Mobile Apps for Kids: Current Privacy Disclosures are Dis app ointing
This session will lay out the key findings of the FTC’s staff report on kids apps, which recommends that players in the kids mobile app ecosystem provide better information to parents about apps’ data collection practices. We will also discuss the FTC’s recent privacy initiatives and their application to mobile channels.
Patricia Poss, Chief, BCP Mobile Technology Unit, Division of Financial Practices. Bureau of Consumer Protection - Federal Trade Commission
From the FinTech Webinar Series. Explores:
1. Recent Federal Cybersecurity Developments: Executive Order, NIST Standards, Information-Sharing, Legislation
2. Privacy and Security Issues in Cloud Computing Contracts
3. International Privacy and Transferring Data Across Borders
4. Mobile Devices and Mobile Apps
5. Workplace and Corporate Governance Developments
6. The FTC’s New Rules Concerning Children’s Privacy
From the FinTech Webinar Series. Explores:
1. Storage and Processing of Data in “the Cloud”
2. Mobile Devices and Mobile Apps
3. “Big Data”
4. Security and Privacy Issues in Third-Party Contracts
5. Data Security and Corporate Governance
6. International Privacy and Data Security
7. Data Security as a National Security Concern: Legislation and Executive Initiatives
Managing the Legal Concerns of Cloud ComputingAmy Larrimore
Presented at the 2013 Pennsylvania Bar Institute as an edition in an annual series on legal concerns around cloud computing ,. This one covers how technology overlaps and where the risk needs to be managed in between systems.
http://www.cxounplugged.com
A research whitepaper published in November by Ovum and commissioned by Logicalis, revealed a great many interesting BYOD trends – many of which were highlighted in a recent CXO post (BYOD Research) by Ian Cook. Perhaps the most startling, however, was the very low proportion of ‘BYOD-ers’ who have signed corporate BYOD policies.
From the FinTech Webinar Series. Explores:
1. Recent Federal Cybersecurity Developments: Executive Order, NIST Standards, Information-Sharing, Legislation
2. Privacy and Security Issues in Cloud Computing Contracts
3. International Privacy and Transferring Data Across Borders
4. Mobile Devices and Mobile Apps
5. Workplace and Corporate Governance Developments
6. The FTC’s New Rules Concerning Children’s Privacy
From the FinTech Webinar Series. Explores:
1. Storage and Processing of Data in “the Cloud”
2. Mobile Devices and Mobile Apps
3. “Big Data”
4. Security and Privacy Issues in Third-Party Contracts
5. Data Security and Corporate Governance
6. International Privacy and Data Security
7. Data Security as a National Security Concern: Legislation and Executive Initiatives
Managing the Legal Concerns of Cloud ComputingAmy Larrimore
Presented at the 2013 Pennsylvania Bar Institute as an edition in an annual series on legal concerns around cloud computing ,. This one covers how technology overlaps and where the risk needs to be managed in between systems.
http://www.cxounplugged.com
A research whitepaper published in November by Ovum and commissioned by Logicalis, revealed a great many interesting BYOD trends – many of which were highlighted in a recent CXO post (BYOD Research) by Ian Cook. Perhaps the most startling, however, was the very low proportion of ‘BYOD-ers’ who have signed corporate BYOD policies.
This is a presentation prepared and delivered to the International Bar Association Conference in 2012 on behalf of the Interactive Direct Marketing Association. It looks at some of the pragmatic challenges that exist in getting organisations to adopt and adapt to the requirements of the Cookies regulations.
The future of digital identity 2019 future agendaFuture Agenda
How we prove that we are who or what we say we are during digital transactions and interactions is set to become one of the defining features of the next stage of the human digital transformation. Today, we are living with early attempts to solve the problem that are no longer fit for purpose. At best, the multitude of different ways we login, confirm our identities, and establish trust in claims made during digital exchanges, has become profoundly inconvenient. At worst, they have left us in a connected world which is neither safe nor secure, and in which we seem to have completely lost control of our most personal information. The next generation solutions to the digital identity challenge could change all of this.
In the short term, new solutions are likely to move us towards the promise of a single Digital ID that allows us to simply, safely and securely navigate a connected world.
Looking further forward, the changes could be even more profound. The ways that we digitally manage, share and verify our personal information could well come to completely redefine the human digital experience. Current digital business models that seem immutable could collapse. Centres of digital power might shift radically. And the current personal data ‘land grab’ could be replaced by a new digital norm in which individuals can finally make meaningful claims to data ownership and control.
