SlideShare a Scribd company logo
MANAGING PRIVACY
IN THE DIGITAL ERA
The more our lives become digital, the more our
personal data travels. We share everything, through
browsing, purchases, social activities and all the
services we subscribe to. 
SHARING
HAS BECOME SECOND NATURE.
“The Internet’s not written in
pencil, […] it’s written in ink”
*Watch the video : http://bit.ly/1hpNwLK
The Social Network*
At a time when privacy is increasingly fleeting, we
want to regain control and we are demanding new
rights to protect ourselves. 
WE LEARNT THE HARD WAY
WE ARE EXPOSED !
3 REASONS TO
BELIEVE IT
Chapter 1
“
Reason n°1
CONSTANT
TRACKING

Technologies, always more evolved and invisible, follow
us everywhere. Beyond our digital activities, we track everything,
including our bodies’ functions. We know EVERYTHING about
ourselves and others.
Between 2000 and 2010, computers’
ability to recognize people in photos
improved by 3 orders of magnitude 
TEDTalk Juin 2013 «Why Privacy Matters » par Alessandro Acquisti, economist
« With the rise of sensors, biometrics, drones & more, it’s getting almost impossible to
remain off the grid. Anonymity is becoming elusive. […] As we move further into the
digital age, we’re starting to both fear and resent technology »
JWT– Trends 2014
Watch the video : http://bit.ly/1g96JSj

3 ILLUSTRATIONS
44% of people are less
inclined to shop in a place
they know they are tracked
« Shoppers reject in-store tracking by retailers », 
Opinion Lab, March 2014
Read the article : http://bit.ly/1rrYIus
“
Reason n°2
THE FEAR OF
« BIG BROTHER »

Edward Snowden’s revelations about PRISM raised the
fears of state surveillance. A question is now on our minds: if
tech giants collaborate with governments, what else are they
doing with our data? With the proliferation of hacking scandals,
fears are getting stronger and generate tensions around the
notion of privacy.
3 ILLUSTRATIONS
In the few months following the
PRISM scandal, American « cloud »
companies suffered a loss estimated
around 35 billions of dollars on their
sales. 
 The Information Technology & Innovation Foundation 
Read the article : http://bit.ly/1g7vE4R

Christian Fredrikson, F-Secure CEO in the french hebdo Le Point
Read the article : http://bit.ly/1mL3qE7

« Today, on our market, it’s an asset not to be American! Clients are mostly interested by
the products, but professionnals are more sensitive to who owns the data, and where »
41% of French people declare
that on social networks, nothing
can re-establish their trust (not
privacy policies, nor technical
guarantees, nor reputation, …) 
« Baromètre 2013 de la confiance des français dans le numérique », February 2013
Read the article : http://bit.ly/1mGrq8N
Reason n°3
GROWING
DEMANDS
“

Right to transparency, right to oblivion, right to know and
understand privacy policies: we are getting organised, in order not to
lose control over our private lives. We demand more power, against
governments and tech giants, who are using us as products, selling our
data.
3 ILLUSTRATIONS
75% of people think it’s useful to
know what brands make of their
data. 
« Identité : CATCH ME IF YOU CAN ! A quel « je » joue le consommateur ? »
AACC, livre blanc oct. 2013
Read the article : http://bit.ly/1mL4yro

« While we’ve concentrated on the growth in size of our networks, even if it means
leaking large quantities of data, we now favour their quality and their security »
Smartphone users are ready
to pay 5$ on average for an
app that would guarantee
their privacy
American study of the Economics Dpt of Colorado University (End of 2013) 
Read the article: http://bit.ly/1tJy6qM
MANIFESTATIONS ON
THE CONSUMER SIDE
Chapter 2
POPULAR MOVEMENTS
Because we don’t really know what states and companies make of our personal data, a movement of discontent is growing.
We are getting organised and we are claiming our right to anonymity and privacy. 

RIGHT TO OBLIVION IN EUROPE
After years of trial, a Spanish citizen won against Google : the
recognition and application of his right to oblivion, thanks to a ruling of
the European Court of Justice. From now on, any European citizen will
be able to ask web giants to get rid of internet pages concerning their
lives, if they can harm their interests. 
THE « STOP WATCHING US »
PETITION
An « anti-NSA » movement was organized in the USA after the PRISM
scandal. Speaking out against the start of massive state surveillance,
many organisations, from all political bonds and from a wide range of
SUSPICIOUS FACEBOOK 
Stigmatised as the bad guy of the web, exploiting our data for business
and advertising, we don’t trust Facebook anymore. With every new
purchase of the company, our doubts grow bigger. 
WHEN ART BECOMES OUR MASK 
The control over our privacy is becoming a subject for artistic research.
As technologies are getting closer to the « Minority Report » utopia,
Adam Harbey, an American artist, worked to create a series of tools to
protect us from intrusions. Technology takes a new turn and now serves
to hide us, rather than to reveal us. 

In February, a few days after Facebook
acquired Whatsapp, 4,95 millions users
downloaded and started to use Telegram, a
competitor app, publicly engaged for the
protection of privacy. 
CV Dazzle : make up
and hair styles to
counter facial
recognition softwares.
Stealth Wear : anti-
drones clothes (hiding
individuals’ thermic
print)
* http://bit.ly/1tJGGpz **http://bit.ly/1ik0VGQ
A few day after
purchasing Oculus Rift,
Facebook was the
center of Twitter
conversations,
multiplied by 45**.
Thousands of internet
users were disappointed
and expressed their
doubts about
Facebook’s intentions.
THOUGHTFUL SHARING
If we remain eager to share everything, we seek to better control the data we let slip into the digital world. We use simple
strategies and new sharing tools to compose our private and public information. 

SHARING MORE TO HIDE MORE
Danah Boyd, American researcher on social networks, explains that teenagers protect their privacy
by sharing just a tiny bit of information about themselves. The attention is focused on the few
things they share and the rest is left alone. Their private life remains private this way. It’s nowadays
a well known technique, and not only for teens.
http://bit.ly/N04Kmk
JUNK EMAIL ADRESS
Many e-mail services are only accessible online in exchange for personal
data: we sometimes give them false information to avoid being tracked.
At a time we have more and more email adresses per person (75% of
French people have several*), we often use one for junk emails and
sometimes using one of the many disposable email services available
online**. 
PRIVACY POLICIES
Instead of giving up social networks, we just use them is more clever
ways. Friends’ lists, privacy settings, restrictions: in 2013, 77% of
people*** changed their privacy settings on Facebook.

