SlideShare une entreprise Scribd logo
1  sur  60
What Every Product Manager
Needs To Know About Online
          Privacy
   Protecting Your Brand, Revenue, and Business Model


                Phil Burton
Principal Consultant and Trainer, 280 Group
 Product Camp New York, Sept. 17, 2011

                                          ©2011 280 Group LLC. All rights reserved.
Can Behavioral Targeting Survive
          Privacy Worries?
• Targeting people based on their
  tracked online activities
• Privacy advocates concerned
  about ways advertisers gathering
  data
• BT spending growing 20% per
  year, could surpass search ad
  revenues by 2015
• SF Conference on Behavioral
  Marketing, July, 2011
• “We don’t need a law to govern     •   http://www.forbes.com/sites/roberthof/201
                                         1/07/20/can-behavioral-targeting-survive-
  our industry,” speaker says. “It       privacy-worries/

  will hold back innovation.”
                                                                                           Page 2
                                                      ©2011 280 Group LLC. All rights reserved.
Why is Online Privacy Important?

• Lack of effective user privacy can affect
  revenues and damage your business model
  Loss of trust and reputation Brand damage 
  Decreases in site visitors  Lower revenue
• Real and growing risk of increased
  government regulation
  Limit revenue opportunities
  Impact business model
  Limit opportunities for acquisition

                                                                             Page 3
                                        ©2011 280 Group LLC. All rights reserved.
Focus of this presentation

• User online privacy issues – Potential business impacts
   – Web 2.0
   – Social Media
   – Mobile Apps
• Not
   –   Consumer or parental guide to safe online activities
   –   Online censorship in China, other repressive govts.
   –   WikiLeaks or “hacktivism” in general
   –   Overall issue of online security and hacking
   –   Technical presentation on website security
   –   Phone hacking


                                                                                    Page 4
                                               ©2011 280 Group LLC. All rights reserved.
Agenda

• Why is user privacy an emerging concern? –
  recent privacy issues
• Government regulation: precedents and
  potential new laws
• Public concerns
• Industry responses
• Causes of lack of user privacy
• Product manager responsibilities
• Takeaway ideas
• What is the 280 Group?

                                                                       Page 5
                                  ©2011 280 Group LLC. All rights reserved.
Sony - Three Data Breaches

• Three separate data breaches in April, 2011
  –   PlayStation Network
  –   Qriocity music and video service
  –   Sony Online Entertainment
  –   One of largest data breaches in US history
  –   One breach not discovered until May 3
• Over 100 million accounts affected: customer
  name, address, email account, DOB, gender
  and phone number, login name, “hashed”
  password, encrypted credit card number
                                                                               Page 6
                                          ©2011 280 Group LLC. All rights reserved.
Sony - Three Data Breaches

• Analysts estimate costs at $170 M to $1 B
  – “deeper damage to brand image” could affect
    long-term product plans
• Share price fell 55% from April to September
• Service offline for 11 weeks
• Class action lawsuit filed August 6, on behalf
  of all US subscribers
  – Alleges Sony violated Federal Electronics
    Communications Privacy Act, negligence, breach
    of fiduciary duty, seeks damages, etc.
                                                                            Page 7
                                       ©2011 280 Group LLC. All rights reserved.
Apple - iPhone Location Tracking

• April 20, researchers disclose Apple collecting iPhone location
  data since 2010 launch of iOS 4, stored in unencrypted file
    – Congressman Ed Markey, co-chair of House Bipartisan Privacy
      Caucus, sent letter to Apple CEO Steve Jobs
• Apple sued April 21 for privacy invasion and computer fraud by
  two FL customers
• Apple‟s response, April 27, claims data collected to improve
  location-based services, cannot track individual users
• Rep. Jay Inslee of Washington said on April 27 that Federal
  Trade Commission investigation needed
• Senate held two subcommittee hearings in April
• July 14, Apple pays $945 to settle iPhone tracking suit in Korea

                                                                                         Page 8
                                                    ©2011 280 Group LLC. All rights reserved.
Facebook – Picture Tagging and
          Facial Recognition
• Manual picture tagging possible without opt-in permission from other
  people
• Facial recognition (June, 2011) feature added suggestions for
  names
     – Facebook announced users could disable feature
• European reaction was very negative, starts probe immediately
• Negative reaction on US blogs
     – “Unfortunately, once again, Facebook seems to be sharing personal
       information by default.” – nakedsecurity.sophos.com
     – “Facebook is officially getting super-creepy. .. the end of privacy as we
       know it” -
        http://www.pcworld.com/article/229742/why_facebooks_facial_recognition_is_creepy.html
•   Divorce lawyers love this feature

                                                                                                           Page 9
                                                                      ©2011 280 Group LLC. All rights reserved.
Agenda

• Why is user privacy an emerging concern? –
  recent privacy issues
• Government regulation: precedents and
  potential new laws
• Public concerns
• Industry responses
• Causes of lack of user privacy
• Product manager responsibilities
• Takeaway ideas
• What is the 280 Group?

                                                                       Page 10
                                    ©2011 280 Group LLC. All rights reserved.
Is This the Future?




                                                     Page 11
                  ©2011 280 Group LLC. All rights reserved.
A Legal Precedent for User
        Privacy Legislation
• State privacy laws - California SB 1386
  – Effective July 1, 2003
  – Requires an agency, person or business that
    conducts business in California …to disclose any
    breach of security (to any resident).
  – Similar laws now in force in 46 states in US
• What would be the impact if these laws
  were extended to online privacy issues?


                                                                           Page 12
                                        ©2011 280 Group LLC. All rights reserved.
HIPAA (1986) and HITECH(2009)

• Health Insurance Portability and
  Accountability Act (HIPAA)
  – Mandates patient medical record privacy
  – No enforcement mechanism
• Health Information Technology for Economic
  and Clinical Health Act (HITECH)
  – Creates enforcement mechanisms for HIPAA



                                                                          Page 13
                                       ©2011 280 Group LLC. All rights reserved.
Federal Trade Commission
         Privacy Concerns
• December, 2010, FTC Staff Issues Privacy
  Report
• Framework for Consumers, Businesses, and
  Policymakers
  – Endorses “Do Not Track” browser mechanism to
    Facilitate Consumer Choice About Online
    Tracking
• FTC has ability to implement new rules
  without Congressional approval
                                                                        Page 14
                                     ©2011 280 Group LLC. All rights reserved.
Google Settles with FTC Over
           Buzz (March, 2011)
• US Federal Trade Commission
  charged Google with violations of
  own privacy policy, with Buzz social
  network service
   – Gmail account info used without
       user OK
• FTC requires Google to get user OK
  before sharing info
• 20 years of audits, fines
• “… legal order … further than
  voluntary commitment,” – deputy
  dir, FTC Bureau of Consumer
  Protection
   – First such action
   – “broad consequences” expected                                          Page 15
                                         ©2011 280 Group LLC. All rights reserved.
Twitter Settles Federal Trade
 Commission Charges (June, 2010)
• FTC charged Twitter deceived consumers and put
  privacy at risk
• First case by FTC
  against social
  media site
• Complaint charged
  poor security allowed
  hackers to gain admin control, send phony tweets
• Twitter barred for 20 years from misleading consumers
  about security, privacy, confidentiality, also must create
  comprehensive security program, outside auditing
                                                                                Page 16
                                             ©2011 280 Group LLC. All rights reserved.
2011 Proposed Congressional
           Legislation
• Series of bills introduced by senators and
  representatives, most recently Sept. 8
   – Consumer online privacy
   – Use of geolocation by law enforcement agencies
   – Broader issue of data breach – supplant state laws with
     uniform national standard
• Too numerous to list, discuss in any detail
• Issues and differences along party lines around
  definition of private data, opt-in vs. opt-out, consumer
  right to sue, FTC powers