However, there are a number of potentially calamitous pitfalls to navigate along the way. Some of these could lead to whole new kinds of digital dystopia.
At the end of 2018, Future Agenda undertook a major project exploring the Future of Digital Identity. With the generous support of Mastercard, the Future Agenda team ran a series of expert workshops in different locations around the world that explored the key factors that are likely to shape the future of digital identity. The programme began with an initial perspective as a provocation. Participants in the workshops then gave us new, more fully formed, insights which were in turn explored further during one-to-one interviews with major stakeholders and thinkers in the space.
As always, we consider our reports to be the start point for further conversations, and would welcome further input. If you would like to join the conversation, you can join our LinkedIn Group here. If you have any further questions or would like to have a conversation about how your organisation can best make use of our
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...IDC4EU
This is the slide-deck of the community event held on November 14, 2019 in Brussels, titled "Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019". It includes the presentations given by the speakers.
The data privacy changes coming down the pike are sending shockwaves through the digital marketing world. In this series, our goal is to provide digital marketers with the insights, tools, and solutions they need to adapt to IDFA and the end of cookies. We unpack the latest privacy news, discuss how to harness the power of first-party data, advise on how to build out your MarTech strategy, and more.
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Designbradley_g
A presentation by Commissioner Cavoukian to the Canadian Institute Advertising and Marketing Law Conference on how Privacy by Design can give a sustainable competitive advantage in advertising and marketing.
Privacy and Data Security | Data Collection | Social Mediadevbhargav1
In the digital age, where social media platforms have become integral to businesses' marketing strategies, collecting and utilizing customer data is the norm. This data provides valuable insights for targeting and personalizing content, improving customer experiences, and making informed business decisions. However, the collection and use of customer data on social media come with significant privacy and data security considerations. In this comprehensive guide, we'll explore the intricacies of managing customer data on social media while safeguarding privacy and data security.
principles of mobile privacy and policy guidelines .it also include regulatory framework and mobile applications privacy by design developmenet modules
What should organizations be concerned about when using Machine Learning for Predictive Modeling techniques? Divergence Academy and Divergence.AI are leading efforts to bring Algorithmic Accountability awareness to masses.
By prioritizing ethics in web development, we can create a safer and more secure online environment for everyone. As technology continues to shape our lives, ethical web development becomes an indispensable aspect of creating online platforms that balance user privacy and innovation.
Current Developments in AgTech Law Licensing Executive Society Roger Royse
Agriculture technology is a significant startup industry that is rapidly expanding. Royse Law is a partner of the annual SV Agtech conference (hosted by Royse AgTech) and is a veteran of both the startup and agtech industry. This presentation will overview current developments in Agtech law. (12/2016)
This is a presentation prepared and delivered to the International Bar Association Conference in 2012 on behalf of the Interactive Direct Marketing Association. It looks at some of the pragmatic challenges that exist in getting organisations to adopt and adapt to the requirements of the Cookies regulations.
The future of digital identity 2019 future agendaFuture Agenda
How we prove that we are who or what we say we are during digital transactions and interactions is set to become one of the defining features of the next stage of the human digital transformation. Today, we are living with early attempts to solve the problem that are no longer fit for purpose. At best, the multitude of different ways we login, confirm our identities, and establish trust in claims made during digital exchanges, has become profoundly inconvenient. At worst, they have left us in a connected world which is neither safe nor secure, and in which we seem to have completely lost control of our most personal information. The next generation solutions to the digital identity challenge could change all of this.
In the short term, new solutions are likely to move us towards the promise of a single Digital ID that allows us to simply, safely and securely navigate a connected world.
Looking further forward, the changes could be even more profound. The ways that we digitally manage, share and verify our personal information could well come to completely redefine the human digital experience. Current digital business models that seem immutable could collapse. Centres of digital power might shift radically. And the current personal data ‘land grab’ could be replaced by a new digital norm in which individuals can finally make meaningful claims to data ownership and control.
However, there are a number of potentially calamitous pitfalls to navigate along the way. Some of these could lead to whole new kinds of digital dystopia.
At the end of 2018, Future Agenda undertook a major project exploring the Future of Digital Identity. With the generous support of Mastercard, the Future Agenda team ran a series of expert workshops in different locations around the world that explored the key factors that are likely to shape the future of digital identity. The programme began with an initial perspective as a provocation. Participants in the workshops then gave us new, more fully formed, insights which were in turn explored further during one-to-one interviews with major stakeholders and thinkers in the space.
