SlideShare ist ein Scribd-Unternehmen logo
1 von 46
Downloaden Sie, um offline zu lesen
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Privacy by
Designer PRACTICAL CONSIDERATIONS ON UX
DESIGN FOR TRUST
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
“In God we
trust all others
bring data.” - William Edwards Deming
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
We all live in the Age of
Context
SHAPED BY MOBILE, SOCIAL MEDIA, DATA, SENSORS AND LOCATION-BASED SERVICES
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Users expect Personalistation
& Personal
EXPERIENCES FOR THE ‘MOST PERSONAL DEVICE EVER’ ARE..
RELEVANT
are you engaging at the right moment?
GLANCEABLE
can you deliver value in milliseconds?
PERSONAL
do you approach people in the right
manner?
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
No other Apple device has ever
been so connected to the wearer.
It is important to be mindful of this
connection.
Apple Watch Human Interface Design Guidelines, 2015
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Machine-to-human relationships are
now about human-to-human values
UNDERSTANDING PERSONALISATION
H2H M2H
TRUST PRIVACY
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
The Privacy Challenge
CONCERN ABOUT PRIVACY JUMPED 5 POINTS BETWEEN 2014 AND 2015. 2nd Annual Poll on How Personal
Technology is Changing our Lives -
January 2015, Microsoft
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Loss of control
PRIVACY CHALLENGE USER  POINT  OF  VIEW
91% of adults ‘agree’ or ‘strongly agree’ that
consumers have lost control over how
personal information is collected and used by
companies.
Pew Research Privacy Panel Survey, January 2014
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Lack of Transparency
PRIVACY CHALLENGE USER  POINT  OF  VIEW
People are fearful of sharing their data largely
because companies and government have not
been good at clearly explaining how they use
it.
Data Dialog, Demos 2012
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Lack of Knowledge(aka Privacy and PETs are ‘too difficult’)
PRIVACY CHALLENGE USER  POINT  OF  VIEW
54% believe it would be “somewhat” or “very” difficult
to find tools and strategies that would help them be
more private online and in using their cell phones 
13% unaware about search engines that do not keep track of a user’s search history
31% unaware email encryption programs such as PGP exist
31% unaware of privacy-enhancing browser plug-ins
39% unaware about anonymity software such as Tor
Pew Research, 2015
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Everyday privacy measures
that do catch on
ON THE BRIGHT SIDE LESS TECHNICAL WAYS OF OBTING OUT OF DATA COLLECTION
Clearing cookies or browser history: 59%
Refusing to provide information about themselves that wasn’t relevant to the transaction: 57%
Set their browser to disable or turn off cookies: 34%
Deleted or edited something they posted in the past: 29%
Used a temporary username or email address: 25%
Giving inaccurate or misleading information about themselves: 24%
Decided not to use a website because they asked for their real name: 23%
Used a public computer to browse anonymously: 12%
Asked someone to remove something that was posted about themselves online: 11%
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
the Facebook
paradox
• 91% of adults feel consumers have
lost control over how personal
information is collected and used by
companies.
• 58% of the entire adult population
(and 71% of internet users) is on
Facebook.
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Privacy VS. User Experience
#FALSE – HOW DO YOU DEFINE A BETTER PRODUCT? CONTEXT? DATA QUALITY?
The truth is that collecting information about
people allows you to make significantly better
products and the more information you collect,
the better products you can build .
Dustin Curtis, “Privacy VS. User Experience” (2014)
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Privacy is a fundamental component
of the product experience
BUSINESSES CAN DELIVER A GRAND USER EXPERIENCE AND TREMENDOUS VALUE ONLY IF THEY
SAFEGUARD THEIR USERS’ PRIVACY AND SECURITY
BUSINESS
VALUE
CONSUMER
VALUE
PRIVACY
GREAT UX
personalisation
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Being credible
BEING CREDIBLE HAS ALWAYS BEEN IMPORTANT FOR A GOOD USER EXPERIENCE
useful
usable desirable
credible
valuable
findable accessible
User Experience Honeycomb (Peter Morville)
CREDIBILITY 2004
the information you present to users
CREDIBILITY 2015
taking responsibility to keep personal data safe
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Privacy by designer
DELIVER BOTH PERSONALISATION AND TRUST
We owe it to both our users and the people who hire us to actively think about privacy, and to implement privacy in the
flows and designs we deliver.
B. We need to deliver trustworthy
products.
A. We need to deliver great,
personal experiences.
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
What is Privacy?
PRIVACY IS BROAD PRIVACY IS A RIGHT PRIVACY IS NOT DEAD
Personal
Data
• The Universal
Declaration of
Human Rights (Art 12)
• Europe: Directive
95/46/EC
• Belgium: Privacy Act
(1992, 1998 & KBs)
• Telecommunication
law
• …
LAWS
AND SUCH
European Privacy
Watchdogs &
Facebook
GDPR
New EU legislation
in the works
“If data is the
new oil,
privacy is the
new green.”
…
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Any
information
This is not limited to data regarding a an individual’s privacy,
also relating to a person's professional or public life.
Eg. name, a picture, a telephone number (professional number too), a code, a
bank account number, an e-mail address, a fingerprint, … .
PERSONAL DATA IS ANY
INFORMATION (RELATING TO)*
AN IDENTIFIED OR
IDENTIFIABLE NATURAL
PERSON
* OFTEN DEPENDS ON CONTEXT
•  Object data vs personal data (eg license plate)
•  Unique biometric data is always personal data (eg
fingerpint, DNA)
DATA SUBJECT
PERSONAL DATA
RELATES TO
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Identifiable evolves
IDENTIFIABILITY = WHEN VALUE > COST
value of
knowing
cost of
identifying
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
IP address
AN IP ADDRESS ON ITSELF WILL UNDER THE GDPR NO LONGER BE ‘PERSONAL DATA’ BY DEFAULT
(UNLESS YOU ARE AN ISP)
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Counter
measures
Not personal information when
measures are taken which
reasonably rule out
identification of a person
•  Anonymisation
•  Key-coded data (clinical research)
•  Data masking/obfuscation (for
development)
•  Granularity
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Beware:
location
Special data which under the
GDPR will require extra safety
measures
(as is data on children)
avoid when possible
geohashes
coarse location
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Stay clear:
sensitive data
 •  race
•  political opinions
•  religious or philosophical beliefs
•  trade-union membership
•  health
•  sex life
•  prosecutions or criminal or administrative convictions
Prohibited to collect, register or
ask to disclose.
(exceptions apply, but then additional
safeguards are required)
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
What about
republication?
Photographs and personal
information published online may
only be re-used if given consent.
•  different context
•  different purpose
=> context & purpose apply to
recycling as well
(In case of scraping, copyright and database law are
relevant too.)
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Your
responsibilities
as Controller
•  Ensure the quality of the data
The data being processed have to be exact and, if necessary, kept up-to-
date
•  Ensure the confidentiality of the data
Responsibility to inform and make sure that the individuals working under his
authority only have access to and make use of the data they need to perform
their duties
•  Ensure the protection of the data
From unwanted internal or external curiosity, as well as from unauthorised
processing operations. Security measures can be organizational (restriction of
the number of individuals having access to the data, use of access codes,
locking offices with computers and data files, etc.) and technical.
(!) The more sensitive the data and the higher the risks for the data subject
are, the more precautions have to be taken. (see ‘information security’ on
privacycommission.be)
•  Erasure of data
Personal data must not be kept in a form allowing for identification of the data
subjects any longer than necessary for the purpose aimed at.
+ BEFORE PROCESSING OF
DATA: NOTIFICATION
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
In case of
breach
CONSIDER A BREACH LIKELY –
AND PREPARE ACCORDINGLY
•  Do not play the victim
•  Be accountable
•  Take ownership
•  Express regaret
1. What happened? (tell what you know at that time)
crisis communications
(works for downtime communication too)
2. What is being done *NOW*? (investigate, take systems offline, ..)
3. How does this affect your customers? (both short- and long term)
4. What are you doing to minimize risk? What can your customers do?
5. How do people get more information or updates?
(folluw up) 6. What are you doing prevent this from happening again?
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Design for explicit
OPT-IN & COOKIELAW
By signing this contract, you agree
we have the right to collect and
pass on all your information. In case
you do not want your bank to pass
on your credit information to third
partners and other divisions, please
write ‘I do not agree’ on the
contract and hand it over to the
person behind the till.
EXPLICIT EXPLICIT NOT EXPLICIT
(hidden opt-out)
NO YES
IF YOU AGREE, PLEASE
CHECK THIS BOX:
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Design for
informed
NO SURPRISES
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Design for choice
CONSENT
In your designs and flows, take into account both having and not having the data.
Design personalized experiences
for when you have data.
Design good alternatives for not
having the data.
Today will be sunny
Weather for Olen, Belgium where we
know you live.
Check out the weather!
Antwerpen
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Privacy as a
Trading
Function?
Customer Data: Designing for
Transparancy and Trust
– by Timothy Morey, Theodore Forbath, And Allison
Schoop, May 2015 (Harvard Business Review)
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Design for
trust
CLEAR & CONSISTENT, SO
PEOPLE CAN TRUST YOU TO
POINT OUT PRIVACY RELATED
FEATURES & SETTINGS.
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
The EU prosed icons: privacy-by-
design taken too literal (how’s that for creepiness factor?)
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Design for
because
EXPLAIN YOUR MAGIC
When users know of the
existence of a certain algorithm,
their satisfaction with the
product increases over time ,
probably as they start to
understand its workings better.
Yet when they discovered an
algorithm they were previously
unaware of, users felt betrayed.
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Design for
because
EXPLAIN YOUR MAGIC
When users know of the
existence of a certain algorithm,
their satisfaction with the
product increases over time ,
probably as they start to
understand its workings better.
Yet when they discovered an
algorithm they were previously
unaware of, users felt betrayed.
WORST CASE SCENARIO
“In the extreme case, it may be that whenever a software developer in Menlo Park
adjusts a parameter, someone somewhere wrongly starts to believe themselves
to be unloved. ”
– Eslami et all.
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Because allows people to correct
you when you are wrong.
Something we best figure out before algorithms get to act on our behalf.
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Design for transparency
Show people their data selfs
If we are going to allow algorithms and
expert rules to steer our behaviour, we
must know they understand that
correctly.
Allow for:
-  Correction
-  Reset
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Reflect all data collected in functionality
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Design for
forming
secure habits
BURNER ACCOUNTS
Kinja introduced these for
anonymous commenting. They
made private keys
understandable through
metaphor.
“…if you lose the burner key
initially issued we will not be
able to retrieve this information
for you or reset the account.
Save your key.”
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
REWARD SECURE BEHAVIOUR
Users that enable two-step
security on their accounts will
now receive a 10% discount off
their monthly bill Mailchimp bill.
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Design to
encourage
privacy
ACCESS DURATION
People forget to ‘revoke’ things.
Supply limited time access
options:
WeChat: location discoverable
for 10 minutes (default)
LinkedIn: access duration
settings (weeks -> months ->
years)
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Design for an
exit
MAKE IT EASY TO LEAVE
BUT CONVINCE THEM TO STAY
Think about WHY people are
leaving, and offer alternatives.
“snooze” services
less-email-option
reset profile/account
..
(and remember data portability!)
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
Do you want to know
if your friends are
(action/mood/..) ?
Do you want your friends
to know if you are (action/
mood/..) ?
Don’t allowOK
Design with peer-to-peer privacy
in mind.
Ask the right question: not do you want to see, but are you willing for others to see..
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
When in doubt…
STEP 1: ASK YOUR USER – PRIVACY DOES NOT BENEFIT FROM A “DO FIRST ASK FORGIVENESS
LATER” STRATEGY
Build it so a user
always has the option to tell
you to go bugger off.
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
When in doubt…
STEP 2: USE COMMON SENSE AND AS LITTLE DATA AS POSSIBLE
PERSONAL DATA
Less is more: in quantity and
detail, but also in time
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
i!When in doubt…
STEP 3: ASK THE EXPERTS
Belgian Privacy
Commission
www.privacycommission.be
Article 29 Working
Party
Opinions & recommendations
Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken
We influence what
is acceptable.
So let’s make good,
proportional stuff.

