SlideShare ist ein Scribd-Unternehmen logo
1 von 52
Downloaden Sie, um offline zu lesen
Privacy Management
Web Security And Privacy Class
A. A. 2016 / 2017
25/05/2017Privacy Management Pagina 2
Davide Piccardi
https://www.linkedin.com/in/
davide-piccardi-8b3950105
Daniele Oriana
https://www.linkedin.com/in/
daniele-oriana-08202410a
Davide Mazza
https://it.linkedin.com/in/
davide-mazza-33a9b291
Privacy Management Pagina 325/05/2017
How big
companies treat
your data
•Privacy Management Pagina 4
Google Privacy Policy
Google’s privacy policy explains:
What information they collect and why they collect them.
How they use those information.
The choices they offer, including how to access and update
information.
25/05/2017
•Privacy Management Pagina 5
Google Privacy Policy: information that they collect
Why?
In order to provide a better service to all users.
An example: Google offers a personalized search called “Search, plus your
world”.
Main idea: you obtain, as
a conseguence of a
search, a result that is
based on your personal
information.
25/05/2017
•Privacy Management Pagina 6
Google Privacy Policy: informations that they collect
How?
They collect information in the following
ways:
Information that user gives to them: like
personal information that a user provides
through a Google Account in order to use
some services.
After this step, you can create a
publicly visible Google Profile
in order to take full advantage
of the sharing features they
offer.
25/05/2017
•Privacy Management Pagina 7
Google Privacy Policy: informations that they collect
Information that they get from the usage of their services: they
collect information about the used service and how a user interacts
with it. This information include:
Device information: they colletct infromation about specific
device’s characteristics.
Log information: it refers to the information stored in the server
log that come from the interaction between a Google service
and the user.
Location information: they may collect and process information
about the user’s actual location.
Unique application number: information that come from the
installation of a Google service on the user’s device.
25/05/2017
•Privacy Management Pagina 8
Google Privacy Policy: informations that they collect
Local storage: information that Google stores on your device.
Cookies and similar technologies: used to collect information
that come from the interaction of a user with a Google service
and also to offer services to Google’s partners.
25/05/2017
•Privacy Management Pagina 9
Google Privacy Policy: information that they collect
How Google use these information?
To provide, mantain, protect and improve their services.
Transparency
Google offers, to the users, the possibility to have complete control
over the privacy through a series of operations that are available in
the settings area of the user’s personal account. A better control
over the privacy is obtained also through some Google Chrome
extensions.
An example: a Chrome extension that allows the management of
cookies.
25/05/2017
•Privacy Management Pagina 10
Google Privacy Policy: information that they collect
Information that you
share
When a user shares
informations publicly,
they may be indexable
by search engines.
25/05/2017
•Privacy Management Pagina 11
Google Privacy Policy: information that they share
Information that Google shares:
With user’s consent: with this consent Google can share personal information
with companies, organizations or individuals outside Google.
With domain administrator: if your Google account is managed for you by a
domain administrator, he/she can use some basic operations such as: change
password, suspend access, view statistics, etc…
For external processing: Google provides personal information to affiliates to
process them for it.
For legal reason: Google shares information with third parties if this disclosure
of sensitive data is reasonably necessary to:
Meet any applicable law
Enforce applicable Term of Service
Detect, prevent or address fraud
Protect against harm to the rights
In addiction Google may share
non-personally identifiable information
with its partners to show trends about the
general use of our service.
25/05/2017
•Privacy Management Pagina 12
Google Transparency Report
Government removals
Google receives a lot of requests from courts and government agencies
around the world to remove some contents.
How the requests are
processed?
If they satisfy some some
requirements then they are
accepted, otherwise Google
sends them back to the
source asking for more
details.
25/05/2017
•Privacy Management Pagina 13
How much does Google REALLY know about YOU?
25/05/2017
•Privacy Management Pagina 14
What is it google?
Google is not
a search company
Google is not a technology
company
Google sells
ADVERTISING
The more they know about you,
the more money they can make
by selling adverts aimed at you
25/05/2017
•Privacy Management Pagina 15
Knows what
you do online
Knows what
you think
Knows where
you go
Knows who
you talk to
Knows how
you spend
your money
25/05/2017
•Privacy Management Pagina 16
Google Knows What You Think
What They Know
Your interest and desires
Your needs
Your belifies (politics, religion, spirituality)
How They Know
25/05/2017
