SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Downloaden Sie, um offline zu lesen
10 Burning
Questions
on Privacy
2
This presentation gives an overview of the most
important issues related to privacy on the web and
mobile.
It also provides insights and recommendations on what
you need to do for your mobile services and marketing
campaigns to create the best environment for users to
share their data.
Introduction
The author, Agathe Caffier, graduated as a business
lawyer in London and is now a Certified Information Privacy
Professional (CIPP/E).
As well as being the general council for Golden Gekko, one
of the leading mobile solution providers in the world, her
expertise in privacy matters related to mobile has led her to
provide privacy guidelines and audits to companies such
as Vodafone, Telefonica and many more.
Index
1. What is Privacy
2. What are the different regimes?
3. Which are the OECD principles?
4. Who are the different players?
5. What is the definition of personal data?
6. What does consent mean?
7. What is Active Consent in mobile?
8. Why is user data collected?
9. What is the Privacy debate about?
10. Why is there a debate about cookies?
3
4
Defined as the right to be left alone, anonymity.
Control over the use of personal information.
The ability of an individual or group to seclude themselves
or information about themselves, and thereby reveal
themselves selectively.
What is Privacy?
There is no single privacy law that applies universally.
Some languages do not have a word for privacy and only
80 countries have data protection regimes.
Four categories of privacy: bodily (physical), territorial
(house), communication (mail, telephone), information
.
5
Comprehensive model (EU)
General law covering data protection in public and
private sector, with an agency responsible for covering
its enforcement (DPA). France CNIL, Spain AEPD, UK
ICO
What are the different regimes? (1)
Sectoral Model (US)
No general framework but some existing laws addressing
specific industry sectors. Eg: finance, healthcare.
Each law will have a different enforcement authority.
.
6
Co-regulatory, Self-regulatory Model (Canada)
Mix of government and non governmental institutions that
protects personal information.
Co: law which states that each industry must develop
enforceable codes
What are the different regimes? (2)
Self: no law but existence of codes of practice for
protection by company industry or independent body.
No general Privacy / data protection law (China)
No general law. No industry guidelines.
.
7
Collection limitation principle - data subject should
know of collection when possible
Data quality principal - data to be relevant for the
purpose of collection
Which are the OECD principles? (1)
Purpose specification principle – purpose of collection
must be specified at time of collection
Use limitation principle – data to be used according to
purpose
.
8
Security safeguards principle – data should be
protected
Openness principle – no secrecy about data controller
identity and the way the data is used
Which are the OECD principles? (2)
Individual participation principle – data subject right of
access (if refused there must be valid reasons)
Accountability principle- accountable for complying with
measures in principles
.
9
Data Processor
Is an individual or organization, often a third party
outsourcing service, that processes data on behalf of
the data controller.
Is not authorized to do additional data processing
outside of the scope of what is permitted from the data
controller itself.
Who are the different players?
Data Subject
Individual whose information is being processed,
Eg: employee, end-user of an App.
Data Controller
An organization who has the authority to decide how
and why personal information is to be processed
10
“Any data that relates to an identified or identifiable
individual”
There are certain differences from one country to
another. For example, in the EU, an IP address is
personal whereas this is not the case in the US
Examples of what is classified as personal data
includes name, gender, contact information, age
and birth date, marital status, social security
number.
What is the definition of
personal data? (1)
11
A sub category is sensitive data, which covers for
example, racial or ethnic origin, political opinion,
biometric data, trade union membership or sexual
orientation.
Non- personal data is anonymized data, for example,
the date and time someone visits a specific webpage.
What is the definition of
personal data? (2)
12
“Any freely given specific and informed indication of his
wishes by which the data subject signifies his
agreement to personal data relating to him being
processed”.
Consent must be unambiguous.
Valid consent assumes the individuals’ capacity to
consent.
What does consent mean?
Individuals who have consented should be able to
withdraw their consent, preventing further processing of
their data.
Consent must be provided before the processing of
personal data starts, but it can also be required in the
course of processing, where there is a new purpose to
the data.
.
13
The definition of Active Consent in mobile is:
Voluntary, informed, express and revocable permission.
This means a user is given a clear opportunity to agree
a specific and notified use of their personal information.
Permission must be captured in a way that is not the
default option.
What is Active Consent in mobile?
Active consent applies to secondary, non-obvious use
of a user’s personal information, and/or applications
that have additional privacy implications for users
For example, an app requesting a user’s location,
where such data is not necessary for the functioning of
the app.
.
14
Golden Gekko recommends not only to comply with
the minimum legal requirements imposed by the law
but to go the extra mile and involve the user. Ensure
they are able to actively approve of their data being
processed.
A great way to involve the user in
participating is to educate them.
Our recommendation
The user should own the consent process and be given
a choice. They should also be allowed to retract their
permission easily, for example in the main ‘Settings’
menu.
Another great way to involve the user in participating in
giving consent is to educate them. Education is very
efficient when the app includes a simple wizard which
takes the user through all the privacy parameters
included in the app.
.
15
Your data can help app makers take important
decisions related to future feature enhancements
helping the app to work for you in a more personalized
way.
Some apps gather your personal data so that they can
target specific ads to you. If your data shows you meet
certain criteria, advertisers will tailor their marketing
efforts accordingly.
Why is user data collected?
In the case of a malicious app, your personal data could
be sold or used for illegal purposes.
For example, this type of app might send text messages
without your consent to premium numbers. In such
instances some users have reported being charged as
much as $10 per message. Getting access to your
contact list can be a goldmine for malware authors and
spammers.
.
16
App users are aware that most applications will need to
use at least some basic personal data in order to allow
proper use.
The problem that most users encounter is not
necessarily centred around the idea of sharing their
personal data, but rather, around the lack of
transparency and the loss of ownership of said
information.
Our recommendation
Our recommendation: Be transparent and clearly
communicate to your user the reasons for collecting
their personal data.
Be transparent and clearly communicate
the reasons for data collection.
17
App developers´ standpoint:
Privacy requirements should be respected to gain
users’ trust through being transparent.
Security measures need to be put in place to protect
users’ Privacy.
What is the privacy debate about?
Users’ standpoint:
Privacy may be voluntarily sacrificed in exchange for
perceived benefits.
Info can be stolen, misused and carries the threat of
identity theft.
18
We refuse to follow a rigid approach which could mean
an overload of pop up notifications reducing the users’
positive experience.
We recommend a flexible approach to
privacy.
Our recommendation
We recommend a flexible approach to privacy.
A flexible approach should mean a leverage of best
practices from each sector in addition to a smart user
flow and privacy settings implemented within the app.
19
In the EU, the first cookie law was introduced in 2002
where choosing to opt out was sufficient.
With the new Cookie law from 2009, opt in is required
with clear and comprehensive information about the
purposes of the storage of, or access to, that data.
Clear consent must be given.
Why is there a debate about cookies?
An example of a typical notice is: “This website uses
cookies. By using this website you approve to the use
of cookies. Please check our Privacy policy for more
information.”
There are different implementations of the law
depending on the jurisdictions:
http://cookiepedia.co.uk/cookie-laws-across-europe
20
It is important to understand privacy and put in place
appropriate legal and security measures.
Understanding privacy matters linked to mobile
application solutions will play in your favour and help
you retain your customers.
By tackling privacy from the outset of the development
of your app, you will gain users’ trust more rapidly.
Our recommendation
We recommend you give your user the choice to share
or not his personal data as well as explaining the reason
for which the data is collected.
The customer should also be given the option to go
back and change their permission status easily.
The idea is not to overload the user with pop up
notifications at each step of the app but rather, by
thinking about how to integrate privacy upfront, allowing
them to be in control through education.
21
A great way to do so is by adding a wizard that will
guide them when starting to use the app.
Moreover, by doing audits of your current application
on a regular basis you will gain users’ trust. The impact
of the latest breaches of personal data is raising
awareness amongst customers who are becoming
more demanding in regards to privacy settings.
Our recommendation
We recommend proactivity and adherence to the latest
industry recommendations by adjusting your user
journey accordingly.
We recommend proactivity and
adherence to the latest industry
guidelines.
Fighting for a world
full of mobile solutions
since 2005
web www.goldengekko.com
email
Agathe Caffier
Legal Adviser
info@goldengekko.com

