SlideShare a Scribd company logo
1 of 46
Download to read offline
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Privacy by
Designer PRACTICAL CONSIDERATIONS ON UX
DESIGN FOR TRUST
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
“In God we
trust all others
bring data.” - William Edwards Deming
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
We all live in the Age of
Context
SHAPED BY MOBILE, SOCIAL MEDIA, DATA, SENSORS AND LOCATION-BASED SERVICES
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Users expect Personalistation
& Personal
EXPERIENCES FOR THE ‘MOST PERSONAL DEVICE EVER’ ARE..
RELEVANT
are you engaging at the right moment?
GLANCEABLE
can you deliver value in milliseconds?
PERSONAL
do you approach people in the right
manner?
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
No other Apple device has ever
been so connected to the wearer.
It is important to be mindful of this
connection.
Apple Watch Human Interface Design Guidelines, 2015
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Machine-to-human relationships are
now about human-to-human values
UNDERSTANDING PERSONALISATION
H2H M2H
TRUST PRIVACY
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
The Privacy Challenge
CONCERN ABOUT PRIVACY JUMPED 5 POINTS BETWEEN 2014 AND 2015. 2nd Annual Poll on How Personal
Technology is Changing our Lives -
January 2015, Microsoft
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Loss of control
PRIVACY CHALLENGE USER  POINT  OF  VIEW
91% of adults ‘agree’ or ‘strongly agree’ that
consumers have lost control over how
personal information is collected and used by
companies.
Pew Research Privacy Panel Survey, January 2014
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Lack of Transparency
PRIVACY CHALLENGE USER  POINT  OF  VIEW
People are fearful of sharing their data largely
because companies and government have not
been good at clearly explaining how they use
it.
Data Dialog, Demos 2012
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Lack of Knowledge(aka Privacy and PETs are ‘too difficult’)
PRIVACY CHALLENGE USER  POINT  OF  VIEW
54% believe it would be “somewhat” or “very” difficult
to find tools and strategies that would help them be
more private online and in using their cell phones 
13% unaware about search engines that do not keep track of a user’s search history
31% unaware email encryption programs such as PGP exist
31% unaware of privacy-enhancing browser plug-ins
39% unaware about anonymity software such as Tor
Pew Research, 2015
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Everyday privacy measures
that do catch on
ON THE BRIGHT SIDE LESS TECHNICAL WAYS OF OBTING OUT OF DATA COLLECTION
Clearing cookies or browser history: 59%
Refusing to provide information about themselves that wasn’t relevant to the transaction: 57%
Set their browser to disable or turn off cookies: 34%
Deleted or edited something they posted in the past: 29%
Used a temporary username or email address: 25%
Giving inaccurate or misleading information about themselves: 24%
Decided not to use a website because they asked for their real name: 23%
Used a public computer to browse anonymously: 12%
Asked someone to remove something that was posted about themselves online: 11%
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
the Facebook
paradox
• 91% of adults feel consumers have
lost control over how personal
information is collected and used by
companies.
• 58% of the entire adult population
(and 71% of internet users) is on
Facebook.
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Privacy VS. User Experience
#FALSE – HOW DO YOU DEFINE A BETTER PRODUCT? CONTEXT? DATA QUALITY?
The truth is that collecting information about
people allows you to make significantly better
products and the more information you collect,
the better products you can build .
Dustin Curtis, “Privacy VS. User Experience” (2014)
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Privacy is a fundamental component
of the product experience
BUSINESSES CAN DELIVER A GRAND USER EXPERIENCE AND TREMENDOUS VALUE ONLY IF THEY
SAFEGUARD THEIR USERS’ PRIVACY AND SECURITY
BUSINESS
VALUE
CONSUMER
VALUE
PRIVACY
GREAT UX
personalisation
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Being credible
BEING CREDIBLE HAS ALWAYS BEEN IMPORTANT FOR A GOOD USER EXPERIENCE
useful
usable desirable
credible
valuable
findable accessible
User Experience Honeycomb (Peter Morville)
CREDIBILITY 2004
the information you present to users
CREDIBILITY 2015
taking responsibility to keep personal data safe
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Privacy by designer
DELIVER BOTH PERSONALISATION AND TRUST
We owe it to both our users and the people who hire us to actively think about privacy, and to implement privacy in the
flows and designs we deliver.
B. We need to deliver trustworthy
products.
A. We need to deliver great,
personal experiences.
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
What is Privacy?
PRIVACY IS BROAD PRIVACY IS A RIGHT PRIVACY IS NOT DEAD
Personal
Data
• The Universal
Declaration of
Human Rights (Art 12)
• Europe: Directive
95/46/EC
• Belgium: Privacy Act
(1992, 1998 & KBs)
• Telecommunication
law
• …
LAWS
AND SUCH
European Privacy
Watchdogs &
Facebook
GDPR
New EU legislation
in the works
“If data is the
new oil,
privacy is the
new green.”
…
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Any
information
This is not limited to data regarding a an individual’s privacy,
also relating to a person's professional or public life.
Eg. name, a picture, a telephone number (professional number too), a code, a
bank account number, an e-mail address, a fingerprint, … .
PERSONAL DATA IS ANY
INFORMATION (RELATING TO)*
AN IDENTIFIED OR
IDENTIFIABLE NATURAL
PERSON
* OFTEN DEPENDS ON CONTEXT
•  Object data vs personal data (eg license plate)
•  Unique biometric data is always personal data (eg
fingerpint, DNA)
DATA SUBJECT
PERSONAL DATA
RELATES TO
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Identifiable evolves
IDENTIFIABILITY = WHEN VALUE > COST
value of
knowing
cost of
identifying
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
IP address
AN IP ADDRESS ON ITSELF WILL UNDER THE GDPR NO LONGER BE ‘PERSONAL DATA’ BY DEFAULT
(UNLESS YOU ARE AN ISP)
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Counter
measures
Not personal information when
measures are taken which
reasonably rule out
identification of a person
•  Anonymisation
•  Key-coded data (clinical research)
•  Data masking/obfuscation (for
development)
•  Granularity
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Beware:
location
Special data which under the
GDPR will require extra safety
measures
(as is data on children)
avoid when possible
geohashes
coarse location
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Stay clear:
sensitive data
 •  race
•  political opinions
•  religious or philosophical beliefs
•  trade-union membership
•  health
•  sex life
•  prosecutions or criminal or administrative convictions
Prohibited to collect, register or
ask to disclose.
(exceptions apply, but then additional
safeguards are required)
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
What about
republication?
Photographs and personal
information published online may
only be re-used if given consent.
•  different context
•  different purpose
=> context & purpose apply to
recycling as well
(In case of scraping, copyright and database law are
relevant too.)
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Your
responsibilities
as Controller
•  Ensure the quality of the data
The data being processed have to be exact and, if necessary, kept up-to-
date
•  Ensure the confidentiality of the data
Responsibility to inform and make sure that the individuals working under his
authority only have access to and make use of the data they need to perform
their duties
•  Ensure the protection of the data
From unwanted internal or external curiosity, as well as from unauthorised
processing operations. Security measures can be organizational (restriction of
the number of individuals having access to the data, use of access codes,
locking offices with computers and data files, etc.) and technical.
(!) The more sensitive the data and the higher the risks for the data subject
are, the more precautions have to be taken. (see ‘information security’ on
privacycommission.be)
•  Erasure of data
Personal data must not be kept in a form allowing for identification of the data
subjects any longer than necessary for the purpose aimed at.
+ BEFORE PROCESSING OF
DATA: NOTIFICATION
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
In case of
breach
CONSIDER A BREACH LIKELY –
AND PREPARE ACCORDINGLY
•  Do not play the victim
•  Be accountable
•  Take ownership
•  Express regaret
1. What happened? (tell what you know at that time)
crisis communications
(works for downtime communication too)
2. What is being done *NOW*? (investigate, take systems offline, ..)
3. How does this affect your customers? (both short- and long term)
4. What are you doing to minimize risk? What can your customers do?
5. How do people get more information or updates?
(folluw up) 6. What are you doing prevent this from happening again?
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Design for explicit
OPT-IN & COOKIELAW
By signing this contract, you agree
we have the right to collect and
pass on all your information. In case
you do not want your bank to pass
on your credit information to third
partners and other divisions, please
write ‘I do not agree’ on the
contract and hand it over to the
person behind the till.
EXPLICIT EXPLICIT NOT EXPLICIT
(hidden opt-out)
NO YES
IF YOU AGREE, PLEASE
CHECK THIS BOX:
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Design for
informed
NO SURPRISES
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Design for choice
CONSENT
In your designs and flows, take into account both having and not having the data.
Design personalized experiences
for when you have data.
Design good alternatives for not
having the data.
Today will be sunny
Weather for Olen, Belgium where we
know you live.
Check out the weather!
Antwerpen
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Privacy as a
Trading
Function?
Customer Data: Designing for
Transparancy and Trust
– by Timothy Morey, Theodore Forbath, And Allison
Schoop, May 2015 (Harvard Business Review)
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Design for
trust
CLEAR & CONSISTENT, SO
PEOPLE CAN TRUST YOU TO
POINT OUT PRIVACY RELATED
FEATURES & SETTINGS.
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
The EU prosed icons: privacy-by-
design taken too literal (how’s that for creepiness factor?)
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Design for
because
EXPLAIN YOUR MAGIC
When users know of the
existence of a certain algorithm,
their satisfaction with the
product increases over time ,
probably as they start to
understand its workings better.
Yet when they discovered an
algorithm they were previously
unaware of, users felt betrayed.
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Design for
because
EXPLAIN YOUR MAGIC
When users know of the
existence of a certain algorithm,
their satisfaction with the
product increases over time ,
probably as they start to
understand its workings better.
Yet when they discovered an
algorithm they were previously
unaware of, users felt betrayed.
WORST CASE SCENARIO
“In the extreme case, it may be that whenever a software developer in Menlo Park
adjusts a parameter, someone somewhere wrongly starts to believe themselves
to be unloved. ”
– Eslami et all.
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Because allows people to correct
you when you are wrong.
Something we best figure out before algorithms get to act on our behalf.
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Design for transparency
Show people their data selfs
If we are going to allow algorithms and
expert rules to steer our behaviour, we
must know they understand that
correctly.
Allow for:
-  Correction
-  Reset
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Reflect all data collected in functionality
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Design for
forming
secure habits
BURNER ACCOUNTS
Kinja introduced these for
anonymous commenting. They
made private keys
understandable through
metaphor.
“…if you lose the burner key
initially issued we will not be
able to retrieve this information
for you or reset the account.
Save your key.”
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
REWARD SECURE BEHAVIOUR
Users that enable two-step
security on their accounts will
now receive a 10% discount off
their monthly bill Mailchimp bill.
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Design to
encourage
privacy
ACCESS DURATION
People forget to ‘revoke’ things.
Supply limited time access
options:
WeChat: location discoverable
for 10 minutes (default)
LinkedIn: access duration
settings (weeks -> months ->
years)
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Design for an
exit
MAKE IT EASY TO LEAVE
BUT CONVINCE THEM TO STAY
Think about WHY people are
leaving, and offer alternatives.
“snooze” services
less-email-option
reset profile/account
..
(and remember data portability!)
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Do you want to know
if your friends are
(action/mood/..) ?
Do you want your friends
to know if you are (action/
mood/..) ?
Don’t allowOK
Design with peer-to-peer privacy
in mind.
Ask the right question: not do you want to see, but are you willing for others to see..
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
When in doubt…
STEP 1: ASK YOUR USER – PRIVACY DOES NOT BENEFIT FROM A “DO FIRST ASK FORGIVENESS
LATER” STRATEGY
Build it so a user
always has the option to tell
you to go bugger off.
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
When in doubt…
STEP 2: USE COMMON SENSE AND AS LITTLE DATA AS POSSIBLE
PERSONAL DATA
Less is more: in quantity and
detail, but also in time
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
i!When in doubt…
STEP 3: ASK THE EXPERTS
Belgian Privacy
Commission
www.privacycommission.be
Article 29 Working
Party
Opinions & recommendations
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
We influence what
is acceptable.
So let’s make good,
proportional stuff.

