SlideShare a Scribd company logo
Tech Talk: Data Privacy,
Ownership & IoT
December 11, 2017, 12:30 pm- 12:45 pm
By Lily Lim, Partner, Finnegan Henderson
The Intersection of IoT and Robotics: How Sensors, Data, and
Intelligence Are Redefining Industry
1
IoT Data: Ownership and Rights
Data Collected
Correlations Made
with Data Collected
Personally
Identifiable
Information
Company has ownership
rights:
Copyright, Trade Secrets,
Know-how, Patents
Company has ownership
rights to data that is mined
or correlated
Users Have Rights to
Control Their Personal
Data
2
Laws Protecting PII
 Personally Identifiable Information (PII)
 Federal Statutes
 Financial Records: Gramm-Leach-Bliley Act
 Health Records: HIPAA
 Educational Records: FERPA
 Interception of Communications: Electronic Communications Privacy
Act
 State Laws:
 Massachusetts Defines PII as: Person’s last name, first initial,
combined with SSN, driver’s license, bank account, credit card
account,
 California Constitutional Right to Privacy
 Illinois: PII includes user names with password & biometric data
 European General Data Protection Regulation (GDPR)
3
Data Collected
Cost of Breach of Privacy Data (External Attack)
 Class Actions:
 Target Breach: over $300 Million
 Home Depot: over $250 Million to date
(Forbes Magazine estimates total in recurring
expenses will be $10 Billion).
 Deal Devalued:
 Yahoo! Breach: Verizon cut $350 Million from
its deal with Yahoo! after the news of the
breach was released.
 Clean-up/ Rebuild costs:
 Sony Pictures Entertainment Breach
(Copyrighted materials, not yet released
movies, Sony’s trade secrets like business
negotiations):
 Clean-up costs $35 Million for FY 2015.
 Rebuilding Sony’s computer systems
estimated at $83 Million.
4
Open Source Software Vulnerabilities
 Apache Open Source License (Web
Servers) :
 Apache Strut vulnerability
 Equifax breach September 2017
(personal data for 143 million
people leaked)
 Apache Struts web-application
software had a bug (CVE-2017-
5638) for which Apache released a
patch in March 6, 2017.
 Equifax did not apply the patch
and the breach started in May
2017.
5
Data Collected
Bluetooth Vulnerabilities
 Bluetooth Vulnerability:
 USCERT (United States Computer
Emergency Readiness Team) issued
warning
 BlueBorne: potentially affecting millions of
IoT devices, mobile phones, and
computers.
 Remote attacker can take control of
affected devices
 Impacted systems:
 Windows, iOS, Android
 Affected Vendors:
 Apple, Google, Microsoft, Samsung,
Android
 Patches available for Windows, and iOS,
but patching for Android was delayed due
to disperse ecosystem
 USCERT Recommended action: disable
Bluetooth
6
Data Collected
IoT Data: Penalties When PII Collected Without
User Consent
 Data Mining Contacts from Email
Accounts
 Google Buzz allegedly automatically pulled
contacts from users’ Gmail accounts into a social
network without informing them.
 FTC Consent Decree: Google agreed to
implement a comprehensive privacy program and
to 20 years of privacy audits.
 Sweeping Up WiFi Passwords
 Google Street View: collection of passwords, email
and personal information from unsecured networks
collected by Google cars while the collected
location data for Street View.
 Google agreed to: $7 Million fine; self-policing of
employees, teaching public how to fend off privacy
violations.
7
Data Collected
Data Handling “Mishaps”
 Uber’s “God View” Tool and “GreyBall”
Program
 FTC is inquiring about Uber’s “data-handling
mishaps” including employees’ “misuse of
‘god view,’ a tool that had previously let
employees closely track individual riders,
such as politicians and celebrities.”.
 Department of Justice reportedly opened a
criminal probe regarding Uber’s use of its
Greyball program, which allegedly helped it
circumvent scrutiny from local transportation
regulators
8
Data Collected
Maximizing Data Set Values By Mitigating PII Risks
 Companies can use PII and sell it:
 Privacy-By-Design and Security-By-Design
 Rather than address privacy and security issues on the back end
of a product cycle, companies are making efforts to integrate
privacy and security into earlier phases of the design cycle.
 Privacy Policy: User Consent
Data Collected
9
Lily Lim, Partner
Finnegan Henderson
Intellectual property, cybersecurity, and privacy law.
Ms. Lim provides strategic counseling on cybersecurity and privacy
best practices, including security-by-design and privacy-by-design,
utilizing her depth of knowledge in both law and technology. Ms. Lim
is a Certified Information Privacy Professional (CIPP/US). Ms. Lim is
a frequently invited speaker and contributes to the Sedona
Conference Working Group on data security and privacy issues.
Ms. Lim has prevailed at trial and on appeal in cases involving
patent, copyright, and trade secret disputes in federal court and
before the U.S. International Trade Commission (ITC). She
represents U.S. and international clients whose technologies include
integrated circuits, satellite technologies, wireless devices, software,
and medical devices and diagnostic equipment. Ms. Lim also
provides strategic pre-litigation counseling regarding negotiating
patent and software licenses and international manufacturing and
marketing agreements.
Prior to joining private practice, Ms. Lim served as a law clerk to the
Honorable S. Jay Plager of the U.S. Court of Appeals for the
Federal Circuit. She also worked as a spacecraft navigation
engineer at NASA’s Jet Propulsion Laboratory.
Email:
Lily.Lim@Finnegan.com
10Copyright 2017

