SlideShare a Scribd company logo
1 of 17
Candice Martinez
Deliberate Reasoning
Amazon Kindle Fire
• Silk Browser raises controversy
• Split browser partially operates from cloud
server
• Kindle Fire only allows the Silk Browser
http://www.youtube.com/watch?v=VV
sfLnMqOC4
• Joe Bar t on
• Republ i can, Texas
•Ed Mar key
•Democr at ,
Massachusset t
s
What does Amazon plan
on doing with this
information?
How does Amazon plan on
proceeding with a privacy
policy?
Will Amazon collect users’
browsing habits?
has a few questions for Amazon
• Geographic location
• Local time
• Browser used
• Screen resolution
• Time spent on page
• Content on page
• Previous page that was visited
• Internet speed
•Operating system
•Search engine used
•Key words
•Made purchases
•Number of made purchases
•Value of made purchases
•Number of visits
Compiled Data
‫ﺳ‬Discussion forums
‫ﺳ‬Blogs
‫ﺳ‬Message boards
‫ﺳ‬Social networking
sites
d u e t o a n E v o l v i n g I n d u s t r y
Products and Services
Products and Services
Consumer Habits and Behaviors
Consumer Habits and Behaviors
"The r i ght of t he peopl e t o be
secur e i n t hei r par ent s,
houses, paper s, and ef f ect s,
agai nst unr easonabl e
sear ches and sei zur es,
shal l not be vi ol at ed and
no war r ant s shal l i ssue, but
upon pr obabl e cause,
suppor t ed by oat h or
af f i r mat i on, and
par t i cul ar l y descr i bi ng
t he pl ace t o be sear ched,
and t he per sons of t hi ngs
t o be sei zed."
1. There has to be a
reasonable and logical
expectation of privacy.
2. General society
renders this
expectation as
acceptable custom.
Landmark Cases Two-Step Test
Reasonably released information; waives Fourth Amendment
protection once provided to an entity “upon supported by
affirmation.”
Federal Trade Commission Act of
1914
A) Prevent unfair methods of competition, and unfair or
deceptive acts or practices in or affecting commerce
B) Seek monetary redress and other relief for conduct
injurious to consumers
C) Prescribe trade regulation rules defining with
specificity acts or practices that are unfair or
deceptive, and establishing requirements designed to
prevent such acts or practices
D) Conduct investigations relating to the organization,
business, practices, and management of entities
engaged in commerce
E) Make reports and legislative recommendations to
Congress.
G
O
O
G
L
E
B
U
Z
Z
Sweet! Check out my buzz
Nah, go to my inbox
Made users’ contacts public without their knowledge
Followers were already setup
It did not fully removed user from the social network
“When you sign up for a particular service that
requires registration, we ask you to provide
personal information. If we use this information
for in a manner different than the purpose for
which it was collected , then we ask for your
consent prior to such use.”
October 2004 until October 2010
Gmail Privacy Policy
“Gmail stores, processes, and maintains
your messages, contact lists, and other
data related to your recent account in
order to provide the service to you.”
“Google adheres to the U.S. Safe Harbor
Privacy Principles of Notice, Choice,
Onward Transfer, Security, Data Integrity,
Access and Enforcement, and is registered
with the U.S. Department of Commerce’s
Safe Harbor Program.”
1) “Comprehensive privacy
program”
2) Privacy audits throughout the
next 20 years
http://www.youtube.com/watch?v=852OTK6IQ2A
"Fi ndi ng
i nt er connect i o
ns bet ween
peopl e,
compani es, and
cl i ent
act i vi t i es."
. -
LexisNexis
website
Provides data and tools for examining
A person’s actions are
involuntary :
1) Action is caused by an
external force
2) Actions were based on
ignorance.
“This is the first shot in the new
war for replacing the internet
with a privatized merchant data
aggregation network.”