Weitere ähnliche Inhalte

Was ist angesagt?

7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing InvestmentsCaston Thomas
 
How Smart Products Help Companies Profit From Data
How Smart Products Help Companies Profit From DataHow Smart Products Help Companies Profit From Data
How Smart Products Help Companies Profit From DataBernard Marr
 
Why Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemWhy Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemBernard Marr
 
Vint big data research privacy technology and the law
Vint big data research privacy technology and the lawVint big data research privacy technology and the law
Vint big data research privacy technology and the lawKarlos Svoboda
 
These Fascinating Examples Show Why Streaming Data And Real-Time Analytics Ma...
These Fascinating Examples Show Why Streaming Data And Real-Time Analytics Ma...These Fascinating Examples Show Why Streaming Data And Real-Time Analytics Ma...
These Fascinating Examples Show Why Streaming Data And Real-Time Analytics Ma...Bernard Marr
 
Survey of accountability, trust, consent, tracking, security and privacy mech...
Survey of accountability, trust, consent, tracking, security and privacy mech...Survey of accountability, trust, consent, tracking, security and privacy mech...
Survey of accountability, trust, consent, tracking, security and privacy mech...Karlos Svoboda
 
PSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & SecurityPSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & SecurityPSFK
 
Inman Connect Conference Summary
Inman Connect Conference SummaryInman Connect Conference Summary
Inman Connect Conference SummaryMy Kid Has Paws
 
AI - Artificial Intelligence - Implications for Libraries
AI - Artificial Intelligence - Implications for LibrariesAI - Artificial Intelligence - Implications for Libraries
AI - Artificial Intelligence - Implications for LibrariesBrian Pichman
 
