SlideShare ist ein Scribd-Unternehmen logo
1 von 31
Downloaden Sie, um offline zu lesen
Mobile Marketing
                                   Meltdown
                                   Privacy                 Monetization                    Design Best Practices




Business | Employment | Internet | Privacy | Information SecurityInternet
                               Business | Employment |                      | Privacy | Information Security
Business | Employment | Internet | Privacy | Information Security
Here’s What It’s About
•  Privacy -- Privacy by Design: Advocates embedding
   privacy considerations at the requirements phase of
   development projects

•  Monetization -- Including In-App Purchases -- Its
   Novelty is Both its Strength and Downfall

                 A Few Thoughts on Application Design


   Business | Employment | Internet | Privacy | Information Security
Why Should You Care
•  There have been 3 FTC mobile application related
   settlements already announced, others are ongoing

•  Several players in the ecosystem have been the target of
   called for Congressional investigations

•  IN SHORT THE LIABILITY EXPOSURE – add class
   actions, and state investigations – IS REALLY
   FREAKING HIGH

   Business | Employment | Internet | Privacy | Information Security
Announced FTC Settlements




 Business | Employment | Internet | Privacy | Information Security
KEY FTC INVESTIGATION
TAKEAWAYS
•  Advertising claims need be truthful. That means both
   literally and what your advertising claims implicitly

•  Important terms of the app need to be stated clearly and
   upfront

•  Tune in to privacy. There are a number of privacy laws,
   and emerging restrictions on the type of personal data
   your app can and should collect from users

    Business | Employment | Internet | Privacy | Information Security
THE MAIN TAKEAWAY: There is a
  lot of scrutiny of mobile apps. Be
proactive and take reasonable steps to
 make sure your mobile apps comply
              with the law


 Business | Employment | Internet | Privacy | Information Security
Let’s Talk Privacy
The amalgamation of so much behavior rich
information in a single very personal device
opens the possibility of radical innovations in
marketing
                                                                  Location Information
                                                                                            Access to a Network of
                                                                  (Consistent Broadcast)
                                                                                            Pre-Qualified Users
                                                                                            (Think Stored Contacts)

                                                                  Lots of Behavioral
                                                                  Tid-Bits                   Personal Financial and
                                                                                             Health Information


                                                                       1:1 User Corollary
                                                                                             Common SDK’s Create
                                                                                             Emerging Interesting
   Business | Employment | Internet | Privacy | Information Security                         Possibilities
But There Are Risks




  Business | Employment | Internet | Privacy | Information Security
Several Privacy Guidelines Out
There


  Future of Privacy Forum                                         Mobile Marke4ng Associa4on  




  Business | Employment | Internet | Privacy | Information Security
Its Still About Choice, Consent &
Control
                                                        Choice – Collec*on, 
                                                        Storage, & Transfer 




                         Control –                                         Consent – Obtain 
                         U*liza*on                                           Agreement 

  Business | Employment | Internet | Privacy | Information Security
You Got To Have a Privacy Policy
•  Even if you do not believe you are collecting
   or using data that would trigger privacy
   concerns
•  Provide a link to it in each app store listing, on
   your own site. If your app has a settings page
   put a privacy policy link there as well
•  Make sure that it can easily be read on a
   mobile device
  Business | Employment | Internet | Privacy | Information Security
Get The Disclosures Rights




  Business | Employment | Internet | Privacy | Information Security
You Have to Timely Disclose
Unanticipated Uses




  Business | Employment | Internet | Privacy | Information Security
Don’t Forget Security
•  Ensure reasonable security measures are in
   place
•  Encrypt data in transit (SSL / TLS)
•  Encrypt sensitive information stored including
   for example passwords
•  Protect user application data

   Business | Employment | Internet | Privacy | Information Security
Good Housekeeping
•  Stay within the boundaries of your disclosures – don’t
   use or collect data if you haven’t explained the
   practice to the user
•  Don’t access or collect data unless your app requires
   it
•  Delete old data
•  Provide users with a way to contact you and respond
   to their questions and concerns

   Business | Employment | Internet | Privacy | Information Security
Use Reputable Partners

Keep in mind that many, if not most, privacy
issues for application developers come from
inserting…SDKs – such as those from
advertising networks and analytics providers –
into your app



   Business | Employment | Internet | Privacy | Information Security
Let’s Talk In-App Purchases

