Companies collect vast amounts of personal data from various sources such as social media logins, online quizzes, purchases, internet activity, and IoT devices. This data is used for targeted ads, product customization, insurance rates, and credit reports. However, data can also be abused, such as for political targeting, identity theft if breached, or changing credit scores based on behaviors. Individuals can take steps to secure their data by controlling profiles and opting out of data collection, but the US third party doctrine allows government collection of data shared with companies without warrants.
This article written Diarmaid Byrne, Editor, STQ, was published in issue 08 of the Social Technology Quarterly.
Summary: In the face of rising demand for data, privacy and ownership become a critical concern as vast amounts of data are accessed and bartered without the knowledge of people. In such scenarios, it is crucial to determine practices towards maintaining privacy.
AI for humans - the future of your digital selfSpeck&Tech
ABSTRACT: In this talk, George will demonstrate the extent and power of personal data collected by technology companies. He will explore the potential of personal data to do both good and bad, the dangers of giving up your "digital DNA", and the value these companies extract from this data.
Data rights are finally legally recognised. With the combination of GDPR & rising awareness of personal data abuse, we might eventually be able to control our data, or at least understand as much about our digital footprint as profit-driven companies do.
AI is only possible because it has data. Imagine your data being used to benefit you, instead of targeting you with gambling adverts. Imagine the potential for next-generation research to understand our society, which can only happen if we break data out from being locked in corporate databases. Data rights are just the start, now we need to use them.
BIO: George Punter holds a first class Masters degree from Imperial College London in Electronics & Information Engineering. He co-founded Ethi (ethi.me), a startup that aims to make controlling your personal data easier, and allow users to use their personal data for their own benefit, or for social good. Ethi is currently partnering with a cyber security firm, TurgenSec, to help create next-generation, user-centred security.
U.S. Data Privacy Report - Patchy preparation for GDPR shows U.S. businesses ...Ebiquity
Several months ago we invited our clients to join our benchmarking study to better understand the current GDPR related efforts of U.S.-based brands. I am delighted to share with you the results from it presented in our report produced in partnership with the Digital Analytics Association (DAA).
Learn more: https://www4.ebiquity.com/data-privacy
This article written Diarmaid Byrne, Editor, STQ, was published in issue 08 of the Social Technology Quarterly.
Summary: In the face of rising demand for data, privacy and ownership become a critical concern as vast amounts of data are accessed and bartered without the knowledge of people. In such scenarios, it is crucial to determine practices towards maintaining privacy.
AI for humans - the future of your digital selfSpeck&Tech
ABSTRACT: In this talk, George will demonstrate the extent and power of personal data collected by technology companies. He will explore the potential of personal data to do both good and bad, the dangers of giving up your "digital DNA", and the value these companies extract from this data.
Data rights are finally legally recognised. With the combination of GDPR & rising awareness of personal data abuse, we might eventually be able to control our data, or at least understand as much about our digital footprint as profit-driven companies do.
AI is only possible because it has data. Imagine your data being used to benefit you, instead of targeting you with gambling adverts. Imagine the potential for next-generation research to understand our society, which can only happen if we break data out from being locked in corporate databases. Data rights are just the start, now we need to use them.
BIO: George Punter holds a first class Masters degree from Imperial College London in Electronics & Information Engineering. He co-founded Ethi (ethi.me), a startup that aims to make controlling your personal data easier, and allow users to use their personal data for their own benefit, or for social good. Ethi is currently partnering with a cyber security firm, TurgenSec, to help create next-generation, user-centred security.
U.S. Data Privacy Report - Patchy preparation for GDPR shows U.S. businesses ...Ebiquity
Several months ago we invited our clients to join our benchmarking study to better understand the current GDPR related efforts of U.S.-based brands. I am delighted to share with you the results from it presented in our report produced in partnership with the Digital Analytics Association (DAA).
Learn more: https://www4.ebiquity.com/data-privacy
Strata Conference NY: The Accidental Chief Privacy OfficerJim Adler
Strata Conference
New York
September 23, 2011
http://strataconf.com/stratany2011/public/schedule/detail/21484
http://youtu.be/PKUI9iz0l9g
The first generation of chief privacy officers were typically attorneys, charged with the formulation and enforcement of privacy policies. Times have changed. Given the speed and complexity of technology, the privacy policy is necessary but hardly sufficient. Because we live much of our lives in public, both online and offline, the Internet is transforming the anonymity of our cities into the familiarity of small towns. Privacy is deeply ingrained within the technology that manages this personal data. The products and services driving this transformation must consider privacy from the earliest design sessions.
