SlideShare a Scribd company logo
1 of 30
Download to read offline
Understanding Privacy…
… and data in personalized marketing: How to become a responsible data handler
ILLEGALBIG DATA
You should be scared
…. ore at least awake right now. Good Morning!
Understanding Privacy…
marketing: How to become a responsible data handler
EU Privacy Directive 95/46/EC
• It’s the law
• --- it must be boring 
EU Privacy Directive 2016/680
• It’s the law
• --- it must stay boring 
Relax …
• This is not my style
• I’m not a lawyer
• I’m an engineer.
Actually, I’m a researcher
• doing “real” research
• not “market” research
• (or do you deny that academia is “real”?)
• And: I’m a doctor
• but not a “real one”
I work for T-Labs
• Telekom Innovation Laboratories
(Deutsche Telekom’s R & D Unit)
• 300 Employees, DT-corporate and
Technical University researchers
• Our Slides look like this:
But not today
• Today I’m here to present some insights
we gained in our projects on data privacy
Privacy is NOT
• the preventer of innovative marketing
• an excuse for poor personalization
Innovative
Privacy,
Privacy
Protection
Privacy
© dilbert.com
Privacy is Rather
• your opportunity for an USP
• a technology that serves your customers
• a source of deep insights to customer
preferences and fears
• A means to make the world a better place.
This talk is about
• Privacy enhancing technologies
• “Privacy By Design”
• Monetizing privacy (features)
• some trends in privacy research
• and YOUR quesitions!
This talk is NOT
• a legal training (§§)
• aimed at security experts 
• a typical market research speech (sorry!)
• to be ignored
A few remarks impulses:
• Who owns user data?
• who controls them?
• who makes money with user data?
• Does privacy impact business?
YES! P.E.T. are here to
increase (your) profits!
• P.E.T. = Privacy Enhancing Technologies
• N.B.: P.E.T. also can increase your
customer’s profits/benefits (end customers)
Privacy Enhancing Technologies
• Cryptography
• Traceability
• Transparency
• Anonymization/Pseudonymization
• “artificial data”, “differential privacy” & more
• IT security
“Privacy By Design”
• by Ann Cavoukian
(Privacy Commissioner of Ontario, Canada, 1995)
(https://www.ipc.on.ca/wp-content/uploads/Resources/7foundationalprinciples.pdf )
• general adoption in many countries and
companies
• a good starting point
Ann Cavoukian, PhD
Information & Privacy
Commissioner,
Ontario, Canada
10.11.2
Concept, developed in the 1990s, still growing
Assumption:
Compliance and regulatory frameworks are not sufficient
Instead, privacy assurance must be “in the genes” of the
organization, so it will be its “default” mode of operation
and design/development.
PbD extends PETs (Privacy Extendig Technologies) to
PETplus  added value!
applies to:
• IT systems, business practices,
• physical design and
• (networked) infrastructure
• … market research and CRM? …
PBD: 7 foundational principles
1. Proactive not reactive; Preventative not remedial
2. Privacy as the default setting
3. Privacy embedded into design
4. Full functionality – positive-sum, not zero-sum
5. End-to-end security – full lifecycle protection
6. Visibility and transparency – keep it open
7. Respect for user privacy – keep it user-centric
1. Proactive not Reactive; Preventative not
Remedial
• The Privacy by Design (PbD) approach is characterized
by proactive rather than reactive measures. It anticipates
and prevents privacy-invasive events before they
happen. PbD does not wait for privacy risks to
materialize, nor does it offer remedies for resolving
privacy infractions once they have occurred – it aims to
prevent them from occurring. In short, Privacy by
Design comes before-the-fact, not after.
 Have a privacy (by design) expert in your (design) team
2. Privacy as the Default Setting
• We can all be certain of one thing – the default rules!
Privacy by Design seeks to deliver the maximum degree
