SlideShare a Scribd company logo
1 of 54
Austin Alleman@allemanau The Accidental Chief Privacy Officer Jim AdlerChief Privacy Officer & General Manager, Data SystemsIntelius twitter: @jim_adlerhttp://jimadler.me Strata Conference, New YorkSeptember 2011
Direct-to-consumer provider of public information about people and businesses.  Discover each other to make better decisions and empower yourself to take control of your reputation. comScore top 100 site, 11M unique, paying customers. About INTELIUS
Billions of Records 300 Million People The “Big Data” People Search Problem 213 records mapped  to the correct 37 Jim Adlers Randolph Hutchins 5 People Philip Collins 375 People Jim Adler 213 Records37 People Jim Adler McKinney, TX Age 57 Gwen Fleming 2 People Jim Adler Houston, TX Age 68 Carol Brooks 9800 Records 1250 People Jim Adler Hastings, NE Age 32 Jim Adler Canaan, NH Age 59 Jim Adler Redmond, WA Age 48 Jim Adler Denver, CO Age 48
“Dennis Rodman” Profile
Intelligence I am not an Attorney Geek Dweeb Nerd SocialIneptitude Obsession Dork
Mark Zuckerberg Real Names Richard Feynman Physics Norio Ohga Sony President 74 min CD Jeff Jonas Big Data Privacy by Design Steve Jobs ‘nuff said Eclectic Innovators
Agenda Innocence Frontier Regulation Innovation Austin Alleman@allemanau
Frontier
The surface web is small… 167 Terabytes
Compared to the deep web… 91,000 Terabytes
~20Exabytes (20B GB) Data from  dawn of civilization through 2002 Data from  April 2011
Reconnecting out-of-touch family members Online shoppers verifying online sellers Caller ID of harassing phone calls Law enforcement Banking Services Adopted kids seeking their biological parents Learning about  a business Airlines trying to return lost luggage Networkers seeking business opportunities Social networkers looking to expand their friends list Professionals learning about colleagues at conferences Social workers who need to know more about their clients Singles curious about the people they meet Lawyers needing quick access to court records Find owner of dog’s relative for transplant Genealogists  cultivating their family tree Investigative journalists running down leads Checking out a prospective tenant Research Sales professionals looking for new prospects Non-profit organizations looking for supporters Alumni groups arranging reunions Parents  ensuring who their kids safety Anyone retrieving court records Businesses that need to update contact information on customers Checking out a prospective date Finding people that have the same illness as you Sharing Those in legally entangled looking for court records Anyone who need address histories for passports Fiancés and their curious family members Anyone curious about who's emailing or calling them Checking out a prospective social network connection Finding long-lost friends, military buddies, roommates, or classmates Researching a prospective employee Regulated For lots of reasons… (some regulated)
Providing major benefits… 51% “major benefit” is ease and convenience 41% “major benefit” is portability 39% “major benefit is sharing Use of Cloud Computing Applications and Services, Pew 2008
But real concerns… 90% “very concerned” if data sold 80% “very concerned” if photos used for marketing 68% “very concerned” if data used to serve them ads Use of Cloud Computing Applications and Services, Pew 2008
A Prescient Venn Diagram?
Innocence
When towns were small …
“The only thing worse than being talked about, is not being talked about.”− Oscar Wilde Density↓ ->Anonymity↓ ->Privacy Expectation↓
“Good Fences Make Good Neighbors” 					- Mending Wall, Robert Frost Density↑ ->Anonymity↑ ->Privacy Expectation↑
“In times of rapid change, experience could be your worst enemy.”						− J. Paul Getty #@?$!! “Privacy Vertigo” Density↓ ->Anonymity↓ ->Privacy Expectation↓
What’s in a Nym? Source: Intelius
Regulation
So, how do we think about public and private now?
Public speaking is publicly public
Voting is a privately public
And some things are publicly private
Your home is clearly private
And the Constitution protects your privacy from government …
But no Constitutional protections between citizens
It would be nice … to use familiar framework
Cloud banking clearly private
Tweeting is (mostly) public
Cloud dating is public confidential
FIPPs “Privacy by Design” Consent unnecessary for commonly accepted practices Increased transparency Federal Trade Commission Guidance
Confusion Matrix Predicted Actual
“Policy” Confusion Matrix Regulations Violations
Innovation
Compliance “Evolved” Raw Materials CPO Product Development Marketing Quality Acceptance Release Compliance
  Hilary Mason’s Maxim Math + Code = Awesome Quants Making a killing on Wall Street but still can’t impress the chicks Weakonomics.com
Corollary to Mason’s Maxim Values * (Math + Code) = Awesome
First Social Network: The Dinner Table We eat. We share.
A Pescatarian Digression
~10,000 GCal ~20Exabytes (20B GB) Data in April 2011 Food in April 2011
Food Policy Leads Privacy Policy Peanut Butter Hearings Pure FoodAct Labeling Reform FTC Est. CivilRights “SnakeOil” GMO Social MediaAdoption “RobberBarons” Packaged Foods FCRA
“Give Peas a Chance” Monsanto’s Corn Mendel’s Peas ? =
“Give me the bad news first, Doc” = “CDC reports investigations of outbreaks” “46 states & DC require notification of a databreach. National legislation upcoming.”
Opaque Transparency Does Not Inform
Transparency Allows Data Driven Decisions
= YOU % % % % % %
Control comes from Awareness TrueRep.com Awareness and control of your public profile Privacy controls Reputation management Stay tuned …
Innovation is a team sport Drive confluence of influencewithin your org Be the happy warrior Find clarity within confusion Reports of privacy’s death have been greatly exaggerated …
Questions? Jim AdlerChief Privacy Officer & General Manager, Data SystemsIntelius twitter: @jim_adlerhttp://jimadler.me Strata Conference, New YorkSeptember 2011