More Related Content

What's hot

Personally Identifiable Information Protection
Personally Identifiable Information ProtectionPersonally Identifiable Information Protection
Personally Identifiable Information Protection
PECB
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
tomasztopa
 
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...VALLOYD
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
amiable_indian
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
Jennifer Polack
 
GDPR Is Coming – Are Emailers Ready?
GDPR Is Coming – Are Emailers Ready?GDPR Is Coming – Are Emailers Ready?
GDPR Is Coming – Are Emailers Ready?
MediaPost
 
Open Letter From EFF Opposing CISPA
Open Letter From EFF Opposing CISPA Open Letter From EFF Opposing CISPA
Open Letter From EFF Opposing CISPA
Small Business Trends
 
Data Protection Presentation
Data Protection PresentationData Protection Presentation
Data Protection Presentation
IBM Business Insight
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data Privacy
WilmerHale
 
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Eric Vanderburg
 
Alfredo Mendez - Mexico - personal data protection and transparency
Alfredo Mendez - Mexico - personal data protection and transparencyAlfredo Mendez - Mexico - personal data protection and transparency
Alfredo Mendez - Mexico - personal data protection and transparency
Alfredo Mendez
 
Eight principles of consumer data privacy
Eight principles of consumer data privacyEight principles of consumer data privacy
Eight principles of consumer data privacy
Solix Technologies, Inc
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
WilmerHale
 
Data protection regulation
Data protection regulationData protection regulation
Data protection regulation
Greg Ezeilo
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019
Ulf Mattsson
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
G Prachi
 
20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law
Klemchuk LLP
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and Security
AnuMarySunny
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
cliff_rudolph
 

What's hot (20)

Personally Identifiable Information Protection
Personally Identifiable Information ProtectionPersonally Identifiable Information Protection
Personally Identifiable Information Protection
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Review questions
Review questionsReview questions
Review questions
 
GDPR Is Coming – Are Emailers Ready?
GDPR Is Coming – Are Emailers Ready?GDPR Is Coming – Are Emailers Ready?
GDPR Is Coming – Are Emailers Ready?
 
