Security v. Privacy: the great debate

David Strom
David Stromfreelance IT writer and speaker, editorial and business consultant at David Strom Inc.
The great debate:
Security vs. Privacy
David Strom
@dstrom
ISACA keynote
October, 2016
Here is the choice:
Security v. Privacy: the great debate
Agenda
• Notable privacy failures
• Suggested solutions
• Scary things from today’s current events
• Some key takeaways
Notable failures
Security v. Privacy: the great debate
This isn’t news
Security v. Privacy: the great debate
Security v. Privacy: the great debate
10
How to get arrested
for your tweets and
pay thousands in
fines
http://strominator.com
http://strominator.com 11
3/11, he Tweeted
10 jokes making
fun of the Japanese
after the tsunami –
AFLAC fired him as
their rep
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Speaking of vans…
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Suggested solutions
• Privacy by design
• Can you protect your most sensitive data?
• Anonymous vs. private information
• Understanding privacy policies of Google et al.
Security v. Privacy: the great debate
PbyD: 7 point plan
• Be proactive
• Do it by default
• It is a win-win
• Include from the start
• End-to-end security very important
• Let the sun shine in
• Keep it user-centric
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Privacy vs. anonymity
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Just some of the conditions
We retain the personal information you provide while your account is
in existence or as needed to provide you services. We may retain
your personal information even after you have closed your account
if retention is reasonably necessary to comply with our legal
obligations, meet regulatory requirements, resolve disputes
between Members, prevent fraud and abuse, or enforce this
Privacy Policy and our User Agreement. We may retain personal
information, for a limited period of time, if requested by law
enforcement. We may also disclose your personal information to a
third party as part of a sale of the assets of LinkedIn Corporation, a
subsidiary, or division, or as the result of a change in control of the
company or one of its affiliates, or in preparation for any of these
events. Any third party to which we transfers or sells our assets will
have the right to continue to use the personal and other
information that you provide to us in the manner set out in this
Privacy Policy.
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Scary things about
security and
privacy from
the present day
Security v. Privacy: the great debate
Mother Horrified to Learn Hackers Put
Live Feed of Daughters' Bedroom Online
Security v. Privacy: the great debate
Progressive Insurance’s
Snapshot Device
What we use to calculate your Snapshot result:
• Hard braking
• Amount of time driven
• Time and day
• Fast or jackrabbit starts
• Trip regularity
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Vs.
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
http://strominator.com 71
Good luck and stay safe!
David Strom
(314) 277-7832
david@strom.com
Twiiter: @dstrom
http://strominator.com
Slides available:
http://slideshare.net/davidstrom
1 of 71

Recommended

Data Security - English by
Data Security - EnglishData Security - English
Data Security - EnglishData Security
8.2K views14 slides
Social Engineering by
Social EngineeringSocial Engineering
Social EngineeringCyber Agency
28.3K views39 slides
Social Engineering by
Social EngineeringSocial Engineering
Social EngineeringSpencerBurton8
1.7K views10 slides
Internet Privacy by
Internet PrivacyInternet Privacy
Internet PrivacyKristin Briney
589 views27 slides
Cyber crimes (By Mohammad Ahmed) by
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Mohammad Ahmed
1.6K views52 slides
It legislation by
It legislationIt legislation
It legislationdoogstone
5.8K views8 slides

More Related Content

What's hot

Online Social Networks: 5 threats and 5 ways to use them safely by
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyTom Eston
8.3K views17 slides
Social Engineering Basics by
Social Engineering BasicsSocial Engineering Basics
Social Engineering BasicsLuke Rusten
928 views20 slides
Social media and Security risks by
Social media and Security risksSocial media and Security risks
Social media and Security risksParakum Pathirana
3K views28 slides
Open Source Intelligence (OSINT) by
Open Source Intelligence (OSINT)Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)festival ICT 2016
9.8K views56 slides
Data breach presentation by
Data breach presentationData breach presentation
Data breach presentationBradford Bach
9.3K views27 slides
Information Security Awareness: at Work, at Home, and For Your Kids by
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Nicholas Davis
1K views47 slides