More Related Content

What's hot

Mapping the pii market
Mapping the pii marketMapping the pii market
Mapping the pii marketpii2011
 
Facebook and cambridge analytica scandal
Facebook and cambridge analytica scandalFacebook and cambridge analytica scandal
Facebook and cambridge analytica scandalSajibHossain17
 
Presentation to U.S. Chamber Government Affairs Conference
Presentation to U.S. Chamber Government Affairs ConferencePresentation to U.S. Chamber Government Affairs Conference
Presentation to U.S. Chamber Government Affairs ConferenceCurt Mercadante
 
Using New Technologies to Make Sense of Content Chaos: Text mining and visual...
Using New Technologies to Make Sense of Content Chaos: Text mining and visual...Using New Technologies to Make Sense of Content Chaos: Text mining and visual...
Using New Technologies to Make Sense of Content Chaos: Text mining and visual...KM Chicago
 
The elasticity of marketing & analytics ethics
The elasticity of marketing & analytics ethicsThe elasticity of marketing & analytics ethics
The elasticity of marketing & analytics ethicsStéphane Hamel
 
Essentials of Cyberspace Law: User Generated Content, Privacy and Online Adve...
Essentials of Cyberspace Law: User Generated Content, Privacy and Online Adve...Essentials of Cyberspace Law: User Generated Content, Privacy and Online Adve...
Essentials of Cyberspace Law: User Generated Content, Privacy and Online Adve...Internet Law Center
 
Cambridge Analytica as a Prime Example of the Manipulation of Democratic Deci...
Cambridge Analytica as a Prime Example of the Manipulation of Democratic Deci...Cambridge Analytica as a Prime Example of the Manipulation of Democratic Deci...
Cambridge Analytica as a Prime Example of the Manipulation of Democratic Deci...Anna Vollmer
 
The social house that google built
The social house that google builtThe social house that google built
The social house that google builtSean McGinnis
 
Top 6 Lies That Big Corporations Tell
Top 6 Lies That Big Corporations TellTop 6 Lies That Big Corporations Tell
Top 6 Lies That Big Corporations Tellzhmekapanova
 
Protecting Your Business and Employees: Crafting Beneficial Social Media Pol...
Protecting Your Business and Employees:  Crafting Beneficial Social Media Pol...Protecting Your Business and Employees:  Crafting Beneficial Social Media Pol...
Protecting Your Business and Employees: Crafting Beneficial Social Media Pol...Kelley Keller, Esq.
 