Weitere ähnliche Inhalte

Was ist angesagt?

Google Policy Primer
Google Policy PrimerGoogle Policy Primer
Google Policy PrimerIrene Pollak
 
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...FLUZO
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalDr. Donald Macfarlane
 
Privacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterPrivacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterJonathan Ezor
 
Govt authentication brief ca v
Govt authentication brief ca vGovt authentication brief ca v
Govt authentication brief ca vMike Kuhn
 
CSR PII White Paper
CSR PII White PaperCSR PII White Paper
CSR PII White PaperDmcenter
 
Online Behavioral Advertising (OBA) Legal & Regulatory Compliance
Online Behavioral Advertising (OBA) Legal & Regulatory ComplianceOnline Behavioral Advertising (OBA) Legal & Regulatory Compliance
Online Behavioral Advertising (OBA) Legal & Regulatory ComplianceAdler Law Group
 
Google's Effort to Fight Content Piracy
Google's Effort to Fight Content PiracyGoogle's Effort to Fight Content Piracy
Google's Effort to Fight Content PiracyThe Hacker News
 
A priest’s phone location data outed his private life. It could happen to any...
A priest’s phone location data outed his private life. It could happen to any...A priest’s phone location data outed his private life. It could happen to any...
A priest’s phone location data outed his private life. It could happen to any...LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 
TRUSTe whitepaper- A Checklist of Practices that Impact Consumer Trust
TRUSTe whitepaper- A Checklist of Practices that Impact Consumer TrustTRUSTe whitepaper- A Checklist of Practices that Impact Consumer Trust
TRUSTe whitepaper- A Checklist of Practices that Impact Consumer TrustTRUSTe
 
eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...
eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...
eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...Aurélie Pols
 