How To Set SMART Goals To Help You Succeed?
How To Set SMART Goals To Help You Succeed?How To Set SMART Goals To Help You Succeed?
How To Set SMART Goals To Help You Succeed?Bernard Marr
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenienceDon Lovett
 
Fontys Eric van Tol
Fontys Eric van TolFontys Eric van Tol
Fontys Eric van TolTalentEvent
 
What is Digital Disruption?
What is Digital Disruption?What is Digital Disruption?
What is Digital Disruption?Chuck Elias
 
Cloud computing: Trends and Challenges
Cloud computing: Trends and ChallengesCloud computing: Trends and Challenges
Cloud computing: Trends and ChallengesBig Data Colombia
 
Digital Trends 2017 Final
Digital Trends 2017 FinalDigital Trends 2017 Final
Digital Trends 2017 FinalGet up to Speed
 
Technology in 2024 (Neal/Fantry Comm 303-50)
Technology in 2024 (Neal/Fantry Comm 303-50)Technology in 2024 (Neal/Fantry Comm 303-50)
Technology in 2024 (Neal/Fantry Comm 303-50)datgymnast94
 
The Amazing Ways Retail Giant Zalando Is Using Artificial Intelligence
The Amazing Ways Retail Giant Zalando Is Using Artificial IntelligenceThe Amazing Ways Retail Giant Zalando Is Using Artificial Intelligence
The Amazing Ways Retail Giant Zalando Is Using Artificial IntelligenceBernard Marr
 

Was ist angesagt? (20)

7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments
 
How Smart Products Help Companies Profit From Data
How Smart Products Help Companies Profit From DataHow Smart Products Help Companies Profit From Data
How Smart Products Help Companies Profit From Data
 
Why Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemWhy Cybersecurity is a Data Problem
Why Cybersecurity is a Data Problem
 
Enigma's Architecture
Enigma's ArchitectureEnigma's Architecture
Enigma's Architecture
 
Vint big data research privacy technology and the law
Vint big data research privacy technology and the lawVint big data research privacy technology and the law
Vint big data research privacy technology and the law
 
Predictions
PredictionsPredictions
Predictions
 
These Fascinating Examples Show Why Streaming Data And Real-Time Analytics Ma...
These Fascinating Examples Show Why Streaming Data And Real-Time Analytics Ma...These Fascinating Examples Show Why Streaming Data And Real-Time Analytics Ma...
These Fascinating Examples Show Why Streaming Data And Real-Time Analytics Ma...
 
Survey of accountability, trust, consent, tracking, security and privacy mech...
Survey of accountability, trust, consent, tracking, security and privacy mech...Survey of accountability, trust, consent, tracking, security and privacy mech...
Survey of accountability, trust, consent, tracking, security and privacy mech...
 
PSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & SecurityPSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & Security
 
Inman Connect Conference Summary
Inman Connect Conference SummaryInman Connect Conference Summary
Inman Connect Conference Summary
 
Buckle Up
Buckle UpBuckle Up
Buckle Up
 
AI - Artificial Intelligence - Implications for Libraries
AI - Artificial Intelligence - Implications for LibrariesAI - Artificial Intelligence - Implications for Libraries
AI - Artificial Intelligence - Implications for Libraries
 
How To Set SMART Goals To Help You Succeed?
How To Set SMART Goals To Help You Succeed?How To Set SMART Goals To Help You Succeed?
How To Set SMART Goals To Help You Succeed?
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
 
Fontys Eric van Tol
Fontys Eric van TolFontys Eric van Tol
Fontys Eric van Tol
 
What is Digital Disruption?
What is Digital Disruption?What is Digital Disruption?
What is Digital Disruption?
 
Cloud computing: Trends and Challenges
Cloud computing: Trends and ChallengesCloud computing: Trends and Challenges
Cloud computing: Trends and Challenges
 
Digital Trends 2017 Final
Digital Trends 2017 FinalDigital Trends 2017 Final
Digital Trends 2017 Final
 
Technology in 2024 (Neal/Fantry Comm 303-50)
Technology in 2024 (Neal/Fantry Comm 303-50)Technology in 2024 (Neal/Fantry Comm 303-50)
Technology in 2024 (Neal/Fantry Comm 303-50)
 
The Amazing Ways Retail Giant Zalando Is Using Artificial Intelligence
The Amazing Ways Retail Giant Zalando Is Using Artificial IntelligenceThe Amazing Ways Retail Giant Zalando Is Using Artificial Intelligence
The Amazing Ways Retail Giant Zalando Is Using Artificial Intelligence
 

Andere mochten auch

Security by design: An Introduction to Drupal Security
Security by design: An Introduction to Drupal SecuritySecurity by design: An Introduction to Drupal Security
Security by design: An Introduction to Drupal SecurityMediacurrent
 
Top career課件
Top career課件Top career課件
Top career課件Qilian
 
#Ready4EUdataP Privacy by Design: effetti pratici sui sistemi IT Giancarlo Butti
#Ready4EUdataP Privacy by Design: effetti pratici sui sistemi IT Giancarlo Butti#Ready4EUdataP Privacy by Design: effetti pratici sui sistemi IT Giancarlo Butti
#Ready4EUdataP Privacy by Design: effetti pratici sui sistemi IT Giancarlo ButtiEuroPrivacy
 
Privacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the artPrivacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the artJames Mulhern
 
Information Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsInformation Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsMarius FAILLOT DEVARRE
 
Privacy by Design Seminar - Jan 22, 2015
Privacy by Design Seminar - Jan 22, 2015Privacy by Design Seminar - Jan 22, 2015
Privacy by Design Seminar - Jan 22, 2015Dr. Ann Cavoukian
 
Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...
Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...
Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...Amazon Web Services
 
Advantages of privacy by design in IoE
Advantages of privacy by design in IoEAdvantages of privacy by design in IoE
Advantages of privacy by design in IoEMarc Vael
 
Managing Cloud Security Design and Implementation in a Ransomware World
Managing Cloud Security Design and Implementation in a Ransomware World Managing Cloud Security Design and Implementation in a Ransomware World
Managing Cloud Security Design and Implementation in a Ransomware World MongoDB
 
Privacy by Design: White Papaer
Privacy by Design: White PapaerPrivacy by Design: White Papaer
Privacy by Design: White PapaerKristyn Greenwood
 
Don't Ask, Don't Tell - The Virtues of Privacy By Design
Don't Ask, Don't Tell - The Virtues of Privacy By DesignDon't Ask, Don't Tell - The Virtues of Privacy By Design
Don't Ask, Don't Tell - The Virtues of Privacy By DesignEleanor McHugh
 
Safeguarding privacy in research design
Safeguarding privacy in research designSafeguarding privacy in research design
Safeguarding privacy in research designMarlon Domingus
 
Privacy by design
Privacy by designPrivacy by design
Privacy by designblogzilla
 
Google在被遺忘權 (Right to Be Forgotten)中所扮演的角色
Google在被遺忘權 (Right to Be Forgotten)中所扮演的角色Google在被遺忘權 (Right to Be Forgotten)中所扮演的角色
Google在被遺忘權 (Right to Be Forgotten)中所扮演的角色Wayne Chung
 
