SlideShare une entreprise Scribd logo
1  sur  18
Télécharger pour lire hors ligne
7 April 2016
Hervé Le Jouan - Founder &
CEO herve@privowny.com
Proprietary & confidential
Privowny
Own your privacy
Empowered Consumers will enable Trust and
Engagement
Privowny, Inc.
www.privowny.com
Privowny
Context
Proprietary & confidential
Privowny
Context
Personal Data: an un-precedent opportunity
Proprietary & confidential
Cisco forecasts
50 Billion connected objects
by 2020 – IDC forecasts 212 Billion!
68% of all data is
created by individuals
Increased value
Personalization
New services
Real time
Easy to access
Automation
Ubiquity
Anticipation
Open data
Public
Private
∞
∞ ∞
∞
∞
∞
∞
∞
∞
∞
∞
∞
∞
2005
2010
2012
2015
2020
130
1227
2837
8591
40026
The Digital Universe in Exaoctets
(billions of Gigaoctets). Source IDC Dec 2012
« €440 billion is at risk if stakeholders fail to
establish a trusted flow of personal data »*
€1 Trillion
€315 Billion
2011 2020
Privowny
Context
Personal Data Value Market
*Source: BCG 2012 report - “THE VALUE OF OUR
DIGITALIDENTITY”
Proprietary & confidential
Privowny
Context
Proprietary & confidential
Big data is the new norm
Any native digital company
may be a competitor
From identity theft to data breaches
Consumer data is vulnerable
and companies are liable
A challenging regulatory environment
Global brands have to comply with every jurisdiction that
they operate within
Loyalty is under pressure
A customer can change most of its
service providers in a few click
Privowny
Context
The Risk is everywhere
Privowny
Context
Proprietary & confidential
Privowny
Context
Who is controlling our key services?
Social
E-commerce
Payment
Cloud
ISPs /Telcos
Search
Mail
Third party
Ad Exchanges
Web
Apps
Content
TRACKERS
ISPs /Telcos
Devices
Connected Objects
(IoT)
Privowny
Context
Proprietary & confidential
ISPs /Telcos
Home
CarIoT
ISPs /Telcos
EducationWork
Health
Payment
Privowny
Context
Our footprint is are gathered and distributed
across few big players
Privowny
Context
For brand capital
For acceptance
For engagement
For loyalty
Clients’ Trust is Key
Proprietary & confidential
Privowny
Is there a solution?
Proprietary & confidential
Privowny
Our solution
Proprietary & confidential
Our Vision
Empower consumers to protect themselves, control
their data and their privacy
Offer companies to manage data responsibly and
ethically
Privowny
Our solution
Proprietary & confidential
Our Vision
User Personal
Data Store
BRAND B
.
.
.
A Consumer Centric Approach
BRAND A
Authentication
Push data held by brands
Access to personal data with
user permission
Give and Revoke consent
Right to be forgotten
Data update(s)
Limits on data retention
Control & protect
Interactions with devices
What is important (identity, …)
What is left
What is shared
…
Privowny
Our solution
Proprietary & confidential
Everyone wins
Companies
• Manage consumers’ data responsibly and ethically
• Communication: Transparency as a foundation to enhance brand value
• Increase Clients acquisition, engagement, loyalty and trust
• Enhance Clients insight (for sales, marketing, research, development)
• Stay on the right side of regulation & oversight
• New business models
Clients
• Empowerment and Emancipation – marketplace control for the first time (personal data control
permission management, data monetization, ...)
• Relevance : reduce/eliminate uninvited engagements
• Economic exchange/reward for attention and data
Society
• Meet the requirements expressed by regulators and think tanks for a service that puts individuals
in capacity to manage their data
• Reduce waste of unsolicited direct marketing, advertising, promotions, ...
Privowny
Use Cases
Proprietary & confidential
Brand
Marie is worry about her privacy on Internet ! Mary accepted to share
her personal data to get offers.
What this brand knows
about me ?
I appreciate their transparence.
I can Trust them.
Now I control my data.
I like to be listened :-)
You will be able to track that
engagement in your dashboard
my
profile
my
consumption
my
preferences
This brand would like to
share your preferences with
their trusted partners and
suggest to you some offers.
Benefits: ...
duration :
...
Do you
accept?
Company 1
Company 2
Company 3
YES
?
DATA
SHARE
Bring Transparency and offer Data Privacy Services
• Bring Clients’ relationship and engagement at the next level by helping them to visualize and manage their data online.
Unlock Big Data usage
• Access and use clients’ data using a permission platform giving full visibility and control to clients
Proprietary & confidential
Privowny
Use cases
A balanced relationship
Company 1
Company 2
Company 3
Company 4
…
Here is the list of
companies you have
your left your previous
address to. Check the
ones you want to
update.
We confirm you
that your new
address has been
updated for these
companies
Hello !
It seems you have moved
as we have detected you
enter a new address while
registering on
websites/Mobile Apps
YES
MOVE DETECTION DATA UPDATE PROCESS
Data update
Proprietary & confidential
Privowny
Use cases
As people are updating some of their core profile data, we could detect that and propose
them to push updates to a list of companies of their choice
Eventually, if some companies are ready to pay for data updates, we could propose users
the offering as they would be incentivized
Thanks! I can update my personal data
from one place and keep it under
control
We confirm you that your
data have been deleted
from those companies
databases
Hello !
You have 3 accounts on companies
that you did not visit not used their
mobile Apps since 6 months. Do you
want to delete those accounts?
DATA DELETION PROCESS
Right to be forgotten
Proprietary & confidential
Privowny
Use cases
As people are no longer using some websites/Apps, after a certain period, we could
• alert them
• remind them that they have left such or such information
• propose them to require the deletion of their data
They could also require some data deletion from their account at any time – provided that
they have the rights to ask for it
Thanks! I can control who has my data
and decide if they can keep it
ALERT NON USED ACCOUNTS
I have a lot of accounts that
I am not any longer using
As I am surfing or using
mobile Apps, I am
notified and can decide
to delete my data
Privowny
Proprietary & confidential
Créée en décembre 2002, la Mobile Marketing Association France a pour mission première
d’accélérer la transformation et l’innovation du Marketing grâce au Mobile.
Elle regroupe aujourd’hui + 115 membres : agence conseils, annonceurs, régies, prestataires,
instituts de mesure, opérateurs Mobiles.
La Mobile Marketing Association France est la seule association en France, internationale,
dédiée au Marketing, à la publicité, au CRM et au Commerce sur Mobile et tablette en
France.
La Mobile Marketing Association est une organisation mondiale qui compte plus de 800
sociétés membres au travers de 50 pays dans le monde.
Plus d’info : www.mmaf.fr
Vie privée et code de déontologie – Mobile
Marketing Association France
Privowny
Herve Le Jouan, CEO
herve@privowny.com
www.privowny.com
@privowny @hervelj
Proprietary & confidential
Privowny empowers Individuals, enables Trust,
while creating value for Companies
THANK YOU

