SlideShare ist ein Scribd-Unternehmen logo
1 von 32
Downloaden Sie, um offline zu lesen
Visualizing Privacy! 
Morgan Eisler (@mogasaur)! 
UX Researcher! 
2014 
! 
! 
10/09/14! 
#GHC14 
2014
2014
2014
2014
TL;DR! 
2014
2014
2014
2014 
Users With! 
Data Exposed! 
Data! 
Breaches!
2014
2014
2014
The NTIA Code of Conduct! 
§ Categories of Data Collected:! 
− Biometrics! 
− Browser History! 
− Phone or Text Log! 
− Contacts! 
− Financial Info! 
− Health, medical, or therapy info! 
− Location! 
− User Files! 
2014
The NTIA Code of Conduct! 
§ Entities Data is Shared With:! 
− Ad Networks! 
− Carriers! 
− Consumer Data Resellers! 
− Data Analytics Providers! 
− Government Entities! 
− Operating Systems and Platforms! 
− Other Apps! 
− Social Networks! 
2014
2014
2014
“I think this signifies a company 
that is very conscientious. A 
company that cares about people's 
privacy and is aware of people's 
concerns about how their 
information will be gathered, 
shared, and used.”! 
" "- Lookout Customer! 
2014 
!
“I think if a privacy policy was 
that way then everybody’s 
policy would get read. It would 
help a lot of people out if it 
looked like this.”! 
" "- Lookout Customer! 
2014
2014
2014
2014
2014
2014
Final Thoughts! 
§ Be more transparent! 
§ Inspire trust! 
§ Improve comprehension! 
§ Keep in mind:! 
− A short form policy is not a replacement for a 
2014 
full-length policy! 
− Make sure that users understand that a short 
form policy is just that!
References 
§ 2013, 9 May.“More than 2 billion people use 
the internet, here’s what they’re up to 
(inforgraphic)”. The Cultureist. Retrieved 
from <http://www.thecultureist.com/ 
2013/05/09/how-many-people-use-the-internet- 
more-than-2-billion-infographic/>.! 
§ O’Toole, James. 2014, 28 February. “Mobile 
apps overtake PC internet usage in U.S.”. 
CNN Money. Retrieved from http:// 
money.cnn.com/2014/02/28/technology/ 
mobile/mobile-apps-internet/>.! 
2014
References 
§ Ezor, Jonathan I. 2009, 12 August. “Why your 
web site’s privacy policy matters more than 
you think.” Bloomberg Businessweek. 
Retrieved from <http:// 
www.businessweek.com/smallbiz/ 
running_small_business/archives/2009/08/ 
why_web_site_pr.html>.! 
§ ,2012. “ Global Internet User Survey 
Summary Report”. The Internet Society. 
Retrieved from <https:// 
www.internetsociety.org/sites/default/files/ 
rep-GIUS2012global-201211-en.pdf>.! 
2014
References 
§ 2009, 10 March. “TRUSTe survey findings 
indicate majority of small business neglect 
vital privacy measures” [press release]. 
TRUSTe. Retrieved from <http:// 
www.truste.com/about-TRUSTe/press-room/ 
news_truste_smb_neglect_privacy>.! 
§ Bilton, Nick. 2010, 12 May. “Price of 
Facebook privacy? Start clicking.” The New 
York Times. Retrieved from <http:// 
www.nytimes.com/2010/05/13/technology/ 
personaltech/13basics.html? 
src=tptw&_r=0>.! 
2014
References 
§ Vedantam, Shankar. 2012, 19 April. “To read all 
those web privacy policies, just take a month off 
work.” NPR. Retrieved from <http:// 
www.npr.org/blogs/alltechconsidered/ 
2012/04/19/150905465/to-read-all-those-web-privacy- 
policies-just-take-a-month-off-work>.! 
§ McDonald, Aleecia M. & Faith Cranor, Lorrie, 
2008. “The cost of reading privacy policies.” I/ 
S: A Journal of Law and Policy for the 
Information Society, 2008 Privacy Year in 
Review Issue. Retrieved from <http:// 
lorrie.cranor.org/pubs/readingPolicyCost-authorDraft. 
2014 
pdf>.!
References 
§ Westerman, Ilana. 2013, 3 June. “What 
misconceptions do consumers have about 
privacy?” IAPP. Retrieved from <https:// 
privacyassociation.org/news/a/what-misconceptions- 
do-consumers-have-about-privacy/>. 
2014 
! 
§ Weise, Elizabeth. 2014, 24 September. “43% 
of companies had a data breach in the past 
year.” USA Today. Retrieved from <http:// 
www.usatoday.com/story/tech/2014/09/24/ 
data-breach-companies-60/16106197/>.!
References 
§ Pagliery, Jose. 2014, 28 May. “Half of 
American adults hacked this year.” CNN 
Money. Retrieved from <http:// 
money.cnn.com/2014/05/28/technology/ 
security/hack-data-breach/?iid=EL>.! 
§ Fiegerman, Seth. 2014, 20 June. “Yo gets 
hacked.” Mashable. Retrieved from <http:// 
mashable.com/2014/06/20/yo-gets-hacked/ 
>.! 
2014
References 
§ 2013, 25 July. “Short Form Notice Code of 
Conduct to Promote Transparency in Mobile 
App Practices”. The National 
Telecommunications and Information 
Administration. Retrieved from <http:// 
www.ntia.doc.gov/files/ntia/publications/ 
july_25_code_draft.pdf>.! 
§ 2014, 24 July. “Apps Alliance and Intuit partner 
to release new app privacy tool” [press release]. 
Application Developers Alliance. Retrieved from 
<http://www.appdevelopersalliance.org/news/ 
2014/7/23/new-tool-allows-developers-to-create-consumer- 
friendly-app-privacy-notices>.! 
2014
Links to Tools on GitHub! 
2014 
§ Lookout: ! 
− https://github.com/lookout/private-parts! 
§ Intuit/TRUSTe:! 
− https://github.com/appsalliance/privacynotices! 
§ Mozilla:! 
− https://github.com/flamsmark/privacy-policy-template 
!
Contact/Feedback! 
Questions?! 
MORGAN.EISLER@LOOKOUT.COM or! 
Lookout Booth at the Career Fair! 
! 
Rate and Review the session using the 
GHC Mobile App! 
To download visit www.gracehopper.org! 
2014