Today’s engineer CPO, and I’m one, must deeply involve themselves with the technology and product design process to bake-in privacy. This new breed of CPO is comfortable in an engineering scrum, product focus group, reviewing pending regulations, or analyzing A/B test results. They have the historical awareness, frontier spirit, regulatory caution, technical chops, and innovator’s curiosity to work through the toughest data issues. The promise of the engineer CPO is that products, not only safeguard privacy, but compete on it.
Operationalizing a Vision for the Monetization of Telco Consumer DataPrecisely
Telecommunications companies have an abundance of subscriber activity data at their fingertips, which can be highly valuable to third-party organizations when it comes to location-based decision making. But how can telcos properly enrich this data with the context needed in order to successfully turn that data into a revenue stream for their business?
View this short on-demand webcast, where our Customer Information Director, Dominic Tomey, discusses the following:
• Why location intelligence, particularly mobile trace data, can be so valuable for clients when making decisions based on location – particularly for retail, banking and other financial institutions
• How Precisely worked with a large provider of wireless telecommunications to successfully monetize their consumer data
• How to correctly apply contextual enrichment in order to derive the most value from subscriber activity data – including the use of demographics and point of interest data
• How to drive results through self-service environments in order to visualize the outputs for further analysis, as well as for Machine Learning and AI applications
Data and Ethics: Why Data Science Needs OneTim Rich
This was a talk I gave at SXSW 2016. It outlines the current state of applied ethics in data science as a profession. Describes key reasons a code should be constructed and also proposes a framework to begin discussion.
Over the last five years, global data center needs have grown exponentially.
The time is now for tenants seeking data center space and solutions. Providers are offering 10-15 percent discounts, concessions and tenant improvements on some deals. However, increasing demand and a pull-back on construction mean that by late 2015, the market will tighten and landlords will take control.
Learn more about the current data center market in North America, and where it's headed.
Notes from the Observation Deck // A Data Revolution gngeorge
Notes from the Observation Deck will provide you with an examined look at the interesting phenomena and trends taking place around us today. We present them to you with the hope of sparking broader conversations, debates and ideas. Please use this as a resource for knowledge, inspiration and enjoyment.
GDPR Is Coming – Are Search Marketers Ready?MediaPost
The EU’s General Data Protection Regulation (GDPR) is the most significant change to consumer privacy laws in decades and the enforcement date is approximately 1 month away. The standards for data collection and use in the EU will significantly differ from those in the United States. This session will breakdown the differences and discuss methods for compliance going forward.
PRESENTER
Gary Kibel, Partner, Davis & Gilbert LLP @GaryKibel
2016 was an important year for privacy on many fronts. From Privacy Shield to the imminent arrival of a new U.S. president; from Brexit to ongoing breach law developments; and from FCC changes for ISPs to the upcoming arrival of GDPR—there wasn’t a single dull moment. In this eLunch, Winston’s Privacy & Data Security Practice Chair Liisa Thomas and Partner Rob Newman looked back at 2016 and discussed what to expect in the privacy world in 2017 and beyond.
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...Adler Law Group
Affiliate marketing is one of the most cost-effective techniques for monetizing web site traffic and driving sales. Unfortunately, it has a reputation for high risk. While the industry is unlikely to ever be risk-free, it is possible to manage risk by: (1) understanding how techniques like behavioral and contextual targeting affect consumers, affiliates and merchants, (2) understanding the legal and regulatory environment, (3) understating risks involved with prospective marketing partners, (4) using and maintaining proper contracts that allocate risk and provide appropriate indemnifications, and (5) keeping informed about the changes in technology, marketing practices and the regulatory environment. Attendees will learn how to identify these issues and develop policies and procedures to keep informed about the current technology, marketing strategies and regulatory compliance.
Topics covered include:
Behavioral/Contextual Advertising
Regulatory/Industry Compliance : FTC Guides & Enforcement Actions
CAN-SPAM compliance
IP Law: Rules governing use of others™ Trademarks/Keywords, Right of Publicity/Endorsement Issues.
