GDPR solution for websites and apps. Digital Content Next (DCN) webinar, Apri...Johnny Ryan
This deck outlines two key challenges that publishers of websites and apps face from the GDPR, and describes PageFair's solutions to them: Perimeter, and PageFair server side header bidder.
GDPR: New Privacy Rules, Digital Communications, Marketing OpportunitiesBob Johnson, Ph.D.
GDPR privacy regulations from the European Union bring new marketing challenges and new marketing opportunities that we review in this 90 minute workshop for the eduWeb Digital Summit conference. Topics include (1) Advertising, (2) Inquiry forms, (3) Email and text marketing, (4) College Board "Student Search" data, and (5) the new California Consumer Privacy Act.
Field Guide for Validating Premium Ad InventoryDistil Networks
Many of the current technologies used to detect fraud are great at detecting the amount of fraud (e.g., post-bid analysis). However, we need more technologies and techniques that focus on how to stop fraud before it happens. Having continuous, real-time data is important for this; but equally important are the policies and disclosures of the publishers and ad networks themselves.
Key Takeaways:
- The State of Digital Ad Fraud -- Terminology, landscape and trends
- The advertiser and publisher perspective -- Top issues and concerns
- Tools of the trade and best practices -- The different technologies and approaches to detecting and mitigating digital ad fraud
- Anatomy of a successful premium ad inventory program -- Whitepages’ guiding principles, policies and procedures
GDPR solution for websites and apps. Digital Content Next (DCN) webinar, Apri...Johnny Ryan
This deck outlines two key challenges that publishers of websites and apps face from the GDPR, and describes PageFair's solutions to them: Perimeter, and PageFair server side header bidder.
GDPR: New Privacy Rules, Digital Communications, Marketing OpportunitiesBob Johnson, Ph.D.
GDPR privacy regulations from the European Union bring new marketing challenges and new marketing opportunities that we review in this 90 minute workshop for the eduWeb Digital Summit conference. Topics include (1) Advertising, (2) Inquiry forms, (3) Email and text marketing, (4) College Board "Student Search" data, and (5) the new California Consumer Privacy Act.
Field Guide for Validating Premium Ad InventoryDistil Networks
Many of the current technologies used to detect fraud are great at detecting the amount of fraud (e.g., post-bid analysis). However, we need more technologies and techniques that focus on how to stop fraud before it happens. Having continuous, real-time data is important for this; but equally important are the policies and disclosures of the publishers and ad networks themselves.
Key Takeaways:
- The State of Digital Ad Fraud -- Terminology, landscape and trends
- The advertiser and publisher perspective -- Top issues and concerns
- Tools of the trade and best practices -- The different technologies and approaches to detecting and mitigating digital ad fraud
- Anatomy of a successful premium ad inventory program -- Whitepages’ guiding principles, policies and procedures
GDPRの機能不全
ヨーロッパの各国政府に責任
Japanese translation of "Brave 2020 DPA Report: Brave’s 2020 report on the enforcement capacity of data protection authorities".
Presentation to European Political Strategy Centre at the European CommissionJohnny Ryan
Presentation to European Political Strategy Centre at the European Commission on the market and democratic hazard of real-time bidding advertising auctions.
Quick 10 minute overview of RTB problems to be fixed at ICO stakeholders' ses...Johnny Ryan
Note that although IAB materials are presented here, Google is also a target of the complaint to regulators. The slides on this deck are necessarily limited, but more detail is in original submissions and subsequent evidence at http://fixad.tech
Presentation at UK Direct Marketing Association Data Protection Conference 2019Johnny Ryan
Real Time Bidding hurts worthy publishers, and enables a business model for untrustworthy sites, and enables the profiling of every single online person, and steals marketers money, and exposes them to risk. This can be easily fixed, if we demand it. RTB needs reform.
Cracking the Workplace Discipline Code Main.pptxWorkforce Group
Cultivating and maintaining discipline within teams is a critical differentiator for successful organisations.
Forward-thinking leaders and business managers understand the impact that discipline has on organisational success. A disciplined workforce operates with clarity, focus, and a shared understanding of expectations, ultimately driving better results, optimising productivity, and facilitating seamless collaboration.
