SlideShare a Scribd company logo
1 of 21
DEVELOPING MOBILE
TRUST IN TODAY'S
E-PRIVACY LANDSCAPE
November 19th 2015
PRESENTERS:
Todd Ruback Esq., CIPP-US/E, CIPT
Chief Privacy Officer &
V.P. Legal Affairs
Jon Sheppard
Director of Product Management, Privacy
2
Agenda
• Introductions
• Update on Privacy Legal and Regulatory Landscape
• ePrivacy Directive
• Getting in Compliance & The Ghostery App Notice Solution
• Q&A
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
3
Introductions
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
Jon Sheppard
Director of Product
Management, Privacy
Todd Ruback
Chief Privacy Officer &
VP of Legal Affairs
AT&T
June 2015
Update on Privacy
Legal and Regulatory
Landscape
Todd Ruback Esq., CIPP-US/E, CIPT
Chief Privacy Officer &
V.P. Legal Affairs
5
US Self-Regulatory Program for Online Behavioral Advertising (OBA)
• Mobile enforcement began September 1, 2015 – Accountability agents
are actively monitoring and expect robust enforcement
• Extends DAA’s Principles to mobile websites and apps
• Let’s Break It Down:
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
Ads
If based upon OBA data,
then deploy AdChoices
Icon, when opened goes to
DAA’s AppChoices, the
industry opt-out solution,
listing third parties in ad
with consumer choice
Apps
Shared obligation with
third parties to
provide notice of OBA
activity and give
control to consumer
6
Canada & EU Self-Regulatory Programs
Canada
DAAC; enforcement spike by ASC in recent months
• Added complexity of national privacy law, PIPEDA, that also
applies to OBA
• OPC Report – encouraged that Canada websites deploy
AdChoices notice, but expect more.
• ASC fully supports PIPEDA; no daylight between the two.
EU
EDAA; Will soon announce mobile enforcement date
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
7
What do the Self-Regulatory Programs Apply to?
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
• 3 different types of data that might be
collected:
• Cross App Data (CAD) – OK,
unless user opts-out
• Precision Location Data (PLD) –
need affirmative consent
• Personal Directory Data (PDD)-
need affirmative consent
• Control:
• Settings upon download
• Ghostery’s App Notice
• DAA’s AppChoices
8
US State Specific Transparency Laws
States currently affected:
• California (CalOPPA)
• Delaware (DelOPPA)
• New York proposed legislation
Legislation Overview
Requires websites, and Apps, to have
comprehensive understanding of invisible
digital activity and disclose it.
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
9
EU – Safe Harbor / Cross Border Data Transfers
• ECJ invalidated US Safe Harbor Program
• Sky is not falling, although over 4,000 US companies rely on this legal
mechanism to transfer EU personal data to the US
• Chances of Safe Harbor 2.0 – 50/50
• Not clear what it may look like but third party Seal Program is at risk, and
we can expect robust monitoring and enforcement.
• WP29 has given companies until Jan 31, 2016 to put Plan B in place
• Many recommend Standard Contractual Clauses as short term solution
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
10
EU – General Data Protection Regulation
Last mile of negotiations
• Will have new rights for individuals and obligations by companies
• Will require companies to have demonstrable knowledge of digital activity
–annual audits of sites and apps
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
11
EU ePrivacy Directive – No Longer Just the Cookie Law
• Applies to websites (and Apps and connected devices)
• Often confused with Self-Regulatory Programs for OBA
• Will be reviewed in 2016 after GDPR is completed
• Requirements – Notice & Consent
• Enforcement – regulators have been signaled it applies equally to Apps
and IoT but have waited for market solution
• Priority – for children’s Apps; sweeps have already happened
• Solution – Ghostery’s App Notice
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
AT&T
June 2015
Getting in Compliance
& The Ghostery App
Notice Solution
Jon Sheppard, Director of
Product Management, Privacy
13
Why is there a need for a different solution for Mobile Apps?
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
• Unlike the web:
• Mobile Apps are installed and run
locally on the users device.
• Changes to Apps can only be made
by updating the Apps code and
releasing a new version to the App
Store.
• Apps aren’t cookie based.
• Like the web:
• Mobile Apps contain trackers
reporting, OBA, CAD, PLD and PDD
• The list of available App trackers is
growing quickly.
14
Steps to Get into Compliance
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
1. Identify your companies mobile apps 2. Work with your mobile developer to
identify the ad tech used by your apps,
and data it collects
3. Implement Ghostery App Notice
UPDATE
• We can help you here if you’re lost!
AT&T
June 2015App Notice Demo
16
The Ghostery App Notice Solution Overview
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
• Worked closely with privacy leaders to design and
build.
• Provided by a Software Development Kit (SDK)
• Available in 2 versions depending on your App
type:
• Android 4.1 and up
• iOS 7 and up
• Both Explicit and Implied notice formats supported
• Over 50 notice customizable options available to
match your apps requirements, including notice
color and text and size etc.
17
What is an SDK?
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
• A mobile Software Development Kit
(SDK) is a packet of code that allows
developers to easily add new
functionality to their apps.
• SDK’s are often used as shortcuts so
that developers don’t have to write
everything from scratch
• SDK’s frequently include sample code
and supporting technical notes or
documentation
Lorem ipsum dolor sit
amet, consectetur
adipiscing elit. Fusce
hendrerit pellentesque
tellus ut lacinia.
Curabitur sed
consectetur lorem, eu
tincidunt urna. Ut
lacinia ultrices porttitor.
Phasellus vehicula
blandit accumsan.
Pellentesque
18
Installing your SDK
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
1. App Developers passed the SDK code via
Github
GITHUB
2. SDK is installed in App by Developer:
• Installation & Companion Guides are provided as well as
sample code.
YOUR APP
3. Customize the color and text of your Notice in
your Site Notice Account.
4. Submit your updated App to the store for your
users to download.
UPDATE
19
Ghostery is the Privacy Compliance Leader
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
• Ghostery globally is the Ad Choices Program leader
• Dominant market share: Preferred Partner of every
major Ad Agency Holding
• Integrated with all key buy and sell-side platforms
• Close relationships with the entire privacy ecosystem
• Technology vendor to DAA
SOME OF OUR INTERGRATION PARTNERS
• Over 290+ clients across
desktop, mobile and video
• Over 3 billion AdChoices
icons served daily
• Over 100 million site
consent notices served daily
• 40 languages supported
GHOSTERY BY THE NUMBERS
20
Thank you
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
Jon Sheppard
Director of Product
Management, Privacy
Todd Ruback
Chief Privacy Officer &
VP of Legal Affairs
Todd@Ghostery.com JSheppard@Ghostery.com
EU SALES
+44 020 7031 8232
NORTH AMERICA SALES
917-791-5550
Sales@Ghostery.com EUSales@Ghostery.com
AT&T
June 2015 Q&A

