SlideShare une entreprise Scribd logo
1  sur  22
Télécharger pour lire hors ligne
10 Burning
Questions
on Privacy
2
This presentation gives an overview of the most
important issues related to privacy on the web and
mobile.
It also provides insights and recommendations on what
you need to do for your mobile services and marketing
campaigns to create the best environment for users to
share their data.
Introduction
The author, Agathe Caffier, graduated as a business
lawyer in London and is now a Certified Information Privacy
Professional (CIPP/E).
As well as being the general council for Golden Gekko, one
of the leading mobile solution providers in the world, her
expertise in privacy matters related to mobile has led her to
provide privacy guidelines and audits to companies such
as Vodafone, Telefonica and many more.
Index
1. What is Privacy
2. What are the different regimes?
3. Which are the OECD principles?
4. Who are the different players?
5. What is the definition of personal data?
6. What does consent mean?
7. What is Active Consent in mobile?
8. Why is user data collected?
9. What is the Privacy debate about?
10. Why is there a debate about cookies?
3
4
Defined as the right to be left alone, anonymity.
Control over the use of personal information.
The ability of an individual or group to seclude themselves
or information about themselves, and thereby reveal
themselves selectively.
What is Privacy?
There is no single privacy law that applies universally.
Some languages do not have a word for privacy and only
80 countries have data protection regimes.
Four categories of privacy: bodily (physical), territorial
(house), communication (mail, telephone), information
.
5
Comprehensive model (EU)
General law covering data protection in public and
private sector, with an agency responsible for covering
its enforcement (DPA). France CNIL, Spain AEPD, UK
ICO
What are the different regimes? (1)
Sectoral Model (US)
No general framework but some existing laws addressing
specific industry sectors. Eg: finance, healthcare.
Each law will have a different enforcement authority.
.
6
Co-regulatory, Self-regulatory Model (Canada)
Mix of government and non governmental institutions that
protects personal information.
Co: law which states that each industry must develop
enforceable codes
What are the different regimes? (2)
Self: no law but existence of codes of practice for
protection by company industry or independent body.
No general Privacy / data protection law (China)
No general law. No industry guidelines.
.
7
Collection limitation principle - data subject should
know of collection when possible
Data quality principal - data to be relevant for the
purpose of collection
Which are the OECD principles? (1)
Purpose specification principle – purpose of collection
must be specified at time of collection
Use limitation principle – data to be used according to
purpose
.
8
Security safeguards principle – data should be
protected
Openness principle – no secrecy about data controller
identity and the way the data is used
Which are the OECD principles? (2)
Individual participation principle – data subject right of
access (if refused there must be valid reasons)
Accountability principle- accountable for complying with
measures in principles
.
9
Data Processor
Is an individual or organization, often a third party
outsourcing service, that processes data on behalf of
the data controller.
Is not authorized to do additional data processing
outside of the scope of what is permitted from the data
controller itself.
Who are the different players?
Data Subject
Individual whose information is being processed,
Eg: employee, end-user of an App.
Data Controller
An organization who has the authority to decide how
and why personal information is to be processed
10
“Any data that relates to an identified or identifiable
individual”
There are certain differences from one country to
another. For example, in the EU, an IP address is
personal whereas this is not the case in the US
Examples of what is classified as personal data
includes name, gender, contact information, age
and birth date, marital status, social security
number.
What is the definition of
personal data? (1)
11
A sub category is sensitive data, which covers for
example, racial or ethnic origin, political opinion,
biometric data, trade union membership or sexual
orientation.
Non- personal data is anonymized data, for example,
the date and time someone visits a specific webpage.
What is the definition of
personal data? (2)
12
“Any freely given specific and informed indication of his
wishes by which the data subject signifies his
agreement to personal data relating to him being
processed”.
Consent must be unambiguous.
Valid consent assumes the individuals’ capacity to
consent.
What does consent mean?
Individuals who have consented should be able to
withdraw their consent, preventing further processing of
their data.
Consent must be provided before the processing of
personal data starts, but it can also be required in the
course of processing, where there is a new purpose to
the data.
.
13
The definition of Active Consent in mobile is:
Voluntary, informed, express and revocable permission.
This means a user is given a clear opportunity to agree
a specific and notified use of their personal information.
Permission must be captured in a way that is not the
default option.
What is Active Consent in mobile?
Active consent applies to secondary, non-obvious use
of a user’s personal information, and/or applications
that have additional privacy implications for users
For example, an app requesting a user’s location,
where such data is not necessary for the functioning of
the app.
.
14
Golden Gekko recommends not only to comply with
the minimum legal requirements imposed by the law
but to go the extra mile and involve the user. Ensure
they are able to actively approve of their data being
processed.
A great way to involve the user in
participating is to educate them.
Our recommendation
The user should own the consent process and be given
a choice. They should also be allowed to retract their
permission easily, for example in the main ‘Settings’
menu.
Another great way to involve the user in participating in
giving consent is to educate them. Education is very
efficient when the app includes a simple wizard which
takes the user through all the privacy parameters
included in the app.
.
15
Your data can help app makers take important
decisions related to future feature enhancements
helping the app to work for you in a more personalized
way.
Some apps gather your personal data so that they can
target specific ads to you. If your data shows you meet
certain criteria, advertisers will tailor their marketing
efforts accordingly.
Why is user data collected?
In the case of a malicious app, your personal data could
be sold or used for illegal purposes.
For example, this type of app might send text messages
without your consent to premium numbers. In such
instances some users have reported being charged as
much as $10 per message. Getting access to your
contact list can be a goldmine for malware authors and
spammers.
.
16
App users are aware that most applications will need to
use at least some basic personal data in order to allow
proper use.
The problem that most users encounter is not
necessarily centred around the idea of sharing their
personal data, but rather, around the lack of
transparency and the loss of ownership of said
information.
Our recommendation
Our recommendation: Be transparent and clearly
communicate to your user the reasons for collecting
their personal data.
Be transparent and clearly communicate
the reasons for data collection.
17
App developers´ standpoint:
Privacy requirements should be respected to gain
users’ trust through being transparent.
Security measures need to be put in place to protect
users’ Privacy.
What is the privacy debate about?
Users’ standpoint:
Privacy may be voluntarily sacrificed in exchange for
perceived benefits.
Info can be stolen, misused and carries the threat of
identity theft.
18
We refuse to follow a rigid approach which could mean
an overload of pop up notifications reducing the users’
positive experience.
We recommend a flexible approach to
privacy.
Our recommendation
We recommend a flexible approach to privacy.
A flexible approach should mean a leverage of best
practices from each sector in addition to a smart user
flow and privacy settings implemented within the app.
19
In the EU, the first cookie law was introduced in 2002
where choosing to opt out was sufficient.
With the new Cookie law from 2009, opt in is required
with clear and comprehensive information about the
purposes of the storage of, or access to, that data.
Clear consent must be given.
Why is there a debate about cookies?
An example of a typical notice is: “This website uses
cookies. By using this website you approve to the use
of cookies. Please check our Privacy policy for more
information.”
There are different implementations of the law
depending on the jurisdictions:
http://cookiepedia.co.uk/cookie-laws-across-europe
20
It is important to understand privacy and put in place
appropriate legal and security measures.
Understanding privacy matters linked to mobile
application solutions will play in your favour and help
you retain your customers.
By tackling privacy from the outset of the development
of your app, you will gain users’ trust more rapidly.
Our recommendation
We recommend you give your user the choice to share
or not his personal data as well as explaining the reason
for which the data is collected.
The customer should also be given the option to go
back and change their permission status easily.
The idea is not to overload the user with pop up
notifications at each step of the app but rather, by
thinking about how to integrate privacy upfront, allowing
them to be in control through education.
21
A great way to do so is by adding a wizard that will
guide them when starting to use the app.
Moreover, by doing audits of your current application
on a regular basis you will gain users’ trust. The impact
of the latest breaches of personal data is raising
awareness amongst customers who are becoming
more demanding in regards to privacy settings.
Our recommendation
We recommend proactivity and adherence to the latest
industry recommendations by adjusting your user
journey accordingly.
We recommend proactivity and
adherence to the latest industry
guidelines.
Fighting for a world
full of mobile solutions
since 2005
web www.goldengekko.com
email
Agathe Caffier
Legal Adviser
info@goldengekko.com