There is a value proposition disconnect that is in
part because of the novelty of the platform




   Business | Employment | Internet | Privacy | Information Security
Food for Thought


                                        http://bit.ly/sLWOp6




  Business | Employment | Internet | Privacy | Information Security
Another Class Action Suit




  Business | Employment | Internet | Privacy | Information Security
The Quid Pro Quo

• It’s got to make sense

• Its not all about the “Benjamins”



  Business | Employment | Internet | Privacy | Information Security
Get The Disclosures Rights
•  Disclose the Existence of In-App Purchase
   Functionality
Although this application is free to download and play
certain features functionality, may require an in-app
purchase.
•  Avoid confusion: Price points like $.99, $9.99 and
   $99.99



   Business | Employment | Internet | Privacy | Information Security
Consider Documenting Your
Pricing Strategy
•  Calibrate using established revenue models: Think
   console gaming and associated marketplaces (i.e. the
   Wii)
•  Incorporate average user revenue data overtime and
   tweak pricing to maintain reasonableness

       No this is not a mechanism that limits an apps revenue
   potential. Rather we have fixed the per user revenue variable,
   the obvious then to increase revenue is to acquire more users.
    This then drives better quality into the marketplace and culls
                        inferior apps over time
    Business | Employment | Internet | Privacy | Information Security
Consider Limits
•  Daily Spending Caps

•  Time Based Purchase Limits

•  In-App Purchase Confirmation Alerts



   Business | Employment | Internet | Privacy | Information Security
Let’s Talk In-App Monetization


Apple thinks incentivization is a dirty word




   Business | Employment | Internet | Privacy | Information Security
Food for Thought


                               http://on.mash.to/zloUCV




  Business | Employment | Internet | Privacy | Information Security
How It Works


        Established Apps 
         Incorporate 3rd 
          Party SDK’s to 
             Enable 
          Mone*za*on                     App Promo*on Services Charge On A Per Unit 
                                         Basis For Installs and Split Revenue with App 
                                                 Developer who installed SDK 

                                                                                              New Apps 
                                                                                              Promoted 
                                                                                           Some*mes with 
                                                                                          Intent to Achieve 
                                                                                          Top 25 App Store 
                                                                                               Ranking 




 Business | Employment | Internet | Privacy | Information Security
You Cannot Game The System




 Business | Employment | Internet | Privacy | Information Security
Thoughts on App Design

A little conservatism in the face of uncertainty
isn’t a bad thing.




   Business | Employment | Internet | Privacy | Information Security
These Work in App Design, Privacy
and Monetization




  Business | Employment | Internet | Privacy | Information Security
CONTACT ME
HAYDEN CREQUE
p. 320-247-3439
e. hayden@crequelaw.com

Twitter

@haydencreque

Web

www.crequelaw.com





    Business | Employment | Internet | Privacy | Information Security

Weitere ähnliche Inhalte

Was ist angesagt?

IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
AIP Foundation
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
K Singh
 
Webinar mccia sm_bs_ how cloud backup can help you reduce risks and gain...
Webinar   mccia   sm_bs_ how cloud backup can help you reduce  risks and gain...Webinar   mccia   sm_bs_ how cloud backup can help you reduce  risks and gain...
Webinar mccia sm_bs_ how cloud backup can help you reduce risks and gain...
Vaultastic
 
3 simple strategies to preserve and manage unstructured data of former emplo...
3 simple strategies to preserve and manage unstructured  data of former emplo...3 simple strategies to preserve and manage unstructured  data of former emplo...
3 simple strategies to preserve and manage unstructured data of former emplo...
Vaultastic
 
Software Plus Services Customer Deck[1]
Software Plus Services Customer Deck[1]Software Plus Services Customer Deck[1]
Software Plus Services Customer Deck[1]
ISS
 
Stop retaining forever
Stop retaining foreverStop retaining forever
Stop retaining forever
QuestexConf
 

Was ist angesagt? (20)

Information Management on Mobile Steroids
Information Management on Mobile SteroidsInformation Management on Mobile Steroids
Information Management on Mobile Steroids
 
The Best Analytics Tools
The Best Analytics ToolsThe Best Analytics Tools
The Best Analytics Tools
 
In the social, mobile and cloud era, what does it take to be an Information P...
In the social, mobile and cloud era, what does it take to be an Information P...In the social, mobile and cloud era, what does it take to be an Information P...
In the social, mobile and cloud era, what does it take to be an Information P...
 