Contenu connexe

Tendances

Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Ray Bugg
 
NoHidingInTheCloud
NoHidingInTheCloudNoHidingInTheCloud
NoHidingInTheCloudJoan Ross
 
Scot Secure 2019 Edinburgh (Day 1)
Scot Secure 2019 Edinburgh (Day 1)Scot Secure 2019 Edinburgh (Day 1)
Scot Secure 2019 Edinburgh (Day 1)Ray Bugg
 
Transitioning to a Digital Enterprise - Dan Hushon News Release
Transitioning to a Digital Enterprise -  Dan Hushon News ReleaseTransitioning to a Digital Enterprise -  Dan Hushon News Release
Transitioning to a Digital Enterprise - Dan Hushon News ReleaseIT Network marcus evans
 
ChainGang Webinar - Blockchain & Insurance: The end, or just the beginning?
ChainGang Webinar - Blockchain & Insurance: The end, or just the beginning?ChainGang Webinar - Blockchain & Insurance: The end, or just the beginning?
ChainGang Webinar - Blockchain & Insurance: The end, or just the beginning?The Digital Insurer
 
CIO Digest - Entrepreneurial IT
CIO Digest - Entrepreneurial ITCIO Digest - Entrepreneurial IT
CIO Digest - Entrepreneurial ITschemmel
 
Automating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UKAutomating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UKHappiest Minds Technologies
 
Insurance digital transformation - key challenges
Insurance   digital transformation - key challengesInsurance   digital transformation - key challenges
Insurance digital transformation - key challengesArif Mohammed
 
Rob Livingstone Advisory - The risks of a fractured cloud strategy within th...
Rob Livingstone Advisory  - The risks of a fractured cloud strategy within th...Rob Livingstone Advisory  - The risks of a fractured cloud strategy within th...
Rob Livingstone Advisory - The risks of a fractured cloud strategy within th...Livingstone Advisory
 
Symantec's London vision 2014 event more details emerge on the company split
Symantec's London vision 2014 event more details emerge on the company splitSymantec's London vision 2014 event more details emerge on the company split
Symantec's London vision 2014 event more details emerge on the company splitLluis Altes
 
Tripwire PCI Customer Success Stories
Tripwire PCI Customer Success StoriesTripwire PCI Customer Success Stories
Tripwire PCI Customer Success StoriesLOGON Software
 
ScotSecure 2020
ScotSecure 2020ScotSecure 2020
ScotSecure 2020Ray Bugg
 
Deloitte stay ahed of the game
Deloitte stay ahed of the gameDeloitte stay ahed of the game
Deloitte stay ahed of the gameFranco Ferrario
 
Cybersecurity Snapshot December_2019
Cybersecurity Snapshot December_2019Cybersecurity Snapshot December_2019
Cybersecurity Snapshot December_2019Andreas M. Oswald
 
Cybersecurity-Anforderungen in IT-Sourcing-Projekten meistern – Ein Leitfaden...
Cybersecurity-Anforderungen in IT-Sourcing-Projekten meistern – Ein Leitfaden...Cybersecurity-Anforderungen in IT-Sourcing-Projekten meistern – Ein Leitfaden...
Cybersecurity-Anforderungen in IT-Sourcing-Projekten meistern – Ein Leitfaden...Capgemini
 
