Not ad tech companies (what are those?) – Platform vendors (OS, browser) – Publishers (at risk) • They are who users entrust with their digital lives, and who they will resent if betrayed.
  • 30. Rash platform changes don’t help • Disabling 3rd party cookies • Removing UDID • Enabling DNT by default on IE10 All-or-nothing, not legitimate (user will)
  • 31. Good example: IDFA • Under user control (resettable, configurable privacy level, platform-wide, even crossdevice) • Not all-or-nothing (never fully removes identifier and always allows basic uses) • Limits uses, not collection (more data available in the future?) • Allowed uses very clear + legitimate (no philosophical questions, no excuse to ignore or bypass)
  • 32. Recap • Privacy push will come from users → platforms -> publishers → ad tech → advertisers It will not be magically born in the middle • Parties near the user will be the “good taste”. There is a big opportunity for differentiation. • Permissions will move from “cover your asses” complete opt-out, to more granular ones • We will lose freedom, but gain simplicity and accuracy in exchange
  • 33. What will we do at Celtra? • Focus on empowering users • Very specifically: – Always collect <identifier, permissions> – In absence of permissions, assume very little is OK by default
  • 34. CREATING DIGITAL AUDIENCES IN A WORLD WITHOUT COOKIES PRESENTED BY: Alan Chapell President Chapell & Associates
  • 35. To Access These Slides Contact Alan Chapell President Chapell & Associates achapell@chapellassociates.com

Hinweis der Redaktion

  1. A lot of this is their problem – headline for data leakage..jonathanmayer – common sense media with leibowitz – website research finds online data leakage…richard smith and double click (1990) / jonathanmayer ( 2009) then get the wall street (PII Hutzpah stupidity or are we just too busy?Ballah – who showed….we in the industry have brought a lot of this on ourselves…kept swearing this was anoRely on privacy policy as main way of engaging with consumers….(1) keep leaking the data – we don’t learn from our mistakes- ourprimary communication with our customers is VIA a privacy policy -
  2. Aquisiti study on being irrational
  3. Aquisiti study on being irrational
  4. http://www.docucrunch.com/would-you-trade-your-password-for-a-candy-bar
  5. http://articles.latimes.com/2012/jul/01/business/la-fi-travel-briefcase-20120702
  6. Lean In – Sheryl Sandberg….(the solution = lean in) ….
  7. http://tech.fortune.cnn.com/2011/05/12/surprise-50-of-ipad-subscribers-click-allow/
  8. Focus on enabling RM and improving it&apos;s user experience and engagement.Only lately, we&apos;ve started working on some new reporting and creative features that require us to identify individual users. For the first time now, we have to think about users&apos; privacy.With technical and UX questions, it&apos;s usually clear intuitively what is good and what isn&apos;t, and if it is not, it&apos;s easy to test. With privacy questions, it&apos;s much harder to decide what&apos;s OK and what isn&apos;t. Often, you never get to a clear-cut answer.One thing we tried is to help ourselves by drawing parallels to the real world: mapping tracking, fingerprinting, cookie syncing to the real world. That usually doesn&apos;t work out well. At best, you&apos;re a creepy stalker, at worst, a felon.
  9. Real world just doesn’t scale and is more transparent. Users have been protected by that
  10. * Apart from a small minority with interest in the subject, people don&apos;t often think about their privacy proactively, online or offlineAPPLE ANALOGY FOR PRODUCTIONDon’t want to be negatively surpriset -&gt; expect people to have good sense
  11. Small leap to identity. * On our side, companies like us are constantly thinking about these problems. * We self-regulate, show restraint, even if we know it doesn&apos;t work: * We say we don&apos;t collect PII. * We also know: 87% of the US population can be uniquely identified by just using their ZIP, gender and DOB. [src] * Non-PII + Non-PII can be PII * We provide opt-out mechanisms, which have extremely poor usability * We offer users transparency, control -&gt; but nobody cares about that (like ToS, privacy policy). * It might be good for staving off media and regulators, but users just don&apos;t want to be negatively surprised. * &quot;Cover your ass strategy&quot;
  12. Conflict of interest.Like companies don&apos;t usually serve the sell side and the buy side.Not a cynic.Not zero sum, but when downsides much lower than upsides, conflict of interest cannot be denied.
  13. Facebook, Google+, LinkedIn mails, ISPs sniffing trafficPhones are most private of devices, and Apple or Google definitely do not want them to be perceived by users as a tracking device in their pocket.Of course, this is nothing new. Publishers are already today careful. I&apos;m just saying their role will be increased. Not just about the data they leak, but enforcing the good taste upstream. APPLE ANALOGY FOR PRODUCTION * The same companies also have the most to gain: If people notice incidents repeatedly, privacy can become a major differentiator.
  14. * Disabling of third party cookies -&gt; flash cookies, ETag/cache abuse, fingerpriting. No visibility, no direct controlly, shitty and fragmented opt outs * Hiding of UDID -&gt; Start of using MAC addresses and others, again fingerprinting. * Enabling DNT by default on IE10 -&gt; Some started to ignore it altogether.If there is legitimacy, workaround are not legitimate
  15. * There is a big opportunity for differentiation based on privacy across the chain. * We&apos;ll lose some capabilities, but there is a lot to be won.
  16. * Don&apos;t throw sand in the eyes (unless client requested). * Be transparent for the activists and legislators, but know it isn&apos;t important to most people. * In practice: don&apos;t collect id, but id+allowes usage (e.g. IDFA). In absence of explicit usage, assume very little is ok downstream (default to conservative).