SlideShare a Scribd company logo
1 of 13
Download to read offline
A uKnow White Paper
by Tim Woda,
co‐founder of uKnow.com, Inc.
The Decline of Online Privacy
And the rise of personal identity
management in the age of big data
1
Overview
Nearly every interaction someone has on the Internet adds to
an ever-growing collection of online data about them. With
the explosive growth of social networking and online tools
that help make our lives more fun and convenient, individuals
have created an online version of themselves – their digital
self.
There are many problems that result from having a digital self
that becomes increasingly well-defined every day. Because
there is no such thing as anonymous data, businesses and
government entities are able to use anyone’s digital self to
identify the real person behind the data.
High-profile data breaches and issues arising over who
actually owns the data have raised important questions about
online privacy and the security of personal information. There
is a growing sense of fear and powerlessness among the public
as businesses and governments continue to gather more and
more personal data.
This paper discusses concerns about the loss of personal
privacy, the age of the digital self, and the future of personal
identity management.
There is a sense of fear
and powerlessness
among the public as
businesses and
governments continue
to gather more and
more personal data.
2
THE DIGITAL SELF IS
AND BECOMING MORE
DIFFICULT TO MANAGE
3
The Maturing Digital Self and the
Expanding Digital Footprint
The interaction between individuals and the Internet has
brought new phrases into our vocabulary – digital self and
digital footprint.
The digital self is the amalgamation of the personal data
generated while creating, exchanging, and receiving digital
information through the Internet. Emails, texts, online
searches, photos, blog posts, requests for driving directions,
website logins, account profiles, game logins, social check-ins,
video streaming, music streaming, and financial transactions
all blend together to create a digital self that is an ever-
sharpening image of the Internet user.
Any time an individual uses social media, mobile devices, and
apps that generate GPS data they leave behind a digital
footprint. By combining bits of location data from various
sources, companies and government entities can accurately
determine that individual’s exact physical location. They can
also keep a record of where that individual has been, when
they were there, and where the will likely go next.
The Internet never forgets
The Internet records everything and forgets nothing. The trail
of data that gives birth to and shapes the digital self exists
permanently.
Inappropriate public posts and photos on social media sites
like Twitter, Facebook, Pinterest, and Google+ are there for
The digital self is the
amalgamation of the
personal data
generated while
creating, exchanging,
and receiving digital
information through
the Internet.
4
the entire world to see. Those photos and posts aren’t just on
the servers of those sites. Search engines index them and can
be found at any time in the future by anyone. Even posts and
photos that were intended to be private may be discovered.
There is no such thing as anonymous data
One of the best lessons that there is no such thing as
anonymous data comes from Netflix. In 2006, the online
video streaming company released 100 million “anonymous”
subscriber records containing movie ratings made by those
subscribers. Shortly after the release of the data, researchers
were able to identify people in the database by name, and with
a high degree of accuracy. They were able to do this even with
a small number of movie ratings.
Whether “anonymous” data is shared for well-intentioned
reasons or for profit, it is best to assume that someone
somewhere can use it to identify a specific individual.
Individuals have no control over their data
According to a report by Forrester Research, over the next few
years we will see Internet search engines, financial service
companies, health companies, entertainment companies, and
technology startups competing in a free-for-all to collect and
profit from individual’s data.
What’s missing from this equation is the individual supplying
the data. That’s because individuals do not own the data they
have shared. Terms of Use statements on websites may detail
how the company intends to use collected data. However, the
statements make it clear that they own the data shared or
collected from users of the site.
5
MARKETERS VIEW
CONSUMER DATA AS
A VALUABLE ASSET
6
Marketer’s Want More
and Better Consumer Data
Personal data is a valuable asset that can be leveraged, bought,
and sold just like any other traditional asset. That’s why
companies in every market space are doing everything they
can to collect more – and better – consumer data.
Personal data has enormous value. In the U.S. alone,
companies spend more than $2 billion per year on acquiring
third-party data about individuals. That amount is in addition
to the billions spent on market research and the creation of
data derived from other data.
From their point of view, companies are seeking to better
understand what consumers want and need. They believe that
the more detailed data they have, the better they will be able to
create more desirable products, become more efficient
marketers, and increase brand loyalty.
In the age of Big Data, whoever controls the personal data of
an individual controls the marketing relationship. Marketers
with more, fresher, and better data win because they are in a
better position to guess what an individual is interested in
