SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Downloaden Sie, um offline zu lesen
The Value of PI
            (Not π)



Constantine Karbaliotis, J.D., CIPP/C/IT
         Americas Privacy Leader
                Mercer
Constantine Karbaliotis, Mercer



•  Americas Privacy Leader, Chief Privacy Officer for the Americas
    •    Recently joined Mercer (July 2010), responsible for assisting Mercer in
         its privacy compliance program
    •    Previously acted as Symantec’s privacy lead managing its global
         privacy program
    •    Nine years consulting experience with small to large law firms, public
         legal sector as well as other public and private sector organizations
    •    Eight years experience in managing privacy and providing privacy
         advice to public and private sector clients
    •    Practiced law for ten years


•  Called to the Bar of the Province of Ontario, 1986
•  Certified Information Privacy Professional (2004), Certified
   Information Privacy Professional/Canada (2006), Certified
   Information Privacy Professional/IT (2008)
The Value of PI

•  Privacy is a human right; but there is also
   an aspect of ‘trading’ in our own
   information that makes it an asset, both in
   individuals’ hands and in the hands of
   corporations and the public sector
•  This dual nature is why we struggle with
   the notion of trading PI – even when
   we’ve traded it, we obviously retain an
   interest
There’s no free lunch
• So-called ‘free’ services are premised upon
  exchanging personal information in exchange
  for:

    – Free E-mail
    – Social networking
    – News alerts
    – Travel itineraries
    – Document sharing and collaboration
    – Business networking
    – Photo sharing
    – Music playlists
    – Dating sites

The
Value
of
PI
                           4

The trade in PI
 •  We routinely exchange data for services,
    discounts, convenience because companies see
    value in the information we share about ourselves
    – we create a substantial footprint electronically
    every day
 •  Coming soon to a browser near you: explicit
    exchanges of PI for money:
                   •  Wall Street Journal: Online Privacy: Would you sell
                      your private information to advertisers?
                      http://blogs.wsj.com/wsjam/2011/03/08/2773/



The
Value
of
PI

Why do we care?

•  As privacy professionals, the task is often
   to get organizations to take the charge of
   managing PI seriously…
  –  Investments in a tough economy, of staff,
     technology, effort
  –  Structuring business processes and
     implementing policy to foster a privacy-aware
     culture
•  We need to speak the language of
   business
Two premises

 •  Personal information in the hands of
    organizations should be treated and
    measured as an asset
 •  Personal information in the hands of
    individuals is currency, which can be
    exchanged for goods and services



The
Value
of
PI

Implications for Individuals

 • Individuals often do not understand the
   value of the currency they are ‘trading’ on
 • Our information is tremendously valuable –
   yet people give passwords up for chocolate
 • We don’t appreciate the value of the
   currency we generate until, typically, it is
   lost, or used in a way we don’t appreciate
   or expect – until it is devalued


The
Value
of
PI
                                  8

Implications for organizations

 •  So the question is, if it’s an asset,
    are organizations treating it the way
    an asset should be?
 •  If we have not valued it
    appropriately, how can it be
    protected appropriately?



The
Value
of
PI

What if we treated personal information as
        well as we treated buses…
Alternative measures of value
              (1)
•  Loss value:
  – $204 per record
  – $6.75 million per privacy incident
    • Ponemon Institute, 5th Annual Survey
•  “Lawsuit” value:
  – Recent decision of Federal Court to
    award $5000 for providing inaccurate
    data
Alternative measures of value
             (2)
•  What is the value of PI to the enterprise, in
   terms:
   –  Customer retention and trust
   –  Goodwill or intangible asset
   –  Royal Bank: Privacy accounts for an estimated 14% of
      overall Brand Value, and 7% of overall Shareholder
      Value - $679M and $979M respectively (2001)
•  Transactional value
   –  What happens when another entity wants to buy data,
      e.g. a professional buys another’s practice?
   –  There are ways to measure the value of such
      information in terms of retention, revenue, goodwill
Alternative measures of value
             (3)
•  “Meta” value:
  – Value associated with trends, statistical
    or aggregated information
•  Target value:
  – Value associated with knowing a
    particular individual’s buying habits,
    preferences, interests
Alternative measures of value
             (4)
•  Trade value
  – What is the value of the service (social
    networking, e-mail, etc.) being traded
    for one’s PI?
  – Alternatively, what is the amount bid for
    a person’s information to get them to
    part with it in terms of cash?
Alternative measures of value
             (5)
•  “Trust” value
  – If it costs a bank $y per loan application
    done online – versus $x in a bricks-and-
    mortar setting
  – The value of trust in using a website
    means a $x-y savings per transaction…
  – Conversely, lack of trust means bearing
    $x-y additional costs unnecessarily
Alternative measures of value
               (6)