Contenu connexe

Tendances

Google Policy Primer
Google Policy PrimerGoogle Policy Primer
Google Policy PrimerIrene Pollak
 
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...FLUZO
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalDr. Donald Macfarlane
 
Privacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterPrivacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterJonathan Ezor
 
Govt authentication brief ca v
Govt authentication brief ca vGovt authentication brief ca v
Govt authentication brief ca vMike Kuhn
 
CSR PII White Paper
CSR PII White PaperCSR PII White Paper
CSR PII White PaperDmcenter
 
Online Behavioral Advertising (OBA) Legal & Regulatory Compliance
Online Behavioral Advertising (OBA) Legal & Regulatory ComplianceOnline Behavioral Advertising (OBA) Legal & Regulatory Compliance
Online Behavioral Advertising (OBA) Legal & Regulatory ComplianceAdler Law Group
 
Google's Effort to Fight Content Piracy
Google's Effort to Fight Content PiracyGoogle's Effort to Fight Content Piracy
Google's Effort to Fight Content PiracyThe Hacker News
 
A priest’s phone location data outed his private life. It could happen to any...
A priest’s phone location data outed his private life. It could happen to any...A priest’s phone location data outed his private life. It could happen to any...
A priest’s phone location data outed his private life. It could happen to any...LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 
TRUSTe whitepaper- A Checklist of Practices that Impact Consumer Trust
TRUSTe whitepaper- A Checklist of Practices that Impact Consumer TrustTRUSTe whitepaper- A Checklist of Practices that Impact Consumer Trust
TRUSTe whitepaper- A Checklist of Practices that Impact Consumer TrustTRUSTe
 
eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...
eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...
eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...Aurélie Pols
 