* http://bit.ly/1k0KZWM ** http://bit.ly/1pxHZZd
 ***http://bit.ly/1mGrq8N
NEW TYPES OF NETWORKS 
When massive social platforms seem more and more suspicious, we
prefer using new social networks, which seem to better protect our
privacy. 
Paid
We can keep all our rights on our
data and content, by paying a
monthly subscription. App.net
(microblogging platform) and
Pheed (Facebook equivalent)
permit us to go on with our habits
of social sharing without
compromising the safety of our
privacy. 
Ephemeral 
Snapchat, Meatspace or Blink
allow us to share anything with
anybody, with the promise of
leaving no trace behind: the
contents are automatically
destroyed after a few seconds to
guarantee our right to oblivion.
Anonymous
Whisper & Secret are two social apps allowing
us to share content anonymously, to avoid
leaving traces of our activities behind,
especially when sharing intimate and personal
content.
ALTERNATIVE TOOLS
We are conscious the exploitation of our personal data is becoming abusive and we want to act. New solutions and
alternatives exist to avoid tools like Google, to better protect ourselves. 

KNOWING TO CONTROL BETTER 
Tools that are able to gather information on the traces we leave behind
are multiplying, allowing us more power on managing our connexions. 
Privowny is a service allowing us to follow
our connections history and to gather a report
of all the traces left online (what connection,
what data and who uses them, etc.) on every
website we come to visit. 
Lightbeam is a plugin to be installed on our web browser,
saving and illustrating our browsing history, to identify links and
data leaks, usually invisible to the user. We can consult our
connexion charts, analyse them and work on avoiding the diffusion
ALTERNATIVE BROWSING
To avoid using Google, we can turn to new solutions. DuckDuckGo,
IxQuick or Qwant are new web browsers which keep our searches really
private.. 
ADVERTISING BLOCKS 
Targeted advertising get criticized often about the (lack of) respect of
personal data. A lot of applications, like « Adblock » are now available
and widely used (more than 250M downloads and more than 20M daily
users in April 2014 for AdBlock Plus*), in order to avoid the diffusion of
pop up windows, banners and other invading advertising formats. 

 * http://mzl.la/1hw1Hur	
  
DIGITAL INVISIBILITY CLOAK
If you are suspicious about technology, you might just as well seek to disappear entirely. We can choose extreme but efficient
solutions, which are used more and more, to guarantee our complete anonymity. This way, we’ll be able to discuss, exchange
and surf the web in a pitch black environment.
ALL-ENCRYPTED
Military-graded encryption is becoming the new norm. Thanks to
innovative products and services, we protect our communication from
outsiders’ intrusions more efficiently. 
The Blackphone : a smartphone created
to protect the privacy of mobile users.
Everything is encrypted and we can choose
what we want and don’t want to share. 
Encrypted e-mails : e-
mail services like Dark Mail
Alliance & HemL.is offer a
complete encryption of our email
communications. 
Wickr : this instant messaging app don’t stock any data on its servers and
offers the users the possibility to precisely plan who can read their messages
and for how long it will be available. They can also exchange anonymously.
Moreover, the app is completely encrypted, with military graded security. How
could users ask for more?
Obscure transactions
We can now remain anonymous even when purchasing goods. The
development of virtual encrypted money (Bitcoin, Litecoin, …)
gives us the possibility to make transactions that are free of any
traces. Some anonymous marketplaces go further. Often used for
illegal sales, Silk Road 2.0 & Pirate’s Cove can lead the way for the
development of new commerce platforms, anonymous for
everybody. 
Safer connections. 
Since our internet routers track us and
our computers have IP addresses,
anonymity is impossible. New tools are
being developed to protect our online
navigation and our localisation. 

The Tor Network : 
An « Onion router »
keeping our online
connections
anonymous
Starkit & Safeplug 
Boxes that can be plugged
to computers and routers
to surf the web freely. 
Disconnect 
A plug-in allowing us to use any web browser
anonymously, without being localized
ANONYMITY’S GLORY 
Anonymity, on networks and on warious web platforms we use, is
not always guaranteed. New solutions allow us to turn this around
for good.
IF THERE IS A GROWING AWARENESS
THERE’S ALSO A TRUE PARADOX :
39% of people found it was useful
to share personal information with a
brand
« Identité : CATCH ME IF YOU CAN ! A quel « je » joue le consommateur ? »
AACC, livre blanc oct. 2013
61% of internet users would trade
privacy for truly personalised offers. 
ACCENTURE, November 2012
Read the article: http://on.mash.to/1lMUAGj
« I don’t like people tracking my location,
but I want to know, ‘what are some nearby
Italian restaurants that my friends have
liked’ »
Auren Hoffman, CEO of Rapleaf in http://bit.ly/1fdYZPs
	
  
IMPACT ON
RELATIONSHIPS
WITH CONSUMERS
Chapter 3
Today, if companies focus only on volume and 
the accumulation of data, it is necessary that they change their approach. To
(re)establish a lasting relationship of trust with consumers, brands need to become
clever with their personal data collection. 
IN THE AGE OF « BIG DATA »,
RELEVANCE AND MODERATION
ARE THE KEYS TO SUCCESS.
#1 PROMOTING TRANSPARENCY
Brands need to be clear and explain what they make of personal data – this can be a way to allow them to rebuild a
relationship of mutual trust with their consumers. From the first contact, it is crucial to explain and justify each question, each
request of information.
GOOGLE
Google produced a video to clearly explain the processes that
would permit them to share personal information with
governments. The brand attempts to re-establish trust with
its users, giving details about the process and the different
barriers they try to put to avoid revealing information. An
interesting first initiative from the tech giant. 
APPLE
The brand published its first « Transparency Report » in
November 2013. Like Google, they detail and explain how they
came to share data with governments. They also try to reassure
consumers, telling their model is not based on the collection of
data and it will never be.
Watch the video: http://bit.ly/TpzIbW
#2 INSISTING ON SECURITY
At a time when most brands are developing connected objects, thinking about the internet security is more than crucial: 84%
of French people see them as a progress and 60% want to use them for their personal security*. Thus, reassuring people
about privacy and security will be the key to nurturing a new relationship with the ever more connected consumers. 
ENCRYPTION RACE AT YAHOO