Open Letter From EFF Opposing CISPA
Open Letter From EFF Opposing CISPA Open Letter From EFF Opposing CISPA
Open Letter From EFF Opposing CISPA
 
Data Protection Presentation
Data Protection PresentationData Protection Presentation
Data Protection Presentation
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data Privacy
 
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
 
Alfredo Mendez - Mexico - personal data protection and transparency
Alfredo Mendez - Mexico - personal data protection and transparencyAlfredo Mendez - Mexico - personal data protection and transparency
Alfredo Mendez - Mexico - personal data protection and transparency
 
Eight principles of consumer data privacy
Eight principles of consumer data privacyEight principles of consumer data privacy
Eight principles of consumer data privacy
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Data protection regulation
Data protection regulationData protection regulation
Data protection regulation
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and Security
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 

Similar to Lily lim data privacy ownership and ethics

Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Facultad de Informática UCM
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
GFI Software
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?
Druva
 
Data Privacy and Security in Clinical Data Management
Data Privacy and Security in Clinical Data ManagementData Privacy and Security in Clinical Data Management
Data Privacy and Security in Clinical Data Management
ClinosolIndia
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
caniceconsulting
 
AI and Privacy Concerns Safeguarding Data with Robust Security Measures.pdf
AI and Privacy Concerns Safeguarding Data with Robust Security Measures.pdfAI and Privacy Concerns Safeguarding Data with Robust Security Measures.pdf
AI and Privacy Concerns Safeguarding Data with Robust Security Measures.pdf
Connect Infosoft Technologies Private Limited
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
Aviva Spectrum™
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing rightblogzilla
 
Document-3.docx
Document-3.docxDocument-3.docx
Document-3.docx
SonalVanjari
 
Advanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionAdvanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protection
Ulf Mattsson
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data Everywhere
Jim Brashear
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
adampcarr67227
 
Privacy and Data Security: Minimizing Reputational and Legal Risks
Privacy and Data Security: Minimizing Reputational and Legal RisksPrivacy and Data Security: Minimizing Reputational and Legal Risks
Privacy and Data Security: Minimizing Reputational and Legal Risks
TechWell
 
The TIPPSS Imperative for IoT - Ensuring Trust, Identity, Privacy, Protection...
The TIPPSS Imperative for IoT - Ensuring Trust, Identity, Privacy, Protection...The TIPPSS Imperative for IoT - Ensuring Trust, Identity, Privacy, Protection...
The TIPPSS Imperative for IoT - Ensuring Trust, Identity, Privacy, Protection...
J On The Beach
 
All's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber WarfareAll's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber Warfare
NationalUnderwriter
 
ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR
Annelore van der Lint
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Raleigh ISSA
 
Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014Adriana Sanford
 
Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028
Renub Research
 

Similar to Lily lim data privacy ownership and ethics (20)

Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?
 
Data Privacy and Security in Clinical Data Management
Data Privacy and Security in Clinical Data ManagementData Privacy and Security in Clinical Data Management
Data Privacy and Security in Clinical Data Management
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
 
AI and Privacy Concerns Safeguarding Data with Robust Security Measures.pdf
AI and Privacy Concerns Safeguarding Data with Robust Security Measures.pdfAI and Privacy Concerns Safeguarding Data with Robust Security Measures.pdf
AI and Privacy Concerns Safeguarding Data with Robust Security Measures.pdf
 
Cyber Risks
Cyber RisksCyber Risks
Cyber Risks
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing right
 
Document-3.docx
Document-3.docxDocument-3.docx
Document-3.docx
 
Advanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionAdvanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protection
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data Everywhere
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
Privacy and Data Security: Minimizing Reputational and Legal Risks
Privacy and Data Security: Minimizing Reputational and Legal RisksPrivacy and Data Security: Minimizing Reputational and Legal Risks
Privacy and Data Security: Minimizing Reputational and Legal Risks
 
The TIPPSS Imperative for IoT - Ensuring Trust, Identity, Privacy, Protection...
The TIPPSS Imperative for IoT - Ensuring Trust, Identity, Privacy, Protection...The TIPPSS Imperative for IoT - Ensuring Trust, Identity, Privacy, Protection...
The TIPPSS Imperative for IoT - Ensuring Trust, Identity, Privacy, Protection...
 
