SlideShare a Scribd company logo
1 of 14
Principles of Mobile Privacy
Policy aspects of mobile privacy
• General privacy policy is a comprehensive statement of
a company’s or organization’s policies and practices
related to an application, covering the accessing,
collecting, using, disclosing, sharing, and otherwise
handling of personally identifiable data.
• Privacy controls are settings available within an app or
an operating system that allow users to make or revise
choices offered in the general privacy policy about the
collection of their personal identifiable data
Policy aspects of mobile privacy
 Personally identifiable data are any data linked to a person or persistently
linked to a mobile device: data that can identify a person via personal
information or a device via a unique identifier. Included are user-entered
data, as well as automatically collected data
 Sensitive information is personally identifiable data about which users are
likely to be concerned, such as precise geo-location; financial and medical
information; passwords; stored information such as contacts, photos, and
videos; and children’s information.
Types of Regulatory
frameworks of privacy
 Omnibus privacy law
 It is not sector specific as it apply to mobile internet the same way it
apply to other platforms and companies
 omnibus law and a sector-specific law
 privacy requirements exists for all sectors and then additional
requirements for providers of communications services exists that
is primarily relates to confidentiality
 separate sectoral laws
 Those covering telecommunications privacy, and for example,
health data, credit data, etc.
 sectoral law AND a license obligation with a confidentiality or
privacy obligations
Data anonymization and pseudonymisation
 There is an increased regulatory efforts to promote data anonymization and
pseudonymisation
 Data anonymization is the process of either encrypting or removing
personally identifiable information from data sets, so that the people whom
the data describe remain anonymous.
 Data Pseudonymization is a data management and de-identification
procedure by which personally identifiable information fields within a data
record are replaced by one or more artificial identifiers, or pseudonyms.
High-level Privacy Principles
 This includes the following 9 principle
1. Openness, Transparency and Notice
2. Purpose and Use
3. User Choice and Control
4. Data Minimization and Retention
5. Respect User Rights
6. Security
7. Education
8. Children and Adolescents
9. Accountability and Enforcement
Privacy by design
 Privacy by design is an approach to projects that
promotes privacy and data protection compliance
from the start
 It is embedded into the design and architecture of IT
systems and business practices. It is not bolted on as
an add-on, after the fact. The result is that privacy
becomes an essential component of the core
functionality being delivered. Privacy is integral to the
system, without diminishing functionality.
 Privacy by Design extends to a “Trilogy” of
encompassing applications: 1) IT systems; 2)
accountable business practices; and 3) physical design
and networked infrastructure.
Mobile applications privacy by design
development modules and guidelines
 It has four modules
1- location
2- mobile advertisement
3-social networks and social media
4-Children and adolescents
1-Location Privacy in Mobile Systems
 Advances in sensing and tracking technologies create new opportunities
for location-based applications but they also create significant privacy risk
 It is the risk that an adversary learns the locations that a subject visited, as
well as times during which these visits took place through which they can
receive private information such as political affiliations, alternative
lifestyles, or medical problems
 Even when a subject does not disclose her identity at a private location, an
adversary may still gain this information through location tracking or
space and time correlation inference. In case that a subject is identified at
any point, her complete movements can also be exposed
Cond -Location Privacy in Mobile Systems
 Location-enabled applications must provide clear notice, before a
user’s location is accessed or collected , about:
• what location data an application intends to access (e.g., cell ID,
GPS, village or town)
• how the data will be used
• whether data will be kept and how long for
• who location data will be shared with.
 Some uses of location data require giving users additional privacy
information and getting their active consent.
2-Mobile advertising privacy
 It is assumed that technological design, which is in line with the legal framework,
will ensure that the benefits of mobile advertising and the consumer willingness to
accept mobile advertising will increase.
 The general guidelines that govern mobile advertising privacy are :
 Users should be informed that the application is ad-supported before they
download and/or activate the application
 User consent is essential . Capture appropriate agreement to target advertising to a
user.
 Target based on legitimately collected data.
 Respect privacy when viral marketing.
 Ensure content is appropriate
3-Social networking and social media
privacy
 Socially enabled applications allow users to connect to and share
information with a community of other users or the general public.
 As facebook founder stated (“People have really gotten comfortable
not only sharing more information and different kinds, but more
openly and with more people. That social norm is just something that
has evolved over time.”
 two main types of attacks exists in social networks :
o attacks that exploit the implicit trust embedded in declared social
relationships
o attacks that harvest user’s personal information for ill-intended use.
Children and adolescents privacy
 They might know how to use applications but lack the maturity to appreciate the
wider social and personal consequences of revealing their personal information or
allowing others to collect and use it.
 The general guidelines set by GSMA are :
1. Tailor applications to appropriate age ranges
2. Set privacy protective default settings
3. Comply with laws on the protection of children.
4. Age verify where possible and appropriate
References
 http://scihub.tw/http://ieeexplore.ieee.org/xpl/artic%C2%ADleDetails.jsp?arnumber
=1437123
 https://oag.ca.gov/sites/all/files/agweb/pdfs/privacy/privacy_on_the_go.pdf
 https://ipc.on.ca/wpcontent/uploads/Resources/7foundationalprinciples.pdf
 GSMA course materials , May 2016 ,
https://www.gsmatraining.com/lessons/principles-of-mobile-privacy
 https://www.tandfonline.com/doi/abs/10.1080/13600860701701421
 https://www.sciencedirect.com/science/article/pii/S2468696417300332
 www.gsma.com/mobileprivacy