Dai Big Data al Cognitive Computing Dematerializzazione, Senso, Decisione e A...
Dai Big Data al Cognitive Computing Dematerializzazione, Senso, Decisione e A...Dai Big Data al Cognitive Computing Dematerializzazione, Senso, Decisione e A...
Dai Big Data al Cognitive Computing Dematerializzazione, Senso, Decisione e A...Redazione InnovaPuglia
 
VSPEC social media / Jon Newman
VSPEC social media / Jon NewmanVSPEC social media / Jon Newman
VSPEC social media / Jon Newmanjonnewman12
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacySarah Pearson
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacyvoelkeld
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacyDanno320
 

What's hot (20)

Mapping the pii market
Mapping the pii marketMapping the pii market
Mapping the pii market
 
Facebook and cambridge analytica scandal
Facebook and cambridge analytica scandalFacebook and cambridge analytica scandal
Facebook and cambridge analytica scandal
 
Presentation to U.S. Chamber Government Affairs Conference
Presentation to U.S. Chamber Government Affairs ConferencePresentation to U.S. Chamber Government Affairs Conference
Presentation to U.S. Chamber Government Affairs Conference
 
Internet privacy
Internet privacyInternet privacy
Internet privacy
 
Using New Technologies to Make Sense of Content Chaos: Text mining and visual...
Using New Technologies to Make Sense of Content Chaos: Text mining and visual...Using New Technologies to Make Sense of Content Chaos: Text mining and visual...
Using New Technologies to Make Sense of Content Chaos: Text mining and visual...
 
The elasticity of marketing & analytics ethics
The elasticity of marketing & analytics ethicsThe elasticity of marketing & analytics ethics
The elasticity of marketing & analytics ethics
 
Essentials of Cyberspace Law: User Generated Content, Privacy and Online Adve...
Essentials of Cyberspace Law: User Generated Content, Privacy and Online Adve...Essentials of Cyberspace Law: User Generated Content, Privacy and Online Adve...
Essentials of Cyberspace Law: User Generated Content, Privacy and Online Adve...
 
Cambridge Analytica as a Prime Example of the Manipulation of Democratic Deci...
Cambridge Analytica as a Prime Example of the Manipulation of Democratic Deci...Cambridge Analytica as a Prime Example of the Manipulation of Democratic Deci...
Cambridge Analytica as a Prime Example of the Manipulation of Democratic Deci...
 
The social house that google built
The social house that google builtThe social house that google built
The social house that google built
 
Facebook Scandal
Facebook Scandal Facebook Scandal
Facebook Scandal
 
Top 6 Lies That Big Corporations Tell
Top 6 Lies That Big Corporations TellTop 6 Lies That Big Corporations Tell
Top 6 Lies That Big Corporations Tell
 
Cambridge analytica
Cambridge analyticaCambridge analytica
Cambridge analytica
 
Protecting Your Business and Employees: Crafting Beneficial Social Media Pol...
Protecting Your Business and Employees:  Crafting Beneficial Social Media Pol...Protecting Your Business and Employees:  Crafting Beneficial Social Media Pol...
Protecting Your Business and Employees: Crafting Beneficial Social Media Pol...
 
Dai Big Data al Cognitive Computing Dematerializzazione, Senso, Decisione e A...
Dai Big Data al Cognitive Computing Dematerializzazione, Senso, Decisione e A...Dai Big Data al Cognitive Computing Dematerializzazione, Senso, Decisione e A...
Dai Big Data al Cognitive Computing Dematerializzazione, Senso, Decisione e A...
 
Uga Social Media Privacy June2011
Uga Social Media Privacy June2011Uga Social Media Privacy June2011
Uga Social Media Privacy June2011
 
VSPEC social media / Jon Newman
VSPEC social media / Jon NewmanVSPEC social media / Jon Newman
VSPEC social media / Jon Newman
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacy
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacy
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacy
 
Facebook Scandal
Facebook ScandalFacebook Scandal
Facebook Scandal
 

Viewers also liked

LSS@SMW: Bernie Hogan Rebuilding The Collapsed Contexts In Social Media
LSS@SMW:  Bernie Hogan Rebuilding The Collapsed Contexts In Social MediaLSS@SMW:  Bernie Hogan Rebuilding The Collapsed Contexts In Social Media
LSS@SMW: Bernie Hogan Rebuilding The Collapsed Contexts In Social MediaLocal Social Summit
 