of privacy by ensuring that personal data are
automatically protected in any given IT system or
business practice. If an individual does nothing, their
privacy still remains intact. No action is required on the
part of the individual to protect their privacy – it is built
into the system, by default.
 Let the user take over initiative (results in better quality insights)
3. Privacy Embedded into Design
• Privacy is embedded into the design and architecture of
IT systems and business practices. It is not bolted on as
an add-on, after the fact. The result is that it becomes an
essential component of the core functionality being
delivered. Privacy is integral to the system, without
diminishing functionality.
 once done, this is easy to repeat later on in market research 
4. Full Functionality – Positive-Sum, not Zero-
Sum
• Privacy by Design seeks to accommodate all legitimate
interests and objectives in a positive-sum “win-win”
manner, not through a dated, zero-sum approach, where
unnecessary trade-offs are made. Privacy by Design
avoids the pretense of false dichotomies, such as privacy
vs. security, demonstrating that it is possible to have
both.
 How can the “subject” of market research benefit? Think!
5. End-to-End Security – Full Lifecycle Protection
• Privacy by Design, having been embedded into the
system prior to the first element of information being
collected, extends throughout the entire lifecycle of the
data involved, from start to finish. This ensures that at the
end of the process, all data are securely destroyed, in a
timely fashion. Thus, Privacy by Design ensures cradle to
grave, lifecycle management of information, end-to-end.
 security is a “must have” anyway. Why not use it for privacy too?
6. Visibility and Transparency – Keep it Open
• Privacy by Design seeks to assure all stakeholders that
whatever the business practice or technology involved, it
is in fact, operating according to the stated promises and
objectives, subject to independent verification. Its
component parts and operations remain visible and
transparent, to users and providers alike. Remember,
trust but verify.
 Transparency guarantees insights (sic!)
7. Respect for User Privacy – Keep it User-
Centric
• Above all, Privacy by Design requires architects and
operators to keep the interests of the individual
uppermost by offering such measures as strong privacy
defaults, appropriate notice, and empowering user-
friendly options. Keep it user-centric.
 the “subject “ (end-customer) is the eventual source of your revenue
 nice “side effect”: the user maintains his/her own data. So it stays
up-to-date with no extra effort (if done correctly ;-)
Example: Big Data & Privacy
New R&D project to start in Jan 2017:
• use “linked data”, a method of publishing structured
data so that it can be interlinked and become more useful
through semantic queries [Wikipedia]
• provide a “data dashboard” for tracking
• provide a “data cockpit” for control
 expected outcome: more “opt ins” for survey and data usage 
Benefits for the end user
reward the end user by
• money (simple but expensive and “vintage”)
• more accurate service offerings
• faster service delivery/operations
• gamification: let users compete and
compare their privacy settings/preferences
Be Open and Open Minded
• open your collection of personal data to the
end user (the source/owner of the data)
• open your derivates/conclusions of this
collection to the user. (no risk, no fun  )
• open yourself and your data/findings to the
general public! (might be a challenge by itself!)
Trends in Privacy Research
• Differential Privacy
• Artificial Data
• Location Blur
• Blockchains (not always a P.E.T. !!)
• Apply to non-IT driven products (are their any?)
Thank you!
• Questions?
I hope so!
• Use the app, use your brain, and use your mouth!
• Contact me “privately”:
martin.kurze@telekom.de +49 171b864 22 46
• https://www.linkedin.com/in/kurze