A future history of content management
A future history of content managementA future history of content management
A future history of content management
 
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
 
What is an information professional?
What is an information professional?What is an information professional?
What is an information professional?
 
Mobile Management
Mobile ManagementMobile Management
Mobile Management
 
Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)
 
Cyber Threat Management Services
Cyber Threat Management ServicesCyber Threat Management Services
Cyber Threat Management Services
 
B fujitsu uk-and_ireland_cs.en-us
B fujitsu uk-and_ireland_cs.en-usB fujitsu uk-and_ireland_cs.en-us
B fujitsu uk-and_ireland_cs.en-us
 
INOVEM Intellect CTO Council 20130225
INOVEM Intellect CTO Council 20130225INOVEM Intellect CTO Council 20130225
INOVEM Intellect CTO Council 20130225
 
Information ownership in the cloud
Information ownership in the cloudInformation ownership in the cloud
Information ownership in the cloud
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
Webinar mccia sm_bs_ how cloud backup can help you reduce risks and gain...
Webinar   mccia   sm_bs_ how cloud backup can help you reduce  risks and gain...Webinar   mccia   sm_bs_ how cloud backup can help you reduce  risks and gain...
Webinar mccia sm_bs_ how cloud backup can help you reduce risks and gain...
 
3 simple strategies to preserve and manage unstructured data of former emplo...
3 simple strategies to preserve and manage unstructured  data of former emplo...3 simple strategies to preserve and manage unstructured  data of former emplo...
3 simple strategies to preserve and manage unstructured data of former emplo...
 
Software Plus Services Customer Deck[1]
Software Plus Services Customer Deck[1]Software Plus Services Customer Deck[1]
Software Plus Services Customer Deck[1]
 
I Mo Presentation Building Centre Oct 2008
I Mo Presentation Building Centre Oct 2008I Mo Presentation Building Centre Oct 2008
I Mo Presentation Building Centre Oct 2008
 
Whitepaper: Connected Office Enterprise
Whitepaper: Connected Office EnterpriseWhitepaper: Connected Office Enterprise
Whitepaper: Connected Office Enterprise
 
Stop retaining forever
Stop retaining foreverStop retaining forever
Stop retaining forever
 
Spotlight on Technology 2017
Spotlight on Technology 2017Spotlight on Technology 2017
Spotlight on Technology 2017
 

Andere mochten auch (8)

Beginning i os part 2 sam kirchmeier
Beginning i os part 2   sam kirchmeierBeginning i os part 2   sam kirchmeier
Beginning i os part 2 sam kirchmeier
 
Beatles&webdesign
Beatles&webdesignBeatles&webdesign
Beatles&webdesign
 
Mobile march2012 android101-pt1
Mobile march2012 android101-pt1Mobile march2012 android101-pt1
Mobile march2012 android101-pt1
 
Mobile March Olson presentation 2012
Mobile March Olson presentation 2012Mobile March Olson presentation 2012
Mobile March Olson presentation 2012
 
Bannin mobile march_2012_public
Bannin mobile march_2012_publicBannin mobile march_2012_public
Bannin mobile march_2012_public
 
IP for Mobile Startups -Ernest Grumbles
IP for Mobile Startups -Ernest GrumblesIP for Mobile Startups -Ernest Grumbles
IP for Mobile Startups -Ernest Grumbles
 
Developing Custom iOs Applications for Enterprise
Developing Custom iOs Applications for EnterpriseDeveloping Custom iOs Applications for Enterprise
Developing Custom iOs Applications for Enterprise
 
Mobile march2012 android101-pt2
Mobile march2012 android101-pt2Mobile march2012 android101-pt2
Mobile march2012 android101-pt2
 

Ähnlich wie Mobile marketing meltdown

Cliftons Masterclass: Future Shock! How Technology is changing the way we do ...
Cliftons Masterclass: Future Shock! How Technology is changing the way we do ...Cliftons Masterclass: Future Shock! How Technology is changing the way we do ...
Cliftons Masterclass: Future Shock! How Technology is changing the way we do ...
Cliftons_Venues
 
Value proposition for big data isv partners 0714
Value proposition for big data isv partners 0714Value proposition for big data isv partners 0714
Value proposition for big data isv partners 0714
Niu Bai
 