                                                                                    Page 17
                                                 ©2011 280 Group LLC. All rights reserved.
FTC Report on Children’s Privacy

• Sept. 16 (Friday!) FTC proposed changes to
  Children‟s Online Privacy Protection Act
  (COPPA)
  – Requires parental permission for company to
    collect any personal information for child under 13
  – Changes include locaiton data, use of cookies for
    purpose of targeted advertising
  – Prompted by “explosion” in children‟s use of
    mobile devices, online social media, interactive
    gaming
                                                                            Page 18
                                         ©2011 280 Group LLC. All rights reserved.
European Union – Right to be
            Forgotten
• March, 2011, European Union confirmed that
  it will enshrine 'right to be forgotten' in law.
• Justice Commissioner Vivian Reding warned
  Facebook in 2010 that she was dissatisfied
  with changes to the social network's privacy
  settings.
• In speech to European parliament, Ms
  Reding said that, "A US-based social network
  company that has millions of active users in
  Europe needs to comply with EU rules."           Page 19
                                         ©2011 280 Group LLC. All rights reserved.
Agenda

• Why is user privacy an emerging concern? –
  recent privacy issues
• Government regulation: precedents and
  potential new laws
• Public concerns
• Industry responses
• Causes of lack of user privacy
• Product manager responsibilities
• Takeaway ideas
• What is the 280 Group?

                                                                       Page 20
                                    ©2011 280 Group LLC. All rights reserved.
“Forget Email... Social's the New
             Spam Vector”
• “… this shift in spammer strategy from email to social
  networking sites tracks perfectly with users' online behavior”
• “spammers are counting on … our collective naïveté.”




                                                                                 Page 21
                                              ©2011 280 Group LLC. All rights reserved.
Damage to Facebook Brand
• Why Facebook’s ―private‖ messages are a
  joke, Jesse Stanchak on May
  6, 2010, http://smartblogs.com/socialmedia/2010/05/06/why-
  facebooks-private-messages-are-a-joke/
• ACLU Weighs in on Facebook’s Privacy
  Issues, Rex Gradeless, May
  13, 2010, http://socialmedialawstudent.com/featured/aclu-
  weighs-in-on-facebooks-privacy-issues/
• 6 Alternatives to Facebook, Itamar
  Kestenbaum, May
  20, 2010, http://www.socialmediatoday.com/SMC/199443

       … and many, many more …                                                    Page 22
                                               ©2011 280 Group LLC. All rights reserved.
Consumers Reports Takes Notice

• June, 2010 Magazine
   – Two out of three online U.S. households use social networks
     such as Facebook and MySpace, nearly twice as many as a
     year ago.
   – But “millions … put themselves and their families at risk by
     exposing very sensitive personal information,” … national
     survey of 2,000 online households conducted in January.


• March 23, 2011 email on “Zombie cookies”
   – Describes privacy threat from cookies “…bits of code
     placed on your computer by companies that track you
     while you're on the Internet — they come back even
     after you have carefully deleted them. And that's not
     illegal.”
   – Invites reader to sign online petition
                                                                                   Page 23
                                                ©2011 280 Group LLC. All rights reserved.
ACLU Cites “Social Insecurity”
"We're just at the beginning (italics added for
emphasis) of seeing what the implications are for so
much information being posted on social networks,"
Nicole Ozer, the technology and civil liberties policy
director .. ACLU, N Cal.




                                                                                Page 24
                                             ©2011 280 Group LLC. All rights reserved.
Brand Damage: Poor Customer
  Sat with Social Media websites
• ForeSee Results, Annual E-Business Report for the
  American Customer Satisfaction Index (ACSI), July
  19, 2011– http://www.foreseeresults.com/research-white-
  papers/_downloads/foresee-results-annual-e-business-report-
  2011.pdf
• “…interviews with approx. 70,000 customers …to
  measure satisfaction with more than 200 companies
  in 44 industries and 10 economic sectors”
• “Customer satisfaction, as measured using the
  American Customer Satisfaction Index (ACSI), is a
  proven predictor of future financial performance.”

                                                                                  Page 25
                                               ©2011 280 Group LLC. All rights reserved.
Brand Damage: Poor Customer
  Sat with Social Media websites
• Key finding: “Satisfaction with social media sites
  remains low, yet stable, with an unchanged
  aggregate score of 70. …while Facebook remains
  the lowet-scoring … at 66, despite making some
  small improvements”

• “… social media is among the lowest-scoring [across
  47 industries] measured by the ACSI. Only
  airlines, cable television, and print newspapers
  manage to satisfy customers less than social media
  websites.”
   – Threat from Google + ?
                                                                            Page 26
                                         ©2011 280 Group LLC. All rights reserved.
Agenda

• Why is user privacy an emerging concern? –
  recent privacy issues
• Government regulation: precedents and
  potential new laws
• Public concerns
• Industry responses
• Causes of lack of user privacy
• Product manager responsibilities
• Takeaway ideas
• What is the 280 Group?

                                                                       Page 27
                                    ©2011 280 Group LLC. All rights reserved.
Mark Zuckerberg Doesn’t Value Privacy


• January 9, 2010




• April 23, 2010




                                                                    Page 28
                                 ©2011 280 Group LLC. All rights reserved.
Zuckerberg Admits Mistakes About Privacy


• May 24, 2010




                                                                   Page 29
                                ©2011 280 Group LLC. All rights reserved.
Zuckerberg Public Letter Really
  Targets Federal Government
• Zuckerberg letter to blogger and
  Op-Ed piece in Wash. Post, May 24, 2010 --
  http://www.washingtonpost.com/wp-
  dyn/content/article/2010/05/23/AR2010052303828.html
  – “There needs to be a simpler way to control your
    information," he wrote. "In the coming weeks, we will
    add privacy controls that are much simpler to use. We
    will also give you an easy way to turn off all third-party
    services.”
  – First response to “furor over Facebook's user privacy
    moves that left the site with a public relations problem
    and fighting to defend its reputation.”
                                                                                  Page 30
                                               ©2011 280 Group LLC. All rights reserved.
Tone Deaf Eric Schmidt calls for Young
 Adult “Witness Protection Program”

• “[Schmidt ]predicts, apparently seriously, that every
  young person one day will be entitled automatically to
  change his or her name on reaching adulthood in
  order to disown youthful hijinks stored on their
  friends' social media sites.”