20171106 - Privacy Design Lab - LINDDUN
20171106 - Privacy Design Lab - LINDDUN20171106 - Privacy Design Lab - LINDDUN
20171106 - Privacy Design Lab - LINDDUNBrussels Legal Hackers
 
Ame Elliott – No, Thank You: User Experience Design for Privacy
Ame Elliott – No, Thank You: User Experience Design for PrivacyAme Elliott – No, Thank You: User Experience Design for Privacy
Ame Elliott – No, Thank You: User Experience Design for PrivacyNEXT Conference
 

Andere mochten auch (18)

Security by design: An Introduction to Drupal Security
Security by design: An Introduction to Drupal SecuritySecurity by design: An Introduction to Drupal Security
Security by design: An Introduction to Drupal Security
 
Top career課件
Top career課件Top career課件
Top career課件
 
#Ready4EUdataP Privacy by Design: effetti pratici sui sistemi IT Giancarlo Butti
#Ready4EUdataP Privacy by Design: effetti pratici sui sistemi IT Giancarlo Butti#Ready4EUdataP Privacy by Design: effetti pratici sui sistemi IT Giancarlo Butti
#Ready4EUdataP Privacy by Design: effetti pratici sui sistemi IT Giancarlo Butti
 
Privacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the artPrivacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the art
 
Information Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsInformation Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & Metrics
 
Privacy by Design Seminar - Jan 22, 2015
Privacy by Design Seminar - Jan 22, 2015Privacy by Design Seminar - Jan 22, 2015
Privacy by Design Seminar - Jan 22, 2015
 
Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...
Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...
Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...
 
Advantages of privacy by design in IoE
Advantages of privacy by design in IoEAdvantages of privacy by design in IoE
Advantages of privacy by design in IoE
 
Managing Cloud Security Design and Implementation in a Ransomware World
Managing Cloud Security Design and Implementation in a Ransomware World Managing Cloud Security Design and Implementation in a Ransomware World
Managing Cloud Security Design and Implementation in a Ransomware World
 
Privacy by Design: White Papaer
Privacy by Design: White PapaerPrivacy by Design: White Papaer
Privacy by Design: White Papaer
 
Don't Ask, Don't Tell - The Virtues of Privacy By Design
Don't Ask, Don't Tell - The Virtues of Privacy By DesignDon't Ask, Don't Tell - The Virtues of Privacy By Design
Don't Ask, Don't Tell - The Virtues of Privacy By Design
 
Safeguarding privacy in research design
Safeguarding privacy in research designSafeguarding privacy in research design
Safeguarding privacy in research design
 
Privacy by design
Privacy by designPrivacy by design
Privacy by design
 
Google在被遺忘權 (Right to Be Forgotten)中所扮演的角色
Google在被遺忘權 (Right to Be Forgotten)中所扮演的角色Google在被遺忘權 (Right to Be Forgotten)中所扮演的角色
Google在被遺忘權 (Right to Be Forgotten)中所扮演的角色
 
20171106 - Privacy Design Lab - LINDDUN
20171106 - Privacy Design Lab - LINDDUN20171106 - Privacy Design Lab - LINDDUN
20171106 - Privacy Design Lab - LINDDUN
 
Ame Elliott – No, Thank You: User Experience Design for Privacy
Ame Elliott – No, Thank You: User Experience Design for PrivacyAme Elliott – No, Thank You: User Experience Design for Privacy
Ame Elliott – No, Thank You: User Experience Design for Privacy
 
Data Pipeline Matters
Data Pipeline MattersData Pipeline Matters
Data Pipeline Matters
 
The AI Rush
The AI RushThe AI Rush
The AI Rush
 

Ähnlich wie Privacy By Designer (PHP.ghent)

TrustUX: balancing personalisation and privacy to create understanding and tr...
TrustUX: balancing personalisation and privacy to create understanding and tr...TrustUX: balancing personalisation and privacy to create understanding and tr...
TrustUX: balancing personalisation and privacy to create understanding and tr...Ann Wuyts
 
Ux design ethics for data privacy and protection
Ux design ethics for data privacy and protectionUx design ethics for data privacy and protection
Ux design ethics for data privacy and protectionveronica hoth
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in MindGosia Fraser
 
HPE IDOL 10 (Intelligent Data Operating Layer)
HPE IDOL 10 (Intelligent Data Operating Layer)HPE IDOL 10 (Intelligent Data Operating Layer)
HPE IDOL 10 (Intelligent Data Operating Layer)Andrey Karpov
 
TLabs - deutsche telekom
TLabs -  deutsche telekomTLabs -  deutsche telekom
TLabs - deutsche telekomChristina Azzam
 
Data-Driven Design for User Experience
Data-Driven Design for User Experience Data-Driven Design for User Experience
Data-Driven Design for User Experience Emi Kwon
 
IOT - Design Principles of Connected Devices
IOT - Design Principles of Connected DevicesIOT - Design Principles of Connected Devices
IOT - Design Principles of Connected DevicesDevyani Vasistha
 
Designing experiences for the personal data box
Designing experiences for the personal data boxDesigning experiences for the personal data box
Designing experiences for the personal data boxPierrick Thébault
 
Big data-and-creativity v.1
Big data-and-creativity v.1Big data-and-creativity v.1
Big data-and-creativity v.1Kim Flintoff
 
The Mobility Revolution and the Power of Social Media (Gerd Leonhard at ACTE0...
The Mobility Revolution and the Power of Social Media (Gerd Leonhard at ACTE0...The Mobility Revolution and the Power of Social Media (Gerd Leonhard at ACTE0...
The Mobility Revolution and the Power of Social Media (Gerd Leonhard at ACTE0...Gerd Leonhard
 
UX STRAT USA: Leah Buley, "The Role of UX / CX in Business"
UX STRAT USA: Leah Buley, "The Role of UX / CX in Business"UX STRAT USA: Leah Buley, "The Role of UX / CX in Business"
UX STRAT USA: Leah Buley, "The Role of UX / CX in Business"UX STRAT
 
Designing the privacy user experience experience dynamics web seminar
Designing the privacy user experience  experience dynamics web seminarDesigning the privacy user experience  experience dynamics web seminar
Designing the privacy user experience experience dynamics web seminarExperience Dynamics
 
The hi:project: empowering you, empowering us, with a more human web
The hi:project: empowering you, empowering us, with a more human webThe hi:project: empowering you, empowering us, with a more human web
The hi:project: empowering you, empowering us, with a more human webThe hi:project
 
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...How to Migrate Your Organization to a More Security-Minded Culture – From Dev...
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...Dana Gardner
 
CPCU 2016 future of underwriting insurtech
CPCU 2016   future of underwriting insurtechCPCU 2016   future of underwriting insurtech
CPCU 2016 future of underwriting insurtechintellectseec
 
Lean UX, Google Launchpad London, 2014
Lean UX, Google Launchpad London, 2014Lean UX, Google Launchpad London, 2014
Lean UX, Google Launchpad London, 2014Adrian Howard
 
