SlideShare a Scribd company logo
DEVELOPING MOBILE
TRUST IN TODAY'S
E-PRIVACY LANDSCAPE
November 19th 2015
PRESENTERS:
Todd Ruback Esq., CIPP-US/E, CIPT
Chief Privacy Officer &
V.P. Legal Affairs
Jon Sheppard
Director of Product Management, Privacy
2
Introductions
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
Jon Sheppard
Director of Product
Management, Privacy
Todd Ruback
Chief Privacy Officer &
VP of Legal Affairs
Todd@Ghostery.com JSheppard@Ghostery.com
AT&T
June 2015
Update on Privacy
Legal and Regulatory
Landscape
Todd Ruback Esq., CIPP-US/E, CIPT
Chief Privacy Officer &
V.P. Legal Affairs
4
US Self-Regulatory Program for Online Behavioral Advertising (OBA)
• Mobile enforcement began September 1, 2015 – Accountability agents
are actively monitoring and expect robust enforcement
• Extends DAA’s Principles to mobile websites and apps
• Let’s Break It Down:
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
Ads
If based upon OBA data,
then deploy AdChoices
Icon, when opened goes to
DAA’s AppChoices, the
industry opt-out solution,
listing third parties in ad
with consumer choice
apps
Shared obligation with
third parties to
provide notice of OBA
activity and give
control to consumer
5
Canada & EU Self-Regulatory Programs
Canada
DAAC; enforcement spike by ASC in recent months
• Added complexity of national privacy law, PIPEDA, that also
applies to OBA
• OPC Report – encouraged that Canada websites deploy
AdChoices notice, but expect more.
• ASC fully supports PIPEDA; no daylight between the two.
EU
EDAA; Will soon announce mobile enforcement date
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
6
What do the Self-Regulatory Programs Apply to?
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
• 3 different types of data that might be
collected:
• Cross App Data (CAD) – OK,
unless user opts-out
• Precision Location Data (PLD) –
need affirmative consent
• Personal Directory Data (PDD)-
need affirmative consent
• Control:
• Settings upon download
• Ghostery’s App Notice
• DAA’s AppChoices
7
US State Specific Transparency Laws
States currently affected:
• California (CalOPPA)
• Delaware (DelOPPA)
• New York proposed legislation
Legislation Overview
Requires websites, and apps, to have
comprehensive understanding of invisible
digital activity and disclose it.
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
8
EU – Safe Harbor / Cross Border Data Transfers
• ECJ invalidated US Safe Harbor Program
• Sky is not falling, although over 4,000 US companies rely on this legal
mechanism to transfer EU personal data to the US
• Chances of Safe Harbor 2.0 – 50/50
• Not clear what it may look like but third party Seal Program is at risk, and
we can expect robust monitoring and enforcement.
• WP29 has given companies until Jan 31, 2016 to put Plan B in place
• Many recommend Standard Contractual Clauses as short term solution
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
9
EU – General Data Protection Regulation
Last mile of negotiations
• Will have new rights for individuals and obligations by companies
• Will require companies to have demonstrable knowledge of digital activity
–annual audits of sites and apps
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
10
EU ePrivacy Directive – No Longer Just the Cookie Law
• Applies to websites (and apps and connected devices)
• Often confused with Self-Regulatory Programs for OBA
• Will be reviewed in 2016 after GDPR is completed
• Requirements – Notice & Consent