As always, we consider our reports to be the start point for further conversations, and would welcome further input. If you would like to join the conversation, you can join our LinkedIn Group here. If you have any further questions or would like to have a conversation about how your organisation can best make use of our
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...IDC4EU
This is the slide-deck of the community event held on November 14, 2019 in Brussels, titled "Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019". It includes the presentations given by the speakers.
The data privacy changes coming down the pike are sending shockwaves through the digital marketing world. In this series, our goal is to provide digital marketers with the insights, tools, and solutions they need to adapt to IDFA and the end of cookies. We unpack the latest privacy news, discuss how to harness the power of first-party data, advise on how to build out your MarTech strategy, and more.
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Designbradley_g
A presentation by Commissioner Cavoukian to the Canadian Institute Advertising and Marketing Law Conference on how Privacy by Design can give a sustainable competitive advantage in advertising and marketing.
Privacy and Data Security | Data Collection | Social Mediadevbhargav1
In the digital age, where social media platforms have become integral to businesses' marketing strategies, collecting and utilizing customer data is the norm. This data provides valuable insights for targeting and personalizing content, improving customer experiences, and making informed business decisions. However, the collection and use of customer data on social media come with significant privacy and data security considerations. In this comprehensive guide, we'll explore the intricacies of managing customer data on social media while safeguarding privacy and data security.
principles of mobile privacy and policy guidelines .it also include regulatory framework and mobile applications privacy by design developmenet modules
What should organizations be concerned about when using Machine Learning for Predictive Modeling techniques? Divergence Academy and Divergence.AI are leading efforts to bring Algorithmic Accountability awareness to masses.
By prioritizing ethics in web development, we can create a safer and more secure online environment for everyone. As technology continues to shape our lives, ethical web development becomes an indispensable aspect of creating online platforms that balance user privacy and innovation.
Current Developments in AgTech Law Licensing Executive Society Roger Royse
Agriculture technology is a significant startup industry that is rapidly expanding. Royse Law is a partner of the annual SV Agtech conference (hosted by Royse AgTech) and is a veteran of both the startup and agtech industry. This presentation will overview current developments in Agtech law. (12/2016)
Iot report federal trade commission_150127iotrptMarket Engel SAS
I publish this FTC report on IOT because i think that it's a good report and it has also been -- i think -- wrongly been seen as potentially bashing IOT potentials. See, for example, an article published yesterday "From www.theverge.com - February 15, 11:24 PM
'In the internet of things, the Federal Trade Commission sees the possibility of flourishing new markets. But it also sees a prologue to Black Mirror: in a new report that probes the privacy implications of connected devices, the commission surveys a landscape of possible dystopian futures. Get ready for invasive marketing, unending consumer surveillance, invisible nudging, and new potential for government spying and novel forms of hacking...'"
The FTC report is 55 page long, refers to workshops discussions that took place in nov 2013, and although the report stages pros and cons in a very articulated manner, the FTC applies to IOT the security & privacy guidelines and other 'good practices' that have been applied to internet-of-other-things, :-), so far. So, i think that we need to be super cautious about these discussions: Yes, the IOT generates challenges with which we may not yet be familiar with. But not really more. And let's remember that, unless we haven't learned about basic security risks, we are still in a position to say 'no' if the risks look bigger than the opportunities. Many say that 'privacy' -- as we've known it on the net 10 years ago -- is gone. Maybe. Things evolve. But at this stage, i think that no, IOT won't kill privacy. It might actually be the contrary. Let's think that, thx to IOT, i'll be more capable to change the way i work, live, pay and play online and offline. Let's say that, thx to IOT, my assurance level(s) against risks of -- for example -- ID theft and impersonation does rise. Let's believe that, thx to IOT, we just become more and better aware of what matters and does not,, so that we have the tools and the systems to better manage our environment. To make a long story short, let's just recall that IOT technology is just like any other technology: It is neutral. What is not neutral is its use. So, this is why i believe that there is, with IOT, more opportunities than risks to strengthen the privacy of our environment... provided that -- yes, i agree -- we (also) think IOT this way. My 2cts. fred.