Weitere ähnliche Inhalte

Andere mochten auch

The Heroine's Journey World edition
The Heroine's Journey World edition The Heroine's Journey World edition
The Heroine's Journey World edition Peter de Kuster
 
Legal matters
Legal mattersLegal matters
Legal mattersPrgunn1
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google AccountLookout
 
20140905 AWS Night in ITHD LT2
20140905 AWS Night in ITHD LT220140905 AWS Night in ITHD LT2
20140905 AWS Night in ITHD LT2Nobuyuki Matsui
 
Parecer jurídico normativo 36 2011 CFESS
Parecer jurídico normativo 36 2011 CFESSParecer jurídico normativo 36 2011 CFESS
Parecer jurídico normativo 36 2011 CFESSFILIPE NERI
 
Brecha tecnológica y discapacidad.
Brecha tecnológica y discapacidad.Brecha tecnológica y discapacidad.
Brecha tecnológica y discapacidad.José María
 
横手版地方発信のソーシャルメディア
横手版地方発信のソーシャルメディア横手版地方発信のソーシャルメディア
横手版地方発信のソーシャルメディアSkunkWork.Co.,Ltd
 
PHP Hypertext Preprocessor
PHP Hypertext PreprocessorPHP Hypertext Preprocessor
PHP Hypertext Preprocessoradeel990
 
Investing 101: How to Prepare for Retirement
Investing 101: How to Prepare for RetirementInvesting 101: How to Prepare for Retirement
Investing 101: How to Prepare for RetirementExperian_US
 
3 d pie chart circular puzzle with hole in center process stages 11 style 3 p...
3 d pie chart circular puzzle with hole in center process stages 11 style 3 p...3 d pie chart circular puzzle with hole in center process stages 11 style 3 p...
3 d pie chart circular puzzle with hole in center process stages 11 style 3 p...SlideTeam.net
 