Although discipline is not a one-size-fits-all approach, it can help create a work environment that encourages personal growth and accountability rather than solely relying on punitive measures.
In this deck, you will learn the significance of workplace discipline for organisational success. You’ll also learn
• Four (4) workplace discipline methods you should consider
• The best and most practical approach to implementing workplace discipline.
• Three (3) key tips to maintain a disciplined workplace.
Unveiling the Secrets How Does Generative AI Work.pdfSam H
At its core, generative artificial intelligence relies on the concept of generative models, which serve as engines that churn out entirely new data resembling their training data. It is like a sculptor who has studied so many forms found in nature and then uses this knowledge to create sculptures from his imagination that have never been seen before anywhere else. If taken to cyberspace, gans work almost the same way.
Memorandum Of Association Constitution of Company.pptseri bangash
www.seribangash.com
A Memorandum of Association (MOA) is a legal document that outlines the fundamental principles and objectives upon which a company operates. It serves as the company's charter or constitution and defines the scope of its activities. Here's a detailed note on the MOA:
Contents of Memorandum of Association:
Name Clause: This clause states the name of the company, which should end with words like "Limited" or "Ltd." for a public limited company and "Private Limited" or "Pvt. Ltd." for a private limited company.
https://seribangash.com/article-of-association-is-legal-doc-of-company/
Registered Office Clause: It specifies the location where the company's registered office is situated. This office is where all official communications and notices are sent.
Objective Clause: This clause delineates the main objectives for which the company is formed. It's important to define these objectives clearly, as the company cannot undertake activities beyond those mentioned in this clause.
www.seribangash.com
Liability Clause: It outlines the extent of liability of the company's members. In the case of companies limited by shares, the liability of members is limited to the amount unpaid on their shares. For companies limited by guarantee, members' liability is limited to the amount they undertake to contribute if the company is wound up.
https://seribangash.com/promotors-is-person-conceived-formation-company/
Capital Clause: This clause specifies the authorized capital of the company, i.e., the maximum amount of share capital the company is authorized to issue. It also mentions the division of this capital into shares and their respective nominal value.
Association Clause: It simply states that the subscribers wish to form a company and agree to become members of it, in accordance with the terms of the MOA.
Importance of Memorandum of Association:
Legal Requirement: The MOA is a legal requirement for the formation of a company. It must be filed with the Registrar of Companies during the incorporation process.
Constitutional Document: It serves as the company's constitutional document, defining its scope, powers, and limitations.
Protection of Members: It protects the interests of the company's members by clearly defining the objectives and limiting their liability.
External Communication: It provides clarity to external parties, such as investors, creditors, and regulatory authorities, regarding the company's objectives and powers.
https://seribangash.com/difference-public-and-private-company-law/
Binding Authority: The company and its members are bound by the provisions of the MOA. Any action taken beyond its scope may be considered ultra vires (beyond the powers) of the company and therefore void.
Amendment of MOA:
While the MOA lays down the company's fundamental principles, it is not entirely immutable. It can be amended, but only under specific circumstances and in compliance with legal procedures. Amendments typically require shareholder
Enterprise Excellence is Inclusive Excellence.pdfKaiNexus
Enterprise excellence and inclusive excellence are closely linked, and real-world challenges have shown that both are essential to the success of any organization. To achieve enterprise excellence, organizations must focus on improving their operations and processes while creating an inclusive environment that engages everyone. In this interactive session, the facilitator will highlight commonly established business practices and how they limit our ability to engage everyone every day. More importantly, though, participants will likely gain increased awareness of what we can do differently to maximize enterprise excellence through deliberate inclusion.
What is Enterprise Excellence?
Enterprise Excellence is a holistic approach that's aimed at achieving world-class performance across all aspects of the organization.
What might I learn?
A way to engage all in creating Inclusive Excellence. Lessons from the US military and their parallels to the story of Harry Potter. How belt systems and CI teams can destroy inclusive practices. How leadership language invites people to the party. There are three things leaders can do to engage everyone every day: maximizing psychological safety to create environments where folks learn, contribute, and challenge the status quo.
Who might benefit? Anyone and everyone leading folks from the shop floor to top floor.