All's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber WarfareAll's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber Warfare
 
ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
 
Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014
 
Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028
 

More from MassTLC

MassIntelligence 2018: Intelligent Connected Cities
MassIntelligence 2018: Intelligent Connected CitiesMassIntelligence 2018: Intelligent Connected Cities
MassIntelligence 2018: Intelligent Connected Cities
MassTLC
 
MassIntelligence 2018: How to Rapidly Prototype an AI Solution
MassIntelligence 2018: How to Rapidly Prototype an AI SolutionMassIntelligence 2018: How to Rapidly Prototype an AI Solution
MassIntelligence 2018: How to Rapidly Prototype an AI Solution
MassTLC
 
MassIntelligence 2018: Connecting the Nation's Top Fishing Port
MassIntelligence 2018: Connecting the Nation's Top Fishing PortMassIntelligence 2018: Connecting the Nation's Top Fishing Port
MassIntelligence 2018: Connecting the Nation's Top Fishing Port
MassTLC
 
MassIntelligence 2018: Transportation & Mobility, Alex Wyglinski
MassIntelligence 2018: Transportation & Mobility, Alex WyglinskiMassIntelligence 2018: Transportation & Mobility, Alex Wyglinski
MassIntelligence 2018: Transportation & Mobility, Alex Wyglinski
MassTLC
 
Andres Corrada-Emmanuel - Ground Truth Problems in Business
Andres Corrada-Emmanuel - Ground Truth Problems in BusinessAndres Corrada-Emmanuel - Ground Truth Problems in Business
Andres Corrada-Emmanuel - Ground Truth Problems in Business
MassTLC
 
MassTLC product launch campaign strategies, Jason Baudreau, NetBrain
MassTLC product launch campaign strategies, Jason Baudreau, NetBrainMassTLC product launch campaign strategies, Jason Baudreau, NetBrain
MassTLC product launch campaign strategies, Jason Baudreau, NetBrain
MassTLC
 
MassTLC product launch campaign strategies, ben austin, Carbon Black
MassTLC product launch campaign strategies, ben austin, Carbon BlackMassTLC product launch campaign strategies, ben austin, Carbon Black
MassTLC product launch campaign strategies, ben austin, Carbon Black
MassTLC
 
Forget about A.G.I. Let's Build Useable Ai Tools!
Forget about A.G.I. Let's Build Useable Ai Tools!Forget about A.G.I. Let's Build Useable Ai Tools!
Forget about A.G.I. Let's Build Useable Ai Tools!
MassTLC
 
Cloud Edge Computing: Beyond the Data Center
Cloud Edge Computing: Beyond the Data CenterCloud Edge Computing: Beyond the Data Center
Cloud Edge Computing: Beyond the Data Center
MassTLC
 
Old Company - New Technology, Elixir @ the MBTA
Old Company - New Technology, Elixir @ the MBTAOld Company - New Technology, Elixir @ the MBTA
Old Company - New Technology, Elixir @ the MBTA
MassTLC
 
Lisa seacat deluca io t robotics presentation
Lisa seacat deluca io t robotics presentationLisa seacat deluca io t robotics presentation
Lisa seacat deluca io t robotics presentation
MassTLC
 
Smart cities thinking outside the box
Smart cities thinking outside the boxSmart cities thinking outside the box
Smart cities thinking outside the box
MassTLC
 
Abbas bagasra smart ag
Abbas bagasra smart agAbbas bagasra smart ag
Abbas bagasra smart ag
MassTLC
 
Ben goodman cybersecurity in the iiot
Ben goodman cybersecurity in the iiotBen goodman cybersecurity in the iiot
Ben goodman cybersecurity in the iiot
MassTLC
 