purchasing when, why, and how. With that knowledge, they
can direct more effective marketing toward the individual.
Even though commerce fuels our economic system, the
refinement of marketing tactics must be counterbalanced by
the privacy of each individual.
In the age of Big
Data, whoever
controls the personal
data of an individual
controls the
marketing
relationship.
7
GOVERNMENTS
VIEW PERSONAL
DATA AS A TOOL
FOR SURVEILLANCE
8
Governments Want More
and Better Individual Data
Governments are increasingly using the data of individuals for
law enforcement and national security purposes.
All mobile devices and vehicles using GPS capabilities are
essentially tracking devices. However, citizens would never
knowingly agree to carry a government-issued tracking device.
Citizens would rebel if the government required that they
report when they made a new online friend, when they
“Liked” a friend’s photo, or where they ate lunch. No one
would stand for being compelled to deliver to the government
the content of texts, emails, and Skype calls.
Even though such requirements don’t seem realistic in a
Democratic society, governments already have access to this
information. That’s because governments can use the Internet
as a mass surveillance and intelligence-gathering network. If
they can’t access the information directly, they can easily get it
from the company’s that collect it.
In 2011, the Brookings Institute reported that because of
rapidly declining storage costs, it is technologically and
financially feasible for governments to record nearly every
phone conversation, electronic message, social media
interaction, and the movements of nearly every person and
vehicle.
There is an urgent need to balance the aims of law
enforcement and national security with the expectation of
individual privacy.
Governments can
use the Internet as a
mass surveillance
and intelligence-
gathering network.
9
THE FUTURE OF
PERSONAL
IDENTITY
MANAGEMENT
10
The Movement Towards
Personal Identity Management
As the public becomes more anxious about privacy and the
security of their personal data, companies must respond with
personal identity management solutions.
Effective personal identity management puts individuals in
control of their identity data, transactional data, web-
browsing history, location data, and all user-created data. The
newly empowered individual will be able to decide how,
when, why, and with whom they share their personal data.
In this new data economy, personal data management will
evolve from new rules that govern how individuals,
companies, and government entities collect, use, and share
personal information. There will be clearly stated rights and
responsibilities as well as accountability and enforcement.
Fortunately, there is currently a move led by consumer
advocacy groups and forward-thinking companies in the
identity theft industry toward creating effective personal
identity management systems. There is also an increasing
consumer awareness of what’s at stake.
Companies that understand that the real value of personal
data is in how it empowers the consumer will be the leaders in
developing personal identity management systems. Those
companies will create an entirely new competitive advantage
over companies that don’t learn how to play by the new rules.
By empowering the individual with comprehensive personal
identity management systems, companies will be able to
attract users who demand privacy, security, accountability, and
a clear understanding of how their data will be used.
In this new data
economy, personal
data management will
evolve from new rules
that govern how
individuals,
companies, and
government entities
collect, use, and share
personal information.
11
Conclusion
We are in the age of Big Data where companies and
government entities treat personal data about individuals as a
valuable asset to be collected, bought, sold, and used for
purposes that were never foreseen by the individual sharing
the data.
A system of personal identity management must be developed
to empower individuals to protect their digital footprint and
decide how much of their digital self they want to share.
The hallmark of a trustworthy personal identity management
system will have the following components:
Security: Personal data will be protected against both
intentional and unintentional misuse and security
breaches.
Data Rights and Responsibilities: There will be easy-
to-understand statements of rights and responsibilities
that ensure the integrity of the personal identity
management system.
Accountability and Enforcement: Clear rules will
hold companies and government agencies accountable
for securing and using personal data.
A system of personal
identity management
must be developed to
empower individuals
to protect their digital
footprint and decide
how much of their
digital selves they
want to share.
12
About uKnow
At uKnow, we strive to help families protect their personal
data and information from being misused to invade their
privacy, impact their reputation, steal their identity, or
threaten their safety.
Our flagship product, uKnowKids, helps protect kids from the
dangers of the Internet with uniquely intelligent tools. Unlike
other parental control software, uKnowKids enables parents
to “have their child’s back” without constantly looking over
their shoulder.
By giving parents the information they need to educate their
children about staying safe online and the access to smarter
tools to supervise them in a digital world, uKnowKids helps
make the Internet safer for kids and less intimidating for
parents.
uKnow powers smart
tools that connect and
protect digital families.