Presentation Yun Li
Presentation Yun LiPresentation Yun Li
Presentation Yun LiYunLi
 
National identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernmentNational identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernmentEric BILLIAERT
 
Targeted Online Advertising
Targeted Online AdvertisingTargeted Online Advertising
Targeted Online AdvertisingGautam Verma
 
Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...
Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...
Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...Tania Mushtaq
 
Business ethics talk
Business ethics talkBusiness ethics talk
Business ethics talkRobert Bodle
 
Information governance a_necessity_in_to
Information governance a_necessity_in_toInformation governance a_necessity_in_to
Information governance a_necessity_in_toAnne ndolo
 
Presentation ncsl - mobile privacy enforcement 130502 (as presented)
Presentation   ncsl - mobile privacy enforcement 130502 (as presented)Presentation   ncsl - mobile privacy enforcement 130502 (as presented)
Presentation ncsl - mobile privacy enforcement 130502 (as presented)Jason Haislmaier
 
Artificial Intelligence and Machine Learning
Artificial Intelligence and Machine LearningArtificial Intelligence and Machine Learning
Artificial Intelligence and Machine LearningPolsinelli PC
 
HIPAA Privacy, Security, Breach Overview
HIPAA Privacy, Security, Breach OverviewHIPAA Privacy, Security, Breach Overview
HIPAA Privacy, Security, Breach OverviewHealthCare Too, LLC
 

Tendances (20)

Google Policy Primer
Google Policy PrimerGoogle Policy Primer
Google Policy Primer
 
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
Privacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterPrivacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law Center
 
Govt authentication brief ca v
Govt authentication brief ca vGovt authentication brief ca v
Govt authentication brief ca v
 
CSR PII White Paper
CSR PII White PaperCSR PII White Paper
CSR PII White Paper
 
Online Behavioral Advertising (OBA) Legal & Regulatory Compliance
Online Behavioral Advertising (OBA) Legal & Regulatory ComplianceOnline Behavioral Advertising (OBA) Legal & Regulatory Compliance
Online Behavioral Advertising (OBA) Legal & Regulatory Compliance
 
Google's Effort to Fight Content Piracy
Google's Effort to Fight Content PiracyGoogle's Effort to Fight Content Piracy
Google's Effort to Fight Content Piracy
 
A priest’s phone location data outed his private life. It could happen to any...
A priest’s phone location data outed his private life. It could happen to any...A priest’s phone location data outed his private life. It could happen to any...
A priest’s phone location data outed his private life. It could happen to any...
 
TRUSTe whitepaper- A Checklist of Practices that Impact Consumer Trust
TRUSTe whitepaper- A Checklist of Practices that Impact Consumer TrustTRUSTe whitepaper- A Checklist of Practices that Impact Consumer Trust
TRUSTe whitepaper- A Checklist of Practices that Impact Consumer Trust
 
eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...
eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...
eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...
 
Presentation Yun Li
Presentation Yun LiPresentation Yun Li
Presentation Yun Li
 
National identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernmentNational identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernment
 
Targeted Online Advertising
Targeted Online AdvertisingTargeted Online Advertising
Targeted Online Advertising
 
Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...
Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...
Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...
 
Business ethics talk
Business ethics talkBusiness ethics talk
Business ethics talk
 
Information governance a_necessity_in_to
Information governance a_necessity_in_toInformation governance a_necessity_in_to
Information governance a_necessity_in_to
 
Presentation ncsl - mobile privacy enforcement 130502 (as presented)
Presentation   ncsl - mobile privacy enforcement 130502 (as presented)Presentation   ncsl - mobile privacy enforcement 130502 (as presented)
Presentation ncsl - mobile privacy enforcement 130502 (as presented)
 
Artificial Intelligence and Machine Learning
Artificial Intelligence and Machine LearningArtificial Intelligence and Machine Learning
Artificial Intelligence and Machine Learning
 
HIPAA Privacy, Security, Breach Overview
HIPAA Privacy, Security, Breach OverviewHIPAA Privacy, Security, Breach Overview
HIPAA Privacy, Security, Breach Overview
 

En vedette

HIN 2016 Educational Session Slides: Privacy, the Law and Best practice - Sic...
HIN 2016 Educational Session Slides: Privacy, the Law and Best practice - Sic...HIN 2016 Educational Session Slides: Privacy, the Law and Best practice - Sic...
HIN 2016 Educational Session Slides: Privacy, the Law and Best practice - Sic...hintnet
 
PRIVACY TRAINING PLAN - KATY SMATHERS
PRIVACY TRAINING PLAN - KATY SMATHERSPRIVACY TRAINING PLAN - KATY SMATHERS
PRIVACY TRAINING PLAN - KATY SMATHERSKaty Smathers
 