Technology Innovation Trends In Insurance | Navdeep Arora
Technology Innovation Trends In Insurance | Navdeep Arora Technology Innovation Trends In Insurance | Navdeep Arora
Technology Innovation Trends In Insurance | Navdeep Arora Navdeep Arora
 
PowerPoint presentation
PowerPoint presentationPowerPoint presentation
PowerPoint presentationwebhostingguy
 
Data Protection Scotland Summit 2019
Data Protection Scotland Summit 2019Data Protection Scotland Summit 2019
Data Protection Scotland Summit 2019Ray Bugg
 

Tendances (20)

Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)
 
NoHidingInTheCloud
NoHidingInTheCloudNoHidingInTheCloud
NoHidingInTheCloud
 
Scot Secure 2019 Edinburgh (Day 1)
Scot Secure 2019 Edinburgh (Day 1)Scot Secure 2019 Edinburgh (Day 1)
Scot Secure 2019 Edinburgh (Day 1)
 
Transitioning to a Digital Enterprise - Dan Hushon News Release
Transitioning to a Digital Enterprise -  Dan Hushon News ReleaseTransitioning to a Digital Enterprise -  Dan Hushon News Release
Transitioning to a Digital Enterprise - Dan Hushon News Release
 
ChainGang Webinar - Blockchain & Insurance: The end, or just the beginning?
ChainGang Webinar - Blockchain & Insurance: The end, or just the beginning?ChainGang Webinar - Blockchain & Insurance: The end, or just the beginning?
ChainGang Webinar - Blockchain & Insurance: The end, or just the beginning?
 
CIO Digest - Entrepreneurial IT
CIO Digest - Entrepreneurial ITCIO Digest - Entrepreneurial IT
CIO Digest - Entrepreneurial IT
 
Automating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UKAutomating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UK
 
Insurance digital transformation - key challenges
Insurance   digital transformation - key challengesInsurance   digital transformation - key challenges
Insurance digital transformation - key challenges
 
Rob Livingstone Advisory - The risks of a fractured cloud strategy within th...
Rob Livingstone Advisory  - The risks of a fractured cloud strategy within th...Rob Livingstone Advisory  - The risks of a fractured cloud strategy within th...
Rob Livingstone Advisory - The risks of a fractured cloud strategy within th...
 
Symantec's London vision 2014 event more details emerge on the company split
Symantec's London vision 2014 event more details emerge on the company splitSymantec's London vision 2014 event more details emerge on the company split
Symantec's London vision 2014 event more details emerge on the company split
 
Tripwire PCI Customer Success Stories
Tripwire PCI Customer Success StoriesTripwire PCI Customer Success Stories
Tripwire PCI Customer Success Stories
 
ScotSecure 2020
ScotSecure 2020ScotSecure 2020
ScotSecure 2020
 
Deloitte stay ahed of the game
Deloitte stay ahed of the gameDeloitte stay ahed of the game
Deloitte stay ahed of the game
 
Women in Technology Leadership
Women in Technology LeadershipWomen in Technology Leadership
Women in Technology Leadership
 
Cybersecurity Snapshot December_2019
Cybersecurity Snapshot December_2019Cybersecurity Snapshot December_2019
Cybersecurity Snapshot December_2019
 
Cybersecurity-Anforderungen in IT-Sourcing-Projekten meistern – Ein Leitfaden...
Cybersecurity-Anforderungen in IT-Sourcing-Projekten meistern – Ein Leitfaden...Cybersecurity-Anforderungen in IT-Sourcing-Projekten meistern – Ein Leitfaden...
Cybersecurity-Anforderungen in IT-Sourcing-Projekten meistern – Ein Leitfaden...
 
Technology Innovation Trends In Insurance | Navdeep Arora
Technology Innovation Trends In Insurance | Navdeep Arora Technology Innovation Trends In Insurance | Navdeep Arora
Technology Innovation Trends In Insurance | Navdeep Arora
 
PowerPoint presentation
PowerPoint presentationPowerPoint presentation
PowerPoint presentation
 
The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019
 
Data Protection Scotland Summit 2019
Data Protection Scotland Summit 2019Data Protection Scotland Summit 2019
Data Protection Scotland Summit 2019
 

En vedette

Protéger ses données: mission impossible?
Protéger ses données: mission impossible?Protéger ses données: mission impossible?
Protéger ses données: mission impossible?Antoine Vigneron
 
Protéger ses données: mission impossible?
Protéger ses données: mission impossible?Protéger ses données: mission impossible?
Protéger ses données: mission impossible?Antoine Vigneron
 
L'informatique et la fraude Aix-en-Provence
L'informatique et la fraude   Aix-en-ProvenceL'informatique et la fraude   Aix-en-Provence
L'informatique et la fraude Aix-en-ProvenceAntoine Vigneron
 
Le risque informatique et sa dimension juridique
Le risque informatique et sa dimension juridiqueLe risque informatique et sa dimension juridique
Le risque informatique et sa dimension juridiqueAntoine Vigneron
 
Galtier Concilier securite et simplicite
Galtier Concilier securite et simpliciteGaltier Concilier securite et simplicite
Galtier Concilier securite et simpliciteAntoine Vigneron
 
Relever le défi SI de la transformation numérique en Europe
Relever le défi SI de la transformation numérique en EuropeRelever le défi SI de la transformation numérique en Europe
Relever le défi SI de la transformation numérique en EuropeAntoine Vigneron
 