•  “Theft” or criminal enterprise value:
   –  Symantec’s Internet Security Threat Report,
      vol. XIV
Organizational Implication

•  This conversation needs to be with
   your CFO:
  – Is this asset valued appropriately?
  – Protected appropriately?
  – Insured?
  – Depreciated?
•  With your CIO:
  – Do we know how PI is managed through
    its lifecyle?
Policy Implications

•  Privacy Notices
  – Is notice sufficient – or a contract un-
    read?
  – Is reasonableness more important?
  – Is a social contract or bill of rights
    better to establish a ‘standard contract’?
Implications for Accountability
       – to the business
•  Protecting PI means protecting the
   currency of individuals from
   ‘debasement’ of their currency
  – Data losses, identity theft are all
    debasing the currency
  – Individuals lose value of what they hope
    to trade
  – Means an loss in asset value to the
    organization
Conclusions?

•  This is not to suggest there is one
   way to measure the value of PI
•  This will vary by the nature of the PI,
   the business, and its uses
•  It does suggest however a
   persuasive way to get organizations
   to see management of PI in a
   different light

Weitere ähnliche Inhalte

Ähnlich wie The Value of Personal Information - IAPP Canada 2011

Donors, Data Privacy & Security, and Doing What’s “Right”
Donors, Data Privacy & Security, and Doing What’s “Right”Donors, Data Privacy & Security, and Doing What’s “Right”
Donors, Data Privacy & Security, and Doing What’s “Right”Bloomerang
 
How the Private Equity Industry is Maturing and Innovating
How the Private Equity Industry is Maturing and InnovatingHow the Private Equity Industry is Maturing and Innovating
How the Private Equity Industry is Maturing and InnovatingPrivcap
 
Data Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a PositiveData Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a PositiveTargetX
 
Notes Version: Is More Data Always Better The Legal Risks of Data Collection,...
Notes Version: Is More Data Always Better The Legal Risks of Data Collection,...Notes Version: Is More Data Always Better The Legal Risks of Data Collection,...
Notes Version: Is More Data Always Better The Legal Risks of Data Collection,...Vivastream
 
Notes Version: Is More Data Always Better The Legal Risks of Data Collection,...
Notes Version: Is More Data Always Better The Legal Risks of Data Collection,...Notes Version: Is More Data Always Better The Legal Risks of Data Collection,...
Notes Version: Is More Data Always Better The Legal Risks of Data Collection,...Vivastream
 
Protect Your Brand by Protecting Privacy
Protect Your Brand by Protecting PrivacyProtect Your Brand by Protecting Privacy
Protect Your Brand by Protecting Privacyproductcampnyc
 
OSC2012: Identity Analytics: Exploiting Digital Breadcrumbs
OSC2012: Identity Analytics: Exploiting Digital BreadcrumbsOSC2012: Identity Analytics: Exploiting Digital Breadcrumbs
OSC2012: Identity Analytics: Exploiting Digital BreadcrumbsAccenture the Netherlands
 
Trust sharing economy-part_I-introduction
Trust sharing economy-part_I-introductionTrust sharing economy-part_I-introduction
Trust sharing economy-part_I-introductionJessica Slijpen
 
Trust sharing economy-part_I-introduction
Trust sharing economy-part_I-introductionTrust sharing economy-part_I-introduction
Trust sharing economy-part_I-introductionshareNL
 
Thinking inside the box data permission strategies - Wednesday 18 November
Thinking inside the box data permission strategies - Wednesday 18 NovemberThinking inside the box data permission strategies - Wednesday 18 November
Thinking inside the box data permission strategies - Wednesday 18 NovemberRachel Aldighieri
 
Thinking inside the box: data permission strategies - 18 November
Thinking inside the box: data permission strategies - 18 NovemberThinking inside the box: data permission strategies - 18 November
Thinking inside the box: data permission strategies - 18 NovemberRachel Aldighieri
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
How to create a kick ass business case for accessibility
How to create a kick ass business case for accessibilityHow to create a kick ass business case for accessibility
How to create a kick ass business case for accessibilityIntopia
 
How to create people-centric services enabled by personal data
How to create people-centric services enabled by personal dataHow to create people-centric services enabled by personal data
How to create people-centric services enabled by personal dataClaro Partners Inc.
 