What's hot(20)

Online Social Networks: 5 threats and 5 ways to use them safely by Tom Eston
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safely
Tom Eston8.3K views
Social Engineering Basics by Luke Rusten
Social Engineering BasicsSocial Engineering Basics
Social Engineering Basics
Luke Rusten928 views
Data breach presentation by Bradford Bach
Data breach presentationData breach presentation
Data breach presentation
Bradford Bach9.3K views
Information Security Awareness: at Work, at Home, and For Your Kids by Nicholas Davis
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
Nicholas Davis1K views
Cybersecurity Awareness Training Presentation v1.0 by DallasHaselhorst
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
DallasHaselhorst18.8K views
Privacy and Data Security by WilmerHale
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
WilmerHale2.7K views
Cyber Threat Hunting Training (CCTHP) by ENOInstitute
Cyber Threat Hunting Training (CCTHP)Cyber Threat Hunting Training (CCTHP)
Cyber Threat Hunting Training (CCTHP)
ENOInstitute273 views
cybersecurity strategy planning in the banking sector by Olivier Busolini
cybersecurity strategy planning in the banking sectorcybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sector
Olivier Busolini893 views
Online privacy & security by Priyab Satoshi
Online privacy & securityOnline privacy & security
Online privacy & security
Priyab Satoshi5.9K views
Social engineering hacking attack by Pankaj Dubey
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attack
Pankaj Dubey1.3K views
Indentify Theft Slide Show by robinlgray
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
robinlgray6K views
Securityawareness by JayfErika
SecurityawarenessSecurityawareness
Securityawareness
JayfErika153 views
Employee Security Awareness Training by Denis kisina
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
Denis kisina40.7K views

Similar to Security v. Privacy: the great debate

2014 ota databreach3 by
2014 ota databreach32014 ota databreach3
2014 ota databreach3Meg Weber
222 views28 slides
A Cybersecurity Planning Guide for CFOs by
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsgppcpa
896 views31 slides
Lock it or Lose It: Why Every Company Should be Concerned About Data Security by
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecuritySmartCompliance
14 views19 slides
Law Firm Security: How to Protect Your Client Data and Stay Compliant by
Law Firm Security: How to Protect Your Client Data and Stay CompliantLaw Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay CompliantClio - Cloud-Based Legal Technology
188 views61 slides
Community IT Webinar - IT Security for Nonprofits by
Community IT Webinar - IT Security for NonprofitsCommunity IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for NonprofitsCommunity IT Innovators
815 views25 slides
Symantec Data Loss Prevention- From Adoption to Maturity by
Symantec Data Loss Prevention- From Adoption to MaturitySymantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to MaturitySymantec
576 views4 slides

Similar to Security v. Privacy: the great debate(20)