Paiement mobile et biométrie, deux piliers de la transformation digitale
Paiement mobile et biométrie, deux piliers de la transformation digitalePaiement mobile et biométrie, deux piliers de la transformation digitale
Paiement mobile et biométrie, deux piliers de la transformation digitaleAntoine Vigneron
 
Cybersécurité, IOT automobile et aéronautique
Cybersécurité, IOTautomobile et aéronautiqueCybersécurité, IOTautomobile et aéronautique
Cybersécurité, IOT automobile et aéronautiqueAntoine Vigneron
 
CFAO Concilier securité et simplicite
CFAO Concilier securité et simpliciteCFAO Concilier securité et simplicite
CFAO Concilier securité et simpliciteAntoine Vigneron
 
Les ECNi : une transformation numérique réussie
Les ECNi : une transformation numérique réussieLes ECNi : une transformation numérique réussie
Les ECNi : une transformation numérique réussieAntoine Vigneron
 
Les enjeux de la transformation numérique
Les enjeux de la transformation numériqueLes enjeux de la transformation numérique
Les enjeux de la transformation numériqueAntoine Vigneron
 
Gouvernance et architecture des données - Groupe PSA
Gouvernance et architecture des données - Groupe PSAGouvernance et architecture des données - Groupe PSA
Gouvernance et architecture des données - Groupe PSAAntoine Vigneron
 
IoT, Sécurité et Santé: un cocktail détonnant ?
IoT, Sécurité et Santé: un cocktail détonnant ?IoT, Sécurité et Santé: un cocktail détonnant ?
IoT, Sécurité et Santé: un cocktail détonnant ?Antoine Vigneron
 
Cybercriminalité: menaces et parades
Cybercriminalité: menaces et paradesCybercriminalité: menaces et parades
Cybercriminalité: menaces et paradesAntoine Vigneron
 
Jeudi de l AFAI - Transformations de la cybersécurité
Jeudi de l AFAI - Transformations de la cybersécuritéJeudi de l AFAI - Transformations de la cybersécurité
Jeudi de l AFAI - Transformations de la cybersécuritéAntoine Vigneron
 
Jeudi de l AFAI - Evolutions des menaces et adaptation des SOC
Jeudi de l AFAI - Evolutions des menaces et adaptation des SOCJeudi de l AFAI - Evolutions des menaces et adaptation des SOC
Jeudi de l AFAI - Evolutions des menaces et adaptation des SOCAntoine Vigneron
 
DSBrowser Concilier securité et simplicite
DSBrowser Concilier securité et simpliciteDSBrowser Concilier securité et simplicite
DSBrowser Concilier securité et simpliciteAntoine Vigneron
 
IFACI, Gestion de crise et continuité d'activité - 21 mai 2015
IFACI, Gestion de crise et continuité d'activité - 21 mai  2015IFACI, Gestion de crise et continuité d'activité - 21 mai  2015
IFACI, Gestion de crise et continuité d'activité - 21 mai 2015Antoine Vigneron
 

En vedette (20)

Protéger ses données: mission impossible?
Protéger ses données: mission impossible?Protéger ses données: mission impossible?
Protéger ses données: mission impossible?
 
Protéger ses données: mission impossible?
Protéger ses données: mission impossible?Protéger ses données: mission impossible?
Protéger ses données: mission impossible?
 
L'informatique et la fraude Aix-en-Provence
L'informatique et la fraude   Aix-en-ProvenceL'informatique et la fraude   Aix-en-Provence
L'informatique et la fraude Aix-en-Provence
 
Le risque informatique et sa dimension juridique
Le risque informatique et sa dimension juridiqueLe risque informatique et sa dimension juridique
Le risque informatique et sa dimension juridique
 
Galtier Concilier securite et simplicite
Galtier Concilier securite et simpliciteGaltier Concilier securite et simplicite
Galtier Concilier securite et simplicite
 
Relever le défi SI de la transformation numérique en Europe
Relever le défi SI de la transformation numérique en EuropeRelever le défi SI de la transformation numérique en Europe
Relever le défi SI de la transformation numérique en Europe
 
Paiement mobile et biométrie, deux piliers de la transformation digitale
Paiement mobile et biométrie, deux piliers de la transformation digitalePaiement mobile et biométrie, deux piliers de la transformation digitale
Paiement mobile et biométrie, deux piliers de la transformation digitale
 
Cybersécurité, IOT automobile et aéronautique
Cybersécurité, IOTautomobile et aéronautiqueCybersécurité, IOTautomobile et aéronautique
Cybersécurité, IOT automobile et aéronautique
 
CFAO Concilier securité et simplicite
CFAO Concilier securité et simpliciteCFAO Concilier securité et simplicite
CFAO Concilier securité et simplicite
 
Les ECNi : une transformation numérique réussie
Les ECNi : une transformation numérique réussieLes ECNi : une transformation numérique réussie
Les ECNi : une transformation numérique réussie
 
Cloud and compliance REX
Cloud and compliance REXCloud and compliance REX
Cloud and compliance REX
 
Les enjeux de la transformation numérique
Les enjeux de la transformation numériqueLes enjeux de la transformation numérique
Les enjeux de la transformation numérique
 
Gouvernance et architecture des données - Groupe PSA
Gouvernance et architecture des données - Groupe PSAGouvernance et architecture des données - Groupe PSA
Gouvernance et architecture des données - Groupe PSA
 
IoT, Sécurité et Santé: un cocktail détonnant ?
IoT, Sécurité et Santé: un cocktail détonnant ?IoT, Sécurité et Santé: un cocktail détonnant ?
IoT, Sécurité et Santé: un cocktail détonnant ?
 