• Enforcement – regulators have been signaled it applies equally to apps
and IoT but have waited for market solution
• Priority – for children’s apps; sweeps have already happened
• Solution – Ghostery’s App Notice
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
AT&T
June 2015
Getting in Compliance
& The Ghostery App
Notice Solution
Jon Sheppard, Director of
Product Management, Privacy
12
Why is there a need for a different solution for Mobile Apps?
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
• Unlike the web:
• Mobile apps are installed and run
locally on the users device.
• Changes to apps can only be made
by updating the apps code and
releasing a new version to the app
Store.
• Apps aren’t cookie based.
• Like the web:
• Mobile apps contain trackers
reporting, OBA, CAD, PLD and PDD
• The list of available app trackers is
growing quickly.
13
Steps to Get into Compliance
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
1. Identify your companies mobile apps 2. Work with your mobile developer to
identify the ad tech used by your apps,
and data it collects
3. Implement Ghostery App Notice
UPDATE
• We can help you here if you’re lost!
AT&T
June 2015App Notice Demo
15
The Ghostery App Notice Solution Overview
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
• Worked closely with privacy leaders to design and
build.
• Provided by a Software Development Kit (SDK)
• Available in 2 versions depending on your app type:
• Android 4.1 and up
• iOS 7 and up
• Both Explicit and Implied notice formats supported
• Over 50 notice customizable options available to
match your apps requirements, including notice
color and text and size etc.
16
What is an SDK?
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
• A mobile Software Development Kit
(SDK) is a packet of code that allows
developers to easily add new
functionality to their apps.
• SDK’s are often used as shortcuts so
that developers don’t have to write
everything from scratch
• SDK’s frequently include sample code
and supporting technical notes or
documentation
Lorem ipsum dolor sit
amet, consectetur
adipiscing elit. Fusce
hendrerit pellentesque
tellus ut lacinia.
Curabitur sed
consectetur lorem, eu
tincidunt urna. Ut
lacinia ultrices porttitor.
Phasellus vehicula
blandit accumsan.
Pellentesque
17
Installing your SDK
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
1. app Developers passed the SDK code via
Github
GITHUB
2. SDK is installed in app by Developer:
• Installation & Companion Guides are provided as well as
sample code.
YOUR APP
3. Customize the color and text of your Notice in
your Site Notice Account.
4. Submit your updated app to the store for your
users to download.
UPDATE
18
Ghostery is the Privacy Compliance Leader
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
• Ghostery globally is the Ad Choices Program leader
• Dominant market share: Preferred Partner of every
major Ad Agency Holding
• Integrated with all key buy and sell-side platforms
• Close relationships with the entire privacy ecosystem
• Technology vendor to DAA
SOME OF OUR INTERGRATION PARTNERS
• Over 290+ clients across
desktop, mobile and video
• Over 3 billion AdChoices
icons served daily
• Over 100 million site
consent notices served daily
• 40 languages supported
GHOSTERY BY THE NUMBERS
19
Schedule Your App Notice Demo
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
EU SALES
+44 020 7031 8232
NORTH AMERICA SALES
917-791-5550
Sales@Ghostery.com EUSales@Ghostery.com
AT&T
June 2015 THANK YOU!