Managing Privacy and Context Collapse in the Facebook Age
Managing Privacy and Context Collapse in the Facebook AgeManaging Privacy and Context Collapse in the Facebook Age
Managing Privacy and Context Collapse in the Facebook AgeJessica Vitak
 
Quantifying the Invisible Audience in Social Networks
Quantifying the Invisible Audience in Social NetworksQuantifying the Invisible Audience in Social Networks
Quantifying the Invisible Audience in Social NetworksMichael Bernstein
 
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...summersocialwebshop
 
Context collapse on social media: implications for interpersonal and marketin...
Context collapse on social media: implications for interpersonal and marketin...Context collapse on social media: implications for interpersonal and marketin...
Context collapse on social media: implications for interpersonal and marketin...ACSM @ VU University Amsterdam
 
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniTo
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniToSocial Media - Introduzione al Corso [a.a. 2014-2015] - UniTo
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniToAgnese Vellar
 
Comunicare nell'era dei social media
Comunicare nell'era dei social mediaComunicare nell'era dei social media
Comunicare nell'era dei social mediaAgnese Vellar
 
Context Collapse on Social Networking Sites
Context Collapse on Social Networking SitesContext Collapse on Social Networking Sites
Context Collapse on Social Networking SitesStefanie Duguay
 
Theorizing the Future of Computer-Mediated Communication: The Changing Role o...
Theorizing the Future of Computer-Mediated Communication: The Changing Role o...Theorizing the Future of Computer-Mediated Communication: The Changing Role o...
Theorizing the Future of Computer-Mediated Communication: The Changing Role o...Jessica Vitak
 
WISDOM AT WORK: The Power of Personal Storytelling to Spark Insight, Breakthr...
WISDOM AT WORK: The Power of Personal Storytelling to Spark Insight, Breakthr...WISDOM AT WORK: The Power of Personal Storytelling to Spark Insight, Breakthr...
WISDOM AT WORK: The Power of Personal Storytelling to Spark Insight, Breakthr...Mitchell Ditkoff
 
Digital Footprint
Digital FootprintDigital Footprint
Digital FootprintRobin Low
 
Using Social Smarts to Engage Students on Social Media
Using Social Smarts to Engage Students on Social MediaUsing Social Smarts to Engage Students on Social Media
Using Social Smarts to Engage Students on Social MediaPaul Brown
 

Viewers also liked (14)

LSS@SMW: Bernie Hogan Rebuilding The Collapsed Contexts In Social Media
LSS@SMW:  Bernie Hogan Rebuilding The Collapsed Contexts In Social MediaLSS@SMW:  Bernie Hogan Rebuilding The Collapsed Contexts In Social Media
LSS@SMW: Bernie Hogan Rebuilding The Collapsed Contexts In Social Media
 
A private sphereslideshare
A private sphereslideshareA private sphereslideshare
A private sphereslideshare
 
Managing Privacy and Context Collapse in the Facebook Age
Managing Privacy and Context Collapse in the Facebook AgeManaging Privacy and Context Collapse in the Facebook Age
Managing Privacy and Context Collapse in the Facebook Age
 
Quantifying the Invisible Audience in Social Networks
Quantifying the Invisible Audience in Social NetworksQuantifying the Invisible Audience in Social Networks
Quantifying the Invisible Audience in Social Networks
 
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
 
The Glass House: Anonymity Vs. Transparency on the Internet
The Glass House: Anonymity Vs. Transparency on the InternetThe Glass House: Anonymity Vs. Transparency on the Internet
The Glass House: Anonymity Vs. Transparency on the Internet
 
Context collapse on social media: implications for interpersonal and marketin...
Context collapse on social media: implications for interpersonal and marketin...Context collapse on social media: implications for interpersonal and marketin...
Context collapse on social media: implications for interpersonal and marketin...
 