More Related Content

What's hot

Webinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security FactorWebinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security FactorPing Identity
 
API Security Needs AI Now More Than Ever
API Security Needs AI Now More Than EverAPI Security Needs AI Now More Than Ever
API Security Needs AI Now More Than EverPing Identity
 
apidays LIVE Singapore 2021 - Securing the Open Source supply chain by Liran ...
apidays LIVE Singapore 2021 - Securing the Open Source supply chain by Liran ...apidays LIVE Singapore 2021 - Securing the Open Source supply chain by Liran ...
apidays LIVE Singapore 2021 - Securing the Open Source supply chain by Liran ...apidays
 
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...Ping Identity
 
How Secure Is Your Secure API?
How Secure Is Your Secure API?How Secure Is Your Secure API?
How Secure Is Your Secure API?Colin McGovern
 
apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...
apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...
apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...apidays
 
Identity Relationship Management - The Right Approach for a Complex Digital W...
Identity Relationship Management - The Right Approach for a Complex Digital W...Identity Relationship Management - The Right Approach for a Complex Digital W...
Identity Relationship Management - The Right Approach for a Complex Digital W...ForgeRock
 
MetaCert Security Sales Deck
MetaCert Security Sales DeckMetaCert Security Sales Deck
MetaCert Security Sales DeckPaul Walsh
 
Mobility Why? What does it means to us?
Mobility Why? What does it means to us?Mobility Why? What does it means to us?
Mobility Why? What does it means to us?Pronq by HP
 