•Privacy Management Pagina 17
Google Knows What You Do Online
What They Know
Where you write
What you watch
What you read
How They Know
25/05/2017
25/05/2017•Privacy Management Pagina 18
Google Knows Where You Go
What They Know
Where you have been
Where you are planning to go
Where you work
Where your regularly hangout
Where you live
Who you are meeting
How They Know
•Privacy Management Pagina 19
Google Knows Who You Talk To
What They Know
What you talk about
Where you talk about things
Who you have talked to
What you sound like
Which languages you speak
Who you email
How much you email
When you email
What you say in every
email you send (Gmail)
How They Know
25/05/2017
•Privacy Management Pagina 20
Google Knows How You Spend Your Money
What They Know
Where you shop
When you shop
What you buy
What your financial worth is
How much you spend
How They Know
25/05/2017
•Privacy Management Pagina 21
Google Knows All
If you use Google chrome, Gmail and
Google Drive, Google has access to pretty
much everything you do online. Google can
scan your file, emails and browsing habits to
serve you appropriate adverts
If you use an Android
phone, they also have your
call logs, messages and
mobile browsing data too
25/05/2017
•Privacy Management Pagina 22
Google Knows All 2.0
Did you know Google have acquired more the 150 companies over last decade?
Your call logs and browsing data
Your viewing habits and taster
Your images
Your photos
Which adverts you click
Your saved files
Your energy usage
Your location and travel
What you listen to
v
25/05/2017
•Privacy Management Pagina 23
Age, Sex, Location? Google KNOWS!
25/05/2017
•Privacy Management Pagina 24
Google stores two type of data
USER-GENERATED CONTENT
Which you control and which is
associated with your account
SERVER LOG DATA
Which is associated with one or more
browser cookie IDs stored on your
computer
Server log data is not visible to you
and is not considered to be personally
identifiable information
Logs contain details of how interact
with Google’s various services,
including: web page requests, query
history, IP address, Cookie IDs, other
metadata
25/05/2017
25/05/2017•Privacy Management Pagina 25
6 ways to start preventing Google keeping data on you
Do not use any of these applications
Stop worrying and get on with life
Scott McNeally in 1999 (Founder of Sun Microsystems)
25/05/2017•Privacy Management Pagina 26
The future – What will Google Know?
Where you
travel
What time of
day you travel
Who you
travel him What you do
in the car
What you talk
about the car
Google Car
25/05/2017•Privacy Management Pagina 27
The future – What will Google Know?
Everything
you look at
Everything
you talk about
Who you spend
time with
Everywhere
you go
Everything
you do
Google Glass
25/05/2017•Privacy Management Pagina 28
The future – What will Google Know?
Everything
your browse
online
Everything
you talk about
online
Everywhere
you buy online
Everything
you watch
online
Google Fiber + Google Aereospace + Loon
Privacy Management Pagina 29
Apple Privacy Policy
25/05/2017
Privacy Management Pagina 30
Apple Privacy Policy
Why is privacy policy important ?
It defines how they collect, use, disclose,
transfer, and store users’ information.
25/05/2017
They divides information they collect in two main categories:
Personal Information: data that can be used to identify or contact a
single person.
Non-Personal Information: data in a form that does not, on its own,
permit direct association with any specific individual.
Pagina 31
Apple Privacy Policy: Personal information
What are personal information they collect ?
Name, mailing address, phone number, email address, contact preferences, and
credit card information.
When are these information collected ?
Creation of an Apple ID, purchase a product, download a software update.
Share your content with family and friends using Apple products.
In this case also the shared information about them are collected !
How are these information used ?
Product announcements, software updates, and upcoming events.
Create, develop, operate, deliver, and improve our products, services, content
and advertising.
Loss prevention and anti-fraud purposes.
Auditing, data analysis, and research.
25/05/2017Privacy Management
Privacy Management Pagina 32
Apple Privacy Policy: Non-Personal information
What are non-personal information they collect ?
Occupation, language, zip code, area code, unique device identifier, referrer
URL, location, and the time zone.
Customer activities on their website, iCloud services, our iTunes Store, App
Store.
How users use their services, including search queries.
How are these information used ?
Understand customer behavior and improve their products, services, and
advertising.
Provide more useful information to their customers and to understand which
parts of our website, products, and services are of most interest.
Improve the relevancy of results provided by their services. Others.
25/05/2017
Privacy Management Pagina 33
Apple Privacy Policy: Location-Based Services
What are we talking about ?
To provide location-based services on Apple
products, they collect, use, and share precise
location data, including the real-time
geographic location of your Apple computer
or device.
