SlideShare a Scribd company logo
1 of 19
1
MY PRIVACY AT
RISK,
IS IT SAFE?
Dr. Andreas Drakos
Technical Project Manager
Innovation @
22
AGENDA
Is Privacy an issue?
Are people aware of their privacy risks?
How to inform people on their privacy risks?
33
THE PROBLEM…
Personal data sharing is a complex and pervasive process that is still not well understood;
Native Mobile Applications acting as Data Silos;
Data Processors vs Data Collectors
Personal Data Fragmentation
Upcoming EU General Data Protection Regulation – harmonisation of EU’s legal framework and
improvement of users’ control over their shared data
A large majority of Europeans engage with Online Social
Networks (OSNs)
 74% of users consider that they do not have sufficient control
 70% are concerned with the way such data are handled by
44
GENERAL DATA PROTECTION DIRECTIVE
Article 5 of the ePrivacy Directive
An app developer may use third party libraries with software that provides
common functionalities, such as for example a library for a social gaming
platform. The app developer must ensure users are aware of any data
processing undertaken ….
To the extent that the app developer has outsourced some or all of the actual data
processing to a third party and that third party assumes the role of a data processor then
the app developer must comply with all obligations related to the use of a data
processor. This would also include the use of a cloud computing provider (e.g. for
external data storage).
55
GENERAL DATA PROTECTION DIRECTIVE
Article 17
It requires from the manufacturers of a device or an application to embed data
protection from the very beginning of its design.
This includes ensuring the availability of appropriate mechanisms to inform
and educate the end user about what the apps can do and what data they are
able to access, as well as providing appropriate settings for app users to change
the parameters of the processing.
66
 JUNE 2015, EU Council of Ministers
 OCTOBER 2015, European Court of Justice
 NOVEMBER 2015, Belgian Court
Facebook 48 hours to stop tracking the online activities of non-Facebook users (datr coockie)
in Belgium unless they have their explicit consent or face a daily fine of €250,000
HOW REAL IS THIS?
GENERAL DATA PROTECTION
DIRECTIVE
REGULATION
77Source: http://insights.wired.com/profiles/blogs/mobile-privacy-lock-down?xg_source=activity#axzz3f5nXFUt9
UNDERSTANDING PRIVACY FROM END-USERS POINT OF VIEW
88*Source: http://insights.wired.com/profiles/blogs/mobile-privacy-lock-down?xg_source=activity#axzz3f5nXFUt9
UNDERSTANDING PRIVACY FROM APPLICATION’S POINT OF VIEW
99
MATCHING THE GAP
Predict information about you
and your personality by
analyzing your digital trail
Privacy monitoring and
protection solution using
automated agents and crowd
sourcing information
1010
DATABAIT
DataBait, the USEMP web application that shows you what
happens behind the screen, to the digital trail you leave behind
when using services such as Facebook, Google or Twitter.
 Step 1: Connect with your Facebook account
 Step 2: DataBait will access your public information, friends
list, photos and posts
 Step 3: Install DataBait browser-plugin
 Step 4: get an insight who tracks you and where
1111
DATABAIT: LOGIN WITH FACEBOOK ACCOUNT
1212
DATABAIT: PHOTO INSIGHTS
1313
DATABAIT: LOCATION INSIGHTS
1414
DATABAIT: BRANDS INSIGHTS
1515
DATABAIT: AUDIENCE INFLUENCE
1616
DATABAIT: WHO TRACKS ME?
1717
ENABLING THE CROWD
Predict information about you
and your personality by
analyzing your digital trail
Privacy monitoring and
protection solution using
automated agents and crowd
sourcing information
1818
Privacy Flag
engages
with the
crowd
Crowd provides
feedback through
PF tools
PF site
Android app
Browser add-
on
Users get privacy
risks analysis for:
 Sites the visit
 Mobile Apps
they use
 IoT registered
networks
The information is
combined with
Automated
privacy enablers
Privacy Flag
experts input
PRIVACY FLAG
19
THANK
YOU@andr_drakos

More Related Content

What's hot

IoT (Internet of things) Wireless Connectivity Standards Innovation Leadership
IoT (Internet of things) Wireless Connectivity Standards Innovation LeadershipIoT (Internet of things) Wireless Connectivity Standards Innovation Leadership
IoT (Internet of things) Wireless Connectivity Standards Innovation LeadershipAlex G. Lee, Ph.D. Esq. CLP
 
ICT planning and choosing appropriate ICTs (Sumit Dutta - CSSWA)
ICT planning and choosing appropriate ICTs (Sumit Dutta - CSSWA)ICT planning and choosing appropriate ICTs (Sumit Dutta - CSSWA)
ICT planning and choosing appropriate ICTs (Sumit Dutta - CSSWA)makinglinks
 
CTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles WardCTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles Wardsegughana
 
CTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders JohansonCTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders Johansonsegughana
 
Akolade data presentation by Paul O'Connor
Akolade data presentation by Paul O'ConnorAkolade data presentation by Paul O'Connor
Akolade data presentation by Paul O'ConnorPaul O'Connor
 
CyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario HoffmannCyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario Hoffmannsegughana
 
Beginners: M2M, MTC & IoT
Beginners: M2M, MTC & IoTBeginners: M2M, MTC & IoT
Beginners: M2M, MTC & IoT3G4G
 
GDPR: More reasons for information security
GDPR: More reasons for information securityGDPR: More reasons for information security
GDPR: More reasons for information securityJisc
 
CTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouseCTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhousesegughana
 
OSFair2017 Workshop | GÉANT general overview
OSFair2017 Workshop | GÉANT general overviewOSFair2017 Workshop | GÉANT general overview
OSFair2017 Workshop | GÉANT general overviewOpen Science Fair
 
iotmaship - Webinos iot and m2m - allott
iotmaship - Webinos iot and m2m - allottiotmaship - Webinos iot and m2m - allott
iotmaship - Webinos iot and m2m - allottwebinos project
 
Prof juliet lodge nesta presentation on biometrics and privacy
Prof juliet lodge   nesta presentation on biometrics and privacyProf juliet lodge   nesta presentation on biometrics and privacy
Prof juliet lodge nesta presentation on biometrics and privacyNesta
 

What's hot (14)

IoT (Internet of things) Wireless Connectivity Standards Innovation Leadership
IoT (Internet of things) Wireless Connectivity Standards Innovation LeadershipIoT (Internet of things) Wireless Connectivity Standards Innovation Leadership
IoT (Internet of things) Wireless Connectivity Standards Innovation Leadership
 
EU data protection issues in IoT
EU data protection issues in IoTEU data protection issues in IoT
EU data protection issues in IoT
 
ICT planning and choosing appropriate ICTs (Sumit Dutta - CSSWA)
ICT planning and choosing appropriate ICTs (Sumit Dutta - CSSWA)ICT planning and choosing appropriate ICTs (Sumit Dutta - CSSWA)
ICT planning and choosing appropriate ICTs (Sumit Dutta - CSSWA)
 
CTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles WardCTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles Ward
 
Enisa and cyber security standards
Enisa and cyber security standardsEnisa and cyber security standards
Enisa and cyber security standards
 
CTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders JohansonCTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders Johanson
 
Akolade data presentation by Paul O'Connor
Akolade data presentation by Paul O'ConnorAkolade data presentation by Paul O'Connor
Akolade data presentation by Paul O'Connor
 
CyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario HoffmannCyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario Hoffmann
 
Beginners: M2M, MTC & IoT
Beginners: M2M, MTC & IoTBeginners: M2M, MTC & IoT
Beginners: M2M, MTC & IoT
 
GDPR: More reasons for information security
GDPR: More reasons for information securityGDPR: More reasons for information security
GDPR: More reasons for information security
 
CTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouseCTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouse
 
OSFair2017 Workshop | GÉANT general overview
OSFair2017 Workshop | GÉANT general overviewOSFair2017 Workshop | GÉANT general overview
OSFair2017 Workshop | GÉANT general overview
 
iotmaship - Webinos iot and m2m - allott
iotmaship - Webinos iot and m2m - allottiotmaship - Webinos iot and m2m - allott
iotmaship - Webinos iot and m2m - allott
 
Prof juliet lodge nesta presentation on biometrics and privacy
Prof juliet lodge   nesta presentation on biometrics and privacyProf juliet lodge   nesta presentation on biometrics and privacy
Prof juliet lodge nesta presentation on biometrics and privacy
 

Viewers also liked

USEMP Project Presentation ICT 2015
USEMP Project Presentation ICT 2015USEMP Project Presentation ICT 2015
USEMP Project Presentation ICT 2015Andreas Drakos
 
Spain velti state of mobile advertising-may2013_final
Spain velti state of mobile advertising-may2013_finalSpain velti state of mobile advertising-may2013_final
Spain velti state of mobile advertising-may2013_finalVelti Spain
 
Velti spain 27062013
Velti spain 27062013Velti spain 27062013
Velti spain 27062013Velti Spain
 
MMA BE event - presentation 130627
MMA BE event - presentation 130627MMA BE event - presentation 130627
MMA BE event - presentation 130627Velti Spain
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsLinkedIn
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerLuminary Labs
 

Viewers also liked (6)

USEMP Project Presentation ICT 2015
USEMP Project Presentation ICT 2015USEMP Project Presentation ICT 2015
USEMP Project Presentation ICT 2015
 
Spain velti state of mobile advertising-may2013_final
Spain velti state of mobile advertising-may2013_finalSpain velti state of mobile advertising-may2013_final
Spain velti state of mobile advertising-may2013_final
 
Velti spain 27062013
Velti spain 27062013Velti spain 27062013
Velti spain 27062013
 
MMA BE event - presentation 130627
MMA BE event - presentation 130627MMA BE event - presentation 130627
MMA BE event - presentation 130627
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving Cars
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI Explainer
 

Similar to My Privacy at Risk, is it Safe?