Presentation Yun Li
Presentation Yun LiPresentation Yun Li
Presentation Yun LiYunLi
 
National identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernmentNational identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernmentEric BILLIAERT
 
Targeted Online Advertising
Targeted Online AdvertisingTargeted Online Advertising
Targeted Online AdvertisingGautam Verma
 
Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...
Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...
Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...Tania Mushtaq
 
Business ethics talk
Business ethics talkBusiness ethics talk
Business ethics talkRobert Bodle
 
Information governance a_necessity_in_to
Information governance a_necessity_in_toInformation governance a_necessity_in_to
Information governance a_necessity_in_toAnne ndolo
 
Presentation ncsl - mobile privacy enforcement 130502 (as presented)
Presentation   ncsl - mobile privacy enforcement 130502 (as presented)Presentation   ncsl - mobile privacy enforcement 130502 (as presented)
Presentation ncsl - mobile privacy enforcement 130502 (as presented)Jason Haislmaier
 
Artificial Intelligence and Machine Learning
Artificial Intelligence and Machine LearningArtificial Intelligence and Machine Learning
Artificial Intelligence and Machine LearningPolsinelli PC
 
HIPAA Privacy, Security, Breach Overview
HIPAA Privacy, Security, Breach OverviewHIPAA Privacy, Security, Breach Overview
HIPAA Privacy, Security, Breach OverviewHealthCare Too, LLC
 

Was ist angesagt? (20)

Google Policy Primer
Google Policy PrimerGoogle Policy Primer
Google Policy Primer
 
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
Privacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterPrivacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law Center
 
Govt authentication brief ca v
Govt authentication brief ca vGovt authentication brief ca v
Govt authentication brief ca v
 
CSR PII White Paper
CSR PII White PaperCSR PII White Paper
CSR PII White Paper
 
Online Behavioral Advertising (OBA) Legal & Regulatory Compliance
Online Behavioral Advertising (OBA) Legal & Regulatory ComplianceOnline Behavioral Advertising (OBA) Legal & Regulatory Compliance
Online Behavioral Advertising (OBA) Legal & Regulatory Compliance
 
Google's Effort to Fight Content Piracy
Google's Effort to Fight Content PiracyGoogle's Effort to Fight Content Piracy
Google's Effort to Fight Content Piracy
 
A priest’s phone location data outed his private life. It could happen to any...
A priest’s phone location data outed his private life. It could happen to any...A priest’s phone location data outed his private life. It could happen to any...
A priest’s phone location data outed his private life. It could happen to any...
 
TRUSTe whitepaper- A Checklist of Practices that Impact Consumer Trust
TRUSTe whitepaper- A Checklist of Practices that Impact Consumer TrustTRUSTe whitepaper- A Checklist of Practices that Impact Consumer Trust
TRUSTe whitepaper- A Checklist of Practices that Impact Consumer Trust
 
eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...
eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...
eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...
 
Presentation Yun Li
Presentation Yun LiPresentation Yun Li
Presentation Yun Li
 
National identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernmentNational identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernment
 
Targeted Online Advertising
Targeted Online AdvertisingTargeted Online Advertising
Targeted Online Advertising
 
Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...
Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...
Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...
 
Business ethics talk
Business ethics talkBusiness ethics talk
Business ethics talk
 
Information governance a_necessity_in_to
Information governance a_necessity_in_toInformation governance a_necessity_in_to
Information governance a_necessity_in_to
 
Presentation ncsl - mobile privacy enforcement 130502 (as presented)
Presentation   ncsl - mobile privacy enforcement 130502 (as presented)Presentation   ncsl - mobile privacy enforcement 130502 (as presented)
Presentation ncsl - mobile privacy enforcement 130502 (as presented)
 
Artificial Intelligence and Machine Learning
Artificial Intelligence and Machine LearningArtificial Intelligence and Machine Learning
Artificial Intelligence and Machine Learning
 
HIPAA Privacy, Security, Breach Overview
HIPAA Privacy, Security, Breach OverviewHIPAA Privacy, Security, Breach Overview
HIPAA Privacy, Security, Breach Overview
 

Andere mochten auch

HIN 2016 Educational Session Slides: Privacy, the Law and Best practice - Sic...
HIN 2016 Educational Session Slides: Privacy, the Law and Best practice - Sic...HIN 2016 Educational Session Slides: Privacy, the Law and Best practice - Sic...
HIN 2016 Educational Session Slides: Privacy, the Law and Best practice - Sic...hintnet
 
PRIVACY TRAINING PLAN - KATY SMATHERS
PRIVACY TRAINING PLAN - KATY SMATHERSPRIVACY TRAINING PLAN - KATY SMATHERS
PRIVACY TRAINING PLAN - KATY SMATHERSKaty Smathers
 