Cybercriminalité: menaces et parades
Cybercriminalité: menaces et paradesCybercriminalité: menaces et parades
Cybercriminalité: menaces et parades
 
Jeudi de l AFAI - Transformations de la cybersécurité
Jeudi de l AFAI - Transformations de la cybersécuritéJeudi de l AFAI - Transformations de la cybersécurité
Jeudi de l AFAI - Transformations de la cybersécurité
 
Jeudi de l AFAI - Evolutions des menaces et adaptation des SOC
Jeudi de l AFAI - Evolutions des menaces et adaptation des SOCJeudi de l AFAI - Evolutions des menaces et adaptation des SOC
Jeudi de l AFAI - Evolutions des menaces et adaptation des SOC
 
DSBrowser Concilier securité et simplicite
DSBrowser Concilier securité et simpliciteDSBrowser Concilier securité et simplicite
DSBrowser Concilier securité et simplicite
 
CAMERA
CAMERACAMERA
CAMERA
 
IFACI, Gestion de crise et continuité d'activité - 21 mai 2015
IFACI, Gestion de crise et continuité d'activité - 21 mai  2015IFACI, Gestion de crise et continuité d'activité - 21 mai  2015
IFACI, Gestion de crise et continuité d'activité - 21 mai 2015
 

Similaire à Protéger ses données: mission impossible?

Noggin - World's first marketplace for Personal Data
Noggin - World's first marketplace for Personal DataNoggin - World's first marketplace for Personal Data
Noggin - World's first marketplace for Personal DataNoggin Asia
 
What Is the Future of Data Sharing? - Consumer Mindsets and the Power of Brands
What Is the Future of Data Sharing? - Consumer Mindsets and the Power of BrandsWhat Is the Future of Data Sharing? - Consumer Mindsets and the Power of Brands
What Is the Future of Data Sharing? - Consumer Mindsets and the Power of BrandsDavid Rogers
 
A Marketer's Dilemma - Collecting Data Without Paying Fines.pdf
A Marketer's Dilemma - Collecting Data Without Paying Fines.pdfA Marketer's Dilemma - Collecting Data Without Paying Fines.pdf
A Marketer's Dilemma - Collecting Data Without Paying Fines.pdfAdzappier
 
Lay of the Land for All Things Privacy
Lay of the Land for All Things PrivacyLay of the Land for All Things Privacy
Lay of the Land for All Things PrivacyTinuiti
 
Organizational Privacy Score and Big Data Privacy Guidelies July 17 2014 - ...
Organizational Privacy Score   and Big Data Privacy Guidelies July 17 2014 - ...Organizational Privacy Score   and Big Data Privacy Guidelies July 17 2014 - ...
Organizational Privacy Score and Big Data Privacy Guidelies July 17 2014 - ...Rajesh Jayaprakash
 
Data Driven Marketing: the DNA of customer orientated companies
Data Driven Marketing: the DNA of customer orientated companiesData Driven Marketing: the DNA of customer orientated companies
Data Driven Marketing: the DNA of customer orientated companiesGood Rebels
 
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad ModelGDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad ModelAbhijeet Kelkar
 
Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Catapult
 
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...MicheleNati
 
Managing and sharing customer data
Managing and sharing customer dataManaging and sharing customer data
Managing and sharing customer dataSHARATH P G
 
Data-Privacy-and-Ethics-in-Digital-Marketing
Data-Privacy-and-Ethics-in-Digital-MarketingData-Privacy-and-Ethics-in-Digital-Marketing
Data-Privacy-and-Ethics-in-Digital-MarketingBiswadeep Das
 
Webinar Deck: Building Customer Relationships in an Omni-Channel World
Webinar Deck: Building Customer Relationships in an Omni-Channel WorldWebinar Deck: Building Customer Relationships in an Omni-Channel World
Webinar Deck: Building Customer Relationships in an Omni-Channel WorldEnsighten
 
Protéger ses données personnelles dans un environnement multi-device: un enje...
Protéger ses données personnelles dans un environnement multi-device: un enje...Protéger ses données personnelles dans un environnement multi-device: un enje...
Protéger ses données personnelles dans un environnement multi-device: un enje...Ensighten
 
Guarding and Growing Personal Data Value
Guarding and Growing Personal Data ValueGuarding and Growing Personal Data Value
Guarding and Growing Personal Data Valueaccenture
 
How is channel marketing evolving now that the value of consumer data is more...
How is channel marketing evolving now that the value of consumer data is more...How is channel marketing evolving now that the value of consumer data is more...
How is channel marketing evolving now that the value of consumer data is more...Grace Russell
 