More Related Content

What's hot

Messaging solutions for the government and authorities
Messaging solutions for the government and authoritiesMessaging solutions for the government and authorities
Messaging solutions for the government and authoritiesMDK Labs GmbH
 
Chapter 4. ethical and social issues i
Chapter 4. ethical and social issues iChapter 4. ethical and social issues i
Chapter 4. ethical and social issues iAditya TroJhan
 
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...Konstantinos Demertzis
 
Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks IJECEIAES
 
$4.8m HIPAA Breach
$4.8m HIPAA Breach$4.8m HIPAA Breach
$4.8m HIPAA BreachInfinisource
 
Privacy and mobile apps - status 2013 Belgium
Privacy and mobile apps - status 2013 BelgiumPrivacy and mobile apps - status 2013 Belgium
Privacy and mobile apps - status 2013 BelgiumMobile Monday Brussels
 
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Ted Myerson
 

What's hot (9)

Operando @ Cyber camp 2015
Operando @ Cyber camp 2015Operando @ Cyber camp 2015
Operando @ Cyber camp 2015
 
Messaging solutions for the government and authorities
Messaging solutions for the government and authoritiesMessaging solutions for the government and authorities
Messaging solutions for the government and authorities
 
Chapter 4. ethical and social issues i
Chapter 4. ethical and social issues iChapter 4. ethical and social issues i
Chapter 4. ethical and social issues i
 
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
 
Connect And Protect
Connect And ProtectConnect And Protect
Connect And Protect
 
Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks
 
$4.8m HIPAA Breach
$4.8m HIPAA Breach$4.8m HIPAA Breach
$4.8m HIPAA Breach
 
Privacy and mobile apps - status 2013 Belgium
Privacy and mobile apps - status 2013 BelgiumPrivacy and mobile apps - status 2013 Belgium
Privacy and mobile apps - status 2013 Belgium
 
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
 

Similar to Mobileprivacyazahir

Privacy and Data Security | Data Collection | Social Media
Privacy and Data Security | Data Collection | Social MediaPrivacy and Data Security | Data Collection | Social Media
Privacy and Data Security | Data Collection | Social Mediadevbhargav1
 
Over The Air 2010: Privacy for Mobile Developers
Over The Air 2010: Privacy for Mobile DevelopersOver The Air 2010: Privacy for Mobile Developers
Over The Air 2010: Privacy for Mobile DevelopersRicardo Varela
 
Golden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacyGolden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacyDMI
 
DATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptxDATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptxJaeKim165097
 
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdfData Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdfCIOWomenMagazine
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
CIS 2015- User-centric Privacy of Identity- Jenn Behrens
CIS 2015- User-centric Privacy of Identity- Jenn BehrensCIS 2015- User-centric Privacy of Identity- Jenn Behrens
CIS 2015- User-centric Privacy of Identity- Jenn BehrensCloudIDSummit
 
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONPranav Godse
 
MMRA - Professional Standards and Ethics for Mobile Qualitative
MMRA - Professional Standards and Ethics for Mobile QualitativeMMRA - Professional Standards and Ethics for Mobile Qualitative
MMRA - Professional Standards and Ethics for Mobile QualitativeThreads Qualitative Research
 
Privacy on Mobile Apps
Privacy on Mobile AppsPrivacy on Mobile Apps
Privacy on Mobile AppsMays Mrayyan
 
Closing the Governance Gap - Enabling Governed Self-Service Analytics
Closing the Governance Gap  - Enabling Governed Self-Service AnalyticsClosing the Governance Gap  - Enabling Governed Self-Service Analytics
Closing the Governance Gap - Enabling Governed Self-Service AnalyticsPrivacera
 
[AIIM18] GDPR: whose job is it now? - Paul Lanois
[AIIM18] GDPR: whose job is it now? - Paul Lanois[AIIM18] GDPR: whose job is it now? - Paul Lanois
[AIIM18] GDPR: whose job is it now? - Paul LanoisAIIM International
 