More Related Content

More from Prayukth K V

Drones and the Internet of Things: realising the potential of airborne comput...
Drones and the Internet of Things: realising the potential of airborne comput...Drones and the Internet of Things: realising the potential of airborne comput...
Drones and the Internet of Things: realising the potential of airborne comput...Prayukth K V
 
India's draft Internet of Things -policy
India's draft Internet of Things -policyIndia's draft Internet of Things -policy
India's draft Internet of Things -policyPrayukth K V
 
All about the HP split
All about the HP splitAll about the HP split
All about the HP splitPrayukth K V
 
CRM predicts and forecast 2018
CRM predicts and forecast 2018CRM predicts and forecast 2018
CRM predicts and forecast 2018Prayukth K V
 
Cloud adoption and risk report Europe q1 2015
Cloud adoption and risk report Europe q1 2015Cloud adoption and risk report Europe q1 2015
Cloud adoption and risk report Europe q1 2015Prayukth K V
 
Aviation industry IT trends 2015
Aviation industry IT trends 2015Aviation industry IT trends 2015
Aviation industry IT trends 2015Prayukth K V
 
Finnish software industry survey - 2015
Finnish software industry survey - 2015Finnish software industry survey - 2015
Finnish software industry survey - 2015Prayukth K V
 
How the internet of things is shaping up
How the internet of things is shaping upHow the internet of things is shaping up
How the internet of things is shaping upPrayukth K V
 
Evolving a wearables marketing strategy in 2015
Evolving a wearables marketing strategy in 2015Evolving a wearables marketing strategy in 2015
Evolving a wearables marketing strategy in 2015Prayukth K V
 
Leadership lessons for 2015
Leadership lessons for 2015Leadership lessons for 2015
Leadership lessons for 2015Prayukth K V
 
Linkedin Vs Facebook
Linkedin Vs FacebookLinkedin Vs Facebook
Linkedin Vs FacebookPrayukth K V
 
Social Media Stats 2015
Social Media Stats 2015Social Media Stats 2015
Social Media Stats 2015Prayukth K V
 
Internet of things - Future of energy and utilities
Internet of things - Future of energy and utilitiesInternet of things - Future of energy and utilities
Internet of things - Future of energy and utilitiesPrayukth K V
 
Top internet of things companies
Top internet of things companiesTop internet of things companies
Top internet of things companiesPrayukth K V
 
State of Internet of things - 2015 and beyond
State of Internet of things - 2015 and beyondState of Internet of things - 2015 and beyond
State of Internet of things - 2015 and beyondPrayukth K V
 
Future of telecom in the era of Internet of Things
Future of telecom in the era of Internet of ThingsFuture of telecom in the era of Internet of Things
Future of telecom in the era of Internet of ThingsPrayukth K V
 
Building security into the internetofthings
Building security into the internetofthingsBuilding security into the internetofthings
Building security into the internetofthingsPrayukth K V
 