To share or not to share? machine generated data for science
To share or not to share? machine generated data for science To share or not to share? machine generated data for science
To share or not to share? machine generated data for science Alexandra Giannopoulou
 
OPENi Privacy by design @Athens hackathon, September 2014
OPENi Privacy by design @Athens hackathon, September 2014OPENi Privacy by design @Athens hackathon, September 2014
OPENi Privacy by design @Athens hackathon, September 2014openi_ict
 
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...Konstantinos Demertzis
 
Privacy, the Internet of Things and Smart Cities
Privacy, the Internet of Things and Smart Cities Privacy, the Internet of Things and Smart Cities
Privacy, the Internet of Things and Smart Cities Lilian Edwards
 
Protecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine LearningProtecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine LearningUlf Mattsson
 
GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network InfrastructureMuhammad Zeeshan
 
Data Privacy of the Internet of Things
Data Privacy of the Internet of ThingsData Privacy of the Internet of Things
Data Privacy of the Internet of Thingsmabualsh
 
H2020 project WITDOM overview
H2020 project WITDOM overviewH2020 project WITDOM overview
H2020 project WITDOM overviewElsa Prieto
 
Privacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSPrivacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSInteraktiv
 
R E G U L A R P A P E RUser-centric privacy awareness in v.docx
R E G U L A R P A P E RUser-centric privacy awareness in v.docxR E G U L A R P A P E RUser-centric privacy awareness in v.docx
R E G U L A R P A P E RUser-centric privacy awareness in v.docxmakdul
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obamaLilian Edwards
 
The death of data protection
The death of data protection The death of data protection
The death of data protection Lilian Edwards
 
TelcoME2015_IOTRegulation
TelcoME2015_IOTRegulationTelcoME2015_IOTRegulation
TelcoME2015_IOTRegulationEamonHolley
 
Eprivacy issues and standards -- where do we stand?
Eprivacy issues and standards -- where do we stand?Eprivacy issues and standards -- where do we stand?
Eprivacy issues and standards -- where do we stand?Anna Long
 
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL apidays
 
State of the art research on Convergence and Social Media A Compendium on R&D...
State of the art research on Convergence and Social Media A Compendium on R&D...State of the art research on Convergence and Social Media A Compendium on R&D...
State of the art research on Convergence and Social Media A Compendium on R&D...Oles Kulchytskyy
 

Similar to My Privacy at Risk, is it Safe? (20)

To share or not to share? machine generated data for science
To share or not to share? machine generated data for science To share or not to share? machine generated data for science
To share or not to share? machine generated data for science
 
OPENi Privacy by design @Athens hackathon, September 2014
OPENi Privacy by design @Athens hackathon, September 2014OPENi Privacy by design @Athens hackathon, September 2014
OPENi Privacy by design @Athens hackathon, September 2014
 
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
 
Privacy by Design
Privacy by DesignPrivacy by Design
Privacy by Design
 
Privacy, the Internet of Things and Smart Cities
Privacy, the Internet of Things and Smart Cities Privacy, the Internet of Things and Smart Cities
Privacy, the Internet of Things and Smart Cities
 
Big Data a Catalunya
Big Data a CatalunyaBig Data a Catalunya
Big Data a Catalunya
 
Big Data a Catalunya
Big Data a CatalunyaBig Data a Catalunya
Big Data a Catalunya
 
Protecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine LearningProtecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine Learning
 
GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network Infrastructure
 
Data Privacy of the Internet of Things
Data Privacy of the Internet of ThingsData Privacy of the Internet of Things
Data Privacy of the Internet of Things
 
H2020 project WITDOM overview
H2020 project WITDOM overviewH2020 project WITDOM overview
H2020 project WITDOM overview
 
Privacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSPrivacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMS
 
R E G U L A R P A P E RUser-centric privacy awareness in v.docx
R E G U L A R P A P E RUser-centric privacy awareness in v.docxR E G U L A R P A P E RUser-centric privacy awareness in v.docx
R E G U L A R P A P E RUser-centric privacy awareness in v.docx
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obama
 
The death of data protection
The death of data protection The death of data protection
The death of data protection
 
TelcoME2015_IOTRegulation
TelcoME2015_IOTRegulationTelcoME2015_IOTRegulation
TelcoME2015_IOTRegulation
 
Eprivacy issues and standards -- where do we stand?
Eprivacy issues and standards -- where do we stand?Eprivacy issues and standards -- where do we stand?
Eprivacy issues and standards -- where do we stand?
 