生日快乐
生日快乐生日快乐
生日快乐Paul Ni
 
Event Report - Salesforce Dreamforce 2016 - Einstein is show, platform progre...
Event Report - Salesforce Dreamforce 2016 - Einstein is show, platform progre...Event Report - Salesforce Dreamforce 2016 - Einstein is show, platform progre...
Event Report - Salesforce Dreamforce 2016 - Einstein is show, platform progre...Holger Mueller
 
SuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringSuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringTieu Luu
 
Delivering Vertical Social Apps - Dreamforce - 9/18
Delivering Vertical Social Apps - Dreamforce - 9/18Delivering Vertical Social Apps - Dreamforce - 9/18
Delivering Vertical Social Apps - Dreamforce - 9/18Salesforce Partners
 

Andere mochten auch (19)

The Heroine's Journey World edition
The Heroine's Journey World edition The Heroine's Journey World edition
The Heroine's Journey World edition
 
Legal matters
Legal mattersLegal matters
Legal matters
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account
 
20140905 AWS Night in ITHD LT2
20140905 AWS Night in ITHD LT220140905 AWS Night in ITHD LT2
20140905 AWS Night in ITHD LT2
 
Parecer jurídico normativo 36 2011 CFESS
Parecer jurídico normativo 36 2011 CFESSParecer jurídico normativo 36 2011 CFESS
Parecer jurídico normativo 36 2011 CFESS
 
Brecha tecnológica y discapacidad.
Brecha tecnológica y discapacidad.Brecha tecnológica y discapacidad.
Brecha tecnológica y discapacidad.
 
横手版地方発信のソーシャルメディア
横手版地方発信のソーシャルメディア横手版地方発信のソーシャルメディア
横手版地方発信のソーシャルメディア
 
ตารางแนวทางกำหนดการจัดเวทีฯ
ตารางแนวทางกำหนดการจัดเวทีฯตารางแนวทางกำหนดการจัดเวทีฯ
ตารางแนวทางกำหนดการจัดเวทีฯ
 
Comic analysis powerpoint
Comic analysis powerpointComic analysis powerpoint
Comic analysis powerpoint
 
PHP Hypertext Preprocessor
PHP Hypertext PreprocessorPHP Hypertext Preprocessor
PHP Hypertext Preprocessor
 
Investing 101: How to Prepare for Retirement
Investing 101: How to Prepare for RetirementInvesting 101: How to Prepare for Retirement
Investing 101: How to Prepare for Retirement
 
Glossary
GlossaryGlossary
Glossary
 
3 d pie chart circular puzzle with hole in center process stages 11 style 3 p...
3 d pie chart circular puzzle with hole in center process stages 11 style 3 p...3 d pie chart circular puzzle with hole in center process stages 11 style 3 p...
3 d pie chart circular puzzle with hole in center process stages 11 style 3 p...
 
生日快乐
生日快乐生日快乐
生日快乐
 
The Link Between Processed Meat and Cancer Risk
The Link Between Processed Meat and Cancer RiskThe Link Between Processed Meat and Cancer Risk
The Link Between Processed Meat and Cancer Risk
 
Event Report - Salesforce Dreamforce 2016 - Einstein is show, platform progre...
Event Report - Salesforce Dreamforce 2016 - Einstein is show, platform progre...Event Report - Salesforce Dreamforce 2016 - Einstein is show, platform progre...
Event Report - Salesforce Dreamforce 2016 - Einstein is show, platform progre...
 
SuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringSuprTEK Continuous Monitoring
SuprTEK Continuous Monitoring
 
Delivering Vertical Social Apps - Dreamforce - 9/18
Delivering Vertical Social Apps - Dreamforce - 9/18Delivering Vertical Social Apps - Dreamforce - 9/18
Delivering Vertical Social Apps - Dreamforce - 9/18
 
Logo
LogoLogo
Logo
 

Ähnlich wie Visualizing Privacy

GRBN Trust and Personal Data Survey - Market Research Industry Special Report
GRBN Trust and Personal Data Survey - Market Research Industry Special ReportGRBN Trust and Personal Data Survey - Market Research Industry Special Report
GRBN Trust and Personal Data Survey - Market Research Industry Special ReportAndrew Cannon
 
