SlideShare ist ein Scribd-Unternehmen logo
1 von 54
Austin Alleman@allemanau,[object Object],The Accidental Chief Privacy Officer,[object Object],Jim AdlerChief Privacy Officer & General Manager, Data SystemsIntelius,[object Object],twitter: @jim_adlerhttp://jimadler.me,[object Object],Strata Conference, New YorkSeptember 2011,[object Object]
Direct-to-consumer provider of public information about people and businesses. ,[object Object],Discover each other to make better decisions and empower yourself to take control of your reputation.,[object Object],comScore top 100 site, 11M unique, paying customers.,[object Object],About INTELIUS,[object Object]
Billions of Records,[object Object],300 Million People,[object Object],The “Big Data” People Search Problem,[object Object],213 records mapped ,[object Object],to the correct 37 Jim Adlers,[object Object],Randolph Hutchins,[object Object],5 People,[object Object],Philip Collins,[object Object],375 People,[object Object],Jim Adler,[object Object],213 Records37 People,[object Object],Jim Adler,[object Object],McKinney, TX,[object Object],Age 57,[object Object],Gwen Fleming,[object Object],2 People,[object Object],Jim Adler,[object Object],Houston, TX,[object Object],Age 68,[object Object],Carol Brooks,[object Object],9800 Records,[object Object],1250 People,[object Object],Jim Adler,[object Object],Hastings, NE,[object Object],Age 32,[object Object],Jim Adler,[object Object],Canaan, NH,[object Object],Age 59,[object Object],Jim Adler,[object Object],Redmond, WA,[object Object],Age 48,[object Object],Jim Adler,[object Object],Denver, CO,[object Object],Age 48,[object Object]
“Dennis Rodman” Profile,[object Object]
Intelligence,[object Object],I am not an,[object Object],Attorney,[object Object],Geek,[object Object],Dweeb,[object Object],Nerd,[object Object],SocialIneptitude,[object Object],Obsession,[object Object],Dork,[object Object]
Strata Conference NY: The Accidental Chief Privacy Officer
Mark Zuckerberg,[object Object],Real Names,[object Object],Richard Feynman,[object Object],Physics,[object Object],Norio Ohga,[object Object],Sony President,[object Object],74 min CD,[object Object],Jeff Jonas,[object Object],Big Data,[object Object],Privacy by Design,[object Object],Steve Jobs,[object Object],‘nuff said,[object Object],Eclectic Innovators,[object Object]
Agenda,[object Object],Innocence,[object Object],Frontier,[object Object],Regulation,[object Object],Innovation,[object Object],Austin Alleman@allemanau,[object Object]
Frontier,[object Object]
The surface web is small…,[object Object],167 Terabytes,[object Object]
Compared to the deep web…,[object Object],91,000 Terabytes,[object Object]
~20Exabytes,[object Object],(20B GB),[object Object],Data from ,[object Object],dawn of civilization,[object Object],through 2002,[object Object],Data from ,[object Object],April 2011,[object Object]
Reconnecting out-of-touch family members,[object Object],Online shoppers verifying online sellers,[object Object],Caller ID of harassing phone calls,[object Object],Law enforcement,[object Object],Banking Services,[object Object],Adopted kids seeking their biological parents,[object Object],Learning about  a business,[object Object],Airlines trying to return lost luggage,[object Object],Networkers seeking business opportunities,[object Object],Social networkers looking to expand their friends list,[object Object],Professionals learning about colleagues at conferences,[object Object],Social workers who need to know more about their clients,[object Object],Singles curious about the people they meet,[object Object],Lawyers needing quick access to court records,[object Object],Find owner of dog’s relative for transplant,[object Object],Genealogists  cultivating their family tree,[object Object],Investigative journalists running down leads,[object Object],Checking out a prospective tenant,[object Object],Research,[object Object],Sales professionals looking for new prospects,[object Object],Non-profit organizations looking for supporters,[object Object],Alumni groups arranging reunions,[object Object],Parents  ensuring who their kids safety,[object Object],Anyone retrieving court records,[object Object],Businesses that need to update contact information on customers,[object Object],Checking out a prospective date,[object Object],Finding people that have the same illness as you,[object Object],Sharing,[object Object],Those in legally entangled looking for court records,[object Object],Anyone who need address histories for passports,[object Object],Fiancés and their curious family members,[object Object],Anyone curious about who's emailing or calling them,[object Object],Checking out a prospective social network connection,[object Object],Finding long-lost friends, military buddies, roommates, or classmates,[object Object],Researching a prospective employee,[object Object],Regulated,[object Object],For lots of reasons… (some regulated),[object Object]
