SlideShare une entreprise Scribd logo
1  sur  17
Candice Martinez
Deliberate Reasoning
Amazon Kindle Fire
• Silk Browser raises controversy
• Split browser partially operates from cloud
server
• Kindle Fire only allows the Silk Browser
http://www.youtube.com/watch?v=VV
sfLnMqOC4
• Joe Bar t on
• Republ i can, Texas
•Ed Mar key
•Democr at ,
Massachusset t
s
What does Amazon plan
on doing with this
information?
How does Amazon plan on
proceeding with a privacy
policy?
Will Amazon collect users’
browsing habits?
has a few questions for Amazon
• Geographic location
• Local time
• Browser used
• Screen resolution
• Time spent on page
• Content on page
• Previous page that was visited
• Internet speed
•Operating system
•Search engine used
•Key words
•Made purchases
•Number of made purchases
•Value of made purchases
•Number of visits
Compiled Data
‫ﺳ‬Discussion forums
‫ﺳ‬Blogs
‫ﺳ‬Message boards
‫ﺳ‬Social networking
sites
d u e t o a n E v o l v i n g I n d u s t r y
Products and Services
Products and Services
Consumer Habits and Behaviors
Consumer Habits and Behaviors
"The r i ght of t he peopl e t o be
secur e i n t hei r par ent s,
houses, paper s, and ef f ect s,
agai nst unr easonabl e
sear ches and sei zur es,
shal l not be vi ol at ed and
no war r ant s shal l i ssue, but
upon pr obabl e cause,
suppor t ed by oat h or
af f i r mat i on, and
par t i cul ar l y descr i bi ng
t he pl ace t o be sear ched,
and t he per sons of t hi ngs
t o be sei zed."
1. There has to be a
reasonable and logical
expectation of privacy.
2. General society
renders this
expectation as
acceptable custom.
Landmark Cases Two-Step Test
Reasonably released information; waives Fourth Amendment
protection once provided to an entity “upon supported by
affirmation.”
Federal Trade Commission Act of
1914
A) Prevent unfair methods of competition, and unfair or
deceptive acts or practices in or affecting commerce
B) Seek monetary redress and other relief for conduct
injurious to consumers
C) Prescribe trade regulation rules defining with
specificity acts or practices that are unfair or
deceptive, and establishing requirements designed to
prevent such acts or practices
D) Conduct investigations relating to the organization,
business, practices, and management of entities
engaged in commerce
E) Make reports and legislative recommendations to
Congress.
G
O
O
G
L
E
B
U
Z
Z
Sweet! Check out my buzz
Nah, go to my inbox
Made users’ contacts public without their knowledge
Followers were already setup
It did not fully removed user from the social network
“When you sign up for a particular service that
requires registration, we ask you to provide
personal information. If we use this information
for in a manner different than the purpose for
which it was collected , then we ask for your
consent prior to such use.”
October 2004 until October 2010
Gmail Privacy Policy
“Gmail stores, processes, and maintains
your messages, contact lists, and other
data related to your recent account in
order to provide the service to you.”
“Google adheres to the U.S. Safe Harbor
Privacy Principles of Notice, Choice,
Onward Transfer, Security, Data Integrity,
Access and Enforcement, and is registered
with the U.S. Department of Commerce’s
Safe Harbor Program.”
1) “Comprehensive privacy
program”
2) Privacy audits throughout the
next 20 years
http://www.youtube.com/watch?v=852OTK6IQ2A
"Fi ndi ng
i nt er connect i o
ns bet ween
peopl e,
compani es, and
cl i ent
act i vi t i es."
. -
LexisNexis
website
Provides data and tools for examining
A person’s actions are
involuntary :
1) Action is caused by an
external force
2) Actions were based on
ignorance.
“This is the first shot in the new
war for replacing the internet
with a privatized merchant data
aggregation network.”