More Related Content

What's hot

7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing InvestmentsCaston Thomas
 
How Smart Products Help Companies Profit From Data
How Smart Products Help Companies Profit From DataHow Smart Products Help Companies Profit From Data
How Smart Products Help Companies Profit From DataBernard Marr
 
Why Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemWhy Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemBernard Marr
 
Vint big data research privacy technology and the law
Vint big data research privacy technology and the lawVint big data research privacy technology and the law
Vint big data research privacy technology and the lawKarlos Svoboda
 
These Fascinating Examples Show Why Streaming Data And Real-Time Analytics Ma...
These Fascinating Examples Show Why Streaming Data And Real-Time Analytics Ma...These Fascinating Examples Show Why Streaming Data And Real-Time Analytics Ma...
These Fascinating Examples Show Why Streaming Data And Real-Time Analytics Ma...Bernard Marr
 
Survey of accountability, trust, consent, tracking, security and privacy mech...
Survey of accountability, trust, consent, tracking, security and privacy mech...Survey of accountability, trust, consent, tracking, security and privacy mech...
Survey of accountability, trust, consent, tracking, security and privacy mech...Karlos Svoboda
 
PSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & SecurityPSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & SecurityPSFK
 
Inman Connect Conference Summary
Inman Connect Conference SummaryInman Connect Conference Summary
Inman Connect Conference SummaryMy Kid Has Paws
 
AI - Artificial Intelligence - Implications for Libraries
AI - Artificial Intelligence - Implications for LibrariesAI - Artificial Intelligence - Implications for Libraries
AI - Artificial Intelligence - Implications for LibrariesBrian Pichman
 
How To Set SMART Goals To Help You Succeed?
How To Set SMART Goals To Help You Succeed?How To Set SMART Goals To Help You Succeed?
How To Set SMART Goals To Help You Succeed?Bernard Marr
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenienceDon Lovett
 
Fontys Eric van Tol
Fontys Eric van TolFontys Eric van Tol
Fontys Eric van TolTalentEvent
 
What is Digital Disruption?
What is Digital Disruption?What is Digital Disruption?
What is Digital Disruption?Chuck Elias
 
Cloud computing: Trends and Challenges
Cloud computing: Trends and ChallengesCloud computing: Trends and Challenges
Cloud computing: Trends and ChallengesBig Data Colombia
 
Digital Trends 2017 Final
Digital Trends 2017 FinalDigital Trends 2017 Final
Digital Trends 2017 FinalGet up to Speed
 
Technology in 2024 (Neal/Fantry Comm 303-50)
Technology in 2024 (Neal/Fantry Comm 303-50)Technology in 2024 (Neal/Fantry Comm 303-50)
Technology in 2024 (Neal/Fantry Comm 303-50)datgymnast94
 
The Amazing Ways Retail Giant Zalando Is Using Artificial Intelligence
The Amazing Ways Retail Giant Zalando Is Using Artificial IntelligenceThe Amazing Ways Retail Giant Zalando Is Using Artificial Intelligence
The Amazing Ways Retail Giant Zalando Is Using Artificial IntelligenceBernard Marr
 

What's hot (20)

7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments
 
How Smart Products Help Companies Profit From Data
How Smart Products Help Companies Profit From DataHow Smart Products Help Companies Profit From Data
How Smart Products Help Companies Profit From Data
 
Why Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemWhy Cybersecurity is a Data Problem
Why Cybersecurity is a Data Problem
 
Enigma's Architecture
Enigma's ArchitectureEnigma's Architecture
Enigma's Architecture
 
Vint big data research privacy technology and the law
Vint big data research privacy technology and the lawVint big data research privacy technology and the law
Vint big data research privacy technology and the law
 
Predictions
PredictionsPredictions
Predictions
 
These Fascinating Examples Show Why Streaming Data And Real-Time Analytics Ma...
These Fascinating Examples Show Why Streaming Data And Real-Time Analytics Ma...These Fascinating Examples Show Why Streaming Data And Real-Time Analytics Ma...
These Fascinating Examples Show Why Streaming Data And Real-Time Analytics Ma...
 