Content trends: Get ready for Smarter Content - Geoffrey Igharo, Creuna
Content trends: Get ready for Smarter Content - Geoffrey Igharo, CreunaContent trends: Get ready for Smarter Content - Geoffrey Igharo, Creuna
Content trends: Get ready for Smarter Content - Geoffrey Igharo, CreunaGeoffrey Igharo
 
ZION: Security and Internet of Things
ZION: Security and Internet of ThingsZION: Security and Internet of Things
ZION: Security and Internet of ThingsAnkam Karthik
 
The Privacy Illusion
The Privacy IllusionThe Privacy Illusion
The Privacy IllusionMary Aviles
 
Thingscon Amsterdam 2015 - IoT Design Manifesto workshop
Thingscon Amsterdam 2015 - IoT Design Manifesto workshop Thingscon Amsterdam 2015 - IoT Design Manifesto workshop
Thingscon Amsterdam 2015 - IoT Design Manifesto workshop ThingsConAMS
 

Ähnlich wie Privacy By Designer (PHP.ghent) (20)

TrustUX: balancing personalisation and privacy to create understanding and tr...
TrustUX: balancing personalisation and privacy to create understanding and tr...TrustUX: balancing personalisation and privacy to create understanding and tr...
TrustUX: balancing personalisation and privacy to create understanding and tr...
 
Ux design ethics for data privacy and protection
Ux design ethics for data privacy and protectionUx design ethics for data privacy and protection
Ux design ethics for data privacy and protection
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
 
HPE IDOL 10 (Intelligent Data Operating Layer)
HPE IDOL 10 (Intelligent Data Operating Layer)HPE IDOL 10 (Intelligent Data Operating Layer)
HPE IDOL 10 (Intelligent Data Operating Layer)
 
TLabs - deutsche telekom
TLabs -  deutsche telekomTLabs -  deutsche telekom
TLabs - deutsche telekom
 
Data-Driven Design for User Experience
Data-Driven Design for User Experience Data-Driven Design for User Experience
Data-Driven Design for User Experience
 
IOT - Design Principles of Connected Devices
IOT - Design Principles of Connected DevicesIOT - Design Principles of Connected Devices
IOT - Design Principles of Connected Devices
 
Designing experiences for the personal data box
Designing experiences for the personal data boxDesigning experiences for the personal data box
Designing experiences for the personal data box
 
Big data-and-creativity v.1
Big data-and-creativity v.1Big data-and-creativity v.1
Big data-and-creativity v.1
 
The Mobility Revolution and the Power of Social Media (Gerd Leonhard at ACTE0...
The Mobility Revolution and the Power of Social Media (Gerd Leonhard at ACTE0...The Mobility Revolution and the Power of Social Media (Gerd Leonhard at ACTE0...
The Mobility Revolution and the Power of Social Media (Gerd Leonhard at ACTE0...
 
UX STRAT USA: Leah Buley, "The Role of UX / CX in Business"
UX STRAT USA: Leah Buley, "The Role of UX / CX in Business"UX STRAT USA: Leah Buley, "The Role of UX / CX in Business"
UX STRAT USA: Leah Buley, "The Role of UX / CX in Business"
 
Designing the privacy user experience experience dynamics web seminar
Designing the privacy user experience  experience dynamics web seminarDesigning the privacy user experience  experience dynamics web seminar
Designing the privacy user experience experience dynamics web seminar
 
The hi:project: empowering you, empowering us, with a more human web
The hi:project: empowering you, empowering us, with a more human webThe hi:project: empowering you, empowering us, with a more human web
The hi:project: empowering you, empowering us, with a more human web
 
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...How to Migrate Your Organization to a More Security-Minded Culture – From Dev...
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...
 
CPCU 2016 future of underwriting insurtech
CPCU 2016   future of underwriting insurtechCPCU 2016   future of underwriting insurtech
CPCU 2016 future of underwriting insurtech
 
Lean UX, Google Launchpad London, 2014
Lean UX, Google Launchpad London, 2014Lean UX, Google Launchpad London, 2014
Lean UX, Google Launchpad London, 2014
 
Content trends: Get ready for Smarter Content - Geoffrey Igharo, Creuna
Content trends: Get ready for Smarter Content - Geoffrey Igharo, CreunaContent trends: Get ready for Smarter Content - Geoffrey Igharo, Creuna
Content trends: Get ready for Smarter Content - Geoffrey Igharo, Creuna
 
ZION: Security and Internet of Things
ZION: Security and Internet of ThingsZION: Security and Internet of Things
ZION: Security and Internet of Things
 
The Privacy Illusion
The Privacy IllusionThe Privacy Illusion
The Privacy Illusion
 
Thingscon Amsterdam 2015 - IoT Design Manifesto workshop
Thingscon Amsterdam 2015 - IoT Design Manifesto workshop Thingscon Amsterdam 2015 - IoT Design Manifesto workshop
Thingscon Amsterdam 2015 - IoT Design Manifesto workshop
 

Mehr von Ann Wuyts

When people are your most important asset: Data Governance, Privacy & UX
When people are your most important asset: Data Governance, Privacy & UXWhen people are your most important asset: Data Governance, Privacy & UX
When people are your most important asset: Data Governance, Privacy & UXAnn Wuyts
 
Privacy Intro voor SETUP Utrecht's "16.8 miljoen Nederlanders in één verjaard...
Privacy Intro voor SETUP Utrecht's "16.8 miljoen Nederlanders in één verjaard...Privacy Intro voor SETUP Utrecht's "16.8 miljoen Nederlanders in één verjaard...
Privacy Intro voor SETUP Utrecht's "16.8 miljoen Nederlanders in één verjaard...Ann Wuyts
 
Dear Marketers, How Badly Do You Know Me!
Dear Marketers, How Badly Do You Know Me!Dear Marketers, How Badly Do You Know Me!
Dear Marketers, How Badly Do You Know Me!Ann Wuyts
 
Designing dashboards for a Sense of Control
Designing dashboards for a Sense of ControlDesigning dashboards for a Sense of Control
Designing dashboards for a Sense of ControlAnn Wuyts
 
Ambient AI, Advertising & Technology
Ambient AI, Advertising & TechnologyAmbient AI, Advertising & Technology
Ambient AI, Advertising & TechnologyAnn Wuyts
 
9 Dingen Die Je Over Privacy Moet Weten
9 Dingen Die Je Over Privacy Moet Weten9 Dingen Die Je Over Privacy Moet Weten
9 Dingen Die Je Over Privacy Moet WetenAnn Wuyts
 
Mobile, Smart & Context-Aware (infographic)
Mobile, Smart & Context-Aware (infographic)Mobile, Smart & Context-Aware (infographic)
Mobile, Smart & Context-Aware (infographic)Ann Wuyts
 
MomoBXL - Pat Walsche on World-wide Privacy Recommendations
MomoBXL - Pat Walsche on World-wide Privacy RecommendationsMomoBXL - Pat Walsche on World-wide Privacy Recommendations
MomoBXL - Pat Walsche on World-wide Privacy RecommendationsAnn Wuyts
 
Vuilbakkes Mobile App Concept
Vuilbakkes Mobile App ConceptVuilbakkes Mobile App Concept
Vuilbakkes Mobile App ConceptAnn Wuyts
 

Mehr von Ann Wuyts (9)

When people are your most important asset: Data Governance, Privacy & UX
When people are your most important asset: Data Governance, Privacy & UXWhen people are your most important asset: Data Governance, Privacy & UX
When people are your most important asset: Data Governance, Privacy & UX
 
Privacy Intro voor SETUP Utrecht's "16.8 miljoen Nederlanders in één verjaard...
Privacy Intro voor SETUP Utrecht's "16.8 miljoen Nederlanders in één verjaard...Privacy Intro voor SETUP Utrecht's "16.8 miljoen Nederlanders in één verjaard...
Privacy Intro voor SETUP Utrecht's "16.8 miljoen Nederlanders in één verjaard...
 