• Doesn’t Google have
  any responsibility
  here?

                                                                             Page 31
                                          ©2011 280 Group LLC. All rights reserved.
Apple’s Very Different User
          Privacy Policy
• Steve Jobs on user privacy:
  – “ … different view … than some of our colleagues
    in the Valley. We take privacy very seriously.”
  – “Privacy means people know what they‟re signing
    up for. In plain English. … repeatedly”
  – “Let them know precisely what you‟re going to do
    with their data.”
  – Wall Street Journal, Technology, Kara Swisher and Walt
    Mossberg, June 7, 2010, p. R3.


                                                                                 Page 32
                                              ©2011 280 Group LLC. All rights reserved.
“Do Not Track” Option in FireFox
           4 Browser
• Released March 23
• Builds on “Privacy
  Mode” in FireFox,
  Internet Explorer
• Depends on website
  voluntary compliance
• Also in IE 9


                                                            Page 33
                         ©2011 280 Group LLC. All rights reserved.
Causes of Privacy Threats
• Corporate policy
  – Business model monetizes private data
  – Complete indifference to privacy issues
• Poor operations and programming practices
  – Badly designed, buggy software and configurations
  – Poorly secured websites allow professional criminals
    to steal user private data
     • “contribute” content with “malware”
     • forcefully plant malware
     • Hijack user accounts to send spam and steal private data

• Lack of user education
  – Users don‟t know how or why to protect private data
  – “Social Engineering” tricks users
                                                                                          Page 34
                                                       ©2011 280 Group LLC. All rights reserved.
Agenda

• Why is user privacy an emerging concern? –
  recent privacy issues
• Government regulation: precedents and
  potential new laws
• Public concerns
• Industry responses
• Causes of lack of user privacy
• Product manager responsibilities
• Takeaway ideas
• What is the 280 Group?

                                                                       Page 35
                                    ©2011 280 Group LLC. All rights reserved.
Define Market Requirements
• Well-researched Market Requirements
  should cover both stated and unstated
  (latent) needs
  – Protect your company‟s brand and revenue
  – Perhaps protect your career

• Privacy/Security requirements not called out
  because they are “universally understood” or
  perhaps not understood


                                                                         Page 36
                                      ©2011 280 Group LLC. All rights reserved.
Who Understands Privacy
         (Security) Issues?
• Almost all end users (business, consumer) do
  not begin to understand privacy issues
• Most Line of Business owners prioritize time-
  to-market, or won‟t invest in effective security

• Many software developers do not know how
  to write secure code
• IT often deploys insecure websites, networks
• Most product managers not aware

                                                                        Page 37
                                     ©2011 280 Group LLC. All rights reserved.
Define Market Requirements
• Privacy Policy
  – User privacy respected by web site owner
    company and third parties, including advertisers
  – User data protected from unauthorized access by
    individuals and companies
  – Simplify data sharing options and default to NONE

• User Education
  – Educate about managing their data
  – Educate about privacy implications of sharing data
  – Provide effective and timely advice and warnings
    about social engineering attacks
  – Provide effective help                           Page 38
                                          ©2011 280 Group LLC. All rights reserved.
Influence Company Policies
• Programing, Administration and Operations
  – Test all changes to prevent exposure of user data
  – Ensure that user posted content is safe
  – Detect and remove malware planted by hackers
  – Work with security vendors on emerging threats
  – Notify users proactively of security breaches, even
    if not required by law
  – Include partners in security programs

  – Maintain ongoing programs and provide sufficient
    resources, including outside help


                                                                            Page 39
                                         ©2011 280 Group LLC. All rights reserved.
Agenda

• Why is user privacy an emerging concern? –
  recent privacy issues
• Government regulation: precedents and
  potential new laws
• Public concerns
• Industry responses
• Causes of lack of user privacy
• Product manager responsibilities
• Takeaway ideas
• What is the 280 Group?

                                                                       Page 40
                                    ©2011 280 Group LLC. All rights reserved.
Takeaway Ideas

• You must understand the business
  consequences of poor user privacy
  – It‟s only your company‟s revenue, business model
    and maybe your career
• As the product champion, you must articulate
  the issues, document the requirements, and
  influence overall policies in your company
• You do not have to be security expert

                                                                          Page 41
                                       ©2011 280 Group LLC. All rights reserved.
Closure

• Questions?

• Contact me later
  – phil@280group.com
  – (650) 766 9970
  – http://tungle.me/philburton to set up an
    appointment


                                                                       Page 42
                                    ©2011 280 Group LLC. All rights reserved.
Agenda

• Why is user privacy an emerging concern? –
  recent privacy issues
• Government regulation: precedents and
  potential new laws
• Public concerns
• Industry responses
• Causes of lack of user privacy
• Product manager responsibilities
• Takeaway ideas
• What is the 280 Group?

                                                                       Page 43
                                    ©2011 280 Group LLC. All rights reserved.
280 Group

• Based in Campbell, California
• Exclusive focus on product management and product
  marketing
   – Consulting & Contractors
   – Toolkits & PM Office™
     (Product Manager‟s, Roadmaps, Launches, Beta, Reviews)
   – Training: public & private
   – Certifications




                                                                                    Page 44
                                                 ©2011 280 Group LLC. All rights reserved.
Why are we the “280 Group?”




                                                        Page 45
                     ©2011 280 Group LLC. All rights reserved.
280 Group Resources

•   Free templates
•   White papers
•   Product Management Manifesto
•   280 Group Product Management 2.0 Newsletter
•   280 LinkedIn Group
•   PM job hunting/listings
•   Product Management 2.0 Blog
•   280 Group Press books


       Go to www.280group.com in the ―Resources‖ section.