More Related Content

What's hot

Interoperability in a B2B Word (NordicAPIS April 2014)
Interoperability in a B2B Word (NordicAPIS April 2014)Interoperability in a B2B Word (NordicAPIS April 2014)
Interoperability in a B2B Word (NordicAPIS April 2014)Nordic APIs
 
Splunk MINT Deep Dive
Splunk MINT Deep DiveSplunk MINT Deep Dive
Splunk MINT Deep DiveBugSense
 
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At ComplianceGDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At CompliancePing Identity
 
Squareway, a Secure Private 3G Network, Cyrille Manente, Vivaction
Squareway, a Secure Private 3G Network, Cyrille Manente, VivactionSquareway, a Secure Private 3G Network, Cyrille Manente, Vivaction
Squareway, a Secure Private 3G Network, Cyrille Manente, VivactionAlan Quayle
 
Prediction 2016 with Forrester Research: APIs take center stage for banking I...
Prediction 2016 with Forrester Research: APIs take center stage for banking I...Prediction 2016 with Forrester Research: APIs take center stage for banking I...
Prediction 2016 with Forrester Research: APIs take center stage for banking I...Apigee | Google Cloud
 
IDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTIDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTForgeRock
 
Open source IoT
Open source IoTOpen source IoT
Open source IoTIoT613
 
OMA Open Source Industry Survey Results
OMA Open Source Industry Survey ResultsOMA Open Source Industry Survey Results
OMA Open Source Industry Survey ResultsOpen Mobile Alliance
 
Google Case Study - Towards simpler, stronger authentication
Google Case Study - Towards simpler, stronger authenticationGoogle Case Study - Towards simpler, stronger authentication
Google Case Study - Towards simpler, stronger authenticationFIDO Alliance
 
Getting Your Boss Excited about Mobile Marketing
Getting Your Boss Excited about Mobile MarketingGetting Your Boss Excited about Mobile Marketing
Getting Your Boss Excited about Mobile MarketingRay Pun
 
Making the space between people and devices disappear
Making the space between people and devices disappearMaking the space between people and devices disappear
Making the space between people and devices disappearCong Wei
 
APIdays Helsinki 2019 - Open Banking: Is it just smoke and mirrors? with Jann...
APIdays Helsinki 2019 - Open Banking: Is it just smoke and mirrors? with Jann...APIdays Helsinki 2019 - Open Banking: Is it just smoke and mirrors? with Jann...
APIdays Helsinki 2019 - Open Banking: Is it just smoke and mirrors? with Jann...apidays
 
Taming the Technology of Digital Transformation
Taming the Technology of Digital TransformationTaming the Technology of Digital Transformation
Taming the Technology of Digital TransformationSplunk
 
Taking the blinders off – The power of Stetho
Taking the blinders off – The power of StethoTaking the blinders off – The power of Stetho
Taking the blinders off – The power of StethoJared Sheehan
 
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...CA API Management
 
È l'ora del Cloud Managed IT
È l'ora del Cloud Managed ITÈ l'ora del Cloud Managed IT
È l'ora del Cloud Managed ITMatteo Masi
 
Meetup hip 18 april 2017
Meetup hip 18 april 2017Meetup hip 18 april 2017
Meetup hip 18 april 2017RubiX BV
 

What's hot (20)

Interoperability in a B2B Word (NordicAPIS April 2014)
Interoperability in a B2B Word (NordicAPIS April 2014)Interoperability in a B2B Word (NordicAPIS April 2014)
Interoperability in a B2B Word (NordicAPIS April 2014)
 
Splunk MINT Deep Dive
Splunk MINT Deep DiveSplunk MINT Deep Dive
Splunk MINT Deep Dive
 
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At ComplianceGDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
 
IOTAS
IOTASIOTAS
IOTAS
 
Squareway, a Secure Private 3G Network, Cyrille Manente, Vivaction
Squareway, a Secure Private 3G Network, Cyrille Manente, VivactionSquareway, a Secure Private 3G Network, Cyrille Manente, Vivaction
Squareway, a Secure Private 3G Network, Cyrille Manente, Vivaction
 
Prediction 2016 with Forrester Research: APIs take center stage for banking I...
Prediction 2016 with Forrester Research: APIs take center stage for banking I...Prediction 2016 with Forrester Research: APIs take center stage for banking I...
Prediction 2016 with Forrester Research: APIs take center stage for banking I...
 
Financial services rely on APIs
Financial services rely on APIsFinancial services rely on APIs
Financial services rely on APIs
 
Bit leader
Bit leader Bit leader
Bit leader
 
IDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTIDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOT
 
Open source IoT
Open source IoTOpen source IoT
Open source IoT
 
OMA Open Source Industry Survey Results
OMA Open Source Industry Survey ResultsOMA Open Source Industry Survey Results
OMA Open Source Industry Survey Results
 
Google Case Study - Towards simpler, stronger authentication
Google Case Study - Towards simpler, stronger authenticationGoogle Case Study - Towards simpler, stronger authentication
Google Case Study - Towards simpler, stronger authentication
 