Data driven marketing insights 2015
Data driven marketing insights 2015Data driven marketing insights 2015
Data driven marketing insights 2015Prayukth K V
 
Getting senior management buy in for a social media presence
Getting senior management buy in for a social media presenceGetting senior management buy in for a social media presence
Getting senior management buy in for a social media presencePrayukth K V
 

More from Prayukth K V (20)

Drones and the Internet of Things: realising the potential of airborne comput...
Drones and the Internet of Things: realising the potential of airborne comput...Drones and the Internet of Things: realising the potential of airborne comput...
Drones and the Internet of Things: realising the potential of airborne comput...
 
India's draft Internet of Things -policy
India's draft Internet of Things -policyIndia's draft Internet of Things -policy
India's draft Internet of Things -policy
 
All about the HP split
All about the HP splitAll about the HP split
All about the HP split
 
CRM predicts and forecast 2018
CRM predicts and forecast 2018CRM predicts and forecast 2018
CRM predicts and forecast 2018
 
Cloud adoption and risk report Europe q1 2015
Cloud adoption and risk report Europe q1 2015Cloud adoption and risk report Europe q1 2015
Cloud adoption and risk report Europe q1 2015
 
Aviation industry IT trends 2015
Aviation industry IT trends 2015Aviation industry IT trends 2015
Aviation industry IT trends 2015
 
Finnish software industry survey - 2015
Finnish software industry survey - 2015Finnish software industry survey - 2015
Finnish software industry survey - 2015
 
How the internet of things is shaping up
How the internet of things is shaping upHow the internet of things is shaping up
How the internet of things is shaping up
 
Evolving a wearables marketing strategy in 2015
Evolving a wearables marketing strategy in 2015Evolving a wearables marketing strategy in 2015
Evolving a wearables marketing strategy in 2015
 
Leadership lessons for 2015
Leadership lessons for 2015Leadership lessons for 2015
Leadership lessons for 2015
 
Linkedin Vs Facebook
Linkedin Vs FacebookLinkedin Vs Facebook
Linkedin Vs Facebook
 
Smart cities 2020
Smart cities 2020Smart cities 2020
Smart cities 2020
 
Social Media Stats 2015
Social Media Stats 2015Social Media Stats 2015
Social Media Stats 2015
 
Internet of things - Future of energy and utilities
Internet of things - Future of energy and utilitiesInternet of things - Future of energy and utilities
Internet of things - Future of energy and utilities
 
Top internet of things companies
Top internet of things companiesTop internet of things companies
Top internet of things companies
 
State of Internet of things - 2015 and beyond
State of Internet of things - 2015 and beyondState of Internet of things - 2015 and beyond
State of Internet of things - 2015 and beyond
 
Future of telecom in the era of Internet of Things
Future of telecom in the era of Internet of ThingsFuture of telecom in the era of Internet of Things
Future of telecom in the era of Internet of Things
 
Building security into the internetofthings
Building security into the internetofthingsBuilding security into the internetofthings
Building security into the internetofthings
 
Data driven marketing insights 2015
Data driven marketing insights 2015Data driven marketing insights 2015
Data driven marketing insights 2015
 
Getting senior management buy in for a social media presence
Getting senior management buy in for a social media presenceGetting senior management buy in for a social media presence
Getting senior management buy in for a social media presence
 

Recently uploaded

John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfAmzadHosen3
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 

Recently uploaded (20)