Survey of accountability, trust, consent, tracking, security and privacy mech...
Survey of accountability, trust, consent, tracking, security and privacy mech...Survey of accountability, trust, consent, tracking, security and privacy mech...
Survey of accountability, trust, consent, tracking, security and privacy mech...
 
PSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & SecurityPSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & Security
 
Inman Connect Conference Summary
Inman Connect Conference SummaryInman Connect Conference Summary
Inman Connect Conference Summary
 
Buckle Up
Buckle UpBuckle Up
Buckle Up
 
AI - Artificial Intelligence - Implications for Libraries
AI - Artificial Intelligence - Implications for LibrariesAI - Artificial Intelligence - Implications for Libraries
AI - Artificial Intelligence - Implications for Libraries
 
How To Set SMART Goals To Help You Succeed?
How To Set SMART Goals To Help You Succeed?How To Set SMART Goals To Help You Succeed?
How To Set SMART Goals To Help You Succeed?
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
 
Fontys Eric van Tol
Fontys Eric van TolFontys Eric van Tol
Fontys Eric van Tol
 
What is Digital Disruption?
What is Digital Disruption?What is Digital Disruption?
What is Digital Disruption?
 
Cloud computing: Trends and Challenges
Cloud computing: Trends and ChallengesCloud computing: Trends and Challenges
Cloud computing: Trends and Challenges
 
Digital Trends 2017 Final
Digital Trends 2017 FinalDigital Trends 2017 Final
Digital Trends 2017 Final
 
Technology in 2024 (Neal/Fantry Comm 303-50)
Technology in 2024 (Neal/Fantry Comm 303-50)Technology in 2024 (Neal/Fantry Comm 303-50)
Technology in 2024 (Neal/Fantry Comm 303-50)
 
The Amazing Ways Retail Giant Zalando Is Using Artificial Intelligence
The Amazing Ways Retail Giant Zalando Is Using Artificial IntelligenceThe Amazing Ways Retail Giant Zalando Is Using Artificial Intelligence
The Amazing Ways Retail Giant Zalando Is Using Artificial Intelligence
 

Viewers also liked

Security by design: An Introduction to Drupal Security
Security by design: An Introduction to Drupal SecuritySecurity by design: An Introduction to Drupal Security
Security by design: An Introduction to Drupal SecurityMediacurrent
 
Top career課件
Top career課件Top career課件
Top career課件Qilian
 
#Ready4EUdataP Privacy by Design: effetti pratici sui sistemi IT Giancarlo Butti
#Ready4EUdataP Privacy by Design: effetti pratici sui sistemi IT Giancarlo Butti#Ready4EUdataP Privacy by Design: effetti pratici sui sistemi IT Giancarlo Butti
#Ready4EUdataP Privacy by Design: effetti pratici sui sistemi IT Giancarlo ButtiEuroPrivacy
 
Privacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the artPrivacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the artJames Mulhern
 
Information Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsInformation Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsMarius FAILLOT DEVARRE
 
Privacy by Design Seminar - Jan 22, 2015
Privacy by Design Seminar - Jan 22, 2015Privacy by Design Seminar - Jan 22, 2015
Privacy by Design Seminar - Jan 22, 2015Dr. Ann Cavoukian
 
Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...
Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...
Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...Amazon Web Services
 
Advantages of privacy by design in IoE
Advantages of privacy by design in IoEAdvantages of privacy by design in IoE
Advantages of privacy by design in IoEMarc Vael
 
Managing Cloud Security Design and Implementation in a Ransomware World
Managing Cloud Security Design and Implementation in a Ransomware World Managing Cloud Security Design and Implementation in a Ransomware World
Managing Cloud Security Design and Implementation in a Ransomware World MongoDB
 
Privacy by Design: White Papaer
Privacy by Design: White PapaerPrivacy by Design: White Papaer
Privacy by Design: White PapaerKristyn Greenwood
 
Don't Ask, Don't Tell - The Virtues of Privacy By Design
Don't Ask, Don't Tell - The Virtues of Privacy By DesignDon't Ask, Don't Tell - The Virtues of Privacy By Design
Don't Ask, Don't Tell - The Virtues of Privacy By DesignEleanor McHugh
 
Safeguarding privacy in research design
Safeguarding privacy in research designSafeguarding privacy in research design
Safeguarding privacy in research designMarlon Domingus
 
Privacy by design
Privacy by designPrivacy by design
Privacy by designblogzilla
 
Google在被遺忘權 (Right to Be Forgotten)中所扮演的角色
Google在被遺忘權 (Right to Be Forgotten)中所扮演的角色Google在被遺忘權 (Right to Be Forgotten)中所扮演的角色
Google在被遺忘權 (Right to Be Forgotten)中所扮演的角色Wayne Chung
 
20171106 - Privacy Design Lab - LINDDUN
20171106 - Privacy Design Lab - LINDDUN20171106 - Privacy Design Lab - LINDDUN
20171106 - Privacy Design Lab - LINDDUNBrussels Legal Hackers
 
Ame Elliott – No, Thank You: User Experience Design for Privacy
Ame Elliott – No, Thank You: User Experience Design for PrivacyAme Elliott – No, Thank You: User Experience Design for Privacy
Ame Elliott – No, Thank You: User Experience Design for PrivacyNEXT Conference
 

Viewers also liked (18)

Security by design: An Introduction to Drupal Security
Security by design: An Introduction to Drupal SecuritySecurity by design: An Introduction to Drupal Security
Security by design: An Introduction to Drupal Security
 
Top career課件
Top career課件Top career課件
Top career課件
 
#Ready4EUdataP Privacy by Design: effetti pratici sui sistemi IT Giancarlo Butti
#Ready4EUdataP Privacy by Design: effetti pratici sui sistemi IT Giancarlo Butti#Ready4EUdataP Privacy by Design: effetti pratici sui sistemi IT Giancarlo Butti
#Ready4EUdataP Privacy by Design: effetti pratici sui sistemi IT Giancarlo Butti
 
Privacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the artPrivacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the art
 
Information Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsInformation Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & Metrics
 
Privacy by Design Seminar - Jan 22, 2015
Privacy by Design Seminar - Jan 22, 2015Privacy by Design Seminar - Jan 22, 2015
Privacy by Design Seminar - Jan 22, 2015
 
Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...
Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...
Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...
 
