SlideShare une entreprise Scribd logo
1  sur  43
Télécharger pour lire hors ligne
MAKING A BETTER
PRIVACY POLICY
Read
the
blog
PRIVACY POLICY
AS PRODUCT
Read
the
blog
BASELINE
Read
the
blog
How do people feel about
privacy policies?
Read
the
blog
We asked 1,000 Lookout users
and 1,000 non-Lookout users.
Read
the
blog
“I trust apps I download.”
21% 40%
 Lookout users non-Lookout users
Read
the
blog
“I read privacy policies.”
50% 34%
 Lookout users non-Lookout users
Read
the
blog
“Privacy policies are vague.”
54% 55%
 Lookout users non-Lookout users
Read
the
blog
GOAL

Read
the
blog
Transparency & Clarity
Read
the
blog
NTIA Code of Conduct
Read
the
blog
Categories of collected & not
collected
Categories of shared & not
shared
Definitions of categories
In a Nutshell
Read
the
blog
Prototype

Test

Iterate

Ship

BETA
Read
the
blog
12:01 PM
Read
the
blog
12:01 PM
Read
the
blog
12:01 PM
Read
the
blog
12:01 PM
Read
the
blog
12:01 PM
Read
the
blog
12:01 PM
Read
the
blog
12:01 PM 12:01 PM
A B
Read
the
blog
Prototype

Test

Iterate

Ship

V2
Read
the
blog
Participants Versions
 
 A B
Read
the
blog
Had a positive reaction
Preferred to see the null states under “Data Shared”
Couldn’t find, “We don’t sell your personal data”
Weren’t sure you could click the null states
Looked for the long form link in the top nav
RESULTS
Read
the
blog
SURVEY
1 3 5
Strongly
Agree
Strongly
Disagree
Neutral
2 4
AVG. BEFORE AVG. AFTER
I trust Lookout. 1.4 1.2
I would recommend Lookout to a friend. 1.2 1.2
I feel safer knowing Lookout is on my phone. 1.2 1.1
I trust Lookout with my personal information. 1.7 1.3
(-0.2)
(-0.1)
(-0.4)
Read
the
blog
You guys are on the right track with
this. When it's more informative you
put a lot of the concerns and the
worries to rest. You feel safer
because everything is up front.
Read
the
blog
I think if a privacy policy was that
way then everybody's policy would
get read. It would help a lot of
people out if it looked like this.
Read
the
blog
I’d like to see more of the
applications and programs I use
use a form like this to present their
privacy policies.
Read
the
blog
I think this signifies a company that
is very conscientious. A company
that cares about people’s privacy is
aware of people’s concerns about
how their information will be
gathered, shared, and used.
Read
the
blog
Prototype

