SlideShare a Scribd company logo
Candice Martinez
Deliberate Reasoning
Amazon Kindle Fire
• Silk Browser raises controversy
• Split browser partially operates from cloud
server
• Kindle Fire only allows the Silk Browser
http://www.youtube.com/watch?v=VV
sfLnMqOC4
• Joe Bar t on
• Republ i can, Texas
•Ed Mar key
•Democr at ,
Massachusset t
s
What does Amazon plan
on doing with this
information?
How does Amazon plan on
proceeding with a privacy
policy?
Will Amazon collect users’
browsing habits?
has a few questions for Amazon
• Geographic location
• Local time
• Browser used
• Screen resolution
• Time spent on page
• Content on page
• Previous page that was visited
• Internet speed
•Operating system
•Search engine used
•Key words
•Made purchases
•Number of made purchases
•Value of made purchases
•Number of visits
Compiled Data
‫ﺳ‬Discussion forums
‫ﺳ‬Blogs
‫ﺳ‬Message boards
‫ﺳ‬Social networking
sites
d u e t o a n E v o l v i n g I n d u s t r y
Products and Services
Products and Services
Consumer Habits and Behaviors
Consumer Habits and Behaviors
"The r i ght of t he peopl e t o be
secur e i n t hei r par ent s,
houses, paper s, and ef f ect s,
agai nst unr easonabl e
sear ches and sei zur es,
shal l not be vi ol at ed and
no war r ant s shal l i ssue, but
upon pr obabl e cause,
suppor t ed by oat h or
af f i r mat i on, and
par t i cul ar l y descr i bi ng
t he pl ace t o be sear ched,
and t he per sons of t hi ngs
t o be sei zed."
1. There has to be a
reasonable and logical
expectation of privacy.
2. General society
renders this
expectation as
acceptable custom.
Landmark Cases Two-Step Test
Reasonably released information; waives Fourth Amendment
protection once provided to an entity “upon supported by
affirmation.”
Federal Trade Commission Act of
1914
A) Prevent unfair methods of competition, and unfair or
deceptive acts or practices in or affecting commerce
B) Seek monetary redress and other relief for conduct
injurious to consumers
C) Prescribe trade regulation rules defining with
specificity acts or practices that are unfair or
deceptive, and establishing requirements designed to
prevent such acts or practices
D) Conduct investigations relating to the organization,
business, practices, and management of entities
engaged in commerce
E) Make reports and legislative recommendations to
Congress.
G
O
O
G
L
E
B
U
Z
Z
Sweet! Check out my buzz
Nah, go to my inbox
Made users’ contacts public without their knowledge
Followers were already setup
It did not fully removed user from the social network
“When you sign up for a particular service that
requires registration, we ask you to provide
personal information. If we use this information
for in a manner different than the purpose for
which it was collected , then we ask for your
consent prior to such use.”
October 2004 until October 2010
Gmail Privacy Policy
“Gmail stores, processes, and maintains
your messages, contact lists, and other
data related to your recent account in
order to provide the service to you.”
“Google adheres to the U.S. Safe Harbor
Privacy Principles of Notice, Choice,
Onward Transfer, Security, Data Integrity,
Access and Enforcement, and is registered
with the U.S. Department of Commerce’s
Safe Harbor Program.”
1) “Comprehensive privacy
program”
2) Privacy audits throughout the
next 20 years
http://www.youtube.com/watch?v=852OTK6IQ2A
"Fi ndi ng
i nt er connect i o
ns bet ween
peopl e,
compani es, and
cl i ent
act i vi t i es."
. -
LexisNexis
website
Provides data and tools for examining
A person’s actions are
involuntary :
1) Action is caused by an
external force
2) Actions were based on
ignorance.
“This is the first shot in the new
war for replacing the internet
with a privatized merchant data
aggregation network.”