Getting Your Boss Excited about Mobile Marketing
Getting Your Boss Excited about Mobile MarketingGetting Your Boss Excited about Mobile Marketing
Getting Your Boss Excited about Mobile Marketing
 
Making the space between people and devices disappear
Making the space between people and devices disappearMaking the space between people and devices disappear
Making the space between people and devices disappear
 
APIdays Helsinki 2019 - Open Banking: Is it just smoke and mirrors? with Jann...
APIdays Helsinki 2019 - Open Banking: Is it just smoke and mirrors? with Jann...APIdays Helsinki 2019 - Open Banking: Is it just smoke and mirrors? with Jann...
APIdays Helsinki 2019 - Open Banking: Is it just smoke and mirrors? with Jann...
 
Taming the Technology of Digital Transformation
Taming the Technology of Digital TransformationTaming the Technology of Digital Transformation
Taming the Technology of Digital Transformation
 
Taking the blinders off – The power of Stetho
Taking the blinders off – The power of StethoTaking the blinders off – The power of Stetho
Taking the blinders off – The power of Stetho
 
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...
 
È l'ora del Cloud Managed IT
È l'ora del Cloud Managed ITÈ l'ora del Cloud Managed IT
È l'ora del Cloud Managed IT
 
Meetup hip 18 april 2017
Meetup hip 18 april 2017Meetup hip 18 april 2017
Meetup hip 18 april 2017
 

Similar to Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015

WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure
 
Creating Trust for the Internet of Things
Creating Trust for the Internet of ThingsCreating Trust for the Internet of Things
Creating Trust for the Internet of ThingsPECB
 
Connected Experiences: From Websites to Wearables to Whatever
Connected Experiences: From Websites to Wearables to WhateverConnected Experiences: From Websites to Wearables to Whatever
Connected Experiences: From Websites to Wearables to WhateverRebecca Lieb
 
B2B Social Networking Application By Rigel Networks
B2B Social Networking Application By Rigel NetworksB2B Social Networking Application By Rigel Networks
B2B Social Networking Application By Rigel NetworksRigel Networks LLC
 
Improve the Security of Your Application Portfolio in a Few Days with On-Dema...
Improve the Security of Your Application Portfolio in a Few Days with On-Dema...Improve the Security of Your Application Portfolio in a Few Days with On-Dema...
Improve the Security of Your Application Portfolio in a Few Days with On-Dema...Capgemini
 
Mobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsMobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsSkycure
 
Swipecrypto - INBLOCKS Jakarta 2018
Swipecrypto - INBLOCKS Jakarta 2018Swipecrypto - INBLOCKS Jakarta 2018
Swipecrypto - INBLOCKS Jakarta 2018Tokocrypto
 
5 Steps for End-to-End Mobile Security with Consumer Apps
5 Steps for End-to-End Mobile Security with Consumer Apps5 Steps for End-to-End Mobile Security with Consumer Apps
5 Steps for End-to-End Mobile Security with Consumer AppsCA API Management
 
5 steps end to end security consumer apps
5 steps end to end security consumer apps5 steps end to end security consumer apps
5 steps end to end security consumer appsCA API Management
 
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At OddsJervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Oddscentralohioissa
 
Building mobile applications with Meteor: Eat Local case study
Building mobile applications with Meteor: Eat Local case studyBuilding mobile applications with Meteor: Eat Local case study
Building mobile applications with Meteor: Eat Local case studyRizky Syazuli
 
Open Source Outlook: Expected Developments for 2016
Open Source Outlook: Expected Developments for 2016Open Source Outlook: Expected Developments for 2016
Open Source Outlook: Expected Developments for 2016Black Duck by Synopsys
 
What Mobile Privacy Changes Mean for Your Holiday Strategy
What Mobile Privacy Changes Mean for Your Holiday Strategy What Mobile Privacy Changes Mean for Your Holiday Strategy
What Mobile Privacy Changes Mean for Your Holiday Strategy Tinuiti
 