Acquisiton with permission - Community Fundraising stream, 2017 IoF Fundraisi...
Acquisiton with permission - Community Fundraising stream, 2017 IoF Fundraisi...Acquisiton with permission - Community Fundraising stream, 2017 IoF Fundraisi...
Acquisiton with permission - Community Fundraising stream, 2017 IoF Fundraisi...Purple Vision
 
005. Ethics, Privacy and Security
005. Ethics, Privacy and Security005. Ethics, Privacy and Security
005. Ethics, Privacy and SecurityArianto Muditomo
 
7 ways to ringfence customers - How to protect clients, sell more to clients...
7 ways to ringfence customers  - How to protect clients, sell more to clients...7 ways to ringfence customers  - How to protect clients, sell more to clients...
7 ways to ringfence customers - How to protect clients, sell more to clients...Dan Richards
 
Prospecting leads for your solar business
Prospecting leads for your solar businessProspecting leads for your solar business
Prospecting leads for your solar businessSmaart House
 

Ähnlich wie The Value of Personal Information - IAPP Canada 2011 (20)

Donors, Data Privacy & Security, and Doing What’s “Right”
Donors, Data Privacy & Security, and Doing What’s “Right”Donors, Data Privacy & Security, and Doing What’s “Right”
Donors, Data Privacy & Security, and Doing What’s “Right”
 
Tmw20098 land
Tmw20098 landTmw20098 land
Tmw20098 land
 
How the Private Equity Industry is Maturing and Innovating
How the Private Equity Industry is Maturing and InnovatingHow the Private Equity Industry is Maturing and Innovating
How the Private Equity Industry is Maturing and Innovating
 
Data Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a PositiveData Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a Positive
 
Notes Version: Is More Data Always Better The Legal Risks of Data Collection,...
Notes Version: Is More Data Always Better The Legal Risks of Data Collection,...Notes Version: Is More Data Always Better The Legal Risks of Data Collection,...
Notes Version: Is More Data Always Better The Legal Risks of Data Collection,...
 
Notes Version: Is More Data Always Better The Legal Risks of Data Collection,...
Notes Version: Is More Data Always Better The Legal Risks of Data Collection,...Notes Version: Is More Data Always Better The Legal Risks of Data Collection,...
Notes Version: Is More Data Always Better The Legal Risks of Data Collection,...
 
Protect Your Brand by Protecting Privacy
Protect Your Brand by Protecting PrivacyProtect Your Brand by Protecting Privacy
Protect Your Brand by Protecting Privacy
 
OSC2012: Identity Analytics: Exploiting Digital Breadcrumbs
OSC2012: Identity Analytics: Exploiting Digital BreadcrumbsOSC2012: Identity Analytics: Exploiting Digital Breadcrumbs
OSC2012: Identity Analytics: Exploiting Digital Breadcrumbs
 
Trust sharing economy-part_I-introduction
Trust sharing economy-part_I-introductionTrust sharing economy-part_I-introduction
Trust sharing economy-part_I-introduction
 
Trust sharing economy-part_I-introduction
Trust sharing economy-part_I-introductionTrust sharing economy-part_I-introduction
Trust sharing economy-part_I-introduction
 
Thinking inside the box data permission strategies - Wednesday 18 November
Thinking inside the box data permission strategies - Wednesday 18 NovemberThinking inside the box data permission strategies - Wednesday 18 November
Thinking inside the box data permission strategies - Wednesday 18 November
 
Thinking inside the box: data permission strategies - 18 November
Thinking inside the box: data permission strategies - 18 NovemberThinking inside the box: data permission strategies - 18 November
Thinking inside the box: data permission strategies - 18 November
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
How to create a kick ass business case for accessibility
How to create a kick ass business case for accessibilityHow to create a kick ass business case for accessibility
How to create a kick ass business case for accessibility
 
How to create people-centric services enabled by personal data
How to create people-centric services enabled by personal dataHow to create people-centric services enabled by personal data
How to create people-centric services enabled by personal data
 
Acquisiton with permission - Community Fundraising stream, 2017 IoF Fundraisi...
Acquisiton with permission - Community Fundraising stream, 2017 IoF Fundraisi...Acquisiton with permission - Community Fundraising stream, 2017 IoF Fundraisi...
Acquisiton with permission - Community Fundraising stream, 2017 IoF Fundraisi...
 