More Related Content

Similar to Compiling data from the cloud. Make it rain ones and zeros

Online privacy; myth or reality?
Online privacy; myth or reality?Online privacy; myth or reality?
Online privacy; myth or reality?Swaleh Ahmed
 
Free geek class on Data privacy
Free geek class on Data privacyFree geek class on Data privacy
Free geek class on Data privacyJoshua Johnston
 
Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Matthew Asbell
 
Challenge Academy June 2018 - Digital Marketing, Web Traffic and Ecommerce
Challenge Academy June 2018 - Digital Marketing, Web Traffic and Ecommerce Challenge Academy June 2018 - Digital Marketing, Web Traffic and Ecommerce
Challenge Academy June 2018 - Digital Marketing, Web Traffic and Ecommerce OutserveWeb
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentationChande Kasita
 
Top Questions Asked About the CCPA
Top Questions Asked About the CCPATop Questions Asked About the CCPA
Top Questions Asked About the CCPARyan Foster
 
Terms of Use and Privacy Policy Best Practices
Terms of Use and Privacy Policy Best PracticesTerms of Use and Privacy Policy Best Practices
Terms of Use and Privacy Policy Best PracticesRoger Royse
 
Ethical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceEthical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceNicholas Davis
 
Ethical, social and political issues raised by e commerce
Ethical, social and political issues raised by e commerceEthical, social and political issues raised by e commerce
Ethical, social and political issues raised by e commerceNicholas Davis
 
Websites: do you tick all the boxes?
Websites: do you tick all the boxes?Websites: do you tick all the boxes?
Websites: do you tick all the boxes?walescva
 
CAN SPAM Legislation: Is your organization ready?
CAN SPAM Legislation: Is your organization ready?CAN SPAM Legislation: Is your organization ready?
CAN SPAM Legislation: Is your organization ready?Violeta Cohen
 
Big Data, Big Investment
Big Data, Big InvestmentBig Data, Big Investment
Big Data, Big InvestmentGGV Capital
 
Ethical Digital Marketing for Lawyers
Ethical Digital Marketing for LawyersEthical Digital Marketing for Lawyers
Ethical Digital Marketing for LawyersStacey Burke
 
5) How charities can protect themselves against data reform - ‘Emerging Digit...
5) How charities can protect themselves against data reform - ‘Emerging Digit...5) How charities can protect themselves against data reform - ‘Emerging Digit...
5) How charities can protect themselves against data reform - ‘Emerging Digit...Code Computerlove
 

Similar to Compiling data from the cloud. Make it rain ones and zeros (20)

Online privacy; myth or reality?
Online privacy; myth or reality?Online privacy; myth or reality?
Online privacy; myth or reality?
 
Online privacy
Online privacyOnline privacy
Online privacy
 
Free geek class on Data privacy
Free geek class on Data privacyFree geek class on Data privacy
Free geek class on Data privacy
 
Big data
Big dataBig data
Big data
 
Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10
 
Challenge Academy June 2018 - Digital Marketing, Web Traffic and Ecommerce
Challenge Academy June 2018 - Digital Marketing, Web Traffic and Ecommerce Challenge Academy June 2018 - Digital Marketing, Web Traffic and Ecommerce
Challenge Academy June 2018 - Digital Marketing, Web Traffic and Ecommerce
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
 
Top Questions Asked About the CCPA
Top Questions Asked About the CCPATop Questions Asked About the CCPA
Top Questions Asked About the CCPA
 
Terms of Use and Privacy Policy Best Practices
Terms of Use and Privacy Policy Best PracticesTerms of Use and Privacy Policy Best Practices
Terms of Use and Privacy Policy Best Practices
 
Comply
ComplyComply
Comply
 
Ethical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceEthical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E Commerce
 
Ethical, social and political issues raised by e commerce
Ethical, social and political issues raised by e commerceEthical, social and political issues raised by e commerce
Ethical, social and political issues raised by e commerce
 
Websites: do you tick all the boxes?
Websites: do you tick all the boxes?Websites: do you tick all the boxes?
Websites: do you tick all the boxes?
 
Casl 2012 Final
Casl 2012 FinalCasl 2012 Final
Casl 2012 Final
 
CAN SPAM Legislation: Is your organization ready?
CAN SPAM Legislation: Is your organization ready?CAN SPAM Legislation: Is your organization ready?
CAN SPAM Legislation: Is your organization ready?
 