Test

Iterate

Ship

V2
Read
the
blog
12:01 PM 12:01 PM
Read
the
blog
12:01 PM 12:01 PM
Read
the
blog
12:01 PM 12:01 PM
Read
the
blog
12:01 PM 12:01 PM
Read
the
blog
TERMS OF SERVICE PRIVACY POLICY PRIVACY OVERVIEW
Get LookoutPlatformBusinessPersonal Log In
PROTECTING YOUR DEVICE
ALSO MEANS DEFENDING
YOUR PRIVACY
Here’s an overview of how Lookout uses your info to provide our product.
For more details, read our Privacy Policy.
Click an icon below to learn more.Click an icon below to learn more.
Lookout never sells your personal information.
We only collect the data we need to provide you with a service.
What do we collect?
• Email Address
When you create an account
• Phone Number
When you activate the app
• Contacts
When you use Backup
Contact Info
• Call History
When you use Backup
Phone / Text Logs
• Browser History
When you use Safe Browsing
Browser History
• Location
When you use Locate, Signal Flare, or
Lock Cam
Location
• Photos
When you use Backup or Lock Cam
User Files
• Credit Card Info
When you upgrade to a Premium
account
Financial
• Email Address
When you create an account
• Phone Number
When you activate the app
• Contacts
When you use Backup
Contact Info
• Call History
When you use Backup
Phone / Text Logs
• Browser History
When you use Safe Browsing
Browser History
• Location
When you use Locate, Signal Flare, or
Lock Cam
Location
• Photos
When you use Backup or Lock Cam
User Files
• Credit Card Info
When you upgrade to a Premium
account
Financial
Who do we share with?
TERMS OF SERVICE PRIVACY POLICY
PRIVACY OVERVIEW
spacing: 54
spacing: 30
spacing: 54
spacing: 30
MENU
YOUR PRIVACY
MATTERS
Here’s an overview of how Lookout uses your info
to provide our product. For more details, read our
Privacy Policy.
Click an icon below to learn more.
Lookout never sells your personal
information.
What do we collect?
CONTACT
INFO
PHONE / TEXT
LOGS
BROWSER
HISTORY
LOCATION USER FILES FINANCIAL
INFO
CONTACT
INFO
PHONE / TEXT
LOGS
BROWSER
HISTORY
LOCATION USER FILES FINANCIAL
INFO
Who do we share with?
CARRIERS GOVERNMENT AD
NETWORKS
DATA
RESELLERS
ANALYTICS
PROVIDERS
OTHER APPS SOCIAL
NETWORKS
SYSTEMS &
PLATFORMS
TERMS OF SERVICE PRIVACY POLICY PRIVACY OVERVIEW
MENU
YOUR PRIVACY MATTERS
Here’s an overview of how Lookout uses your info to provide our product. For more details, read our Privacy
Policy.
Click an icon below to learn more.
Lookout never sells your personal information.
What do we collect?
Who do we share with?
TERMS OF SERVICE PRIVACY POLICY PRIVACY OVERVIEW
YOUR PRIVACY MATTERS
Here’s an overview of how Lookout uses your info to provide our
product. For more details, read our Privacy Policy.
Lookout never sells your personal information. We only
collect the data we need to provide you with a service.
Get LookoutPlatformBusinessPersonal Log In
spacing: 58
spacing: 34
spacing: 58
spacing: 34
Click an icon below to learn more.
What do we collect?
We may tell carriers that you’re already
a Lookout user so you won’t get
unwanted texts or emails promoting
Lookout.
Carriers
We don’t share with them unless the
law says we have to.
Government
We don’t share with them.
Ad Networks
We don’t share with them.
Data Resellers
We don’t share with them.
Analytics Providers
We don’t share with them.
Systems & Platforms
We don’t share with them.
Other Apps
We don’t share with them.
Social Networks
We may tell carriers that you’re already
a Lookout user so you won’t get
unwanted texts or emails promoting
Lookout.
Carriers
We don’t share with them unless the
law says we have to.
Government
We don’t share with them.
Ad Networks
We don’t share with them.
Data Resellers
We don’t share with them.
Analytics Providers
We don’t share with them.
Systems & Platforms
We don’t share with them.
Other Apps
We don’t share with them.
Social Networks
Who do we share with?
~384px
Hero image scales to 100% All text scales 100%Expanded copy in Section 2
Some text enlarges to 100%
Sections 1, 3, 4 go to columns
~740px ~768px ~1024 infinity
TERMS OF SERVICE PRIVACY POLICY PRIVACY OVERVIEW
Get LookoutPlatformBusinessPersonal Log In
PROTECTING YOUR DEVICE
ALSO MEANS DEFENDING
YOUR PRIVACY
Here’s an overview of how Lookout uses your info to provide our product.
For more details, read our Privacy Policy.
Lookout never sells your personal information.
We only collect the data we need to provide you with a service.
Content fixed as width expands
CARRIERS GOVERNMENT AD
NETWORKS
DATA
RESELLERS
ANALYTICS
PROVIDERS
OTHER APPS SOCIAL
NETWORKS
SYSTEMS &
PLATFORMS
Click an icon below to learn more.Click an icon below to learn more.
What do we collect?
• Email Address
When you create an account
• Phone Number
When you activate the app
• Contacts
When you use Backup
Contact Info
• Call History
When you use Backup
Phone / Text Logs
• Browser History
When you use Safe Browsing
Browser History
• Location
When you use Locate, Signal Flare, or
Lock Cam
Location
• Photos
When you use Backup or Lock Cam
User Files
• Credit Card Info
When you upgrade to a Premium
account
Financial
Who do we share with?
We may tell carriers that you’re already
a Lookout user so you won’t get
unwanted texts or emails promoting
Lookout.
Carriers
We don’t share with them unless the
law says we have to.
Government
We don’t share with them.
Ad Networks
We don’t share with them.
Data Resellers
We don’t share with them.
Analytics Providers
We don’t share with them.
Systems & Platforms
We don’t share with them.
Other Apps
We don’t share with them.
Social Networks
A RESPONSIVE PRIVACY POLICY
Read
the
blog
Read
the
blog
Read
the
blog
Read
the
blog
Prototype

Test

Iterate

Ship

LAUNCH
Read
the
blog
12:01 PM
Read
the
blog
12:01 PM
Read
the
blog
Branding Variables
A Font family
AA Base font size
Brand color
Hero Image
Various copy
Read
the
blog
5 STEPS
to making your short form
Privacy Policy
Less than 1 hour
1
Clone the Private Parts project repository
and follow the setup instructions.
2 Fill out the Private Parts Questionnaire.
3
Update config.json to accurately
represent your company’s privacy
policies.
4
Modify project template files in assets/ to
match your company’s brand and style.
5 Build the project.
Read
the
blog
For more mobile security tips, follow