Ähnlich wie Mobile marketing meltdown (20)

Privacy final presentaiton
Privacy final presentaitonPrivacy final presentaiton
Privacy final presentaiton
 
Cliftons Masterclass: Future Shock! How Technology is changing the way we do ...
Cliftons Masterclass: Future Shock! How Technology is changing the way we do ...Cliftons Masterclass: Future Shock! How Technology is changing the way we do ...
Cliftons Masterclass: Future Shock! How Technology is changing the way we do ...
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good Dynamics
 
Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3
 
Information Security Shake-Up
Information Security Shake-Up  Information Security Shake-Up
Information Security Shake-Up
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
 
Value proposition for big data isv partners 0714
Value proposition for big data isv partners 0714Value proposition for big data isv partners 0714
Value proposition for big data isv partners 0714
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
Rogers eBook Security
Rogers eBook SecurityRogers eBook Security
Rogers eBook Security
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
 
Wondering About the "Bring Your Own Device to Work" Trend?
Wondering About the "Bring Your Own Device to Work" Trend?Wondering About the "Bring Your Own Device to Work" Trend?
Wondering About the "Bring Your Own Device to Work" Trend?
 
Mobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesMobilize your workforce with secure identity services
Mobilize your workforce with secure identity services
 
How Mobile BI can Impact Your Organization
How Mobile BI can Impact Your OrganizationHow Mobile BI can Impact Your Organization
How Mobile BI can Impact Your Organization
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-security
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act Brings
 
Byod
ByodByod
Byod
 
2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap
 
IBM Connect 2013 BP210 Using a Mobile Approach
IBM Connect 2013 BP210 Using a Mobile ApproachIBM Connect 2013 BP210 Using a Mobile Approach
IBM Connect 2013 BP210 Using a Mobile Approach
 
Bring Your Own Device - Key Steps for an effective program
Bring Your Own Device - Key Steps for an effective programBring Your Own Device - Key Steps for an effective program
Bring Your Own Device - Key Steps for an effective program
 
Security and Data Breach
Security and Data BreachSecurity and Data Breach
Security and Data Breach
 

Mehr von Mobile March

Using Mobile to Achieve Truly Integrated Marketing - Curt Prins
Using Mobile to Achieve Truly Integrated Marketing - Curt PrinsUsing Mobile to Achieve Truly Integrated Marketing - Curt Prins
Using Mobile to Achieve Truly Integrated Marketing - Curt Prins
Mobile March
 
Dueling Banjos: Inter-app Communication
Dueling Banjos: Inter-app Communication Dueling Banjos: Inter-app Communication
Dueling Banjos: Inter-app Communication
Mobile March
 
Guy Thier Keynote Presentation
Guy Thier Keynote PresentationGuy Thier Keynote Presentation
Guy Thier Keynote Presentation
Mobile March
 

Mehr von Mobile March (20)

Cross-Platform Mobile Development with PhoneGap-Vince Bullinger
Cross-Platform Mobile Development with PhoneGap-Vince BullingerCross-Platform Mobile Development with PhoneGap-Vince Bullinger
Cross-Platform Mobile Development with PhoneGap-Vince Bullinger
 
You Can’t Ignore the Tablet-Designing & Developing Universal Apps for Phones ...
You Can’t Ignore the Tablet-Designing & Developing Universal Apps for Phones ...You Can’t Ignore the Tablet-Designing & Developing Universal Apps for Phones ...
You Can’t Ignore the Tablet-Designing & Developing Universal Apps for Phones ...
 
Building Wearables-Kristina Durivage
Building Wearables-Kristina DurivageBuilding Wearables-Kristina Durivage
Building Wearables-Kristina Durivage
 
The Blossoming Internet of Things Zach Supalla-Spark
The Blossoming Internet of Things Zach Supalla-SparkThe Blossoming Internet of Things Zach Supalla-Spark
The Blossoming Internet of Things Zach Supalla-Spark
 
LiveCode Cross-Platform Development-Joel Gerdeen
LiveCode Cross-Platform Development-Joel GerdeenLiveCode Cross-Platform Development-Joel Gerdeen
LiveCode Cross-Platform Development-Joel Gerdeen
 
The Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew DavidThe Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew David
 
Unity-Beyond Games! - Josh Ruis
Unity-Beyond Games! - Josh RuisUnity-Beyond Games! - Josh Ruis
Unity-Beyond Games! - Josh Ruis
 