MassTLC Opening Slides and Simulation Session
MassTLC Opening Slides and Simulation SessionMassTLC Opening Slides and Simulation Session
MassTLC Opening Slides and Simulation Session
MassTLC
 
Tom Hopcroft: State of the Tech Economy Key Findings
Tom Hopcroft: State of the Tech Economy Key FindingsTom Hopcroft: State of the Tech Economy Key Findings
Tom Hopcroft: State of the Tech Economy Key Findings
MassTLC
 
Michael Goodman: The State of the State Economy
Michael Goodman: The State of the State EconomyMichael Goodman: The State of the State Economy
Michael Goodman: The State of the State Economy
MassTLC
 
MassTLC summit_amacleod_predictiveanalytics
MassTLC summit_amacleod_predictiveanalyticsMassTLC summit_amacleod_predictiveanalytics
MassTLC summit_amacleod_predictiveanalytics
MassTLC
 
Brainshark mass tlc brand revitalizaion_final for distribution
Brainshark mass tlc brand revitalizaion_final for distributionBrainshark mass tlc brand revitalizaion_final for distribution
Brainshark mass tlc brand revitalizaion_final for distribution
MassTLC
 
Mass tlc summit-mapping-content-strategy-customer-journey-final (002)
Mass tlc summit-mapping-content-strategy-customer-journey-final (002)Mass tlc summit-mapping-content-strategy-customer-journey-final (002)
Mass tlc summit-mapping-content-strategy-customer-journey-final (002)
MassTLC
 

More from MassTLC (20)

MassIntelligence 2018: Intelligent Connected Cities
MassIntelligence 2018: Intelligent Connected CitiesMassIntelligence 2018: Intelligent Connected Cities
MassIntelligence 2018: Intelligent Connected Cities
 
MassIntelligence 2018: How to Rapidly Prototype an AI Solution
MassIntelligence 2018: How to Rapidly Prototype an AI SolutionMassIntelligence 2018: How to Rapidly Prototype an AI Solution
MassIntelligence 2018: How to Rapidly Prototype an AI Solution
 
MassIntelligence 2018: Connecting the Nation's Top Fishing Port
MassIntelligence 2018: Connecting the Nation's Top Fishing PortMassIntelligence 2018: Connecting the Nation's Top Fishing Port
MassIntelligence 2018: Connecting the Nation's Top Fishing Port
 
MassIntelligence 2018: Transportation & Mobility, Alex Wyglinski
MassIntelligence 2018: Transportation & Mobility, Alex WyglinskiMassIntelligence 2018: Transportation & Mobility, Alex Wyglinski
MassIntelligence 2018: Transportation & Mobility, Alex Wyglinski
 
Andres Corrada-Emmanuel - Ground Truth Problems in Business
Andres Corrada-Emmanuel - Ground Truth Problems in BusinessAndres Corrada-Emmanuel - Ground Truth Problems in Business
Andres Corrada-Emmanuel - Ground Truth Problems in Business
 
MassTLC product launch campaign strategies, Jason Baudreau, NetBrain
MassTLC product launch campaign strategies, Jason Baudreau, NetBrainMassTLC product launch campaign strategies, Jason Baudreau, NetBrain
MassTLC product launch campaign strategies, Jason Baudreau, NetBrain
 
MassTLC product launch campaign strategies, ben austin, Carbon Black
MassTLC product launch campaign strategies, ben austin, Carbon BlackMassTLC product launch campaign strategies, ben austin, Carbon Black
MassTLC product launch campaign strategies, ben austin, Carbon Black
 
Forget about A.G.I. Let's Build Useable Ai Tools!
Forget about A.G.I. Let's Build Useable Ai Tools!Forget about A.G.I. Let's Build Useable Ai Tools!
Forget about A.G.I. Let's Build Useable Ai Tools!
 