Omni channel basics for retailers and CPG Manufacturers
Omni channel basics for retailers and CPG ManufacturersOmni channel basics for retailers and CPG Manufacturers
Omni channel basics for retailers and CPG ManufacturersJanet Dorenkott
 
Increase Customer Engagement with Personalization
Increase Customer Engagement with PersonalizationIncrease Customer Engagement with Personalization
Increase Customer Engagement with PersonalizationNG DATA
 

Similaire à Protéger ses données: mission impossible? (20)

Mobile and Digital Innovation in Loyalty
Mobile and Digital Innovation in LoyaltyMobile and Digital Innovation in Loyalty
Mobile and Digital Innovation in Loyalty
 
Noggin - World's first marketplace for Personal Data
Noggin - World's first marketplace for Personal DataNoggin - World's first marketplace for Personal Data
Noggin - World's first marketplace for Personal Data
 
What Is the Future of Data Sharing?
What Is the Future of Data Sharing?What Is the Future of Data Sharing?
What Is the Future of Data Sharing?
 
What Is the Future of Data Sharing? - Consumer Mindsets and the Power of Brands
What Is the Future of Data Sharing? - Consumer Mindsets and the Power of BrandsWhat Is the Future of Data Sharing? - Consumer Mindsets and the Power of Brands
What Is the Future of Data Sharing? - Consumer Mindsets and the Power of Brands
 
A Marketer's Dilemma - Collecting Data Without Paying Fines.pdf
A Marketer's Dilemma - Collecting Data Without Paying Fines.pdfA Marketer's Dilemma - Collecting Data Without Paying Fines.pdf
A Marketer's Dilemma - Collecting Data Without Paying Fines.pdf
 
Lay of the Land for All Things Privacy
Lay of the Land for All Things PrivacyLay of the Land for All Things Privacy
Lay of the Land for All Things Privacy
 
Organizational Privacy Score and Big Data Privacy Guidelies July 17 2014 - ...
Organizational Privacy Score   and Big Data Privacy Guidelies July 17 2014 - ...Organizational Privacy Score   and Big Data Privacy Guidelies July 17 2014 - ...
Organizational Privacy Score and Big Data Privacy Guidelies July 17 2014 - ...
 
Data Driven Marketing: the DNA of customer orientated companies
Data Driven Marketing: the DNA of customer orientated companiesData Driven Marketing: the DNA of customer orientated companies
Data Driven Marketing: the DNA of customer orientated companies
 
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad ModelGDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
 
Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Transformation Business Evolution
Digital Transformation Business Evolution
 
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
 
Managing and sharing customer data
Managing and sharing customer dataManaging and sharing customer data
Managing and sharing customer data
 
Data-Privacy-and-Ethics-in-Digital-Marketing
Data-Privacy-and-Ethics-in-Digital-MarketingData-Privacy-and-Ethics-in-Digital-Marketing
Data-Privacy-and-Ethics-in-Digital-Marketing
 
Webinar Deck: Building Customer Relationships in an Omni-Channel World
Webinar Deck: Building Customer Relationships in an Omni-Channel WorldWebinar Deck: Building Customer Relationships in an Omni-Channel World
Webinar Deck: Building Customer Relationships in an Omni-Channel World
 
Protéger ses données personnelles dans un environnement multi-device: un enje...
Protéger ses données personnelles dans un environnement multi-device: un enje...Protéger ses données personnelles dans un environnement multi-device: un enje...
Protéger ses données personnelles dans un environnement multi-device: un enje...
 
Guarding and Growing Personal Data Value
Guarding and Growing Personal Data ValueGuarding and Growing Personal Data Value
Guarding and Growing Personal Data Value
 
How is channel marketing evolving now that the value of consumer data is more...
How is channel marketing evolving now that the value of consumer data is more...How is channel marketing evolving now that the value of consumer data is more...
How is channel marketing evolving now that the value of consumer data is more...
 
Omni channel basics for retailers and CPG Manufacturers
Omni channel basics for retailers and CPG ManufacturersOmni channel basics for retailers and CPG Manufacturers
Omni channel basics for retailers and CPG Manufacturers
 
Increase Customer Engagement with Personalization
Increase Customer Engagement with PersonalizationIncrease Customer Engagement with Personalization
Increase Customer Engagement with Personalization
 
DMA Data Protection 2014
DMA Data Protection 2014DMA Data Protection 2014
DMA Data Protection 2014
 

Plus de Antoine Vigneron

L'automatisation au service de la cybersécurité
L'automatisation au service de la cybersécuritéL'automatisation au service de la cybersécurité
L'automatisation au service de la cybersécuritéAntoine Vigneron
 
La signature électronique et eIDAS - De nouveaux usages
La signature électronique et eIDAS - De nouveaux usagesLa signature électronique et eIDAS - De nouveaux usages
La signature électronique et eIDAS - De nouveaux usagesAntoine Vigneron
 
La signature électronique et les nouveaux services eIDAS
La signature électronique et les nouveaux services eIDASLa signature électronique et les nouveaux services eIDAS
La signature électronique et les nouveaux services eIDASAntoine Vigneron
 
La signature électronique chez les notaires
La signature électronique chez les notairesLa signature électronique chez les notaires
La signature électronique chez les notairesAntoine Vigneron
 