Social Media and Privacy - Education Across the Nation - Australian Computer ...
Social Media and Privacy - Education Across the Nation - Australian Computer ...Social Media and Privacy - Education Across the Nation - Australian Computer ...
Social Media and Privacy - Education Across the Nation - Australian Computer ...Typeset
 
Ethics and consent for data sharing
Ethics and consent for data sharingEthics and consent for data sharing
Ethics and consent for data sharingARDC
 
Facebook and Twitter for Business Course Notes USYD
Facebook and Twitter for Business Course Notes USYDFacebook and Twitter for Business Course Notes USYD
Facebook and Twitter for Business Course Notes USYDLaurel Papworth
 
Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Russell_Kennedy
 
Induction Slideshow Privacy And Confidentiality
Induction Slideshow  Privacy And ConfidentialityInduction Slideshow  Privacy And Confidentiality
Induction Slideshow Privacy And ConfidentialityD S
 

Andere mochten auch (7)

HIN 2016 Educational Session Slides: Privacy, the Law and Best practice - Sic...
HIN 2016 Educational Session Slides: Privacy, the Law and Best practice - Sic...HIN 2016 Educational Session Slides: Privacy, the Law and Best practice - Sic...
HIN 2016 Educational Session Slides: Privacy, the Law and Best practice - Sic...
 
PRIVACY TRAINING PLAN - KATY SMATHERS
PRIVACY TRAINING PLAN - KATY SMATHERSPRIVACY TRAINING PLAN - KATY SMATHERS
PRIVACY TRAINING PLAN - KATY SMATHERS
 
Social Media and Privacy - Education Across the Nation - Australian Computer ...
Social Media and Privacy - Education Across the Nation - Australian Computer ...Social Media and Privacy - Education Across the Nation - Australian Computer ...
Social Media and Privacy - Education Across the Nation - Australian Computer ...
 
Ethics and consent for data sharing
Ethics and consent for data sharingEthics and consent for data sharing
Ethics and consent for data sharing
 
Facebook and Twitter for Business Course Notes USYD
Facebook and Twitter for Business Course Notes USYDFacebook and Twitter for Business Course Notes USYD
Facebook and Twitter for Business Course Notes USYD
 
Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)
 
Induction Slideshow Privacy And Confidentiality
Induction Slideshow  Privacy And ConfidentialityInduction Slideshow  Privacy And Confidentiality
Induction Slideshow Privacy And Confidentiality
 

Ähnlich wie Golden Gekko, 10 burning questions on privacy

Business Marketing Your Mobile app
Business Marketing Your Mobile appBusiness Marketing Your Mobile app
Business Marketing Your Mobile app- Mark - Fullbright
 
Privacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User DataPrivacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User DataPrivacyCenter.cloud
 
How the EU-GDPR May Affect Your Website
How the EU-GDPR May Affect Your WebsiteHow the EU-GDPR May Affect Your Website
How the EU-GDPR May Affect Your WebsiteSilverTech
 
Cookie Consent and Authorized Data Collection_Mar23.pdf
Cookie Consent and Authorized Data Collection_Mar23.pdfCookie Consent and Authorized Data Collection_Mar23.pdf
Cookie Consent and Authorized Data Collection_Mar23.pdfAdzappier
 
GDPR's Impact on Social Media - Everything You Need to Know
GDPR's Impact on Social Media - Everything You Need to KnowGDPR's Impact on Social Media - Everything You Need to Know
GDPR's Impact on Social Media - Everything You Need to KnowVisitor Analytics
 
TrustArc Webinar-Advertising, Privacy, and Data Management Working Together
TrustArc Webinar-Advertising, Privacy, and Data Management Working TogetherTrustArc Webinar-Advertising, Privacy, and Data Management Working Together
TrustArc Webinar-Advertising, Privacy, and Data Management Working TogetherTrustArc
 
Data privacy Legislation in India
Data privacy Legislation in IndiaData privacy Legislation in India
Data privacy Legislation in IndiaLATHA H C
 
Noggin - World's first marketplace for Personal Data
Noggin - World's first marketplace for Personal DataNoggin - World's first marketplace for Personal Data
Noggin - World's first marketplace for Personal DataNoggin Asia
 
Checklist for SMEs for GDPR compliance
Checklist for SMEs for GDPR complianceChecklist for SMEs for GDPR compliance
Checklist for SMEs for GDPR complianceSarah Fox
 
GDPR Changing Mindset
GDPR Changing MindsetGDPR Changing Mindset
GDPR Changing MindsetNetworkIQ
 
Tangible Data Protection White Paper
Tangible Data Protection White PaperTangible Data Protection White Paper
Tangible Data Protection White PaperNick Banbury
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptxRavindra Babu
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-finalDr. Donald Macfarlane
 