Homework AssignmentShort Answer Responses.1. Describe the fiv.docx
Homework AssignmentShort Answer Responses.1.  Describe the fiv.docxHomework AssignmentShort Answer Responses.1.  Describe the fiv.docx
Homework AssignmentShort Answer Responses.1. Describe the fiv.docxadampcarr67227
 
Security Industry Association Privacy Framework
Security Industry Association Privacy FrameworkSecurity Industry Association Privacy Framework
Security Industry Association Privacy Framework- Mark - Fullbright
 
Mobile advertisiing addressing privacy concerns
Mobile advertisiing   addressing privacy concernsMobile advertisiing   addressing privacy concerns
Mobile advertisiing addressing privacy concernsxmendel
 
Tips for creating Effective & HIPPA compliant mobile.pptx
Tips for creating Effective & HIPPA compliant mobile.pptxTips for creating Effective & HIPPA compliant mobile.pptx
Tips for creating Effective & HIPPA compliant mobile.pptxMyAppGurus
 
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docx
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docxRunning head COMPANY Facebook Department of Defense (DoD) Ready1.docx
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docxtodd271
 

Similar to Mobileprivacyazahir (20)

Privacy and Data Security | Data Collection | Social Media
Privacy and Data Security | Data Collection | Social MediaPrivacy and Data Security | Data Collection | Social Media
Privacy and Data Security | Data Collection | Social Media
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
Over The Air 2010: Privacy for Mobile Developers
Over The Air 2010: Privacy for Mobile DevelopersOver The Air 2010: Privacy for Mobile Developers
Over The Air 2010: Privacy for Mobile Developers
 
Golden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacyGolden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacy
 
DATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptxDATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptx
 
Ss
SsSs
Ss
 
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdfData Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
CIS 2015- User-centric Privacy of Identity- Jenn Behrens
CIS 2015- User-centric Privacy of Identity- Jenn BehrensCIS 2015- User-centric Privacy of Identity- Jenn Behrens
CIS 2015- User-centric Privacy of Identity- Jenn Behrens
 
Ethics in Mobile Qualitative Research
Ethics in Mobile Qualitative ResearchEthics in Mobile Qualitative Research
Ethics in Mobile Qualitative Research
 
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
 
MMRA - Professional Standards and Ethics for Mobile Qualitative
MMRA - Professional Standards and Ethics for Mobile QualitativeMMRA - Professional Standards and Ethics for Mobile Qualitative
MMRA - Professional Standards and Ethics for Mobile Qualitative
 
Privacy on Mobile Apps
Privacy on Mobile AppsPrivacy on Mobile Apps
Privacy on Mobile Apps
 
Closing the Governance Gap - Enabling Governed Self-Service Analytics
Closing the Governance Gap  - Enabling Governed Self-Service AnalyticsClosing the Governance Gap  - Enabling Governed Self-Service Analytics
Closing the Governance Gap - Enabling Governed Self-Service Analytics
 
[AIIM18] GDPR: whose job is it now? - Paul Lanois
[AIIM18] GDPR: whose job is it now? - Paul Lanois[AIIM18] GDPR: whose job is it now? - Paul Lanois
[AIIM18] GDPR: whose job is it now? - Paul Lanois
 
Homework AssignmentShort Answer Responses.1. Describe the fiv.docx
Homework AssignmentShort Answer Responses.1.  Describe the fiv.docxHomework AssignmentShort Answer Responses.1.  Describe the fiv.docx
Homework AssignmentShort Answer Responses.1. Describe the fiv.docx
 
Security Industry Association Privacy Framework
Security Industry Association Privacy FrameworkSecurity Industry Association Privacy Framework
Security Industry Association Privacy Framework
 
Mobile advertisiing addressing privacy concerns
Mobile advertisiing   addressing privacy concernsMobile advertisiing   addressing privacy concerns
Mobile advertisiing addressing privacy concerns
 
Tips for creating Effective & HIPPA compliant mobile.pptx
Tips for creating Effective & HIPPA compliant mobile.pptxTips for creating Effective & HIPPA compliant mobile.pptx
Tips for creating Effective & HIPPA compliant mobile.pptx
 
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docx
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docxRunning head COMPANY Facebook Department of Defense (DoD) Ready1.docx
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docx
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 

