SlideShare ist ein Scribd-Unternehmen logo
1 von 53
#smartercommerce
Aurélie Pols
Co-founder & Chief Visionary Officer
Mind Your Privacy & Mind Your Group
aurelie@mindyourprivacy.com
@aureliepols
The Future of Privacy
Data is the New Oil, Privacy is the New Green
Unlocking Value & Controlling Risk
@AureliePols
About me
Aurélie Pols
Chief Visionary Officer
Mind Your Privacy
• Grew up in the Netherlands, Dutch passport
• French mother tongue
• Most of my friends are bilingual at least
• Have Polish & Russian origins
• Set-up my 1st start-up in Belgium in 2003
• Sold it to Digitas LBi (Publicis), in 2008
• Moved to Spain in 2009
• Created 2 other start-ups in Spain in 2012
Mind Your Group, Putting Your Data to Work
Mind Your Privacy, Data Science Protected
Yes, a “law firm” but we prefer to say
a bunch of Data Scientists working with
a bunch of Lawyers
@AureliePols
Context: Privacy tri-partite
Joint effort by:
1. Governments &/or international
Associations => legislation,
guidelines, …
2. Citizens/voters/consumers
3. Businesses
Each party wanting to defend:
– Personal Data Protection & the Rule of
Law through respect of Fundamental
Rights
vs.
– Profits & hopefully Sustainability
Governments
Citizens/vot
ers/consum
ers
OUR GLOBAL
SOCIETY
Businesses
Analytics vendors / Agencies / Data Users
@AureliePols
About Mind Your Privacy
Boutique consultancy firm providing security
consultancy services and legal Privacy advice
Our typical international clients manage
sensitive data within an international
landscape
Pluricultural and multi-skilled profiles - legal,
data scientists and technical
Providing complete solutions to complex data
and privacy issues
@AureliePols
This presentation is for Data Users
Source: http://ochuko.files.wordpress.com/2010/04/sides-of-a-coin.jpg
@AureliePols
Privacy, the Word
From our Wikipedia friends:
From Latin: privatus "separated from the rest, deprived of something, esp. office, participation in
the government", from privo "to deprive”
The ability of an individual or group to seclude themselves or information about
themselves and thereby express themselves selectively.
The boundaries and content of what is considered private differ among cultures and
individuals, but share common themes.
When something is private to a person, it usually means there is something to them
inherently special or sensitive.
The domain of privacy partially overlaps security, including for instance the concepts
of appropriate use, as well as protection of information.
Privacy may also take the form of bodily integrity.
Source: https://en.wikipedia.org/wiki/Privacy
@AureliePols
Privacy, nothing to hide?
“If you have something that you don’t want
anyone to know, maybe you shouldn’t be doing it
in the first place.”
Eric Schmidt, 2009
https://www.youtube.com/watch?v=A6e7wfDHze
w
Tip: Follow Daniel Solove on LindedIn!
@AureliePols
An Anglo-Saxon term?
Source: http://web.mit.edu/bigdata-priv/
http://www.whitehouse.gov/sites/default/files/docs/big_
data_privacy_report_may_1_2014.pdf
@AureliePols
Blame?
Source: http://mobile.nytimes.com/blogs/bits/2014/05/05/white-house-tech-advisers-online-
privacy-is-a-market-failure/
@AureliePols
Solution?
@AureliePols
Is this complicated?
Source: https://www.forrestertools.com/heatmap/
@AureliePols
Regulatory law
“Every country is a little different.
You run into different regulatory regimes and you need
to make sure you have the right tools so that people
can implement the right policies they are required to
by law…
They aren’t that different”
Source: Bloomberg Singapore Sessions
April 23rd 2014
http://www.bloomberg.com/video/big-
data-big-results-singapore-sessions-4-23-
kHN5zrGbR_Wq6hbmV9~aXQ.html
@AureliePols
A global perspective
US & UK EU APEC
Common Law Continental Law Continental
law
influenced
Class actions Fines
(by DPAs: Data Protection Agencies)
Privacy Personal Data Protection (PDP)
Business focused Citizen focused: data belongs to the
visitor/prospect/consumer/citizen
Patchwork of sector based
legislations: HIPPA, COPPA,
VPPA, …
Over-arching EU Directives & Regulations
PII: varies per state Risk levels: low, medium, high, extremely
high
@AureliePols
Democracy & the rule of law
US & UK EU APEC
Common Law Continental Law Continental
law
influenced
Class actions Fines
(by DPAs: Data Protection Agencies)
Privacy Personal Data Protection (PDP)
Business focused Citizen focused: data belongs to the
visitor/prospect/consumer/citizen
Patchwork of sector based
legislations: HIPPA, COPPA,
VPPA, …
Over-arching EU Directives & Regulations
PII: varies per state Risk levels: low, medium, high, extremely
high
@AureliePols
Data Protection
In light of fuzzy interpretations of Privacy, could
we agree upon
• Thinking of it as data protection
• Protecting the data we are entrusted with
• While respecting the Right to “Privacy”
• Taking into consideration information security
measures
@AureliePols
Democracy & the rule of law
US & UK EU APEC
Common Law Continental Law Continental
law
influenced
Class actions Fines
(by DPAs: Data Protection Agencies)
Privacy Personal Data Protection (PDP)
Business focused Citizen focused: data belongs to the
visitor/prospect/consumer/citizen
Patchwork of sector based
legislations: HIPPA, COPPA,
VPPA, …
Over-arching EU Directives & Regulations
PII: varies per state Risk levels: low, medium, high,
extremely high
@AureliePols
PII: ah but we don’t collect it!
Medical information as PII
California
Arkansas
Missouri
New Hampshire
North Dakota
Texas
Virginia
Financial information as PII
Alaska North Carolina
Iowa North Dakota
Kansas Oregon
Massachusetts South Carolina
Missouri Vermont
Nevada Wisconsin
New York* Wyoming
Passwords as PII
Georgia
Maine
Nebraska
Biometric information as PII
Iowa
Nebraska
North Carolina
Wisconsin
Source: information based on
current ongoing analysis (partial
results)
@AureliePols
So what is considered PII?
Personal Information (based on the definition commonly used by most US states)
i Name, such as full name, maiden name, mother‘s maiden name, or alias
ii Personal identification number, such as social security number (SSN), passport
number, driver‘s license number, account and credit card number
iii Address information, such as street address or email address
iv Asset information, such as Internet Protocol (IP) or Media Access Control (MAC)
v Telephone numbers, including mobile, business, and personal numbers.
Information identifying personally owned property, such as vehicle registration
number or title number and related information
Source: information based on
current ongoing analysis (partial
results)
@AureliePols
If you collect PII… then
US & UK EU APEC
Common Law Continental Law Continental
law
influenced
Class actions Fines
(by DPAs: Data Protection Agencies)
Privacy Personal Data Protection (PDP)
Business focused Citizen focused
Patchwork of sector
based legislations:
HIPPA, COPPA, VPPA,
…
Over-arching EU Directives & Regulations
PII: varies per state Risk levels: low, medium, high,
extremely high
@AureliePols
PII & legislation questions
• Who knows their Chief Privacy Officer?
According to the DMA (US), CMOs should abide