Mobile Web and Apps World New Orleans Session 10 Patricia Poss Federal Trade ...
Mobile Web and Apps World New Orleans Session 10 Patricia Poss Federal Trade ...Mobile Web and Apps World New Orleans Session 10 Patricia Poss Federal Trade ...
Mobile Web and Apps World New Orleans Session 10 Patricia Poss Federal Trade ...NextVision Media
 
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdfData Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdfCIOWomenMagazine
 
A Marketer's Dilemma - Collecting Data Without Paying Fines.pdf
A Marketer's Dilemma - Collecting Data Without Paying Fines.pdfA Marketer's Dilemma - Collecting Data Without Paying Fines.pdf
A Marketer's Dilemma - Collecting Data Without Paying Fines.pdfAdzappier
 
Designing for privacy in mobile applications
Designing for privacy in mobile applicationsDesigning for privacy in mobile applications
Designing for privacy in mobile applicationsVodafone developer
 
Csa privacy by design & gdpr austin chambers 11-4-17
Csa   privacy by design & gdpr austin chambers 11-4-17Csa   privacy by design & gdpr austin chambers 11-4-17
Csa privacy by design & gdpr austin chambers 11-4-17Trish McGinity, CCSK
 

Ähnlich wie Golden Gekko, 10 burning questions on privacy (20)

GDPR - Applift firstscreen june 2016
GDPR - Applift firstscreen june 2016GDPR - Applift firstscreen june 2016
GDPR - Applift firstscreen june 2016
 
Business Marketing Your Mobile app
Business Marketing Your Mobile appBusiness Marketing Your Mobile app
Business Marketing Your Mobile app
 
Privacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User DataPrivacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User Data
 
How the EU-GDPR May Affect Your Website
How the EU-GDPR May Affect Your WebsiteHow the EU-GDPR May Affect Your Website
How the EU-GDPR May Affect Your Website
 
Cookie Consent and Authorized Data Collection_Mar23.pdf
Cookie Consent and Authorized Data Collection_Mar23.pdfCookie Consent and Authorized Data Collection_Mar23.pdf
Cookie Consent and Authorized Data Collection_Mar23.pdf
 
GDPR's Impact on Social Media - Everything You Need to Know
GDPR's Impact on Social Media - Everything You Need to KnowGDPR's Impact on Social Media - Everything You Need to Know
GDPR's Impact on Social Media - Everything You Need to Know
 
TrustArc Webinar-Advertising, Privacy, and Data Management Working Together
TrustArc Webinar-Advertising, Privacy, and Data Management Working TogetherTrustArc Webinar-Advertising, Privacy, and Data Management Working Together
TrustArc Webinar-Advertising, Privacy, and Data Management Working Together
 
Data privacy Legislation in India
Data privacy Legislation in IndiaData privacy Legislation in India
Data privacy Legislation in India
 
Mobileprivacyazahir
MobileprivacyazahirMobileprivacyazahir
Mobileprivacyazahir
 
Noggin - World's first marketplace for Personal Data
Noggin - World's first marketplace for Personal DataNoggin - World's first marketplace for Personal Data
Noggin - World's first marketplace for Personal Data
 
Checklist for SMEs for GDPR compliance
Checklist for SMEs for GDPR complianceChecklist for SMEs for GDPR compliance
Checklist for SMEs for GDPR compliance
 
GDPR Changing Mindset
GDPR Changing MindsetGDPR Changing Mindset
GDPR Changing Mindset
 
Tangible Data Protection White Paper
Tangible Data Protection White PaperTangible Data Protection White Paper
Tangible Data Protection White Paper
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptx
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
 
Mobile Web and Apps World New Orleans Session 10 Patricia Poss Federal Trade ...
Mobile Web and Apps World New Orleans Session 10 Patricia Poss Federal Trade ...Mobile Web and Apps World New Orleans Session 10 Patricia Poss Federal Trade ...
Mobile Web and Apps World New Orleans Session 10 Patricia Poss Federal Trade ...
 
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdfData Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
 
A Marketer's Dilemma - Collecting Data Without Paying Fines.pdf
A Marketer's Dilemma - Collecting Data Without Paying Fines.pdfA Marketer's Dilemma - Collecting Data Without Paying Fines.pdf
A Marketer's Dilemma - Collecting Data Without Paying Fines.pdf
 
Designing for privacy in mobile applications
Designing for privacy in mobile applicationsDesigning for privacy in mobile applications
Designing for privacy in mobile applications
 
Csa privacy by design & gdpr austin chambers 11-4-17
Csa   privacy by design & gdpr austin chambers 11-4-17Csa   privacy by design & gdpr austin chambers 11-4-17
Csa privacy by design & gdpr austin chambers 11-4-17
 

Mehr von DMI

CX Audit Workshop
CX Audit WorkshopCX Audit Workshop
CX Audit WorkshopDMI
 
7 Trends & Insights MWC 2017
7 Trends & Insights MWC 20177 Trends & Insights MWC 2017
7 Trends & Insights MWC 2017DMI
 
DMI 2017 Mobile Trends
DMI 2017 Mobile TrendsDMI 2017 Mobile Trends
DMI 2017 Mobile TrendsDMI
 