GRBN Trust and Personal Data Survey report - Part 1 - Concern, familiarity, t...
GRBN Trust and Personal Data Survey report - Part 1 - Concern, familiarity, t...GRBN Trust and Personal Data Survey report - Part 1 - Concern, familiarity, t...
GRBN Trust and Personal Data Survey report - Part 1 - Concern, familiarity, t...Andrew Cannon
 
GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...
GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...
GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...Andrew Cannon
 
Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017Steve Mckee
 
ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)Zohra Razaq
 
Mobile Engagement 2012: A Winning Strategy
Mobile Engagement 2012:  A Winning StrategyMobile Engagement 2012:  A Winning Strategy
Mobile Engagement 2012: A Winning StrategyDawn Yankeelov
 
Do you know you the data you are wasting can make you a millionaire
Do you know you the data you are wasting can make you a millionaire Do you know you the data you are wasting can make you a millionaire
Do you know you the data you are wasting can make you a millionaire OboeziAppeal
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy Carolina Rossini
 
Privacy & Data Ethics
Privacy & Data EthicsPrivacy & Data Ethics
Privacy & Data EthicsErik Kokkonen
 
Big Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media NetworksBig Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media NetworksSylvia Ogweng
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...Frances Coronel
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Fullgloriakt
 
Staying on the Right Side of the Fence when Analyzing Human Data
Staying on the Right Side of the Fence when Analyzing Human DataStaying on the Right Side of the Fence when Analyzing Human Data
Staying on the Right Side of the Fence when Analyzing Human DataMolly O'Shea
 
Staying on the Right Side of the Fence when Analyzing Human Data
Staying on the Right Side of the Fence when Analyzing Human DataStaying on the Right Side of the Fence when Analyzing Human Data
Staying on the Right Side of the Fence when Analyzing Human DataDataSift
 
Insight Presentation: "What Wearables Mean For Marketers"
Insight Presentation: "What Wearables Mean For Marketers"Insight Presentation: "What Wearables Mean For Marketers"
Insight Presentation: "What Wearables Mean For Marketers"iMedia Connection
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235brendaylo
 
Demand Media Shares New Insights About Tech Consumers
Demand Media Shares New Insights About Tech Consumers Demand Media Shares New Insights About Tech Consumers
Demand Media Shares New Insights About Tech Consumers DemandMedia
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things The Center for Identity
 

Ähnlich wie Visualizing Privacy (20)

GRBN Trust and Personal Data Survey - Market Research Industry Special Report
GRBN Trust and Personal Data Survey - Market Research Industry Special ReportGRBN Trust and Personal Data Survey - Market Research Industry Special Report
GRBN Trust and Personal Data Survey - Market Research Industry Special Report
 
GRBN Trust and Personal Data Survey report - Part 1 - Concern, familiarity, t...
GRBN Trust and Personal Data Survey report - Part 1 - Concern, familiarity, t...GRBN Trust and Personal Data Survey report - Part 1 - Concern, familiarity, t...
GRBN Trust and Personal Data Survey report - Part 1 - Concern, familiarity, t...
 
GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...
GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...
GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...
 
Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017
 
ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)
 
Mobile Engagement 2012: A Winning Strategy
Mobile Engagement 2012:  A Winning StrategyMobile Engagement 2012:  A Winning Strategy
Mobile Engagement 2012: A Winning Strategy
 
Do you know you the data you are wasting can make you a millionaire
Do you know you the data you are wasting can make you a millionaire Do you know you the data you are wasting can make you a millionaire
Do you know you the data you are wasting can make you a millionaire
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
 
Privacy & Data Ethics
Privacy & Data EthicsPrivacy & Data Ethics
Privacy & Data Ethics
 
Big Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media NetworksBig Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media Networks
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
 
Staying on the Right Side of the Fence when Analyzing Human Data
Staying on the Right Side of the Fence when Analyzing Human DataStaying on the Right Side of the Fence when Analyzing Human Data
Staying on the Right Side of the Fence when Analyzing Human Data
 