Boston marketing technology group 150223 george adams vizi apps
Boston marketing technology group 150223 george adams vizi appsBoston marketing technology group 150223 george adams vizi apps
Boston marketing technology group 150223 george adams vizi appsGEORGE ADAMS
 
Mobility Why? What does it means to us?
Mobility Why? What does it means to us?Mobility Why? What does it means to us?
Mobility Why? What does it means to us?Pronq by HP
 
Tips for Android Publishing in China
Tips for Android Publishing in ChinaTips for Android Publishing in China
Tips for Android Publishing in ChinaZi Yong Chua
 
Empower Your Expertise Navigating FinTech App Development in 2024
Empower Your Expertise Navigating FinTech App Development in 2024Empower Your Expertise Navigating FinTech App Development in 2024
Empower Your Expertise Navigating FinTech App Development in 2024SeasiaInfotech2
 

Similar to Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015 (20)

WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
 
Creating Trust for the Internet of Things
Creating Trust for the Internet of ThingsCreating Trust for the Internet of Things
Creating Trust for the Internet of Things
 
Connected Experiences: From Websites to Wearables to Whatever
Connected Experiences: From Websites to Wearables to WhateverConnected Experiences: From Websites to Wearables to Whatever
Connected Experiences: From Websites to Wearables to Whatever
 
B2B Social Networking Application By Rigel Networks
B2B Social Networking Application By Rigel NetworksB2B Social Networking Application By Rigel Networks
B2B Social Networking Application By Rigel Networks
 
Marketing in the Age of Mobile
Marketing in the Age of MobileMarketing in the Age of Mobile
Marketing in the Age of Mobile
 
Improve the Security of Your Application Portfolio in a Few Days with On-Dema...
Improve the Security of Your Application Portfolio in a Few Days with On-Dema...Improve the Security of Your Application Portfolio in a Few Days with On-Dema...
Improve the Security of Your Application Portfolio in a Few Days with On-Dema...
 
Mobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsMobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 Predictions
 
EVOLVE'15 | Enhance | John Fait | AEM App Enhanced In-App Messaging & Beacons
EVOLVE'15 | Enhance | John Fait | AEM App Enhanced In-App Messaging & BeaconsEVOLVE'15 | Enhance | John Fait | AEM App Enhanced In-App Messaging & Beacons
EVOLVE'15 | Enhance | John Fait | AEM App Enhanced In-App Messaging & Beacons
 
Swipecrypto - INBLOCKS Jakarta 2018
Swipecrypto - INBLOCKS Jakarta 2018Swipecrypto - INBLOCKS Jakarta 2018
Swipecrypto - INBLOCKS Jakarta 2018
 
5 Steps for End-to-End Mobile Security with Consumer Apps
5 Steps for End-to-End Mobile Security with Consumer Apps5 Steps for End-to-End Mobile Security with Consumer Apps
5 Steps for End-to-End Mobile Security with Consumer Apps
 
5 steps end to end security consumer apps
5 steps end to end security consumer apps5 steps end to end security consumer apps
5 steps end to end security consumer apps
 
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At OddsJervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
 
Building mobile applications with Meteor: Eat Local case study
Building mobile applications with Meteor: Eat Local case studyBuilding mobile applications with Meteor: Eat Local case study
Building mobile applications with Meteor: Eat Local case study
 
GDPR- The Buck Stops Here
GDPR-  The Buck Stops HereGDPR-  The Buck Stops Here
GDPR- The Buck Stops Here
 
Open Source Outlook: Expected Developments for 2016
Open Source Outlook: Expected Developments for 2016Open Source Outlook: Expected Developments for 2016
Open Source Outlook: Expected Developments for 2016
 
What Mobile Privacy Changes Mean for Your Holiday Strategy
What Mobile Privacy Changes Mean for Your Holiday Strategy What Mobile Privacy Changes Mean for Your Holiday Strategy
What Mobile Privacy Changes Mean for Your Holiday Strategy
 
Boston marketing technology group 150223 george adams vizi apps
Boston marketing technology group 150223 george adams vizi appsBoston marketing technology group 150223 george adams vizi apps
Boston marketing technology group 150223 george adams vizi apps
 
Mobility Why? What does it means to us?
Mobility Why? What does it means to us?Mobility Why? What does it means to us?
Mobility Why? What does it means to us?
 