Providing major benefits…,[object Object],51% “major benefit” is ease and convenience,[object Object],41% “major benefit” is portability,[object Object],39% “major benefit is sharing,[object Object],Use of Cloud Computing Applications and Services, Pew 2008,[object Object]
But real concerns…,[object Object],90% “very concerned” if data sold,[object Object],80% “very concerned” if photos used for marketing,[object Object],68% “very concerned” if data used to serve them ads,[object Object],Use of Cloud Computing Applications and Services, Pew 2008,[object Object]
A Prescient Venn Diagram?,[object Object]
Innocence,[object Object]
When towns were small …,[object Object]
“The only thing worse than being talked about, is not being talked about.”− Oscar Wilde,[object Object],Density↓ ->Anonymity↓ ->Privacy Expectation↓,[object Object]
“Good Fences Make Good Neighbors” 					- Mending Wall, Robert Frost,[object Object],Density↑ ->Anonymity↑ ->Privacy Expectation↑,[object Object]
“In times of rapid change, experience could be your worst enemy.”						− J. Paul Getty,[object Object],#@?$!!,[object Object],“Privacy Vertigo”,[object Object],Density↓ ->Anonymity↓ ->Privacy Expectation↓,[object Object]
What’s in a Nym?,[object Object],Source: Intelius,[object Object]
Regulation,[object Object]
So, how do we think about public and private now?,[object Object]
Public speaking is publicly public,[object Object]
Voting is a privately public,[object Object]
And some things are publicly private,[object Object]
Your home is clearly private,[object Object]
And the Constitution protects your privacy from government …,[object Object]
But no Constitutional protections between citizens,[object Object]
It would be nice … to use familiar framework,[object Object]
Cloud banking clearly private,[object Object]
Tweeting is (mostly) public,[object Object]
Cloud dating is public confidential,[object Object]
FIPPs,[object Object],“Privacy by Design”,[object Object],Consent unnecessary for commonly accepted practices,[object Object],Increased transparency,[object Object],Federal Trade Commission Guidance,[object Object]
Confusion Matrix,[object Object],Predicted,[object Object],Actual,[object Object]
“Policy” Confusion Matrix,[object Object],Regulations,[object Object],Violations,[object Object]
Innovation,[object Object]
Compliance “Evolved”,[object Object],Raw Materials,[object Object],CPO,[object Object],Product Development,[object Object],Marketing,[object Object],Quality Acceptance,[object Object],Release,[object Object],Compliance,[object Object]
 ,[object Object],Hilary Mason’s Maxim,[object Object],Math + Code = Awesome,[object Object],Quants,[object Object],Making a killing on Wall Street but still can’t impress the chicks,[object Object],Weakonomics.com,[object Object]
Corollary to Mason’s Maxim,[object Object],Values * (Math + Code) = Awesome,[object Object]
First Social Network: The Dinner Table,[object Object],We eat. We share.,[object Object]
A Pescatarian Digression,[object Object]
~10,000,[object Object],GCal,[object Object],~20Exabytes,[object Object],(20B GB),[object Object],Data in April 2011,[object Object],Food in April 2011,[object Object]
Food Policy Leads Privacy Policy,[object Object],Peanut Butter,[object Object],Hearings,[object Object],Pure FoodAct,[object Object],Labeling Reform,[object Object],FTC Est.,[object Object],CivilRights,[object Object],“SnakeOil”,[object Object],GMO,[object Object],Social,[object Object],MediaAdoption,[object Object],“RobberBarons”,[object Object],Packaged,[object Object],Foods,[object Object],FCRA,[object Object]
“Give Peas a Chance”,[object Object],Monsanto’s Corn,[object Object],Mendel’s Peas,[object Object],?,[object Object],=,[object Object]
“Give me the bad news first, Doc”,[object Object],=,[object Object],“CDC reports investigations of outbreaks”,[object Object],“46 states & DC require notification of a databreach. National legislation upcoming.”,[object Object]
Opaque Transparency Does Not Inform,[object Object]
Transparency Allows Data Driven Decisions,[object Object]
=,[object Object],YOU,[object Object],%,[object Object],%,[object Object],%,[object Object],%,[object Object],%,[object Object],%,[object Object]
Control comes from Awareness,[object Object],TrueRep.com,[object Object],Awareness and control of your public profile,[object Object],Privacy controls,[object Object],Reputation management,[object Object],Stay tuned …,[object Object]
Strata Conference NY: The Accidental Chief Privacy Officer
Innovation is a team sport,[object Object],Drive confluence of influencewithin your org,[object Object],Be the happy warrior,[object Object],Find clarity within confusion,[object Object],Reports of privacy’s death have been greatly exaggerated …,[object Object]
Questions?,[object Object],Jim AdlerChief Privacy Officer & General Manager, Data SystemsIntelius,[object Object],twitter: @jim_adlerhttp://jimadler.me,[object Object],Strata Conference, New YorkSeptember 2011,[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Mapping the pii market
Mapping the pii marketMapping the pii market
Mapping the pii marketpii2011
 