Staying on the Right Side of the Fence when Analyzing Human Data
Staying on the Right Side of the Fence when Analyzing Human DataStaying on the Right Side of the Fence when Analyzing Human Data
Staying on the Right Side of the Fence when Analyzing Human Data
 
Insight Presentation: "What Wearables Mean For Marketers"
Insight Presentation: "What Wearables Mean For Marketers"Insight Presentation: "What Wearables Mean For Marketers"
Insight Presentation: "What Wearables Mean For Marketers"
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 
Demand Media Shares New Insights About Tech Consumers
Demand Media Shares New Insights About Tech Consumers Demand Media Shares New Insights About Tech Consumers
Demand Media Shares New Insights About Tech Consumers
 
Tech Consumer Insights
Tech Consumer InsightsTech Consumer Insights
Tech Consumer Insights
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 

Mehr von Lookout

The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsLookout
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLookout
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile SecurityLookout
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notLookout
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?Lookout
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingLookout
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity PredictionsLookout
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatibleLookout
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidLookout
 
When Android Apps Go Evil
When Android Apps Go EvilWhen Android Apps Go Evil
When Android Apps Go EvilLookout
 
Scaling Mobile Development
Scaling Mobile DevelopmentScaling Mobile Development
Scaling Mobile DevelopmentLookout
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring HackersLookout
 
How to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneHow to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneLookout
 
3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple AccountLookout
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone GuideLookout
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World CupLookout
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneLookout
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to MeasureLookout
 
Security & Privacy at the Olympics
Security & Privacy at the OlympicsSecurity & Privacy at the Olympics
Security & Privacy at the OlympicsLookout
 
5 Types of Shady Apps
5 Types of Shady Apps5 Types of Shady Apps
5 Types of Shady AppsLookout
 

Mehr von Lookout (20)

The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or not
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatible
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to Avoid
 
When Android Apps Go Evil
When Android Apps Go EvilWhen Android Apps Go Evil
When Android Apps Go Evil
 
Scaling Mobile Development
Scaling Mobile DevelopmentScaling Mobile Development
Scaling Mobile Development
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring Hackers
 
How to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneHow to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhone
 
3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone Guide
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World Cup
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your Smartphone
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to Measure
 
Security & Privacy at the Olympics
Security & Privacy at the OlympicsSecurity & Privacy at the Olympics
Security & Privacy at the Olympics
 
5 Types of Shady Apps
5 Types of Shady Apps5 Types of Shady Apps
5 Types of Shady Apps
 

Kürzlich hochgeladen

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 

Kürzlich hochgeladen (20)