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniTo
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniToSocial Media - Introduzione al Corso [a.a. 2014-2015] - UniTo
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniTo
 
Comunicare nell'era dei social media
Comunicare nell'era dei social mediaComunicare nell'era dei social media
Comunicare nell'era dei social media
 
Context Collapse on Social Networking Sites
Context Collapse on Social Networking SitesContext Collapse on Social Networking Sites
Context Collapse on Social Networking Sites
 
Theorizing the Future of Computer-Mediated Communication: The Changing Role o...
Theorizing the Future of Computer-Mediated Communication: The Changing Role o...Theorizing the Future of Computer-Mediated Communication: The Changing Role o...
Theorizing the Future of Computer-Mediated Communication: The Changing Role o...
 
WISDOM AT WORK: The Power of Personal Storytelling to Spark Insight, Breakthr...
WISDOM AT WORK: The Power of Personal Storytelling to Spark Insight, Breakthr...WISDOM AT WORK: The Power of Personal Storytelling to Spark Insight, Breakthr...
WISDOM AT WORK: The Power of Personal Storytelling to Spark Insight, Breakthr...
 
Digital Footprint
Digital FootprintDigital Footprint
Digital Footprint
 
Using Social Smarts to Engage Students on Social Media
Using Social Smarts to Engage Students on Social MediaUsing Social Smarts to Engage Students on Social Media
Using Social Smarts to Engage Students on Social Media
 

Similar to Strata Conference NY: The Accidental Chief Privacy Officer

Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?
Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?
Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?Jim Adler
 
iConference 2011: Reputation in the Cloud
iConference 2011: Reputation in the CloudiConference 2011: Reputation in the Cloud
iConference 2011: Reputation in the CloudJim Adler
 
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...Jim Adler
 
Making sense of big data
Making sense of big dataMaking sense of big data
Making sense of big databis_foresight
 
Drexel University: Business and Privacy in the Cloud
Drexel University: Business and Privacy in the Cloud Drexel University: Business and Privacy in the Cloud
Drexel University: Business and Privacy in the Cloud Jim Adler
 
Finger On The Pulse
Finger On The PulseFinger On The Pulse
Finger On The Pulsemccannpulse
 
Finger On The Pulse
Finger On The PulseFinger On The Pulse
Finger On The Pulsemccannpulse
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsideredBrian Rowe
 
Data Analytics and Artificial Intelligence in the era of Digital Transformation
Data Analytics and Artificial Intelligence in the era of Digital TransformationData Analytics and Artificial Intelligence in the era of Digital Transformation
Data Analytics and Artificial Intelligence in the era of Digital TransformationJan Wiegelmann
 
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...Sherry Jones
 
New Developments in Machine Learning - Prof. Dr. Max Welling
New Developments in Machine Learning - Prof. Dr. Max WellingNew Developments in Machine Learning - Prof. Dr. Max Welling
New Developments in Machine Learning - Prof. Dr. Max WellingTextkernel
 
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...FLUZO
 
The Future of Information Architecture
The Future of Information ArchitectureThe Future of Information Architecture
The Future of Information ArchitectureChristina Wodtke
 
Designing Against a Data Dystopia
Designing Against a Data DystopiaDesigning Against a Data Dystopia
Designing Against a Data DystopiaAgnes Pyrchla
 
Data Ethics in the Workplace: Beyond AI, Privacy and Security
Data Ethics in the Workplace: Beyond AI, Privacy and SecurityData Ethics in the Workplace: Beyond AI, Privacy and Security
Data Ethics in the Workplace: Beyond AI, Privacy and SecurityCase IQ
 
The Data Brokers: Selling your personal information
The Data Brokers: Selling your personal informationThe Data Brokers: Selling your personal information
The Data Brokers: Selling your personal informationminiaturequery546
 
Introduction to Ethics of Big Data
Introduction to Ethics of Big DataIntroduction to Ethics of Big Data
Introduction to Ethics of Big Data28 Burnside
 

Similar to Strata Conference NY: The Accidental Chief Privacy Officer (20)

Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?
Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?
Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?
 
iConference 2011: Reputation in the Cloud
iConference 2011: Reputation in the CloudiConference 2011: Reputation in the Cloud
iConference 2011: Reputation in the Cloud
 
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
 
Making sense of big data
Making sense of big dataMaking sense of big data
Making sense of big data
 