More Related Content

Similar to Compiling data from the cloud. Make it rain ones and zeros

Online privacy; myth or reality?
Online privacy; myth or reality?Online privacy; myth or reality?
Online privacy; myth or reality?
Swaleh Ahmed
 
Free geek class on Data privacy
Free geek class on Data privacyFree geek class on Data privacy
Free geek class on Data privacy
Joshua Johnston
 
Big data
Big dataBig data
Big data
Maan Khalid
 
Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10
Matthew Asbell
 
Challenge Academy June 2018 - Digital Marketing, Web Traffic and Ecommerce
Challenge Academy June 2018 - Digital Marketing, Web Traffic and Ecommerce Challenge Academy June 2018 - Digital Marketing, Web Traffic and Ecommerce
Challenge Academy June 2018 - Digital Marketing, Web Traffic and Ecommerce
OutserveWeb
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentationChande Kasita
 
Top Questions Asked About the CCPA
Top Questions Asked About the CCPATop Questions Asked About the CCPA
Top Questions Asked About the CCPA
Ryan Foster
 
Terms of Use and Privacy Policy Best Practices
Terms of Use and Privacy Policy Best PracticesTerms of Use and Privacy Policy Best Practices
Terms of Use and Privacy Policy Best Practices
Roger Royse
 
Ethical, social and political issues raised by e commerce
Ethical, social and political issues raised by e commerceEthical, social and political issues raised by e commerce
Ethical, social and political issues raised by e commerceNicholas Davis
 
Ethical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceEthical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceNicholas Davis
 
Websites: do you tick all the boxes?
Websites: do you tick all the boxes?Websites: do you tick all the boxes?
Websites: do you tick all the boxes?
walescva
 
Casl 2012 Final
Casl 2012 FinalCasl 2012 Final
Casl 2012 Final
Violeta Cohen
 
CAN SPAM Legislation: Is your organization ready?
CAN SPAM Legislation: Is your organization ready?CAN SPAM Legislation: Is your organization ready?
CAN SPAM Legislation: Is your organization ready?
Violeta Cohen
 
Big Data, Big Investment
Big Data, Big InvestmentBig Data, Big Investment
Big Data, Big Investment
GGV Capital
 
Spa bath accessories
Spa bath accessoriesSpa bath accessories
Spa bath accessories
spakartwebstore
 
Balancing Privacy and Digitization
Balancing Privacy and DigitizationBalancing Privacy and Digitization
Balancing Privacy and Digitization
Symptai Consulting Limited
 
Ethical Digital Marketing for Lawyers
Ethical Digital Marketing for LawyersEthical Digital Marketing for Lawyers
Ethical Digital Marketing for Lawyers
Stacey Burke
 
5) How charities can protect themselves against data reform - ‘Emerging Digit...
5) How charities can protect themselves against data reform - ‘Emerging Digit...5) How charities can protect themselves against data reform - ‘Emerging Digit...
5) How charities can protect themselves against data reform - ‘Emerging Digit...
Code Computerlove
 

Similar to Compiling data from the cloud. Make it rain ones and zeros (20)

Online privacy
Online privacyOnline privacy
Online privacy
 
Online privacy; myth or reality?
Online privacy; myth or reality?Online privacy; myth or reality?
Online privacy; myth or reality?
 
Free geek class on Data privacy
Free geek class on Data privacyFree geek class on Data privacy
Free geek class on Data privacy
 
Big data
Big dataBig data
Big data
 
Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10
 
Challenge Academy June 2018 - Digital Marketing, Web Traffic and Ecommerce
Challenge Academy June 2018 - Digital Marketing, Web Traffic and Ecommerce Challenge Academy June 2018 - Digital Marketing, Web Traffic and Ecommerce
Challenge Academy June 2018 - Digital Marketing, Web Traffic and Ecommerce
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
 
Top Questions Asked About the CCPA
Top Questions Asked About the CCPATop Questions Asked About the CCPA
Top Questions Asked About the CCPA
 
Terms of Use and Privacy Policy Best Practices
Terms of Use and Privacy Policy Best PracticesTerms of Use and Privacy Policy Best Practices
Terms of Use and Privacy Policy Best Practices
 
Comply
ComplyComply
Comply
 
Ethical, social and political issues raised by e commerce
Ethical, social and political issues raised by e commerceEthical, social and political issues raised by e commerce
Ethical, social and political issues raised by e commerce
 
Ethical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceEthical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E Commerce
 
Websites: do you tick all the boxes?
Websites: do you tick all the boxes?Websites: do you tick all the boxes?
Websites: do you tick all the boxes?
 
Casl 2012 Final
Casl 2012 FinalCasl 2012 Final
Casl 2012 Final
 
CAN SPAM Legislation: Is your organization ready?
CAN SPAM Legislation: Is your organization ready?CAN SPAM Legislation: Is your organization ready?
CAN SPAM Legislation: Is your organization ready?
 