More Related Content

What's hot

Rob Winters - Travelbird
Rob Winters - TravelbirdRob Winters - Travelbird
Rob Winters - TravelbirdChristina Azzam
 
Four Key Considerations for your Big Data Analytics Strategy
Four Key Considerations for your Big Data Analytics StrategyFour Key Considerations for your Big Data Analytics Strategy
Four Key Considerations for your Big Data Analytics StrategyArcadia Data
 
Building a Winning Roadmap for Analytics
Building a Winning Roadmap for AnalyticsBuilding a Winning Roadmap for Analytics
Building a Winning Roadmap for AnalyticsIronside
 
IBM Watson Content Analytics: Discover Hidden Value in Your Unstructured Data
IBM Watson Content Analytics: Discover Hidden Value in Your Unstructured DataIBM Watson Content Analytics: Discover Hidden Value in Your Unstructured Data
IBM Watson Content Analytics: Discover Hidden Value in Your Unstructured DataPerficient, Inc.
 
The Data Driven Enterprise - Roadmap to Big Data & Analytics Success
The Data Driven Enterprise - Roadmap to Big Data & Analytics SuccessThe Data Driven Enterprise - Roadmap to Big Data & Analytics Success
The Data Driven Enterprise - Roadmap to Big Data & Analytics SuccessBigInsights
 
Modern Finance and Best Use of Analytics - Oracle Accenture Case Study
Modern Finance and Best Use of Analytics - Oracle Accenture Case StudyModern Finance and Best Use of Analytics - Oracle Accenture Case Study
Modern Finance and Best Use of Analytics - Oracle Accenture Case StudyJames Hartshorn FIRP MIoD
 
Building Your Big Data Analytics Strategy- Impetus Webinar
Building Your Big Data Analytics Strategy- Impetus WebinarBuilding Your Big Data Analytics Strategy- Impetus Webinar
Building Your Big Data Analytics Strategy- Impetus WebinarImpetus Technologies
 
What we do; predictive and prescriptive analytics
What we do; predictive and prescriptive analyticsWhat we do; predictive and prescriptive analytics
What we do; predictive and prescriptive analyticsWeibull AS
 
Data Science Salon: Enabling self-service predictive analytics at Bidtellect
Data Science Salon: Enabling self-service predictive analytics at BidtellectData Science Salon: Enabling self-service predictive analytics at Bidtellect
Data Science Salon: Enabling self-service predictive analytics at BidtellectFormulatedby
 
Supply Chain Intelligence and Analytics Executive Guidelines for Success
Supply Chain Intelligence and Analytics Executive Guidelines for SuccessSupply Chain Intelligence and Analytics Executive Guidelines for Success
Supply Chain Intelligence and Analytics Executive Guidelines for SuccessHalo BI
 
1000 track 1 groves_using our laptop
1000 track 1 groves_using our laptop1000 track 1 groves_using our laptop
1000 track 1 groves_using our laptopRising Media, Inc.
 
Best Practices In Predictive Analytics
Best Practices In Predictive AnalyticsBest Practices In Predictive Analytics
Best Practices In Predictive AnalyticsCapgemini
 
Predictive analytics in action real-world examples and advice
Predictive analytics in action real-world examples and advicePredictive analytics in action real-world examples and advice
Predictive analytics in action real-world examples and adviceThe Marketing Distillery
 
Foundational Strategies for Trust in Big Data Part 2: Understanding Your Data
Foundational Strategies for Trust in Big Data Part 2: Understanding Your DataFoundational Strategies for Trust in Big Data Part 2: Understanding Your Data
Foundational Strategies for Trust in Big Data Part 2: Understanding Your DataPrecisely
 

What's hot (20)

1615 track1 schleicher
1615 track1 schleicher1615 track1 schleicher
1615 track1 schleicher
 
Rob Winters - Travelbird
Rob Winters - TravelbirdRob Winters - Travelbird
Rob Winters - Travelbird
 
Four Key Considerations for your Big Data Analytics Strategy
Four Key Considerations for your Big Data Analytics StrategyFour Key Considerations for your Big Data Analytics Strategy
Four Key Considerations for your Big Data Analytics Strategy
 
Big Data & Analytics Client Examples
Big Data & Analytics Client ExamplesBig Data & Analytics Client Examples
Big Data & Analytics Client Examples
 
Get your data analytics strategy right!
Get your data analytics strategy right!Get your data analytics strategy right!
Get your data analytics strategy right!
 