                                                                                 Page 46
                                              ©2011 280 Group LLC. All rights reserved.
ADDITIONAL BACKGROUND
AND EXAMPLES OF
PRIVACY LACK
                                                            47
                ©2011 280 Group LLC. All rights reserved.
California SB 242 User Opt-In

• Bill failed to pass, June, 2011, due to
  opposition from industry
   – Facebook, Google, Twitter, Skype, Match.com, eH
     armony, Yahoo, others
   – Opposition claimed law would damage California
     businesses
• New York Times Op-Ed piece referred to “Big
  Data,” as lobby similar to “Big Oil”


                                                                          Page 48
                                       ©2011 280 Group LLC. All rights reserved.
Poorly Protected Website Infected
        with “Drive-By” Malware
• Hackers
  successfully
  penetrate well-
  known site
  – Plant “Drive-by
    downloads” on poorly
    protected sites

• safeweb.norton.com
  /buzz

                                                              Page 49
                           ©2011 280 Group LLC. All rights reserved.
The Not-Private Blog

• The “niece‟s blog”
  – The aunt periodically did Google search on nieces
    and nephews to keep up with their activities
  – College freshman niece wrote one blog for parents
    and relatives
  – Wrote second blog for just for friends
     • Password protected
     • Drugs, sex, wild parties, disparaging comments on family
     • Google found it with normal “spidering”


                                                                                  Page 50
                                               ©2011 280 Group LLC. All rights reserved.
Facebook Policy Causes Privacy
            Threats
• “Your Privacy Isn‟t So Private” – San Jose
  Mercury-News, Tech Files column, May
  3, 2010
  – Facebook is “cavalier” with privacy of its users
  – “Alarm bells went off in my head over the privacy
    issues”
  – “Astonishing how much information Facebook now
    considers „public‟ and is sharing with its marketing
    partners”




                                                                             Page 51
                                          ©2011 280 Group LLC. All rights reserved.
Google and Facebook “Blurring
            the Line”
• “A Blurring Line: Private and Public” – NY
  Times, Bits column, March 15, 2010
  – Google Buzz service “complete disaster” by
    linking email accounts to status updates on social
    networks
  – Facebook makes members information public by
    default
  – Issue is “broader muddying of the line between
    what is private and what is public online.”




                                                                            Page 52
                                         ©2011 280 Group LLC. All rights reserved.
Facebook Places issue

• Facebook announced location service
  “Places” August 18, 2010
• Immediate criticism of default “opt-in”
  –   No single opt-out setting
  –   No ability to control which people can see check-in
  –   Can “check-in” friends without permission
  –   Available to Facebook partners and phone apps



                                                                              Page 53
                                           ©2011 280 Group LLC. All rights reserved.
Corporate Indifference:
         Uploaded Photos Reveal Subject
                   Location
• “Geotags” in uploaded photos
  identify exact location
• Children, friends, houses,
  expensive cars, etc.
• Website APIs make it easy
  for criminals and stalkers to
  locate on Google Maps
   – “Cyber-casing”

• Users “compromising their privacy, if not their safety”
• Illegal under copyright law to strip out all “metadata”
• Smartphones and websites need better user controls
                                                                                  Page 54
                                               ©2011 280 Group LLC. All rights reserved.
Backlash Over Un-Deletable
               Cookies
“Cookies' Cause Bitter Backlash” -- Wall
  Street Journal, September 19,2010
  http://online.wsj.com/article_email/SB10001424052748704416904575502261335698370-
  lMyQjAxMTAwMDIwMDEyNDAyWj.html

• Companies now using “Flash cookies” that can “re-
  spawn” after being deleted by user
• Six lawsuits filed July – September, 2010
• "There are some in the industry who do not believe
  that users should be able to block tracking…," Chris
  Hoofnagle, director, Berkeley Center for Law & Technology's
  information-privacy programs
• Two bills introduced into Congress


                                                                                                            Page 55
                                                                         ©2011 280 Group LLC. All rights reserved.
Credit Card Numbers Revealed
• Web site Blippy.com revealed credit card numbers




                                                                       Page 56
                                    ©2011 280 Group LLC. All rights reserved.
Credit Card Numbers Revealed
• Not enough
  testing
  – http://techie-
    buzz.com/tech-
    news/credit-
    card-numbers-
    of-blippy-users-
    show-up-on-
    google.html
    (April 23, 2010)



                                                             Page 57
                          ©2011 280 Group LLC. All rights reserved.
Not So Private Chats on
                Facebook
• Insufficient
  testing or poor
  configuration
  revealed private
  chats on
  Facebook




                                                               Page 58
                            ©2011 280 Group LLC. All rights reserved.
Poor Operations Practices
 Reveals iPad phone and email info
• AT&T website
  exposed phone IDs
  email addresses of
  114,000 iPad
  owners
  – dozens of
    CEOs, military
    officials, and top
    politicians
  – FBI investigating

  – Wall Street                                                 Page 59
    Journal, June 11, 2010   ©2011 280 Group LLC. All rights reserved.
Brand Damage: Poor Customer
 Sat with Social Media websites –
            2010 study
• ForeSee Results, Annual E-Business Report for the
  American Customer Satisfaction Index (ACSI), July
  20, 2010 – http://www.foreseeresults.com/research-white-
  papers/ACSI-e-business-report-2010.shtml
• “…interviews with approx. 70,000 customers …to
  measure satisfaction with more than 200 companies
  in 44 industries and 10 economic sectors”
• Key finding: “Social Media: Customer satisfaction
  with social media sites is poor (70) … lowest industry
  aggregate score of any of the e-business or e-retail
  industries.”
   – Better than only airlines and subscription TV (66)
                                                                                     Page 60
                                                  ©2011 280 Group LLC. All rights reserved.

Contenu connexe

Tendances

Cyber law and introduction for undergrad
Cyber law and introduction for undergradCyber law and introduction for undergrad
Cyber law and introduction for undergradAzmawati Lazim
 
08 Ethics, Law and E-commerce
08 Ethics, Law and E-commerce08 Ethics, Law and E-commerce
08 Ethics, Law and E-commercemonchai sopitka
 
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...VALLOYD
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk Endcode_org
 
IAB Online Content Regulation: Trends
IAB Online Content Regulation: Trends IAB Online Content Regulation: Trends
IAB Online Content Regulation: Trends Endcode_org
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..home based
 
Legal instrumentation in e commerce
Legal instrumentation in e commerceLegal instrumentation in e commerce
Legal instrumentation in e commerceUjjwal Joshi
 
Ethical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerceEthical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerceNor Ayuzi Deraman
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference Endcode_org
 
FTC Privacy Roundtable Background And Summary
FTC Privacy Roundtable Background And SummaryFTC Privacy Roundtable Background And Summary
FTC Privacy Roundtable Background And SummaryInternet Law Center
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management Endcode_org
 
Legal ethical issues E commerce
Legal ethical issues E commerceLegal ethical issues E commerce
Legal ethical issues E commerceWisnu Dewobroto
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadwaiforchi Wagiteerhh
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesAdam Thierer
 
Data Security and Privacy Landscape 2012 (September 2012)
Data Security and Privacy Landscape 2012 (September 2012)Data Security and Privacy Landscape 2012 (September 2012)
Data Security and Privacy Landscape 2012 (September 2012)Jason Haislmaier
 

Tendances (20)

Cyber law and introduction for undergrad
Cyber law and introduction for undergradCyber law and introduction for undergrad
Cyber law and introduction for undergrad
 
08 Ethics, Law and E-commerce
08 Ethics, Law and E-commerce08 Ethics, Law and E-commerce
08 Ethics, Law and E-commerce
 
Cyber law
Cyber lawCyber law
Cyber law
 
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk
 
IAB Online Content Regulation: Trends
IAB Online Content Regulation: Trends IAB Online Content Regulation: Trends
IAB Online Content Regulation: Trends
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..
 