Advantages of privacy by design in IoE
Advantages of privacy by design in IoEAdvantages of privacy by design in IoE
Advantages of privacy by design in IoE
 
Managing Cloud Security Design and Implementation in a Ransomware World
Managing Cloud Security Design and Implementation in a Ransomware World Managing Cloud Security Design and Implementation in a Ransomware World
Managing Cloud Security Design and Implementation in a Ransomware World
 
Privacy by Design: White Papaer
Privacy by Design: White PapaerPrivacy by Design: White Papaer
Privacy by Design: White Papaer
 
Don't Ask, Don't Tell - The Virtues of Privacy By Design
Don't Ask, Don't Tell - The Virtues of Privacy By DesignDon't Ask, Don't Tell - The Virtues of Privacy By Design
Don't Ask, Don't Tell - The Virtues of Privacy By Design
 
Safeguarding privacy in research design
Safeguarding privacy in research designSafeguarding privacy in research design
Safeguarding privacy in research design
 
Privacy by design
Privacy by designPrivacy by design
Privacy by design
 
Google在被遺忘權 (Right to Be Forgotten)中所扮演的角色
Google在被遺忘權 (Right to Be Forgotten)中所扮演的角色Google在被遺忘權 (Right to Be Forgotten)中所扮演的角色
Google在被遺忘權 (Right to Be Forgotten)中所扮演的角色
 
20171106 - Privacy Design Lab - LINDDUN
20171106 - Privacy Design Lab - LINDDUN20171106 - Privacy Design Lab - LINDDUN
20171106 - Privacy Design Lab - LINDDUN
 
Ame Elliott – No, Thank You: User Experience Design for Privacy
Ame Elliott – No, Thank You: User Experience Design for PrivacyAme Elliott – No, Thank You: User Experience Design for Privacy
Ame Elliott – No, Thank You: User Experience Design for Privacy
 
Data Pipeline Matters
Data Pipeline MattersData Pipeline Matters
Data Pipeline Matters
 
The AI Rush
The AI RushThe AI Rush
The AI Rush
 

Similar to Privacy By Designer (PHP.ghent)

TrustUX: balancing personalisation and privacy to create understanding and tr...
TrustUX: balancing personalisation and privacy to create understanding and tr...TrustUX: balancing personalisation and privacy to create understanding and tr...
TrustUX: balancing personalisation and privacy to create understanding and tr...Ann Wuyts
 
Ux design ethics for data privacy and protection
Ux design ethics for data privacy and protectionUx design ethics for data privacy and protection
Ux design ethics for data privacy and protectionveronica hoth
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in MindGosia Fraser
 
HPE IDOL 10 (Intelligent Data Operating Layer)
HPE IDOL 10 (Intelligent Data Operating Layer)HPE IDOL 10 (Intelligent Data Operating Layer)
HPE IDOL 10 (Intelligent Data Operating Layer)Andrey Karpov
 
TLabs - deutsche telekom
TLabs -  deutsche telekomTLabs -  deutsche telekom
TLabs - deutsche telekomChristina Azzam
 
Data-Driven Design for User Experience
Data-Driven Design for User Experience Data-Driven Design for User Experience
Data-Driven Design for User Experience Emi Kwon
 
IOT - Design Principles of Connected Devices
IOT - Design Principles of Connected DevicesIOT - Design Principles of Connected Devices
IOT - Design Principles of Connected DevicesDevyani Vasistha
 
Designing experiences for the personal data box
Designing experiences for the personal data boxDesigning experiences for the personal data box
Designing experiences for the personal data boxPierrick Thébault
 
Big data-and-creativity v.1
Big data-and-creativity v.1Big data-and-creativity v.1
Big data-and-creativity v.1Kim Flintoff
 
The Mobility Revolution and the Power of Social Media (Gerd Leonhard at ACTE0...
The Mobility Revolution and the Power of Social Media (Gerd Leonhard at ACTE0...The Mobility Revolution and the Power of Social Media (Gerd Leonhard at ACTE0...
The Mobility Revolution and the Power of Social Media (Gerd Leonhard at ACTE0...Gerd Leonhard
 
UX STRAT USA: Leah Buley, "The Role of UX / CX in Business"
UX STRAT USA: Leah Buley, "The Role of UX / CX in Business"UX STRAT USA: Leah Buley, "The Role of UX / CX in Business"
UX STRAT USA: Leah Buley, "The Role of UX / CX in Business"UX STRAT
 
Designing the privacy user experience experience dynamics web seminar
Designing the privacy user experience  experience dynamics web seminarDesigning the privacy user experience  experience dynamics web seminar
Designing the privacy user experience experience dynamics web seminarExperience Dynamics
 
The hi:project: empowering you, empowering us, with a more human web
The hi:project: empowering you, empowering us, with a more human webThe hi:project: empowering you, empowering us, with a more human web
The hi:project: empowering you, empowering us, with a more human webThe hi:project
 
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...How to Migrate Your Organization to a More Security-Minded Culture – From Dev...
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...Dana Gardner
 
CPCU 2016 future of underwriting insurtech
CPCU 2016   future of underwriting insurtechCPCU 2016   future of underwriting insurtech
CPCU 2016 future of underwriting insurtechintellectseec
 
Lean UX, Google Launchpad London, 2014
Lean UX, Google Launchpad London, 2014Lean UX, Google Launchpad London, 2014
Lean UX, Google Launchpad London, 2014Adrian Howard
 
Content trends: Get ready for Smarter Content - Geoffrey Igharo, Creuna
Content trends: Get ready for Smarter Content - Geoffrey Igharo, CreunaContent trends: Get ready for Smarter Content - Geoffrey Igharo, Creuna
Content trends: Get ready for Smarter Content - Geoffrey Igharo, CreunaGeoffrey Igharo
 
ZION: Security and Internet of Things
ZION: Security and Internet of ThingsZION: Security and Internet of Things
ZION: Security and Internet of ThingsAnkam Karthik
 
The Privacy Illusion
The Privacy IllusionThe Privacy Illusion
The Privacy IllusionMary Aviles
 
Thingscon Amsterdam 2015 - IoT Design Manifesto workshop
Thingscon Amsterdam 2015 - IoT Design Manifesto workshop Thingscon Amsterdam 2015 - IoT Design Manifesto workshop
Thingscon Amsterdam 2015 - IoT Design Manifesto workshop ThingsConAMS
 

Similar to Privacy By Designer (PHP.ghent) (20)

TrustUX: balancing personalisation and privacy to create understanding and tr...
TrustUX: balancing personalisation and privacy to create understanding and tr...TrustUX: balancing personalisation and privacy to create understanding and tr...
TrustUX: balancing personalisation and privacy to create understanding and tr...
 
Ux design ethics for data privacy and protection
Ux design ethics for data privacy and protectionUx design ethics for data privacy and protection
Ux design ethics for data privacy and protection
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
 
HPE IDOL 10 (Intelligent Data Operating Layer)
HPE IDOL 10 (Intelligent Data Operating Layer)HPE IDOL 10 (Intelligent Data Operating Layer)
HPE IDOL 10 (Intelligent Data Operating Layer)
 
TLabs - deutsche telekom
TLabs -  deutsche telekomTLabs -  deutsche telekom
TLabs - deutsche telekom
 
Data-Driven Design for User Experience
Data-Driven Design for User Experience Data-Driven Design for User Experience
Data-Driven Design for User Experience
 
IOT - Design Principles of Connected Devices
IOT - Design Principles of Connected DevicesIOT - Design Principles of Connected Devices
IOT - Design Principles of Connected Devices
 
Designing experiences for the personal data box
Designing experiences for the personal data boxDesigning experiences for the personal data box
Designing experiences for the personal data box
 
Big data-and-creativity v.1
Big data-and-creativity v.1Big data-and-creativity v.1
Big data-and-creativity v.1
 
The Mobility Revolution and the Power of Social Media (Gerd Leonhard at ACTE0...
The Mobility Revolution and the Power of Social Media (Gerd Leonhard at ACTE0...The Mobility Revolution and the Power of Social Media (Gerd Leonhard at ACTE0...
The Mobility Revolution and the Power of Social Media (Gerd Leonhard at ACTE0...
 