Social Media and Privacy - Education Across the Nation - Australian Computer ...
Social Media and Privacy - Education Across the Nation - Australian Computer ...Social Media and Privacy - Education Across the Nation - Australian Computer ...
Social Media and Privacy - Education Across the Nation - Australian Computer ...Typeset
 
Ethics and consent for data sharing
Ethics and consent for data sharingEthics and consent for data sharing
Ethics and consent for data sharingARDC
 
Facebook and Twitter for Business Course Notes USYD
Facebook and Twitter for Business Course Notes USYDFacebook and Twitter for Business Course Notes USYD
Facebook and Twitter for Business Course Notes USYDLaurel Papworth
 
Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Russell_Kennedy
 
Induction Slideshow Privacy And Confidentiality
Induction Slideshow  Privacy And ConfidentialityInduction Slideshow  Privacy And Confidentiality
Induction Slideshow Privacy And ConfidentialityD S
 

En vedette (7)

HIN 2016 Educational Session Slides: Privacy, the Law and Best practice - Sic...
HIN 2016 Educational Session Slides: Privacy, the Law and Best practice - Sic...HIN 2016 Educational Session Slides: Privacy, the Law and Best practice - Sic...
HIN 2016 Educational Session Slides: Privacy, the Law and Best practice - Sic...
 
PRIVACY TRAINING PLAN - KATY SMATHERS
PRIVACY TRAINING PLAN - KATY SMATHERSPRIVACY TRAINING PLAN - KATY SMATHERS
PRIVACY TRAINING PLAN - KATY SMATHERS
 
Social Media and Privacy - Education Across the Nation - Australian Computer ...
Social Media and Privacy - Education Across the Nation - Australian Computer ...Social Media and Privacy - Education Across the Nation - Australian Computer ...
Social Media and Privacy - Education Across the Nation - Australian Computer ...
 
Ethics and consent for data sharing
Ethics and consent for data sharingEthics and consent for data sharing
Ethics and consent for data sharing
 
Facebook and Twitter for Business Course Notes USYD
Facebook and Twitter for Business Course Notes USYDFacebook and Twitter for Business Course Notes USYD
Facebook and Twitter for Business Course Notes USYD
 
Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)
 
Induction Slideshow Privacy And Confidentiality
Induction Slideshow  Privacy And ConfidentialityInduction Slideshow  Privacy And Confidentiality
Induction Slideshow Privacy And Confidentiality
 

Similaire à Golden Gekko, 10 burning questions on privacy

Business Marketing Your Mobile app
Business Marketing Your Mobile appBusiness Marketing Your Mobile app
Business Marketing Your Mobile app- Mark - Fullbright
 
Privacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User DataPrivacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User DataPrivacyCenter.cloud
 
How the EU-GDPR May Affect Your Website
How the EU-GDPR May Affect Your WebsiteHow the EU-GDPR May Affect Your Website
How the EU-GDPR May Affect Your WebsiteSilverTech
 
Cookie Consent and Authorized Data Collection_Mar23.pdf
Cookie Consent and Authorized Data Collection_Mar23.pdfCookie Consent and Authorized Data Collection_Mar23.pdf
Cookie Consent and Authorized Data Collection_Mar23.pdfAdzappier
 
GDPR's Impact on Social Media - Everything You Need to Know
GDPR's Impact on Social Media - Everything You Need to KnowGDPR's Impact on Social Media - Everything You Need to Know
GDPR's Impact on Social Media - Everything You Need to KnowVisitor Analytics
 
TrustArc Webinar-Advertising, Privacy, and Data Management Working Together
TrustArc Webinar-Advertising, Privacy, and Data Management Working TogetherTrustArc Webinar-Advertising, Privacy, and Data Management Working Together
TrustArc Webinar-Advertising, Privacy, and Data Management Working TogetherTrustArc
 
Data privacy Legislation in India
Data privacy Legislation in IndiaData privacy Legislation in India
Data privacy Legislation in IndiaLATHA H C
 
Noggin - World's first marketplace for Personal Data
Noggin - World's first marketplace for Personal DataNoggin - World's first marketplace for Personal Data
Noggin - World's first marketplace for Personal DataNoggin Asia
 
Checklist for SMEs for GDPR compliance
Checklist for SMEs for GDPR complianceChecklist for SMEs for GDPR compliance
Checklist for SMEs for GDPR complianceSarah Fox
 
GDPR Changing Mindset
GDPR Changing MindsetGDPR Changing Mindset
GDPR Changing MindsetNetworkIQ
 
Tangible Data Protection White Paper
Tangible Data Protection White PaperTangible Data Protection White Paper
Tangible Data Protection White PaperNick Banbury
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptxRavindra Babu
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-finalDr. Donald Macfarlane
 
