Gagnier's Portion of TechWeek Chicago Presentation

Partner @ Gagnier Margossian LLP um Gagnier Margossian LLP
24. Jun 2012
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
1 von 61

Más contenido relacionado

Was ist angesagt?

social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..home based
E   commerce  - ppt E   commerce  - ppt
E commerce - ppt Saiqa Hashmi
Privacy and E-CommercePrivacy and E-Commerce
Privacy and E-CommerceAleksandr Yampolskiy
Be aware of the laws in South Africa that apply to emailBe aware of the laws in South Africa that apply to email
Be aware of the laws in South Africa that apply to emailLance Michalson
legal and ethcal issues of e businesslegal and ethcal issues of e business
legal and ethcal issues of e businessKdnk Kiriti
The regulatory environment of electronic commerceThe regulatory environment of electronic commerce
The regulatory environment of electronic commerceWisnu Dewobroto

Similar a Gagnier's Portion of TechWeek Chicago Presentation

Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Shawn Tuma
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentDonald E. Hester
E Marketing Ch5 Ethical LegalE Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical LegalLargest Catholic University
Privacy - USC 2005Privacy - USC 2005
Privacy - USC 2005Internet Law Center
CSR PII White PaperCSR PII White Paper
CSR PII White PaperDmcenter
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...Kenneth Riley

Similar a Gagnier's Portion of TechWeek Chicago Presentation(20)

Más de Christina Gagnier

European Union General Data Protection Regulation (GDPR) ChecklistEuropean Union General Data Protection Regulation (GDPR) Checklist
European Union General Data Protection Regulation (GDPR) ChecklistChristina Gagnier
EU Privacy Shield Self Certification EU Privacy Shield Self Certification
EU Privacy Shield Self Certification Christina Gagnier
The United Kingdom Raises Red Flag on Initial Coin OfferingsThe United Kingdom Raises Red Flag on Initial Coin Offerings
The United Kingdom Raises Red Flag on Initial Coin OfferingsChristina Gagnier
Regulatory Regime for Cryptocurrencies in GibraltarRegulatory Regime for Cryptocurrencies in Gibraltar
Regulatory Regime for Cryptocurrencies in GibraltarChristina Gagnier
China Bans Initial Coin Offerings, "Illegal Public Financing"China Bans Initial Coin Offerings, "Illegal Public Financing"
China Bans Initial Coin Offerings, "Illegal Public Financing"Christina Gagnier
Initial Coin Offerings (ICOs) and Cryptocurrencies in CanadaInitial Coin Offerings (ICOs) and Cryptocurrencies in Canada
Initial Coin Offerings (ICOs) and Cryptocurrencies in CanadaChristina Gagnier

Más de Christina Gagnier(20)

Último

Roottoo Innovation V24_CP.pdfRoottoo Innovation V24_CP.pdf
Roottoo Innovation V24_CP.pdfroottooinnovation
Data Formats: Reading and writing JSON – XML - YAMLData Formats: Reading and writing JSON – XML - YAML
Data Formats: Reading and writing JSON – XML - YAMLCSUC - Consorci de Serveis Universitaris de Catalunya
Privacy in the era of quantum computersPrivacy in the era of quantum computers
Privacy in the era of quantum computersSpeck&Tech
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...TrustArc
Elevate Your Enterprise with FME 23.1Elevate Your Enterprise with FME 23.1
Elevate Your Enterprise with FME 23.1Safe Software
Unleashing Innovation: IoT Project with MicroPythonUnleashing Innovation: IoT Project with MicroPython
Unleashing Innovation: IoT Project with MicroPythonVubon Roy