Tips for Android Publishing in China
Tips for Android Publishing in ChinaTips for Android Publishing in China
Tips for Android Publishing in China
 
Empower Your Expertise Navigating FinTech App Development in 2024
Empower Your Expertise Navigating FinTech App Development in 2024Empower Your Expertise Navigating FinTech App Development in 2024
Empower Your Expertise Navigating FinTech App Development in 2024
 

More from Ghostery, Inc.

Ghostery MCM - May 2016
Ghostery MCM - May 2016Ghostery MCM - May 2016
Ghostery MCM - May 2016Ghostery, Inc.
 
The State of Marketing Technology Today The State of Marketing Technology Today
The State of Marketing Technology Today The State of Marketing Technology Today The State of Marketing Technology Today The State of Marketing Technology Today
The State of Marketing Technology Today The State of Marketing Technology Today Ghostery, Inc.
 
The Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection RegulationThe Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection RegulationGhostery, Inc.
 
The Next $50 Billion will Come From...Putting Users First
The Next $50 Billion will Come From...Putting Users FirstThe Next $50 Billion will Come From...Putting Users First
The Next $50 Billion will Come From...Putting Users FirstGhostery, Inc.
 
Economic Impact of Mixed Content Warnings on Consumer Behavior
Economic Impact of Mixed Content Warnings on Consumer BehaviorEconomic Impact of Mixed Content Warnings on Consumer Behavior
Economic Impact of Mixed Content Warnings on Consumer BehaviorGhostery, Inc.
 
Ghostery Enterprise EU Security Study
Ghostery Enterprise EU Security StudyGhostery Enterprise EU Security Study
Ghostery Enterprise EU Security StudyGhostery, Inc.
 
Ghostery Enterprise Security Study
Ghostery Enterprise Security StudyGhostery Enterprise Security Study
Ghostery Enterprise Security StudyGhostery, Inc.
 
Ghostery Enterprise - Defining The Marketing Cloud
Ghostery Enterprise - Defining The Marketing CloudGhostery Enterprise - Defining The Marketing Cloud
Ghostery Enterprise - Defining The Marketing CloudGhostery, Inc.
 
Ghostery Enterprise - Best Practices White Paper
Ghostery Enterprise - Best Practices White PaperGhostery Enterprise - Best Practices White Paper
Ghostery Enterprise - Best Practices White PaperGhostery, Inc.
 

More from Ghostery, Inc. (9)

Ghostery MCM - May 2016
Ghostery MCM - May 2016Ghostery MCM - May 2016
Ghostery MCM - May 2016
 
The State of Marketing Technology Today The State of Marketing Technology Today
The State of Marketing Technology Today The State of Marketing Technology Today The State of Marketing Technology Today The State of Marketing Technology Today
The State of Marketing Technology Today The State of Marketing Technology Today
 
The Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection RegulationThe Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection Regulation
 
The Next $50 Billion will Come From...Putting Users First
The Next $50 Billion will Come From...Putting Users FirstThe Next $50 Billion will Come From...Putting Users First
The Next $50 Billion will Come From...Putting Users First
 
Economic Impact of Mixed Content Warnings on Consumer Behavior
Economic Impact of Mixed Content Warnings on Consumer BehaviorEconomic Impact of Mixed Content Warnings on Consumer Behavior
Economic Impact of Mixed Content Warnings on Consumer Behavior
 