Legal instrumentation in e commerce
Legal instrumentation in e commerceLegal instrumentation in e commerce
Legal instrumentation in e commerce
 
Chap 4 (1)
Chap 4 (1)Chap 4 (1)
Chap 4 (1)
 
E-Commerce 10
E-Commerce 10E-Commerce 10
E-Commerce 10
 
Ethical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerceEthical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerce
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference
 
FTC Privacy Roundtable Background And Summary
FTC Privacy Roundtable Background And SummaryFTC Privacy Roundtable Background And Summary
FTC Privacy Roundtable Background And Summary
 
Chapter 4_dp-pertemuan 6
 Chapter 4_dp-pertemuan 6 Chapter 4_dp-pertemuan 6
Chapter 4_dp-pertemuan 6
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management
 
E commerce
E commerce E commerce
E commerce
 
Legal ethical issues E commerce
Legal ethical issues E commerceLegal ethical issues E commerce
Legal ethical issues E commerce
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key Issues
 
Data Security and Privacy Landscape 2012 (September 2012)
Data Security and Privacy Landscape 2012 (September 2012)Data Security and Privacy Landscape 2012 (September 2012)
Data Security and Privacy Landscape 2012 (September 2012)
 

En vedette

Ecv training report in laos
Ecv training report in laosEcv training report in laos
Ecv training report in laosCSRU
 
How to be a great Product Owner
How to be a great Product OwnerHow to be a great Product Owner
How to be a great Product OwnerTrevor Fox
 
11886 gtz20090175enclimatechangeinformati
11886 gtz20090175enclimatechangeinformati11886 gtz20090175enclimatechangeinformati
11886 gtz20090175enclimatechangeinformatiCSRU
 
Leveraging video for b2b lead generation
Leveraging video for b2b lead generationLeveraging video for b2b lead generation
Leveraging video for b2b lead generationSalesfusion
 
Daniel Filho - HTML5, Por que você já pode usar ?
Daniel Filho - HTML5, Por que você já pode usar ?Daniel Filho - HTML5, Por que você já pode usar ?
Daniel Filho - HTML5, Por que você já pode usar ?Rodrigo Campos
 
Slides Products And Opportunity Linkenin
Slides Products And Opportunity LinkeninSlides Products And Opportunity Linkenin
Slides Products And Opportunity Linkeninlory1ro
 
SalesFUSION Webinar - Tracking Digital Body Language
SalesFUSION Webinar - Tracking Digital Body LanguageSalesFUSION Webinar - Tracking Digital Body Language
SalesFUSION Webinar - Tracking Digital Body LanguageSalesfusion
 

En vedette (7)

Ecv training report in laos
Ecv training report in laosEcv training report in laos
Ecv training report in laos
 
How to be a great Product Owner
How to be a great Product OwnerHow to be a great Product Owner
How to be a great Product Owner
 
11886 gtz20090175enclimatechangeinformati
11886 gtz20090175enclimatechangeinformati11886 gtz20090175enclimatechangeinformati
11886 gtz20090175enclimatechangeinformati
 
Leveraging video for b2b lead generation
Leveraging video for b2b lead generationLeveraging video for b2b lead generation
Leveraging video for b2b lead generation
 
Daniel Filho - HTML5, Por que você já pode usar ?
Daniel Filho - HTML5, Por que você já pode usar ?Daniel Filho - HTML5, Por que você já pode usar ?
Daniel Filho - HTML5, Por que você já pode usar ?
 
Slides Products And Opportunity Linkenin
Slides Products And Opportunity LinkeninSlides Products And Opportunity Linkenin
Slides Products And Opportunity Linkenin
 
SalesFUSION Webinar - Tracking Digital Body Language
SalesFUSION Webinar - Tracking Digital Body LanguageSalesFUSION Webinar - Tracking Digital Body Language
SalesFUSION Webinar - Tracking Digital Body Language
 

Similaire à What every product manager needs to know about online privacy

What every product manager needs to know about security
What every product manager needs to know about securityWhat every product manager needs to know about security
What every product manager needs to know about securitySilicon Valley ProductCamp
 
What every product manager needs to know about security
What every product manager needs to know about securityWhat every product manager needs to know about security
What every product manager needs to know about securityAIPMM Administration
 
Compliance and Deliverability Workshop
Compliance and Deliverability WorkshopCompliance and Deliverability Workshop
Compliance and Deliverability WorkshopMatt Vernhout
 
Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Brian Rowe
 
Privacy & Social Media
Privacy & Social MediaPrivacy & Social Media
Privacy & Social Mediachuckbt
 
Infocom Security
Infocom SecurityInfocom Security
Infocom Securitymmavis
 
IT risk discusion qustion.pdf
IT risk discusion qustion.pdfIT risk discusion qustion.pdf
IT risk discusion qustion.pdfstirlingvwriters
 
Socialize Conference Toronto 2012 - FaceBook Marketing:
Socialize Conference Toronto 2012 - FaceBook Marketing: Socialize Conference Toronto 2012 - FaceBook Marketing:
Socialize Conference Toronto 2012 - FaceBook Marketing: Adler Law Group
 
2019-06-11 What New US State Laws Mean For Your Business
2019-06-11 What New US State Laws  Mean For Your Business2019-06-11 What New US State Laws  Mean For Your Business
2019-06-11 What New US State Laws Mean For Your BusinessTrustArc
 
Social Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal LiabilitiesSocial Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal LiabilitiesTommy Hobin
 
E Marketing Ethical and Legal Issues
E Marketing Ethical and Legal IssuesE Marketing Ethical and Legal Issues
E Marketing Ethical and Legal Issueskarthik indrajit
 
A Pratical Guide to GDPR - F.Coin
A Pratical Guide to GDPR - F.CoinA Pratical Guide to GDPR - F.Coin
A Pratical Guide to GDPR - F.CoinFranco Coin
 
Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Matthew Asbell
 
Keeping Information Safe: Privacy and Security Issues
Keeping Information Safe: Privacy and Security IssuesKeeping Information Safe: Privacy and Security Issues
Keeping Information Safe: Privacy and Security Issuesipspat
 

Similaire à What every product manager needs to know about online privacy (20)

What every product manager needs to know about security
What every product manager needs to know about securityWhat every product manager needs to know about security
What every product manager needs to know about security
 
What every product manager needs to know about security
What every product manager needs to know about securityWhat every product manager needs to know about security
What every product manager needs to know about security
 
Compliance and Deliverability Workshop
Compliance and Deliverability WorkshopCompliance and Deliverability Workshop
Compliance and Deliverability Workshop
 
Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550
 
Adler nurani
Adler nurani Adler nurani
Adler nurani
 
Adler nurani
Adler nurani Adler nurani
Adler nurani
 
Privacy & Social Media
Privacy & Social MediaPrivacy & Social Media
Privacy & Social Media
 
Infocom Security
Infocom SecurityInfocom Security
Infocom Security
 
Adler nurani
Adler nurani Adler nurani
Adler nurani
 
Adler nurani
Adler nurani Adler nurani
Adler nurani
 
IT risk discusion qustion.pdf
IT risk discusion qustion.pdfIT risk discusion qustion.pdf
IT risk discusion qustion.pdf
 
Socialize Conference Toronto 2012 - FaceBook Marketing:
Socialize Conference Toronto 2012 - FaceBook Marketing: Socialize Conference Toronto 2012 - FaceBook Marketing:
Socialize Conference Toronto 2012 - FaceBook Marketing:
 
2019-06-11 What New US State Laws Mean For Your Business
2019-06-11 What New US State Laws  Mean For Your Business2019-06-11 What New US State Laws  Mean For Your Business
2019-06-11 What New US State Laws Mean For Your Business
 
Social Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal LiabilitiesSocial Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal Liabilities
 
E Marketing Ethical and Legal Issues
E Marketing Ethical and Legal IssuesE Marketing Ethical and Legal Issues
E Marketing Ethical and Legal Issues
 
A Pratical Guide to GDPR - F.Coin
A Pratical Guide to GDPR - F.CoinA Pratical Guide to GDPR - F.Coin
A Pratical Guide to GDPR - F.Coin
 
IoT PPT Deck
IoT PPT DeckIoT PPT Deck
IoT PPT Deck
 
Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10
 
Keeping Information Safe: Privacy and Security Issues
Keeping Information Safe: Privacy and Security IssuesKeeping Information Safe: Privacy and Security Issues
Keeping Information Safe: Privacy and Security Issues
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 

Plus de Trevor Fox

Bridging the Gap
Bridging the GapBridging the Gap
Bridging the GapTrevor Fox
 
Introduction to Data Warehousing
Introduction to Data WarehousingIntroduction to Data Warehousing
Introduction to Data WarehousingTrevor Fox
 
Product camp of going global
Product camp of going globalProduct camp of going global
Product camp of going globalTrevor Fox
 
Location Based Mobile Advertising : Market Overview, Revenue Opportunities an...
Location Based Mobile Advertising : Market Overview, Revenue Opportunities an...Location Based Mobile Advertising : Market Overview, Revenue Opportunities an...
Location Based Mobile Advertising : Market Overview, Revenue Opportunities an...Trevor Fox
 
Holding ACEs – A Practical Model for Jump Starting New Product Teams
Holding ACEs – A Practical Model for Jump Starting New Product TeamsHolding ACEs – A Practical Model for Jump Starting New Product Teams
Holding ACEs – A Practical Model for Jump Starting New Product TeamsTrevor Fox
 
Pethrick Insights Eyechart
Pethrick Insights EyechartPethrick Insights Eyechart
Pethrick Insights EyechartTrevor Fox
 
Insights – Where To Look And How To Organize Them
Insights – Where To Look And How To Organize ThemInsights – Where To Look And How To Organize Them
Insights – Where To Look And How To Organize ThemTrevor Fox
 
Ideation for product innovation: What are the best methods?
Ideation for product innovation: What are the best methods?Ideation for product innovation: What are the best methods?
Ideation for product innovation: What are the best methods?Trevor Fox
 
Blog, Events, Profits & Fun – Four Pillars of Great Product Marketing
Blog, Events, Profits & Fun – Four Pillars of Great Product MarketingBlog, Events, Profits & Fun – Four Pillars of Great Product Marketing
Blog, Events, Profits & Fun – Four Pillars of Great Product MarketingTrevor Fox
 
15 Integrated Marketing Ideas (That Work)
15 Integrated Marketing Ideas (That Work)15 Integrated Marketing Ideas (That Work)
15 Integrated Marketing Ideas (That Work)Trevor Fox
 
Product Owners: What affects execution?
Product Owners: What affects execution?Product Owners: What affects execution?
Product Owners: What affects execution?Trevor Fox
 
Managing your product’s social life
	Managing your product’s social life	Managing your product’s social life
Managing your product’s social lifeTrevor Fox
 
Opportunities, Trials and Tribulations of Going Global
	Opportunities, Trials and Tribulations of Going Global	Opportunities, Trials and Tribulations of Going Global
Opportunities, Trials and Tribulations of Going GlobalTrevor Fox
 
Building a Multi-Platform Product Quickly at The Wall Street Journal
Building a Multi-Platform Product Quickly at The Wall Street JournalBuilding a Multi-Platform Product Quickly at The Wall Street Journal
Building a Multi-Platform Product Quickly at The Wall Street JournalTrevor Fox
 
Listening to the Patients: Uncovering the Hidden Value in Medicine
Listening to the Patients: Uncovering the Hidden Value in MedicineListening to the Patients: Uncovering the Hidden Value in Medicine
Listening to the Patients: Uncovering the Hidden Value in MedicineTrevor Fox
 
The Abilene Paradox The Management of Agreement
The Abilene Paradox The Management of Agreement The Abilene Paradox The Management of Agreement
The Abilene Paradox The Management of Agreement Trevor Fox
 
Making Product Development Agile
Making Product Development AgileMaking Product Development Agile
Making Product Development AgileTrevor Fox
 
Beyond Brainstorming: Tools for Better Thinking & Creativity
Beyond Brainstorming: Tools for Better Thinking & CreativityBeyond Brainstorming: Tools for Better Thinking & Creativity
Beyond Brainstorming: Tools for Better Thinking & CreativityTrevor Fox
 
What Jersey Shore Can Teach Product Managers
What Jersey Shore Can Teach Product ManagersWhat Jersey Shore Can Teach Product Managers
What Jersey Shore Can Teach Product ManagersTrevor Fox
 
How The Butterfly Effect Changes Everything For Product Managers
How The Butterfly Effect Changes Everything For Product ManagersHow The Butterfly Effect Changes Everything For Product Managers
How The Butterfly Effect Changes Everything For Product ManagersTrevor Fox
 

Plus de Trevor Fox (20)

Bridging the Gap
Bridging the GapBridging the Gap
Bridging the Gap
 
Introduction to Data Warehousing
Introduction to Data WarehousingIntroduction to Data Warehousing
Introduction to Data Warehousing
 
Product camp of going global
Product camp of going globalProduct camp of going global
Product camp of going global
 
Location Based Mobile Advertising : Market Overview, Revenue Opportunities an...
Location Based Mobile Advertising : Market Overview, Revenue Opportunities an...Location Based Mobile Advertising : Market Overview, Revenue Opportunities an...
Location Based Mobile Advertising : Market Overview, Revenue Opportunities an...
 