Building a Winning Roadmap for Analytics
Building a Winning Roadmap for AnalyticsBuilding a Winning Roadmap for Analytics
Building a Winning Roadmap for Analytics
 
IBM Watson Content Analytics: Discover Hidden Value in Your Unstructured Data
IBM Watson Content Analytics: Discover Hidden Value in Your Unstructured DataIBM Watson Content Analytics: Discover Hidden Value in Your Unstructured Data
IBM Watson Content Analytics: Discover Hidden Value in Your Unstructured Data
 
The Data Driven Enterprise - Roadmap to Big Data & Analytics Success
The Data Driven Enterprise - Roadmap to Big Data & Analytics SuccessThe Data Driven Enterprise - Roadmap to Big Data & Analytics Success
The Data Driven Enterprise - Roadmap to Big Data & Analytics Success
 
Modern Finance and Best Use of Analytics - Oracle Accenture Case Study
Modern Finance and Best Use of Analytics - Oracle Accenture Case StudyModern Finance and Best Use of Analytics - Oracle Accenture Case Study
Modern Finance and Best Use of Analytics - Oracle Accenture Case Study
 
Building Your Big Data Analytics Strategy- Impetus Webinar
Building Your Big Data Analytics Strategy- Impetus WebinarBuilding Your Big Data Analytics Strategy- Impetus Webinar
Building Your Big Data Analytics Strategy- Impetus Webinar
 
What we do; predictive and prescriptive analytics
What we do; predictive and prescriptive analyticsWhat we do; predictive and prescriptive analytics
What we do; predictive and prescriptive analytics
 
Data Science Salon: Enabling self-service predictive analytics at Bidtellect
Data Science Salon: Enabling self-service predictive analytics at BidtellectData Science Salon: Enabling self-service predictive analytics at Bidtellect
Data Science Salon: Enabling self-service predictive analytics at Bidtellect
 
1000 track1 gland_sims
1000 track1 gland_sims1000 track1 gland_sims
1000 track1 gland_sims
 
Predictive analytics 2025_br
Predictive analytics 2025_brPredictive analytics 2025_br
Predictive analytics 2025_br
 
Supply Chain Intelligence and Analytics Executive Guidelines for Success
Supply Chain Intelligence and Analytics Executive Guidelines for SuccessSupply Chain Intelligence and Analytics Executive Guidelines for Success
Supply Chain Intelligence and Analytics Executive Guidelines for Success
 
1000 track 1 groves_using our laptop
1000 track 1 groves_using our laptop1000 track 1 groves_using our laptop
1000 track 1 groves_using our laptop
 
Best Practices In Predictive Analytics
Best Practices In Predictive AnalyticsBest Practices In Predictive Analytics
Best Practices In Predictive Analytics
 
Data driven decision making
Data driven decision makingData driven decision making
Data driven decision making
 
Predictive analytics in action real-world examples and advice
Predictive analytics in action real-world examples and advicePredictive analytics in action real-world examples and advice
Predictive analytics in action real-world examples and advice
 
Foundational Strategies for Trust in Big Data Part 2: Understanding Your Data
Foundational Strategies for Trust in Big Data Part 2: Understanding Your DataFoundational Strategies for Trust in Big Data Part 2: Understanding Your Data
Foundational Strategies for Trust in Big Data Part 2: Understanding Your Data
 

Viewers also liked

Menuju Pendidikan Yang Berkeseimbangan, Berkesusaian, Berkesetaraan dan Berke...
Menuju Pendidikan Yang Berkeseimbangan, Berkesusaian, Berkesetaraan dan Berke...Menuju Pendidikan Yang Berkeseimbangan, Berkesusaian, Berkesetaraan dan Berke...
Menuju Pendidikan Yang Berkeseimbangan, Berkesusaian, Berkesetaraan dan Berke...H.Achmad Alf Arslan Djunaid,SE
 
การคำนวณงวดในการผ่อนชำระ
การคำนวณงวดในการผ่อนชำระการคำนวณงวดในการผ่อนชำระ
การคำนวณงวดในการผ่อนชำระBowwie Bootsaba
 
Pdi drets dels infants 1
Pdi drets dels infants 1Pdi drets dels infants 1
Pdi drets dels infants 1Maria Martin
 
Bombardier LOC_Transportation Case study_JPU (1)
Bombardier LOC_Transportation Case study_JPU (1)Bombardier LOC_Transportation Case study_JPU (1)
Bombardier LOC_Transportation Case study_JPU (1)Joerg Putzer
 