The malware monetization machine
The malware monetization machineThe malware monetization machine
The malware monetization machinePriyanka Aash
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingPing Identity
 
È l'ora del Cloud Managed IT
È l'ora del Cloud Managed ITÈ l'ora del Cloud Managed IT
È l'ora del Cloud Managed ITMatteo Masi
 
InfoStretch & Peloton - Putting IoT to work
InfoStretch & Peloton - Putting IoT to workInfoStretch & Peloton - Putting IoT to work
InfoStretch & Peloton - Putting IoT to workInfostretch
 
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At ComplianceGDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At CompliancePing Identity
 
Google Case Study - Towards simpler, stronger authentication
Google Case Study - Towards simpler, stronger authenticationGoogle Case Study - Towards simpler, stronger authentication
Google Case Study - Towards simpler, stronger authenticationFIDO Alliance
 
Enhanced home security solutions kalay v2
Enhanced home security solutions  kalay v2Enhanced home security solutions  kalay v2
Enhanced home security solutions kalay v2Willie Lin
 
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Ping Identity
 
apidays LIVE Hong Kong 2021 - Zero Trust security with Service Mesh by Lauren...
apidays LIVE Hong Kong 2021 - Zero Trust security with Service Mesh by Lauren...apidays LIVE Hong Kong 2021 - Zero Trust security with Service Mesh by Lauren...
apidays LIVE Hong Kong 2021 - Zero Trust security with Service Mesh by Lauren...apidays
 

What's hot (20)

Webinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security FactorWebinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
 
API Security Needs AI Now More Than Ever
API Security Needs AI Now More Than EverAPI Security Needs AI Now More Than Ever
API Security Needs AI Now More Than Ever
 
apidays LIVE Singapore 2021 - Securing the Open Source supply chain by Liran ...
apidays LIVE Singapore 2021 - Securing the Open Source supply chain by Liran ...apidays LIVE Singapore 2021 - Securing the Open Source supply chain by Liran ...
apidays LIVE Singapore 2021 - Securing the Open Source supply chain by Liran ...
 
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
 
How Secure Is Your Secure API?
How Secure Is Your Secure API?How Secure Is Your Secure API?
How Secure Is Your Secure API?
 
apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...
apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...
apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...
 
Check Point: Securing Web 2.0
Check Point: Securing Web 2.0 Check Point: Securing Web 2.0
Check Point: Securing Web 2.0
 
Identity Relationship Management - The Right Approach for a Complex Digital W...
Identity Relationship Management - The Right Approach for a Complex Digital W...Identity Relationship Management - The Right Approach for a Complex Digital W...
Identity Relationship Management - The Right Approach for a Complex Digital W...
 
MetaCert Security Sales Deck
MetaCert Security Sales DeckMetaCert Security Sales Deck
MetaCert Security Sales Deck
 
Mobility Why? What does it means to us?
Mobility Why? What does it means to us?Mobility Why? What does it means to us?
Mobility Why? What does it means to us?
 
The malware monetization machine
The malware monetization machineThe malware monetization machine
The malware monetization machine
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
 
È l'ora del Cloud Managed IT
È l'ora del Cloud Managed ITÈ l'ora del Cloud Managed IT
È l'ora del Cloud Managed IT
 
InfoStretch & Peloton - Putting IoT to work
InfoStretch & Peloton - Putting IoT to workInfoStretch & Peloton - Putting IoT to work
InfoStretch & Peloton - Putting IoT to work
 
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At ComplianceGDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
 
Google Case Study - Towards simpler, stronger authentication
Google Case Study - Towards simpler, stronger authenticationGoogle Case Study - Towards simpler, stronger authentication
Google Case Study - Towards simpler, stronger authentication
 
Enhanced home security solutions kalay v2
Enhanced home security solutions  kalay v2Enhanced home security solutions  kalay v2
Enhanced home security solutions kalay v2
 
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
 
apidays LIVE Hong Kong 2021 - Zero Trust security with Service Mesh by Lauren...
apidays LIVE Hong Kong 2021 - Zero Trust security with Service Mesh by Lauren...apidays LIVE Hong Kong 2021 - Zero Trust security with Service Mesh by Lauren...
apidays LIVE Hong Kong 2021 - Zero Trust security with Service Mesh by Lauren...
 