After PRISM, Yahoo decided to encrypt everything. After
making all connections HTTPS, the company has encrypted the
totality of email accounts data since January 2014 and the data
from its data centers since March 2014. At the beginning of
April, the Chief of Security also announced the intention to
encrypt the whole Yahoo platform. They are pushing security in
their development, to re-establish trust from users. 
* BVA http://bit.ly/1gUXb9V
« MYDATA » PROJECT
From CRM, are we going towards VRM ? The consumer will
soon be able to manage his relationships toward brands, rather
than the contrary. In the UK, the « MYDATA » project is
going in this direction. With the support of the government
and many brands (HSBC, MasterCard, Google, T-Mobile,…),
the program would allow consumers to keep a perfect track of
what data is known by which brand. They could then control
and keep a trace of what brands know about them. 
#3 GIVE UP CONTROL
To reassure consumers, brands have to transfer the control of the relationship from their hands to the consumers’. Allowing
them to know what data they own, who uses it and what they do with it, will be an efficient means to avoid a doubt crisis
towards brands. 
FACEBOOK REINVENTS ITS CONNECTIONS
During the F8 conference, Facebook announced two major
changes to come regarding the management of personal
data. Users will be able to precisely select which data they are
willing to share and an anonymous FB login will be created to
register on apps. The company is now clearly aware of the
real need of reassuring the public and is looking for efficient
answers, to preserve its hegemonic position on the web.
#4 BRING ADDED VALUE
When brands ask for personal data, consumers expect them to use it in the most clever way possible, to receive relevant offers,
with a real added-value. Brands have the capacity to be of a better service to their consumers and to respond to their needs, in
a more than ever personalised way. 
BURBERRY « CUSTOMER 360 »
Pioneer of the luxury digital store, Burberry also developed
an interesting customer experience. They offer their
consumers the possibility to create a profile where they can
define their preferences and their fashion phobias, as well as
tracking their trials and purchases. Consulting their profiles,
sales persons can advise them. A personal shopper who
knows you better than anyone, at the moment you enter the
door: this is a real extraordinary shopping experience.
IS THERE JUST ONE STEP BEFORE
A PRISM  SCANDAL FOR BRANDS ?

Brands can follow every move and action of the consumers, without them
knowing. What will happen when they discover what their favourite brands
are making of their data, without asking permission? 

The brands who will shine will be those that acted to protect the best interests
of their consumers.
http://mashable.com/2013/08/06/privacy-comic/
Presentation made by Paola Craveiro & Mathieu Genelle 
THANKS .o/
CONTACT US
Hélène Meinerad
+33 (0)6 16 72 09 46
helene.meinerad@chemistry-agency.fr
Mathieu Genelle
+33 (0)6 19 76 11 95
mathieu.genelle@chemistry-agency
http://bit.ly/1q3SmDh
 http://bit.ly/1DwhaYm
YOU CAN FIND OUR TREND REPORTS ON
CHEMISTRY SLIDESHARE

More Related Content

What's hot

Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentationmlw32785
 
Security tools
Security toolsSecurity tools
Security tools
arfan shahzad
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risks
Parakum Pathirana
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
Priyab Satoshi
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
grahamwell
 
Cyber security
Cyber securityCyber security
Cyber security
Harsh verma
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber lawhimanshumunjal
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
Rishabh Kataria
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
Kristin Briney
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
Dr. Hemant Kumar Singh
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
Arpan Shah
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
primeteacher32
 
Digital Security
Digital SecurityDigital Security
Digital Security
accenture
 
Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPR
DipanjanDey12
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
tomasztopa
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Md Nishad
 
Darknet
DarknetDarknet
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Mohammad Ahmed
 
Data Privacy - Security of Personal Information
Data Privacy - Security of Personal InformationData Privacy - Security of Personal Information
Data Privacy - Security of Personal Information
JDP Consulting
 

What's hot (20)

Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
Security tools
Security toolsSecurity tools
Security tools
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risks
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Digital Security
Digital SecurityDigital Security
Digital Security
 
Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPR
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Darknet
DarknetDarknet
Darknet
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
Data Privacy - Security of Personal Information
Data Privacy - Security of Personal InformationData Privacy - Security of Personal Information
Data Privacy - Security of Personal Information
 

Viewers also liked

Food
FoodFood
The art of keeping it simple
The art of keeping it simpleThe art of keeping it simple
The art of keeping it simple
CHEMISTRY AGENCY
 
The importance of physical realm in a digital world
The importance of physical realm in a digital worldThe importance of physical realm in a digital world
The importance of physical realm in a digital worldCHEMISTRY AGENCY
 
Le vrai, le véritable
Le vrai, le véritable Le vrai, le véritable
Le vrai, le véritable
CHEMISTRY AGENCY
 
The new sense of ownership
The new sense of ownershipThe new sense of ownership
The new sense of ownership
CHEMISTRY AGENCY
 
Le nouveau rapport à la propriété
Le nouveau rapport à la propriétéLe nouveau rapport à la propriété
Le nouveau rapport à la propriété
CHEMISTRY AGENCY
 
Nouveaux Genres
Nouveaux Genres Nouveaux Genres
Nouveaux Genres
CHEMISTRY AGENCY
 
Les engagés aujourd'hui : comprendre les nouvelles normes de l'engagement con...
Les engagés aujourd'hui : comprendre les nouvelles normes de l'engagement con...Les engagés aujourd'hui : comprendre les nouvelles normes de l'engagement con...
Les engagés aujourd'hui : comprendre les nouvelles normes de l'engagement con...
CHEMISTRY AGENCY
 
De l'art de la simplicité
De l'art de la simplicité De l'art de la simplicité
De l'art de la simplicité
CHEMISTRY AGENCY
 
L'esprit du jeu
L'esprit du jeu L'esprit du jeu
L'esprit du jeu
CHEMISTRY AGENCY
 
La maîtrise de la vie privée à l'heure du digital
La maîtrise de la vie privée à l'heure du digitalLa maîtrise de la vie privée à l'heure du digital
La maîtrise de la vie privée à l'heure du digital
CHEMISTRY AGENCY
 
Consommer, S'engager
Consommer, S'engagerConsommer, S'engager
Consommer, S'engager
CHEMISTRY AGENCY
 
De l'importance du "physique" dans un monde digital
De l'importance du "physique" dans un monde digitalDe l'importance du "physique" dans un monde digital
De l'importance du "physique" dans un monde digital
CHEMISTRY AGENCY
 
Personal Care - Hygiène, soin & beauté
Personal Care - Hygiène, soin & beautéPersonal Care - Hygiène, soin & beauté
Personal Care - Hygiène, soin & beauté
CHEMISTRY AGENCY
 
Les nouvelles pratiques pour une communication cohérente à l’ère du digital
Les nouvelles pratiques pour une communication cohérente à l’ère du digitalLes nouvelles pratiques pour une communication cohérente à l’ère du digital
Les nouvelles pratiques pour une communication cohérente à l’ère du digital
The Message Company
 
Le marketing digital des marques de mode face aux stratégies des influenceurs...
Le marketing digital des marques de mode face aux stratégies des influenceurs...Le marketing digital des marques de mode face aux stratégies des influenceurs...
Le marketing digital des marques de mode face aux stratégies des influenceurs...
omsrp
 
Le Cahier de tendances Food is Social N°3
Le Cahier de tendances Food is Social N°3Le Cahier de tendances Food is Social N°3
Le Cahier de tendances Food is Social N°3
Agence Kingcom
 
Feliz Cinco de Mayo!
Feliz Cinco de Mayo!Feliz Cinco de Mayo!
Feliz Cinco de Mayo!
Young & Rubicam
 