Using Chipmunk Physics to create a iOS Game - Scott Lembcke
Using Chipmunk Physics to create a iOS Game - Scott LembckeUsing Chipmunk Physics to create a iOS Game - Scott Lembcke
Using Chipmunk Physics to create a iOS Game - Scott Lembcke
 
Using Mobile to Achieve Truly Integrated Marketing - Curt Prins
Using Mobile to Achieve Truly Integrated Marketing - Curt PrinsUsing Mobile to Achieve Truly Integrated Marketing - Curt Prins
Using Mobile to Achieve Truly Integrated Marketing - Curt Prins
 
Introduction to Core Data - Jason Shapiro
Introduction to Core Data - Jason ShapiroIntroduction to Core Data - Jason Shapiro
Introduction to Core Data - Jason Shapiro
 
Product Management for Your App
Product Management for Your AppProduct Management for Your App
Product Management for Your App
 
Robotium Tutorial
Robotium TutorialRobotium Tutorial
Robotium Tutorial
 
Dueling Banjos: Inter-app Communication
Dueling Banjos: Inter-app Communication Dueling Banjos: Inter-app Communication
Dueling Banjos: Inter-app Communication
 
Guy Thier Keynote Presentation
Guy Thier Keynote PresentationGuy Thier Keynote Presentation
Guy Thier Keynote Presentation
 
Beginningi os part1-bobmccune
Beginningi os part1-bobmccuneBeginningi os part1-bobmccune
Beginningi os part1-bobmccune
 
Android ui patterns
Android ui patternsAndroid ui patterns
Android ui patterns
 
Automated interactive testing for i os
Automated interactive testing for i osAutomated interactive testing for i os
Automated interactive testing for i os
 
Olson mobile march presentation 2012 03-16
Olson mobile march presentation 2012 03-16Olson mobile march presentation 2012 03-16
Olson mobile march presentation 2012 03-16
 