Contenu connexe

Similaire à Compiling data from the cloud. Make it rain ones and zeros

Online privacy; myth or reality?
Online privacy; myth or reality?Online privacy; myth or reality?
Online privacy; myth or reality?Swaleh Ahmed
 
Free geek class on Data privacy
Free geek class on Data privacyFree geek class on Data privacy
Free geek class on Data privacyJoshua Johnston
 
Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Matthew Asbell
 
Challenge Academy June 2018 - Digital Marketing, Web Traffic and Ecommerce
Challenge Academy June 2018 - Digital Marketing, Web Traffic and Ecommerce Challenge Academy June 2018 - Digital Marketing, Web Traffic and Ecommerce
Challenge Academy June 2018 - Digital Marketing, Web Traffic and Ecommerce OutserveWeb
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentationChande Kasita
 
Top Questions Asked About the CCPA
Top Questions Asked About the CCPATop Questions Asked About the CCPA
Top Questions Asked About the CCPARyan Foster
 
Terms of Use and Privacy Policy Best Practices
Terms of Use and Privacy Policy Best PracticesTerms of Use and Privacy Policy Best Practices
Terms of Use and Privacy Policy Best PracticesRoger Royse
 
Ethical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceEthical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceNicholas Davis
 
Ethical, social and political issues raised by e commerce
Ethical, social and political issues raised by e commerceEthical, social and political issues raised by e commerce
Ethical, social and political issues raised by e commerceNicholas Davis
 
Websites: do you tick all the boxes?
Websites: do you tick all the boxes?Websites: do you tick all the boxes?
Websites: do you tick all the boxes?walescva
 
CAN SPAM Legislation: Is your organization ready?
CAN SPAM Legislation: Is your organization ready?CAN SPAM Legislation: Is your organization ready?
CAN SPAM Legislation: Is your organization ready?Violeta Cohen
 
Big Data, Big Investment
Big Data, Big InvestmentBig Data, Big Investment
Big Data, Big InvestmentGGV Capital
 
Ethical Digital Marketing for Lawyers
Ethical Digital Marketing for LawyersEthical Digital Marketing for Lawyers
Ethical Digital Marketing for LawyersStacey Burke
 
5) How charities can protect themselves against data reform - ‘Emerging Digit...
5) How charities can protect themselves against data reform - ‘Emerging Digit...5) How charities can protect themselves against data reform - ‘Emerging Digit...
5) How charities can protect themselves against data reform - ‘Emerging Digit...Code Computerlove
 

Similaire à Compiling data from the cloud. Make it rain ones and zeros (20)

Online privacy; myth or reality?
Online privacy; myth or reality?Online privacy; myth or reality?
Online privacy; myth or reality?
 
Online privacy
Online privacyOnline privacy
Online privacy
 
Free geek class on Data privacy
Free geek class on Data privacyFree geek class on Data privacy
Free geek class on Data privacy
 
Big data
Big dataBig data
Big data
 
Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10
 
Challenge Academy June 2018 - Digital Marketing, Web Traffic and Ecommerce
Challenge Academy June 2018 - Digital Marketing, Web Traffic and Ecommerce Challenge Academy June 2018 - Digital Marketing, Web Traffic and Ecommerce
Challenge Academy June 2018 - Digital Marketing, Web Traffic and Ecommerce
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
 
Top Questions Asked About the CCPA
Top Questions Asked About the CCPATop Questions Asked About the CCPA
Top Questions Asked About the CCPA
 
Terms of Use and Privacy Policy Best Practices
Terms of Use and Privacy Policy Best PracticesTerms of Use and Privacy Policy Best Practices
Terms of Use and Privacy Policy Best Practices
 
Comply
ComplyComply
Comply
 
Ethical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceEthical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E Commerce
 
Ethical, social and political issues raised by e commerce
Ethical, social and political issues raised by e commerceEthical, social and political issues raised by e commerce
Ethical, social and political issues raised by e commerce
 
Websites: do you tick all the boxes?
Websites: do you tick all the boxes?Websites: do you tick all the boxes?
Websites: do you tick all the boxes?
 
Casl 2012 Final
Casl 2012 FinalCasl 2012 Final
Casl 2012 Final
 
CAN SPAM Legislation: Is your organization ready?
CAN SPAM Legislation: Is your organization ready?CAN SPAM Legislation: Is your organization ready?
CAN SPAM Legislation: Is your organization ready?
 