Data : To be or not to be Smart ?
Data : To be or not to be Smart ? Data : To be or not to be Smart ?
Data : To be or not to be Smart ?
tequilarapido
 

Viewers also liked (20)

Food
FoodFood
Food
 
The art of keeping it simple
The art of keeping it simpleThe art of keeping it simple
The art of keeping it simple
 
The importance of physical realm in a digital world
The importance of physical realm in a digital worldThe importance of physical realm in a digital world
The importance of physical realm in a digital world
 
Consume, commit yourself
Consume, commit yourselfConsume, commit yourself
Consume, commit yourself
 
Le vrai, le véritable
Le vrai, le véritable Le vrai, le véritable
Le vrai, le véritable
 
The new sense of ownership
The new sense of ownershipThe new sense of ownership
The new sense of ownership
 
Le nouveau rapport à la propriété
Le nouveau rapport à la propriétéLe nouveau rapport à la propriété
Le nouveau rapport à la propriété
 
Nouveaux Genres
Nouveaux Genres Nouveaux Genres
Nouveaux Genres
 
Les engagés aujourd'hui : comprendre les nouvelles normes de l'engagement con...
Les engagés aujourd'hui : comprendre les nouvelles normes de l'engagement con...Les engagés aujourd'hui : comprendre les nouvelles normes de l'engagement con...
Les engagés aujourd'hui : comprendre les nouvelles normes de l'engagement con...
 
De l'art de la simplicité
De l'art de la simplicité De l'art de la simplicité
De l'art de la simplicité
 
L'esprit du jeu
L'esprit du jeu L'esprit du jeu
L'esprit du jeu
 
La maîtrise de la vie privée à l'heure du digital
La maîtrise de la vie privée à l'heure du digitalLa maîtrise de la vie privée à l'heure du digital
La maîtrise de la vie privée à l'heure du digital
 
Consommer, S'engager
Consommer, S'engagerConsommer, S'engager
Consommer, S'engager
 
De l'importance du "physique" dans un monde digital
De l'importance du "physique" dans un monde digitalDe l'importance du "physique" dans un monde digital
De l'importance du "physique" dans un monde digital
 
Personal Care - Hygiène, soin & beauté
Personal Care - Hygiène, soin & beautéPersonal Care - Hygiène, soin & beauté
Personal Care - Hygiène, soin & beauté
 
Les nouvelles pratiques pour une communication cohérente à l’ère du digital
Les nouvelles pratiques pour une communication cohérente à l’ère du digitalLes nouvelles pratiques pour une communication cohérente à l’ère du digital
Les nouvelles pratiques pour une communication cohérente à l’ère du digital
 
Le marketing digital des marques de mode face aux stratégies des influenceurs...
Le marketing digital des marques de mode face aux stratégies des influenceurs...Le marketing digital des marques de mode face aux stratégies des influenceurs...
Le marketing digital des marques de mode face aux stratégies des influenceurs...
 
Le Cahier de tendances Food is Social N°3
Le Cahier de tendances Food is Social N°3Le Cahier de tendances Food is Social N°3
Le Cahier de tendances Food is Social N°3
 
Feliz Cinco de Mayo!
Feliz Cinco de Mayo!Feliz Cinco de Mayo!
Feliz Cinco de Mayo!
 
Data : To be or not to be Smart ?
Data : To be or not to be Smart ? Data : To be or not to be Smart ?
Data : To be or not to be Smart ?
 

Similar to Privacy in the digital era

Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
Carolina Rossini
 
Week 5: Dataveillance
Week 5: DataveillanceWeek 5: Dataveillance
Week 5: Dataveillance
Tom Allen
 
Internet Privacy
Internet PrivacyInternet Privacy
10 Overriding Themes from SXSW (March 2014)
10 Overriding Themes from SXSW (March 2014)10 Overriding Themes from SXSW (March 2014)
10 Overriding Themes from SXSW (March 2014)
J. Walter Thompson Intelligence
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethetecnologico de tuxtepec
 
What's Next: The World of Fake News
What's Next: The World of Fake NewsWhat's Next: The World of Fake News
What's Next: The World of Fake News
Ogilvy Consulting
 
Designing for Privacy in an Increasingly Public World — Speed Talk
Designing for Privacy in an Increasingly Public World — Speed TalkDesigning for Privacy in an Increasingly Public World — Speed Talk
Designing for Privacy in an Increasingly Public World — Speed Talk
Robert Stribley
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
Brian Rowe
 
Evolution of Social Media and its effects on Knowledge Organisation
Evolution of Social Media and its effects on Knowledge OrganisationEvolution of Social Media and its effects on Knowledge Organisation
Evolution of Social Media and its effects on Knowledge Organisation
Collabor8now Ltd
 
Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...
Dave Holland
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
College Papers Writing Service
 
Test test test
Test test test Test test test
Test test test jepezi
 
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
RAJU852744
 
Top Trends from SXSW Interactive 2014. The Big Roundup.
Top Trends from SXSW Interactive 2014. The Big Roundup.Top Trends from SXSW Interactive 2014. The Big Roundup.
Top Trends from SXSW Interactive 2014. The Big Roundup.
Ashika Chauhan
 
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...
Future Agenda
 
Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986
Chelsea Porter
 
4 Trends Shaping the Future of Social Media
4 Trends Shaping the Future of Social Media4 Trends Shaping the Future of Social Media
4 Trends Shaping the Future of Social Media
plusaziz
 
Safe use of cloud - alternative cloud
Safe use of cloud - alternative cloudSafe use of cloud - alternative cloud
Safe use of cloud - alternative cloud
Tomppa Järvinen
 
INTERNET
INTERNETINTERNET
INTERNET
yaharamazing
 
The Privacy Illusion
The Privacy IllusionThe Privacy Illusion
The Privacy Illusion
Mary Aviles
 

Similar to Privacy in the digital era (20)

Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
 
Week 5: Dataveillance
Week 5: DataveillanceWeek 5: Dataveillance
Week 5: Dataveillance
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
10 Overriding Themes from SXSW (March 2014)
10 Overriding Themes from SXSW (March 2014)10 Overriding Themes from SXSW (March 2014)
10 Overriding Themes from SXSW (March 2014)
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethe
 
What's Next: The World of Fake News
What's Next: The World of Fake NewsWhat's Next: The World of Fake News
What's Next: The World of Fake News
 
Designing for Privacy in an Increasingly Public World — Speed Talk
Designing for Privacy in an Increasingly Public World — Speed TalkDesigning for Privacy in an Increasingly Public World — Speed Talk
Designing for Privacy in an Increasingly Public World — Speed Talk
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
Evolution of Social Media and its effects on Knowledge Organisation
Evolution of Social Media and its effects on Knowledge OrganisationEvolution of Social Media and its effects on Knowledge Organisation
Evolution of Social Media and its effects on Knowledge Organisation
 
Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
 
Test test test
Test test test Test test test
Test test test
 
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
 
Top Trends from SXSW Interactive 2014. The Big Roundup.
Top Trends from SXSW Interactive 2014. The Big Roundup.Top Trends from SXSW Interactive 2014. The Big Roundup.
Top Trends from SXSW Interactive 2014. The Big Roundup.
 