to an average # of 300 pieces of legislation
• Is PII really PII?
Zip code + gender + date of birth can uniquely
identify 87% of the US population
Source: Microsoft Latanya Sweeney (2000)
http://dataprivacylab.org/projects/identifiability/paper1.pdf
@AureliePols
PII vs. Risk levels
Low
Medium
(profiling)
High
(sensitive)
Risk
level
Data type
Information Security Measures
Extremely high
(profiling of sensitive data)
PII
@AureliePols
Data lifecycles
Analytics => Follow the Money
Information Security & Compliance => Follow
the Data
@AureliePols
The Privacy framework 1
User consent
Fair & Legal process:
FIPPs
Information for approved
use
Data diving analysis / Big
Data
New business opportunity
through data
Purpose
@AureliePols
The Privacy framework 2
User consent
Fair & Legal process:
FIPPs
Information for approved
use
Data diving analysis / Big
Data
New business opportunity
through data
Purpose
@AureliePols
Fair Information Practice Principles - FIPPs
Source: https://security.berkeley.edu/sites/default/files/uploads/FIPPSimage.jpg
@AureliePols
Data collection
• Purpose – Consent
– Reason for data collection:
• Website improvement, better User Experience
• Marketing communication
• Opt-in? Opt-out? Double opt-in?
– Depends upon:
• Type of data: PII, sensitive data
• Type of sector: financial, health, …
• Geography: US vs. EU vs. ???
@AureliePols
Examples: US vs. Spain
US: no purpose,
no consent
Spain: consent, purpose,
opt-in & opt-out
@AureliePols
Trust & creepiness
Consent is about a reasonable expectation of the use of data
– There’s a fine line
between
feeling charmed
vs.
feeling invaded
– Create win-win situations:
• Customers give company information
• Customers get better service/value for money
@AureliePols
Consent & Trust for Telcos
Slide borrowed from Stephen John Deadman from Vodafone Group Services Limited, IAPP
congress Brussels, November 2013
@AureliePols
Typical personal data misconceptions
Very often present in technology companies
– We do not identify the user while using the data, so we have no
issues with Privacy law
– We only use the serial # of the users device, so the data is
anonymous and we have no issues with Privacy laws
– We encrypt the data so we are no longer
using/sending/receiving personal data
– We use hashes to replace all serial #, so the data is now
anonymous and we have no issues with Privacy laws
– We anonymize the data, so we are not using personal data
– We can use the user’s data for anything we want, as long as we
keep the data to ourselves
– Look: big name companies are doing the same, so we are ok
Slide borrowed from @simonhania from TomTom, IAPP congress Brussels, November
2013
@AureliePols
EU fines?
Spain: responsible for 80% of data protection fines in the EU
Source: http://i0.kym-
cdn.com/photos/images/newsfeed/00
0/242/381/63a.jpg
Source:
http://www.mindyourprivacy.com/downlo
ad/privacy-infographic.pdf
@AureliePols
Security (technical)
Data Collection
Processes
Resources
@AureliePols
Who has access?
Source: Mind Your Privacy seal, specific audit for analytics tools & data agencies
@AureliePols
Supplier reviews - Cloud
Typical international company set-up
Cloud:
• SaaS
• PaaS
• IaaS
@AureliePols
Data flows = shared responsibility
Source: http://cdn2-
b.examiner.com/sites/default/files/styles/image_content_width/hash/6e/54/6e
54dfaa644b1fe589e4462b6f2a20b7.jpeg?itok=OIAVYOR1
@AureliePols
As secure as the weakest link
Source: http://www.lebsontech.com/images/ChainLight.jpg
@AureliePols
WHERE TO START?
@AureliePols
Balancing Risks & Benefits
Risks
 SaaS PIAs: Privacy
Impact Assessment
 Security evaluation of
your own information
 Nature of your own
data
Benefits
 Price
 Transfer of
responsibility?
 Availability (BYOD,
strike, natural
disaster, …)
Source:
http://www.labeshops.com/image/cache/data/summitcollection/7918l-
lady-justice-3-feet-statue-800x800.jpg
@AureliePols
Compliance vs. Risk Assessments
• Achieving 100% compliance is a chimera
– Compliance is a journey, not a destination
– Level of required compliance linked to
• Sector
• Personal internal management
• Company risk profile
• Risk is a moving target
– Risk of being fined
– Risk of being breached
– Brand perception => subjective
@AureliePols
A simple example
PII viewer for Google Analytics
http://davidsimpson.me/pii-viewer-for-google-analytics/
Customer
DBData Collection
Data Visualization
 Privacy Policy
 Hosting
 Security
 Terms of Use
 Access
 Consent
 FIPPs
 Data
retention
period
 (Hosting)
 Security
 Access
What data is Chrome sending?
Is your company accountable?
@AureliePols
Other ex.: BBVA Commerce 360
26M
transactions/day
25% of
marketshare for
Spain
Source:
http://www.slideshare.net/cib
bva/juan-carlos-plaza-explica-
los-proyectos-sobre-big-data-
de-bbva
@AureliePols
Data transformations
 Consent & purpose
 Through which pipes?
 Data (transfer) security?
 Data access?
 …
From granular to aggregated
@AureliePols
What to do?
1. Know your information structure (cloud)
– Can you exactly draw the Cloud supplier slide?
2. Cloud inventory (PIA)
– Provider (& sub-contractors)
– Location
• Cloud service HQ
• Servers
– Applicable law: our friend Snowden
– Physical location: earthquakes?
• Any incidents to report?
• In-house control access (risk)
• Terms & Conditions
– Information Security measures
– Related to Privacy
@AureliePols
What to do?
3. Know your Data structure: data inventory (cloud)
– (Do you know which data can be found where)?
– Have you reviewed your information security
measures?
– What happens in case of a breach?
4. Authorization required?
– Approval International Data Transfers (IDT)
– Safe Harbor
– Binding Corporate Rules (BCR)
– User consent
@AureliePols
Moving to the cloud
1. List your departments
2. What type of data needs to be moved?
3. What are your data risk levels?
– Low / Medium / High / Extremely High
4. What do you need for compliance?
Have a list of questions ready
to ask your cloud provider
except for the price!
@AureliePols
Note: slides blurred for confidentiality reasons
@AureliePols
Note: slides blurred for confidentiality reasons
@AureliePols
MYP Information Security Framework
@AureliePols
MYP Services
For Data Users
 Risk Assessment to define maturity model (COBIT) and roadmap
 Define processes to establish proper security measures and create policies to
structure these process
 Audit the level of compliance of security measures that are in place
 Train staff to align them with security plan while reducing the risk of suffering
a data breach
 Define KPIs to adequately deploy a data governance program
@AureliePols
MYP Services
Analytics SaaS Providers
 Advice during the procurement process to define the best provider in terms of
data security management and privacy compliance
 Audit providers´ management of data and privacy
For Analytics vendors & agencies
WEMindYourPrivacy Seal
THANKS
For listening
Aurélie Pols
Co-founder & Chief Visionary Officer
Mind Your Privacy & Mind Your Group
aurelie@mindyourprivacy.com
@aureliepols
Privacy in Digital Marketing:
Regulatory Threats vs. Data Opportunities
Berlin - June 2nd 2014
 http://digitalanalyticshub.com/berlin2014/workshops/#ND68
Next full day workshop