Minimanual de gmail
Minimanual de gmailMinimanual de gmail
Minimanual de gmailB0r3aN
 
Trabajo de español
Trabajo de españolTrabajo de español
Trabajo de españolShiro Mmcr
 
Another truth of life
Another truth of lifeAnother truth of life
Another truth of lifeBhagat Singh
 
Led Light Bases and Shapes
Led Light Bases and ShapesLed Light Bases and Shapes
Led Light Bases and Shapestheledlight
 
10 Benefits of Social Media Marketing
10 Benefits of Social Media Marketing10 Benefits of Social Media Marketing
10 Benefits of Social Media MarketingEvolve Academy
 
Smartpapervsitellaipost_25112015
Smartpapervsitellaipost_25112015Smartpapervsitellaipost_25112015
Smartpapervsitellaipost_25112015Vladimir Kuparinen
 
Pre installation debrief with club japan
Pre installation debrief with club   japanPre installation debrief with club   japan
Pre installation debrief with club japanitjudn
 

Viewers also liked (14)

Menuju Pendidikan Yang Berkeseimbangan, Berkesusaian, Berkesetaraan dan Berke...
Menuju Pendidikan Yang Berkeseimbangan, Berkesusaian, Berkesetaraan dan Berke...Menuju Pendidikan Yang Berkeseimbangan, Berkesusaian, Berkesetaraan dan Berke...
Menuju Pendidikan Yang Berkeseimbangan, Berkesusaian, Berkesetaraan dan Berke...
 
การคำนวณงวดในการผ่อนชำระ
การคำนวณงวดในการผ่อนชำระการคำนวณงวดในการผ่อนชำระ
การคำนวณงวดในการผ่อนชำระ
 
розумники і розумниці
розумники і розумницірозумники і розумниці
розумники і розумниці
 
Pdi drets dels infants 1
Pdi drets dels infants 1Pdi drets dels infants 1
Pdi drets dels infants 1
 
Eileen Teasdale 2016
Eileen Teasdale 2016Eileen Teasdale 2016
Eileen Teasdale 2016
 
Skim
SkimSkim
Skim
 
Bombardier LOC_Transportation Case study_JPU (1)
Bombardier LOC_Transportation Case study_JPU (1)Bombardier LOC_Transportation Case study_JPU (1)
Bombardier LOC_Transportation Case study_JPU (1)
 
Minimanual de gmail
Minimanual de gmailMinimanual de gmail
Minimanual de gmail
 
Trabajo de español
Trabajo de españolTrabajo de español
Trabajo de español
 
Another truth of life
Another truth of lifeAnother truth of life
Another truth of life
 
Led Light Bases and Shapes
Led Light Bases and ShapesLed Light Bases and Shapes
Led Light Bases and Shapes
 
10 Benefits of Social Media Marketing
10 Benefits of Social Media Marketing10 Benefits of Social Media Marketing
10 Benefits of Social Media Marketing
 
Smartpapervsitellaipost_25112015
Smartpapervsitellaipost_25112015Smartpapervsitellaipost_25112015
Smartpapervsitellaipost_25112015
 
Pre installation debrief with club japan
Pre installation debrief with club   japanPre installation debrief with club   japan
Pre installation debrief with club japan
 

Similar to TLabs - deutsche telekom

Privacy for tech startups
Privacy for tech startups Privacy for tech startups
Privacy for tech startups Marc Gallardo
 
Privacy by Design: White Papaer
Privacy by Design: White PapaerPrivacy by Design: White Papaer
Privacy by Design: White PapaerKristyn Greenwood
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in MindGosia Fraser
 
Privacies are Coming
Privacies are ComingPrivacies are Coming
Privacies are ComingErnest Staats
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsRobert 'Bob' Reyes
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016Melissa Krasnow
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are comingErnest Staats
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...TrustArc
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityErnest Staats
 
Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)Peter Bihr
 
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina TorinoTrustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina TorinoPeter Bihr
 