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...
 
Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986
 
4 Trends Shaping the Future of Social Media
4 Trends Shaping the Future of Social Media4 Trends Shaping the Future of Social Media
4 Trends Shaping the Future of Social Media
 
Safe use of cloud - alternative cloud
Safe use of cloud - alternative cloudSafe use of cloud - alternative cloud
Safe use of cloud - alternative cloud
 
INTERNET
INTERNETINTERNET
INTERNET
 
The Privacy Illusion
The Privacy IllusionThe Privacy Illusion
The Privacy Illusion
 

Recently uploaded

May 2024 - VBOUT Partners Meeting Group Session
May 2024 - VBOUT Partners Meeting Group SessionMay 2024 - VBOUT Partners Meeting Group Session
May 2024 - VBOUT Partners Meeting Group Session
Vbout.com
 
The Old Oak - Press Kit - Cannes Film Festival 2023
The Old Oak - Press Kit - Cannes Film Festival 2023The Old Oak - Press Kit - Cannes Film Festival 2023
The Old Oak - Press Kit - Cannes Film Festival 2023
Pascal Fintoni
 
FullSail: HOF - Presentation Phil Pallen
FullSail: HOF - Presentation Phil PallenFullSail: HOF - Presentation Phil Pallen
FullSail: HOF - Presentation Phil Pallen
travisomalana
 
Gokila digital marketing| consultant| Coimbatore
Gokila digital marketing| consultant| CoimbatoreGokila digital marketing| consultant| Coimbatore
Gokila digital marketing| consultant| Coimbatore
dmgokila
 
Traditional Store Audits are Outdated: A New Approach to Protecting Your Bran...
Traditional Store Audits are Outdated: A New Approach to Protecting Your Bran...Traditional Store Audits are Outdated: A New Approach to Protecting Your Bran...
Traditional Store Audits are Outdated: A New Approach to Protecting Your Bran...
Auxis Consulting & Outsourcing
 
Offissa Dizayn - Otel, Kafe, Restoran Kataloqu_240603_011042.pdf
Offissa Dizayn - Otel, Kafe, Restoran Kataloqu_240603_011042.pdfOffissa Dizayn - Otel, Kafe, Restoran Kataloqu_240603_011042.pdf
Offissa Dizayn - Otel, Kafe, Restoran Kataloqu_240603_011042.pdf
offisadizayn
 
How to Use AI to Write a High-Quality Article that Ranks
How to Use AI to Write a High-Quality Article that RanksHow to Use AI to Write a High-Quality Article that Ranks
How to Use AI to Write a High-Quality Article that Ranks
minatamang0021
 
Playlist and Paint Event with Sony Music U
Playlist and Paint Event with Sony Music UPlaylist and Paint Event with Sony Music U
Playlist and Paint Event with Sony Music U
SemajahParker
 
janani Digital Marketer|Digital Marketing consultant|Marketing Promotion|Coim...
janani Digital Marketer|Digital Marketing consultant|Marketing Promotion|Coim...janani Digital Marketer|Digital Marketing consultant|Marketing Promotion|Coim...
janani Digital Marketer|Digital Marketing consultant|Marketing Promotion|Coim...
janudm24
 
QuickBooks Sync Manager Repair Tool- What You Need to Know
QuickBooks Sync Manager Repair Tool- What You Need to KnowQuickBooks Sync Manager Repair Tool- What You Need to Know
QuickBooks Sync Manager Repair Tool- What You Need to Know
markmargaret23
 
What’s “In” and “Out” for ABM in 2024: Plays That Help You Grow and Ones to L...
What’s “In” and “Out” for ABM in 2024: Plays That Help You Grow and Ones to L...What’s “In” and “Out” for ABM in 2024: Plays That Help You Grow and Ones to L...
What’s “In” and “Out” for ABM in 2024: Plays That Help You Grow and Ones to L...
Demandbase
 
Unlocking Everyday Narratives: The Power of Storytelling in Marketing - Chad...
Unlocking Everyday Narratives: The Power of Storytelling in Marketing  - Chad...Unlocking Everyday Narratives: The Power of Storytelling in Marketing  - Chad...
Unlocking Everyday Narratives: The Power of Storytelling in Marketing - Chad...
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
SEO Master Class - Steve Wiideman, Wiideman Consulting Group
SEO Master Class - Steve Wiideman,  Wiideman Consulting GroupSEO Master Class - Steve Wiideman,  Wiideman Consulting Group
SEO Master Class - Steve Wiideman, Wiideman Consulting Group
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
Unknown to Unforgettable - The Art and Science to Being Irresistible on Camer...
Unknown to Unforgettable - The Art and Science to Being Irresistible on Camer...Unknown to Unforgettable - The Art and Science to Being Irresistible on Camer...
Unknown to Unforgettable - The Art and Science to Being Irresistible on Camer...
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
Etsy Marketing Guide - Tips For Selling Digital Products
Etsy Marketing Guide - Tips For Selling Digital ProductsEtsy Marketing Guide - Tips For Selling Digital Products
Etsy Marketing Guide - Tips For Selling Digital Products
kcblog21
 
Smart Tools, Smarter Business -15 AI Tools to Optimize Your Workflows from Id...
Smart Tools, Smarter Business -15 AI Tools to Optimize Your Workflows from Id...Smart Tools, Smarter Business -15 AI Tools to Optimize Your Workflows from Id...
Smart Tools, Smarter Business -15 AI Tools to Optimize Your Workflows from Id...
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
Checkout Abandonment - CRO School by Mailmodo
Checkout Abandonment - CRO School by MailmodoCheckout Abandonment - CRO School by Mailmodo
Checkout Abandonment - CRO School by Mailmodo
saba771143
 
Trust Element Assessment: How Your Online Presence Affects Outbound Lead Gene...
Trust Element Assessment: How Your Online Presence Affects Outbound Lead Gene...Trust Element Assessment: How Your Online Presence Affects Outbound Lead Gene...
Trust Element Assessment: How Your Online Presence Affects Outbound Lead Gene...
Martal Group
 
My Personal Brand Exploration by Mariano
My Personal Brand Exploration by MarianoMy Personal Brand Exploration by Mariano
My Personal Brand Exploration by Mariano
marianooscos
 
How to Make Your Trade Show Booth Interactive
How to Make Your Trade Show Booth InteractiveHow to Make Your Trade Show Booth Interactive
How to Make Your Trade Show Booth Interactive
Blue Atlas Marketing
 