Unless you provide consent, this location data
is collected anonymously in a form that does
not personally identify you.
25/05/2017
Privacy Management Pagina 34
Apple Privacy Policy: Disclosure to Third Parties
Certain personal information are made available to strategic partners to
provide products and services.
Not shared for their marketing purposes.
Third party companies are obligated to protect your information.
When can they disclosure users’ personal information ?
Law, legal process, litigation, and/or requests from public and
governmental authorities.
National security, law enforcement, or other issues of public importance.
Enforce their terms and conditions or protect our operations or users.
25/05/2017
Privacy Management Pagina 35
Apple Government Information Requests
25/05/2017
Privacy Management Pagina 36
Apple Government Information Requests
What are the most frequent request and
how do they respond ?
Device requests: information in relation to
Apple devices, such as an iPhone, iPad, or Mac.
Account requests: information in regard to an
Apple ID account and/or related Apple services
or transactions.
25/05/2017
National security-related requests are not
considered Device Requests or Account
Requests and are reported in a
separate category.
Privacy Management Pagina 37
Apple Government Information Requests
25/05/2017
On devices running iOS 8 and later
versions, your personal data is placed
under the protection of your passcode.
Therefore, Apple will not perform iOS
data extractions in response to
government search warrants because the
files to be extracted are protected by an
encryption key that is tied to the user’s
passcode, which Apple does not possess.
25/05/2017 Pagina 38
Difference between privacy policies
Google gets 90%+ of its revenue from advertisers.
The ad
companies are
Google’s main
customers.
Google must
please the ad
companies.
Advertising
allows to offer
free google
Apple gets 90%+ of its revenue from selling computers and devices.
People are the
Apple’s main
customers.
Apple must
please the
people.
No need to
please ad
companies.
Ad companies want personal information, while people want privacy!
Privacy Management
25/05/2017•Privacy Management Pagina 39
When the privacy
becomes practical
25/05/2017•Privacy Management Pagina 40
The #1 Place to see what Google knows about you
myaccount.google.com
/dashboard
This shows everything
Google is tracking about
you, based on your
accounts
25/05/2017•Privacy Management Pagina 41
Google Dashboard
25/05/2017•Privacy Management Pagina 42
Ads Settings
https://www.google.com/settings/u/0/ads/authenticated
25/05/2017•Privacy Management Pagina 43
Google Maps Timeline
https://www.google.it/maps/timeline?pb
25/05/2017•Privacy Management Pagina 44
Google My Activity
https://myactivity.google.com/myactivity
25/05/2017•Privacy Management Pagina 45
Google Permissions
https://myaccount.google.com/permissions
Privacy Management Pagina 46
Apple VS FBI
25/05/2017
Privacy Management Pagina 47
Apple VS FBI: Timeline
December 2, 2015: San Bernardino attack
o Killed 14 people and seriously injured 22.
o Attackers died in a shootout with police.
o Iphone 5C of one attacker recovered but locked with a four-digit
password.
February 9, 2016: FBI “procedure”
FBI unable to unlock recovered phone.
FBI asked the NSA to break into the phone but they couldn’t.
FBI asked Apple to create a new version of iOS (“GovtOS”) to disable
certain security features.
Apple declined due to its policy therefore FBI responded with a court
order issued under the “All Writs Act of 1789”.
25/05/2017
Privacy Management Pagina 48
Apple VS FBI: Timeline
Technical details about FBI order:
o Bypass or disable the auto-erase function.
o Enable to submit passcodes through different interfaces.
o Remove delay between passcode attempts.
February 16, 2016: Apple opposes the order
They don’t want to create a backdoor for security reasons.
No government had ever asked for similar access.
February 19, 2016: U.S. Department of Justice application
Apple could install the software in its own premises.
After the FBI had hacked the phone via remote connection, Apple could
remove and destroy the software.
25/05/2017
Privacy Management Pagina 49
Apple VS FBI: Timeline
March 28, 2016: FBI withdrawal of request
FBI Unlocked the iPhone with the third party's help.
Department of Justice withdrew the case.
25/05/2017
Information about the hack:
o Works only on iPhone models lacking the Touch
ID sensor.
o Costs more than $1.3 million.
o Exploits a zero-day vulnerability to bypass its ten-
try limitation.
o Developed by “Celebrate” (Israeli company) or
“professional hackers”.
Privacy Management Pagina 50
Apple VS FBI: Poll
Agree or disagree with Apple’s decision to oppose a court order to
unlock a smartphone that was used by one of the shooters in the San
Bernardino attack?
25/05/2017
25/05/2017•Privacy Management Pagina 51
Possible evolution of privacy
Conclusions
Strong sensitization about the importance of privacy
Problem: great lack of awareness!
What does the society need?
Each user must be aware about what type of data is giving to the
service and how these data may be treated.
THANK YOU!
25/05/2017•Privacy Management Pagina 52
The slides are available on: www.slideshare.net