Mobileprivacyazahir

  • 2. Policy aspects of mobile privacy • General privacy policy is a comprehensive statement of a company’s or organization’s policies and practices related to an application, covering the accessing, collecting, using, disclosing, sharing, and otherwise handling of personally identifiable data. • Privacy controls are settings available within an app or an operating system that allow users to make or revise choices offered in the general privacy policy about the collection of their personal identifiable data
  • 3. Policy aspects of mobile privacy  Personally identifiable data are any data linked to a person or persistently linked to a mobile device: data that can identify a person via personal information or a device via a unique identifier. Included are user-entered data, as well as automatically collected data  Sensitive information is personally identifiable data about which users are likely to be concerned, such as precise geo-location; financial and medical information; passwords; stored information such as contacts, photos, and videos; and children’s information.
  • 4. Types of Regulatory frameworks of privacy  Omnibus privacy law  It is not sector specific as it apply to mobile internet the same way it apply to other platforms and companies  omnibus law and a sector-specific law  privacy requirements exists for all sectors and then additional requirements for providers of communications services exists that is primarily relates to confidentiality  separate sectoral laws  Those covering telecommunications privacy, and for example, health data, credit data, etc.  sectoral law AND a license obligation with a confidentiality or privacy obligations
  • 5. Data anonymization and pseudonymisation  There is an increased regulatory efforts to promote data anonymization and pseudonymisation  Data anonymization is the process of either encrypting or removing personally identifiable information from data sets, so that the people whom the data describe remain anonymous.  Data Pseudonymization is a data management and de-identification procedure by which personally identifiable information fields within a data record are replaced by one or more artificial identifiers, or pseudonyms.
  • 6. High-level Privacy Principles  This includes the following 9 principle 1. Openness, Transparency and Notice 2. Purpose and Use 3. User Choice and Control 4. Data Minimization and Retention 5. Respect User Rights 6. Security 7. Education 8. Children and Adolescents 9. Accountability and Enforcement
  • 7. Privacy by design  Privacy by design is an approach to projects that promotes privacy and data protection compliance from the start  It is embedded into the design and architecture of IT systems and business practices. It is not bolted on as an add-on, after the fact. The result is that privacy becomes an essential component of the core functionality being delivered. Privacy is integral to the system, without diminishing functionality.  Privacy by Design extends to a “Trilogy” of encompassing applications: 1) IT systems; 2) accountable business practices; and 3) physical design and networked infrastructure.
  • 8. Mobile applications privacy by design development modules and guidelines  It has four modules 1- location 2- mobile advertisement 3-social networks and social media 4-Children and adolescents
  • 9. 1-Location Privacy in Mobile Systems  Advances in sensing and tracking technologies create new opportunities for location-based applications but they also create significant privacy risk  It is the risk that an adversary learns the locations that a subject visited, as well as times during which these visits took place through which they can receive private information such as political affiliations, alternative lifestyles, or medical problems  Even when a subject does not disclose her identity at a private location, an adversary may still gain this information through location tracking or space and time correlation inference. In case that a subject is identified at any point, her complete movements can also be exposed
  • 10. Cond -Location Privacy in Mobile Systems  Location-enabled applications must provide clear notice, before a user’s location is accessed or collected , about: • what location data an application intends to access (e.g., cell ID, GPS, village or town) • how the data will be used • whether data will be kept and how long for • who location data will be shared with.  Some uses of location data require giving users additional privacy information and getting their active consent.
  • 11. 2-Mobile advertising privacy  It is assumed that technological design, which is in line with the legal framework, will ensure that the benefits of mobile advertising and the consumer willingness to accept mobile advertising will increase.  The general guidelines that govern mobile advertising privacy are :  Users should be informed that the application is ad-supported before they download and/or activate the application  User consent is essential . Capture appropriate agreement to target advertising to a user.  Target based on legitimately collected data.  Respect privacy when viral marketing.  Ensure content is appropriate
  • 12. 3-Social networking and social media privacy  Socially enabled applications allow users to connect to and share information with a community of other users or the general public.  As facebook founder stated (“People have really gotten comfortable not only sharing more information and different kinds, but more openly and with more people. That social norm is just something that has evolved over time.”  two main types of attacks exists in social networks : o attacks that exploit the implicit trust embedded in declared social relationships o attacks that harvest user’s personal information for ill-intended use.
  • 13. Children and adolescents privacy  They might know how to use applications but lack the maturity to appreciate the wider social and personal consequences of revealing their personal information or allowing others to collect and use it.  The general guidelines set by GSMA are : 1. Tailor applications to appropriate age ranges 2. Set privacy protective default settings 3. Comply with laws on the protection of children. 4. Age verify where possible and appropriate
  • 14. References  http://scihub.tw/http://ieeexplore.ieee.org/xpl/artic%C2%ADleDetails.jsp?arnumber =1437123  https://oag.ca.gov/sites/all/files/agweb/pdfs/privacy/privacy_on_the_go.pdf  https://ipc.on.ca/wpcontent/uploads/Resources/7foundationalprinciples.pdf  GSMA course materials , May 2016 , https://www.gsmatraining.com/lessons/principles-of-mobile-privacy  https://www.tandfonline.com/doi/abs/10.1080/13600860701701421  https://www.sciencedirect.com/science/article/pii/S2468696417300332  www.gsma.com/mobileprivacy