Dear Marketers, How Badly Do You Know Me!
Dear Marketers, How Badly Do You Know Me!Dear Marketers, How Badly Do You Know Me!
Dear Marketers, How Badly Do You Know Me!
 
Designing dashboards for a Sense of Control
Designing dashboards for a Sense of ControlDesigning dashboards for a Sense of Control
Designing dashboards for a Sense of Control
 
Ambient AI, Advertising & Technology
Ambient AI, Advertising & TechnologyAmbient AI, Advertising & Technology
Ambient AI, Advertising & Technology
 
9 Dingen Die Je Over Privacy Moet Weten
9 Dingen Die Je Over Privacy Moet Weten9 Dingen Die Je Over Privacy Moet Weten
9 Dingen Die Je Over Privacy Moet Weten
 
Mobile, Smart & Context-Aware (infographic)
Mobile, Smart & Context-Aware (infographic)Mobile, Smart & Context-Aware (infographic)
Mobile, Smart & Context-Aware (infographic)
 
MomoBXL - Pat Walsche on World-wide Privacy Recommendations
MomoBXL - Pat Walsche on World-wide Privacy RecommendationsMomoBXL - Pat Walsche on World-wide Privacy Recommendations
MomoBXL - Pat Walsche on World-wide Privacy Recommendations
 
Vuilbakkes Mobile App Concept
Vuilbakkes Mobile App ConceptVuilbakkes Mobile App Concept
Vuilbakkes Mobile App Concept
 

Kürzlich hochgeladen

VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...SUHANI PANDEY
 
Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)amitlee9823
 
Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...
Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...
Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...home
 
DragonBall PowerPoint Template for demo.pptx
DragonBall PowerPoint Template for demo.pptxDragonBall PowerPoint Template for demo.pptx
DragonBall PowerPoint Template for demo.pptxmirandajeremy200221
 
Verified Trusted Call Girls Adugodi💘 9352852248 Good Looking standard Profil...
Verified Trusted Call Girls Adugodi💘 9352852248  Good Looking standard Profil...Verified Trusted Call Girls Adugodi💘 9352852248  Good Looking standard Profil...
Verified Trusted Call Girls Adugodi💘 9352852248 Good Looking standard Profil...kumaririma588
 
infant assessment fdbbdbdddinal ppt.pptx
infant assessment fdbbdbdddinal ppt.pptxinfant assessment fdbbdbdddinal ppt.pptx
infant assessment fdbbdbdddinal ppt.pptxsuhanimunjal27
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Editorial design Magazine design project.pdf
Editorial design Magazine design project.pdfEditorial design Magazine design project.pdf
Editorial design Magazine design project.pdftbatkhuu1
 
2-tool presenthdbdbdbdbddhdhddation.pptx
2-tool presenthdbdbdbdbddhdhddation.pptx2-tool presenthdbdbdbdbddhdhddation.pptx
2-tool presenthdbdbdbdbddhdhddation.pptxsuhanimunjal27
 
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...Pooja Nehwal
 
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 
(AISHA) Ambegaon Khurd Call Girls Just Call 7001035870 [ Cash on Delivery ] P...
(AISHA) Ambegaon Khurd Call Girls Just Call 7001035870 [ Cash on Delivery ] P...(AISHA) Ambegaon Khurd Call Girls Just Call 7001035870 [ Cash on Delivery ] P...
(AISHA) Ambegaon Khurd Call Girls Just Call 7001035870 [ Cash on Delivery ] P...ranjana rawat
 
Call Girls in Kalkaji Delhi 8264348440 call girls ❤️
Call Girls in Kalkaji Delhi 8264348440 call girls ❤️Call Girls in Kalkaji Delhi 8264348440 call girls ❤️
Call Girls in Kalkaji Delhi 8264348440 call girls ❤️soniya singh
 
call girls in Dakshinpuri (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️
call girls in Dakshinpuri  (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️call girls in Dakshinpuri  (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️
call girls in Dakshinpuri (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
The history of music videos a level presentation
The history of music videos a level presentationThe history of music videos a level presentation
The history of music videos a level presentationamedia6
 
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdfThe_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdfAmirYakdi
 
Escorts Service Basapura ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Basapura ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Basapura ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Basapura ☎ 7737669865☎ Book Your One night Stand (Bangalore)amitlee9823
 
Stark Industries Marketing Plan (1).pptx
Stark Industries Marketing Plan (1).pptxStark Industries Marketing Plan (1).pptx
Stark Industries Marketing Plan (1).pptxjeswinjees
 
Chapter 19_DDA_TOD Policy_First Draft 2012.pdf
Chapter 19_DDA_TOD Policy_First Draft 2012.pdfChapter 19_DDA_TOD Policy_First Draft 2012.pdf
Chapter 19_DDA_TOD Policy_First Draft 2012.pdfParomita Roy
 
VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...
VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...
VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...Call Girls in Nagpur High Profile
 

Kürzlich hochgeladen (20)

VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...
 
Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)
 
Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...
Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...
Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...
 
DragonBall PowerPoint Template for demo.pptx
DragonBall PowerPoint Template for demo.pptxDragonBall PowerPoint Template for demo.pptx
DragonBall PowerPoint Template for demo.pptx
 
Verified Trusted Call Girls Adugodi💘 9352852248 Good Looking standard Profil...
Verified Trusted Call Girls Adugodi💘 9352852248  Good Looking standard Profil...Verified Trusted Call Girls Adugodi💘 9352852248  Good Looking standard Profil...
Verified Trusted Call Girls Adugodi💘 9352852248 Good Looking standard Profil...
 
infant assessment fdbbdbdddinal ppt.pptx
infant assessment fdbbdbdddinal ppt.pptxinfant assessment fdbbdbdddinal ppt.pptx
infant assessment fdbbdbdddinal ppt.pptx
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Editorial design Magazine design project.pdf
Editorial design Magazine design project.pdfEditorial design Magazine design project.pdf
Editorial design Magazine design project.pdf
 
2-tool presenthdbdbdbdbddhdhddation.pptx
2-tool presenthdbdbdbdbddhdhddation.pptx2-tool presenthdbdbdbdbddhdhddation.pptx
2-tool presenthdbdbdbdbddhdhddation.pptx
 
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...
 