Identifying, protecting against, and disputing accusations of Click-Fraud
Privacy in today’s connected world is an illusion. All of our transactional data, both online and real-world can be mined. If someone truly wanted access to your information, they could have it with relatively little effort. As a result, privacy has begun to be regarded as a luxury item. What are the risks associated with your behavior? Why are data breaches so prevalent? What can you do to protect yourself? In this presentation, I share subject matter expertise derived from data security research and project-specific cybersecurity trend analysis. I share some practices I’ve developed in an effort to be better educated personally and make more informed choices about my own behavior.
How Tracking Your Personal Data Really Adds Up | SoGoSurveySogolytics
The way your phone and computer know everything about you -- convenient or creepy? Keep track of the data you're giving away, because you can believe there are plenty of others tracking everything they can find out about you...
Strata Conference NY: The Accidental Chief Privacy OfficerJim Adler
Strata Conference
New York
September 23, 2011
http://strataconf.com/stratany2011/public/schedule/detail/21484
http://youtu.be/PKUI9iz0l9g
The first generation of chief privacy officers were typically attorneys, charged with the formulation and enforcement of privacy policies. Times have changed. Given the speed and complexity of technology, the privacy policy is necessary but hardly sufficient. Because we live much of our lives in public, both online and offline, the Internet is transforming the anonymity of our cities into the familiarity of small towns. Privacy is deeply ingrained within the technology that manages this personal data. The products and services driving this transformation must consider privacy from the earliest design sessions.
Today’s engineer CPO, and I’m one, must deeply involve themselves with the technology and product design process to bake-in privacy. This new breed of CPO is comfortable in an engineering scrum, product focus group, reviewing pending regulations, or analyzing A/B test results. They have the historical awareness, frontier spirit, regulatory caution, technical chops, and innovator’s curiosity to work through the toughest data issues. The promise of the engineer CPO is that products, not only safeguard privacy, but compete on it.
Operationalizing a Vision for the Monetization of Telco Consumer DataPrecisely
Telecommunications companies have an abundance of subscriber activity data at their fingertips, which can be highly valuable to third-party organizations when it comes to location-based decision making. But how can telcos properly enrich this data with the context needed in order to successfully turn that data into a revenue stream for their business?
View this short on-demand webcast, where our Customer Information Director, Dominic Tomey, discusses the following:
• Why location intelligence, particularly mobile trace data, can be so valuable for clients when making decisions based on location – particularly for retail, banking and other financial institutions
• How Precisely worked with a large provider of wireless telecommunications to successfully monetize their consumer data
• How to correctly apply contextual enrichment in order to derive the most value from subscriber activity data – including the use of demographics and point of interest data
• How to drive results through self-service environments in order to visualize the outputs for further analysis, as well as for Machine Learning and AI applications
Data and Ethics: Why Data Science Needs OneTim Rich
This was a talk I gave at SXSW 2016. It outlines the current state of applied ethics in data science as a profession. Describes key reasons a code should be constructed and also proposes a framework to begin discussion.
Over the last five years, global data center needs have grown exponentially.
The time is now for tenants seeking data center space and solutions. Providers are offering 10-15 percent discounts, concessions and tenant improvements on some deals. However, increasing demand and a pull-back on construction mean that by late 2015, the market will tighten and landlords will take control.
Learn more about the current data center market in North America, and where it's headed.
Notes from the Observation Deck // A Data Revolution gngeorge
Notes from the Observation Deck will provide you with an examined look at the interesting phenomena and trends taking place around us today. We present them to you with the hope of sparking broader conversations, debates and ideas. Please use this as a resource for knowledge, inspiration and enjoyment.
GDPR Is Coming – Are Search Marketers Ready?MediaPost
The EU’s General Data Protection Regulation (GDPR) is the most significant change to consumer privacy laws in decades and the enforcement date is approximately 1 month away. The standards for data collection and use in the EU will significantly differ from those in the United States. This session will breakdown the differences and discuss methods for compliance going forward.
PRESENTER
Gary Kibel, Partner, Davis & Gilbert LLP @GaryKibel
2016 was an important year for privacy on many fronts. From Privacy Shield to the imminent arrival of a new U.S. president; from Brexit to ongoing breach law developments; and from FCC changes for ISPs to the upcoming arrival of GDPR—there wasn’t a single dull moment. In this eLunch, Winston’s Privacy & Data Security Practice Chair Liisa Thomas and Partner Rob Newman looked back at 2016 and discussed what to expect in the privacy world in 2017 and beyond.