UX STRAT USA: Leah Buley, "The Role of UX / CX in Business"
UX STRAT USA: Leah Buley, "The Role of UX / CX in Business"UX STRAT USA: Leah Buley, "The Role of UX / CX in Business"
UX STRAT USA: Leah Buley, "The Role of UX / CX in Business"
 
Designing the privacy user experience experience dynamics web seminar
Designing the privacy user experience  experience dynamics web seminarDesigning the privacy user experience  experience dynamics web seminar
Designing the privacy user experience experience dynamics web seminar
 
The hi:project: empowering you, empowering us, with a more human web
The hi:project: empowering you, empowering us, with a more human webThe hi:project: empowering you, empowering us, with a more human web
The hi:project: empowering you, empowering us, with a more human web
 
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...How to Migrate Your Organization to a More Security-Minded Culture – From Dev...
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...
 
CPCU 2016 future of underwriting insurtech
CPCU 2016   future of underwriting insurtechCPCU 2016   future of underwriting insurtech
CPCU 2016 future of underwriting insurtech
 
Lean UX, Google Launchpad London, 2014
Lean UX, Google Launchpad London, 2014Lean UX, Google Launchpad London, 2014
Lean UX, Google Launchpad London, 2014
 
Content trends: Get ready for Smarter Content - Geoffrey Igharo, Creuna
Content trends: Get ready for Smarter Content - Geoffrey Igharo, CreunaContent trends: Get ready for Smarter Content - Geoffrey Igharo, Creuna
Content trends: Get ready for Smarter Content - Geoffrey Igharo, Creuna
 
ZION: Security and Internet of Things
ZION: Security and Internet of ThingsZION: Security and Internet of Things
ZION: Security and Internet of Things
 
The Privacy Illusion
The Privacy IllusionThe Privacy Illusion
The Privacy Illusion
 
Thingscon Amsterdam 2015 - IoT Design Manifesto workshop
Thingscon Amsterdam 2015 - IoT Design Manifesto workshop Thingscon Amsterdam 2015 - IoT Design Manifesto workshop
Thingscon Amsterdam 2015 - IoT Design Manifesto workshop
 

More from Ann Wuyts

When people are your most important asset: Data Governance, Privacy & UX
When people are your most important asset: Data Governance, Privacy & UXWhen people are your most important asset: Data Governance, Privacy & UX
When people are your most important asset: Data Governance, Privacy & UXAnn Wuyts
 
Privacy Intro voor SETUP Utrecht's "16.8 miljoen Nederlanders in één verjaard...
Privacy Intro voor SETUP Utrecht's "16.8 miljoen Nederlanders in één verjaard...Privacy Intro voor SETUP Utrecht's "16.8 miljoen Nederlanders in één verjaard...
Privacy Intro voor SETUP Utrecht's "16.8 miljoen Nederlanders in één verjaard...Ann Wuyts
 
Dear Marketers, How Badly Do You Know Me!
Dear Marketers, How Badly Do You Know Me!Dear Marketers, How Badly Do You Know Me!
Dear Marketers, How Badly Do You Know Me!Ann Wuyts
 
Designing dashboards for a Sense of Control
Designing dashboards for a Sense of ControlDesigning dashboards for a Sense of Control
Designing dashboards for a Sense of ControlAnn Wuyts
 
Ambient AI, Advertising & Technology
Ambient AI, Advertising & TechnologyAmbient AI, Advertising & Technology
Ambient AI, Advertising & TechnologyAnn Wuyts
 
9 Dingen Die Je Over Privacy Moet Weten
9 Dingen Die Je Over Privacy Moet Weten9 Dingen Die Je Over Privacy Moet Weten
9 Dingen Die Je Over Privacy Moet WetenAnn Wuyts
 
Mobile, Smart & Context-Aware (infographic)
Mobile, Smart & Context-Aware (infographic)Mobile, Smart & Context-Aware (infographic)
Mobile, Smart & Context-Aware (infographic)Ann Wuyts
 
MomoBXL - Pat Walsche on World-wide Privacy Recommendations
MomoBXL - Pat Walsche on World-wide Privacy RecommendationsMomoBXL - Pat Walsche on World-wide Privacy Recommendations
MomoBXL - Pat Walsche on World-wide Privacy RecommendationsAnn Wuyts
 
Vuilbakkes Mobile App Concept
Vuilbakkes Mobile App ConceptVuilbakkes Mobile App Concept
Vuilbakkes Mobile App ConceptAnn Wuyts
 

More from Ann Wuyts (9)

When people are your most important asset: Data Governance, Privacy & UX
When people are your most important asset: Data Governance, Privacy & UXWhen people are your most important asset: Data Governance, Privacy & UX
When people are your most important asset: Data Governance, Privacy & UX
 
Privacy Intro voor SETUP Utrecht's "16.8 miljoen Nederlanders in één verjaard...
Privacy Intro voor SETUP Utrecht's "16.8 miljoen Nederlanders in één verjaard...Privacy Intro voor SETUP Utrecht's "16.8 miljoen Nederlanders in één verjaard...
Privacy Intro voor SETUP Utrecht's "16.8 miljoen Nederlanders in één verjaard...
 
Dear Marketers, How Badly Do You Know Me!
Dear Marketers, How Badly Do You Know Me!Dear Marketers, How Badly Do You Know Me!
Dear Marketers, How Badly Do You Know Me!
 
Designing dashboards for a Sense of Control
Designing dashboards for a Sense of ControlDesigning dashboards for a Sense of Control
Designing dashboards for a Sense of Control
 
Ambient AI, Advertising & Technology
Ambient AI, Advertising & TechnologyAmbient AI, Advertising & Technology
Ambient AI, Advertising & Technology
 
9 Dingen Die Je Over Privacy Moet Weten
9 Dingen Die Je Over Privacy Moet Weten9 Dingen Die Je Over Privacy Moet Weten
9 Dingen Die Je Over Privacy Moet Weten
 
Mobile, Smart & Context-Aware (infographic)
Mobile, Smart & Context-Aware (infographic)Mobile, Smart & Context-Aware (infographic)
Mobile, Smart & Context-Aware (infographic)
 
MomoBXL - Pat Walsche on World-wide Privacy Recommendations
MomoBXL - Pat Walsche on World-wide Privacy RecommendationsMomoBXL - Pat Walsche on World-wide Privacy Recommendations
MomoBXL - Pat Walsche on World-wide Privacy Recommendations
 
Vuilbakkes Mobile App Concept
Vuilbakkes Mobile App ConceptVuilbakkes Mobile App Concept
Vuilbakkes Mobile App Concept
 

Recently uploaded

group_15_empirya_p1projectIndustrial.pdf
group_15_empirya_p1projectIndustrial.pdfgroup_15_empirya_p1projectIndustrial.pdf
group_15_empirya_p1projectIndustrial.pdfneelspinoy
 
原版1:1定制堪培拉大学毕业证(UC毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制堪培拉大学毕业证(UC毕业证)#文凭成绩单#真实留信学历认证永久存档原版1:1定制堪培拉大学毕业证(UC毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制堪培拉大学毕业证(UC毕业证)#文凭成绩单#真实留信学历认证永久存档208367051
 