Holding ACEs – A Practical Model for Jump Starting New Product Teams
Holding ACEs – A Practical Model for Jump Starting New Product TeamsHolding ACEs – A Practical Model for Jump Starting New Product Teams
Holding ACEs – A Practical Model for Jump Starting New Product Teams
 
Pethrick Insights Eyechart
Pethrick Insights EyechartPethrick Insights Eyechart
Pethrick Insights Eyechart
 
Insights – Where To Look And How To Organize Them
Insights – Where To Look And How To Organize ThemInsights – Where To Look And How To Organize Them
Insights – Where To Look And How To Organize Them
 
Ideation for product innovation: What are the best methods?
Ideation for product innovation: What are the best methods?Ideation for product innovation: What are the best methods?
Ideation for product innovation: What are the best methods?
 
Blog, Events, Profits & Fun – Four Pillars of Great Product Marketing
Blog, Events, Profits & Fun – Four Pillars of Great Product MarketingBlog, Events, Profits & Fun – Four Pillars of Great Product Marketing
Blog, Events, Profits & Fun – Four Pillars of Great Product Marketing
 
15 Integrated Marketing Ideas (That Work)
15 Integrated Marketing Ideas (That Work)15 Integrated Marketing Ideas (That Work)
15 Integrated Marketing Ideas (That Work)
 
Product Owners: What affects execution?
Product Owners: What affects execution?Product Owners: What affects execution?
Product Owners: What affects execution?
 
Managing your product’s social life
	Managing your product’s social life	Managing your product’s social life
Managing your product’s social life
 
Opportunities, Trials and Tribulations of Going Global
	Opportunities, Trials and Tribulations of Going Global	Opportunities, Trials and Tribulations of Going Global
Opportunities, Trials and Tribulations of Going Global
 
Building a Multi-Platform Product Quickly at The Wall Street Journal
Building a Multi-Platform Product Quickly at The Wall Street JournalBuilding a Multi-Platform Product Quickly at The Wall Street Journal
Building a Multi-Platform Product Quickly at The Wall Street Journal
 
Listening to the Patients: Uncovering the Hidden Value in Medicine
Listening to the Patients: Uncovering the Hidden Value in MedicineListening to the Patients: Uncovering the Hidden Value in Medicine
Listening to the Patients: Uncovering the Hidden Value in Medicine
 
The Abilene Paradox The Management of Agreement
The Abilene Paradox The Management of Agreement The Abilene Paradox The Management of Agreement
The Abilene Paradox The Management of Agreement
 
Making Product Development Agile
Making Product Development AgileMaking Product Development Agile
Making Product Development Agile
 
Beyond Brainstorming: Tools for Better Thinking & Creativity
Beyond Brainstorming: Tools for Better Thinking & CreativityBeyond Brainstorming: Tools for Better Thinking & Creativity
Beyond Brainstorming: Tools for Better Thinking & Creativity
 
What Jersey Shore Can Teach Product Managers
What Jersey Shore Can Teach Product ManagersWhat Jersey Shore Can Teach Product Managers
What Jersey Shore Can Teach Product Managers
 
How The Butterfly Effect Changes Everything For Product Managers
How The Butterfly Effect Changes Everything For Product ManagersHow The Butterfly Effect Changes Everything For Product Managers
How The Butterfly Effect Changes Everything For Product Managers
 

Dernier

2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...lizamodels9
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 

Dernier (20)