FTC Internet of Things Report
The report includes the following recommendations for companies developing Internet of Things devices:
build security into devices at the outset, rather than as an afterthought in the design process;
train employees about the importance of security, and ensure that security is managed at an appropriate level in the organization;
ensure that when outside service providers are hired, that those providers are capable of maintaining reasonable security, and provide reasonable oversight of the providers;
when a security risk is identified, consider a “defense-in-depth” strategy whereby multiple layers of security may be used to defend against a particular risk;
consider measures to keep unauthorized users from accessing a consumer’s device, data, or personal information stored on the network;
monitor connected devices throughout their expected life cycle, and where feasible, provide security patches to cover known risks.
Dive deeper into the importance of privacy policies, their benefits for businesses, the potential penalties for inadequate policies, and the most efficient way to deploy them on websites. Read Guide: https://securiti.ai/what-is-a-privacy-policy/
Building Digital Trust: The role of data ethics in the digital ageAccenture Technology
Data is the biggest risk that is unaccounted for by businesses today. In the past, the scope for digital risk was limited to cybersecurity threats but leading organizations must now also recognize risks from lackluster ethical data practices. Mitigating these internal threats is critical for every player in the digital economy, and cannot be addressed with strong cybersecurity alone.
Similar to Mobile Web and Apps World New Orleans Session 10 Patricia Poss Federal Trade Commission (20)
The Future of Tablets New Orleans - Lisa Abramson mobile video case studyNextVision Media
Presentation: Tablet Video Advertising
With mobile video subscription services dead in the water, advertising is going to play an increasingly important role in making mobile and tablet video profitable. Join us as SNL Kagan shares its latest perspective on the opportunities and challenges facing tablet video advertising. Then learn directly from the front lines as Rhythm NewMedia presents a mobile video advertising success story.
John Fletcher, Sr. Analyst SNL Kagan,
Lisa Abramson, Director of Marketing- Rhythm NewMedia
The Future of Tablets New Orleans -Healthcare and Tablets - SoftCloudsNextVision Media
Tablets in Education and Healthcare
Doug Feldmann, Ph.D., Associate Professor, College of Education and Human Services - Northern Kentucky University
David Wetherelt, Director of Mobile Strategies - SoftClouds
Sol Rosenberg, VP, Business Development & Content Acquisition- Copia Interactive, LLC
Mobile Web and Apps World New Orleans- Session 9 Vordel Mobile APIManagementNextVision Media
What is Feeding Your Mobile Apps? How to Deliver and Secure Mobile Enabled APIs.
Enterprises are building mobile applications for customers, partners, employees, and vendors. Whether the applications are for Apple, Android or Windows powered devices, these applications increasingly need to communicate with enterprise applications, transmit sensitive data and perform business transactions. To enable rich capabilities for mobile applications, the backend APIs supporting these applications must be delivered in a secured and scalable manner. In this session we will discuss how to deliver mobile enabled APIs for enterprise applications in a way that is secure, scalable and manageable.
Ed King, Vice President of Product Marketing- Vordel
Mobile Web and Apps World New Orleans Session 6 the device, mobile applicatio...NextVision Media
The Device, Mobile Applications and the Cloud
Ubiquitous connectivity is constantly transforming the mobile landscape. Bigger, Hi-Resolution Displays, Larger Memories, Faster Processors have helped increase device and network usage. Higher bandwidth for mobile devices has opened up new possibilities in spaces ranging from digital media to mobile health. All of this has had a huge impact in consumer behavior. Consumers are starting to ask for anywhere, anytime experience today and people don’t want to be tied down to devices, platforms or physical spaces when it comes to storing, accessing and consuming data – user experience has come to the fore-front. The session will address the following:
The evolution of devices, mobile applications and the cloud
Making better use of the data overload The cloud as the backbone for the ‘Internet of Things’
Creating a Seamless, Coherent and Integrated User Experience across Devices & Platforms
The search for the ‘Killer App’
Asokan Thiyagarajan, Director – Platforms & Technology Strategy-Samsung Information Systems America
Mobile Web and Apps World New Orleans Session 3 lessons learned from multiple...NextVision Media
Lessons Learned from Multiple Platform Deployments
This session will highlight the common pitfalls and issues facing deployment over multiple platforms. We will discuss lessons learned and recommended solutions in bringing application s to markets quickly, efficiently and with maximum coverage.