Big Data, Big Investment
Big Data, Big InvestmentBig Data, Big Investment
Big Data, Big Investment
 
Spa bath accessories
Spa bath accessoriesSpa bath accessories
Spa bath accessories
 
Balancing Privacy and Digitization
Balancing Privacy and DigitizationBalancing Privacy and Digitization
Balancing Privacy and Digitization
 
Ethical Digital Marketing for Lawyers
Ethical Digital Marketing for LawyersEthical Digital Marketing for Lawyers
Ethical Digital Marketing for Lawyers
 
5) How charities can protect themselves against data reform - ‘Emerging Digit...
5) How charities can protect themselves against data reform - ‘Emerging Digit...5) How charities can protect themselves against data reform - ‘Emerging Digit...
5) How charities can protect themselves against data reform - ‘Emerging Digit...
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 

Compiling data from the cloud. Make it rain ones and zeros

  • 3. Amazon Kindle Fire • Silk Browser raises controversy • Split browser partially operates from cloud server • Kindle Fire only allows the Silk Browser http://www.youtube.com/watch?v=VV sfLnMqOC4
  • 4. • Joe Bar t on • Republ i can, Texas •Ed Mar key •Democr at , Massachusset t s What does Amazon plan on doing with this information? How does Amazon plan on proceeding with a privacy policy? Will Amazon collect users’ browsing habits? has a few questions for Amazon
  • 5. • Geographic location • Local time • Browser used • Screen resolution • Time spent on page • Content on page • Previous page that was visited • Internet speed •Operating system •Search engine used •Key words •Made purchases •Number of made purchases •Value of made purchases •Number of visits Compiled Data
  • 7. d u e t o a n E v o l v i n g I n d u s t r y Products and Services Products and Services Consumer Habits and Behaviors Consumer Habits and Behaviors
  • 8. "The r i ght of t he peopl e t o be secur e i n t hei r par ent s, houses, paper s, and ef f ect s, agai nst unr easonabl e sear ches and sei zur es, shal l not be vi ol at ed and no war r ant s shal l i ssue, but upon pr obabl e cause, suppor t ed by oat h or af f i r mat i on, and par t i cul ar l y descr i bi ng t he pl ace t o be sear ched, and t he per sons of t hi ngs t o be sei zed."
  • 9. 1. There has to be a reasonable and logical expectation of privacy. 2. General society renders this expectation as acceptable custom. Landmark Cases Two-Step Test
  • 10. Reasonably released information; waives Fourth Amendment protection once provided to an entity “upon supported by affirmation.”
  • 11. Federal Trade Commission Act of 1914 A) Prevent unfair methods of competition, and unfair or deceptive acts or practices in or affecting commerce B) Seek monetary redress and other relief for conduct injurious to consumers C) Prescribe trade regulation rules defining with specificity acts or practices that are unfair or deceptive, and establishing requirements designed to prevent such acts or practices D) Conduct investigations relating to the organization, business, practices, and management of entities engaged in commerce E) Make reports and legislative recommendations to Congress.
  • 12. G O O G L E B U Z Z Sweet! Check out my buzz Nah, go to my inbox Made users’ contacts public without their knowledge Followers were already setup It did not fully removed user from the social network “When you sign up for a particular service that requires registration, we ask you to provide personal information. If we use this information for in a manner different than the purpose for which it was collected , then we ask for your consent prior to such use.”
  • 13. October 2004 until October 2010 Gmail Privacy Policy “Gmail stores, processes, and maintains your messages, contact lists, and other data related to your recent account in order to provide the service to you.” “Google adheres to the U.S. Safe Harbor Privacy Principles of Notice, Choice, Onward Transfer, Security, Data Integrity, Access and Enforcement, and is registered with the U.S. Department of Commerce’s Safe Harbor Program.” 1) “Comprehensive privacy program” 2) Privacy audits throughout the next 20 years
  • 15. "Fi ndi ng i nt er connect i o ns bet ween peopl e, compani es, and cl i ent act i vi t i es." . - LexisNexis website Provides data and tools for examining
  • 16. A person’s actions are involuntary : 1) Action is caused by an external force 2) Actions were based on ignorance.
  • 17. “This is the first shot in the new war for replacing the internet with a privatized merchant data aggregation network.”