Dr. William Harvey is a seasoned Operations Leader with extensive experience in chemical processing, manufacturing, and operations management. At Michelman, he currently oversees multiple sites, leading teams in strategic planning and coaching/practicing continuous improvement. William is set to start his eighth year of teaching at the University of Cincinnati where he teaches marketing, finance, and management. William holds various certifications in change management, quality, leadership, operational excellence, team building, and DiSC, among others.
What is the TDS Return Filing Due Date for FY 2024-25.pdfseoforlegalpillers
It is crucial for the taxpayers to understand about the TDS Return Filing Due Date, so that they can fulfill your TDS obligations efficiently. Taxpayers can avoid penalties by sticking to the deadlines and by accurate filing of TDS. Timely filing of TDS will make sure about the availability of tax credits. You can also seek the professional guidance of experts like Legal Pillers for timely filing of the TDS Return.
Digital Transformation and IT Strategy Toolkit and TemplatesAurelien Domont, MBA
This Digital Transformation and IT Strategy Toolkit was created by ex-McKinsey, Deloitte and BCG Management Consultants, after more than 5,000 hours of work. It is considered the world's best & most comprehensive Digital Transformation and IT Strategy Toolkit. It includes all the Frameworks, Best Practices & Templates required to successfully undertake the Digital Transformation of your organization and define a robust IT Strategy.
Editable Toolkit to help you reuse our content: 700 Powerpoint slides | 35 Excel sheets | 84 minutes of Video training
This PowerPoint presentation is only a small preview of our Toolkits. For more details, visit www.domontconsulting.com
3.0 Project 2_ Developing My Brand Identity Kit.pptxtanyjahb
A personal brand exploration presentation summarizes an individual's unique qualities and goals, covering strengths, values, passions, and target audience. It helps individuals understand what makes them stand out, their desired image, and how they aim to achieve it.
Kseniya Leshchenko: Shared development support service model as the way to ma...Lviv Startup Club
Kseniya Leshchenko: Shared development support service model as the way to make small projects with small budgets profitable for the company (UA)
Kyiv PMDay 2024 Summer
Website – www.pmday.org
Youtube – https://www.youtube.com/startuplviv
FB – https://www.facebook.com/pmdayconference
Skye Residences | Extended Stay Residences Near Toronto Airportmarketingjdass
Experience unparalleled EXTENDED STAY and comfort at Skye Residences located just minutes from Toronto Airport. Discover sophisticated accommodations tailored for discerning travelers.
Website Link :
https://skyeresidences.com/
https://skyeresidences.com/about-us/
https://skyeresidences.com/gallery/
https://skyeresidences.com/rooms/
https://skyeresidences.com/near-by-attractions/
https://skyeresidences.com/commute/
https://skyeresidences.com/contact/
https://skyeresidences.com/queen-suite-with-sofa-bed/
https://skyeresidences.com/queen-suite-with-sofa-bed-and-balcony/
https://skyeresidences.com/queen-suite-with-sofa-bed-accessible/
https://skyeresidences.com/2-bedroom-deluxe-queen-suite-with-sofa-bed/
https://skyeresidences.com/2-bedroom-deluxe-king-queen-suite-with-sofa-bed/
https://skyeresidences.com/2-bedroom-deluxe-queen-suite-with-sofa-bed-accessible/
#Skye Residences Etobicoke, #Skye Residences Near Toronto Airport, #Skye Residences Toronto, #Skye Hotel Toronto, #Skye Hotel Near Toronto Airport, #Hotel Near Toronto Airport, #Near Toronto Airport Accommodation, #Suites Near Toronto Airport, #Etobicoke Suites Near Airport, #Hotel Near Toronto Pearson International Airport, #Toronto Airport Suite Rentals, #Pearson Airport Hotel Suites
Personal Brand Statement:
As an Army veteran dedicated to lifelong learning, I bring a disciplined, strategic mindset to my pursuits. I am constantly expanding my knowledge to innovate and lead effectively. My journey is driven by a commitment to excellence, and to make a meaningful impact in the world.