Weitere ähnliche Inhalte

Was ist angesagt?

Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologiessidra batool
 
Ethical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerceEthical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerceNor Ayuzi Deraman
 
Chp10 public policy
Chp10 public policyChp10 public policy
Chp10 public policyEngr Razaque
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacyimehreenx
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protectionsp_krishna
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and PrivacyVertex Holdings
 
So You Want to Protect Privacy: Now What?
So You Want to Protect Privacy: Now What?So You Want to Protect Privacy: Now What?
So You Want to Protect Privacy: Now What?Stuart Bailey
 
Plaigarism and the law seminar
Plaigarism and the law seminarPlaigarism and the law seminar
Plaigarism and the law seminarBlake Morgan
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Actmrmwood
 
Be aware of the laws in South Africa that apply to email
Be aware of the laws in South Africa that apply to emailBe aware of the laws in South Africa that apply to email
Be aware of the laws in South Africa that apply to emailLance Michalson
 
Privacy And Security Laws For Sm And Lbs (110120)
Privacy And Security Laws For Sm And Lbs (110120)Privacy And Security Laws For Sm And Lbs (110120)
Privacy And Security Laws For Sm And Lbs (110120)JNicholson
 
John Nicholson Presentation
John Nicholson PresentationJohn Nicholson Presentation
John Nicholson PresentationMediabistro
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationChristina Gagnier
 

Was ist angesagt? (20)

Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
Ethical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerceEthical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerce
 
Chp10 public policy
Chp10 public policyChp10 public policy
Chp10 public policy
 
Introduction to IP Research Tools & Strategies
Introduction to IP Research Tools & StrategiesIntroduction to IP Research Tools & Strategies
Introduction to IP Research Tools & Strategies
 
Chapter 4_dp-pertemuan 6
 Chapter 4_dp-pertemuan 6 Chapter 4_dp-pertemuan 6
Chapter 4_dp-pertemuan 6
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Chapter 5_dp-_pertemuan_7_8
 Chapter 5_dp-_pertemuan_7_8 Chapter 5_dp-_pertemuan_7_8
Chapter 5_dp-_pertemuan_7_8
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
 
Chap 4 (1)
Chap 4 (1)Chap 4 (1)
Chap 4 (1)
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
 
So You Want to Protect Privacy: Now What?
So You Want to Protect Privacy: Now What?So You Want to Protect Privacy: Now What?
So You Want to Protect Privacy: Now What?
 
Plaigarism and the law seminar
Plaigarism and the law seminarPlaigarism and the law seminar
Plaigarism and the law seminar
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
Be aware of the laws in South Africa that apply to email
Be aware of the laws in South Africa that apply to emailBe aware of the laws in South Africa that apply to email
Be aware of the laws in South Africa that apply to email
 
Privacy And Security Laws For Sm And Lbs (110120)
Privacy And Security Laws For Sm And Lbs (110120)Privacy And Security Laws For Sm And Lbs (110120)
Privacy And Security Laws For Sm And Lbs (110120)
 
John Nicholson Presentation
John Nicholson PresentationJohn Nicholson Presentation
John Nicholson Presentation
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
 
LO2 - Lesson 12 - Legislation
LO2 - Lesson 12 - LegislationLO2 - Lesson 12 - Legislation
LO2 - Lesson 12 - Legislation
 
Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
 

Andere mochten auch

http://chiropractor.invalparaisolocalarea.com/
http://chiropractor.invalparaisolocalarea.com/http://chiropractor.invalparaisolocalarea.com/
http://chiropractor.invalparaisolocalarea.com/ccummens
 
2012 colloque mobilecréation-nova
2012 colloque mobilecréation-nova2012 colloque mobilecréation-nova
2012 colloque mobilecréation-novaMobileCreation
 
Kisah katak kecil
Kisah katak kecilKisah katak kecil
Kisah katak kecilhamdEy
 
Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...
Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...
Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...FLUZO
 
Conseqüències de la II Guerra Mundial
Conseqüències de la II Guerra MundialConseqüències de la II Guerra Mundial
Conseqüències de la II Guerra Mundialmalueva
 
Bertamasya ke banda
Bertamasya ke bandaBertamasya ke banda
Bertamasya ke bandaArya Ningrat
 
Lan presentation ed tech 541
Lan presentation ed tech 541Lan presentation ed tech 541
Lan presentation ed tech 541amybass
 
Customer support 1
Customer support 1Customer support 1
Customer support 1Arya Ningrat
 
The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessCisco Security
 
Demografi profil gampong kulu
Demografi profil gampong kuluDemografi profil gampong kulu
Demografi profil gampong kuluArya Ningrat
 
Laser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect AssetsLaser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect AssetsCisco Security
 
Privacy in Europe eMetrics Summit London2012
Privacy in Europe eMetrics Summit London2012Privacy in Europe eMetrics Summit London2012
Privacy in Europe eMetrics Summit London2012FLUZO
 