Contenu connexe

Plus de Lookout

The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsLookout
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLookout
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile SecurityLookout
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notLookout
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?Lookout
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingLookout
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity PredictionsLookout
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatibleLookout
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidLookout
 
When Android Apps Go Evil
When Android Apps Go EvilWhen Android Apps Go Evil
When Android Apps Go EvilLookout
 
Scaling Mobile Development
Scaling Mobile DevelopmentScaling Mobile Development
Scaling Mobile DevelopmentLookout
 
Visualizing Privacy
Visualizing PrivacyVisualizing Privacy
Visualizing PrivacyLookout
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring HackersLookout
 
How to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneHow to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneLookout
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google AccountLookout
 
3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple AccountLookout
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone GuideLookout
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World CupLookout
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneLookout
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to MeasureLookout
 

Plus de Lookout (20)

The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or not
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatible
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to Avoid
 
When Android Apps Go Evil
When Android Apps Go EvilWhen Android Apps Go Evil
When Android Apps Go Evil
 
Scaling Mobile Development
Scaling Mobile DevelopmentScaling Mobile Development
Scaling Mobile Development
 
Visualizing Privacy
Visualizing PrivacyVisualizing Privacy
Visualizing Privacy
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring Hackers
 
How to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneHow to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhone
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account
 
3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone Guide
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World Cup
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your Smartphone
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to Measure
 

Dernier

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Dernier (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Making a Better Privacy Policy