Recently uploaded (20)

May 2024 - VBOUT Partners Meeting Group Session
May 2024 - VBOUT Partners Meeting Group SessionMay 2024 - VBOUT Partners Meeting Group Session
May 2024 - VBOUT Partners Meeting Group Session
 
The Old Oak - Press Kit - Cannes Film Festival 2023
The Old Oak - Press Kit - Cannes Film Festival 2023The Old Oak - Press Kit - Cannes Film Festival 2023
The Old Oak - Press Kit - Cannes Film Festival 2023
 
FullSail: HOF - Presentation Phil Pallen
FullSail: HOF - Presentation Phil PallenFullSail: HOF - Presentation Phil Pallen
FullSail: HOF - Presentation Phil Pallen
 
Gokila digital marketing| consultant| Coimbatore
Gokila digital marketing| consultant| CoimbatoreGokila digital marketing| consultant| Coimbatore
Gokila digital marketing| consultant| Coimbatore
 
Traditional Store Audits are Outdated: A New Approach to Protecting Your Bran...
Traditional Store Audits are Outdated: A New Approach to Protecting Your Bran...Traditional Store Audits are Outdated: A New Approach to Protecting Your Bran...
Traditional Store Audits are Outdated: A New Approach to Protecting Your Bran...
 
Offissa Dizayn - Otel, Kafe, Restoran Kataloqu_240603_011042.pdf
Offissa Dizayn - Otel, Kafe, Restoran Kataloqu_240603_011042.pdfOffissa Dizayn - Otel, Kafe, Restoran Kataloqu_240603_011042.pdf
Offissa Dizayn - Otel, Kafe, Restoran Kataloqu_240603_011042.pdf
 
How to Use AI to Write a High-Quality Article that Ranks
How to Use AI to Write a High-Quality Article that RanksHow to Use AI to Write a High-Quality Article that Ranks
How to Use AI to Write a High-Quality Article that Ranks
 
Playlist and Paint Event with Sony Music U
Playlist and Paint Event with Sony Music UPlaylist and Paint Event with Sony Music U
Playlist and Paint Event with Sony Music U
 
janani Digital Marketer|Digital Marketing consultant|Marketing Promotion|Coim...
janani Digital Marketer|Digital Marketing consultant|Marketing Promotion|Coim...janani Digital Marketer|Digital Marketing consultant|Marketing Promotion|Coim...
janani Digital Marketer|Digital Marketing consultant|Marketing Promotion|Coim...
 
QuickBooks Sync Manager Repair Tool- What You Need to Know
QuickBooks Sync Manager Repair Tool- What You Need to KnowQuickBooks Sync Manager Repair Tool- What You Need to Know
QuickBooks Sync Manager Repair Tool- What You Need to Know
 
What’s “In” and “Out” for ABM in 2024: Plays That Help You Grow and Ones to L...
What’s “In” and “Out” for ABM in 2024: Plays That Help You Grow and Ones to L...What’s “In” and “Out” for ABM in 2024: Plays That Help You Grow and Ones to L...
What’s “In” and “Out” for ABM in 2024: Plays That Help You Grow and Ones to L...
 
Unlocking Everyday Narratives: The Power of Storytelling in Marketing - Chad...
Unlocking Everyday Narratives: The Power of Storytelling in Marketing  - Chad...Unlocking Everyday Narratives: The Power of Storytelling in Marketing  - Chad...
Unlocking Everyday Narratives: The Power of Storytelling in Marketing - Chad...
 
SEO Master Class - Steve Wiideman, Wiideman Consulting Group
SEO Master Class - Steve Wiideman,  Wiideman Consulting GroupSEO Master Class - Steve Wiideman,  Wiideman Consulting Group
SEO Master Class - Steve Wiideman, Wiideman Consulting Group
 
Unknown to Unforgettable - The Art and Science to Being Irresistible on Camer...
Unknown to Unforgettable - The Art and Science to Being Irresistible on Camer...Unknown to Unforgettable - The Art and Science to Being Irresistible on Camer...
Unknown to Unforgettable - The Art and Science to Being Irresistible on Camer...
 
Etsy Marketing Guide - Tips For Selling Digital Products
Etsy Marketing Guide - Tips For Selling Digital ProductsEtsy Marketing Guide - Tips For Selling Digital Products
Etsy Marketing Guide - Tips For Selling Digital Products
 
Smart Tools, Smarter Business -15 AI Tools to Optimize Your Workflows from Id...
Smart Tools, Smarter Business -15 AI Tools to Optimize Your Workflows from Id...Smart Tools, Smarter Business -15 AI Tools to Optimize Your Workflows from Id...
Smart Tools, Smarter Business -15 AI Tools to Optimize Your Workflows from Id...
 
Checkout Abandonment - CRO School by Mailmodo
Checkout Abandonment - CRO School by MailmodoCheckout Abandonment - CRO School by Mailmodo
Checkout Abandonment - CRO School by Mailmodo
 
Trust Element Assessment: How Your Online Presence Affects Outbound Lead Gene...
Trust Element Assessment: How Your Online Presence Affects Outbound Lead Gene...Trust Element Assessment: How Your Online Presence Affects Outbound Lead Gene...
Trust Element Assessment: How Your Online Presence Affects Outbound Lead Gene...
 
My Personal Brand Exploration by Mariano
My Personal Brand Exploration by MarianoMy Personal Brand Exploration by Mariano
My Personal Brand Exploration by Mariano
 
How to Make Your Trade Show Booth Interactive
How to Make Your Trade Show Booth InteractiveHow to Make Your Trade Show Booth Interactive
How to Make Your Trade Show Booth Interactive
 