2014 ota databreach3 by Meg Weber
2014 ota databreach32014 ota databreach3
2014 ota databreach3
Meg Weber222 views
A Cybersecurity Planning Guide for CFOs by gppcpa
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
gppcpa896 views
Lock it or Lose It: Why Every Company Should be Concerned About Data Security by SmartCompliance
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
SmartCompliance14 views
Symantec Data Loss Prevention- From Adoption to Maturity by Symantec
Symantec Data Loss Prevention- From Adoption to MaturitySymantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to Maturity
Symantec576 views
2017-01-23-Regulatory Compliance Watch - 6 Cybersecurity for Financial Servic... by Raj Goel
2017-01-23-Regulatory Compliance Watch - 6 Cybersecurity for Financial Servic...2017-01-23-Regulatory Compliance Watch - 6 Cybersecurity for Financial Servic...
2017-01-23-Regulatory Compliance Watch - 6 Cybersecurity for Financial Servic...
Raj Goel230 views
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez by EC-Council
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezThe Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
EC-Council1.7K views
2015: The year-ahead-in-cyber-security by Stephen Cobb
2015: The year-ahead-in-cyber-security2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security
Stephen Cobb4.1K views
Webinar: 12 Tips to Stay Safer Online - 2018-10-16 by TechSoup
Webinar: 12 Tips to Stay Safer Online - 2018-10-16Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16
TechSoup 525 views
Cloud Storage: How to Fight Off Data Security Threats & Stay Compliant by Blancco
Cloud Storage: How to Fight Off Data Security Threats & Stay CompliantCloud Storage: How to Fight Off Data Security Threats & Stay Compliant
Cloud Storage: How to Fight Off Data Security Threats & Stay Compliant
Blancco 238 views
Data Protection – How Not to Panic and Make it a Positive by TargetX
Data Protection – How Not to Panic and Make it a PositiveData Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a Positive
TargetX824 views
Managing a Hack: Orchestrating Incident Response to Preserve Brand Reputation by Sandra Fathi
Managing a Hack: Orchestrating Incident Response to Preserve Brand ReputationManaging a Hack: Orchestrating Incident Response to Preserve Brand Reputation
Managing a Hack: Orchestrating Incident Response to Preserve Brand Reputation
Sandra Fathi160 views
Cybercrime and the Developer Java2Days 2016 Sofia by Steve Poole
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 Sofia
Steve Poole401 views
SocialSafe for SMEs/SMBs - V1 by Julian Ranger
SocialSafe for SMEs/SMBs - V1SocialSafe for SMEs/SMBs - V1
SocialSafe for SMEs/SMBs - V1
Julian Ranger528 views

More from David Strom

Spark Twitter fails Mar2023 by
Spark Twitter fails Mar2023Spark Twitter fails Mar2023
Spark Twitter fails Mar2023David Strom
7 views38 slides
Getting Your First Cybersecurity Job by
Getting Your First Cybersecurity JobGetting Your First Cybersecurity Job
Getting Your First Cybersecurity JobDavid Strom
279 views12 slides
Understanding passwordless technologies by
Understanding passwordless technologiesUnderstanding passwordless technologies
Understanding passwordless technologiesDavid Strom
562 views34 slides
What endpoint protection solutions are available on the market today? by
What endpoint protection solutions are available on the market today?What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?David Strom
125 views38 slides
Fears and fulfillment with IT security by
Fears and fulfillment with IT securityFears and fulfillment with IT security
Fears and fulfillment with IT securityDavid Strom
232 views33 slides
Protecting your digital and online privacy by
Protecting your digital and online privacyProtecting your digital and online privacy
Protecting your digital and online privacyDavid Strom
288 views41 slides

More from David Strom(20)