Facebook and cambridge analytica scandal
Facebook and cambridge analytica scandalFacebook and cambridge analytica scandal
Facebook and cambridge analytica scandalSajibHossain17
 
Presentation to U.S. Chamber Government Affairs Conference
Presentation to U.S. Chamber Government Affairs ConferencePresentation to U.S. Chamber Government Affairs Conference
Presentation to U.S. Chamber Government Affairs ConferenceCurt Mercadante
 
Using New Technologies to Make Sense of Content Chaos: Text mining and visual...
Using New Technologies to Make Sense of Content Chaos: Text mining and visual...Using New Technologies to Make Sense of Content Chaos: Text mining and visual...
Using New Technologies to Make Sense of Content Chaos: Text mining and visual...KM Chicago
 
The elasticity of marketing & analytics ethics
The elasticity of marketing & analytics ethicsThe elasticity of marketing & analytics ethics
The elasticity of marketing & analytics ethicsStéphane Hamel
 
Essentials of Cyberspace Law: User Generated Content, Privacy and Online Adve...
Essentials of Cyberspace Law: User Generated Content, Privacy and Online Adve...Essentials of Cyberspace Law: User Generated Content, Privacy and Online Adve...
Essentials of Cyberspace Law: User Generated Content, Privacy and Online Adve...Internet Law Center
 
Cambridge Analytica as a Prime Example of the Manipulation of Democratic Deci...
Cambridge Analytica as a Prime Example of the Manipulation of Democratic Deci...Cambridge Analytica as a Prime Example of the Manipulation of Democratic Deci...
Cambridge Analytica as a Prime Example of the Manipulation of Democratic Deci...Anna Vollmer
 
The social house that google built
The social house that google builtThe social house that google built
The social house that google builtSean McGinnis
 
Top 6 Lies That Big Corporations Tell
Top 6 Lies That Big Corporations TellTop 6 Lies That Big Corporations Tell
Top 6 Lies That Big Corporations Tellzhmekapanova
 
Protecting Your Business and Employees: Crafting Beneficial Social Media Pol...
Protecting Your Business and Employees:  Crafting Beneficial Social Media Pol...Protecting Your Business and Employees:  Crafting Beneficial Social Media Pol...
Protecting Your Business and Employees: Crafting Beneficial Social Media Pol...Kelley Keller, Esq.
 