Taylor rita
Taylor ritaTaylor rita
Taylor ritaRita_E
 
Roster nurul walidaini
Roster nurul walidainiRoster nurul walidaini
Roster nurul walidainiArya Ningrat
 
E2 neannapa khajornmot presentation_29-11-09-2
E2 neannapa  khajornmot presentation_29-11-09-2E2 neannapa  khajornmot presentation_29-11-09-2
E2 neannapa khajornmot presentation_29-11-09-2Neannapa Khajornmot
 

Andere mochten auch (20)

http://chiropractor.invalparaisolocalarea.com/
http://chiropractor.invalparaisolocalarea.com/http://chiropractor.invalparaisolocalarea.com/
http://chiropractor.invalparaisolocalarea.com/
 
Catalog of prime-industrial-components
Catalog of prime-industrial-componentsCatalog of prime-industrial-components
Catalog of prime-industrial-components
 
2012 colloque mobilecréation-nova
2012 colloque mobilecréation-nova2012 colloque mobilecréation-nova
2012 colloque mobilecréation-nova
 
Kisah katak kecil
Kisah katak kecilKisah katak kecil
Kisah katak kecil
 
Hipertensi 2
Hipertensi 2Hipertensi 2
Hipertensi 2
 
Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...
Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...
Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...
 
Conseqüències de la II Guerra Mundial
Conseqüències de la II Guerra MundialConseqüències de la II Guerra Mundial
Conseqüències de la II Guerra Mundial
 
Kelompok 9
Kelompok 9Kelompok 9
Kelompok 9
 
Bab ii
Bab iiBab ii
Bab ii
 
Bertamasya ke banda
Bertamasya ke bandaBertamasya ke banda
Bertamasya ke banda
 
Lan presentation ed tech 541
Lan presentation ed tech 541Lan presentation ed tech 541
Lan presentation ed tech 541
 
Customer support 1
Customer support 1Customer support 1
Customer support 1
 
The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network Access
 
Demografi profil gampong kulu
Demografi profil gampong kuluDemografi profil gampong kulu
Demografi profil gampong kulu
 
Laser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect AssetsLaser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect Assets
 
Privacy in Europe eMetrics Summit London2012
Privacy in Europe eMetrics Summit London2012Privacy in Europe eMetrics Summit London2012
Privacy in Europe eMetrics Summit London2012
 
Taylor rita
Taylor ritaTaylor rita
Taylor rita
 
Fathers day
Fathers dayFathers day
Fathers day
 
Roster nurul walidaini
Roster nurul walidainiRoster nurul walidaini
Roster nurul walidaini
 
E2 neannapa khajornmot presentation_29-11-09-2
E2 neannapa  khajornmot presentation_29-11-09-2E2 neannapa  khajornmot presentation_29-11-09-2
E2 neannapa khajornmot presentation_29-11-09-2
 

Ähnlich wie Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Global Summit 2014erce future privacy aurelie pols

IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...FLUZO
 
eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...
eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...
eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...Aurélie Pols
 
eMetrics Summit Boston 2014 - Big Data Marketing - From Über Creepy to Over ...
 eMetrics Summit Boston 2014 - Big Data Marketing - From Über Creepy to Over ... eMetrics Summit Boston 2014 - Big Data Marketing - From Über Creepy to Over ...
eMetrics Summit Boston 2014 - Big Data Marketing - From Über Creepy to Over ...Aurélie Pols
 
Privacy & Analytics: Yeti or Snow Fairy?
Privacy & Analytics: Yeti or Snow Fairy?Privacy & Analytics: Yeti or Snow Fairy?
Privacy & Analytics: Yeti or Snow Fairy?FLUZO
 
Storm on the Horizon: Data Governance & Security vs. Employee Privacy
Storm on the Horizon: Data Governance & Security vs. Employee PrivacyStorm on the Horizon: Data Governance & Security vs. Employee Privacy
Storm on the Horizon: Data Governance & Security vs. Employee PrivacyAurélie Pols
 
A Framework of Purpose and Consent for Data Security and Consumer Privacy
A Framework of Purpose and Consent for Data Security and Consumer PrivacyA Framework of Purpose and Consent for Data Security and Consumer Privacy
A Framework of Purpose and Consent for Data Security and Consumer PrivacyAurélie Pols
 
Data Accountability & Consumer Trust
Data Accountability & Consumer TrustData Accountability & Consumer Trust
Data Accountability & Consumer TrustAurélie Pols
 
Aurélie Pols en Strata Conference: Digital analytics & privacy - it’s not the...
Aurélie Pols en Strata Conference: Digital analytics & privacy - it’s not the...Aurélie Pols en Strata Conference: Digital analytics & privacy - it’s not the...
Aurélie Pols en Strata Conference: Digital analytics & privacy - it’s not the...FLUZO
 
Is Big Data killing Privacy? Nop, it's inducing a paradigm shift
Is Big Data killing Privacy? Nop, it's inducing a paradigm shiftIs Big Data killing Privacy? Nop, it's inducing a paradigm shift
Is Big Data killing Privacy? Nop, it's inducing a paradigm shiftAurélie Pols
 
Digital analytics & privacy: it's not the end of the world
Digital analytics & privacy: it's not the end of the worldDigital analytics & privacy: it's not the end of the world
Digital analytics & privacy: it's not the end of the worldOReillyStrata
 
Data is the new oil, privacy is the new green - Eye4Travel Amsterdam
Data is the new oil, privacy is the new green - Eye4Travel AmsterdamData is the new oil, privacy is the new green - Eye4Travel Amsterdam
Data is the new oil, privacy is the new green - Eye4Travel AmsterdamAurélie Pols
 
Customers in the cloud pulse final
Customers in the cloud   pulse finalCustomers in the cloud   pulse final
Customers in the cloud pulse finalFLUZO
 
A Global Marketer's Guide to Privacy
A Global Marketer's Guide to PrivacyA Global Marketer's Guide to Privacy
A Global Marketer's Guide to PrivacyFLUZO
 
Brussels data science - Privacy Engineering for Big Data & Data Science
Brussels data science - Privacy Engineering for Big Data & Data ScienceBrussels data science - Privacy Engineering for Big Data & Data Science
Brussels data science - Privacy Engineering for Big Data & Data ScienceAurélie Pols
 
Would You Lie to Your Physician? Establishing Privacy Compliance within your ...
Would You Lie to Your Physician? Establishing Privacy Compliance within your ...Would You Lie to Your Physician? Establishing Privacy Compliance within your ...
Would You Lie to Your Physician? Establishing Privacy Compliance within your ...Ensighten
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation Data-Set
 