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL
 
State of the art research on Convergence and Social Media A Compendium on R&D...
State of the art research on Convergence and Social Media A Compendium on R&D...State of the art research on Convergence and Social Media A Compendium on R&D...
State of the art research on Convergence and Social Media A Compendium on R&D...
 
The Internet Of Things UOP
The Internet Of Things UOPThe Internet Of Things UOP
The Internet Of Things UOP
 

Recently uploaded

Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AITatiana Gurgel
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Delhi Call girls
 
Mathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMoumonDas2
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardsticksaastr
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubssamaasim06
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Chameera Dedduwage
 
Air breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsAir breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsaqsarehman5055
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesPooja Nehwal
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...Sheetaleventcompany
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxmohammadalnahdi22
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Kayode Fayemi
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaKayode Fayemi
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxNikitaBankoti2
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxraffaeleoman
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar TrainingKylaCullinane
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Vipesco
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Hasting Chen
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfSenaatti-kiinteistöt
 

Recently uploaded (20)

Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
 
Mathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptx
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubs
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)
 
Air breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsAir breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animals
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 

My Privacy at Risk, is it Safe?

  • 1. 1 MY PRIVACY AT RISK, IS IT SAFE? Dr. Andreas Drakos Technical Project Manager Innovation @
  • 2. 22 AGENDA Is Privacy an issue? Are people aware of their privacy risks? How to inform people on their privacy risks?
  • 3. 33 THE PROBLEM… Personal data sharing is a complex and pervasive process that is still not well understood; Native Mobile Applications acting as Data Silos; Data Processors vs Data Collectors Personal Data Fragmentation Upcoming EU General Data Protection Regulation – harmonisation of EU’s legal framework and improvement of users’ control over their shared data A large majority of Europeans engage with Online Social Networks (OSNs)  74% of users consider that they do not have sufficient control  70% are concerned with the way such data are handled by
  • 4. 44 GENERAL DATA PROTECTION DIRECTIVE Article 5 of the ePrivacy Directive An app developer may use third party libraries with software that provides common functionalities, such as for example a library for a social gaming platform. The app developer must ensure users are aware of any data processing undertaken …. To the extent that the app developer has outsourced some or all of the actual data processing to a third party and that third party assumes the role of a data processor then the app developer must comply with all obligations related to the use of a data processor. This would also include the use of a cloud computing provider (e.g. for external data storage).
  • 5. 55 GENERAL DATA PROTECTION DIRECTIVE Article 17 It requires from the manufacturers of a device or an application to embed data protection from the very beginning of its design. This includes ensuring the availability of appropriate mechanisms to inform and educate the end user about what the apps can do and what data they are able to access, as well as providing appropriate settings for app users to change the parameters of the processing.
  • 6. 66  JUNE 2015, EU Council of Ministers  OCTOBER 2015, European Court of Justice  NOVEMBER 2015, Belgian Court Facebook 48 hours to stop tracking the online activities of non-Facebook users (datr coockie) in Belgium unless they have their explicit consent or face a daily fine of €250,000 HOW REAL IS THIS? GENERAL DATA PROTECTION DIRECTIVE REGULATION
  • 9. 99 MATCHING THE GAP Predict information about you and your personality by analyzing your digital trail Privacy monitoring and protection solution using automated agents and crowd sourcing information
  • 10. 1010 DATABAIT DataBait, the USEMP web application that shows you what happens behind the screen, to the digital trail you leave behind when using services such as Facebook, Google or Twitter.  Step 1: Connect with your Facebook account  Step 2: DataBait will access your public information, friends list, photos and posts  Step 3: Install DataBait browser-plugin  Step 4: get an insight who tracks you and where
  • 11. 1111 DATABAIT: LOGIN WITH FACEBOOK ACCOUNT
  • 17. 1717 ENABLING THE CROWD Predict information about you and your personality by analyzing your digital trail Privacy monitoring and protection solution using automated agents and crowd sourcing information
  • 18. 1818 Privacy Flag engages with the crowd Crowd provides feedback through PF tools PF site Android app Browser add- on Users get privacy risks analysis for:  Sites the visit  Mobile Apps they use  IoT registered networks The information is combined with Automated privacy enablers Privacy Flag experts input PRIVACY FLAG