Ghostery Enterprise EU Security Study
Ghostery Enterprise EU Security StudyGhostery Enterprise EU Security Study
Ghostery Enterprise EU Security Study
 
Ghostery Enterprise Security Study
Ghostery Enterprise Security StudyGhostery Enterprise Security Study
Ghostery Enterprise Security Study
 
Ghostery Enterprise - Defining The Marketing Cloud
Ghostery Enterprise - Defining The Marketing CloudGhostery Enterprise - Defining The Marketing Cloud
Ghostery Enterprise - Defining The Marketing Cloud
 
Ghostery Enterprise - Best Practices White Paper
Ghostery Enterprise - Best Practices White PaperGhostery Enterprise - Best Practices White Paper
Ghostery Enterprise - Best Practices White Paper
 

Recently uploaded

Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEHimani415946
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxlaozhuseo02
 
How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?Linksys Velop Login
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxabhinandnam9997
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxGal Baras
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyDamar Juniarto
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shoplaozhuseo02
 
Pvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan
 
The AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdfThe AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdfSiskaFitrianingrum
 
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理aagad
 

Recently uploaded (12)

Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptx
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case Study
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
Pvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdf
 
The AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdfThe AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdf
 
The Best AI Powered Software - Intellivid AI Studio
The Best AI Powered Software - Intellivid AI StudioThe Best AI Powered Software - Intellivid AI Studio
The Best AI Powered Software - Intellivid AI Studio
 