Cloud Edge Computing: Beyond the Data Center
Cloud Edge Computing: Beyond the Data CenterCloud Edge Computing: Beyond the Data Center
Cloud Edge Computing: Beyond the Data Center
 
Old Company - New Technology, Elixir @ the MBTA
Old Company - New Technology, Elixir @ the MBTAOld Company - New Technology, Elixir @ the MBTA
Old Company - New Technology, Elixir @ the MBTA
 
Lisa seacat deluca io t robotics presentation
Lisa seacat deluca io t robotics presentationLisa seacat deluca io t robotics presentation
Lisa seacat deluca io t robotics presentation
 
Smart cities thinking outside the box
Smart cities thinking outside the boxSmart cities thinking outside the box
Smart cities thinking outside the box
 
Abbas bagasra smart ag
Abbas bagasra smart agAbbas bagasra smart ag
Abbas bagasra smart ag
 
Ben goodman cybersecurity in the iiot
Ben goodman cybersecurity in the iiotBen goodman cybersecurity in the iiot
Ben goodman cybersecurity in the iiot
 
MassTLC Opening Slides and Simulation Session
MassTLC Opening Slides and Simulation SessionMassTLC Opening Slides and Simulation Session
MassTLC Opening Slides and Simulation Session
 
Tom Hopcroft: State of the Tech Economy Key Findings
Tom Hopcroft: State of the Tech Economy Key FindingsTom Hopcroft: State of the Tech Economy Key Findings
Tom Hopcroft: State of the Tech Economy Key Findings
 
Michael Goodman: The State of the State Economy
Michael Goodman: The State of the State EconomyMichael Goodman: The State of the State Economy
Michael Goodman: The State of the State Economy
 
MassTLC summit_amacleod_predictiveanalytics
MassTLC summit_amacleod_predictiveanalyticsMassTLC summit_amacleod_predictiveanalytics
MassTLC summit_amacleod_predictiveanalytics
 
Brainshark mass tlc brand revitalizaion_final for distribution
Brainshark mass tlc brand revitalizaion_final for distributionBrainshark mass tlc brand revitalizaion_final for distribution
Brainshark mass tlc brand revitalizaion_final for distribution
 
Mass tlc summit-mapping-content-strategy-customer-journey-final (002)
Mass tlc summit-mapping-content-strategy-customer-journey-final (002)Mass tlc summit-mapping-content-strategy-customer-journey-final (002)
Mass tlc summit-mapping-content-strategy-customer-journey-final (002)
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 