AI Roles and Risk for election year 2024
AI Roles and Risk for election year 2024AI Roles and Risk for election year 2024
AI Roles and Risk for election year 2024Aurélie Pols
 
Privacy Regulations and Your Digital Setup
Privacy Regulations and Your Digital SetupPrivacy Regulations and Your Digital Setup
Privacy Regulations and Your Digital SetupPiwik PRO
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationcaniceconsulting
 

Ähnlich wie Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Global Summit 2014erce future privacy aurelie pols (20)

IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
 
eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...
eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...
eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...
 
eMetrics Summit Boston 2014 - Big Data Marketing - From Über Creepy to Over ...
 eMetrics Summit Boston 2014 - Big Data Marketing - From Über Creepy to Over ... eMetrics Summit Boston 2014 - Big Data Marketing - From Über Creepy to Over ...
eMetrics Summit Boston 2014 - Big Data Marketing - From Über Creepy to Over ...
 
Privacy & Analytics: Yeti or Snow Fairy?
Privacy & Analytics: Yeti or Snow Fairy?Privacy & Analytics: Yeti or Snow Fairy?
Privacy & Analytics: Yeti or Snow Fairy?
 
Storm on the Horizon: Data Governance & Security vs. Employee Privacy
Storm on the Horizon: Data Governance & Security vs. Employee PrivacyStorm on the Horizon: Data Governance & Security vs. Employee Privacy
Storm on the Horizon: Data Governance & Security vs. Employee Privacy
 
A Framework of Purpose and Consent for Data Security and Consumer Privacy
A Framework of Purpose and Consent for Data Security and Consumer PrivacyA Framework of Purpose and Consent for Data Security and Consumer Privacy
A Framework of Purpose and Consent for Data Security and Consumer Privacy
 
Data Accountability & Consumer Trust
Data Accountability & Consumer TrustData Accountability & Consumer Trust
Data Accountability & Consumer Trust
 
Aurélie Pols en Strata Conference: Digital analytics & privacy - it’s not the...
Aurélie Pols en Strata Conference: Digital analytics & privacy - it’s not the...Aurélie Pols en Strata Conference: Digital analytics & privacy - it’s not the...
Aurélie Pols en Strata Conference: Digital analytics & privacy - it’s not the...
 
Is Big Data killing Privacy? Nop, it's inducing a paradigm shift
Is Big Data killing Privacy? Nop, it's inducing a paradigm shiftIs Big Data killing Privacy? Nop, it's inducing a paradigm shift
Is Big Data killing Privacy? Nop, it's inducing a paradigm shift
 
Digital analytics & privacy: it's not the end of the world
Digital analytics & privacy: it's not the end of the worldDigital analytics & privacy: it's not the end of the world
Digital analytics & privacy: it's not the end of the world
 
Data is the new oil, privacy is the new green - Eye4Travel Amsterdam
Data is the new oil, privacy is the new green - Eye4Travel AmsterdamData is the new oil, privacy is the new green - Eye4Travel Amsterdam
Data is the new oil, privacy is the new green - Eye4Travel Amsterdam
 
Customers in the cloud pulse final
Customers in the cloud   pulse finalCustomers in the cloud   pulse final
Customers in the cloud pulse final
 
A Global Marketer's Guide to Privacy
A Global Marketer's Guide to PrivacyA Global Marketer's Guide to Privacy
A Global Marketer's Guide to Privacy
 
GDPR - Applift firstscreen june 2016
GDPR - Applift firstscreen june 2016GDPR - Applift firstscreen june 2016
GDPR - Applift firstscreen june 2016
 
Brussels data science - Privacy Engineering for Big Data & Data Science
Brussels data science - Privacy Engineering for Big Data & Data ScienceBrussels data science - Privacy Engineering for Big Data & Data Science
Brussels data science - Privacy Engineering for Big Data & Data Science
 
Would You Lie to Your Physician? Establishing Privacy Compliance within your ...
Would You Lie to Your Physician? Establishing Privacy Compliance within your ...Would You Lie to Your Physician? Establishing Privacy Compliance within your ...
Would You Lie to Your Physician? Establishing Privacy Compliance within your ...
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
 
AI Roles and Risk for election year 2024
AI Roles and Risk for election year 2024AI Roles and Risk for election year 2024
AI Roles and Risk for election year 2024
 
Privacy Regulations and Your Digital Setup
Privacy Regulations and Your Digital SetupPrivacy Regulations and Your Digital Setup
Privacy Regulations and Your Digital Setup
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
 

Mehr von FLUZO

Guia Social Media de Tercera Generación. El fin del experimento, el inicio de...
Guia Social Media de Tercera Generación. El fin del experimento, el inicio de...Guia Social Media de Tercera Generación. El fin del experimento, el inicio de...
Guia Social Media de Tercera Generación. El fin del experimento, el inicio de...FLUZO
 
E metrics san fran 2014 aurelie pols final
E metrics san fran 2014 aurelie pols finalE metrics san fran 2014 aurelie pols final
E metrics san fran 2014 aurelie pols finalFLUZO
 
Monetize your digital channel to prioritize potential opportunities
Monetize your digital channel to prioritize potential opportunitiesMonetize your digital channel to prioritize potential opportunities
Monetize your digital channel to prioritize potential opportunitiesFLUZO
 
Social Media o Social Data: ¿qué contribuye más a tu negocio?
Social Media o Social Data: ¿qué contribuye más a tu negocio?	Social Media o Social Data: ¿qué contribuye más a tu negocio?
Social Media o Social Data: ¿qué contribuye más a tu negocio? FLUZO
 
Guía de Privacidad en el Móvil
Guía de Privacidad en el MóvilGuía de Privacidad en el Móvil
Guía de Privacidad en el MóvilFLUZO
 
Analítica web y Privacidad (eShow Madrid 2013)
Analítica web y Privacidad (eShow Madrid 2013)Analítica web y Privacidad (eShow Madrid 2013)
Analítica web y Privacidad (eShow Madrid 2013)FLUZO
 
Diseño web: del concepto al resultado. Ricardo Tayar en SEonthebeach 2013
Diseño web: del concepto al resultado. Ricardo Tayar en SEonthebeach 2013Diseño web: del concepto al resultado. Ricardo Tayar en SEonthebeach 2013
Diseño web: del concepto al resultado. Ricardo Tayar en SEonthebeach 2013FLUZO
 