9.35am robert humphrey
9.35am robert humphrey9.35am robert humphrey
9.35am robert humphrey
 

Similar to Developing Mobile Trust In Today's E-Privacy Landscape

Creating Trust for the Internet of Things
Creating Trust for the Internet of ThingsCreating Trust for the Internet of Things
Creating Trust for the Internet of ThingsPECB
 
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure
 
Mobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsMobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsSkycure
 
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At OddsJervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Oddscentralohioissa
 
Connected Experiences: From Websites to Wearables to Whatever
Connected Experiences: From Websites to Wearables to WhateverConnected Experiences: From Websites to Wearables to Whatever
Connected Experiences: From Websites to Wearables to WhateverRebecca Lieb
 
B2B Social Networking Application By Rigel Networks
B2B Social Networking Application By Rigel NetworksB2B Social Networking Application By Rigel Networks
B2B Social Networking Application By Rigel NetworksRigel Networks LLC
 
5 Steps for End-to-End Mobile Security with Consumer Apps
5 Steps for End-to-End Mobile Security with Consumer Apps5 Steps for End-to-End Mobile Security with Consumer Apps
5 Steps for End-to-End Mobile Security with Consumer AppsCA API Management
 
5 steps end to end security consumer apps
5 steps end to end security consumer apps5 steps end to end security consumer apps
5 steps end to end security consumer appsCA API Management
 
DIRECTORY CIS 2015 - Eric Fazendin
DIRECTORY CIS 2015 - Eric FazendinDIRECTORY CIS 2015 - Eric Fazendin
DIRECTORY CIS 2015 - Eric FazendinCloudIDSummit
 
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'man
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'manCIS 2015 Multi-factor for All, the Easy Way - Ran Ne'man
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'manCloudIDSummit
 
Improve the Security of Your Application Portfolio in a Few Days with On-Dema...
Improve the Security of Your Application Portfolio in a Few Days with On-Dema...Improve the Security of Your Application Portfolio in a Few Days with On-Dema...
Improve the Security of Your Application Portfolio in a Few Days with On-Dema...Capgemini
 
Monitoring in the DevOps Era
Monitoring in the DevOps EraMonitoring in the DevOps Era
Monitoring in the DevOps EraMike Kavis
 
Iveda (OTCQB:IVDA) - Investor Presentation
Iveda (OTCQB:IVDA) - Investor PresentationIveda (OTCQB:IVDA) - Investor Presentation
Iveda (OTCQB:IVDA) - Investor PresentationRedChip Companies, Inc.
 
Iveda Investor Presentation
Iveda Investor PresentationIveda Investor Presentation
Iveda Investor Presentationivedasolutions
 
Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint Group of company MUK
 
HP Software Performance Tour 2014 - Enterprise Agility in the age of Applicat...
HP Software Performance Tour 2014 - Enterprise Agility in the age of Applicat...HP Software Performance Tour 2014 - Enterprise Agility in the age of Applicat...
HP Software Performance Tour 2014 - Enterprise Agility in the age of Applicat...HP Enterprise Italia
 

Similar to Developing Mobile Trust In Today's E-Privacy Landscape (20)

Creating Trust for the Internet of Things
Creating Trust for the Internet of ThingsCreating Trust for the Internet of Things
Creating Trust for the Internet of Things
 
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
 
GDPR- The Buck Stops Here
GDPR-  The Buck Stops HereGDPR-  The Buck Stops Here
GDPR- The Buck Stops Here
 
Mobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsMobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 Predictions
 
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At OddsJervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
 
EVOLVE'15 | Enhance | John Fait | AEM App Enhanced In-App Messaging & Beacons
EVOLVE'15 | Enhance | John Fait | AEM App Enhanced In-App Messaging & BeaconsEVOLVE'15 | Enhance | John Fait | AEM App Enhanced In-App Messaging & Beacons
EVOLVE'15 | Enhance | John Fait | AEM App Enhanced In-App Messaging & Beacons
 