First Data C-Store
First Data C-Store First Data C-Store
First Data C-Store
 
005. Ethics, Privacy and Security
005. Ethics, Privacy and Security005. Ethics, Privacy and Security
005. Ethics, Privacy and Security
 
7 ways to ringfence customers - How to protect clients, sell more to clients...
7 ways to ringfence customers  - How to protect clients, sell more to clients...7 ways to ringfence customers  - How to protect clients, sell more to clients...
7 ways to ringfence customers - How to protect clients, sell more to clients...
 
Prospecting leads for your solar business
Prospecting leads for your solar businessProspecting leads for your solar business
Prospecting leads for your solar business
 

Mehr von Constantine Karbaliotis

Getting to Accountability Karbaliotis and Patrikios-Oct 22 2015
Getting to Accountability Karbaliotis and Patrikios-Oct 22 2015Getting to Accountability Karbaliotis and Patrikios-Oct 22 2015
Getting to Accountability Karbaliotis and Patrikios-Oct 22 2015Constantine Karbaliotis
 
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada SymposiumImpact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada SymposiumConstantine Karbaliotis
 
Canadian Response to the Draft EU Regulation - May 2013
Canadian Response to the Draft EU Regulation - May 2013Canadian Response to the Draft EU Regulation - May 2013
Canadian Response to the Draft EU Regulation - May 2013Constantine Karbaliotis
 
International Perspectives on Data Breach
International Perspectives on Data BreachInternational Perspectives on Data Breach
International Perspectives on Data BreachConstantine Karbaliotis
 
Update on enterprise social media risks
Update on enterprise social media risks Update on enterprise social media risks
Update on enterprise social media risks Constantine Karbaliotis
 

Mehr von Constantine Karbaliotis (8)

Getting to Accountability Karbaliotis and Patrikios-Oct 22 2015
Getting to Accountability Karbaliotis and Patrikios-Oct 22 2015Getting to Accountability Karbaliotis and Patrikios-Oct 22 2015
Getting to Accountability Karbaliotis and Patrikios-Oct 22 2015
 
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada SymposiumImpact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
 
Canadian Response to the Draft EU Regulation - May 2013
Canadian Response to the Draft EU Regulation - May 2013Canadian Response to the Draft EU Regulation - May 2013
Canadian Response to the Draft EU Regulation - May 2013
 
International Perspectives on Data Breach
International Perspectives on Data BreachInternational Perspectives on Data Breach
International Perspectives on Data Breach
 
Privacy issues in the cloud
Privacy issues in the cloudPrivacy issues in the cloud
Privacy issues in the cloud
 
Update on enterprise social media risks
Update on enterprise social media risks Update on enterprise social media risks
Update on enterprise social media risks
 
Privacy Access Letter I Feb 5 07
Privacy Access Letter I   Feb 5 07Privacy Access Letter I   Feb 5 07
Privacy Access Letter I Feb 5 07
 
Data Safety And Security
Data Safety And SecurityData Safety And Security
Data Safety And Security
 

Kürzlich hochgeladen

Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Sheetaleventcompany
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1kcpayne
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwaitdaisycvs
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876dlhescort
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...lizamodels9
 
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceMalegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noidadlhescort
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperityhemanthkumar470700
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPanhandleOilandGas
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLJAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLkapoorjyoti4444
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Anamikakaur10
 

Kürzlich hochgeladen (20)

Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
 
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceMalegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLJAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 

The Value of Personal Information - IAPP Canada 2011

  • 1. The Value of PI (Not π) Constantine Karbaliotis, J.D., CIPP/C/IT Americas Privacy Leader Mercer
  • 2. Constantine Karbaliotis, Mercer •  Americas Privacy Leader, Chief Privacy Officer for the Americas •  Recently joined Mercer (July 2010), responsible for assisting Mercer in its privacy compliance program •  Previously acted as Symantec’s privacy lead managing its global privacy program •  Nine years consulting experience with small to large law firms, public legal sector as well as other public and private sector organizations •  Eight years experience in managing privacy and providing privacy advice to public and private sector clients •  Practiced law for ten years •  Called to the Bar of the Province of Ontario, 1986 •  Certified Information Privacy Professional (2004), Certified Information Privacy Professional/Canada (2006), Certified Information Privacy Professional/IT (2008)
  • 3. The Value of PI •  Privacy is a human right; but there is also an aspect of ‘trading’ in our own information that makes it an asset, both in individuals’ hands and in the hands of corporations and the public sector •  This dual nature is why we struggle with the notion of trading PI – even when we’ve traded it, we obviously retain an interest
  • 4. There’s no free lunch • So-called ‘free’ services are premised upon exchanging personal information in exchange for: – Free E-mail – Social networking – News alerts – Travel itineraries – Document sharing and collaboration – Business networking – Photo sharing – Music playlists – Dating sites The
Value
of
PI
 4