Presentación de Gemma Muñoz en Chile Digital 2013
Presentación de Gemma Muñoz en Chile Digital 2013Presentación de Gemma Muñoz en Chile Digital 2013
Presentación de Gemma Muñoz en Chile Digital 2013FLUZO
 
La nueva ley de cookies (Conversion Thursday Zaragoza)
La nueva ley de cookies (Conversion Thursday Zaragoza)La nueva ley de cookies (Conversion Thursday Zaragoza)
La nueva ley de cookies (Conversion Thursday Zaragoza)FLUZO
 
Análisis de Fuentes de Tráfico en Analítica Web (Practitioner Web Analytics m...
Análisis de Fuentes de Tráfico en Analítica Web (Practitioner Web Analytics m...Análisis de Fuentes de Tráfico en Analítica Web (Practitioner Web Analytics m...
Análisis de Fuentes de Tráfico en Analítica Web (Practitioner Web Analytics m...FLUZO
 
Myg taller monetización - rené dechamps
Myg   taller monetización - rené dechampsMyg   taller monetización - rené dechamps
Myg taller monetización - rené dechampsFLUZO
 

Mehr von FLUZO (11)

Guia Social Media de Tercera Generación. El fin del experimento, el inicio de...
Guia Social Media de Tercera Generación. El fin del experimento, el inicio de...Guia Social Media de Tercera Generación. El fin del experimento, el inicio de...
Guia Social Media de Tercera Generación. El fin del experimento, el inicio de...
 
E metrics san fran 2014 aurelie pols final
E metrics san fran 2014 aurelie pols finalE metrics san fran 2014 aurelie pols final
E metrics san fran 2014 aurelie pols final
 
Monetize your digital channel to prioritize potential opportunities
Monetize your digital channel to prioritize potential opportunitiesMonetize your digital channel to prioritize potential opportunities
Monetize your digital channel to prioritize potential opportunities
 
Social Media o Social Data: ¿qué contribuye más a tu negocio?
Social Media o Social Data: ¿qué contribuye más a tu negocio?	Social Media o Social Data: ¿qué contribuye más a tu negocio?
Social Media o Social Data: ¿qué contribuye más a tu negocio?
 
Guía de Privacidad en el Móvil
Guía de Privacidad en el MóvilGuía de Privacidad en el Móvil
Guía de Privacidad en el Móvil
 
Analítica web y Privacidad (eShow Madrid 2013)
Analítica web y Privacidad (eShow Madrid 2013)Analítica web y Privacidad (eShow Madrid 2013)
Analítica web y Privacidad (eShow Madrid 2013)
 
Diseño web: del concepto al resultado. Ricardo Tayar en SEonthebeach 2013
Diseño web: del concepto al resultado. Ricardo Tayar en SEonthebeach 2013Diseño web: del concepto al resultado. Ricardo Tayar en SEonthebeach 2013
Diseño web: del concepto al resultado. Ricardo Tayar en SEonthebeach 2013
 
Presentación de Gemma Muñoz en Chile Digital 2013
Presentación de Gemma Muñoz en Chile Digital 2013Presentación de Gemma Muñoz en Chile Digital 2013
Presentación de Gemma Muñoz en Chile Digital 2013
 
La nueva ley de cookies (Conversion Thursday Zaragoza)
La nueva ley de cookies (Conversion Thursday Zaragoza)La nueva ley de cookies (Conversion Thursday Zaragoza)
La nueva ley de cookies (Conversion Thursday Zaragoza)
 
Análisis de Fuentes de Tráfico en Analítica Web (Practitioner Web Analytics m...
Análisis de Fuentes de Tráfico en Analítica Web (Practitioner Web Analytics m...Análisis de Fuentes de Tráfico en Analítica Web (Practitioner Web Analytics m...
Análisis de Fuentes de Tráfico en Analítica Web (Practitioner Web Analytics m...
 
Myg taller monetización - rené dechamps
Myg   taller monetización - rené dechampsMyg   taller monetización - rené dechamps
Myg taller monetización - rené dechamps
 

Kürzlich hochgeladen

毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degreeyuu sss
 
GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]📊 Markus Baersch
 
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDINTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDRafezzaman
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFAAndrei Kaleshka
 
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degreeyuu sss
 
MK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docxMK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docxUnduhUnggah1
 
Identifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population MeanIdentifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population MeanMYRABACSAFRA2
 
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort servicejennyeacort
 
IMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxIMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxdolaknnilon
 
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Boston Institute of Analytics
 
办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一
办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一
办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一F sss
 
毕业文凭制作#回国入职#diploma#degree美国加州州立大学北岭分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#de...
毕业文凭制作#回国入职#diploma#degree美国加州州立大学北岭分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#de...毕业文凭制作#回国入职#diploma#degree美国加州州立大学北岭分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#de...
毕业文凭制作#回国入职#diploma#degree美国加州州立大学北岭分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#de...ttt fff
 
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一F La
 
ASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel CanterASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel Cantervoginip
 
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Boston Institute of Analytics
 
Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)Cathrine Wilhelmsen
 
DBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfDBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfJohn Sterrett
 
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...Boston Institute of Analytics
 
Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Seán Kennedy
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPTBoston Institute of Analytics
 

Kürzlich hochgeladen (20)

毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
 
GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]
 
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDINTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFA
 
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
 
MK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docxMK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docx
 
Identifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population MeanIdentifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population Mean
 
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
 
IMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxIMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptx
 
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
 
办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一
办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一
办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一
 
毕业文凭制作#回国入职#diploma#degree美国加州州立大学北岭分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#de...
毕业文凭制作#回国入职#diploma#degree美国加州州立大学北岭分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#de...毕业文凭制作#回国入职#diploma#degree美国加州州立大学北岭分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#de...
毕业文凭制作#回国入职#diploma#degree美国加州州立大学北岭分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#de...
 