Richard Smith, CTO - OpenPath Products
Mobile Web and Apps World New Orleans Session 1 state of the wireless industryNextVision Media
Opening Remarks and Presentation from the Chair- The State of The Wireless Industry
Chetan Sharma is President of Chetan Sharma Consulting and is one of the leading strategists in the mobile industry. Executives from wireless companies around the world seek his accurate predictions, independent insights, and actionable recommendations. He has served as an advisor to senior executive management of several Fortune 100 companies in the wireless space and is probably the only industry strategist who has advised each of the top 6 global mobile data operators. He is considered a leading authority on the mobile data technologies and consumer trends.
Chetan Sharma, President, Chetan Sharma Consulting
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
4. Section 5 of the Federal Trade Commission Act broadly
prohibits “unfair or deceptive acts or practices in or
affecting commerce.”
◦ Deception a material representation or omission that is
likely to mislead consumers acting reasonably under the
circumstances
◦ Unfairness practices that cause or are likely to cause
substantial injury to consumers that are not outweighed by
countervailing benefits to consumers or competition and are
not reasonably avoidable by consumers.
Flexible law that can be applied to many different
situations, entities, and technologies.
4
5. W3 Innovations
Frostwire
Google
Facebook
Mobile background screeners - warning
letters
5
6. Complex ecosystem
◦ Operating system providers
◦ Application developers
◦ Handset manufacturers
◦ Carriers
◦ Ad networks
◦ Service providers
6
7. Screen size
Communication channels: texting, mobile web
browser, mobile apps
“On the go” nature of use
Personal
Additional hardware capabilities – camera,
microphone, gyroscope, compass, etc.
GPS & location features
Easy sharing of user information
Rapidly evolving technology
7
8. Who collects what information?
How is it used?
With whom is it shared?
Are consumers being adequately
informed?
Do they have a choice?
8
9. Issued Final Report, March 2012.
Applies to Mobile environment.
Key elements: Privacy by Design,
Simplified Choice, and Greater
Transparency.
9
10. Collection and use of data is ubiquitous and
often invisible.
Consumers lack an understanding of the
nature and extent of this collection.
Many consumers are concerned.
Collection and use has led to significant
benefits.
Traditional distinctions between personally
identifiable and anonymous data are
blurred.
10
11. Make privacy the “default” setting for
commercial data practices.
Give consumers greater control through
simplified choices and increased
transparency.
Implementing will enhance trust and
stimulate commerce.
11
12. Intended to articulate best practices for
companies.
Intended to assist Congress as it considers
privacy legislation.
Not intended to serve as a template for law
enforcement action or regulations.
12
13. “Bake-in” privacy -- Companies should
promote consumer privacy throughout their
organizations.
Companies should incorporate substantial
privacy protections into their practices, such
as data security, reasonable collection limits,
sound retention and disposal, and data
accuracy.
13
14. Limit collection to data they need for a
requested service or transaction.
◦ Ex. Wallpaper app doesn’t need location.
◦ Location data collection heightens need for
reasonable policies for purging data.
◦ Minimize the risk that information could be used in
harmful or unexpected ways.
Calls on mobile entities to establish
standards that address data collection,
transfer, use and disposal, particularly for
location data.
14
15. If data is shared with third parties, work to
provide more prominent notice and choices
about such practices.
Not all companies have adequately disclosed
the frequency or extent of the collection,
transfer, and use of data.
15
16. Provide easy-to-use choice mechanisms that allow consumers to
control whether their data is collected and how it is used.
Companies do not need to provide choice for practices that are
consistent with the context.
◦ Fraud preventions, internal operations, fulfillment, legal compliances and
public purpose, and first-party marketing.
For practices requiring choice, companies should offer the choice
at a time and in a context in which the consumer is making a
decision about his or her data.
Companies should obtain affirmative express consent before:
◦ 1) using consumer data in a materially different manner than claimed or
◦ 2) collecting sensitive data.
16
17. Increase the transparency of data practices.
Privacy notices should be clearer, shorter, and more
standardized to enable comprehension and
comparison.
Calls on mobile participants to develop short
meaningful disclosures.
◦ Urges companies providing mobile services to develop
standard notices, icons, and other means to communicate
with consumers in a consistent and clear way.
◦ Dot Com Disclosure Workshop – May 30, 2012.
17
19. Reviewed kids apps in Apple’s iTunes App Store
and Google’s Market.
Looked for disclosures available in the app stores
or on developers’ websites.
Very little information disclosed prior to download.
Recommendation – app stores, developers and
other ecosystem participants need to improve
disclosures regarding data practices.
19