Weitere ähnliche Inhalte

Ähnlich wie Privacy management: Google and Apple

Social media + Local Search - Liana Evans- Digitizing
Social media + Local Search - Liana Evans- DigitizingSocial media + Local Search - Liana Evans- Digitizing
Social media + Local Search - Liana Evans- Digitizing
el_chambers
 
social media strategy for real estate
social media strategy for real estatesocial media strategy for real estate
social media strategy for real estate
D Scott Smith,CCIM
 
Concent management the new insurance by Hanna Waldenmaier
Concent management the new insurance by Hanna WaldenmaierConcent management the new insurance by Hanna Waldenmaier
Concent management the new insurance by Hanna Waldenmaier
IT Knowledge Bank
 

Ähnlich wie Privacy management: Google and Apple (20)

Social media + Local Search - Liana Evans- Digitizing
Social media + Local Search - Liana Evans- DigitizingSocial media + Local Search - Liana Evans- Digitizing
Social media + Local Search - Liana Evans- Digitizing
 
TENCon2011 Social Media
TENCon2011 Social MediaTENCon2011 Social Media
TENCon2011 Social Media
 
Day 10: Privacy, TOS & identity
Day 10: Privacy, TOS & identityDay 10: Privacy, TOS & identity
Day 10: Privacy, TOS & identity
 
GDPR: Where should you be right now? - Dennis Slattery, EDM Works
GDPR: Where should you be right now? - Dennis Slattery, EDM WorksGDPR: Where should you be right now? - Dennis Slattery, EDM Works
GDPR: Where should you be right now? - Dennis Slattery, EDM Works
 
Building a Foundational Tech Stack to Support Your First-Party Data Strategy
Building a Foundational Tech Stack to Support Your First-Party Data StrategyBuilding a Foundational Tech Stack to Support Your First-Party Data Strategy
Building a Foundational Tech Stack to Support Your First-Party Data Strategy
 
Search Engine Optimisation (SEO)
Search Engine Optimisation (SEO)Search Engine Optimisation (SEO)
Search Engine Optimisation (SEO)
 
Digital Advertising, Personalisation & User Privacy
Digital Advertising, Personalisation & User PrivacyDigital Advertising, Personalisation & User Privacy
Digital Advertising, Personalisation & User Privacy
 
Google Plus +
Google Plus +Google Plus +
Google Plus +
 
Google+ is here. What now?
Google+ is here. What now?Google+ is here. What now?
Google+ is here. What now?
 