John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 

The Decline of Online Privacy - a whitepaper

  • 1. A uKnow White Paper by Tim Woda, co‐founder of uKnow.com, Inc. The Decline of Online Privacy And the rise of personal identity management in the age of big data
  • 2. 1 Overview Nearly every interaction someone has on the Internet adds to an ever-growing collection of online data about them. With the explosive growth of social networking and online tools that help make our lives more fun and convenient, individuals have created an online version of themselves – their digital self. There are many problems that result from having a digital self that becomes increasingly well-defined every day. Because there is no such thing as anonymous data, businesses and government entities are able to use anyone’s digital self to identify the real person behind the data. High-profile data breaches and issues arising over who actually owns the data have raised important questions about online privacy and the security of personal information. There is a growing sense of fear and powerlessness among the public as businesses and governments continue to gather more and more personal data. This paper discusses concerns about the loss of personal privacy, the age of the digital self, and the future of personal identity management. There is a sense of fear and powerlessness among the public as businesses and governments continue to gather more and more personal data.
  • 3. 2 THE DIGITAL SELF IS AND BECOMING MORE DIFFICULT TO MANAGE
  • 4. 3 The Maturing Digital Self and the Expanding Digital Footprint The interaction between individuals and the Internet has brought new phrases into our vocabulary – digital self and digital footprint. The digital self is the amalgamation of the personal data generated while creating, exchanging, and receiving digital information through the Internet. Emails, texts, online searches, photos, blog posts, requests for driving directions, website logins, account profiles, game logins, social check-ins, video streaming, music streaming, and financial transactions all blend together to create a digital self that is an ever- sharpening image of the Internet user. Any time an individual uses social media, mobile devices, and apps that generate GPS data they leave behind a digital footprint. By combining bits of location data from various sources, companies and government entities can accurately determine that individual’s exact physical location. They can also keep a record of where that individual has been, when they were there, and where the will likely go next. The Internet never forgets The Internet records everything and forgets nothing. The trail of data that gives birth to and shapes the digital self exists permanently. Inappropriate public posts and photos on social media sites like Twitter, Facebook, Pinterest, and Google+ are there for The digital self is the amalgamation of the personal data generated while creating, exchanging, and receiving digital information through the Internet.
  • 5. 4 the entire world to see. Those photos and posts aren’t just on the servers of those sites. Search engines index them and can be found at any time in the future by anyone. Even posts and photos that were intended to be private may be discovered. There is no such thing as anonymous data One of the best lessons that there is no such thing as anonymous data comes from Netflix. In 2006, the online video streaming company released 100 million “anonymous” subscriber records containing movie ratings made by those subscribers. Shortly after the release of the data, researchers were able to identify people in the database by name, and with a high degree of accuracy. They were able to do this even with a small number of movie ratings. Whether “anonymous” data is shared for well-intentioned reasons or for profit, it is best to assume that someone somewhere can use it to identify a specific individual. Individuals have no control over their data According to a report by Forrester Research, over the next few years we will see Internet search engines, financial service companies, health companies, entertainment companies, and technology startups competing in a free-for-all to collect and profit from individual’s data. What’s missing from this equation is the individual supplying the data. That’s because individuals do not own the data they have shared. Terms of Use statements on websites may detail how the company intends to use collected data. However, the statements make it clear that they own the data shared or collected from users of the site.
  • 6. 5 MARKETERS VIEW CONSUMER DATA AS A VALUABLE ASSET
  • 7. 6 Marketer’s Want More and Better Consumer Data Personal data is a valuable asset that can be leveraged, bought, and sold just like any other traditional asset. That’s why companies in every market space are doing everything they can to collect more – and better – consumer data. Personal data has enormous value. In the U.S. alone, companies spend more than $2 billion per year on acquiring third-party data about individuals. That amount is in addition to the billions spent on market research and the creation of data derived from other data. From their point of view, companies are seeking to better understand what consumers want and need. They believe that the more detailed data they have, the better they will be able to create more desirable products, become more efficient marketers, and increase brand loyalty. In the age of Big Data, whoever controls the personal data of an individual controls the marketing relationship. Marketers with more, fresher, and better data win because they are in a better position to guess what an individual is interested in purchasing when, why, and how. With that knowledge, they can direct more effective marketing toward the individual. Even though commerce fuels our economic system, the refinement of marketing tactics must be counterbalanced by the privacy of each individual. In the age of Big Data, whoever controls the personal data of an individual controls the marketing relationship.