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 

Visualizing Privacy

  • 1. Visualizing Privacy! Morgan Eisler (@mogasaur)! UX Researcher! 2014 ! ! 10/09/14! #GHC14 2014
  • 8. 2014 Users With! Data Exposed! Data! Breaches!
  • 10. 2014
  • 11. 2014
  • 12. The NTIA Code of Conduct! § Categories of Data Collected:! − Biometrics! − Browser History! − Phone or Text Log! − Contacts! − Financial Info! − Health, medical, or therapy info! − Location! − User Files! 2014
  • 13. The NTIA Code of Conduct! § Entities Data is Shared With:! − Ad Networks! − Carriers! − Consumer Data Resellers! − Data Analytics Providers! − Government Entities! − Operating Systems and Platforms! − Other Apps! − Social Networks! 2014
  • 14. 2014
  • 15. 2014
  • 16. “I think this signifies a company that is very conscientious. A company that cares about people's privacy and is aware of people's concerns about how their information will be gathered, shared, and used.”! " "- Lookout Customer! 2014 !
  • 17. “I think if a privacy policy was that way then everybody’s policy would get read. It would help a lot of people out if it looked like this.”! " "- Lookout Customer! 2014
  • 18. 2014
  • 19. 2014
  • 20. 2014
  • 21. 2014
  • 22. 2014
  • 23. Final Thoughts! § Be more transparent! § Inspire trust! § Improve comprehension! § Keep in mind:! − A short form policy is not a replacement for a 2014 full-length policy! − Make sure that users understand that a short form policy is just that!
  • 24. References § 2013, 9 May.“More than 2 billion people use the internet, here’s what they’re up to (inforgraphic)”. The Cultureist. Retrieved from <http://www.thecultureist.com/ 2013/05/09/how-many-people-use-the-internet- more-than-2-billion-infographic/>.! § O’Toole, James. 2014, 28 February. “Mobile apps overtake PC internet usage in U.S.”. CNN Money. Retrieved from http:// money.cnn.com/2014/02/28/technology/ mobile/mobile-apps-internet/>.! 2014
  • 25. References § Ezor, Jonathan I. 2009, 12 August. “Why your web site’s privacy policy matters more than you think.” Bloomberg Businessweek. Retrieved from <http:// www.businessweek.com/smallbiz/ running_small_business/archives/2009/08/ why_web_site_pr.html>.! § ,2012. “ Global Internet User Survey Summary Report”. The Internet Society. Retrieved from <https:// www.internetsociety.org/sites/default/files/ rep-GIUS2012global-201211-en.pdf>.! 2014
  • 26. References § 2009, 10 March. “TRUSTe survey findings indicate majority of small business neglect vital privacy measures” [press release]. TRUSTe. Retrieved from <http:// www.truste.com/about-TRUSTe/press-room/ news_truste_smb_neglect_privacy>.! § Bilton, Nick. 2010, 12 May. “Price of Facebook privacy? Start clicking.” The New York Times. Retrieved from <http:// www.nytimes.com/2010/05/13/technology/ personaltech/13basics.html? src=tptw&_r=0>.! 2014
  • 27. References § Vedantam, Shankar. 2012, 19 April. “To read all those web privacy policies, just take a month off work.” NPR. Retrieved from <http:// www.npr.org/blogs/alltechconsidered/ 2012/04/19/150905465/to-read-all-those-web-privacy- policies-just-take-a-month-off-work>.! § McDonald, Aleecia M. & Faith Cranor, Lorrie, 2008. “The cost of reading privacy policies.” I/ S: A Journal of Law and Policy for the Information Society, 2008 Privacy Year in Review Issue. Retrieved from <http:// lorrie.cranor.org/pubs/readingPolicyCost-authorDraft. 2014 pdf>.!
  • 28. References § Westerman, Ilana. 2013, 3 June. “What misconceptions do consumers have about privacy?” IAPP. Retrieved from <https:// privacyassociation.org/news/a/what-misconceptions- do-consumers-have-about-privacy/>. 2014 ! § Weise, Elizabeth. 2014, 24 September. “43% of companies had a data breach in the past year.” USA Today. Retrieved from <http:// www.usatoday.com/story/tech/2014/09/24/ data-breach-companies-60/16106197/>.!
  • 29. References § Pagliery, Jose. 2014, 28 May. “Half of American adults hacked this year.” CNN Money. Retrieved from <http:// money.cnn.com/2014/05/28/technology/ security/hack-data-breach/?iid=EL>.! § Fiegerman, Seth. 2014, 20 June. “Yo gets hacked.” Mashable. Retrieved from <http:// mashable.com/2014/06/20/yo-gets-hacked/ >.! 2014
  • 30. References § 2013, 25 July. “Short Form Notice Code of Conduct to Promote Transparency in Mobile App Practices”. The National Telecommunications and Information Administration. Retrieved from <http:// www.ntia.doc.gov/files/ntia/publications/ july_25_code_draft.pdf>.! § 2014, 24 July. “Apps Alliance and Intuit partner to release new app privacy tool” [press release]. Application Developers Alliance. Retrieved from <http://www.appdevelopersalliance.org/news/ 2014/7/23/new-tool-allows-developers-to-create-consumer- friendly-app-privacy-notices>.! 2014
  • 31. Links to Tools on GitHub! 2014 § Lookout: ! − https://github.com/lookout/private-parts! § Intuit/TRUSTe:! − https://github.com/appsalliance/privacynotices! § Mozilla:! − https://github.com/flamsmark/privacy-policy-template !
  • 32. Contact/Feedback! Questions?! MORGAN.EISLER@LOOKOUT.COM or! Lookout Booth at the Career Fair! ! Rate and Review the session using the GHC Mobile App! To download visit www.gracehopper.org! 2014