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
 
ASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel CanterASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel Canter
 
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
 
Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)
 
DBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfDBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdf
 
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
 
Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
 

Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Global Summit 2014erce future privacy aurelie pols

  • 1. #smartercommerce Aurélie Pols Co-founder & Chief Visionary Officer Mind Your Privacy & Mind Your Group aurelie@mindyourprivacy.com @aureliepols The Future of Privacy Data is the New Oil, Privacy is the New Green Unlocking Value & Controlling Risk
  • 2. @AureliePols About me Aurélie Pols Chief Visionary Officer Mind Your Privacy • Grew up in the Netherlands, Dutch passport • French mother tongue • Most of my friends are bilingual at least • Have Polish & Russian origins • Set-up my 1st start-up in Belgium in 2003 • Sold it to Digitas LBi (Publicis), in 2008 • Moved to Spain in 2009 • Created 2 other start-ups in Spain in 2012 Mind Your Group, Putting Your Data to Work Mind Your Privacy, Data Science Protected Yes, a “law firm” but we prefer to say a bunch of Data Scientists working with a bunch of Lawyers
  • 3. @AureliePols Context: Privacy tri-partite Joint effort by: 1. Governments &/or international Associations => legislation, guidelines, … 2. Citizens/voters/consumers 3. Businesses Each party wanting to defend: – Personal Data Protection & the Rule of Law through respect of Fundamental Rights vs. – Profits & hopefully Sustainability Governments Citizens/vot ers/consum ers OUR GLOBAL SOCIETY Businesses Analytics vendors / Agencies / Data Users
  • 4. @AureliePols About Mind Your Privacy Boutique consultancy firm providing security consultancy services and legal Privacy advice Our typical international clients manage sensitive data within an international landscape Pluricultural and multi-skilled profiles - legal, data scientists and technical Providing complete solutions to complex data and privacy issues
  • 5. @AureliePols This presentation is for Data Users Source: http://ochuko.files.wordpress.com/2010/04/sides-of-a-coin.jpg
  • 6. @AureliePols Privacy, the Word From our Wikipedia friends: From Latin: privatus "separated from the rest, deprived of something, esp. office, participation in the government", from privo "to deprive” The ability of an individual or group to seclude themselves or information about themselves and thereby express themselves selectively. The boundaries and content of what is considered private differ among cultures and individuals, but share common themes. When something is private to a person, it usually means there is something to them inherently special or sensitive. The domain of privacy partially overlaps security, including for instance the concepts of appropriate use, as well as protection of information. Privacy may also take the form of bodily integrity. Source: https://en.wikipedia.org/wiki/Privacy
  • 7. @AureliePols Privacy, nothing to hide? “If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it in the first place.” Eric Schmidt, 2009 https://www.youtube.com/watch?v=A6e7wfDHze w Tip: Follow Daniel Solove on LindedIn!
  • 8. @AureliePols An Anglo-Saxon term? Source: http://web.mit.edu/bigdata-priv/ http://www.whitehouse.gov/sites/default/files/docs/big_ data_privacy_report_may_1_2014.pdf
  • 11. @AureliePols Is this complicated? Source: https://www.forrestertools.com/heatmap/
  • 12. @AureliePols Regulatory law “Every country is a little different. You run into different regulatory regimes and you need to make sure you have the right tools so that people can implement the right policies they are required to by law… They aren’t that different” Source: Bloomberg Singapore Sessions April 23rd 2014 http://www.bloomberg.com/video/big- data-big-results-singapore-sessions-4-23- kHN5zrGbR_Wq6hbmV9~aXQ.html
  • 13. @AureliePols A global perspective US & UK EU APEC Common Law Continental Law Continental law influenced Class actions Fines (by DPAs: Data Protection Agencies) Privacy Personal Data Protection (PDP) Business focused Citizen focused: data belongs to the visitor/prospect/consumer/citizen Patchwork of sector based legislations: HIPPA, COPPA, VPPA, … Over-arching EU Directives & Regulations PII: varies per state Risk levels: low, medium, high, extremely high
  • 14. @AureliePols Democracy & the rule of law US & UK EU APEC Common Law Continental Law Continental law influenced Class actions Fines (by DPAs: Data Protection Agencies) Privacy Personal Data Protection (PDP) Business focused Citizen focused: data belongs to the visitor/prospect/consumer/citizen Patchwork of sector based legislations: HIPPA, COPPA, VPPA, … Over-arching EU Directives & Regulations PII: varies per state Risk levels: low, medium, high, extremely high
  • 15. @AureliePols Data Protection In light of fuzzy interpretations of Privacy, could we agree upon • Thinking of it as data protection • Protecting the data we are entrusted with • While respecting the Right to “Privacy” • Taking into consideration information security measures
  • 16. @AureliePols Democracy & the rule of law US & UK EU APEC Common Law Continental Law Continental law influenced Class actions Fines (by DPAs: Data Protection Agencies) Privacy Personal Data Protection (PDP) Business focused Citizen focused: data belongs to the visitor/prospect/consumer/citizen Patchwork of sector based legislations: HIPPA, COPPA, VPPA, … Over-arching EU Directives & Regulations PII: varies per state Risk levels: low, medium, high, extremely high
  • 17. @AureliePols PII: ah but we don’t collect it! Medical information as PII California Arkansas Missouri New Hampshire North Dakota Texas Virginia Financial information as PII Alaska North Carolina Iowa North Dakota Kansas Oregon Massachusetts South Carolina Missouri Vermont Nevada Wisconsin New York* Wyoming Passwords as PII Georgia Maine Nebraska Biometric information as PII Iowa Nebraska North Carolina Wisconsin Source: information based on current ongoing analysis (partial results)
  • 18. @AureliePols So what is considered PII? Personal Information (based on the definition commonly used by most US states) i Name, such as full name, maiden name, mother‘s maiden name, or alias ii Personal identification number, such as social security number (SSN), passport number, driver‘s license number, account and credit card number iii Address information, such as street address or email address iv Asset information, such as Internet Protocol (IP) or Media Access Control (MAC) v Telephone numbers, including mobile, business, and personal numbers. Information identifying personally owned property, such as vehicle registration number or title number and related information Source: information based on current ongoing analysis (partial results)
  • 19. @AureliePols If you collect PII… then US & UK EU APEC Common Law Continental Law Continental law influenced Class actions Fines (by DPAs: Data Protection Agencies) Privacy Personal Data Protection (PDP) Business focused Citizen focused Patchwork of sector based legislations: HIPPA, COPPA, VPPA, … Over-arching EU Directives & Regulations PII: varies per state Risk levels: low, medium, high, extremely high