Big Data, Big Investment
Big Data, Big InvestmentBig Data, Big Investment
Big Data, Big Investment
 
Spa bath accessories
Spa bath accessoriesSpa bath accessories
Spa bath accessories
 
Balancing Privacy and Digitization
Balancing Privacy and DigitizationBalancing Privacy and Digitization
Balancing Privacy and Digitization
 
Ethical Digital Marketing for Lawyers
Ethical Digital Marketing for LawyersEthical Digital Marketing for Lawyers
Ethical Digital Marketing for Lawyers
 
5) How charities can protect themselves against data reform - ‘Emerging Digit...
5) How charities can protect themselves against data reform - ‘Emerging Digit...5) How charities can protect themselves against data reform - ‘Emerging Digit...
5) How charities can protect themselves against data reform - ‘Emerging Digit...
 

Dernier

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 

Dernier (20)

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 

Compiling data from the cloud. Make it rain ones and zeros

  • 3. Amazon Kindle Fire • Silk Browser raises controversy • Split browser partially operates from cloud server • Kindle Fire only allows the Silk Browser http://www.youtube.com/watch?v=VV sfLnMqOC4
  • 4. • Joe Bar t on • Republ i can, Texas •Ed Mar key •Democr at , Massachusset t s What does Amazon plan on doing with this information? How does Amazon plan on proceeding with a privacy policy? Will Amazon collect users’ browsing habits? has a few questions for Amazon
  • 5. • Geographic location • Local time • Browser used • Screen resolution • Time spent on page • Content on page • Previous page that was visited • Internet speed •Operating system •Search engine used •Key words •Made purchases •Number of made purchases •Value of made purchases •Number of visits Compiled Data
  • 7. d u e t o a n E v o l v i n g I n d u s t r y Products and Services Products and Services Consumer Habits and Behaviors Consumer Habits and Behaviors
  • 8. "The r i ght of t he peopl e t o be secur e i n t hei r par ent s, houses, paper s, and ef f ect s, agai nst unr easonabl e sear ches and sei zur es, shal l not be vi ol at ed and no war r ant s shal l i ssue, but upon pr obabl e cause, suppor t ed by oat h or af f i r mat i on, and par t i cul ar l y descr i bi ng t he pl ace t o be sear ched, and t he per sons of t hi ngs t o be sei zed."
  • 9. 1. There has to be a reasonable and logical expectation of privacy. 2. General society renders this expectation as acceptable custom. Landmark Cases Two-Step Test
  • 10. Reasonably released information; waives Fourth Amendment protection once provided to an entity “upon supported by affirmation.”
  • 11. Federal Trade Commission Act of 1914 A) Prevent unfair methods of competition, and unfair or deceptive acts or practices in or affecting commerce B) Seek monetary redress and other relief for conduct injurious to consumers C) Prescribe trade regulation rules defining with specificity acts or practices that are unfair or deceptive, and establishing requirements designed to prevent such acts or practices D) Conduct investigations relating to the organization, business, practices, and management of entities engaged in commerce E) Make reports and legislative recommendations to Congress.
  • 12. G O O G L E B U Z Z Sweet! Check out my buzz Nah, go to my inbox Made users’ contacts public without their knowledge Followers were already setup It did not fully removed user from the social network “When you sign up for a particular service that requires registration, we ask you to provide personal information. If we use this information for in a manner different than the purpose for which it was collected , then we ask for your consent prior to such use.”
  • 13. October 2004 until October 2010 Gmail Privacy Policy “Gmail stores, processes, and maintains your messages, contact lists, and other data related to your recent account in order to provide the service to you.” “Google adheres to the U.S. Safe Harbor Privacy Principles of Notice, Choice, Onward Transfer, Security, Data Integrity, Access and Enforcement, and is registered with the U.S. Department of Commerce’s Safe Harbor Program.” 1) “Comprehensive privacy program” 2) Privacy audits throughout the next 20 years
  • 15. "Fi ndi ng i nt er connect i o ns bet ween peopl e, compani es, and cl i ent act i vi t i es." . - LexisNexis website Provides data and tools for examining
  • 16. A person’s actions are involuntary : 1) Action is caused by an external force 2) Actions were based on ignorance.
  • 17. “This is the first shot in the new war for replacing the internet with a privatized merchant data aggregation network.”