Gagnier's Portion of TechWeek Chicago Presentation

Hinweis der Redaktion

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n
  10. \n
  11. \n
  12. \n
  13. \n
  14. \n
  15. How we define user experience is going to change. \n
  16. I am not here to rail against one company. This talk is applicable to companies of all shapes and sizes. \n
  17. So, if you think you’re still trying to figure it all out, the legal and policy “systems” are already behind and trying to catch up. But, with one piece of legislation, the tables could be turned. A lot of this is based on norms, which we are trying to figure out.\n
  18. I am not here to rail against one company. This talk is applicable to companies of all shapes and sizes. \n
  19. This is new for all of us. There are not a lot of answers. We’re figuring out the metes and bounds of what we can do. What users want. How the legal infrastructure at all levels of government will react. \n
  20. This is new for all of us. There are not a lot of answers. We’re figuring out the metes and bounds of what we can do. What users want. How the legal infrastructure at all levels of government will react. \n
  21. This is new for all of us. There are not a lot of answers. We’re figuring out the metes and bounds of what we can do. What users want. How the legal infrastructure at all levels of government will react. \n
  22. This is new for all of us. There are not a lot of answers. We’re figuring out the metes and bounds of what we can do. What users want. How the legal infrastructure at all levels of government will react. \n
  23. So, if you think you’re still trying to figure it all out, the legal and policy “systems” are already behind and trying to catch up. But, with one piece of legislation, the tables could be turned. A lot of this is based on norms, which we are trying to figure out.\n
  24. I am not here to rail against one company. This talk is applicable to companies of all shapes and sizes. \n
  25. There are host of laws on privacy, they have just been created to address issues industry by industry. Consumer privacy and security online is just part of the newest set of considerations. Also, laws vary dramatically from country to country. \n
  26. \n
  27. This is new for all of us. There are not a lot of answers. We’re figuring out the metes and bounds of what we can do. What users want. How the legal infrastructure at all levels of government will react. \n
  28. By they, I refer to Congress. \n
  29. There is a disconnect between what happens in the private and public sector. Huge chasm between Silicon Valley and Washington, DC.\n
  30. \n
  31. This is new for all of us. There are not a lot of answers. We’re figuring out the metes and bounds of what we can do. What users want. How the legal infrastructure at all levels of government will react. \n
  32. This is new for all of us. There are not a lot of answers. We’re figuring out the metes and bounds of what we can do. What users want. How the legal infrastructure at all levels of government will react. \n
  33. So, if you think you’re still trying to figure it all out, the legal and policy “systems” are already behind and trying to catch up. But, with one piece of legislation, the tables could be turned. A lot of this is based on norms, which we are trying to figure out.\n
  34. \n
  35. First, start by considering what your users care about, the types of things that drive complaints on the company level and to regulatory agencies like the Federal Trade Commission. Mention Social Network Users’ Bill of Rights.\n
  36. I am going to run through a few things you can do to think about this holistically from a strategic perspective.\n
  37. Do an impact analysis. Figure out what you’re doing, your strengths and weaknesses. This is essential before taking any active measures. When I do this, I dissect the platform before I give an analysis of what’s going on or needs to be changed.\n
  38. Pretty simple outline. Geolocation. Obvious v. Inferential data.\n
  39. Pretty simple outline. Geolocation. Obvious v. Inferential data.\n
  40. Pretty simple outline. Geolocation. Obvious v. Inferential data.\n
  41. Pretty simple outline. Geolocation. Obvious v. Inferential data.\n
  42. Building with privacy in mine. Granular controls. Opt in v. opt out. Making privacy and security part of the enrollment process.\n
  43. After the solutions you can consider around the build, you can also look at your policies and response mechanisms.\n
  44. No one reads them. They may need to be there. Come up with a better more experiential alternative. \n
  45. \n
  46. \n
  47. \n
  48. \n
  49. We just discussed some of the ways you can be prepared to tackle privacy and security with data. \n
  50. We just discussed some of the ways you can be prepared to tackle privacy and security with data. \n
  51. We just discussed some of the ways you can be prepared to tackle privacy and security with data. \n
  52. \n
  53. \n
  54. US, make DoS attacks illegal and punishable by up to 10 years of imprisonment, through the National Information Infrastructure Protection Act of 1996 \n\n
  55. \n
  56. \n
  57. \n
  58. \n
  59. \n
  60. \n