Mobile Web and Apps World New Orleans Session 10 Patricia Poss Federal Trade ...
Mobile Web and Apps World New Orleans Session 10 Patricia Poss Federal Trade ...Mobile Web and Apps World New Orleans Session 10 Patricia Poss Federal Trade ...
Mobile Web and Apps World New Orleans Session 10 Patricia Poss Federal Trade ...NextVision Media
 
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdfData Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdfCIOWomenMagazine
 
A Marketer's Dilemma - Collecting Data Without Paying Fines.pdf
A Marketer's Dilemma - Collecting Data Without Paying Fines.pdfA Marketer's Dilemma - Collecting Data Without Paying Fines.pdf
A Marketer's Dilemma - Collecting Data Without Paying Fines.pdfAdzappier
 
Designing for privacy in mobile applications
Designing for privacy in mobile applicationsDesigning for privacy in mobile applications
Designing for privacy in mobile applicationsVodafone developer
 
Csa privacy by design & gdpr austin chambers 11-4-17
Csa   privacy by design & gdpr austin chambers 11-4-17Csa   privacy by design & gdpr austin chambers 11-4-17
Csa privacy by design & gdpr austin chambers 11-4-17Trish McGinity, CCSK
 

Similaire à Golden Gekko, 10 burning questions on privacy (20)

GDPR - Applift firstscreen june 2016
GDPR - Applift firstscreen june 2016GDPR - Applift firstscreen june 2016
GDPR - Applift firstscreen june 2016
 
Business Marketing Your Mobile app
Business Marketing Your Mobile appBusiness Marketing Your Mobile app
Business Marketing Your Mobile app
 
Privacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User DataPrivacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User Data
 
How the EU-GDPR May Affect Your Website
How the EU-GDPR May Affect Your WebsiteHow the EU-GDPR May Affect Your Website
How the EU-GDPR May Affect Your Website
 
Cookie Consent and Authorized Data Collection_Mar23.pdf
Cookie Consent and Authorized Data Collection_Mar23.pdfCookie Consent and Authorized Data Collection_Mar23.pdf
Cookie Consent and Authorized Data Collection_Mar23.pdf
 
GDPR's Impact on Social Media - Everything You Need to Know
GDPR's Impact on Social Media - Everything You Need to KnowGDPR's Impact on Social Media - Everything You Need to Know
GDPR's Impact on Social Media - Everything You Need to Know
 
TrustArc Webinar-Advertising, Privacy, and Data Management Working Together
TrustArc Webinar-Advertising, Privacy, and Data Management Working TogetherTrustArc Webinar-Advertising, Privacy, and Data Management Working Together
TrustArc Webinar-Advertising, Privacy, and Data Management Working Together
 
Data privacy Legislation in India
Data privacy Legislation in IndiaData privacy Legislation in India
Data privacy Legislation in India
 
Mobileprivacyazahir
MobileprivacyazahirMobileprivacyazahir
Mobileprivacyazahir
 
Noggin - World's first marketplace for Personal Data
Noggin - World's first marketplace for Personal DataNoggin - World's first marketplace for Personal Data
Noggin - World's first marketplace for Personal Data
 
Checklist for SMEs for GDPR compliance
Checklist for SMEs for GDPR complianceChecklist for SMEs for GDPR compliance
Checklist for SMEs for GDPR compliance
 
GDPR Changing Mindset
GDPR Changing MindsetGDPR Changing Mindset
GDPR Changing Mindset
 
Tangible Data Protection White Paper
Tangible Data Protection White PaperTangible Data Protection White Paper
Tangible Data Protection White Paper
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptx
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
 
Mobile Web and Apps World New Orleans Session 10 Patricia Poss Federal Trade ...
Mobile Web and Apps World New Orleans Session 10 Patricia Poss Federal Trade ...Mobile Web and Apps World New Orleans Session 10 Patricia Poss Federal Trade ...
Mobile Web and Apps World New Orleans Session 10 Patricia Poss Federal Trade ...
 
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdfData Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
 
A Marketer's Dilemma - Collecting Data Without Paying Fines.pdf
A Marketer's Dilemma - Collecting Data Without Paying Fines.pdfA Marketer's Dilemma - Collecting Data Without Paying Fines.pdf
A Marketer's Dilemma - Collecting Data Without Paying Fines.pdf
 
Designing for privacy in mobile applications
Designing for privacy in mobile applicationsDesigning for privacy in mobile applications
Designing for privacy in mobile applications
 
Csa privacy by design & gdpr austin chambers 11-4-17
Csa   privacy by design & gdpr austin chambers 11-4-17Csa   privacy by design & gdpr austin chambers 11-4-17
Csa privacy by design & gdpr austin chambers 11-4-17
 

Plus de DMI

CX Audit Workshop
CX Audit WorkshopCX Audit Workshop
CX Audit WorkshopDMI
 
7 Trends & Insights MWC 2017
7 Trends & Insights MWC 20177 Trends & Insights MWC 2017
7 Trends & Insights MWC 2017DMI
 
DMI 2017 Mobile Trends
DMI 2017 Mobile TrendsDMI 2017 Mobile Trends
DMI 2017 Mobile TrendsDMI
 