Google + is here. What now?
Google + is here. What now?Google + is here. What now?
Google + is here. What now?
 
Google Policy Primer
Google Policy PrimerGoogle Policy Primer
Google Policy Primer
 
Google complete, history, model, competitors ,
Google complete, history, model, competitors ,Google complete, history, model, competitors ,
Google complete, history, model, competitors ,
 
Practical social media strategies for reaching customers online
Practical social media strategies for reaching customers onlinePractical social media strategies for reaching customers online
Practical social media strategies for reaching customers online
 
social media strategy for real estate
social media strategy for real estatesocial media strategy for real estate
social media strategy for real estate
 
GDPR - Australian perspective - the challenge, the opportunity and your duty
GDPR - Australian perspective - the challenge, the opportunity and your duty GDPR - Australian perspective - the challenge, the opportunity and your duty
GDPR - Australian perspective - the challenge, the opportunity and your duty
 
Concent management the new insurance by Hanna Waldenmaier
Concent management the new insurance by Hanna WaldenmaierConcent management the new insurance by Hanna Waldenmaier
Concent management the new insurance by Hanna Waldenmaier
 
Vorian Agency Google+ Seminar (Social Media Marketing)
Vorian Agency Google+ Seminar (Social Media Marketing)Vorian Agency Google+ Seminar (Social Media Marketing)
Vorian Agency Google+ Seminar (Social Media Marketing)
 
Google 101 - How to Learn to Love Google and Embrace Their Suite of Evil Geni...
Google 101 - How to Learn to Love Google and Embrace Their Suite of Evil Geni...Google 101 - How to Learn to Love Google and Embrace Their Suite of Evil Geni...
Google 101 - How to Learn to Love Google and Embrace Their Suite of Evil Geni...
 
Google 101 - Analytics, AdWords, Webmaster Tools and Places,
Google 101  - Analytics, AdWords, Webmaster Tools and Places, Google 101  - Analytics, AdWords, Webmaster Tools and Places,
Google 101 - Analytics, AdWords, Webmaster Tools and Places,
 
What You Should Know About Data Privacy- Knobbe Martens Webinar Series for St...
What You Should Know About Data Privacy- Knobbe Martens Webinar Series for St...What You Should Know About Data Privacy- Knobbe Martens Webinar Series for St...
What You Should Know About Data Privacy- Knobbe Martens Webinar Series for St...
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 