Leveraging Generative AI & Best practices
Leveraging Generative AI & Best practicesLeveraging Generative AI & Best practices
Leveraging Generative AI & Best practicesDianaGray10
 
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdprSharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdprSharp Cookie Advisors
 
Insecurity Through Technology
Insecurity Through TechnologyInsecurity Through Technology
Insecurity Through Technologydfroud
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSonny Hashmi
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb esSonny Hashmi
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control DBmaestro - Database DevOps
 
Symantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to MaturitySymantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to MaturitySymantec
 

Similar to TLabs - deutsche telekom (20)

Privacy for tech startups
Privacy for tech startups Privacy for tech startups
Privacy for tech startups
 
Privacy by Design: White Papaer
Privacy by Design: White PapaerPrivacy by Design: White Papaer
Privacy by Design: White Papaer
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
 
Privacies are Coming
Privacies are ComingPrivacies are Coming
Privacies are Coming
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act Brings
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are coming
 
Team black
Team blackTeam black
Team black
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber Security
 
Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)
 
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina TorinoTrustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
 
Leveraging Generative AI & Best practices
Leveraging Generative AI & Best practicesLeveraging Generative AI & Best practices
Leveraging Generative AI & Best practices
 
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdprSharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
 
Insecurity Through Technology
Insecurity Through TechnologyInsecurity Through Technology
Insecurity Through Technology
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control
 
Privacy Engineering
Privacy EngineeringPrivacy Engineering
Privacy Engineering
 
Symantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to MaturitySymantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to Maturity
 

More from Christina Azzam

More from Christina Azzam (20)

Tempur sealy
Tempur sealyTempur sealy
Tempur sealy
 
THUNDERHEAD
THUNDERHEADTHUNDERHEAD
THUNDERHEAD
 
THE QOE day 2
THE QOE day 2THE QOE day 2
THE QOE day 2
 
THE QOE day 1
THE QOE day 1THE QOE day 1
THE QOE day 1
 
TEVA PHARMACUITICALS
TEVA PHARMACUITICALSTEVA PHARMACUITICALS
TEVA PHARMACUITICALS
 
SEAGATE
SEAGATESEAGATE
SEAGATE
 
MICROSOFT
MICROSOFTMICROSOFT
MICROSOFT
 
KPN
KPNKPN
KPN
 
Presentation: Western Union
Presentation: Western UnionPresentation: Western Union
Presentation: Western Union
 
Presentation: Titan
Presentation: TitanPresentation: Titan
Presentation: Titan
 
Presentation: Target
Presentation: TargetPresentation: Target
Presentation: Target
 
Presentation: Reliance Industries
Presentation: Reliance IndustriesPresentation: Reliance Industries
Presentation: Reliance Industries
 
Presentatioin - Geomarine biotechnologies
Presentatioin - Geomarine biotechnologiesPresentatioin - Geomarine biotechnologies
Presentatioin - Geomarine biotechnologies
 
Presentation: Rijksmuseum
Presentation: RijksmuseumPresentation: Rijksmuseum
Presentation: Rijksmuseum
 
Presentation: TEVA
Presentation: TEVAPresentation: TEVA
Presentation: TEVA
 
Presentation: The wirter
Presentation: The wirterPresentation: The wirter
Presentation: The wirter
 
Presentation: The QoE (Introduction)
Presentation: The QoE (Introduction)Presentation: The QoE (Introduction)
Presentation: The QoE (Introduction)
 
Presentation: The QoE (Case Study)
Presentation: The QoE (Case Study)Presentation: The QoE (Case Study)
Presentation: The QoE (Case Study)
 
Presentation: Sparkcentral
Presentation: SparkcentralPresentation: Sparkcentral
Presentation: Sparkcentral
 
Presentation: Progress
Presentation: ProgressPresentation: Progress
Presentation: Progress
 

Recently uploaded

High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...soniya singh
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxStephen266013
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPramod Kumar Srivastava
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfLars Albertsson
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiSuhani Kapoor
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz1
 