DMI – World Gaming Executive Summit
DMI – World Gaming Executive SummitDMI – World Gaming Executive Summit
DMI – World Gaming Executive SummitDMI
 
DMI – We Can See the Future
DMI – We Can See the FutureDMI – We Can See the Future
DMI – We Can See the FutureDMI
 
Top 10 Trends at MWC16
Top 10 Trends at MWC16Top 10 Trends at MWC16
Top 10 Trends at MWC16DMI
 
Top 10 Trends for Winners in Mobile 2016
Top 10 Trends for Winners in Mobile 2016Top 10 Trends for Winners in Mobile 2016
Top 10 Trends for Winners in Mobile 2016DMI
 
Don't Mobilize Your Business – Reinvent It
Don't Mobilize Your Business – Reinvent ItDon't Mobilize Your Business – Reinvent It
Don't Mobilize Your Business – Reinvent ItDMI
 
Innovation through Hackathons
Innovation through HackathonsInnovation through Hackathons
Innovation through HackathonsDMI
 
Cambodian Life - Living and Working in Phnom Penh
Cambodian Life - Living and Working in Phnom PenhCambodian Life - Living and Working in Phnom Penh
Cambodian Life - Living and Working in Phnom PenhDMI
 
Mobile Application Security by Design
Mobile Application Security by DesignMobile Application Security by Design
Mobile Application Security by DesignDMI
 
10 Design Trends 2015 - UX & UI Trends for Mobile Solutions
10 Design Trends 2015 - UX & UI Trends for Mobile Solutions10 Design Trends 2015 - UX & UI Trends for Mobile Solutions
10 Design Trends 2015 - UX & UI Trends for Mobile SolutionsDMI
 
MWC 2015 - A Recap of the Key Announcements, Highlights and Trends
MWC 2015 - A Recap of the Key Announcements, Highlights and TrendsMWC 2015 - A Recap of the Key Announcements, Highlights and Trends
MWC 2015 - A Recap of the Key Announcements, Highlights and TrendsDMI
 
Top 8 Mobile Finance Trends 2015
Top 8 Mobile Finance Trends 2015Top 8 Mobile Finance Trends 2015
Top 8 Mobile Finance Trends 2015DMI
 
Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015DMI
 
Top 10 Mobile Trends 2015
Top 10 Mobile Trends 2015Top 10 Mobile Trends 2015
Top 10 Mobile Trends 2015DMI
 
UX & UI Design - Differentiate through design
UX & UI Design - Differentiate through designUX & UI Design - Differentiate through design
UX & UI Design - Differentiate through designDMI
 
Winning the mobile user in 2015
Winning the mobile user in 2015Winning the mobile user in 2015
Winning the mobile user in 2015DMI
 
Golden Gekko presentation Google I/O 2014
Golden Gekko presentation Google I/O 2014Golden Gekko presentation Google I/O 2014
Golden Gekko presentation Google I/O 2014DMI
 
Golden Gekko Review of iOS8- for users and developers
Golden Gekko Review of iOS8- for users and developersGolden Gekko Review of iOS8- for users and developers
Golden Gekko Review of iOS8- for users and developersDMI
 

Plus de DMI (20)

CX Audit Workshop
CX Audit WorkshopCX Audit Workshop
CX Audit Workshop
 
7 Trends & Insights MWC 2017
7 Trends & Insights MWC 20177 Trends & Insights MWC 2017
7 Trends & Insights MWC 2017
 
DMI 2017 Mobile Trends
DMI 2017 Mobile TrendsDMI 2017 Mobile Trends
DMI 2017 Mobile Trends
 
DMI – World Gaming Executive Summit
DMI – World Gaming Executive SummitDMI – World Gaming Executive Summit
DMI – World Gaming Executive Summit
 
DMI – We Can See the Future
DMI – We Can See the FutureDMI – We Can See the Future
DMI – We Can See the Future
 
Top 10 Trends at MWC16
Top 10 Trends at MWC16Top 10 Trends at MWC16
Top 10 Trends at MWC16
 
Top 10 Trends for Winners in Mobile 2016
Top 10 Trends for Winners in Mobile 2016Top 10 Trends for Winners in Mobile 2016
Top 10 Trends for Winners in Mobile 2016
 
Don't Mobilize Your Business – Reinvent It
Don't Mobilize Your Business – Reinvent ItDon't Mobilize Your Business – Reinvent It
Don't Mobilize Your Business – Reinvent It
 
Innovation through Hackathons
Innovation through HackathonsInnovation through Hackathons
Innovation through Hackathons
 
Cambodian Life - Living and Working in Phnom Penh
Cambodian Life - Living and Working in Phnom PenhCambodian Life - Living and Working in Phnom Penh
Cambodian Life - Living and Working in Phnom Penh
 
Mobile Application Security by Design
Mobile Application Security by DesignMobile Application Security by Design
Mobile Application Security by Design
 