Privacy management: Google and Apple

  • 1. Privacy Management Web Security And Privacy Class A. A. 2016 / 2017
  • 2. 25/05/2017Privacy Management Pagina 2 Davide Piccardi https://www.linkedin.com/in/ davide-piccardi-8b3950105 Daniele Oriana https://www.linkedin.com/in/ daniele-oriana-08202410a Davide Mazza https://it.linkedin.com/in/ davide-mazza-33a9b291
  • 3. Privacy Management Pagina 325/05/2017 How big companies treat your data
  • 4. •Privacy Management Pagina 4 Google Privacy Policy Google’s privacy policy explains: What information they collect and why they collect them. How they use those information. The choices they offer, including how to access and update information. 25/05/2017
  • 5. •Privacy Management Pagina 5 Google Privacy Policy: information that they collect Why? In order to provide a better service to all users. An example: Google offers a personalized search called “Search, plus your world”. Main idea: you obtain, as a conseguence of a search, a result that is based on your personal information. 25/05/2017
  • 6. •Privacy Management Pagina 6 Google Privacy Policy: informations that they collect How? They collect information in the following ways: Information that user gives to them: like personal information that a user provides through a Google Account in order to use some services. After this step, you can create a publicly visible Google Profile in order to take full advantage of the sharing features they offer. 25/05/2017
  • 7. •Privacy Management Pagina 7 Google Privacy Policy: informations that they collect Information that they get from the usage of their services: they collect information about the used service and how a user interacts with it. This information include: Device information: they colletct infromation about specific device’s characteristics. Log information: it refers to the information stored in the server log that come from the interaction between a Google service and the user. Location information: they may collect and process information about the user’s actual location. Unique application number: information that come from the installation of a Google service on the user’s device. 25/05/2017
  • 8. •Privacy Management Pagina 8 Google Privacy Policy: informations that they collect Local storage: information that Google stores on your device. Cookies and similar technologies: used to collect information that come from the interaction of a user with a Google service and also to offer services to Google’s partners. 25/05/2017
  • 9. •Privacy Management Pagina 9 Google Privacy Policy: information that they collect How Google use these information? To provide, mantain, protect and improve their services. Transparency Google offers, to the users, the possibility to have complete control over the privacy through a series of operations that are available in the settings area of the user’s personal account. A better control over the privacy is obtained also through some Google Chrome extensions. An example: a Chrome extension that allows the management of cookies. 25/05/2017
  • 10. •Privacy Management Pagina 10 Google Privacy Policy: information that they collect Information that you share When a user shares informations publicly, they may be indexable by search engines. 25/05/2017
  • 11. •Privacy Management Pagina 11 Google Privacy Policy: information that they share Information that Google shares: With user’s consent: with this consent Google can share personal information with companies, organizations or individuals outside Google. With domain administrator: if your Google account is managed for you by a domain administrator, he/she can use some basic operations such as: change password, suspend access, view statistics, etc… For external processing: Google provides personal information to affiliates to process them for it. For legal reason: Google shares information with third parties if this disclosure of sensitive data is reasonably necessary to: Meet any applicable law Enforce applicable Term of Service Detect, prevent or address fraud Protect against harm to the rights In addiction Google may share non-personally identifiable information with its partners to show trends about the general use of our service. 25/05/2017
  • 12. •Privacy Management Pagina 12 Google Transparency Report Government removals Google receives a lot of requests from courts and government agencies around the world to remove some contents. How the requests are processed? If they satisfy some some requirements then they are accepted, otherwise Google sends them back to the source asking for more details. 25/05/2017
  • 13. •Privacy Management Pagina 13 How much does Google REALLY know about YOU? 25/05/2017
  • 14. •Privacy Management Pagina 14 What is it google? Google is not a search company Google is not a technology company Google sells ADVERTISING The more they know about you, the more money they can make by selling adverts aimed at you 25/05/2017
  • 15. •Privacy Management Pagina 15 Knows what you do online Knows what you think Knows where you go Knows who you talk to Knows how you spend your money 25/05/2017
  • 16. •Privacy Management Pagina 16 Google Knows What You Think What They Know Your interest and desires Your needs Your belifies (politics, religion, spirituality) How They Know 25/05/2017