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
(AISHA) Ambegaon Khurd Call Girls Just Call 7001035870 [ Cash on Delivery ] P...
(AISHA) Ambegaon Khurd Call Girls Just Call 7001035870 [ Cash on Delivery ] P...(AISHA) Ambegaon Khurd Call Girls Just Call 7001035870 [ Cash on Delivery ] P...
(AISHA) Ambegaon Khurd Call Girls Just Call 7001035870 [ Cash on Delivery ] P...
 
Call Girls in Kalkaji Delhi 8264348440 call girls ❤️
Call Girls in Kalkaji Delhi 8264348440 call girls ❤️Call Girls in Kalkaji Delhi 8264348440 call girls ❤️
Call Girls in Kalkaji Delhi 8264348440 call girls ❤️
 
call girls in Dakshinpuri (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️
call girls in Dakshinpuri  (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️call girls in Dakshinpuri  (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️
call girls in Dakshinpuri (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️
 
The history of music videos a level presentation
The history of music videos a level presentationThe history of music videos a level presentation
The history of music videos a level presentation
 
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdfThe_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
 
Escorts Service Basapura ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Basapura ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Basapura ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Basapura ☎ 7737669865☎ Book Your One night Stand (Bangalore)
 
Stark Industries Marketing Plan (1).pptx
Stark Industries Marketing Plan (1).pptxStark Industries Marketing Plan (1).pptx
Stark Industries Marketing Plan (1).pptx
 
Chapter 19_DDA_TOD Policy_First Draft 2012.pdf
Chapter 19_DDA_TOD Policy_First Draft 2012.pdfChapter 19_DDA_TOD Policy_First Draft 2012.pdf
Chapter 19_DDA_TOD Policy_First Draft 2012.pdf
 
VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...
VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...
VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...
 

Privacy By Designer (PHP.ghent)