10 Design Trends 2015 - UX & UI Trends for Mobile Solutions
10 Design Trends 2015 - UX & UI Trends for Mobile Solutions10 Design Trends 2015 - UX & UI Trends for Mobile Solutions
10 Design Trends 2015 - UX & UI Trends for Mobile Solutions
 
MWC 2015 - A Recap of the Key Announcements, Highlights and Trends
MWC 2015 - A Recap of the Key Announcements, Highlights and TrendsMWC 2015 - A Recap of the Key Announcements, Highlights and Trends
MWC 2015 - A Recap of the Key Announcements, Highlights and Trends
 
Top 8 Mobile Finance Trends 2015
Top 8 Mobile Finance Trends 2015Top 8 Mobile Finance Trends 2015
Top 8 Mobile Finance Trends 2015
 
Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015
 
Top 10 Mobile Trends 2015
Top 10 Mobile Trends 2015Top 10 Mobile Trends 2015
Top 10 Mobile Trends 2015
 
UX & UI Design - Differentiate through design
UX & UI Design - Differentiate through designUX & UI Design - Differentiate through design
UX & UI Design - Differentiate through design
 
Winning the mobile user in 2015
Winning the mobile user in 2015Winning the mobile user in 2015
Winning the mobile user in 2015
 
Golden Gekko presentation Google I/O 2014
Golden Gekko presentation Google I/O 2014Golden Gekko presentation Google I/O 2014
Golden Gekko presentation Google I/O 2014
 
Golden Gekko Review of iOS8- for users and developers
Golden Gekko Review of iOS8- for users and developersGolden Gekko Review of iOS8- for users and developers
Golden Gekko Review of iOS8- for users and developers
 

Dernier

Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
QMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfQMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfROWELL MARQUINA
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 

Dernier (20)

Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
QMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfQMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdf
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 