Dai Big Data al Cognitive Computing Dematerializzazione, Senso, Decisione e A...
Dai Big Data al Cognitive Computing Dematerializzazione, Senso, Decisione e A...Dai Big Data al Cognitive Computing Dematerializzazione, Senso, Decisione e A...
Dai Big Data al Cognitive Computing Dematerializzazione, Senso, Decisione e A...Redazione InnovaPuglia
 
VSPEC social media / Jon Newman
VSPEC social media / Jon NewmanVSPEC social media / Jon Newman
VSPEC social media / Jon Newmanjonnewman12
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacySarah Pearson
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacyvoelkeld
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacyDanno320
 

Was ist angesagt? (20)

Mapping the pii market
Mapping the pii marketMapping the pii market
Mapping the pii market
 
Facebook and cambridge analytica scandal
Facebook and cambridge analytica scandalFacebook and cambridge analytica scandal
Facebook and cambridge analytica scandal
 
Presentation to U.S. Chamber Government Affairs Conference
Presentation to U.S. Chamber Government Affairs ConferencePresentation to U.S. Chamber Government Affairs Conference
Presentation to U.S. Chamber Government Affairs Conference
 
Internet privacy
Internet privacyInternet privacy
Internet privacy
 
Using New Technologies to Make Sense of Content Chaos: Text mining and visual...
Using New Technologies to Make Sense of Content Chaos: Text mining and visual...Using New Technologies to Make Sense of Content Chaos: Text mining and visual...
Using New Technologies to Make Sense of Content Chaos: Text mining and visual...
 
The elasticity of marketing & analytics ethics
The elasticity of marketing & analytics ethicsThe elasticity of marketing & analytics ethics
The elasticity of marketing & analytics ethics
 
Essentials of Cyberspace Law: User Generated Content, Privacy and Online Adve...
Essentials of Cyberspace Law: User Generated Content, Privacy and Online Adve...Essentials of Cyberspace Law: User Generated Content, Privacy and Online Adve...
Essentials of Cyberspace Law: User Generated Content, Privacy and Online Adve...
 
Cambridge Analytica as a Prime Example of the Manipulation of Democratic Deci...
Cambridge Analytica as a Prime Example of the Manipulation of Democratic Deci...Cambridge Analytica as a Prime Example of the Manipulation of Democratic Deci...
Cambridge Analytica as a Prime Example of the Manipulation of Democratic Deci...
 
The social house that google built
The social house that google builtThe social house that google built
The social house that google built
 
Facebook Scandal
Facebook Scandal Facebook Scandal
Facebook Scandal
 
Top 6 Lies That Big Corporations Tell
Top 6 Lies That Big Corporations TellTop 6 Lies That Big Corporations Tell
Top 6 Lies That Big Corporations Tell
 
Cambridge analytica
Cambridge analyticaCambridge analytica
Cambridge analytica
 
Protecting Your Business and Employees: Crafting Beneficial Social Media Pol...
Protecting Your Business and Employees:  Crafting Beneficial Social Media Pol...Protecting Your Business and Employees:  Crafting Beneficial Social Media Pol...
Protecting Your Business and Employees: Crafting Beneficial Social Media Pol...
 
Dai Big Data al Cognitive Computing Dematerializzazione, Senso, Decisione e A...
Dai Big Data al Cognitive Computing Dematerializzazione, Senso, Decisione e A...Dai Big Data al Cognitive Computing Dematerializzazione, Senso, Decisione e A...
Dai Big Data al Cognitive Computing Dematerializzazione, Senso, Decisione e A...
 