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...Suhani Kapoor
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubaihf8803863
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改atducpo
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiSuhani Kapoor
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystSamantha Rae Coolbeth
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Sapana Sha
 
Call Girls In Mahipalpur O9654467111 Escorts Service
Call Girls In Mahipalpur O9654467111  Escorts ServiceCall Girls In Mahipalpur O9654467111  Escorts Service
Call Girls In Mahipalpur O9654467111 Escorts ServiceSapana Sha
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...Suhani Kapoor
 

Recently uploaded (20)

High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docx
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdf
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
 
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
 
E-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptxE-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptx
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data Analyst
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
 
Call Girls In Mahipalpur O9654467111 Escorts Service
Call Girls In Mahipalpur O9654467111  Escorts ServiceCall Girls In Mahipalpur O9654467111  Escorts Service
Call Girls In Mahipalpur O9654467111 Escorts Service
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
 

TLabs - deutsche telekom

  • 1. Understanding Privacy… … and data in personalized marketing: How to become a responsible data handler
  • 2. ILLEGALBIG DATA You should be scared …. ore at least awake right now. Good Morning!
  • 3. Understanding Privacy… marketing: How to become a responsible data handler
  • 4. EU Privacy Directive 95/46/EC • It’s the law • --- it must be boring  EU Privacy Directive 2016/680 • It’s the law • --- it must stay boring 
  • 5. Relax … • This is not my style • I’m not a lawyer • I’m an engineer.
  • 6. Actually, I’m a researcher • doing “real” research • not “market” research • (or do you deny that academia is “real”?) • And: I’m a doctor • but not a “real one”
  • 7. I work for T-Labs • Telekom Innovation Laboratories (Deutsche Telekom’s R & D Unit) • 300 Employees, DT-corporate and Technical University researchers • Our Slides look like this:
  • 8. But not today • Today I’m here to present some insights we gained in our projects on data privacy
  • 9. Privacy is NOT • the preventer of innovative marketing • an excuse for poor personalization Innovative Privacy, Privacy Protection Privacy © dilbert.com
  • 10. Privacy is Rather • your opportunity for an USP • a technology that serves your customers • a source of deep insights to customer preferences and fears • A means to make the world a better place.
  • 11. This talk is about • Privacy enhancing technologies • “Privacy By Design” • Monetizing privacy (features) • some trends in privacy research • and YOUR quesitions!
  • 12. This talk is NOT • a legal training (§§) • aimed at security experts  • a typical market research speech (sorry!) • to be ignored
  • 13. A few remarks impulses: • Who owns user data? • who controls them? • who makes money with user data? • Does privacy impact business?
  • 14. YES! P.E.T. are here to increase (your) profits! • P.E.T. = Privacy Enhancing Technologies • N.B.: P.E.T. also can increase your customer’s profits/benefits (end customers)
  • 15. Privacy Enhancing Technologies • Cryptography • Traceability • Transparency • Anonymization/Pseudonymization • “artificial data”, “differential privacy” & more • IT security
  • 16. “Privacy By Design” • by Ann Cavoukian (Privacy Commissioner of Ontario, Canada, 1995) (https://www.ipc.on.ca/wp-content/uploads/Resources/7foundationalprinciples.pdf ) • general adoption in many countries and companies • a good starting point
  • 17. Ann Cavoukian, PhD Information & Privacy Commissioner, Ontario, Canada 10.11.2 Concept, developed in the 1990s, still growing Assumption: Compliance and regulatory frameworks are not sufficient Instead, privacy assurance must be “in the genes” of the organization, so it will be its “default” mode of operation and design/development. PbD extends PETs (Privacy Extendig Technologies) to PETplus  added value! applies to: • IT systems, business practices, • physical design and • (networked) infrastructure • … market research and CRM? …
  • 18. PBD: 7 foundational principles 1. Proactive not reactive; Preventative not remedial 2. Privacy as the default setting 3. Privacy embedded into design 4. Full functionality – positive-sum, not zero-sum 5. End-to-end security – full lifecycle protection 6. Visibility and transparency – keep it open 7. Respect for user privacy – keep it user-centric