Golden Gekko, 10 burning questions on privacy

  • 2. 2 This presentation gives an overview of the most important issues related to privacy on the web and mobile. It also provides insights and recommendations on what you need to do for your mobile services and marketing campaigns to create the best environment for users to share their data. Introduction The author, Agathe Caffier, graduated as a business lawyer in London and is now a Certified Information Privacy Professional (CIPP/E). As well as being the general council for Golden Gekko, one of the leading mobile solution providers in the world, her expertise in privacy matters related to mobile has led her to provide privacy guidelines and audits to companies such as Vodafone, Telefonica and many more.
  • 3. Index 1. What is Privacy 2. What are the different regimes? 3. Which are the OECD principles? 4. Who are the different players? 5. What is the definition of personal data? 6. What does consent mean? 7. What is Active Consent in mobile? 8. Why is user data collected? 9. What is the Privacy debate about? 10. Why is there a debate about cookies? 3
  • 4. 4 Defined as the right to be left alone, anonymity. Control over the use of personal information. The ability of an individual or group to seclude themselves or information about themselves, and thereby reveal themselves selectively. What is Privacy? There is no single privacy law that applies universally. Some languages do not have a word for privacy and only 80 countries have data protection regimes. Four categories of privacy: bodily (physical), territorial (house), communication (mail, telephone), information .
  • 5. 5 Comprehensive model (EU) General law covering data protection in public and private sector, with an agency responsible for covering its enforcement (DPA). France CNIL, Spain AEPD, UK ICO What are the different regimes? (1) Sectoral Model (US) No general framework but some existing laws addressing specific industry sectors. Eg: finance, healthcare. Each law will have a different enforcement authority. .
  • 6. 6 Co-regulatory, Self-regulatory Model (Canada) Mix of government and non governmental institutions that protects personal information. Co: law which states that each industry must develop enforceable codes What are the different regimes? (2) Self: no law but existence of codes of practice for protection by company industry or independent body. No general Privacy / data protection law (China) No general law. No industry guidelines. .
  • 7. 7 Collection limitation principle - data subject should know of collection when possible Data quality principal - data to be relevant for the purpose of collection Which are the OECD principles? (1) Purpose specification principle – purpose of collection must be specified at time of collection Use limitation principle – data to be used according to purpose .
  • 8. 8 Security safeguards principle – data should be protected Openness principle – no secrecy about data controller identity and the way the data is used Which are the OECD principles? (2) Individual participation principle – data subject right of access (if refused there must be valid reasons) Accountability principle- accountable for complying with measures in principles .
  • 9. 9 Data Processor Is an individual or organization, often a third party outsourcing service, that processes data on behalf of the data controller. Is not authorized to do additional data processing outside of the scope of what is permitted from the data controller itself. Who are the different players? Data Subject Individual whose information is being processed, Eg: employee, end-user of an App. Data Controller An organization who has the authority to decide how and why personal information is to be processed
  • 10. 10 “Any data that relates to an identified or identifiable individual” There are certain differences from one country to another. For example, in the EU, an IP address is personal whereas this is not the case in the US Examples of what is classified as personal data includes name, gender, contact information, age and birth date, marital status, social security number. What is the definition of personal data? (1)
  • 11. 11 A sub category is sensitive data, which covers for example, racial or ethnic origin, political opinion, biometric data, trade union membership or sexual orientation. Non- personal data is anonymized data, for example, the date and time someone visits a specific webpage. What is the definition of personal data? (2)
  • 12. 12 “Any freely given specific and informed indication of his wishes by which the data subject signifies his agreement to personal data relating to him being processed”. Consent must be unambiguous. Valid consent assumes the individuals’ capacity to consent. What does consent mean? Individuals who have consented should be able to withdraw their consent, preventing further processing of their data. Consent must be provided before the processing of personal data starts, but it can also be required in the course of processing, where there is a new purpose to the data. .
  • 13. 13 The definition of Active Consent in mobile is: Voluntary, informed, express and revocable permission. This means a user is given a clear opportunity to agree a specific and notified use of their personal information. Permission must be captured in a way that is not the default option. What is Active Consent in mobile? Active consent applies to secondary, non-obvious use of a user’s personal information, and/or applications that have additional privacy implications for users For example, an app requesting a user’s location, where such data is not necessary for the functioning of the app. .
  • 14. 14 Golden Gekko recommends not only to comply with the minimum legal requirements imposed by the law but to go the extra mile and involve the user. Ensure they are able to actively approve of their data being processed. A great way to involve the user in participating is to educate them. Our recommendation The user should own the consent process and be given a choice. They should also be allowed to retract their permission easily, for example in the main ‘Settings’ menu. Another great way to involve the user in participating in giving consent is to educate them. Education is very efficient when the app includes a simple wizard which takes the user through all the privacy parameters included in the app. .
  • 15. 15 Your data can help app makers take important decisions related to future feature enhancements helping the app to work for you in a more personalized way. Some apps gather your personal data so that they can target specific ads to you. If your data shows you meet certain criteria, advertisers will tailor their marketing efforts accordingly. Why is user data collected? In the case of a malicious app, your personal data could be sold or used for illegal purposes. For example, this type of app might send text messages without your consent to premium numbers. In such instances some users have reported being charged as much as $10 per message. Getting access to your contact list can be a goldmine for malware authors and spammers. .
  • 16. 16 App users are aware that most applications will need to use at least some basic personal data in order to allow proper use. The problem that most users encounter is not necessarily centred around the idea of sharing their personal data, but rather, around the lack of transparency and the loss of ownership of said information. Our recommendation Our recommendation: Be transparent and clearly communicate to your user the reasons for collecting their personal data. Be transparent and clearly communicate the reasons for data collection.
  • 17. 17 App developers´ standpoint: Privacy requirements should be respected to gain users’ trust through being transparent. Security measures need to be put in place to protect users’ Privacy. What is the privacy debate about? Users’ standpoint: Privacy may be voluntarily sacrificed in exchange for perceived benefits. Info can be stolen, misused and carries the threat of identity theft.
  • 18. 18 We refuse to follow a rigid approach which could mean an overload of pop up notifications reducing the users’ positive experience. We recommend a flexible approach to privacy. Our recommendation We recommend a flexible approach to privacy. A flexible approach should mean a leverage of best practices from each sector in addition to a smart user flow and privacy settings implemented within the app.
  • 19. 19 In the EU, the first cookie law was introduced in 2002 where choosing to opt out was sufficient. With the new Cookie law from 2009, opt in is required with clear and comprehensive information about the purposes of the storage of, or access to, that data. Clear consent must be given. Why is there a debate about cookies? An example of a typical notice is: “This website uses cookies. By using this website you approve to the use of cookies. Please check our Privacy policy for more information.” There are different implementations of the law depending on the jurisdictions: http://cookiepedia.co.uk/cookie-laws-across-europe
  • 20. 20 It is important to understand privacy and put in place appropriate legal and security measures. Understanding privacy matters linked to mobile application solutions will play in your favour and help you retain your customers. By tackling privacy from the outset of the development of your app, you will gain users’ trust more rapidly. Our recommendation We recommend you give your user the choice to share or not his personal data as well as explaining the reason for which the data is collected. The customer should also be given the option to go back and change their permission status easily. The idea is not to overload the user with pop up notifications at each step of the app but rather, by thinking about how to integrate privacy upfront, allowing them to be in control through education.
  • 21. 21 A great way to do so is by adding a wizard that will guide them when starting to use the app. Moreover, by doing audits of your current application on a regular basis you will gain users’ trust. The impact of the latest breaches of personal data is raising awareness amongst customers who are becoming more demanding in regards to privacy settings. Our recommendation We recommend proactivity and adherence to the latest industry recommendations by adjusting your user journey accordingly. We recommend proactivity and adherence to the latest industry guidelines.
  • 22. Fighting for a world full of mobile solutions since 2005 web www.goldengekko.com email Agathe Caffier Legal Adviser info@goldengekko.com