Uga Social Media Privacy June2011
Uga Social Media Privacy June2011Uga Social Media Privacy June2011
Uga Social Media Privacy June2011
 
VSPEC social media / Jon Newman
VSPEC social media / Jon NewmanVSPEC social media / Jon Newman
VSPEC social media / Jon Newman
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacy
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacy
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacy
 
Facebook Scandal
Facebook ScandalFacebook Scandal
Facebook Scandal
 

Andere mochten auch

LSS@SMW: Bernie Hogan Rebuilding The Collapsed Contexts In Social Media
LSS@SMW:  Bernie Hogan Rebuilding The Collapsed Contexts In Social MediaLSS@SMW:  Bernie Hogan Rebuilding The Collapsed Contexts In Social Media
LSS@SMW: Bernie Hogan Rebuilding The Collapsed Contexts In Social MediaLocal Social Summit
 
Managing Privacy and Context Collapse in the Facebook Age
Managing Privacy and Context Collapse in the Facebook AgeManaging Privacy and Context Collapse in the Facebook Age
Managing Privacy and Context Collapse in the Facebook AgeJessica Vitak
 
Quantifying the Invisible Audience in Social Networks
Quantifying the Invisible Audience in Social NetworksQuantifying the Invisible Audience in Social Networks
Quantifying the Invisible Audience in Social NetworksMichael Bernstein
 
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...summersocialwebshop
 
Context collapse on social media: implications for interpersonal and marketin...
Context collapse on social media: implications for interpersonal and marketin...Context collapse on social media: implications for interpersonal and marketin...
Context collapse on social media: implications for interpersonal and marketin...ACSM @ VU University Amsterdam
 
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniTo
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniToSocial Media - Introduzione al Corso [a.a. 2014-2015] - UniTo
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniToAgnese Vellar
 
Comunicare nell'era dei social media
Comunicare nell'era dei social mediaComunicare nell'era dei social media
Comunicare nell'era dei social mediaAgnese Vellar
 
Context Collapse on Social Networking Sites
Context Collapse on Social Networking SitesContext Collapse on Social Networking Sites
Context Collapse on Social Networking SitesStefanie Duguay
 
Theorizing the Future of Computer-Mediated Communication: The Changing Role o...
Theorizing the Future of Computer-Mediated Communication: The Changing Role o...Theorizing the Future of Computer-Mediated Communication: The Changing Role o...
Theorizing the Future of Computer-Mediated Communication: The Changing Role o...Jessica Vitak
 
WISDOM AT WORK: The Power of Personal Storytelling to Spark Insight, Breakthr...
WISDOM AT WORK: The Power of Personal Storytelling to Spark Insight, Breakthr...WISDOM AT WORK: The Power of Personal Storytelling to Spark Insight, Breakthr...
WISDOM AT WORK: The Power of Personal Storytelling to Spark Insight, Breakthr...Mitchell Ditkoff
 
Digital Footprint
Digital FootprintDigital Footprint
Digital FootprintRobin Low
 
Using Social Smarts to Engage Students on Social Media
Using Social Smarts to Engage Students on Social MediaUsing Social Smarts to Engage Students on Social Media
Using Social Smarts to Engage Students on Social MediaPaul Brown
 

Andere mochten auch (14)

LSS@SMW: Bernie Hogan Rebuilding The Collapsed Contexts In Social Media
LSS@SMW:  Bernie Hogan Rebuilding The Collapsed Contexts In Social MediaLSS@SMW:  Bernie Hogan Rebuilding The Collapsed Contexts In Social Media
LSS@SMW: Bernie Hogan Rebuilding The Collapsed Contexts In Social Media
 
A private sphereslideshare
A private sphereslideshareA private sphereslideshare
A private sphereslideshare
 