DMI – World Gaming Executive Summit
DMI – World Gaming Executive SummitDMI – World Gaming Executive Summit
DMI – World Gaming Executive SummitDMI
 
DMI – We Can See the Future
DMI – We Can See the FutureDMI – We Can See the Future
DMI – We Can See the FutureDMI
 
Top 10 Trends at MWC16
Top 10 Trends at MWC16Top 10 Trends at MWC16
Top 10 Trends at MWC16DMI
 
Top 10 Trends for Winners in Mobile 2016
Top 10 Trends for Winners in Mobile 2016Top 10 Trends for Winners in Mobile 2016
Top 10 Trends for Winners in Mobile 2016DMI
 
Don't Mobilize Your Business – Reinvent It
Don't Mobilize Your Business – Reinvent ItDon't Mobilize Your Business – Reinvent It
Don't Mobilize Your Business – Reinvent ItDMI
 
Innovation through Hackathons
Innovation through HackathonsInnovation through Hackathons
Innovation through HackathonsDMI
 
Cambodian Life - Living and Working in Phnom Penh
Cambodian Life - Living and Working in Phnom PenhCambodian Life - Living and Working in Phnom Penh
Cambodian Life - Living and Working in Phnom PenhDMI
 
Mobile Application Security by Design
Mobile Application Security by DesignMobile Application Security by Design
Mobile Application Security by DesignDMI
 
10 Design Trends 2015 - UX & UI Trends for Mobile Solutions
10 Design Trends 2015 - UX & UI Trends for Mobile Solutions10 Design Trends 2015 - UX & UI Trends for Mobile Solutions
10 Design Trends 2015 - UX & UI Trends for Mobile SolutionsDMI
 
MWC 2015 - A Recap of the Key Announcements, Highlights and Trends
MWC 2015 - A Recap of the Key Announcements, Highlights and TrendsMWC 2015 - A Recap of the Key Announcements, Highlights and Trends
MWC 2015 - A Recap of the Key Announcements, Highlights and TrendsDMI
 
Top 8 Mobile Finance Trends 2015
Top 8 Mobile Finance Trends 2015Top 8 Mobile Finance Trends 2015
Top 8 Mobile Finance Trends 2015DMI
 
Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015DMI
 
Top 10 Mobile Trends 2015
Top 10 Mobile Trends 2015Top 10 Mobile Trends 2015
Top 10 Mobile Trends 2015DMI
 
UX & UI Design - Differentiate through design
UX & UI Design - Differentiate through designUX & UI Design - Differentiate through design
UX & UI Design - Differentiate through designDMI
 
Winning the mobile user in 2015
Winning the mobile user in 2015Winning the mobile user in 2015
Winning the mobile user in 2015DMI
 
Golden Gekko presentation Google I/O 2014
Golden Gekko presentation Google I/O 2014Golden Gekko presentation Google I/O 2014
Golden Gekko presentation Google I/O 2014DMI
 
Golden Gekko Review of iOS8- for users and developers
Golden Gekko Review of iOS8- for users and developersGolden Gekko Review of iOS8- for users and developers
Golden Gekko Review of iOS8- for users and developersDMI
 

Mehr von DMI (20)

CX Audit Workshop
CX Audit WorkshopCX Audit Workshop
CX Audit Workshop
 
7 Trends & Insights MWC 2017
7 Trends & Insights MWC 20177 Trends & Insights MWC 2017
7 Trends & Insights MWC 2017
 
DMI 2017 Mobile Trends
DMI 2017 Mobile TrendsDMI 2017 Mobile Trends
DMI 2017 Mobile Trends
 
DMI – World Gaming Executive Summit
DMI – World Gaming Executive SummitDMI – World Gaming Executive Summit
DMI – World Gaming Executive Summit
 
DMI – We Can See the Future
DMI – We Can See the FutureDMI – We Can See the Future
DMI – We Can See the Future
 
Top 10 Trends at MWC16
Top 10 Trends at MWC16Top 10 Trends at MWC16
Top 10 Trends at MWC16
 
Top 10 Trends for Winners in Mobile 2016
Top 10 Trends for Winners in Mobile 2016Top 10 Trends for Winners in Mobile 2016
Top 10 Trends for Winners in Mobile 2016
 
Don't Mobilize Your Business – Reinvent It
Don't Mobilize Your Business – Reinvent ItDon't Mobilize Your Business – Reinvent It
Don't Mobilize Your Business – Reinvent It
 
Innovation through Hackathons
Innovation through HackathonsInnovation through Hackathons
Innovation through Hackathons
 
Cambodian Life - Living and Working in Phnom Penh
Cambodian Life - Living and Working in Phnom PenhCambodian Life - Living and Working in Phnom Penh
Cambodian Life - Living and Working in Phnom Penh
 
Mobile Application Security by Design
Mobile Application Security by DesignMobile Application Security by Design
Mobile Application Security by Design
 