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...Adler Law Group
Affiliate marketing is one of the most cost-effective techniques for monetizing web site traffic and driving sales. Unfortunately, it has a reputation for high risk. While the industry is unlikely to ever be risk-free, it is possible to manage risk by: (1) understanding how techniques like behavioral and contextual targeting affect consumers, affiliates and merchants, (2) understanding the legal and regulatory environment, (3) understating risks involved with prospective marketing partners, (4) using and maintaining proper contracts that allocate risk and provide appropriate indemnifications, and (5) keeping informed about the changes in technology, marketing practices and the regulatory environment. Attendees will learn how to identify these issues and develop policies and procedures to keep informed about the current technology, marketing strategies and regulatory compliance.
Topics covered include:
Behavioral/Contextual Advertising
Regulatory/Industry Compliance : FTC Guides & Enforcement Actions
CAN-SPAM compliance
IP Law: Rules governing use of others™ Trademarks/Keywords, Right of Publicity/Endorsement Issues.
Identifying, protecting against, and disputing accusations of Click-Fraud
Privacy in today’s connected world is an illusion. All of our transactional data, both online and real-world can be mined. If someone truly wanted access to your information, they could have it with relatively little effort. As a result, privacy has begun to be regarded as a luxury item. What are the risks associated with your behavior? Why are data breaches so prevalent? What can you do to protect yourself? In this presentation, I share subject matter expertise derived from data security research and project-specific cybersecurity trend analysis. I share some practices I’ve developed in an effort to be better educated personally and make more informed choices about my own behavior.
How Tracking Your Personal Data Really Adds Up | SoGoSurveySogolytics
The way your phone and computer know everything about you -- convenient or creepy? Keep track of the data you're giving away, because you can believe there are plenty of others tracking everything they can find out about you...
A keynote presentation about data privacy and policy, and the ways leading retailers use data and advanced analytics to humanize and personalize consumer experiences of their brand.
Big Data and Big Law at Walmart - StampedeCon 2013StampedeCon
At the StampedeCon 2013 Big Data conference in St. Louis, Anthony Martin, Chief Privacy and Information Security Counsel at Walmart, presented Big Data and Big Law at Walmart. This is the story of one global, multichannel company’s walk through the increasingly complicated Legal, Compliance, Security maze while trying to recognize the implicit value of Big Data programs.
Why private search is important for everone and how you can protect your pers...Kelly Finnerty
Startpage, the world’s most private search engine, is helping educate students on data privacy and protection with our Private Search 101 university lesson plan.
Are you a student or professor interested in learning more about how to protect your privacy online? Learn more with our accessible, informative Private Search 101 university lesson plan.
Why private search is important for everone and how you can protect your pers...Kelly Finnerty
Startpage, the world’s most private search engine, is helping educate students on data privacy and protection with our Private Search 101 university lesson plan.
Are you a student or professor interested in learning more about how to protect your privacy online? Learn more with our accessible, informative Private Search 101 university lesson plan.
You Can Run, But You Can't Hide! - How far should the government regulate the Internet? -Has data mining gone too far? (Great secondary research project.) Digital footprint makeover handouts available at: digitalmakeover.wikispaces.com Find ideas for classroom instruction, also, on this wikispace.
This presentation was a breakout session at WLMA14 and has been updated to reflect recent revelations on medical information mining. We did not even get to discuss the EDUCATIONAL DATA MINING that is occurring on our students and children! Caveat!
Marketers know they need complete data to deliver a great customer experience, but few actually have built the data they need. Maybe they don't know how, but more likely they just are spending their time on other things that seem more important. This presentation shows the great things they could do if they had better data in place, in the hopes of convincing them to give data a higher priority. It has kittens too.
We Know What You Did Last Summer (and Last Night) - ForgeRock Identity Live A...ForgeRock
Stacey Higginbotham - Journalist - As we add the internet to more devices, we're also making more information about ourselves available online. Not necessarily to the public, but to family, marketers, and even law enforcement. What are we sharing? With whom? And what should we do about it?
There has been very little analysis of big data ethics from an Ignatian or Catholic Social Thought point of view. The Jesuit tradition, with its focus on persons and community, as well as the CST tradition, certainly provides some direction for navigating these difficult Big Data questions.