8377877756 Full Enjoy @24/7 Call Girls in Nirman Vihar Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Nirman Vihar Delhi NCR8377877756 Full Enjoy @24/7 Call Girls in Nirman Vihar Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Nirman Vihar Delhi NCRdollysharma2066
 
办理(UC毕业证书)查尔斯顿大学毕业证成绩单原版一比一
办理(UC毕业证书)查尔斯顿大学毕业证成绩单原版一比一办理(UC毕业证书)查尔斯顿大学毕业证成绩单原版一比一
办理(UC毕业证书)查尔斯顿大学毕业证成绩单原版一比一z xss
 
毕业文凭制作#回国入职#diploma#degree澳洲弗林德斯大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲弗林德斯大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree 毕业文凭制作#回国入职#diploma#degree澳洲弗林德斯大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲弗林德斯大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree ttt fff
 
办理(宾州州立毕业证书)美国宾夕法尼亚州立大学毕业证成绩单原版一比一
办理(宾州州立毕业证书)美国宾夕法尼亚州立大学毕业证成绩单原版一比一办理(宾州州立毕业证书)美国宾夕法尼亚州立大学毕业证成绩单原版一比一
办理(宾州州立毕业证书)美国宾夕法尼亚州立大学毕业证成绩单原版一比一F La
 
Call Girls Meghani Nagar 7397865700 Independent Call Girls
Call Girls Meghani Nagar 7397865700  Independent Call GirlsCall Girls Meghani Nagar 7397865700  Independent Call Girls
Call Girls Meghani Nagar 7397865700 Independent Call Girlsssuser7cb4ff
 
昆士兰大学毕业证(UQ毕业证)#文凭成绩单#真实留信学历认证永久存档
昆士兰大学毕业证(UQ毕业证)#文凭成绩单#真实留信学历认证永久存档昆士兰大学毕业证(UQ毕业证)#文凭成绩单#真实留信学历认证永久存档
昆士兰大学毕业证(UQ毕业证)#文凭成绩单#真实留信学历认证永久存档208367051
 
PORTFOLIO DE ARQUITECTURA CRISTOBAL HERAUD 2024
PORTFOLIO DE ARQUITECTURA CRISTOBAL HERAUD 2024PORTFOLIO DE ARQUITECTURA CRISTOBAL HERAUD 2024
PORTFOLIO DE ARQUITECTURA CRISTOBAL HERAUD 2024CristobalHeraud
 
Mookuthi is an artisanal nose ornament brand based in Madras.
Mookuthi is an artisanal nose ornament brand based in Madras.Mookuthi is an artisanal nose ornament brand based in Madras.
Mookuthi is an artisanal nose ornament brand based in Madras.Mookuthi
 
ARt app | UX Case Study
ARt app | UX Case StudyARt app | UX Case Study
ARt app | UX Case StudySophia Viganò
 
Call In girls Bhikaji Cama Place 🔝 ⇛8377877756 FULL Enjoy Delhi NCR
Call In girls Bhikaji Cama Place 🔝 ⇛8377877756 FULL Enjoy Delhi NCRCall In girls Bhikaji Cama Place 🔝 ⇛8377877756 FULL Enjoy Delhi NCR
Call In girls Bhikaji Cama Place 🔝 ⇛8377877756 FULL Enjoy Delhi NCRdollysharma2066
 
西北大学毕业证学位证成绩单-怎么样办伪造
西北大学毕业证学位证成绩单-怎么样办伪造西北大学毕业证学位证成绩单-怎么样办伪造
西北大学毕业证学位证成绩单-怎么样办伪造kbdhl05e
 
3D Printing And Designing Final Report.pdf
3D Printing And Designing Final Report.pdf3D Printing And Designing Final Report.pdf
3D Printing And Designing Final Report.pdfSwaraliBorhade
 
办理卡尔顿大学毕业证成绩单|购买加拿大文凭证书
办理卡尔顿大学毕业证成绩单|购买加拿大文凭证书办理卡尔顿大学毕业证成绩单|购买加拿大文凭证书
办理卡尔顿大学毕业证成绩单|购买加拿大文凭证书zdzoqco
 
MT. Marseille an Archipelago. Strategies for Integrating Residential Communit...
MT. Marseille an Archipelago. Strategies for Integrating Residential Communit...MT. Marseille an Archipelago. Strategies for Integrating Residential Communit...
MT. Marseille an Archipelago. Strategies for Integrating Residential Communit...katerynaivanenko1
 
Dubai Calls Girl Tapes O525547819 Real Tapes Escort Services Dubai
Dubai Calls Girl Tapes O525547819 Real Tapes Escort Services DubaiDubai Calls Girl Tapes O525547819 Real Tapes Escort Services Dubai
Dubai Calls Girl Tapes O525547819 Real Tapes Escort Services Dubaikojalkojal131
 
Design principles on typography in design
Design principles on typography in designDesign principles on typography in design
Design principles on typography in designnooreen17
 
Call Girls in Okhla Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Okhla Delhi 💯Call Us 🔝8264348440🔝Call Girls in Okhla Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Okhla Delhi 💯Call Us 🔝8264348440🔝soniya singh
 

Recently uploaded (20)

group_15_empirya_p1projectIndustrial.pdf
group_15_empirya_p1projectIndustrial.pdfgroup_15_empirya_p1projectIndustrial.pdf
group_15_empirya_p1projectIndustrial.pdf
 
Call Girls in Pratap Nagar, 9953056974 Escort Service
Call Girls in Pratap Nagar,  9953056974 Escort ServiceCall Girls in Pratap Nagar,  9953056974 Escort Service
Call Girls in Pratap Nagar, 9953056974 Escort Service
 
原版1:1定制堪培拉大学毕业证(UC毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制堪培拉大学毕业证(UC毕业证)#文凭成绩单#真实留信学历认证永久存档原版1:1定制堪培拉大学毕业证(UC毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制堪培拉大学毕业证(UC毕业证)#文凭成绩单#真实留信学历认证永久存档
 
8377877756 Full Enjoy @24/7 Call Girls in Nirman Vihar Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Nirman Vihar Delhi NCR8377877756 Full Enjoy @24/7 Call Girls in Nirman Vihar Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Nirman Vihar Delhi NCR
 
办理(UC毕业证书)查尔斯顿大学毕业证成绩单原版一比一
办理(UC毕业证书)查尔斯顿大学毕业证成绩单原版一比一办理(UC毕业证书)查尔斯顿大学毕业证成绩单原版一比一
办理(UC毕业证书)查尔斯顿大学毕业证成绩单原版一比一
 
毕业文凭制作#回国入职#diploma#degree澳洲弗林德斯大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲弗林德斯大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree 毕业文凭制作#回国入职#diploma#degree澳洲弗林德斯大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲弗林德斯大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
 
办理(宾州州立毕业证书)美国宾夕法尼亚州立大学毕业证成绩单原版一比一
办理(宾州州立毕业证书)美国宾夕法尼亚州立大学毕业证成绩单原版一比一办理(宾州州立毕业证书)美国宾夕法尼亚州立大学毕业证成绩单原版一比一
办理(宾州州立毕业证书)美国宾夕法尼亚州立大学毕业证成绩单原版一比一
 
Call Girls Meghani Nagar 7397865700 Independent Call Girls
Call Girls Meghani Nagar 7397865700  Independent Call GirlsCall Girls Meghani Nagar 7397865700  Independent Call Girls
Call Girls Meghani Nagar 7397865700 Independent Call Girls
 
昆士兰大学毕业证(UQ毕业证)#文凭成绩单#真实留信学历认证永久存档
昆士兰大学毕业证(UQ毕业证)#文凭成绩单#真实留信学历认证永久存档昆士兰大学毕业证(UQ毕业证)#文凭成绩单#真实留信学历认证永久存档
昆士兰大学毕业证(UQ毕业证)#文凭成绩单#真实留信学历认证永久存档
 
PORTFOLIO DE ARQUITECTURA CRISTOBAL HERAUD 2024
PORTFOLIO DE ARQUITECTURA CRISTOBAL HERAUD 2024PORTFOLIO DE ARQUITECTURA CRISTOBAL HERAUD 2024
PORTFOLIO DE ARQUITECTURA CRISTOBAL HERAUD 2024
 
Mookuthi is an artisanal nose ornament brand based in Madras.
Mookuthi is an artisanal nose ornament brand based in Madras.Mookuthi is an artisanal nose ornament brand based in Madras.
Mookuthi is an artisanal nose ornament brand based in Madras.
 