10 Design Trends 2015 - UX & UI Trends for Mobile Solutions
10 Design Trends 2015 - UX & UI Trends for Mobile Solutions10 Design Trends 2015 - UX & UI Trends for Mobile Solutions
10 Design Trends 2015 - UX & UI Trends for Mobile Solutions
 
MWC 2015 - A Recap of the Key Announcements, Highlights and Trends
MWC 2015 - A Recap of the Key Announcements, Highlights and TrendsMWC 2015 - A Recap of the Key Announcements, Highlights and Trends
MWC 2015 - A Recap of the Key Announcements, Highlights and Trends
 
Top 8 Mobile Finance Trends 2015
Top 8 Mobile Finance Trends 2015Top 8 Mobile Finance Trends 2015
Top 8 Mobile Finance Trends 2015
 
Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015
 
Top 10 Mobile Trends 2015
Top 10 Mobile Trends 2015Top 10 Mobile Trends 2015
Top 10 Mobile Trends 2015
 
UX & UI Design - Differentiate through design
UX & UI Design - Differentiate through designUX & UI Design - Differentiate through design
UX & UI Design - Differentiate through design
 
Winning the mobile user in 2015
Winning the mobile user in 2015Winning the mobile user in 2015
Winning the mobile user in 2015
 
Golden Gekko presentation Google I/O 2014
Golden Gekko presentation Google I/O 2014Golden Gekko presentation Google I/O 2014
Golden Gekko presentation Google I/O 2014
 
Golden Gekko Review of iOS8- for users and developers
Golden Gekko Review of iOS8- for users and developersGolden Gekko Review of iOS8- for users and developers
Golden Gekko Review of iOS8- for users and developers
 

Kürzlich hochgeladen

So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 

Kürzlich hochgeladen (20)