The #BigData Dilemna
The #BigData Dilemna The #BigData Dilemna
The #BigData Dilemna
 
Drexel University: Business and Privacy in the Cloud
Drexel University: Business and Privacy in the Cloud Drexel University: Business and Privacy in the Cloud
Drexel University: Business and Privacy in the Cloud
 
Finger On The Pulse
Finger On The PulseFinger On The Pulse
Finger On The Pulse
 
Finger On The Pulse
Finger On The PulseFinger On The Pulse
Finger On The Pulse
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
2008 earth intelligence network at hope
2008 earth intelligence network at hope2008 earth intelligence network at hope
2008 earth intelligence network at hope
 
Data Analytics and Artificial Intelligence in the era of Digital Transformation
Data Analytics and Artificial Intelligence in the era of Digital TransformationData Analytics and Artificial Intelligence in the era of Digital Transformation
Data Analytics and Artificial Intelligence in the era of Digital Transformation
 
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
 
New Developments in Machine Learning - Prof. Dr. Max Welling
New Developments in Machine Learning - Prof. Dr. Max WellingNew Developments in Machine Learning - Prof. Dr. Max Welling
New Developments in Machine Learning - Prof. Dr. Max Welling
 
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
 
The Future of Information Architecture
The Future of Information ArchitectureThe Future of Information Architecture
The Future of Information Architecture
 
Designing Against a Data Dystopia
Designing Against a Data DystopiaDesigning Against a Data Dystopia
Designing Against a Data Dystopia
 
Data Ethics in the Workplace: Beyond AI, Privacy and Security
Data Ethics in the Workplace: Beyond AI, Privacy and SecurityData Ethics in the Workplace: Beyond AI, Privacy and Security
Data Ethics in the Workplace: Beyond AI, Privacy and Security
 
THE GREAT HACK.docx
THE GREAT HACK.docxTHE GREAT HACK.docx
THE GREAT HACK.docx
 
The Data Brokers: Selling your personal information
The Data Brokers: Selling your personal informationThe Data Brokers: Selling your personal information
The Data Brokers: Selling your personal information
 
Introduction to Ethics of Big Data
Introduction to Ethics of Big DataIntroduction to Ethics of Big Data
Introduction to Ethics of Big Data
 

Recently uploaded

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Strata Conference NY: The Accidental Chief Privacy Officer