  • 19. 1. Proactive not Reactive; Preventative not Remedial • The Privacy by Design (PbD) approach is characterized by proactive rather than reactive measures. It anticipates and prevents privacy-invasive events before they happen. PbD does not wait for privacy risks to materialize, nor does it offer remedies for resolving privacy infractions once they have occurred – it aims to prevent them from occurring. In short, Privacy by Design comes before-the-fact, not after.  Have a privacy (by design) expert in your (design) team
  • 20. 2. Privacy as the Default Setting • We can all be certain of one thing – the default rules! Privacy by Design seeks to deliver the maximum degree of privacy by ensuring that personal data are automatically protected in any given IT system or business practice. If an individual does nothing, their privacy still remains intact. No action is required on the part of the individual to protect their privacy – it is built into the system, by default.  Let the user take over initiative (results in better quality insights)
  • 21. 3. Privacy Embedded into Design • Privacy is embedded into the design and architecture of IT systems and business practices. It is not bolted on as an add-on, after the fact. The result is that it becomes an essential component of the core functionality being delivered. Privacy is integral to the system, without diminishing functionality.  once done, this is easy to repeat later on in market research 
  • 22. 4. Full Functionality – Positive-Sum, not Zero- Sum • Privacy by Design seeks to accommodate all legitimate interests and objectives in a positive-sum “win-win” manner, not through a dated, zero-sum approach, where unnecessary trade-offs are made. Privacy by Design avoids the pretense of false dichotomies, such as privacy vs. security, demonstrating that it is possible to have both.  How can the “subject” of market research benefit? Think!
  • 23. 5. End-to-End Security – Full Lifecycle Protection • Privacy by Design, having been embedded into the system prior to the first element of information being collected, extends throughout the entire lifecycle of the data involved, from start to finish. This ensures that at the end of the process, all data are securely destroyed, in a timely fashion. Thus, Privacy by Design ensures cradle to grave, lifecycle management of information, end-to-end.  security is a “must have” anyway. Why not use it for privacy too?
  • 24. 6. Visibility and Transparency – Keep it Open • Privacy by Design seeks to assure all stakeholders that whatever the business practice or technology involved, it is in fact, operating according to the stated promises and objectives, subject to independent verification. Its component parts and operations remain visible and transparent, to users and providers alike. Remember, trust but verify.  Transparency guarantees insights (sic!)
  • 25. 7. Respect for User Privacy – Keep it User- Centric • Above all, Privacy by Design requires architects and operators to keep the interests of the individual uppermost by offering such measures as strong privacy defaults, appropriate notice, and empowering user- friendly options. Keep it user-centric.  the “subject “ (end-customer) is the eventual source of your revenue  nice “side effect”: the user maintains his/her own data. So it stays up-to-date with no extra effort (if done correctly ;-)
  • 26. Example: Big Data & Privacy New R&D project to start in Jan 2017: • use “linked data”, a method of publishing structured data so that it can be interlinked and become more useful through semantic queries [Wikipedia] • provide a “data dashboard” for tracking • provide a “data cockpit” for control  expected outcome: more “opt ins” for survey and data usage 
  • 27. Benefits for the end user reward the end user by • money (simple but expensive and “vintage”) • more accurate service offerings • faster service delivery/operations • gamification: let users compete and compare their privacy settings/preferences
  • 28. Be Open and Open Minded • open your collection of personal data to the end user (the source/owner of the data) • open your derivates/conclusions of this collection to the user. (no risk, no fun  ) • open yourself and your data/findings to the general public! (might be a challenge by itself!)
  • 29. Trends in Privacy Research • Differential Privacy • Artificial Data • Location Blur • Blockchains (not always a P.E.T. !!) • Apply to non-IT driven products (are their any?)
  • 30. Thank you! • Questions? I hope so! • Use the app, use your brain, and use your mouth! • Contact me “privately”: martin.kurze@telekom.de +49 171b864 22 46 • https://www.linkedin.com/in/kurze