Big Data, Big Investment
Big Data, Big InvestmentBig Data, Big Investment
Big Data, Big Investment
 
Spa bath accessories
Spa bath accessoriesSpa bath accessories
Spa bath accessories
 
Balancing Privacy and Digitization
Balancing Privacy and DigitizationBalancing Privacy and Digitization
Balancing Privacy and Digitization
 
Ethical Digital Marketing for Lawyers
Ethical Digital Marketing for LawyersEthical Digital Marketing for Lawyers
Ethical Digital Marketing for Lawyers
 
5) How charities can protect themselves against data reform - ‘Emerging Digit...
5) How charities can protect themselves against data reform - ‘Emerging Digit...5) How charities can protect themselves against data reform - ‘Emerging Digit...
5) How charities can protect themselves against data reform - ‘Emerging Digit...
 

Recently uploaded

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 

Recently uploaded (20)

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 

Compiling data from the cloud. Make it rain ones and zeros

  • 3. Amazon Kindle Fire • Silk Browser raises controversy • Split browser partially operates from cloud server • Kindle Fire only allows the Silk Browser http://www.youtube.com/watch?v=VV sfLnMqOC4
  • 4. • Joe Bar t on • Republ i can, Texas •Ed Mar key •Democr at , Massachusset t s What does Amazon plan on doing with this information? How does Amazon plan on proceeding with a privacy policy? Will Amazon collect users’ browsing habits? has a few questions for Amazon
  • 5. • Geographic location • Local time • Browser used • Screen resolution • Time spent on page • Content on page • Previous page that was visited • Internet speed •Operating system •Search engine used •Key words •Made purchases •Number of made purchases •Value of made purchases •Number of visits Compiled Data
  • 7. d u e t o a n E v o l v i n g I n d u s t r y Products and Services Products and Services Consumer Habits and Behaviors Consumer Habits and Behaviors
  • 8. "The r i ght of t he peopl e t o be secur e i n t hei r par ent s, houses, paper s, and ef f ect s, agai nst unr easonabl e sear ches and sei zur es, shal l not be vi ol at ed and no war r ant s shal l i ssue, but upon pr obabl e cause, suppor t ed by oat h or af f i r mat i on, and par t i cul ar l y descr i bi ng t he pl ace t o be sear ched, and t he per sons of t hi ngs t o be sei zed."
  • 9. 1. There has to be a reasonable and logical expectation of privacy. 2. General society renders this expectation as acceptable custom. Landmark Cases Two-Step Test
  • 10. Reasonably released information; waives Fourth Amendment protection once provided to an entity “upon supported by affirmation.”
  • 11. Federal Trade Commission Act of 1914 A) Prevent unfair methods of competition, and unfair or deceptive acts or practices in or affecting commerce B) Seek monetary redress and other relief for conduct injurious to consumers C) Prescribe trade regulation rules defining with specificity acts or practices that are unfair or deceptive, and establishing requirements designed to prevent such acts or practices D) Conduct investigations relating to the organization, business, practices, and management of entities engaged in commerce E) Make reports and legislative recommendations to Congress.
  • 12. G O O G L E B U Z Z Sweet! Check out my buzz Nah, go to my inbox Made users’ contacts public without their knowledge Followers were already setup It did not fully removed user from the social network “When you sign up for a particular service that requires registration, we ask you to provide personal information. If we use this information for in a manner different than the purpose for which it was collected , then we ask for your consent prior to such use.”
  • 13. October 2004 until October 2010 Gmail Privacy Policy “Gmail stores, processes, and maintains your messages, contact lists, and other data related to your recent account in order to provide the service to you.” “Google adheres to the U.S. Safe Harbor Privacy Principles of Notice, Choice, Onward Transfer, Security, Data Integrity, Access and Enforcement, and is registered with the U.S. Department of Commerce’s Safe Harbor Program.” 1) “Comprehensive privacy program” 2) Privacy audits throughout the next 20 years
  • 15. "Fi ndi ng i nt er connect i o ns bet ween peopl e, compani es, and cl i ent act i vi t i es." . - LexisNexis website Provides data and tools for examining
  • 16. A person’s actions are involuntary : 1) Action is caused by an external force 2) Actions were based on ignorance.
  • 17. “This is the first shot in the new war for replacing the internet with a privatized merchant data aggregation network.”