Windows phone 7
Windows phone 7Windows phone 7
Windows phone 7
 
Mmtc2012 app-full
Mmtc2012 app-fullMmtc2012 app-full
Mmtc2012 app-full
 

Kürzlich hochgeladen

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Mobile marketing meltdown

  • 1. Mobile Marketing Meltdown Privacy Monetization Design Best Practices Business | Employment | Internet | Privacy | Information SecurityInternet Business | Employment | | Privacy | Information Security
  • 2. Business | Employment | Internet | Privacy | Information Security
  • 3. Here’s What It’s About •  Privacy -- Privacy by Design: Advocates embedding privacy considerations at the requirements phase of development projects •  Monetization -- Including In-App Purchases -- Its Novelty is Both its Strength and Downfall A Few Thoughts on Application Design Business | Employment | Internet | Privacy | Information Security
  • 4. Why Should You Care •  There have been 3 FTC mobile application related settlements already announced, others are ongoing •  Several players in the ecosystem have been the target of called for Congressional investigations •  IN SHORT THE LIABILITY EXPOSURE – add class actions, and state investigations – IS REALLY FREAKING HIGH Business | Employment | Internet | Privacy | Information Security
  • 5. Announced FTC Settlements Business | Employment | Internet | Privacy | Information Security
  • 6. KEY FTC INVESTIGATION TAKEAWAYS •  Advertising claims need be truthful. That means both literally and what your advertising claims implicitly •  Important terms of the app need to be stated clearly and upfront •  Tune in to privacy. There are a number of privacy laws, and emerging restrictions on the type of personal data your app can and should collect from users Business | Employment | Internet | Privacy | Information Security
  • 7. THE MAIN TAKEAWAY: There is a lot of scrutiny of mobile apps. Be proactive and take reasonable steps to make sure your mobile apps comply with the law Business | Employment | Internet | Privacy | Information Security
  • 8. Let’s Talk Privacy The amalgamation of so much behavior rich information in a single very personal device opens the possibility of radical innovations in marketing Location Information Access to a Network of (Consistent Broadcast) Pre-Qualified Users (Think Stored Contacts) Lots of Behavioral Tid-Bits Personal Financial and Health Information 1:1 User Corollary Common SDK’s Create Emerging Interesting Business | Employment | Internet | Privacy | Information Security Possibilities
  • 9. But There Are Risks Business | Employment | Internet | Privacy | Information Security
  • 10. Several Privacy Guidelines Out There Future of Privacy Forum  Mobile Marke4ng Associa4on   Business | Employment | Internet | Privacy | Information Security
  • 11. Its Still About Choice, Consent & Control Choice – Collec*on,  Storage, & Transfer  Control –  Consent – Obtain  U*liza*on  Agreement  Business | Employment | Internet | Privacy | Information Security
  • 12. You Got To Have a Privacy Policy •  Even if you do not believe you are collecting or using data that would trigger privacy concerns •  Provide a link to it in each app store listing, on your own site. If your app has a settings page put a privacy policy link there as well •  Make sure that it can easily be read on a mobile device Business | Employment | Internet | Privacy | Information Security
  • 13. Get The Disclosures Rights Business | Employment | Internet | Privacy | Information Security
  • 14. You Have to Timely Disclose Unanticipated Uses Business | Employment | Internet | Privacy | Information Security
  • 15. Don’t Forget Security •  Ensure reasonable security measures are in place •  Encrypt data in transit (SSL / TLS) •  Encrypt sensitive information stored including for example passwords •  Protect user application data Business | Employment | Internet | Privacy | Information Security
  • 16. Good Housekeeping •  Stay within the boundaries of your disclosures – don’t use or collect data if you haven’t explained the practice to the user •  Don’t access or collect data unless your app requires it •  Delete old data •  Provide users with a way to contact you and respond to their questions and concerns Business | Employment | Internet | Privacy | Information Security
  • 17. Use Reputable Partners Keep in mind that many, if not most, privacy issues for application developers come from inserting…SDKs – such as those from advertising networks and analytics providers – into your app Business | Employment | Internet | Privacy | Information Security
  • 18. Let’s Talk In-App Purchases There is a value proposition disconnect that is in part because of the novelty of the platform Business | Employment | Internet | Privacy | Information Security
  • 19. Food for Thought http://bit.ly/sLWOp6 Business | Employment | Internet | Privacy | Information Security
  • 20. Another Class Action Suit Business | Employment | Internet | Privacy | Information Security
  • 21. The Quid Pro Quo • It’s got to make sense • Its not all about the “Benjamins” Business | Employment | Internet | Privacy | Information Security
  • 22. Get The Disclosures Rights •  Disclose the Existence of In-App Purchase Functionality Although this application is free to download and play certain features functionality, may require an in-app purchase. •  Avoid confusion: Price points like $.99, $9.99 and $99.99 Business | Employment | Internet | Privacy | Information Security
  • 23. Consider Documenting Your Pricing Strategy •  Calibrate using established revenue models: Think console gaming and associated marketplaces (i.e. the Wii) •  Incorporate average user revenue data overtime and tweak pricing to maintain reasonableness No this is not a mechanism that limits an apps revenue potential. Rather we have fixed the per user revenue variable, the obvious then to increase revenue is to acquire more users. This then drives better quality into the marketplace and culls inferior apps over time Business | Employment | Internet | Privacy | Information Security
  • 24. Consider Limits •  Daily Spending Caps •  Time Based Purchase Limits •  In-App Purchase Confirmation Alerts Business | Employment | Internet | Privacy | Information Security
  • 25. Let’s Talk In-App Monetization Apple thinks incentivization is a dirty word Business | Employment | Internet | Privacy | Information Security
  • 26. Food for Thought http://on.mash.to/zloUCV Business | Employment | Internet | Privacy | Information Security
  • 27. How It Works Established Apps  Incorporate 3rd  Party SDK’s to  Enable  Mone*za*on  App Promo*on Services Charge On A Per Unit  Basis For Installs and Split Revenue with App  Developer who installed SDK  New Apps  Promoted  Some*mes with  Intent to Achieve  Top 25 App Store  Ranking  Business | Employment | Internet | Privacy | Information Security
  • 28. You Cannot Game The System Business | Employment | Internet | Privacy | Information Security
  • 29. Thoughts on App Design A little conservatism in the face of uncertainty isn’t a bad thing. Business | Employment | Internet | Privacy | Information Security
  • 30. These Work in App Design, Privacy and Monetization Business | Employment | Internet | Privacy | Information Security
  • 31. CONTACT ME HAYDEN CREQUE p. 320-247-3439 e. hayden@crequelaw.com Twitter
 @haydencreque Web
 www.crequelaw.com Business | Employment | Internet | Privacy | Information Security