Spark Twitter fails Mar2023 by David Strom
Spark Twitter fails Mar2023Spark Twitter fails Mar2023
Spark Twitter fails Mar2023
David Strom7 views
Getting Your First Cybersecurity Job by David Strom
Getting Your First Cybersecurity JobGetting Your First Cybersecurity Job
Getting Your First Cybersecurity Job
David Strom279 views
Understanding passwordless technologies by David Strom
Understanding passwordless technologiesUnderstanding passwordless technologies
Understanding passwordless technologies
David Strom562 views
What endpoint protection solutions are available on the market today? by David Strom
What endpoint protection solutions are available on the market today?What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?
David Strom125 views
Fears and fulfillment with IT security by David Strom
Fears and fulfillment with IT securityFears and fulfillment with IT security
Fears and fulfillment with IT security
David Strom232 views
Protecting your digital and online privacy by David Strom
Protecting your digital and online privacyProtecting your digital and online privacy
Protecting your digital and online privacy
David Strom288 views
AI and cyber security: new directions, old fears by David Strom
AI and cyber security: new directions, old fearsAI and cyber security: new directions, old fears
AI and cyber security: new directions, old fears
David Strom813 views
The legalities of hacking back by David Strom
The legalities of  hacking backThe legalities of  hacking back
The legalities of hacking back
David Strom238 views
How to market your book in today's social media world by David Strom
How to market your book in today's social media worldHow to market your book in today's social media world
How to market your book in today's social media world
David Strom228 views
​Understanding the Internet of Things by David Strom
​Understanding the Internet of Things​Understanding the Internet of Things
​Understanding the Internet of Things
David Strom292 views
How to make your mobile phone safe from hackers by David Strom
How to make your mobile phone safe from hackersHow to make your mobile phone safe from hackers
How to make your mobile phone safe from hackers
David Strom851 views
Implications and response to large security breaches by David Strom
Implications and response to large security breaches Implications and response to large security breaches
Implications and response to large security breaches
David Strom650 views
Using social networks to find your next job (2017) by David Strom
Using social networks to find your next job (2017)Using social networks to find your next job (2017)
Using social networks to find your next job (2017)
David Strom207 views
Using OpenStack to Control VM Chaos by David Strom
Using OpenStack to Control VM ChaosUsing OpenStack to Control VM Chaos
Using OpenStack to Control VM Chaos
David Strom521 views
Notable Twitter fails by David Strom
Notable Twitter failsNotable Twitter fails
Notable Twitter fails
David Strom625 views
How to make the move towards hybrid cloud computing by David Strom
How to make the move towards hybrid cloud computingHow to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computing
David Strom956 views
Listen to Your Customers: How IT Can Provide Better Support by David Strom
Listen to Your Customers: How IT Can Provide Better SupportListen to Your Customers: How IT Can Provide Better Support
Listen to Your Customers: How IT Can Provide Better Support
David Strom653 views
Network security practice: then and now by David Strom
Network security practice: then and nowNetwork security practice: then and now
Network security practice: then and now
David Strom292 views
Biggest startup mistakes by David Strom
Biggest startup mistakesBiggest startup mistakes
Biggest startup mistakes
David Strom244 views
Picking the right Single Sign On Tool to protect your network by David Strom
Picking the right Single Sign On Tool to protect your networkPicking the right Single Sign On Tool to protect your network
Picking the right Single Sign On Tool to protect your network
David Strom955 views

Recently uploaded

Uni Systems for Power Platform.pptx by
Uni Systems for Power Platform.pptxUni Systems for Power Platform.pptx
Uni Systems for Power Platform.pptxUni Systems S.M.S.A.
56 views21 slides
HTTP headers that make your website go faster - devs.gent November 2023 by
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023Thijs Feryn
22 views151 slides
Future of Indian ConsumerTech by
Future of Indian ConsumerTechFuture of Indian ConsumerTech
Future of Indian ConsumerTechKapil Khandelwal (KK)
21 views68 slides
Vertical User Stories by
Vertical User StoriesVertical User Stories
Vertical User StoriesMoisés Armani Ramírez
14 views16 slides
Unit 1_Lecture 2_Physical Design of IoT.pdf by
Unit 1_Lecture 2_Physical Design of IoT.pdfUnit 1_Lecture 2_Physical Design of IoT.pdf
Unit 1_Lecture 2_Physical Design of IoT.pdfStephenTec
12 views36 slides
Empathic Computing: Delivering the Potential of the Metaverse by
Empathic Computing: Delivering  the Potential of the MetaverseEmpathic Computing: Delivering  the Potential of the Metaverse
Empathic Computing: Delivering the Potential of the MetaverseMark Billinghurst
478 views80 slides

Recently uploaded(20)