Putting the SPARK into Virtual Training.pptxCynthia Clay
This 60-minute webinar, sponsored by Adobe, was delivered for the Training Mag Network. It explored the five elements of SPARK: Storytelling, Purpose, Action, Relationships, and Kudos. Knowing how to tell a well-structured story is key to building long-term memory. Stating a clear purpose that doesn't take away from the discovery learning process is critical. Ensuring that people move from theory to practical application is imperative. Creating strong social learning is the key to commitment and engagement. Validating and affirming participants' comments is the way to create a positive learning environment.
Falcon stands out as a top-tier P2P Invoice Discounting platform in India, bridging esteemed blue-chip companies and eager investors. Our goal is to transform the investment landscape in India by establishing a comprehensive destination for borrowers and investors with diverse profiles and needs, all while minimizing risk. What sets Falcon apart is the elimination of intermediaries such as commercial banks and depository institutions, allowing investors to enjoy higher yields.
3. Problem Set 1:
The “Facebook and Cambridge
Analytica Problem”
How to enforce control over
personal data that 3rd parties
access from your websites?
2
4. Control
Problem
Images hosted on other domains
Embedded videos
Social sharing widgets
Fonts and other resources
loaded from other domains
Commenting widgets
3rd party audio players, etc.
No data protection of personal
data accessed by 3rd party
widgets and assets.
3
9. ///
Visitor Site SSP Ad Exchange DSP DMP
serve page
request page
request bid
request segment
ad request
cookie to SSP
deliver ad
sync
deliver segment
sync
Ad request
Brand
$
store data
“Demand side”“Supply side”
15. JavaScript ad creatives can summon
unauthorized trackers.
The Daily Bugle
ADVERTISEMENT
Plus, other data leakage via SDKs on mobile, 3rd
parties on page, logging on load of 3rd party
assets, etc.
Any one of the hundreds or thousands of parties
receiving personal data via ad exchanges can
profile and / or trade with unauthorized parties.
16. Ad server SSP
Step 2.
Ad server
selects an SSP
Step 3.
SSP selects an
exchange
Step 7.
DSP serves
agency creative
Step 8.
Assets load
from CDN
Step 9.
Agency ad server
loads verification
vendor
ADVERTISERS
website.com
AD
DMP
DMP
DMP
DMP
DMP
DMP
DMP
DMP
DMP
DMP
DSP
DSP
DSP
DSP
DSP
DSP
DSP
DSP
DSP
DSP
DSP
W
inningbid
DSP
Ad server
javascript
SSP
javascript
DMP
DMP
DMP DMP
DSP
DSP
DSP
DSP
DSP
DSP
javascript
Ad server
javascript
Step 6.
Exchange serves
winning bid
Verification
javascript
Agency
ad server
Verification
vendor
Winning DSP
Step 1.
User requests
webpage
Ad exchange
Channel of data leakage
Personal data
Legend
Step 4.
Exchange sends
bid requests to
hundreds of
partners
Step 5.
Exchange lets
some DMPs/
DSPs to refresh
cookie sync
CDN
Money
This is the current process of
real-time bidding that is used
in online behavioural
advertising.
DATA LEAKAGE
IN ONLINE
ADVERTISING
Risk
17. Problem Set 2:
Consent for ad tracking
97%1 - 80%2 would reject 3rd party ad
tracking (single dialogue)
1. "Research result: what percentage will consent to tracking for advertising?", PageFair, September
2017 (URL: https://pagefair.com/blog/2017/new-research-how-many-consent-to-tracking/)
2. “Europe Online: an experience driven by advertising”, IAB Europe, 2017, p. 7 (URL: https://
www.iabeurope.eu/wp-content/uploads/2017/09/EuropeOnline_FINAL.pdf).
18. A non-compliant GDPR consent
screen (single screen)
[Site] and our partners set cookies and collect
information from your [browser] [device] to provide
you with [website] content, deliver relevant
advertising and understand [web] audiences. [View
partner info]
We use technology such as cookies on our site to
collect and use personal data to personalize
content and ads, to provide social media features
and to analyse our traffic. We also share
information about your use of our site with our
partners who also use technologies such as
cookies to collect and use personal data to
personalize content and ads, to provide social
media features and to analyse our traffic on our
site and across the internet. View info on our
partners and their use of this data. You can always
change your mind and revisit your choices.