Connected Experiences: From Websites to Wearables to Whatever
Connected Experiences: From Websites to Wearables to WhateverConnected Experiences: From Websites to Wearables to Whatever
Connected Experiences: From Websites to Wearables to Whatever
 
B2B Social Networking Application By Rigel Networks
B2B Social Networking Application By Rigel NetworksB2B Social Networking Application By Rigel Networks
B2B Social Networking Application By Rigel Networks
 
Marketing in the Age of Mobile
Marketing in the Age of MobileMarketing in the Age of Mobile
Marketing in the Age of Mobile
 
5 Steps for End-to-End Mobile Security with Consumer Apps
5 Steps for End-to-End Mobile Security with Consumer Apps5 Steps for End-to-End Mobile Security with Consumer Apps
5 Steps for End-to-End Mobile Security with Consumer Apps
 
5 steps end to end security consumer apps
5 steps end to end security consumer apps5 steps end to end security consumer apps
5 steps end to end security consumer apps
 
DIRECTORY CIS 2015 - Eric Fazendin
DIRECTORY CIS 2015 - Eric FazendinDIRECTORY CIS 2015 - Eric Fazendin
DIRECTORY CIS 2015 - Eric Fazendin
 
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'man
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'manCIS 2015 Multi-factor for All, the Easy Way - Ran Ne'man
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'man
 
Improve the Security of Your Application Portfolio in a Few Days with On-Dema...
Improve the Security of Your Application Portfolio in a Few Days with On-Dema...Improve the Security of Your Application Portfolio in a Few Days with On-Dema...
Improve the Security of Your Application Portfolio in a Few Days with On-Dema...
 
Monitoring in the DevOps Era
Monitoring in the DevOps EraMonitoring in the DevOps Era
Monitoring in the DevOps Era
 
Iveda (OTCQB:IVDA) - Investor Presentation
Iveda (OTCQB:IVDA) - Investor PresentationIveda (OTCQB:IVDA) - Investor Presentation
Iveda (OTCQB:IVDA) - Investor Presentation
 
Iveda Investor Presentation
Iveda Investor PresentationIveda Investor Presentation
Iveda Investor Presentation
 
Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint
 
Carrier IQ
Carrier IQCarrier IQ
Carrier IQ
 
HP Software Performance Tour 2014 - Enterprise Agility in the age of Applicat...
HP Software Performance Tour 2014 - Enterprise Agility in the age of Applicat...HP Software Performance Tour 2014 - Enterprise Agility in the age of Applicat...
HP Software Performance Tour 2014 - Enterprise Agility in the age of Applicat...
 

More from Ghostery, Inc.

Ghostery MCM - May 2016
Ghostery MCM - May 2016Ghostery MCM - May 2016
Ghostery MCM - May 2016Ghostery, Inc.
 
The State of Marketing Technology Today The State of Marketing Technology Today
The State of Marketing Technology Today The State of Marketing Technology Today The State of Marketing Technology Today The State of Marketing Technology Today
The State of Marketing Technology Today The State of Marketing Technology Today Ghostery, Inc.
 
The Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection RegulationThe Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection RegulationGhostery, Inc.
 
Economic Impact of Mixed Content Warnings on Consumer Behavior
Economic Impact of Mixed Content Warnings on Consumer BehaviorEconomic Impact of Mixed Content Warnings on Consumer Behavior
Economic Impact of Mixed Content Warnings on Consumer BehaviorGhostery, Inc.
 
Ghostery Enterprise EU Security Study
Ghostery Enterprise EU Security StudyGhostery Enterprise EU Security Study
Ghostery Enterprise EU Security StudyGhostery, Inc.
 
Ghostery Enterprise Security Study
Ghostery Enterprise Security StudyGhostery Enterprise Security Study
Ghostery Enterprise Security StudyGhostery, Inc.
 
Ghostery Enterprise - Defining The Marketing Cloud
Ghostery Enterprise - Defining The Marketing CloudGhostery Enterprise - Defining The Marketing Cloud
Ghostery Enterprise - Defining The Marketing CloudGhostery, Inc.
 
Ghostery Enterprise - Best Practices White Paper
Ghostery Enterprise - Best Practices White PaperGhostery Enterprise - Best Practices White Paper
Ghostery Enterprise - Best Practices White PaperGhostery, Inc.
 