Lily lim data privacy ownership and ethics

  • 1. Tech Talk: Data Privacy, Ownership & IoT December 11, 2017, 12:30 pm- 12:45 pm By Lily Lim, Partner, Finnegan Henderson The Intersection of IoT and Robotics: How Sensors, Data, and Intelligence Are Redefining Industry 1
  • 2. IoT Data: Ownership and Rights Data Collected Correlations Made with Data Collected Personally Identifiable Information Company has ownership rights: Copyright, Trade Secrets, Know-how, Patents Company has ownership rights to data that is mined or correlated Users Have Rights to Control Their Personal Data 2
  • 3. Laws Protecting PII  Personally Identifiable Information (PII)  Federal Statutes  Financial Records: Gramm-Leach-Bliley Act  Health Records: HIPAA  Educational Records: FERPA  Interception of Communications: Electronic Communications Privacy Act  State Laws:  Massachusetts Defines PII as: Person’s last name, first initial, combined with SSN, driver’s license, bank account, credit card account,  California Constitutional Right to Privacy  Illinois: PII includes user names with password & biometric data  European General Data Protection Regulation (GDPR) 3
  • 4. Data Collected Cost of Breach of Privacy Data (External Attack)  Class Actions:  Target Breach: over $300 Million  Home Depot: over $250 Million to date (Forbes Magazine estimates total in recurring expenses will be $10 Billion).  Deal Devalued:  Yahoo! Breach: Verizon cut $350 Million from its deal with Yahoo! after the news of the breach was released.  Clean-up/ Rebuild costs:  Sony Pictures Entertainment Breach (Copyrighted materials, not yet released movies, Sony’s trade secrets like business negotiations):  Clean-up costs $35 Million for FY 2015.  Rebuilding Sony’s computer systems estimated at $83 Million. 4
  • 5. Open Source Software Vulnerabilities  Apache Open Source License (Web Servers) :  Apache Strut vulnerability  Equifax breach September 2017 (personal data for 143 million people leaked)  Apache Struts web-application software had a bug (CVE-2017- 5638) for which Apache released a patch in March 6, 2017.  Equifax did not apply the patch and the breach started in May 2017. 5 Data Collected
  • 6. Bluetooth Vulnerabilities  Bluetooth Vulnerability:  USCERT (United States Computer Emergency Readiness Team) issued warning  BlueBorne: potentially affecting millions of IoT devices, mobile phones, and computers.  Remote attacker can take control of affected devices  Impacted systems:  Windows, iOS, Android  Affected Vendors:  Apple, Google, Microsoft, Samsung, Android  Patches available for Windows, and iOS, but patching for Android was delayed due to disperse ecosystem  USCERT Recommended action: disable Bluetooth 6 Data Collected
  • 7. IoT Data: Penalties When PII Collected Without User Consent  Data Mining Contacts from Email Accounts  Google Buzz allegedly automatically pulled contacts from users’ Gmail accounts into a social network without informing them.  FTC Consent Decree: Google agreed to implement a comprehensive privacy program and to 20 years of privacy audits.  Sweeping Up WiFi Passwords  Google Street View: collection of passwords, email and personal information from unsecured networks collected by Google cars while the collected location data for Street View.  Google agreed to: $7 Million fine; self-policing of employees, teaching public how to fend off privacy violations. 7 Data Collected
  • 8. Data Handling “Mishaps”  Uber’s “God View” Tool and “GreyBall” Program  FTC is inquiring about Uber’s “data-handling mishaps” including employees’ “misuse of ‘god view,’ a tool that had previously let employees closely track individual riders, such as politicians and celebrities.”.  Department of Justice reportedly opened a criminal probe regarding Uber’s use of its Greyball program, which allegedly helped it circumvent scrutiny from local transportation regulators 8 Data Collected
  • 9. Maximizing Data Set Values By Mitigating PII Risks  Companies can use PII and sell it:  Privacy-By-Design and Security-By-Design  Rather than address privacy and security issues on the back end of a product cycle, companies are making efforts to integrate privacy and security into earlier phases of the design cycle.  Privacy Policy: User Consent Data Collected 9
  • 10. Lily Lim, Partner Finnegan Henderson Intellectual property, cybersecurity, and privacy law. Ms. Lim provides strategic counseling on cybersecurity and privacy best practices, including security-by-design and privacy-by-design, utilizing her depth of knowledge in both law and technology. Ms. Lim is a Certified Information Privacy Professional (CIPP/US). Ms. Lim is a frequently invited speaker and contributes to the Sedona Conference Working Group on data security and privacy issues. Ms. Lim has prevailed at trial and on appeal in cases involving patent, copyright, and trade secret disputes in federal court and before the U.S. International Trade Commission (ITC). She represents U.S. and international clients whose technologies include integrated circuits, satellite technologies, wireless devices, software, and medical devices and diagnostic equipment. Ms. Lim also provides strategic pre-litigation counseling regarding negotiating patent and software licenses and international manufacturing and marketing agreements. Prior to joining private practice, Ms. Lim served as a law clerk to the Honorable S. Jay Plager of the U.S. Court of Appeals for the Federal Circuit. She also worked as a spacecraft navigation engineer at NASA’s Jet Propulsion Laboratory. Email: Lily.Lim@Finnegan.com 10Copyright 2017