Privacy in the digital era

  • 2. The more our lives become digital, the more our personal data travels. We share everything, through browsing, purchases, social activities and all the services we subscribe to. SHARING HAS BECOME SECOND NATURE.
  • 3. “The Internet’s not written in pencil, […] it’s written in ink” *Watch the video : http://bit.ly/1hpNwLK The Social Network*
  • 4. At a time when privacy is increasingly fleeting, we want to regain control and we are demanding new rights to protect ourselves. WE LEARNT THE HARD WAY WE ARE EXPOSED !
  • 5. 3 REASONS TO BELIEVE IT Chapter 1
  • 6. “ Reason n°1 CONSTANT TRACKING Technologies, always more evolved and invisible, follow us everywhere. Beyond our digital activities, we track everything, including our bodies’ functions. We know EVERYTHING about ourselves and others.
  • 7. Between 2000 and 2010, computers’ ability to recognize people in photos improved by 3 orders of magnitude TEDTalk Juin 2013 «Why Privacy Matters » par Alessandro Acquisti, economist « With the rise of sensors, biometrics, drones & more, it’s getting almost impossible to remain off the grid. Anonymity is becoming elusive. […] As we move further into the digital age, we’re starting to both fear and resent technology » JWT– Trends 2014 Watch the video : http://bit.ly/1g96JSj 3 ILLUSTRATIONS 44% of people are less inclined to shop in a place they know they are tracked « Shoppers reject in-store tracking by retailers », Opinion Lab, March 2014 Read the article : http://bit.ly/1rrYIus
  • 8. “ Reason n°2 THE FEAR OF « BIG BROTHER » Edward Snowden’s revelations about PRISM raised the fears of state surveillance. A question is now on our minds: if tech giants collaborate with governments, what else are they doing with our data? With the proliferation of hacking scandals, fears are getting stronger and generate tensions around the notion of privacy.
  • 9. 3 ILLUSTRATIONS In the few months following the PRISM scandal, American « cloud » companies suffered a loss estimated around 35 billions of dollars on their sales. The Information Technology & Innovation Foundation Read the article : http://bit.ly/1g7vE4R Christian Fredrikson, F-Secure CEO in the french hebdo Le Point Read the article : http://bit.ly/1mL3qE7 « Today, on our market, it’s an asset not to be American! Clients are mostly interested by the products, but professionnals are more sensitive to who owns the data, and where » 41% of French people declare that on social networks, nothing can re-establish their trust (not privacy policies, nor technical guarantees, nor reputation, …) « Baromètre 2013 de la confiance des français dans le numérique », February 2013 Read the article : http://bit.ly/1mGrq8N
  • 10. Reason n°3 GROWING DEMANDS “ Right to transparency, right to oblivion, right to know and understand privacy policies: we are getting organised, in order not to lose control over our private lives. We demand more power, against governments and tech giants, who are using us as products, selling our data.
  • 11. 3 ILLUSTRATIONS 75% of people think it’s useful to know what brands make of their data. « Identité : CATCH ME IF YOU CAN ! A quel « je » joue le consommateur ? » AACC, livre blanc oct. 2013 Read the article : http://bit.ly/1mL4yro « While we’ve concentrated on the growth in size of our networks, even if it means leaking large quantities of data, we now favour their quality and their security » Smartphone users are ready to pay 5$ on average for an app that would guarantee their privacy American study of the Economics Dpt of Colorado University (End of 2013) Read the article: http://bit.ly/1tJy6qM
  • 13. POPULAR MOVEMENTS Because we don’t really know what states and companies make of our personal data, a movement of discontent is growing. We are getting organised and we are claiming our right to anonymity and privacy. RIGHT TO OBLIVION IN EUROPE After years of trial, a Spanish citizen won against Google : the recognition and application of his right to oblivion, thanks to a ruling of the European Court of Justice. From now on, any European citizen will be able to ask web giants to get rid of internet pages concerning their lives, if they can harm their interests. THE « STOP WATCHING US » PETITION An « anti-NSA » movement was organized in the USA after the PRISM scandal. Speaking out against the start of massive state surveillance, many organisations, from all political bonds and from a wide range of
  • 14. SUSPICIOUS FACEBOOK Stigmatised as the bad guy of the web, exploiting our data for business and advertising, we don’t trust Facebook anymore. With every new purchase of the company, our doubts grow bigger. WHEN ART BECOMES OUR MASK The control over our privacy is becoming a subject for artistic research. As technologies are getting closer to the « Minority Report » utopia, Adam Harbey, an American artist, worked to create a series of tools to protect us from intrusions. Technology takes a new turn and now serves to hide us, rather than to reveal us. In February, a few days after Facebook acquired Whatsapp, 4,95 millions users downloaded and started to use Telegram, a competitor app, publicly engaged for the protection of privacy. CV Dazzle : make up and hair styles to counter facial recognition softwares. Stealth Wear : anti- drones clothes (hiding individuals’ thermic print) * http://bit.ly/1tJGGpz **http://bit.ly/1ik0VGQ A few day after purchasing Oculus Rift, Facebook was the center of Twitter conversations, multiplied by 45**. Thousands of internet users were disappointed and expressed their doubts about Facebook’s intentions.
  • 15. THOUGHTFUL SHARING If we remain eager to share everything, we seek to better control the data we let slip into the digital world. We use simple strategies and new sharing tools to compose our private and public information. SHARING MORE TO HIDE MORE Danah Boyd, American researcher on social networks, explains that teenagers protect their privacy by sharing just a tiny bit of information about themselves. The attention is focused on the few things they share and the rest is left alone. Their private life remains private this way. It’s nowadays a well known technique, and not only for teens. http://bit.ly/N04Kmk
  • 16. JUNK EMAIL ADRESS Many e-mail services are only accessible online in exchange for personal data: we sometimes give them false information to avoid being tracked. At a time we have more and more email adresses per person (75% of French people have several*), we often use one for junk emails and sometimes using one of the many disposable email services available online**. PRIVACY POLICIES Instead of giving up social networks, we just use them is more clever ways. Friends’ lists, privacy settings, restrictions: in 2013, 77% of people*** changed their privacy settings on Facebook. * http://bit.ly/1k0KZWM ** http://bit.ly/1pxHZZd ***http://bit.ly/1mGrq8N
  • 17. NEW TYPES OF NETWORKS When massive social platforms seem more and more suspicious, we prefer using new social networks, which seem to better protect our privacy. Paid We can keep all our rights on our data and content, by paying a monthly subscription. App.net (microblogging platform) and Pheed (Facebook equivalent) permit us to go on with our habits of social sharing without compromising the safety of our privacy. Ephemeral Snapchat, Meatspace or Blink allow us to share anything with anybody, with the promise of leaving no trace behind: the contents are automatically destroyed after a few seconds to guarantee our right to oblivion. Anonymous Whisper & Secret are two social apps allowing us to share content anonymously, to avoid leaving traces of our activities behind, especially when sharing intimate and personal content.
  • 18. ALTERNATIVE TOOLS We are conscious the exploitation of our personal data is becoming abusive and we want to act. New solutions and alternatives exist to avoid tools like Google, to better protect ourselves. KNOWING TO CONTROL BETTER Tools that are able to gather information on the traces we leave behind are multiplying, allowing us more power on managing our connexions. Privowny is a service allowing us to follow our connections history and to gather a report of all the traces left online (what connection, what data and who uses them, etc.) on every website we come to visit. Lightbeam is a plugin to be installed on our web browser, saving and illustrating our browsing history, to identify links and data leaks, usually invisible to the user. We can consult our connexion charts, analyse them and work on avoiding the diffusion