La Blockchain: la fin des tiers de confiance?
La Blockchain: la fin des tiers de confiance?La Blockchain: la fin des tiers de confiance?
La Blockchain: la fin des tiers de confiance?Antoine Vigneron
 
Internet des objets - Doc@Post
Internet des objets - Doc@PostInternet des objets - Doc@Post
Internet des objets - Doc@PostAntoine Vigneron
 
Objets connectés: un 360° pour les comprendre
Objets connectés: un 360° pour les comprendreObjets connectés: un 360° pour les comprendre
Objets connectés: un 360° pour les comprendreAntoine Vigneron
 
Données personnelles et SI - GDPR
Données personnelles et SI - GDPRDonnées personnelles et SI - GDPR
Données personnelles et SI - GDPRAntoine Vigneron
 
La transition numérique un des facteurs clé vers une performance globale des...
 La transition numérique un des facteurs clé vers une performance globale des... La transition numérique un des facteurs clé vers une performance globale des...
La transition numérique un des facteurs clé vers une performance globale des...Antoine Vigneron
 
Meeting the challenges of big data
Meeting the challenges of big dataMeeting the challenges of big data
Meeting the challenges of big dataAntoine Vigneron
 
Lexpresse de la Banque Postale - Privacy et Big Data
Lexpresse de la Banque Postale - Privacy et Big DataLexpresse de la Banque Postale - Privacy et Big Data
Lexpresse de la Banque Postale - Privacy et Big DataAntoine Vigneron
 

Plus de Antoine Vigneron (14)

L'automatisation au service de la cybersécurité
L'automatisation au service de la cybersécuritéL'automatisation au service de la cybersécurité
L'automatisation au service de la cybersécurité
 
La signature électronique et eIDAS - De nouveaux usages
La signature électronique et eIDAS - De nouveaux usagesLa signature électronique et eIDAS - De nouveaux usages
La signature électronique et eIDAS - De nouveaux usages
 
La signature électronique et les nouveaux services eIDAS
La signature électronique et les nouveaux services eIDASLa signature électronique et les nouveaux services eIDAS
La signature électronique et les nouveaux services eIDAS
 
La signature électronique chez les notaires
La signature électronique chez les notairesLa signature électronique chez les notaires
La signature électronique chez les notaires
 
Bitcoin et le bitcoin
Bitcoin et le bitcoinBitcoin et le bitcoin
Bitcoin et le bitcoin
 
La Blockchain: la fin des tiers de confiance?
La Blockchain: la fin des tiers de confiance?La Blockchain: la fin des tiers de confiance?
La Blockchain: la fin des tiers de confiance?
 
CIO advisory English
CIO advisory English CIO advisory English
CIO advisory English
 
Les objets connectés
Les objets connectésLes objets connectés
Les objets connectés
 
Internet des objets - Doc@Post
Internet des objets - Doc@PostInternet des objets - Doc@Post
Internet des objets - Doc@Post
 
Objets connectés: un 360° pour les comprendre
Objets connectés: un 360° pour les comprendreObjets connectés: un 360° pour les comprendre
Objets connectés: un 360° pour les comprendre
 
Données personnelles et SI - GDPR
Données personnelles et SI - GDPRDonnées personnelles et SI - GDPR
Données personnelles et SI - GDPR
 
La transition numérique un des facteurs clé vers une performance globale des...
 La transition numérique un des facteurs clé vers une performance globale des... La transition numérique un des facteurs clé vers une performance globale des...
La transition numérique un des facteurs clé vers une performance globale des...
 
Meeting the challenges of big data
Meeting the challenges of big dataMeeting the challenges of big data
Meeting the challenges of big data
 
Lexpresse de la Banque Postale - Privacy et Big Data
Lexpresse de la Banque Postale - Privacy et Big DataLexpresse de la Banque Postale - Privacy et Big Data
Lexpresse de la Banque Postale - Privacy et Big Data
 

Dernier

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Dernier (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Protéger ses données: mission impossible?