OK
Manage use of
your data
Appears to be hard
to not give consent
breach of the GDPR, Article 4,
paragraph 11, and Recital 42, and
Recital 32.
No mention of the
duration for which
data are stored.
breach of the GDPR, Article 13,
paragraph 2, a
No precise
description of a
purpose of
processing, and no
notification of
profiling.
breach of the GDPR, Article 4,
paragraph 11, and Article 13,
paragraph 1, c, and paragraph 2,
f, and Recital 60.
Conflation of
multiple purposes
breach of the GDPR, Article
5, paragraph 1, b, Recital 32,
and Recital 43.
19. But the GDPR requires a
separate consent for each
purpose
20. Website SSP Ad
Exchange
DSP DMP Advertiser Fraud
verification
Ad server Analytics
1
To inform the agents of prospective advertisers that you are on visiting the web site, so that the website
can solicit bids for the opportunity to show an ad to you.
Controller Processor Processor
2
To combine your browsing habits with data they already have collected about you (and infer further
insights about you) so that they can select relevant ads for you.
These ads may be for products you have shown interest in previously.
This profile may include your income bracket, age and gender, habits, social media influence, ethnicity,
sexual orientation, religion, political leaning, etc.
Controller Controller Controller Controller Controller
3
To use your browsing habits to build or improve a profile about you, in order to sell these data to partners
for online marketing, credit scoring, insurance companies, background checking services, and law
enforcement.
This profile may include your income bracket, age and gender, habits, social media influence, ethnicity,
sexual orientation, religion, political leaning, etc.
Controller Controller
4 To identify whether you are the kind of person that its advertising clients want to show ads to. Processor Controller Controller
5
To combine your browsing habits with data they already have collected about you (and infer further
insights about you), to personalize the service or product that it offers you.
This may include determining whether to offer you discounts.
This profile may include your income bracket, age and gender, habits, social media influence, ethnicity,
sexual orientation, religion, political leaning, etc.
Controller
6 To monitor your behavior on websites in order to determine if you have viewed or interacted with an ad. Controller Controller Processor
7
To determine whether you have purchased one of its products or services following your viewing of or
interaction with an ad that it has paid for.
Controller
8
To combine your browsing habits with data they already have collected about you (and infer further
insights about you), to verify that you are human rather than a “bot” attempting to defraud advertisers.
This profile may include your income bracket, age and gender, habits, social media influence, ethnicity,
sexual orientation, religion, political leaning, etc.
Controller
9
To record the number of times you have viewed each ad, to prevent a single ad being shown to you too
frequently.
Controller
10
To combine your browsing habits with data they already have collected about you (and infer further
insights about you), to understand how you and people similar to you browse the web.
This profile may include your income bracket, age and gender, habits, social media influence, ethnicity,
sexual orientation, religion, political leaning, etc.
Controller
Examples of the many purposes of data processing in
online behavioral advertising.
Each purpose requires its own opt-in.
21. Gordon House, Barrow
St, Dublin 4, Ireland
Acxiom GmbH
Martin Behaim Strasse 12,
63263 Neu-Isenburg,
Germany
Google Ltd.
Viewing 2 of 251 partners
Help keep Example.com profitable
Learn about your data rights here.
OFF
Let these companies combine your browsing
habits for 6 months with data they already have
collected about you to improve their profile of
you, including by inferring insights, to show you
relevant advertising. (This profile may include
your income bracket, age and gender, habits,
social media influence, ethnicity, sexual
orientation, religion, political leaning, etc.).
Item 1 of 9
View details
View details
Next
Purpose of processing,
and notification of
profiling.
Article 4, paragraph 11, and Article
13, para 1, c, and para 2, f.
Duration
Article 13, para 2, a.
Granular opt-in for
several purposes
Recital 32, and Article 29 Working
Party Guidance November 2017
Details of rights to
complain to supervisory
authority, and to access,
correct, and transfer
data, etc.
Article 13, para 2, b, c, and d.
unambiguous, specific
affirmative action. Not
yes by default.
Article 4, para 11, and Recital 32.
contact details of the
Data controller, and
list of categories of
processor.
Article 13, para 1, a, and Recital 42.
An opt-in for each processing purpose
22. Help keep Example.com profitable
Learn about your data rights here.