  • 19. ALTERNATIVE BROWSING To avoid using Google, we can turn to new solutions. DuckDuckGo, IxQuick or Qwant are new web browsers which keep our searches really private.. ADVERTISING BLOCKS Targeted advertising get criticized often about the (lack of) respect of personal data. A lot of applications, like « Adblock » are now available and widely used (more than 250M downloads and more than 20M daily users in April 2014 for AdBlock Plus*), in order to avoid the diffusion of pop up windows, banners and other invading advertising formats. * http://mzl.la/1hw1Hur  
  • 20. DIGITAL INVISIBILITY CLOAK If you are suspicious about technology, you might just as well seek to disappear entirely. We can choose extreme but efficient solutions, which are used more and more, to guarantee our complete anonymity. This way, we’ll be able to discuss, exchange and surf the web in a pitch black environment. ALL-ENCRYPTED Military-graded encryption is becoming the new norm. Thanks to innovative products and services, we protect our communication from outsiders’ intrusions more efficiently. The Blackphone : a smartphone created to protect the privacy of mobile users. Everything is encrypted and we can choose what we want and don’t want to share. Encrypted e-mails : e- mail services like Dark Mail Alliance & HemL.is offer a complete encryption of our email communications. Wickr : this instant messaging app don’t stock any data on its servers and offers the users the possibility to precisely plan who can read their messages and for how long it will be available. They can also exchange anonymously. Moreover, the app is completely encrypted, with military graded security. How could users ask for more?
  • 21. Obscure transactions We can now remain anonymous even when purchasing goods. The development of virtual encrypted money (Bitcoin, Litecoin, …) gives us the possibility to make transactions that are free of any traces. Some anonymous marketplaces go further. Often used for illegal sales, Silk Road 2.0 & Pirate’s Cove can lead the way for the development of new commerce platforms, anonymous for everybody. Safer connections. Since our internet routers track us and our computers have IP addresses, anonymity is impossible. New tools are being developed to protect our online navigation and our localisation. The Tor Network : An « Onion router » keeping our online connections anonymous Starkit & Safeplug Boxes that can be plugged to computers and routers to surf the web freely. Disconnect A plug-in allowing us to use any web browser anonymously, without being localized ANONYMITY’S GLORY Anonymity, on networks and on warious web platforms we use, is not always guaranteed. New solutions allow us to turn this around for good.
  • 22. IF THERE IS A GROWING AWARENESS THERE’S ALSO A TRUE PARADOX : 39% of people found it was useful to share personal information with a brand « Identité : CATCH ME IF YOU CAN ! A quel « je » joue le consommateur ? » AACC, livre blanc oct. 2013 61% of internet users would trade privacy for truly personalised offers. ACCENTURE, November 2012 Read the article: http://on.mash.to/1lMUAGj
  • 23. « I don’t like people tracking my location, but I want to know, ‘what are some nearby Italian restaurants that my friends have liked’ » Auren Hoffman, CEO of Rapleaf in http://bit.ly/1fdYZPs  
  • 25. Today, if companies focus only on volume and the accumulation of data, it is necessary that they change their approach. To (re)establish a lasting relationship of trust with consumers, brands need to become clever with their personal data collection. IN THE AGE OF « BIG DATA », RELEVANCE AND MODERATION ARE THE KEYS TO SUCCESS.
  • 26. #1 PROMOTING TRANSPARENCY Brands need to be clear and explain what they make of personal data – this can be a way to allow them to rebuild a relationship of mutual trust with their consumers. From the first contact, it is crucial to explain and justify each question, each request of information. GOOGLE Google produced a video to clearly explain the processes that would permit them to share personal information with governments. The brand attempts to re-establish trust with its users, giving details about the process and the different barriers they try to put to avoid revealing information. An interesting first initiative from the tech giant. APPLE The brand published its first « Transparency Report » in November 2013. Like Google, they detail and explain how they came to share data with governments. They also try to reassure consumers, telling their model is not based on the collection of data and it will never be. Watch the video: http://bit.ly/TpzIbW
  • 27. #2 INSISTING ON SECURITY At a time when most brands are developing connected objects, thinking about the internet security is more than crucial: 84% of French people see them as a progress and 60% want to use them for their personal security*. Thus, reassuring people about privacy and security will be the key to nurturing a new relationship with the ever more connected consumers. ENCRYPTION RACE AT YAHOO After PRISM, Yahoo decided to encrypt everything. After making all connections HTTPS, the company has encrypted the totality of email accounts data since January 2014 and the data from its data centers since March 2014. At the beginning of April, the Chief of Security also announced the intention to encrypt the whole Yahoo platform. They are pushing security in their development, to re-establish trust from users. * BVA http://bit.ly/1gUXb9V
  • 28. « MYDATA » PROJECT From CRM, are we going towards VRM ? The consumer will soon be able to manage his relationships toward brands, rather than the contrary. In the UK, the « MYDATA » project is going in this direction. With the support of the government and many brands (HSBC, MasterCard, Google, T-Mobile,…), the program would allow consumers to keep a perfect track of what data is known by which brand. They could then control and keep a trace of what brands know about them. #3 GIVE UP CONTROL To reassure consumers, brands have to transfer the control of the relationship from their hands to the consumers’. Allowing them to know what data they own, who uses it and what they do with it, will be an efficient means to avoid a doubt crisis towards brands. FACEBOOK REINVENTS ITS CONNECTIONS During the F8 conference, Facebook announced two major changes to come regarding the management of personal data. Users will be able to precisely select which data they are willing to share and an anonymous FB login will be created to register on apps. The company is now clearly aware of the real need of reassuring the public and is looking for efficient answers, to preserve its hegemonic position on the web.
  • 29. #4 BRING ADDED VALUE When brands ask for personal data, consumers expect them to use it in the most clever way possible, to receive relevant offers, with a real added-value. Brands have the capacity to be of a better service to their consumers and to respond to their needs, in a more than ever personalised way. BURBERRY « CUSTOMER 360 » Pioneer of the luxury digital store, Burberry also developed an interesting customer experience. They offer their consumers the possibility to create a profile where they can define their preferences and their fashion phobias, as well as tracking their trials and purchases. Consulting their profiles, sales persons can advise them. A personal shopper who knows you better than anyone, at the moment you enter the door: this is a real extraordinary shopping experience.
  • 30. IS THERE JUST ONE STEP BEFORE A PRISM  SCANDAL FOR BRANDS ? Brands can follow every move and action of the consumers, without them knowing. What will happen when they discover what their favourite brands are making of their data, without asking permission? The brands who will shine will be those that acted to protect the best interests of their consumers.
  • 31. http://mashable.com/2013/08/06/privacy-comic/ Presentation made by Paola Craveiro & Mathieu Genelle THANKS .o/ CONTACT US Hélène Meinerad +33 (0)6 16 72 09 46 helene.meinerad@chemistry-agency.fr Mathieu Genelle +33 (0)6 19 76 11 95 mathieu.genelle@chemistry-agency
  • 32. http://bit.ly/1q3SmDh http://bit.ly/1DwhaYm YOU CAN FIND OUR TREND REPORTS ON CHEMISTRY SLIDESHARE