Managing Privacy and Context Collapse in the Facebook Age
Managing Privacy and Context Collapse in the Facebook AgeManaging Privacy and Context Collapse in the Facebook Age
Managing Privacy and Context Collapse in the Facebook Age
 
Quantifying the Invisible Audience in Social Networks
Quantifying the Invisible Audience in Social NetworksQuantifying the Invisible Audience in Social Networks
Quantifying the Invisible Audience in Social Networks
 
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
 
The Glass House: Anonymity Vs. Transparency on the Internet
The Glass House: Anonymity Vs. Transparency on the InternetThe Glass House: Anonymity Vs. Transparency on the Internet
The Glass House: Anonymity Vs. Transparency on the Internet
 
Context collapse on social media: implications for interpersonal and marketin...
Context collapse on social media: implications for interpersonal and marketin...Context collapse on social media: implications for interpersonal and marketin...
Context collapse on social media: implications for interpersonal and marketin...
 
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniTo
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniToSocial Media - Introduzione al Corso [a.a. 2014-2015] - UniTo
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniTo
 
Comunicare nell'era dei social media
Comunicare nell'era dei social mediaComunicare nell'era dei social media
Comunicare nell'era dei social media
 
Context Collapse on Social Networking Sites
Context Collapse on Social Networking SitesContext Collapse on Social Networking Sites
Context Collapse on Social Networking Sites
 
Theorizing the Future of Computer-Mediated Communication: The Changing Role o...
Theorizing the Future of Computer-Mediated Communication: The Changing Role o...Theorizing the Future of Computer-Mediated Communication: The Changing Role o...
Theorizing the Future of Computer-Mediated Communication: The Changing Role o...
 
WISDOM AT WORK: The Power of Personal Storytelling to Spark Insight, Breakthr...
WISDOM AT WORK: The Power of Personal Storytelling to Spark Insight, Breakthr...WISDOM AT WORK: The Power of Personal Storytelling to Spark Insight, Breakthr...
WISDOM AT WORK: The Power of Personal Storytelling to Spark Insight, Breakthr...
 
Digital Footprint
Digital FootprintDigital Footprint
Digital Footprint
 
Using Social Smarts to Engage Students on Social Media
Using Social Smarts to Engage Students on Social MediaUsing Social Smarts to Engage Students on Social Media
Using Social Smarts to Engage Students on Social Media
 

Ähnlich wie Strata Conference NY: The Accidental Chief Privacy Officer

Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?
Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?
Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?Jim Adler
 
iConference 2011: Reputation in the Cloud
iConference 2011: Reputation in the CloudiConference 2011: Reputation in the Cloud
iConference 2011: Reputation in the CloudJim Adler
 
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...Jim Adler
 
Making sense of big data
Making sense of big dataMaking sense of big data
Making sense of big databis_foresight
 
Drexel University: Business and Privacy in the Cloud
Drexel University: Business and Privacy in the Cloud Drexel University: Business and Privacy in the Cloud
Drexel University: Business and Privacy in the Cloud Jim Adler
 
Finger On The Pulse
Finger On The PulseFinger On The Pulse
Finger On The Pulsemccannpulse
 
Finger On The Pulse
Finger On The PulseFinger On The Pulse
Finger On The Pulsemccannpulse
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsideredBrian Rowe
 
Data Analytics and Artificial Intelligence in the era of Digital Transformation
Data Analytics and Artificial Intelligence in the era of Digital TransformationData Analytics and Artificial Intelligence in the era of Digital Transformation
Data Analytics and Artificial Intelligence in the era of Digital TransformationJan Wiegelmann
 
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...Sherry Jones
 
New Developments in Machine Learning - Prof. Dr. Max Welling
New Developments in Machine Learning - Prof. Dr. Max WellingNew Developments in Machine Learning - Prof. Dr. Max Welling
New Developments in Machine Learning - Prof. Dr. Max WellingTextkernel
 
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...FLUZO
 
The Future of Information Architecture
The Future of Information ArchitectureThe Future of Information Architecture
The Future of Information ArchitectureChristina Wodtke
 