  • 8. 7 GOVERNMENTS VIEW PERSONAL DATA AS A TOOL FOR SURVEILLANCE
  • 9. 8 Governments Want More and Better Individual Data Governments are increasingly using the data of individuals for law enforcement and national security purposes. All mobile devices and vehicles using GPS capabilities are essentially tracking devices. However, citizens would never knowingly agree to carry a government-issued tracking device. Citizens would rebel if the government required that they report when they made a new online friend, when they “Liked” a friend’s photo, or where they ate lunch. No one would stand for being compelled to deliver to the government the content of texts, emails, and Skype calls. Even though such requirements don’t seem realistic in a Democratic society, governments already have access to this information. That’s because governments can use the Internet as a mass surveillance and intelligence-gathering network. If they can’t access the information directly, they can easily get it from the company’s that collect it. In 2011, the Brookings Institute reported that because of rapidly declining storage costs, it is technologically and financially feasible for governments to record nearly every phone conversation, electronic message, social media interaction, and the movements of nearly every person and vehicle. There is an urgent need to balance the aims of law enforcement and national security with the expectation of individual privacy. Governments can use the Internet as a mass surveillance and intelligence- gathering network.
  • 11. 10 The Movement Towards Personal Identity Management As the public becomes more anxious about privacy and the security of their personal data, companies must respond with personal identity management solutions. Effective personal identity management puts individuals in control of their identity data, transactional data, web- browsing history, location data, and all user-created data. The newly empowered individual will be able to decide how, when, why, and with whom they share their personal data. In this new data economy, personal data management will evolve from new rules that govern how individuals, companies, and government entities collect, use, and share personal information. There will be clearly stated rights and responsibilities as well as accountability and enforcement. Fortunately, there is currently a move led by consumer advocacy groups and forward-thinking companies in the identity theft industry toward creating effective personal identity management systems. There is also an increasing consumer awareness of what’s at stake. Companies that understand that the real value of personal data is in how it empowers the consumer will be the leaders in developing personal identity management systems. Those companies will create an entirely new competitive advantage over companies that don’t learn how to play by the new rules. By empowering the individual with comprehensive personal identity management systems, companies will be able to attract users who demand privacy, security, accountability, and a clear understanding of how their data will be used. In this new data economy, personal data management will evolve from new rules that govern how individuals, companies, and government entities collect, use, and share personal information.
  • 12. 11 Conclusion We are in the age of Big Data where companies and government entities treat personal data about individuals as a valuable asset to be collected, bought, sold, and used for purposes that were never foreseen by the individual sharing the data. A system of personal identity management must be developed to empower individuals to protect their digital footprint and decide how much of their digital self they want to share. The hallmark of a trustworthy personal identity management system will have the following components: Security: Personal data will be protected against both intentional and unintentional misuse and security breaches. Data Rights and Responsibilities: There will be easy- to-understand statements of rights and responsibilities that ensure the integrity of the personal identity management system. Accountability and Enforcement: Clear rules will hold companies and government agencies accountable for securing and using personal data. A system of personal identity management must be developed to empower individuals to protect their digital footprint and decide how much of their digital selves they want to share.
  • 13. 12 About uKnow At uKnow, we strive to help families protect their personal data and information from being misused to invade their privacy, impact their reputation, steal their identity, or threaten their safety. Our flagship product, uKnowKids, helps protect kids from the dangers of the Internet with uniquely intelligent tools. Unlike other parental control software, uKnowKids enables parents to “have their child’s back” without constantly looking over their shoulder. By giving parents the information they need to educate their children about staying safe online and the access to smarter tools to supervise them in a digital world, uKnowKids helps make the Internet safer for kids and less intimidating for parents. uKnow powers smart tools that connect and protect digital families.