Let these companies combine your browsing
habits for 6 months with data they already have
collected about you to improve their profile of
you, including by inferring insights, to show you
relevant advertising. (This profile may include
your income bracket, age and gender, habits,
social media influence, ethnicity, sexual
orientation, religion, political leaning, etc.).
Item 1 of 9 Next
CONFIRM?
Gordon House, Barrow
St, Dublin 4, Ireland
Acxiom GmbH
Martin Behaim Strasse 12,
63263 Neu-Isenburg,
Germany
Google Ltd. View details
View details
Viewing 2 of 251 partners
This design requires
Two tap / click / drag
actions to signal
consent explicitly
Explicit consent for special categories of personal data
“Explicit consent” (to
process special
categories of data)
Article 9, paragraph 2, a.
25. READY FOR
THE TREND?Regulations: European Union. China (May).
South Korea. Brazil. Argentina. California.
Platforms: Apple Safari, Firefox, Brave. VPNs…
27. Perimeter is a “regulatory firewall” that gives you
control of every 3rd party on your websites & apps to
eliminate GDPR risk, maximize the value of your
audience, and speed up your website.
28. Whitelist or blacklist 3rd parties, or put them on the greylist for sanitization.
Blacklist
Preemptively block connections to any
unauthorized 3rd party in your pages,
apps, widgets or ads.
Examples:
• Unauthorized trackers
• High risk vendors
• 3rd parties without appropriate consent,
or another legal basis
Greylist
Safely enable 3rd parties with high-
speed proxying and on-the-fly stripping
of dangerous personal data. This cleans
tracking cookies & style sheets, and
anonymizes HTTP headers, in real time.
Examples:
• Assets loaded from other domains.
• Essential vendors with unnecessary
tracking cookies.
• Direct/PMP video ad serving.
Whitelist
Allow connections to companies you
trust. Conditionally whitelist trusted
companies subject to user consent. Your
whitelist, your rules.
Examples:
• Contracted data processors
• 3rd parties with appropriate consent, or
another legal basis
• Trusted Partners
29. Perimeter allows your direct
campaigns to serve while blocking
unauthorized data leakage and
personal data collection. It protects
you and your advertisers from GDPR
risk. That means you can offer
advertisers peace of mind, as well as
reach.
Direct Programmatic
You choose which ad companies
you trust to serve ads or cookies. If
you choose, you can whitelist
verification vendors etc. Optionally
works with consent solutions.
Standard RTB
Consent-free RTB advertising with
zero personal data, based on
advanced anonymization and
proprietary server-side rendering.
PageFair PureBid
Perimeter Protects
Your Ad Business
(optional)
30. -contextual segment ID (coming soon)
[if we can place a non-personal cookie]
-1st party segment ID (coming soon)
NON-PERSONAL DATA
Non-personal data in PureBid bid requests:
-anonymized IP address (area geo-locating)
-anonymized user agent string
-full URL, if common (truncated URL if rare)
31. Fossil Fuel Renewable Energy
N20
C02
Regulatory disincentive
OLD INDUSTRY
Regulatory incentive
NEW CLEAN INDUSTRY
32. Ads (Ethical Data)Ads (Conventional Data)
Personal data Non-personal data
Regulatory disincentive
OLD INDUSTRY
Regulatory incentive
NEW CLEAN INDUSTRY
Fossil Fuel Renewable Energy
N20
C02
33. Ads (Ethical Data)Ads (Conventional Data)
Personal data
Ads (Conventional Data)
Personal data
(with consent and
enforceable protection)
Non-personal data
Small, premium market
//
Regulatory disincentive
OLD INDUSTRY
Regulatory incentive
NEW CLEAN INDUSTRY
+
Fossil Fuel Classic CarsRenewable Energy
N20
C02
+
34. 5. Leverage 1st party data
4. Relevance for advertiser
3. 100% Reach for advertiser
2. Neutralize risk for advertiser
1. Neutralize risk for publisher
35. 1.Personal data in adtech exposes us all to
risk.
2.Consent is the future (2019?) win for
brands and publishers, not for today’s RTB.
Very few will give consent. What is Plan B?
3. Non-personal data is the answer for May.
@johnnyryanSummary