Designing Against a Data Dystopia
Designing Against a Data DystopiaDesigning Against a Data Dystopia
Designing Against a Data DystopiaAgnes Pyrchla
 
Data Ethics in the Workplace: Beyond AI, Privacy and Security
Data Ethics in the Workplace: Beyond AI, Privacy and SecurityData Ethics in the Workplace: Beyond AI, Privacy and Security
Data Ethics in the Workplace: Beyond AI, Privacy and SecurityCase IQ
 
The Data Brokers: Selling your personal information
The Data Brokers: Selling your personal informationThe Data Brokers: Selling your personal information
The Data Brokers: Selling your personal informationminiaturequery546
 
Privacy Is The Primary Guideline For The Privacy
Privacy Is The Primary Guideline For The PrivacyPrivacy Is The Primary Guideline For The Privacy
Privacy Is The Primary Guideline For The PrivacyNicole Kathol
 

Ähnlich wie Strata Conference NY: The Accidental Chief Privacy Officer (20)

Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?
Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?
Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?
 
iConference 2011: Reputation in the Cloud
iConference 2011: Reputation in the CloudiConference 2011: Reputation in the Cloud
iConference 2011: Reputation in the Cloud
 
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
 
Making sense of big data
Making sense of big dataMaking sense of big data
Making sense of big data
 
The #BigData Dilemna
The #BigData Dilemna The #BigData Dilemna
The #BigData Dilemna
 
Drexel University: Business and Privacy in the Cloud
Drexel University: Business and Privacy in the Cloud Drexel University: Business and Privacy in the Cloud
Drexel University: Business and Privacy in the Cloud
 
Finger On The Pulse
Finger On The PulseFinger On The Pulse
Finger On The Pulse
 
Finger On The Pulse
Finger On The PulseFinger On The Pulse
Finger On The Pulse
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
2008 earth intelligence network at hope
2008 earth intelligence network at hope2008 earth intelligence network at hope
2008 earth intelligence network at hope
 
Data Analytics and Artificial Intelligence in the era of Digital Transformation
Data Analytics and Artificial Intelligence in the era of Digital TransformationData Analytics and Artificial Intelligence in the era of Digital Transformation
Data Analytics and Artificial Intelligence in the era of Digital Transformation
 
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
 
New Developments in Machine Learning - Prof. Dr. Max Welling
New Developments in Machine Learning - Prof. Dr. Max WellingNew Developments in Machine Learning - Prof. Dr. Max Welling
New Developments in Machine Learning - Prof. Dr. Max Welling
 
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
 
The Future of Information Architecture
The Future of Information ArchitectureThe Future of Information Architecture
The Future of Information Architecture
 
Designing Against a Data Dystopia
Designing Against a Data DystopiaDesigning Against a Data Dystopia
Designing Against a Data Dystopia
 
Data Ethics in the Workplace: Beyond AI, Privacy and Security
Data Ethics in the Workplace: Beyond AI, Privacy and SecurityData Ethics in the Workplace: Beyond AI, Privacy and Security
Data Ethics in the Workplace: Beyond AI, Privacy and Security
 
THE GREAT HACK.docx
THE GREAT HACK.docxTHE GREAT HACK.docx
THE GREAT HACK.docx
 
The Data Brokers: Selling your personal information
The Data Brokers: Selling your personal informationThe Data Brokers: Selling your personal information
The Data Brokers: Selling your personal information
 
Privacy Is The Primary Guideline For The Privacy
Privacy Is The Primary Guideline For The PrivacyPrivacy Is The Primary Guideline For The Privacy
Privacy Is The Primary Guideline For The Privacy
 

Kürzlich hochgeladen

COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 

Kürzlich hochgeladen (20)

COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 

Strata Conference NY: The Accidental Chief Privacy Officer

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 53.
  • 54.