  • 1. Austin Alleman@allemanau The Accidental Chief Privacy Officer Jim AdlerChief Privacy Officer & General Manager, Data SystemsIntelius twitter: @jim_adlerhttp://jimadler.me Strata Conference, New YorkSeptember 2011
  • 2. Direct-to-consumer provider of public information about people and businesses. Discover each other to make better decisions and empower yourself to take control of your reputation. comScore top 100 site, 11M unique, paying customers. About INTELIUS
  • 3. Billions of Records 300 Million People The “Big Data” People Search Problem 213 records mapped to the correct 37 Jim Adlers Randolph Hutchins 5 People Philip Collins 375 People Jim Adler 213 Records37 People Jim Adler McKinney, TX Age 57 Gwen Fleming 2 People Jim Adler Houston, TX Age 68 Carol Brooks 9800 Records 1250 People Jim Adler Hastings, NE Age 32 Jim Adler Canaan, NH Age 59 Jim Adler Redmond, WA Age 48 Jim Adler Denver, CO Age 48
  • 5. Intelligence I am not an Attorney Geek Dweeb Nerd SocialIneptitude Obsession Dork
  • 6.
  • 7. Mark Zuckerberg Real Names Richard Feynman Physics Norio Ohga Sony President 74 min CD Jeff Jonas Big Data Privacy by Design Steve Jobs ‘nuff said Eclectic Innovators
  • 8. Agenda Innocence Frontier Regulation Innovation Austin Alleman@allemanau
  • 10. The surface web is small… 167 Terabytes
  • 11. Compared to the deep web… 91,000 Terabytes
  • 12. ~20Exabytes (20B GB) Data from dawn of civilization through 2002 Data from April 2011
  • 13. Reconnecting out-of-touch family members Online shoppers verifying online sellers Caller ID of harassing phone calls Law enforcement Banking Services Adopted kids seeking their biological parents Learning about a business Airlines trying to return lost luggage Networkers seeking business opportunities Social networkers looking to expand their friends list Professionals learning about colleagues at conferences Social workers who need to know more about their clients Singles curious about the people they meet Lawyers needing quick access to court records Find owner of dog’s relative for transplant Genealogists cultivating their family tree Investigative journalists running down leads Checking out a prospective tenant Research Sales professionals looking for new prospects Non-profit organizations looking for supporters Alumni groups arranging reunions Parents ensuring who their kids safety Anyone retrieving court records Businesses that need to update contact information on customers Checking out a prospective date Finding people that have the same illness as you Sharing Those in legally entangled looking for court records Anyone who need address histories for passports Fiancés and their curious family members Anyone curious about who's emailing or calling them Checking out a prospective social network connection Finding long-lost friends, military buddies, roommates, or classmates Researching a prospective employee Regulated For lots of reasons… (some regulated)
  • 14. Providing major benefits… 51% “major benefit” is ease and convenience 41% “major benefit” is portability 39% “major benefit is sharing Use of Cloud Computing Applications and Services, Pew 2008
  • 15. But real concerns… 90% “very concerned” if data sold 80% “very concerned” if photos used for marketing 68% “very concerned” if data used to serve them ads Use of Cloud Computing Applications and Services, Pew 2008
  • 16. A Prescient Venn Diagram?
  • 18. When towns were small …
  • 19. “The only thing worse than being talked about, is not being talked about.”− Oscar Wilde Density↓ ->Anonymity↓ ->Privacy Expectation↓
  • 20. “Good Fences Make Good Neighbors” - Mending Wall, Robert Frost Density↑ ->Anonymity↑ ->Privacy Expectation↑
  • 21. “In times of rapid change, experience could be your worst enemy.” − J. Paul Getty #@?$!! “Privacy Vertigo” Density↓ ->Anonymity↓ ->Privacy Expectation↓
  • 22. What’s in a Nym? Source: Intelius
  • 24. So, how do we think about public and private now?
  • 25. Public speaking is publicly public
  • 26. Voting is a privately public
  • 27. And some things are publicly private
  • 28. Your home is clearly private
  • 29. And the Constitution protects your privacy from government …
  • 30. But no Constitutional protections between citizens
  • 31. It would be nice … to use familiar framework
  • 34. Cloud dating is public confidential
  • 35. FIPPs “Privacy by Design” Consent unnecessary for commonly accepted practices Increased transparency Federal Trade Commission Guidance
  • 37. “Policy” Confusion Matrix Regulations Violations
  • 39. Compliance “Evolved” Raw Materials CPO Product Development Marketing Quality Acceptance Release Compliance
  • 40.   Hilary Mason’s Maxim Math + Code = Awesome Quants Making a killing on Wall Street but still can’t impress the chicks Weakonomics.com
  • 41. Corollary to Mason’s Maxim Values * (Math + Code) = Awesome
  • 42. First Social Network: The Dinner Table We eat. We share.
  • 44. ~10,000 GCal ~20Exabytes (20B GB) Data in April 2011 Food in April 2011
  • 45. Food Policy Leads Privacy Policy Peanut Butter Hearings Pure FoodAct Labeling Reform FTC Est. CivilRights “SnakeOil” GMO Social MediaAdoption “RobberBarons” Packaged Foods FCRA
  • 46. “Give Peas a Chance” Monsanto’s Corn Mendel’s Peas ? =
  • 47. “Give me the bad news first, Doc” = “CDC reports investigations of outbreaks” “46 states & DC require notification of a databreach. National legislation upcoming.”
  • 49. Transparency Allows Data Driven Decisions
  • 50. = YOU % % % % % %
  • 51. Control comes from Awareness TrueRep.com Awareness and control of your public profile Privacy controls Reputation management Stay tuned …
  • 52.
  • 53. Innovation is a team sport Drive confluence of influencewithin your org Be the happy warrior Find clarity within confusion Reports of privacy’s death have been greatly exaggerated …
  • 54. Questions? Jim AdlerChief Privacy Officer & General Manager, Data SystemsIntelius twitter: @jim_adlerhttp://jimadler.me Strata Conference, New YorkSeptember 2011