ARt app | UX Case Study
ARt app | UX Case StudyARt app | UX Case Study
ARt app | UX Case Study
 
Call In girls Bhikaji Cama Place 🔝 ⇛8377877756 FULL Enjoy Delhi NCR
Call In girls Bhikaji Cama Place 🔝 ⇛8377877756 FULL Enjoy Delhi NCRCall In girls Bhikaji Cama Place 🔝 ⇛8377877756 FULL Enjoy Delhi NCR
Call In girls Bhikaji Cama Place 🔝 ⇛8377877756 FULL Enjoy Delhi NCR
 
西北大学毕业证学位证成绩单-怎么样办伪造
西北大学毕业证学位证成绩单-怎么样办伪造西北大学毕业证学位证成绩单-怎么样办伪造
西北大学毕业证学位证成绩单-怎么样办伪造
 
3D Printing And Designing Final Report.pdf
3D Printing And Designing Final Report.pdf3D Printing And Designing Final Report.pdf
3D Printing And Designing Final Report.pdf
 
办理卡尔顿大学毕业证成绩单|购买加拿大文凭证书
办理卡尔顿大学毕业证成绩单|购买加拿大文凭证书办理卡尔顿大学毕业证成绩单|购买加拿大文凭证书
办理卡尔顿大学毕业证成绩单|购买加拿大文凭证书
 
MT. Marseille an Archipelago. Strategies for Integrating Residential Communit...
MT. Marseille an Archipelago. Strategies for Integrating Residential Communit...MT. Marseille an Archipelago. Strategies for Integrating Residential Communit...
MT. Marseille an Archipelago. Strategies for Integrating Residential Communit...
 
Dubai Calls Girl Tapes O525547819 Real Tapes Escort Services Dubai
Dubai Calls Girl Tapes O525547819 Real Tapes Escort Services DubaiDubai Calls Girl Tapes O525547819 Real Tapes Escort Services Dubai
Dubai Calls Girl Tapes O525547819 Real Tapes Escort Services Dubai
 
Design principles on typography in design
Design principles on typography in designDesign principles on typography in design
Design principles on typography in design
 
Call Girls in Okhla Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Okhla Delhi 💯Call Us 🔝8264348440🔝Call Girls in Okhla Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Okhla Delhi 💯Call Us 🔝8264348440🔝
 

Privacy By Designer (PHP.ghent)