  • 1. 7 April 2016 Hervé Le Jouan - Founder & CEO herve@privowny.com Proprietary & confidential Privowny Own your privacy Empowered Consumers will enable Trust and Engagement Privowny, Inc. www.privowny.com
  • 3. Privowny Context Personal Data: an un-precedent opportunity Proprietary & confidential Cisco forecasts 50 Billion connected objects by 2020 – IDC forecasts 212 Billion! 68% of all data is created by individuals Increased value Personalization New services Real time Easy to access Automation Ubiquity Anticipation Open data Public Private ∞ ∞ ∞ ∞ ∞ ∞ ∞ ∞ ∞ ∞ ∞ ∞ ∞ 2005 2010 2012 2015 2020 130 1227 2837 8591 40026 The Digital Universe in Exaoctets (billions of Gigaoctets). Source IDC Dec 2012
  • 4. « €440 billion is at risk if stakeholders fail to establish a trusted flow of personal data »* €1 Trillion €315 Billion 2011 2020 Privowny Context Personal Data Value Market *Source: BCG 2012 report - “THE VALUE OF OUR DIGITALIDENTITY” Proprietary & confidential
  • 5. Privowny Context Proprietary & confidential Big data is the new norm Any native digital company may be a competitor From identity theft to data breaches Consumer data is vulnerable and companies are liable A challenging regulatory environment Global brands have to comply with every jurisdiction that they operate within Loyalty is under pressure A customer can change most of its service providers in a few click Privowny Context The Risk is everywhere
  • 6. Privowny Context Proprietary & confidential Privowny Context Who is controlling our key services? Social E-commerce Payment Cloud ISPs /Telcos Search Mail Third party Ad Exchanges Web Apps Content TRACKERS ISPs /Telcos Devices Connected Objects (IoT)
  • 7. Privowny Context Proprietary & confidential ISPs /Telcos Home CarIoT ISPs /Telcos EducationWork Health Payment Privowny Context Our footprint is are gathered and distributed across few big players
  • 8. Privowny Context For brand capital For acceptance For engagement For loyalty Clients’ Trust is Key Proprietary & confidential
  • 9. Privowny Is there a solution? Proprietary & confidential
  • 10. Privowny Our solution Proprietary & confidential Our Vision Empower consumers to protect themselves, control their data and their privacy Offer companies to manage data responsibly and ethically
  • 11. Privowny Our solution Proprietary & confidential Our Vision User Personal Data Store BRAND B . . . A Consumer Centric Approach BRAND A Authentication Push data held by brands Access to personal data with user permission Give and Revoke consent Right to be forgotten Data update(s) Limits on data retention Control & protect Interactions with devices What is important (identity, …) What is left What is shared …
  • 12. Privowny Our solution Proprietary & confidential Everyone wins Companies • Manage consumers’ data responsibly and ethically • Communication: Transparency as a foundation to enhance brand value • Increase Clients acquisition, engagement, loyalty and trust • Enhance Clients insight (for sales, marketing, research, development) • Stay on the right side of regulation & oversight • New business models Clients • Empowerment and Emancipation – marketplace control for the first time (personal data control permission management, data monetization, ...) • Relevance : reduce/eliminate uninvited engagements • Economic exchange/reward for attention and data Society • Meet the requirements expressed by regulators and think tanks for a service that puts individuals in capacity to manage their data • Reduce waste of unsolicited direct marketing, advertising, promotions, ...
  • 14. Brand Marie is worry about her privacy on Internet ! Mary accepted to share her personal data to get offers. What this brand knows about me ? I appreciate their transparence. I can Trust them. Now I control my data. I like to be listened :-) You will be able to track that engagement in your dashboard my profile my consumption my preferences This brand would like to share your preferences with their trusted partners and suggest to you some offers. Benefits: ... duration : ... Do you accept? Company 1 Company 2 Company 3 YES ? DATA SHARE Bring Transparency and offer Data Privacy Services • Bring Clients’ relationship and engagement at the next level by helping them to visualize and manage their data online. Unlock Big Data usage • Access and use clients’ data using a permission platform giving full visibility and control to clients Proprietary & confidential Privowny Use cases A balanced relationship
  • 15. Company 1 Company 2 Company 3 Company 4 … Here is the list of companies you have your left your previous address to. Check the ones you want to update. We confirm you that your new address has been updated for these companies Hello ! It seems you have moved as we have detected you enter a new address while registering on websites/Mobile Apps YES MOVE DETECTION DATA UPDATE PROCESS Data update Proprietary & confidential Privowny Use cases As people are updating some of their core profile data, we could detect that and propose them to push updates to a list of companies of their choice Eventually, if some companies are ready to pay for data updates, we could propose users the offering as they would be incentivized Thanks! I can update my personal data from one place and keep it under control
  • 16. We confirm you that your data have been deleted from those companies databases Hello ! You have 3 accounts on companies that you did not visit not used their mobile Apps since 6 months. Do you want to delete those accounts? DATA DELETION PROCESS Right to be forgotten Proprietary & confidential Privowny Use cases As people are no longer using some websites/Apps, after a certain period, we could • alert them • remind them that they have left such or such information • propose them to require the deletion of their data They could also require some data deletion from their account at any time – provided that they have the rights to ask for it Thanks! I can control who has my data and decide if they can keep it ALERT NON USED ACCOUNTS I have a lot of accounts that I am not any longer using As I am surfing or using mobile Apps, I am notified and can decide to delete my data
  • 17. Privowny Proprietary & confidential Créée en décembre 2002, la Mobile Marketing Association France a pour mission première d’accélérer la transformation et l’innovation du Marketing grâce au Mobile. Elle regroupe aujourd’hui + 115 membres : agence conseils, annonceurs, régies, prestataires, instituts de mesure, opérateurs Mobiles. La Mobile Marketing Association France est la seule association en France, internationale, dédiée au Marketing, à la publicité, au CRM et au Commerce sur Mobile et tablette en France. La Mobile Marketing Association est une organisation mondiale qui compte plus de 800 sociétés membres au travers de 50 pays dans le monde. Plus d’info : www.mmaf.fr Vie privée et code de déontologie – Mobile Marketing Association France
  • 18. Privowny Herve Le Jouan, CEO herve@privowny.com www.privowny.com @privowny @hervelj Proprietary & confidential Privowny empowers Individuals, enables Trust, while creating value for Companies THANK YOU