More from Ghostery, Inc. (8)

Ghostery MCM - May 2016
Ghostery MCM - May 2016Ghostery MCM - May 2016
Ghostery MCM - May 2016
 
The State of Marketing Technology Today The State of Marketing Technology Today
The State of Marketing Technology Today The State of Marketing Technology Today The State of Marketing Technology Today The State of Marketing Technology Today
The State of Marketing Technology Today The State of Marketing Technology Today
 
The Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection RegulationThe Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection Regulation
 
Economic Impact of Mixed Content Warnings on Consumer Behavior
Economic Impact of Mixed Content Warnings on Consumer BehaviorEconomic Impact of Mixed Content Warnings on Consumer Behavior
Economic Impact of Mixed Content Warnings on Consumer Behavior
 
Ghostery Enterprise EU Security Study
Ghostery Enterprise EU Security StudyGhostery Enterprise EU Security Study
Ghostery Enterprise EU Security Study
 
Ghostery Enterprise Security Study
Ghostery Enterprise Security StudyGhostery Enterprise Security Study
Ghostery Enterprise Security Study
 
Ghostery Enterprise - Defining The Marketing Cloud
Ghostery Enterprise - Defining The Marketing CloudGhostery Enterprise - Defining The Marketing Cloud
Ghostery Enterprise - Defining The Marketing Cloud
 
Ghostery Enterprise - Best Practices White Paper
Ghostery Enterprise - Best Practices White PaperGhostery Enterprise - Best Practices White Paper
Ghostery Enterprise - Best Practices White Paper
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 