  • 1. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Privacy by Designer PRACTICAL CONSIDERATIONS ON UX DESIGN FOR TRUST
  • 2. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken “In God we trust all others bring data.” - William Edwards Deming
  • 3. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken We all live in the Age of Context SHAPED BY MOBILE, SOCIAL MEDIA, DATA, SENSORS AND LOCATION-BASED SERVICES
  • 4. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Users expect Personalistation & Personal EXPERIENCES FOR THE ‘MOST PERSONAL DEVICE EVER’ ARE.. RELEVANT are you engaging at the right moment? GLANCEABLE can you deliver value in milliseconds? PERSONAL do you approach people in the right manner?
  • 5. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken No other Apple device has ever been so connected to the wearer. It is important to be mindful of this connection. Apple Watch Human Interface Design Guidelines, 2015
  • 6. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Machine-to-human relationships are now about human-to-human values UNDERSTANDING PERSONALISATION H2H M2H TRUST PRIVACY
  • 7. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken The Privacy Challenge CONCERN ABOUT PRIVACY JUMPED 5 POINTS BETWEEN 2014 AND 2015. 2nd Annual Poll on How Personal Technology is Changing our Lives - January 2015, Microsoft
  • 8. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Loss of control PRIVACY CHALLENGE USER  POINT  OF  VIEW 91% of adults ‘agree’ or ‘strongly agree’ that consumers have lost control over how personal information is collected and used by companies. Pew Research Privacy Panel Survey, January 2014
  • 9. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Lack of Transparency PRIVACY CHALLENGE USER  POINT  OF  VIEW People are fearful of sharing their data largely because companies and government have not been good at clearly explaining how they use it. Data Dialog, Demos 2012
  • 10. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Lack of Knowledge(aka Privacy and PETs are ‘too difficult’) PRIVACY CHALLENGE USER  POINT  OF  VIEW 54% believe it would be “somewhat” or “very” difficult to find tools and strategies that would help them be more private online and in using their cell phones  13% unaware about search engines that do not keep track of a user’s search history 31% unaware email encryption programs such as PGP exist 31% unaware of privacy-enhancing browser plug-ins 39% unaware about anonymity software such as Tor Pew Research, 2015
  • 11. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Everyday privacy measures that do catch on ON THE BRIGHT SIDE LESS TECHNICAL WAYS OF OBTING OUT OF DATA COLLECTION Clearing cookies or browser history: 59% Refusing to provide information about themselves that wasn’t relevant to the transaction: 57% Set their browser to disable or turn off cookies: 34% Deleted or edited something they posted in the past: 29% Used a temporary username or email address: 25% Giving inaccurate or misleading information about themselves: 24% Decided not to use a website because they asked for their real name: 23% Used a public computer to browse anonymously: 12% Asked someone to remove something that was posted about themselves online: 11%
  • 12. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken the Facebook paradox • 91% of adults feel consumers have lost control over how personal information is collected and used by companies. • 58% of the entire adult population (and 71% of internet users) is on Facebook.
  • 13. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Privacy VS. User Experience #FALSE – HOW DO YOU DEFINE A BETTER PRODUCT? CONTEXT? DATA QUALITY? The truth is that collecting information about people allows you to make significantly better products and the more information you collect, the better products you can build . Dustin Curtis, “Privacy VS. User Experience” (2014)
  • 14. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Privacy is a fundamental component of the product experience BUSINESSES CAN DELIVER A GRAND USER EXPERIENCE AND TREMENDOUS VALUE ONLY IF THEY SAFEGUARD THEIR USERS’ PRIVACY AND SECURITY BUSINESS VALUE CONSUMER VALUE PRIVACY GREAT UX personalisation
  • 15. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Being credible BEING CREDIBLE HAS ALWAYS BEEN IMPORTANT FOR A GOOD USER EXPERIENCE useful usable desirable credible valuable findable accessible User Experience Honeycomb (Peter Morville) CREDIBILITY 2004 the information you present to users CREDIBILITY 2015 taking responsibility to keep personal data safe
  • 16. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Privacy by designer DELIVER BOTH PERSONALISATION AND TRUST We owe it to both our users and the people who hire us to actively think about privacy, and to implement privacy in the flows and designs we deliver. B. We need to deliver trustworthy products. A. We need to deliver great, personal experiences.
  • 17. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken What is Privacy? PRIVACY IS BROAD PRIVACY IS A RIGHT PRIVACY IS NOT DEAD Personal Data • The Universal Declaration of Human Rights (Art 12) • Europe: Directive 95/46/EC • Belgium: Privacy Act (1992, 1998 & KBs) • Telecommunication law • … LAWS AND SUCH European Privacy Watchdogs & Facebook GDPR New EU legislation in the works “If data is the new oil, privacy is the new green.” …
  • 18. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Any information This is not limited to data regarding a an individual’s privacy, also relating to a person's professional or public life. Eg. name, a picture, a telephone number (professional number too), a code, a bank account number, an e-mail address, a fingerprint, … . PERSONAL DATA IS ANY INFORMATION (RELATING TO)* AN IDENTIFIED OR IDENTIFIABLE NATURAL PERSON * OFTEN DEPENDS ON CONTEXT •  Object data vs personal data (eg license plate) •  Unique biometric data is always personal data (eg fingerpint, DNA) DATA SUBJECT PERSONAL DATA RELATES TO
  • 19. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Identifiable evolves IDENTIFIABILITY = WHEN VALUE > COST value of knowing cost of identifying
  • 20. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken IP address AN IP ADDRESS ON ITSELF WILL UNDER THE GDPR NO LONGER BE ‘PERSONAL DATA’ BY DEFAULT (UNLESS YOU ARE AN ISP)
  • 21. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Counter measures Not personal information when measures are taken which reasonably rule out identification of a person •  Anonymisation •  Key-coded data (clinical research) •  Data masking/obfuscation (for development) •  Granularity
  • 22. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Beware: location Special data which under the GDPR will require extra safety measures (as is data on children) avoid when possible geohashes coarse location
  • 23. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Stay clear: sensitive data •  race •  political opinions •  religious or philosophical beliefs •  trade-union membership •  health •  sex life •  prosecutions or criminal or administrative convictions Prohibited to collect, register or ask to disclose. (exceptions apply, but then additional safeguards are required)
  • 24. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken What about republication? Photographs and personal information published online may only be re-used if given consent. •  different context •  different purpose => context & purpose apply to recycling as well (In case of scraping, copyright and database law are relevant too.)
  • 25. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Your responsibilities as Controller •  Ensure the quality of the data The data being processed have to be exact and, if necessary, kept up-to- date •  Ensure the confidentiality of the data Responsibility to inform and make sure that the individuals working under his authority only have access to and make use of the data they need to perform their duties •  Ensure the protection of the data From unwanted internal or external curiosity, as well as from unauthorised processing operations. Security measures can be organizational (restriction of the number of individuals having access to the data, use of access codes, locking offices with computers and data files, etc.) and technical. (!) The more sensitive the data and the higher the risks for the data subject are, the more precautions have to be taken. (see ‘information security’ on privacycommission.be) •  Erasure of data Personal data must not be kept in a form allowing for identification of the data subjects any longer than necessary for the purpose aimed at. + BEFORE PROCESSING OF DATA: NOTIFICATION
  • 26. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken In case of breach CONSIDER A BREACH LIKELY – AND PREPARE ACCORDINGLY •  Do not play the victim •  Be accountable •  Take ownership •  Express regaret 1. What happened? (tell what you know at that time) crisis communications (works for downtime communication too) 2. What is being done *NOW*? (investigate, take systems offline, ..) 3. How does this affect your customers? (both short- and long term) 4. What are you doing to minimize risk? What can your customers do? 5. How do people get more information or updates? (folluw up) 6. What are you doing prevent this from happening again?
  • 27. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Design for explicit OPT-IN & COOKIELAW By signing this contract, you agree we have the right to collect and pass on all your information. In case you do not want your bank to pass on your credit information to third partners and other divisions, please write ‘I do not agree’ on the contract and hand it over to the person behind the till. EXPLICIT EXPLICIT NOT EXPLICIT (hidden opt-out) NO YES IF YOU AGREE, PLEASE CHECK THIS BOX:
  • 28. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Design for informed NO SURPRISES
  • 29. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Design for choice CONSENT In your designs and flows, take into account both having and not having the data. Design personalized experiences for when you have data. Design good alternatives for not having the data. Today will be sunny Weather for Olen, Belgium where we know you live. Check out the weather! Antwerpen
  • 30. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Privacy as a Trading Function? Customer Data: Designing for Transparancy and Trust – by Timothy Morey, Theodore Forbath, And Allison Schoop, May 2015 (Harvard Business Review)
  • 31. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Design for trust CLEAR & CONSISTENT, SO PEOPLE CAN TRUST YOU TO POINT OUT PRIVACY RELATED FEATURES & SETTINGS.
  • 32. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken The EU prosed icons: privacy-by- design taken too literal (how’s that for creepiness factor?)
  • 33. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Design for because EXPLAIN YOUR MAGIC When users know of the existence of a certain algorithm, their satisfaction with the product increases over time , probably as they start to understand its workings better. Yet when they discovered an algorithm they were previously unaware of, users felt betrayed.
  • 34. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Design for because EXPLAIN YOUR MAGIC When users know of the existence of a certain algorithm, their satisfaction with the product increases over time , probably as they start to understand its workings better. Yet when they discovered an algorithm they were previously unaware of, users felt betrayed. WORST CASE SCENARIO “In the extreme case, it may be that whenever a software developer in Menlo Park adjusts a parameter, someone somewhere wrongly starts to believe themselves to be unloved. ” – Eslami et all.
  • 35. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Because allows people to correct you when you are wrong. Something we best figure out before algorithms get to act on our behalf.
  • 36. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Design for transparency Show people their data selfs If we are going to allow algorithms and expert rules to steer our behaviour, we must know they understand that correctly. Allow for: -  Correction -  Reset
  • 37. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Reflect all data collected in functionality
  • 38. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Design for forming secure habits BURNER ACCOUNTS Kinja introduced these for anonymous commenting. They made private keys understandable through metaphor. “…if you lose the burner key initially issued we will not be able to retrieve this information for you or reset the account. Save your key.”
  • 39. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken REWARD SECURE BEHAVIOUR Users that enable two-step security on their accounts will now receive a 10% discount off their monthly bill Mailchimp bill.
  • 40. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Design to encourage privacy ACCESS DURATION People forget to ‘revoke’ things. Supply limited time access options: WeChat: location discoverable for 10 minutes (default) LinkedIn: access duration settings (weeks -> months -> years)
  • 41. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Design for an exit MAKE IT EASY TO LEAVE BUT CONVINCE THEM TO STAY Think about WHY people are leaving, and offer alternatives. “snooze” services less-email-option reset profile/account .. (and remember data portability!)
  • 42. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Do you want to know if your friends are (action/mood/..) ? Do you want your friends to know if you are (action/ mood/..) ? Don’t allowOK Design with peer-to-peer privacy in mind. Ask the right question: not do you want to see, but are you willing for others to see..
  • 43. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken When in doubt… STEP 1: ASK YOUR USER – PRIVACY DOES NOT BENEFIT FROM A “DO FIRST ASK FORGIVENESS LATER” STRATEGY Build it so a user always has the option to tell you to go bugger off.
  • 44. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken When in doubt… STEP 2: USE COMMON SENSE AND AS LITTLE DATA AS POSSIBLE PERSONAL DATA Less is more: in quantity and detail, but also in time
  • 45. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken i!When in doubt… STEP 3: ASK THE EXPERTS Belgian Privacy Commission www.privacycommission.be Article 29 Working Party Opinions & recommendations
  • 46. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken We influence what is acceptable. So let’s make good, proportional stuff.