  • 5. The trade in PI •  We routinely exchange data for services, discounts, convenience because companies see value in the information we share about ourselves – we create a substantial footprint electronically every day •  Coming soon to a browser near you: explicit exchanges of PI for money: •  Wall Street Journal: Online Privacy: Would you sell your private information to advertisers? http://blogs.wsj.com/wsjam/2011/03/08/2773/ The
Value
of
PI

  • 6. Why do we care? •  As privacy professionals, the task is often to get organizations to take the charge of managing PI seriously… –  Investments in a tough economy, of staff, technology, effort –  Structuring business processes and implementing policy to foster a privacy-aware culture •  We need to speak the language of business
  • 7. Two premises •  Personal information in the hands of organizations should be treated and measured as an asset •  Personal information in the hands of individuals is currency, which can be exchanged for goods and services The
Value
of
PI

  • 8. Implications for Individuals • Individuals often do not understand the value of the currency they are ‘trading’ on • Our information is tremendously valuable – yet people give passwords up for chocolate • We don’t appreciate the value of the currency we generate until, typically, it is lost, or used in a way we don’t appreciate or expect – until it is devalued The
Value
of
PI
 8

  • 9. Implications for organizations •  So the question is, if it’s an asset, are organizations treating it the way an asset should be? •  If we have not valued it appropriately, how can it be protected appropriately? The
Value
of
PI

  • 10. What if we treated personal information as well as we treated buses…
  • 11. Alternative measures of value (1) •  Loss value: – $204 per record – $6.75 million per privacy incident • Ponemon Institute, 5th Annual Survey •  “Lawsuit” value: – Recent decision of Federal Court to award $5000 for providing inaccurate data
  • 12. Alternative measures of value (2) •  What is the value of PI to the enterprise, in terms: –  Customer retention and trust –  Goodwill or intangible asset –  Royal Bank: Privacy accounts for an estimated 14% of overall Brand Value, and 7% of overall Shareholder Value - $679M and $979M respectively (2001) •  Transactional value –  What happens when another entity wants to buy data, e.g. a professional buys another’s practice? –  There are ways to measure the value of such information in terms of retention, revenue, goodwill
  • 13. Alternative measures of value (3) •  “Meta” value: – Value associated with trends, statistical or aggregated information •  Target value: – Value associated with knowing a particular individual’s buying habits, preferences, interests
  • 14. Alternative measures of value (4) •  Trade value – What is the value of the service (social networking, e-mail, etc.) being traded for one’s PI? – Alternatively, what is the amount bid for a person’s information to get them to part with it in terms of cash?
  • 15. Alternative measures of value (5) •  “Trust” value – If it costs a bank $y per loan application done online – versus $x in a bricks-and- mortar setting – The value of trust in using a website means a $x-y savings per transaction… – Conversely, lack of trust means bearing $x-y additional costs unnecessarily
  • 16. Alternative measures of value (6) •  “Theft” or criminal enterprise value: –  Symantec’s Internet Security Threat Report, vol. XIV
  • 17. Organizational Implication •  This conversation needs to be with your CFO: – Is this asset valued appropriately? – Protected appropriately? – Insured? – Depreciated? •  With your CIO: – Do we know how PI is managed through its lifecyle?
  • 18. Policy Implications •  Privacy Notices – Is notice sufficient – or a contract un- read? – Is reasonableness more important? – Is a social contract or bill of rights better to establish a ‘standard contract’?
  • 19. Implications for Accountability – to the business •  Protecting PI means protecting the currency of individuals from ‘debasement’ of their currency – Data losses, identity theft are all debasing the currency – Individuals lose value of what they hope to trade – Means an loss in asset value to the organization
  • 20. Conclusions? •  This is not to suggest there is one way to measure the value of PI •  This will vary by the nature of the PI, the business, and its uses •  It does suggest however a persuasive way to get organizations to see management of PI in a different light