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
 

Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015

  • 1. DEVELOPING MOBILE TRUST IN TODAY'S E-PRIVACY LANDSCAPE November 19th 2015 PRESENTERS: Todd Ruback Esq., CIPP-US/E, CIPT Chief Privacy Officer & V.P. Legal Affairs Jon Sheppard Director of Product Management, Privacy
  • 2. 2 Introductions Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved Jon Sheppard Director of Product Management, Privacy Todd Ruback Chief Privacy Officer & VP of Legal Affairs Todd@Ghostery.com JSheppard@Ghostery.com
  • 3. AT&T June 2015 Update on Privacy Legal and Regulatory Landscape Todd Ruback Esq., CIPP-US/E, CIPT Chief Privacy Officer & V.P. Legal Affairs
  • 4. 4 US Self-Regulatory Program for Online Behavioral Advertising (OBA) • Mobile enforcement began September 1, 2015 – Accountability agents are actively monitoring and expect robust enforcement • Extends DAA’s Principles to mobile websites and apps • Let’s Break It Down: Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved Ads If based upon OBA data, then deploy AdChoices Icon, when opened goes to DAA’s AppChoices, the industry opt-out solution, listing third parties in ad with consumer choice apps Shared obligation with third parties to provide notice of OBA activity and give control to consumer
  • 5. 5 Canada & EU Self-Regulatory Programs Canada DAAC; enforcement spike by ASC in recent months • Added complexity of national privacy law, PIPEDA, that also applies to OBA • OPC Report – encouraged that Canada websites deploy AdChoices notice, but expect more. • ASC fully supports PIPEDA; no daylight between the two. EU EDAA; Will soon announce mobile enforcement date Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
  • 6. 6 What do the Self-Regulatory Programs Apply to? Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved • 3 different types of data that might be collected: • Cross App Data (CAD) – OK, unless user opts-out • Precision Location Data (PLD) – need affirmative consent • Personal Directory Data (PDD)- need affirmative consent • Control: • Settings upon download • Ghostery’s App Notice • DAA’s AppChoices
  • 7. 7 US State Specific Transparency Laws States currently affected: • California (CalOPPA) • Delaware (DelOPPA) • New York proposed legislation Legislation Overview Requires websites, and apps, to have comprehensive understanding of invisible digital activity and disclose it. Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
  • 8. 8 EU – Safe Harbor / Cross Border Data Transfers • ECJ invalidated US Safe Harbor Program • Sky is not falling, although over 4,000 US companies rely on this legal mechanism to transfer EU personal data to the US • Chances of Safe Harbor 2.0 – 50/50 • Not clear what it may look like but third party Seal Program is at risk, and we can expect robust monitoring and enforcement. • WP29 has given companies until Jan 31, 2016 to put Plan B in place • Many recommend Standard Contractual Clauses as short term solution Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
  • 9. 9 EU – General Data Protection Regulation Last mile of negotiations • Will have new rights for individuals and obligations by companies • Will require companies to have demonstrable knowledge of digital activity –annual audits of sites and apps Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
  • 10. 10 EU ePrivacy Directive – No Longer Just the Cookie Law • Applies to websites (and apps and connected devices) • Often confused with Self-Regulatory Programs for OBA • Will be reviewed in 2016 after GDPR is completed • Requirements – Notice & Consent • Enforcement – regulators have been signaled it applies equally to apps and IoT but have waited for market solution • Priority – for children’s apps; sweeps have already happened • Solution – Ghostery’s App Notice Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
  • 11. AT&T June 2015 Getting in Compliance & The Ghostery App Notice Solution Jon Sheppard, Director of Product Management, Privacy
  • 12. 12 Why is there a need for a different solution for Mobile Apps? Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved • Unlike the web: • Mobile apps are installed and run locally on the users device. • Changes to apps can only be made by updating the apps code and releasing a new version to the app Store. • Apps aren’t cookie based. • Like the web: • Mobile apps contain trackers reporting, OBA, CAD, PLD and PDD • The list of available app trackers is growing quickly.
  • 13. 13 Steps to Get into Compliance Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved 1. Identify your companies mobile apps 2. Work with your mobile developer to identify the ad tech used by your apps, and data it collects 3. Implement Ghostery App Notice UPDATE • We can help you here if you’re lost!
  • 15. 15 The Ghostery App Notice Solution Overview Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved • Worked closely with privacy leaders to design and build. • Provided by a Software Development Kit (SDK) • Available in 2 versions depending on your app type: • Android 4.1 and up • iOS 7 and up • Both Explicit and Implied notice formats supported • Over 50 notice customizable options available to match your apps requirements, including notice color and text and size etc.
  • 16. 16 What is an SDK? Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved • A mobile Software Development Kit (SDK) is a packet of code that allows developers to easily add new functionality to their apps. • SDK’s are often used as shortcuts so that developers don’t have to write everything from scratch • SDK’s frequently include sample code and supporting technical notes or documentation Lorem ipsum dolor sit amet, consectetur adipiscing elit. Fusce hendrerit pellentesque tellus ut lacinia. Curabitur sed consectetur lorem, eu tincidunt urna. Ut lacinia ultrices porttitor. Phasellus vehicula blandit accumsan. Pellentesque
  • 17. 17 Installing your SDK Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved 1. app Developers passed the SDK code via Github GITHUB 2. SDK is installed in app by Developer: • Installation & Companion Guides are provided as well as sample code. YOUR APP 3. Customize the color and text of your Notice in your Site Notice Account. 4. Submit your updated app to the store for your users to download. UPDATE
  • 18. 18 Ghostery is the Privacy Compliance Leader Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved • Ghostery globally is the Ad Choices Program leader • Dominant market share: Preferred Partner of every major Ad Agency Holding • Integrated with all key buy and sell-side platforms • Close relationships with the entire privacy ecosystem • Technology vendor to DAA SOME OF OUR INTERGRATION PARTNERS • Over 290+ clients across desktop, mobile and video • Over 3 billion AdChoices icons served daily • Over 100 million site consent notices served daily • 40 languages supported GHOSTERY BY THE NUMBERS
  • 19. 19 Schedule Your App Notice Demo Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved EU SALES +44 020 7031 8232 NORTH AMERICA SALES 917-791-5550 Sales@Ghostery.com EUSales@Ghostery.com