HTTP headers that make your website go faster - devs.gent November 2023 by Thijs Feryn
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023
Thijs Feryn22 views
Unit 1_Lecture 2_Physical Design of IoT.pdf by StephenTec
Unit 1_Lecture 2_Physical Design of IoT.pdfUnit 1_Lecture 2_Physical Design of IoT.pdf
Unit 1_Lecture 2_Physical Design of IoT.pdf
StephenTec12 views
Empathic Computing: Delivering the Potential of the Metaverse by Mark Billinghurst
Empathic Computing: Delivering  the Potential of the MetaverseEmpathic Computing: Delivering  the Potential of the Metaverse
Empathic Computing: Delivering the Potential of the Metaverse
Mark Billinghurst478 views
Voice Logger - Telephony Integration Solution at Aegis by Nirmal Sharma
Voice Logger - Telephony Integration Solution at AegisVoice Logger - Telephony Integration Solution at Aegis
Voice Logger - Telephony Integration Solution at Aegis
Nirmal Sharma39 views
The details of description: Techniques, tips, and tangents on alternative tex... by BookNet Canada
The details of description: Techniques, tips, and tangents on alternative tex...The details of description: Techniques, tips, and tangents on alternative tex...
The details of description: Techniques, tips, and tangents on alternative tex...
BookNet Canada127 views
Business Analyst Series 2023 - Week 3 Session 5 by DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10248 views
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 by IttrainingIttraining
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
Serverless computing with Google Cloud (2023-24) by wesley chun
Serverless computing with Google Cloud (2023-24)Serverless computing with Google Cloud (2023-24)
Serverless computing with Google Cloud (2023-24)
wesley chun11 views
AMAZON PRODUCT RESEARCH.pdf by JerikkLaureta
AMAZON PRODUCT RESEARCH.pdfAMAZON PRODUCT RESEARCH.pdf
AMAZON PRODUCT RESEARCH.pdf
JerikkLaureta26 views
Case Study Copenhagen Energy and Business Central.pdf by Aitana
Case Study Copenhagen Energy and Business Central.pdfCase Study Copenhagen Energy and Business Central.pdf
Case Study Copenhagen Energy and Business Central.pdf
Aitana16 views
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors by sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab19 views
Piloting & Scaling Successfully With Microsoft Viva by Richard Harbridge
Piloting & Scaling Successfully With Microsoft VivaPiloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft Viva

Security v. Privacy: the great debate

  • 1. The great debate: Security vs. Privacy David Strom @dstrom ISACA keynote October, 2016
  • 2. Here is the choice:
  • 4. Agenda • Notable privacy failures • Suggested solutions • Scary things from today’s current events • Some key takeaways
  • 10. 10 How to get arrested for your tweets and pay thousands in fines http://strominator.com
  • 11. http://strominator.com 11 3/11, he Tweeted 10 jokes making fun of the Japanese after the tsunami – AFLAC fired him as their rep
  • 24. Suggested solutions • Privacy by design • Can you protect your most sensitive data? • Anonymous vs. private information • Understanding privacy policies of Google et al.
  • 26. PbyD: 7 point plan • Be proactive • Do it by default • It is a win-win • Include from the start • End-to-end security very important • Let the sun shine in • Keep it user-centric
  • 41. Just some of the conditions We retain the personal information you provide while your account is in existence or as needed to provide you services. We may retain your personal information even after you have closed your account if retention is reasonably necessary to comply with our legal obligations, meet regulatory requirements, resolve disputes between Members, prevent fraud and abuse, or enforce this Privacy Policy and our User Agreement. We may retain personal information, for a limited period of time, if requested by law enforcement. We may also disclose your personal information to a third party as part of a sale of the assets of LinkedIn Corporation, a subsidiary, or division, or as the result of a change in control of the company or one of its affiliates, or in preparation for any of these events. Any third party to which we transfers or sells our assets will have the right to continue to use the personal and other information that you provide to us in the manner set out in this Privacy Policy.
  • 58. Scary things about security and privacy from the present day
  • 60. Mother Horrified to Learn Hackers Put Live Feed of Daughters' Bedroom Online
  • 62. Progressive Insurance’s Snapshot Device What we use to calculate your Snapshot result: • Hard braking • Amount of time driven • Time and day • Fast or jackrabbit starts • Trip regularity
  • 65. Vs.
  • 71. http://strominator.com 71 Good luck and stay safe! David Strom (314) 277-7832 david@strom.com Twiiter: @dstrom http://strominator.com Slides available: http://slideshare.net/davidstrom