  • 1. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Privacy by Designer PRACTICAL CONSIDERATIONS ON UX DESIGN FOR TRUST
  • 2. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken “In God we trust all others bring data.” - William Edwards Deming
  • 3. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken We all live in the Age of Context SHAPED BY MOBILE, SOCIAL MEDIA, DATA, SENSORS AND LOCATION-BASED SERVICES
  • 4. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Users expect Personalistation & Personal EXPERIENCES FOR THE ‘MOST PERSONAL DEVICE EVER’ ARE.. RELEVANT are you engaging at the right moment? GLANCEABLE can you deliver value in milliseconds? PERSONAL do you approach people in the right manner?
  • 5. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken No other Apple device has ever been so connected to the wearer. It is important to be mindful of this connection. Apple Watch Human Interface Design Guidelines, 2015
  • 6. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Machine-to-human relationships are now about human-to-human values UNDERSTANDING PERSONALISATION H2H M2H TRUST PRIVACY
  • 7. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken The Privacy Challenge CONCERN ABOUT PRIVACY JUMPED 5 POINTS BETWEEN 2014 AND 2015. 2nd Annual Poll on How Personal Technology is Changing our Lives - January 2015, Microsoft
  • 8. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Loss of control PRIVACY CHALLENGE USER  POINT  OF  VIEW 91% of adults ‘agree’ or ‘strongly agree’ that consumers have lost control over how personal information is collected and used by companies. Pew Research Privacy Panel Survey, January 2014
  • 9. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Lack of Transparency PRIVACY CHALLENGE USER  POINT  OF  VIEW People are fearful of sharing their data largely because companies and government have not been good at clearly explaining how they use it. Data Dialog, Demos 2012
  • 10. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Lack of Knowledge(aka Privacy and PETs are ‘too difficult’) PRIVACY CHALLENGE USER  POINT  OF  VIEW 54% believe it would be “somewhat” or “very” difficult to find tools and strategies that would help them be more private online and in using their cell phones  13% unaware about search engines that do not keep track of a user’s search history 31% unaware email encryption programs such as PGP exist 31% unaware of privacy-enhancing browser plug-ins 39% unaware about anonymity software such as Tor Pew Research, 2015
  • 11. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Everyday privacy measures that do catch on ON THE BRIGHT SIDE LESS TECHNICAL WAYS OF OBTING OUT OF DATA COLLECTION Clearing cookies or browser history: 59% Refusing to provide information about themselves that wasn’t relevant to the transaction: 57% Set their browser to disable or turn off cookies: 34% Deleted or edited something they posted in the past: 29% Used a temporary username or email address: 25% Giving inaccurate or misleading information about themselves: 24% Decided not to use a website because they asked for their real name: 23% Used a public computer to browse anonymously: 12% Asked someone to remove something that was posted about themselves online: 11%
  • 12. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken the Facebook paradox • 91% of adults feel consumers have lost control over how personal information is collected and used by companies. • 58% of the entire adult population (and 71% of internet users) is on Facebook.
  • 13. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Privacy VS. User Experience #FALSE – HOW DO YOU DEFINE A BETTER PRODUCT? CONTEXT? DATA QUALITY? The truth is that collecting information about people allows you to make significantly better products and the more information you collect, the better products you can build . Dustin Curtis, “Privacy VS. User Experience” (2014)
  • 14. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Privacy is a fundamental component of the product experience BUSINESSES CAN DELIVER A GRAND USER EXPERIENCE AND TREMENDOUS VALUE ONLY IF THEY SAFEGUARD THEIR USERS’ PRIVACY AND SECURITY BUSINESS VALUE CONSUMER VALUE PRIVACY GREAT UX personalisation
  • 15. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Being credible BEING CREDIBLE HAS ALWAYS BEEN IMPORTANT FOR A GOOD USER EXPERIENCE useful usable desirable credible valuable findable accessible User Experience Honeycomb (Peter Morville) CREDIBILITY 2004 the information you present to users CREDIBILITY 2015 taking responsibility to keep personal data safe
  • 16. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Privacy by designer DELIVER BOTH PERSONALISATION AND TRUST We owe it to both our users and the people who hire us to actively think about privacy, and to implement privacy in the flows and designs we deliver. B. We need to deliver trustworthy products. A. We need to deliver great, personal experiences.
  • 17. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken What is Privacy? PRIVACY IS BROAD PRIVACY IS A RIGHT PRIVACY IS NOT DEAD Personal Data • The Universal Declaration of Human Rights (Art 12) • Europe: Directive 95/46/EC • Belgium: Privacy Act (1992, 1998 & KBs) • Telecommunication law • … LAWS AND SUCH European Privacy Watchdogs & Facebook GDPR New EU legislation in the works “If data is the new oil, privacy is the new green.” …
  • 18. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Any information This is not limited to data regarding a an individual’s privacy, also relating to a person's professional or public life. Eg. name, a picture, a telephone number (professional number too), a code, a bank account number, an e-mail address, a fingerprint, … . PERSONAL DATA IS ANY INFORMATION (RELATING TO)* AN IDENTIFIED OR IDENTIFIABLE NATURAL PERSON * OFTEN DEPENDS ON CONTEXT •  Object data vs personal data (eg license plate) •  Unique biometric data is always personal data (eg fingerpint, DNA) DATA SUBJECT PERSONAL DATA RELATES TO
  • 19. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Identifiable evolves IDENTIFIABILITY = WHEN VALUE > COST value of knowing cost of identifying
  • 20. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken IP address AN IP ADDRESS ON ITSELF WILL UNDER THE GDPR NO LONGER BE ‘PERSONAL DATA’ BY DEFAULT (UNLESS YOU ARE AN ISP)
  • 21. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Counter measures Not personal information when measures are taken which reasonably rule out identification of a person •  Anonymisation •  Key-coded data (clinical research) •  Data masking/obfuscation (for development) •  Granularity
  • 22. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Beware: location Special data which under the GDPR will require extra safety measures (as is data on children) avoid when possible geohashes coarse location
  • 23. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Stay clear: sensitive data •  race •  political opinions •  religious or philosophical beliefs •  trade-union membership •  health •  sex life •  prosecutions or criminal or administrative convictions Prohibited to collect, register or ask to disclose. (exceptions apply, but then additional safeguards are required)
  • 24. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken What about republication? Photographs and personal information published online may only be re-used if given consent. •  different context •  different purpose => context & purpose apply to recycling as well (In case of scraping, copyright and database law are relevant too.)
  • 25. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Your responsibilities as Controller •  Ensure the quality of the data The data being processed have to be exact and, if necessary, kept up-to- date •  Ensure the confidentiality of the data Responsibility to inform and make sure that the individuals working under his authority only have access to and make use of the data they need to perform their duties •  Ensure the protection of the data From unwanted internal or external curiosity, as well as from unauthorised processing operations. Security measures can be organizational (restriction of the number of individuals having access to the data, use of access codes, locking offices with computers and data files, etc.) and technical. (!) The more sensitive the data and the higher the risks for the data subject are, the more precautions have to be taken. (see ‘information security’ on privacycommission.be) •  Erasure of data Personal data must not be kept in a form allowing for identification of the data subjects any longer than necessary for the purpose aimed at. + BEFORE PROCESSING OF DATA: NOTIFICATION
  • 26. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken In case of breach CONSIDER A BREACH LIKELY – AND PREPARE ACCORDINGLY •  Do not play the victim •  Be accountable •  Take ownership •  Express regaret 1. What happened? (tell what you know at that time) crisis communications (works for downtime communication too) 2. What is being done *NOW*? (investigate, take systems offline, ..) 3. How does this affect your customers? (both short- and long term) 4. What are you doing to minimize risk? What can your customers do? 5. How do people get more information or updates? (folluw up) 6. What are you doing prevent this from happening again?
  • 27. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Design for explicit OPT-IN & COOKIELAW By signing this contract, you agree we have the right to collect and pass on all your information. In case you do not want your bank to pass on your credit information to third partners and other divisions, please write ‘I do not agree’ on the contract and hand it over to the person behind the till. EXPLICIT EXPLICIT NOT EXPLICIT (hidden opt-out) NO YES IF YOU AGREE, PLEASE CHECK THIS BOX:
  • 28. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Design for informed NO SURPRISES
  • 29. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Design for choice CONSENT In your designs and flows, take into account both having and not having the data. Design personalized experiences for when you have data. Design good alternatives for not having the data. Today will be sunny Weather for Olen, Belgium where we know you live. Check out the weather! Antwerpen
  • 30. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Privacy as a Trading Function? Customer Data: Designing for Transparancy and Trust – by Timothy Morey, Theodore Forbath, And Allison Schoop, May 2015 (Harvard Business Review)
  • 31. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Design for trust CLEAR & CONSISTENT, SO PEOPLE CAN TRUST YOU TO POINT OUT PRIVACY RELATED FEATURES & SETTINGS.
  • 32. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken The EU prosed icons: privacy-by- design taken too literal (how’s that for creepiness factor?)
  • 33. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Design for because EXPLAIN YOUR MAGIC When users know of the existence of a certain algorithm, their satisfaction with the product increases over time , probably as they start to understand its workings better. Yet when they discovered an algorithm they were previously unaware of, users felt betrayed.
  • 34. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Design for because EXPLAIN YOUR MAGIC When users know of the existence of a certain algorithm, their satisfaction with the product increases over time , probably as they start to understand its workings better. Yet when they discovered an algorithm they were previously unaware of, users felt betrayed. WORST CASE SCENARIO “In the extreme case, it may be that whenever a software developer in Menlo Park adjusts a parameter, someone somewhere wrongly starts to believe themselves to be unloved. ” – Eslami et all.
  • 35. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Because allows people to correct you when you are wrong. Something we best figure out before algorithms get to act on our behalf.
  • 36. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Design for transparency Show people their data selfs If we are going to allow algorithms and expert rules to steer our behaviour, we must know they understand that correctly. Allow for: -  Correction -  Reset
  • 37. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Reflect all data collected in functionality
  • 38. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Design for forming secure habits BURNER ACCOUNTS Kinja introduced these for anonymous commenting. They made private keys understandable through metaphor. “…if you lose the burner key initially issued we will not be able to retrieve this information for you or reset the account. Save your key.”
  • 39. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken REWARD SECURE BEHAVIOUR Users that enable two-step security on their accounts will now receive a 10% discount off their monthly bill Mailchimp bill.
  • 40. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Design to encourage privacy ACCESS DURATION People forget to ‘revoke’ things. Supply limited time access options: WeChat: location discoverable for 10 minutes (default) LinkedIn: access duration settings (weeks -> months -> years)
  • 41. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Design for an exit MAKE IT EASY TO LEAVE BUT CONVINCE THEM TO STAY Think about WHY people are leaving, and offer alternatives. “snooze” services less-email-option reset profile/account .. (and remember data portability!)
  • 42. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken Do you want to know if your friends are (action/mood/..) ? Do you want your friends to know if you are (action/ mood/..) ? Don’t allowOK Design with peer-to-peer privacy in mind. Ask the right question: not do you want to see, but are you willing for others to see..
  • 43. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken When in doubt… STEP 1: ASK YOUR USER – PRIVACY DOES NOT BENEFIT FROM A “DO FIRST ASK FORGIVENESS LATER” STRATEGY Build it so a user always has the option to tell you to go bugger off.
  • 44. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken When in doubt… STEP 2: USE COMMON SENSE AND AS LITTLE DATA AS POSSIBLE PERSONAL DATA Less is more: in quantity and detail, but also in time
  • 45. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken i!When in doubt… STEP 3: ASK THE EXPERTS Belgian Privacy Commission www.privacycommission.be Article 29 Working Party Opinions & recommendations
  • 46. Privacy-by-designer: Practical Considerations on UX Design for Trust by Ann Wuyts at PHP.ghentwww.keek.be @vintfalken We influence what is acceptable. So let’s make good, proportional stuff.