Recently uploaded (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 

Developing Mobile Trust In Today's E-Privacy Landscape

  • 1. DEVELOPING MOBILE TRUST IN TODAY'S E-PRIVACY LANDSCAPE November 19th 2015 PRESENTERS: Todd Ruback Esq., CIPP-US/E, CIPT Chief Privacy Officer & V.P. Legal Affairs Jon Sheppard Director of Product Management, Privacy
  • 2. 2 Agenda • Introductions • Update on Privacy Legal and Regulatory Landscape • ePrivacy Directive • Getting in Compliance & The Ghostery App Notice Solution • Q&A Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
  • 3. 3 Introductions Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved Jon Sheppard Director of Product Management, Privacy Todd Ruback Chief Privacy Officer & VP of Legal Affairs
  • 4. AT&T June 2015 Update on Privacy Legal and Regulatory Landscape Todd Ruback Esq., CIPP-US/E, CIPT Chief Privacy Officer & V.P. Legal Affairs
  • 5. 5 US Self-Regulatory Program for Online Behavioral Advertising (OBA) • Mobile enforcement began September 1, 2015 – Accountability agents are actively monitoring and expect robust enforcement • Extends DAA’s Principles to mobile websites and apps • Let’s Break It Down: Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved Ads If based upon OBA data, then deploy AdChoices Icon, when opened goes to DAA’s AppChoices, the industry opt-out solution, listing third parties in ad with consumer choice Apps Shared obligation with third parties to provide notice of OBA activity and give control to consumer
  • 6. 6 Canada & EU Self-Regulatory Programs Canada DAAC; enforcement spike by ASC in recent months • Added complexity of national privacy law, PIPEDA, that also applies to OBA • OPC Report – encouraged that Canada websites deploy AdChoices notice, but expect more. • ASC fully supports PIPEDA; no daylight between the two. EU EDAA; Will soon announce mobile enforcement date Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
  • 7. 7 What do the Self-Regulatory Programs Apply to? Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved • 3 different types of data that might be collected: • Cross App Data (CAD) – OK, unless user opts-out • Precision Location Data (PLD) – need affirmative consent • Personal Directory Data (PDD)- need affirmative consent • Control: • Settings upon download • Ghostery’s App Notice • DAA’s AppChoices
  • 8. 8 US State Specific Transparency Laws States currently affected: • California (CalOPPA) • Delaware (DelOPPA) • New York proposed legislation Legislation Overview Requires websites, and Apps, to have comprehensive understanding of invisible digital activity and disclose it. Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
  • 9. 9 EU – Safe Harbor / Cross Border Data Transfers • ECJ invalidated US Safe Harbor Program • Sky is not falling, although over 4,000 US companies rely on this legal mechanism to transfer EU personal data to the US • Chances of Safe Harbor 2.0 – 50/50 • Not clear what it may look like but third party Seal Program is at risk, and we can expect robust monitoring and enforcement. • WP29 has given companies until Jan 31, 2016 to put Plan B in place • Many recommend Standard Contractual Clauses as short term solution Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
  • 10. 10 EU – General Data Protection Regulation Last mile of negotiations • Will have new rights for individuals and obligations by companies • Will require companies to have demonstrable knowledge of digital activity –annual audits of sites and apps Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
  • 11. 11 EU ePrivacy Directive – No Longer Just the Cookie Law • Applies to websites (and Apps and connected devices) • Often confused with Self-Regulatory Programs for OBA • Will be reviewed in 2016 after GDPR is completed • Requirements – Notice & Consent • Enforcement – regulators have been signaled it applies equally to Apps and IoT but have waited for market solution • Priority – for children’s Apps; sweeps have already happened • Solution – Ghostery’s App Notice Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
  • 12. AT&T June 2015 Getting in Compliance & The Ghostery App Notice Solution Jon Sheppard, Director of Product Management, Privacy
  • 13. 13 Why is there a need for a different solution for Mobile Apps? Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved • Unlike the web: • Mobile Apps are installed and run locally on the users device. • Changes to Apps can only be made by updating the Apps code and releasing a new version to the App Store. • Apps aren’t cookie based. • Like the web: • Mobile Apps contain trackers reporting, OBA, CAD, PLD and PDD • The list of available App trackers is growing quickly.
  • 14. 14 Steps to Get into Compliance Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved 1. Identify your companies mobile apps 2. Work with your mobile developer to identify the ad tech used by your apps, and data it collects 3. Implement Ghostery App Notice UPDATE • We can help you here if you’re lost!
  • 16. 16 The Ghostery App Notice Solution Overview Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved • Worked closely with privacy leaders to design and build. • Provided by a Software Development Kit (SDK) • Available in 2 versions depending on your App type: • Android 4.1 and up • iOS 7 and up • Both Explicit and Implied notice formats supported • Over 50 notice customizable options available to match your apps requirements, including notice color and text and size etc.
  • 17. 17 What is an SDK? Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved • A mobile Software Development Kit (SDK) is a packet of code that allows developers to easily add new functionality to their apps. • SDK’s are often used as shortcuts so that developers don’t have to write everything from scratch • SDK’s frequently include sample code and supporting technical notes or documentation Lorem ipsum dolor sit amet, consectetur adipiscing elit. Fusce hendrerit pellentesque tellus ut lacinia. Curabitur sed consectetur lorem, eu tincidunt urna. Ut lacinia ultrices porttitor. Phasellus vehicula blandit accumsan. Pellentesque
  • 18. 18 Installing your SDK Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved 1. App Developers passed the SDK code via Github GITHUB 2. SDK is installed in App by Developer: • Installation & Companion Guides are provided as well as sample code. YOUR APP 3. Customize the color and text of your Notice in your Site Notice Account. 4. Submit your updated App to the store for your users to download. UPDATE
  • 19. 19 Ghostery is the Privacy Compliance Leader Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved • Ghostery globally is the Ad Choices Program leader • Dominant market share: Preferred Partner of every major Ad Agency Holding • Integrated with all key buy and sell-side platforms • Close relationships with the entire privacy ecosystem • Technology vendor to DAA SOME OF OUR INTERGRATION PARTNERS • Over 290+ clients across desktop, mobile and video • Over 3 billion AdChoices icons served daily • Over 100 million site consent notices served daily • 40 languages supported GHOSTERY BY THE NUMBERS
  • 20. 20 Thank you Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved Jon Sheppard Director of Product Management, Privacy Todd Ruback Chief Privacy Officer & VP of Legal Affairs Todd@Ghostery.com JSheppard@Ghostery.com EU SALES +44 020 7031 8232 NORTH AMERICA SALES 917-791-5550 Sales@Ghostery.com EUSales@Ghostery.com