  • 20. @AureliePols PII & legislation questions • Who knows their Chief Privacy Officer? According to the DMA (US), CMOs should abide to an average # of 300 pieces of legislation • Is PII really PII? Zip code + gender + date of birth can uniquely identify 87% of the US population Source: Microsoft Latanya Sweeney (2000) http://dataprivacylab.org/projects/identifiability/paper1.pdf
  • 21. @AureliePols PII vs. Risk levels Low Medium (profiling) High (sensitive) Risk level Data type Information Security Measures Extremely high (profiling of sensitive data) PII
  • 22. @AureliePols Data lifecycles Analytics => Follow the Money Information Security & Compliance => Follow the Data
  • 23. @AureliePols The Privacy framework 1 User consent Fair & Legal process: FIPPs Information for approved use Data diving analysis / Big Data New business opportunity through data Purpose
  • 24. @AureliePols The Privacy framework 2 User consent Fair & Legal process: FIPPs Information for approved use Data diving analysis / Big Data New business opportunity through data Purpose
  • 25. @AureliePols Fair Information Practice Principles - FIPPs Source: https://security.berkeley.edu/sites/default/files/uploads/FIPPSimage.jpg
  • 26. @AureliePols Data collection • Purpose – Consent – Reason for data collection: • Website improvement, better User Experience • Marketing communication • Opt-in? Opt-out? Double opt-in? – Depends upon: • Type of data: PII, sensitive data • Type of sector: financial, health, … • Geography: US vs. EU vs. ???
  • 27. @AureliePols Examples: US vs. Spain US: no purpose, no consent Spain: consent, purpose, opt-in & opt-out
  • 28. @AureliePols Trust & creepiness Consent is about a reasonable expectation of the use of data – There’s a fine line between feeling charmed vs. feeling invaded – Create win-win situations: • Customers give company information • Customers get better service/value for money
  • 29. @AureliePols Consent & Trust for Telcos Slide borrowed from Stephen John Deadman from Vodafone Group Services Limited, IAPP congress Brussels, November 2013
  • 30. @AureliePols Typical personal data misconceptions Very often present in technology companies – We do not identify the user while using the data, so we have no issues with Privacy law – We only use the serial # of the users device, so the data is anonymous and we have no issues with Privacy laws – We encrypt the data so we are no longer using/sending/receiving personal data – We use hashes to replace all serial #, so the data is now anonymous and we have no issues with Privacy laws – We anonymize the data, so we are not using personal data – We can use the user’s data for anything we want, as long as we keep the data to ourselves – Look: big name companies are doing the same, so we are ok Slide borrowed from @simonhania from TomTom, IAPP congress Brussels, November 2013
  • 31. @AureliePols EU fines? Spain: responsible for 80% of data protection fines in the EU Source: http://i0.kym- cdn.com/photos/images/newsfeed/00 0/242/381/63a.jpg Source: http://www.mindyourprivacy.com/downlo ad/privacy-infographic.pdf
  • 33. @AureliePols Who has access? Source: Mind Your Privacy seal, specific audit for analytics tools & data agencies
  • 34. @AureliePols Supplier reviews - Cloud Typical international company set-up Cloud: • SaaS • PaaS • IaaS
  • 35. @AureliePols Data flows = shared responsibility Source: http://cdn2- b.examiner.com/sites/default/files/styles/image_content_width/hash/6e/54/6e 54dfaa644b1fe589e4462b6f2a20b7.jpeg?itok=OIAVYOR1
  • 36. @AureliePols As secure as the weakest link Source: http://www.lebsontech.com/images/ChainLight.jpg
  • 38. @AureliePols Balancing Risks & Benefits Risks  SaaS PIAs: Privacy Impact Assessment  Security evaluation of your own information  Nature of your own data Benefits  Price  Transfer of responsibility?  Availability (BYOD, strike, natural disaster, …) Source: http://www.labeshops.com/image/cache/data/summitcollection/7918l- lady-justice-3-feet-statue-800x800.jpg
  • 39. @AureliePols Compliance vs. Risk Assessments • Achieving 100% compliance is a chimera – Compliance is a journey, not a destination – Level of required compliance linked to • Sector • Personal internal management • Company risk profile • Risk is a moving target – Risk of being fined – Risk of being breached – Brand perception => subjective
  • 40. @AureliePols A simple example PII viewer for Google Analytics http://davidsimpson.me/pii-viewer-for-google-analytics/ Customer DBData Collection Data Visualization  Privacy Policy  Hosting  Security  Terms of Use  Access  Consent  FIPPs  Data retention period  (Hosting)  Security  Access What data is Chrome sending? Is your company accountable?
  • 41. @AureliePols Other ex.: BBVA Commerce 360 26M transactions/day 25% of marketshare for Spain Source: http://www.slideshare.net/cib bva/juan-carlos-plaza-explica- los-proyectos-sobre-big-data- de-bbva
  • 42. @AureliePols Data transformations  Consent & purpose  Through which pipes?  Data (transfer) security?  Data access?  … From granular to aggregated
  • 43. @AureliePols What to do? 1. Know your information structure (cloud) – Can you exactly draw the Cloud supplier slide? 2. Cloud inventory (PIA) – Provider (& sub-contractors) – Location • Cloud service HQ • Servers – Applicable law: our friend Snowden – Physical location: earthquakes? • Any incidents to report? • In-house control access (risk) • Terms & Conditions – Information Security measures – Related to Privacy
  • 44. @AureliePols What to do? 3. Know your Data structure: data inventory (cloud) – (Do you know which data can be found where)? – Have you reviewed your information security measures? – What happens in case of a breach? 4. Authorization required? – Approval International Data Transfers (IDT) – Safe Harbor – Binding Corporate Rules (BCR) – User consent
  • 45. @AureliePols Moving to the cloud 1. List your departments 2. What type of data needs to be moved? 3. What are your data risk levels? – Low / Medium / High / Extremely High 4. What do you need for compliance? Have a list of questions ready to ask your cloud provider except for the price!
  • 46. @AureliePols Note: slides blurred for confidentiality reasons
  • 47. @AureliePols Note: slides blurred for confidentiality reasons
  • 49. @AureliePols MYP Services For Data Users  Risk Assessment to define maturity model (COBIT) and roadmap  Define processes to establish proper security measures and create policies to structure these process  Audit the level of compliance of security measures that are in place  Train staff to align them with security plan while reducing the risk of suffering a data breach  Define KPIs to adequately deploy a data governance program
  • 50. @AureliePols MYP Services Analytics SaaS Providers  Advice during the procurement process to define the best provider in terms of data security management and privacy compliance  Audit providers´ management of data and privacy For Analytics vendors & agencies WEMindYourPrivacy Seal
  • 51.
  • 53. Aurélie Pols Co-founder & Chief Visionary Officer Mind Your Privacy & Mind Your Group aurelie@mindyourprivacy.com @aureliepols Privacy in Digital Marketing: Regulatory Threats vs. Data Opportunities Berlin - June 2nd 2014  http://digitalanalyticshub.com/berlin2014/workshops/#ND68 Next full day workshop