My presentation in Week of Robotics, Helsinki, Finland on November 28th, 2014. My purpose was to initiate discussion about the possibilities and risks of using Big Data in combination with robotics, especially from ethical perspective. My main reference was Davis & Patterson (2012): Ethics of Big Data which I recommend as further reading.
Decoding Social Data Employing Non Discriminatory Analytics in Creating New D...Mahmoud Dasser
7th Enterprise Innovation CXO Forum | Questex Events
SINGAPORE , 28 February 2019
Decoding Social Data Employing Non Discriminatory Analytics in
Creating New Differentiators for Digital Enterprise
Key Talking points:
Competitive advantage from Social Data continues to grow
Combine Social Data with more Data Sources to:
• Improve relationship & Customer Experience
• Gain market insights and Innovate Faster
• Drive operational Efficiency
• Improve Brand Health
• Generate New revenue
• Improve marketing effectiveness
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
2. Fair Warning
• This subject will probably get political.
• Healthy conversation is awesome though!
• All opinions are welcome!
• Lets be good to each other?
3. What are we talking
about?
• Data Brokers?
• Data Exchanges?
• Data Miners?
• Data has been referred to recently as digital gold.
Companies are collecting more data than they
even know to do with. But why?
• How do they get this data?
• What do they do with it??
• Why???
4. What does my Data Look
like?
• https://adssettings.google.com
• Similar pages on Facebook.
• Good news, its customizable!
8. How is this data collected?
Log in through Facebook!
9. Online Quizzes
• Basically a gold mine of data points
• This is how Cambridge Analytica collected their
information.
10. Daily Activity
• Purchasing
• Salesforce, POS systems
• Just surfing the internet
• 90% of all data today was generated in the last 2
years. 2.5 quintillion bytes of data per day.
11. IoT Devices
• Its mostly a bunch of devices that record data,
send it somewhere for processing, and then often
return data back to the original device.
• These devices are supposed to make it easier to
bridge the gap between the physical and logical
world
• In other words the collect information based on
out interaction with the physical world
• Fitness Monitors and Trackers
• GPS tools
• Traffic Cameras
• Cameras in general!
• Smart home devices
• Scooters?
12. Same old story
• Last but not least, the government is still a great
way to collect information and data points
• Court Records
• Civil records
• Driving Record
• Voter registration
• Property assessments
• Whatever else the government wants to make
available
16. Targeted Ads and
Product Customization
Insurance Agencies
Credit Reports
Social Studies
What about when these target addictive personalities?
Or political targets?
Robocalls?
Can a company change your credit based off of spending
habits? Online Activity?
Collecting traffic light data? Speed data based on GPS?
Location data?
Using stats as a stereotype? Anti-vaxxers? Creating social divide
or even voting districts?
17. Bad data custodians
• Once this data is collected who’s responsible?
• Equifax, Facebook
• Threats
• Credential Stuffing
• Synthetic Identities
• Spear Phishing
• Identity Theft
• Who is stolen data sold to?
19. What is my data worth?
To whom?
• $47: Value per user to Facebook
• $240: Value per user to the Ad industry
• $10: Value per person to a Credit Report Agency
• $223: Value per user to Google
• This number can greatly increase if your looking at
things like “mesothelioma lawyer” or “luxury
hotel”
• Lawyer ad click through can be as much as $50 a
click
• High Income areas (Americas, Europe) and
women’s data are worth more.
20. What is my data worth?
To whom?
Data breach information is bought and sold all the
time, and not just on the dark web…
22. Secure your data
• Safeguarding my data
• This is not just IP and device tracking
• Control your data/Sock profiles
• Opt out
• Clean ups?
• Tangle web, DBs refill.
• Google/Facebook settings
• https://disconnect.me/
• Understand where your data goes:
• Add company name to middle name
field.
• Email + company @gmail.com
• Adjust your settings:
23. Sell your data
• http://360ofme.com/
• http://datacoup.com/
• New products coming out everyday
Use your data
• What habits do you have?
• Mint
24. US Third Party Doctrine
• The third-party doctrine is a United States legal
theory that holds that people who voluntarily
give information to third parties—such as
banks, phone companies, internet service
providers (ISPs), and e-mail servers—have "no
reasonable expectation of privacy." A lack of
privacy protection allows the United States
government to obtain information from third
parties without a legal warrant and without
otherwise complying with the Fourth
Amendment prohibition against search and
seizure without probable cause and a
judicial search warrant.