  • 17. •Privacy Management Pagina 17 Google Knows What You Do Online What They Know Where you write What you watch What you read How They Know 25/05/2017
  • 18. 25/05/2017•Privacy Management Pagina 18 Google Knows Where You Go What They Know Where you have been Where you are planning to go Where you work Where your regularly hangout Where you live Who you are meeting How They Know
  • 19. •Privacy Management Pagina 19 Google Knows Who You Talk To What They Know What you talk about Where you talk about things Who you have talked to What you sound like Which languages you speak Who you email How much you email When you email What you say in every email you send (Gmail) How They Know 25/05/2017
  • 20. •Privacy Management Pagina 20 Google Knows How You Spend Your Money What They Know Where you shop When you shop What you buy What your financial worth is How much you spend How They Know 25/05/2017
  • 21. •Privacy Management Pagina 21 Google Knows All If you use Google chrome, Gmail and Google Drive, Google has access to pretty much everything you do online. Google can scan your file, emails and browsing habits to serve you appropriate adverts If you use an Android phone, they also have your call logs, messages and mobile browsing data too 25/05/2017
  • 22. •Privacy Management Pagina 22 Google Knows All 2.0 Did you know Google have acquired more the 150 companies over last decade? Your call logs and browsing data Your viewing habits and taster Your images Your photos Which adverts you click Your saved files Your energy usage Your location and travel What you listen to v 25/05/2017
  • 23. •Privacy Management Pagina 23 Age, Sex, Location? Google KNOWS! 25/05/2017
  • 24. •Privacy Management Pagina 24 Google stores two type of data USER-GENERATED CONTENT Which you control and which is associated with your account SERVER LOG DATA Which is associated with one or more browser cookie IDs stored on your computer Server log data is not visible to you and is not considered to be personally identifiable information Logs contain details of how interact with Google’s various services, including: web page requests, query history, IP address, Cookie IDs, other metadata 25/05/2017
  • 25. 25/05/2017•Privacy Management Pagina 25 6 ways to start preventing Google keeping data on you Do not use any of these applications Stop worrying and get on with life Scott McNeally in 1999 (Founder of Sun Microsystems)
  • 26. 25/05/2017•Privacy Management Pagina 26 The future – What will Google Know? Where you travel What time of day you travel Who you travel him What you do in the car What you talk about the car Google Car
  • 27. 25/05/2017•Privacy Management Pagina 27 The future – What will Google Know? Everything you look at Everything you talk about Who you spend time with Everywhere you go Everything you do Google Glass
  • 28. 25/05/2017•Privacy Management Pagina 28 The future – What will Google Know? Everything your browse online Everything you talk about online Everywhere you buy online Everything you watch online Google Fiber + Google Aereospace + Loon
  • 29. Privacy Management Pagina 29 Apple Privacy Policy 25/05/2017
  • 30. Privacy Management Pagina 30 Apple Privacy Policy Why is privacy policy important ? It defines how they collect, use, disclose, transfer, and store users’ information. 25/05/2017 They divides information they collect in two main categories: Personal Information: data that can be used to identify or contact a single person. Non-Personal Information: data in a form that does not, on its own, permit direct association with any specific individual.
  • 31. Pagina 31 Apple Privacy Policy: Personal information What are personal information they collect ? Name, mailing address, phone number, email address, contact preferences, and credit card information. When are these information collected ? Creation of an Apple ID, purchase a product, download a software update. Share your content with family and friends using Apple products. In this case also the shared information about them are collected ! How are these information used ? Product announcements, software updates, and upcoming events. Create, develop, operate, deliver, and improve our products, services, content and advertising. Loss prevention and anti-fraud purposes. Auditing, data analysis, and research. 25/05/2017Privacy Management
  • 32. Privacy Management Pagina 32 Apple Privacy Policy: Non-Personal information What are non-personal information they collect ? Occupation, language, zip code, area code, unique device identifier, referrer URL, location, and the time zone. Customer activities on their website, iCloud services, our iTunes Store, App Store. How users use their services, including search queries. How are these information used ? Understand customer behavior and improve their products, services, and advertising. Provide more useful information to their customers and to understand which parts of our website, products, and services are of most interest. Improve the relevancy of results provided by their services. Others. 25/05/2017
  • 33. Privacy Management Pagina 33 Apple Privacy Policy: Location-Based Services What are we talking about ? To provide location-based services on Apple products, they collect, use, and share precise location data, including the real-time geographic location of your Apple computer or device. Unless you provide consent, this location data is collected anonymously in a form that does not personally identify you. 25/05/2017