So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 

Golden Gekko, 10 burning questions on privacy

  • 2. 2 This presentation gives an overview of the most important issues related to privacy on the web and mobile. It also provides insights and recommendations on what you need to do for your mobile services and marketing campaigns to create the best environment for users to share their data. Introduction The author, Agathe Caffier, graduated as a business lawyer in London and is now a Certified Information Privacy Professional (CIPP/E). As well as being the general council for Golden Gekko, one of the leading mobile solution providers in the world, her expertise in privacy matters related to mobile has led her to provide privacy guidelines and audits to companies such as Vodafone, Telefonica and many more.
  • 3. Index 1. What is Privacy 2. What are the different regimes? 3. Which are the OECD principles? 4. Who are the different players? 5. What is the definition of personal data? 6. What does consent mean? 7. What is Active Consent in mobile? 8. Why is user data collected? 9. What is the Privacy debate about? 10. Why is there a debate about cookies? 3
  • 4. 4 Defined as the right to be left alone, anonymity. Control over the use of personal information. The ability of an individual or group to seclude themselves or information about themselves, and thereby reveal themselves selectively. What is Privacy? There is no single privacy law that applies universally. Some languages do not have a word for privacy and only 80 countries have data protection regimes. Four categories of privacy: bodily (physical), territorial (house), communication (mail, telephone), information .
  • 5. 5 Comprehensive model (EU) General law covering data protection in public and private sector, with an agency responsible for covering its enforcement (DPA). France CNIL, Spain AEPD, UK ICO What are the different regimes? (1) Sectoral Model (US) No general framework but some existing laws addressing specific industry sectors. Eg: finance, healthcare. Each law will have a different enforcement authority. .
  • 6. 6 Co-regulatory, Self-regulatory Model (Canada) Mix of government and non governmental institutions that protects personal information. Co: law which states that each industry must develop enforceable codes What are the different regimes? (2) Self: no law but existence of codes of practice for protection by company industry or independent body. No general Privacy / data protection law (China) No general law. No industry guidelines. .
  • 7. 7 Collection limitation principle - data subject should know of collection when possible Data quality principal - data to be relevant for the purpose of collection Which are the OECD principles? (1) Purpose specification principle – purpose of collection must be specified at time of collection Use limitation principle – data to be used according to purpose .
  • 8. 8 Security safeguards principle – data should be protected Openness principle – no secrecy about data controller identity and the way the data is used Which are the OECD principles? (2) Individual participation principle – data subject right of access (if refused there must be valid reasons) Accountability principle- accountable for complying with measures in principles .
  • 9. 9 Data Processor Is an individual or organization, often a third party outsourcing service, that processes data on behalf of the data controller. Is not authorized to do additional data processing outside of the scope of what is permitted from the data controller itself. Who are the different players? Data Subject Individual whose information is being processed, Eg: employee, end-user of an App. Data Controller An organization who has the authority to decide how and why personal information is to be processed
  • 10. 10 “Any data that relates to an identified or identifiable individual” There are certain differences from one country to another. For example, in the EU, an IP address is personal whereas this is not the case in the US Examples of what is classified as personal data includes name, gender, contact information, age and birth date, marital status, social security number. What is the definition of personal data? (1)
  • 11. 11 A sub category is sensitive data, which covers for example, racial or ethnic origin, political opinion, biometric data, trade union membership or sexual orientation. Non- personal data is anonymized data, for example, the date and time someone visits a specific webpage. What is the definition of personal data? (2)
  • 12. 12 “Any freely given specific and informed indication of his wishes by which the data subject signifies his agreement to personal data relating to him being processed”. Consent must be unambiguous. Valid consent assumes the individuals’ capacity to consent. What does consent mean? Individuals who have consented should be able to withdraw their consent, preventing further processing of their data. Consent must be provided before the processing of personal data starts, but it can also be required in the course of processing, where there is a new purpose to the data. .
  • 13. 13 The definition of Active Consent in mobile is: Voluntary, informed, express and revocable permission. This means a user is given a clear opportunity to agree a specific and notified use of their personal information. Permission must be captured in a way that is not the default option. What is Active Consent in mobile? Active consent applies to secondary, non-obvious use of a user’s personal information, and/or applications that have additional privacy implications for users For example, an app requesting a user’s location, where such data is not necessary for the functioning of the app. .
  • 14. 14 Golden Gekko recommends not only to comply with the minimum legal requirements imposed by the law but to go the extra mile and involve the user. Ensure they are able to actively approve of their data being processed. A great way to involve the user in participating is to educate them. Our recommendation The user should own the consent process and be given a choice. They should also be allowed to retract their permission easily, for example in the main ‘Settings’ menu. Another great way to involve the user in participating in giving consent is to educate them. Education is very efficient when the app includes a simple wizard which takes the user through all the privacy parameters included in the app. .
  • 15. 15 Your data can help app makers take important decisions related to future feature enhancements helping the app to work for you in a more personalized way. Some apps gather your personal data so that they can target specific ads to you. If your data shows you meet certain criteria, advertisers will tailor their marketing efforts accordingly. Why is user data collected? In the case of a malicious app, your personal data could be sold or used for illegal purposes. For example, this type of app might send text messages without your consent to premium numbers. In such instances some users have reported being charged as much as $10 per message. Getting access to your contact list can be a goldmine for malware authors and spammers. .
  • 16. 16 App users are aware that most applications will need to use at least some basic personal data in order to allow proper use. The problem that most users encounter is not necessarily centred around the idea of sharing their personal data, but rather, around the lack of transparency and the loss of ownership of said information. Our recommendation Our recommendation: Be transparent and clearly communicate to your user the reasons for collecting their personal data. Be transparent and clearly communicate the reasons for data collection.
  • 17. 17 App developers´ standpoint: Privacy requirements should be respected to gain users’ trust through being transparent. Security measures need to be put in place to protect users’ Privacy. What is the privacy debate about? Users’ standpoint: Privacy may be voluntarily sacrificed in exchange for perceived benefits. Info can be stolen, misused and carries the threat of identity theft.
  • 18. 18 We refuse to follow a rigid approach which could mean an overload of pop up notifications reducing the users’ positive experience. We recommend a flexible approach to privacy. Our recommendation We recommend a flexible approach to privacy. A flexible approach should mean a leverage of best practices from each sector in addition to a smart user flow and privacy settings implemented within the app.
  • 19. 19 In the EU, the first cookie law was introduced in 2002 where choosing to opt out was sufficient. With the new Cookie law from 2009, opt in is required with clear and comprehensive information about the purposes of the storage of, or access to, that data. Clear consent must be given. Why is there a debate about cookies? An example of a typical notice is: “This website uses cookies. By using this website you approve to the use of cookies. Please check our Privacy policy for more information.” There are different implementations of the law depending on the jurisdictions: http://cookiepedia.co.uk/cookie-laws-across-europe
  • 20. 20 It is important to understand privacy and put in place appropriate legal and security measures. Understanding privacy matters linked to mobile application solutions will play in your favour and help you retain your customers. By tackling privacy from the outset of the development of your app, you will gain users’ trust more rapidly. Our recommendation We recommend you give your user the choice to share or not his personal data as well as explaining the reason for which the data is collected. The customer should also be given the option to go back and change their permission status easily. The idea is not to overload the user with pop up notifications at each step of the app but rather, by thinking about how to integrate privacy upfront, allowing them to be in control through education.
  • 21. 21 A great way to do so is by adding a wizard that will guide them when starting to use the app. Moreover, by doing audits of your current application on a regular basis you will gain users’ trust. The impact of the latest breaches of personal data is raising awareness amongst customers who are becoming more demanding in regards to privacy settings. Our recommendation We recommend proactivity and adherence to the latest industry recommendations by adjusting your user journey accordingly. We recommend proactivity and adherence to the latest industry guidelines.
  • 22. Fighting for a world full of mobile solutions since 2005 web www.goldengekko.com email Agathe Caffier Legal Adviser info@goldengekko.com