  • 1. MAKING A BETTER PRIVACY POLICY Read the blog
  • 4. How do people feel about privacy policies? Read the blog
  • 5. We asked 1,000 Lookout users and 1,000 non-Lookout users. Read the blog
  • 6. “I trust apps I download.” 21% 40%  Lookout users non-Lookout users Read the blog
  • 7. “I read privacy policies.” 50% 34%  Lookout users non-Lookout users Read the blog
  • 8. “Privacy policies are vague.” 54% 55%  Lookout users non-Lookout users Read the blog
  • 11. NTIA Code of Conduct Read the blog
  • 12. Categories of collected & not collected Categories of shared & not shared Definitions of categories In a Nutshell Read the blog
  • 20. 12:01 PM 12:01 PM A B Read the blog
  • 23. Had a positive reaction Preferred to see the null states under “Data Shared” Couldn’t find, “We don’t sell your personal data” Weren’t sure you could click the null states Looked for the long form link in the top nav RESULTS Read the blog
  • 24. SURVEY 1 3 5 Strongly Agree Strongly Disagree Neutral 2 4 AVG. BEFORE AVG. AFTER I trust Lookout. 1.4 1.2 I would recommend Lookout to a friend. 1.2 1.2 I feel safer knowing Lookout is on my phone. 1.2 1.1 I trust Lookout with my personal information. 1.7 1.3 (-0.2) (-0.1) (-0.4) Read the blog
  • 25. You guys are on the right track with this. When it's more informative you put a lot of the concerns and the worries to rest. You feel safer because everything is up front. Read the blog
  • 26. I think if a privacy policy was that way then everybody's policy would get read. It would help a lot of people out if it looked like this. Read the blog
  • 27. I’d like to see more of the applications and programs I use use a form like this to present their privacy policies. Read the blog
  • 28. I think this signifies a company that is very conscientious. A company that cares about people’s privacy is aware of people’s concerns about how their information will be gathered, shared, and used. Read the blog
  • 30. 12:01 PM 12:01 PM Read the blog
  • 31. 12:01 PM 12:01 PM Read the blog
  • 32. 12:01 PM 12:01 PM Read the blog
  • 33. 12:01 PM 12:01 PM Read the blog
  • 34. TERMS OF SERVICE PRIVACY POLICY PRIVACY OVERVIEW Get LookoutPlatformBusinessPersonal Log In PROTECTING YOUR DEVICE ALSO MEANS DEFENDING YOUR PRIVACY Here’s an overview of how Lookout uses your info to provide our product. For more details, read our Privacy Policy. Click an icon below to learn more.Click an icon below to learn more. Lookout never sells your personal information. We only collect the data we need to provide you with a service. What do we collect? • Email Address When you create an account • Phone Number When you activate the app • Contacts When you use Backup Contact Info • Call History When you use Backup Phone / Text Logs • Browser History When you use Safe Browsing Browser History • Location When you use Locate, Signal Flare, or Lock Cam Location • Photos When you use Backup or Lock Cam User Files • Credit Card Info When you upgrade to a Premium account Financial • Email Address When you create an account • Phone Number When you activate the app • Contacts When you use Backup Contact Info • Call History When you use Backup Phone / Text Logs • Browser History When you use Safe Browsing Browser History • Location When you use Locate, Signal Flare, or Lock Cam Location • Photos When you use Backup or Lock Cam User Files • Credit Card Info When you upgrade to a Premium account Financial Who do we share with? TERMS OF SERVICE PRIVACY POLICY PRIVACY OVERVIEW spacing: 54 spacing: 30 spacing: 54 spacing: 30 MENU YOUR PRIVACY MATTERS Here’s an overview of how Lookout uses your info to provide our product. For more details, read our Privacy Policy. Click an icon below to learn more. Lookout never sells your personal information. What do we collect? CONTACT INFO PHONE / TEXT LOGS BROWSER HISTORY LOCATION USER FILES FINANCIAL INFO CONTACT INFO PHONE / TEXT LOGS BROWSER HISTORY LOCATION USER FILES FINANCIAL INFO Who do we share with? CARRIERS GOVERNMENT AD NETWORKS DATA RESELLERS ANALYTICS PROVIDERS OTHER APPS SOCIAL NETWORKS SYSTEMS & PLATFORMS TERMS OF SERVICE PRIVACY POLICY PRIVACY OVERVIEW MENU YOUR PRIVACY MATTERS Here’s an overview of how Lookout uses your info to provide our product. For more details, read our Privacy Policy. Click an icon below to learn more. Lookout never sells your personal information. What do we collect? Who do we share with? TERMS OF SERVICE PRIVACY POLICY PRIVACY OVERVIEW YOUR PRIVACY MATTERS Here’s an overview of how Lookout uses your info to provide our product. For more details, read our Privacy Policy. Lookout never sells your personal information. We only collect the data we need to provide you with a service. Get LookoutPlatformBusinessPersonal Log In spacing: 58 spacing: 34 spacing: 58 spacing: 34 Click an icon below to learn more. What do we collect? We may tell carriers that you’re already a Lookout user so you won’t get unwanted texts or emails promoting Lookout. Carriers We don’t share with them unless the law says we have to. Government We don’t share with them. Ad Networks We don’t share with them. Data Resellers We don’t share with them. Analytics Providers We don’t share with them. Systems & Platforms We don’t share with them. Other Apps We don’t share with them. Social Networks We may tell carriers that you’re already a Lookout user so you won’t get unwanted texts or emails promoting Lookout. Carriers We don’t share with them unless the law says we have to. Government We don’t share with them. Ad Networks We don’t share with them. Data Resellers We don’t share with them. Analytics Providers We don’t share with them. Systems & Platforms We don’t share with them. Other Apps We don’t share with them. Social Networks Who do we share with? ~384px Hero image scales to 100% All text scales 100%Expanded copy in Section 2 Some text enlarges to 100% Sections 1, 3, 4 go to columns ~740px ~768px ~1024 infinity TERMS OF SERVICE PRIVACY POLICY PRIVACY OVERVIEW Get LookoutPlatformBusinessPersonal Log In PROTECTING YOUR DEVICE ALSO MEANS DEFENDING YOUR PRIVACY Here’s an overview of how Lookout uses your info to provide our product. For more details, read our Privacy Policy. Lookout never sells your personal information. We only collect the data we need to provide you with a service. Content fixed as width expands CARRIERS GOVERNMENT AD NETWORKS DATA RESELLERS ANALYTICS PROVIDERS OTHER APPS SOCIAL NETWORKS SYSTEMS & PLATFORMS Click an icon below to learn more.Click an icon below to learn more. What do we collect? • Email Address When you create an account • Phone Number When you activate the app • Contacts When you use Backup Contact Info • Call History When you use Backup Phone / Text Logs • Browser History When you use Safe Browsing Browser History • Location When you use Locate, Signal Flare, or Lock Cam Location • Photos When you use Backup or Lock Cam User Files • Credit Card Info When you upgrade to a Premium account Financial Who do we share with? We may tell carriers that you’re already a Lookout user so you won’t get unwanted texts or emails promoting Lookout. Carriers We don’t share with them unless the law says we have to. Government We don’t share with them. Ad Networks We don’t share with them. Data Resellers We don’t share with them. Analytics Providers We don’t share with them. Systems & Platforms We don’t share with them. Other Apps We don’t share with them. Social Networks A RESPONSIVE PRIVACY POLICY Read the blog
  • 41. Branding Variables A Font family AA Base font size Brand color Hero Image Various copy Read the blog
  • 42. 5 STEPS to making your short form Privacy Policy Less than 1 hour 1 Clone the Private Parts project repository and follow the setup instructions. 2 Fill out the Private Parts Questionnaire. 3 Update config.json to accurately represent your company’s privacy policies. 4 Modify project template files in assets/ to match your company’s brand and style. 5 Build the project. Read the blog
  • 43. For more mobile security tips, follow