  • 34. Privacy Management Pagina 34 Apple Privacy Policy: Disclosure to Third Parties Certain personal information are made available to strategic partners to provide products and services. Not shared for their marketing purposes. Third party companies are obligated to protect your information. When can they disclosure users’ personal information ? Law, legal process, litigation, and/or requests from public and governmental authorities. National security, law enforcement, or other issues of public importance. Enforce their terms and conditions or protect our operations or users. 25/05/2017
  • 35. Privacy Management Pagina 35 Apple Government Information Requests 25/05/2017
  • 36. Privacy Management Pagina 36 Apple Government Information Requests What are the most frequent request and how do they respond ? Device requests: information in relation to Apple devices, such as an iPhone, iPad, or Mac. Account requests: information in regard to an Apple ID account and/or related Apple services or transactions. 25/05/2017 National security-related requests are not considered Device Requests or Account Requests and are reported in a separate category.
  • 37. Privacy Management Pagina 37 Apple Government Information Requests 25/05/2017 On devices running iOS 8 and later versions, your personal data is placed under the protection of your passcode. Therefore, Apple will not perform iOS data extractions in response to government search warrants because the files to be extracted are protected by an encryption key that is tied to the user’s passcode, which Apple does not possess.
  • 38. 25/05/2017 Pagina 38 Difference between privacy policies Google gets 90%+ of its revenue from advertisers. The ad companies are Google’s main customers. Google must please the ad companies. Advertising allows to offer free google Apple gets 90%+ of its revenue from selling computers and devices. People are the Apple’s main customers. Apple must please the people. No need to please ad companies. Ad companies want personal information, while people want privacy! Privacy Management
  • 39. 25/05/2017•Privacy Management Pagina 39 When the privacy becomes practical
  • 40. 25/05/2017•Privacy Management Pagina 40 The #1 Place to see what Google knows about you myaccount.google.com /dashboard This shows everything Google is tracking about you, based on your accounts
  • 42. 25/05/2017•Privacy Management Pagina 42 Ads Settings https://www.google.com/settings/u/0/ads/authenticated
  • 43. 25/05/2017•Privacy Management Pagina 43 Google Maps Timeline https://www.google.it/maps/timeline?pb
  • 44. 25/05/2017•Privacy Management Pagina 44 Google My Activity https://myactivity.google.com/myactivity
  • 45. 25/05/2017•Privacy Management Pagina 45 Google Permissions https://myaccount.google.com/permissions
  • 46. Privacy Management Pagina 46 Apple VS FBI 25/05/2017
  • 47. Privacy Management Pagina 47 Apple VS FBI: Timeline December 2, 2015: San Bernardino attack o Killed 14 people and seriously injured 22. o Attackers died in a shootout with police. o Iphone 5C of one attacker recovered but locked with a four-digit password. February 9, 2016: FBI “procedure” FBI unable to unlock recovered phone. FBI asked the NSA to break into the phone but they couldn’t. FBI asked Apple to create a new version of iOS (“GovtOS”) to disable certain security features. Apple declined due to its policy therefore FBI responded with a court order issued under the “All Writs Act of 1789”. 25/05/2017
  • 48. Privacy Management Pagina 48 Apple VS FBI: Timeline Technical details about FBI order: o Bypass or disable the auto-erase function. o Enable to submit passcodes through different interfaces. o Remove delay between passcode attempts. February 16, 2016: Apple opposes the order They don’t want to create a backdoor for security reasons. No government had ever asked for similar access. February 19, 2016: U.S. Department of Justice application Apple could install the software in its own premises. After the FBI had hacked the phone via remote connection, Apple could remove and destroy the software. 25/05/2017
  • 49. Privacy Management Pagina 49 Apple VS FBI: Timeline March 28, 2016: FBI withdrawal of request FBI Unlocked the iPhone with the third party's help. Department of Justice withdrew the case. 25/05/2017 Information about the hack: o Works only on iPhone models lacking the Touch ID sensor. o Costs more than $1.3 million. o Exploits a zero-day vulnerability to bypass its ten- try limitation. o Developed by “Celebrate” (Israeli company) or “professional hackers”.
  • 50. Privacy Management Pagina 50 Apple VS FBI: Poll Agree or disagree with Apple’s decision to oppose a court order to unlock a smartphone that was used by one of the shooters in the San Bernardino attack? 25/05/2017
  • 51. 25/05/2017•Privacy Management Pagina 51 Possible evolution of privacy Conclusions Strong sensitization about the importance of privacy Problem: great lack of awareness! What does the society need? Each user must be aware about what type of data is giving to the service and how these data may be treated.
  • 52. THANK YOU! 25/05/2017•Privacy Management Pagina 52 The slides are available on: www.slideshare.net