2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 

What every product manager needs to know about online privacy

  • 1. What Every Product Manager Needs To Know About Online Privacy Protecting Your Brand, Revenue, and Business Model Phil Burton Principal Consultant and Trainer, 280 Group Product Camp New York, Sept. 17, 2011 ©2011 280 Group LLC. All rights reserved.
  • 2. Can Behavioral Targeting Survive Privacy Worries? • Targeting people based on their tracked online activities • Privacy advocates concerned about ways advertisers gathering data • BT spending growing 20% per year, could surpass search ad revenues by 2015 • SF Conference on Behavioral Marketing, July, 2011 • “We don’t need a law to govern • http://www.forbes.com/sites/roberthof/201 1/07/20/can-behavioral-targeting-survive- our industry,” speaker says. “It privacy-worries/ will hold back innovation.” Page 2 ©2011 280 Group LLC. All rights reserved.
  • 3. Why is Online Privacy Important? • Lack of effective user privacy can affect revenues and damage your business model Loss of trust and reputation Brand damage  Decreases in site visitors  Lower revenue • Real and growing risk of increased government regulation Limit revenue opportunities Impact business model Limit opportunities for acquisition Page 3 ©2011 280 Group LLC. All rights reserved.
  • 4. Focus of this presentation • User online privacy issues – Potential business impacts – Web 2.0 – Social Media – Mobile Apps • Not – Consumer or parental guide to safe online activities – Online censorship in China, other repressive govts. – WikiLeaks or “hacktivism” in general – Overall issue of online security and hacking – Technical presentation on website security – Phone hacking Page 4 ©2011 280 Group LLC. All rights reserved.
  • 5. Agenda • Why is user privacy an emerging concern? – recent privacy issues • Government regulation: precedents and potential new laws • Public concerns • Industry responses • Causes of lack of user privacy • Product manager responsibilities • Takeaway ideas • What is the 280 Group? Page 5 ©2011 280 Group LLC. All rights reserved.
  • 6. Sony - Three Data Breaches • Three separate data breaches in April, 2011 – PlayStation Network – Qriocity music and video service – Sony Online Entertainment – One of largest data breaches in US history – One breach not discovered until May 3 • Over 100 million accounts affected: customer name, address, email account, DOB, gender and phone number, login name, “hashed” password, encrypted credit card number Page 6 ©2011 280 Group LLC. All rights reserved.
  • 7. Sony - Three Data Breaches • Analysts estimate costs at $170 M to $1 B – “deeper damage to brand image” could affect long-term product plans • Share price fell 55% from April to September • Service offline for 11 weeks • Class action lawsuit filed August 6, on behalf of all US subscribers – Alleges Sony violated Federal Electronics Communications Privacy Act, negligence, breach of fiduciary duty, seeks damages, etc. Page 7 ©2011 280 Group LLC. All rights reserved.
  • 8. Apple - iPhone Location Tracking • April 20, researchers disclose Apple collecting iPhone location data since 2010 launch of iOS 4, stored in unencrypted file – Congressman Ed Markey, co-chair of House Bipartisan Privacy Caucus, sent letter to Apple CEO Steve Jobs • Apple sued April 21 for privacy invasion and computer fraud by two FL customers • Apple‟s response, April 27, claims data collected to improve location-based services, cannot track individual users • Rep. Jay Inslee of Washington said on April 27 that Federal Trade Commission investigation needed • Senate held two subcommittee hearings in April • July 14, Apple pays $945 to settle iPhone tracking suit in Korea Page 8 ©2011 280 Group LLC. All rights reserved.
  • 9. Facebook – Picture Tagging and Facial Recognition • Manual picture tagging possible without opt-in permission from other people • Facial recognition (June, 2011) feature added suggestions for names – Facebook announced users could disable feature • European reaction was very negative, starts probe immediately • Negative reaction on US blogs – “Unfortunately, once again, Facebook seems to be sharing personal information by default.” – nakedsecurity.sophos.com – “Facebook is officially getting super-creepy. .. the end of privacy as we know it” - http://www.pcworld.com/article/229742/why_facebooks_facial_recognition_is_creepy.html • Divorce lawyers love this feature Page 9 ©2011 280 Group LLC. All rights reserved.
  • 10. Agenda • Why is user privacy an emerging concern? – recent privacy issues • Government regulation: precedents and potential new laws • Public concerns • Industry responses • Causes of lack of user privacy • Product manager responsibilities • Takeaway ideas • What is the 280 Group? Page 10 ©2011 280 Group LLC. All rights reserved.
  • 11. Is This the Future? Page 11 ©2011 280 Group LLC. All rights reserved.
  • 12. A Legal Precedent for User Privacy Legislation • State privacy laws - California SB 1386 – Effective July 1, 2003 – Requires an agency, person or business that conducts business in California …to disclose any breach of security (to any resident). – Similar laws now in force in 46 states in US • What would be the impact if these laws were extended to online privacy issues? Page 12 ©2011 280 Group LLC. All rights reserved.
  • 13. HIPAA (1986) and HITECH(2009) • Health Insurance Portability and Accountability Act (HIPAA) – Mandates patient medical record privacy – No enforcement mechanism • Health Information Technology for Economic and Clinical Health Act (HITECH) – Creates enforcement mechanisms for HIPAA Page 13 ©2011 280 Group LLC. All rights reserved.
  • 14. Federal Trade Commission Privacy Concerns • December, 2010, FTC Staff Issues Privacy Report • Framework for Consumers, Businesses, and Policymakers – Endorses “Do Not Track” browser mechanism to Facilitate Consumer Choice About Online Tracking • FTC has ability to implement new rules without Congressional approval Page 14 ©2011 280 Group LLC. All rights reserved.
  • 15. Google Settles with FTC Over Buzz (March, 2011) • US Federal Trade Commission charged Google with violations of own privacy policy, with Buzz social network service – Gmail account info used without user OK • FTC requires Google to get user OK before sharing info • 20 years of audits, fines • “… legal order … further than voluntary commitment,” – deputy dir, FTC Bureau of Consumer Protection – First such action – “broad consequences” expected Page 15 ©2011 280 Group LLC. All rights reserved.
  • 16. Twitter Settles Federal Trade Commission Charges (June, 2010) • FTC charged Twitter deceived consumers and put privacy at risk • First case by FTC against social media site • Complaint charged poor security allowed hackers to gain admin control, send phony tweets • Twitter barred for 20 years from misleading consumers about security, privacy, confidentiality, also must create comprehensive security program, outside auditing Page 16 ©2011 280 Group LLC. All rights reserved.
  • 17. 2011 Proposed Congressional Legislation • Series of bills introduced by senators and representatives, most recently Sept. 8 – Consumer online privacy – Use of geolocation by law enforcement agencies – Broader issue of data breach – supplant state laws with uniform national standard • Too numerous to list, discuss in any detail • Issues and differences along party lines around definition of private data, opt-in vs. opt-out, consumer right to sue, FTC powers Page 17 ©2011 280 Group LLC. All rights reserved.
  • 18. FTC Report on Children’s Privacy • Sept. 16 (Friday!) FTC proposed changes to Children‟s Online Privacy Protection Act (COPPA) – Requires parental permission for company to collect any personal information for child under 13 – Changes include locaiton data, use of cookies for purpose of targeted advertising – Prompted by “explosion” in children‟s use of mobile devices, online social media, interactive gaming Page 18 ©2011 280 Group LLC. All rights reserved.
  • 19. European Union – Right to be Forgotten • March, 2011, European Union confirmed that it will enshrine 'right to be forgotten' in law. • Justice Commissioner Vivian Reding warned Facebook in 2010 that she was dissatisfied with changes to the social network's privacy settings. • In speech to European parliament, Ms Reding said that, "A US-based social network company that has millions of active users in Europe needs to comply with EU rules." Page 19 ©2011 280 Group LLC. All rights reserved.
  • 20. Agenda • Why is user privacy an emerging concern? – recent privacy issues • Government regulation: precedents and potential new laws • Public concerns • Industry responses • Causes of lack of user privacy • Product manager responsibilities • Takeaway ideas • What is the 280 Group? Page 20 ©2011 280 Group LLC. All rights reserved.
  • 21. “Forget Email... Social's the New Spam Vector” • “… this shift in spammer strategy from email to social networking sites tracks perfectly with users' online behavior” • “spammers are counting on … our collective naïveté.” Page 21 ©2011 280 Group LLC. All rights reserved.
  • 22. Damage to Facebook Brand • Why Facebook’s ―private‖ messages are a joke, Jesse Stanchak on May 6, 2010, http://smartblogs.com/socialmedia/2010/05/06/why- facebooks-private-messages-are-a-joke/ • ACLU Weighs in on Facebook’s Privacy Issues, Rex Gradeless, May 13, 2010, http://socialmedialawstudent.com/featured/aclu- weighs-in-on-facebooks-privacy-issues/ • 6 Alternatives to Facebook, Itamar Kestenbaum, May 20, 2010, http://www.socialmediatoday.com/SMC/199443 … and many, many more … Page 22 ©2011 280 Group LLC. All rights reserved.
  • 23. Consumers Reports Takes Notice • June, 2010 Magazine – Two out of three online U.S. households use social networks such as Facebook and MySpace, nearly twice as many as a year ago. – But “millions … put themselves and their families at risk by exposing very sensitive personal information,” … national survey of 2,000 online households conducted in January. • March 23, 2011 email on “Zombie cookies” – Describes privacy threat from cookies “…bits of code placed on your computer by companies that track you while you're on the Internet — they come back even after you have carefully deleted them. And that's not illegal.” – Invites reader to sign online petition Page 23 ©2011 280 Group LLC. All rights reserved.
  • 24. ACLU Cites “Social Insecurity” "We're just at the beginning (italics added for emphasis) of seeing what the implications are for so much information being posted on social networks," Nicole Ozer, the technology and civil liberties policy director .. ACLU, N Cal. Page 24 ©2011 280 Group LLC. All rights reserved.
  • 25. Brand Damage: Poor Customer Sat with Social Media websites • ForeSee Results, Annual E-Business Report for the American Customer Satisfaction Index (ACSI), July 19, 2011– http://www.foreseeresults.com/research-white- papers/_downloads/foresee-results-annual-e-business-report- 2011.pdf • “…interviews with approx. 70,000 customers …to measure satisfaction with more than 200 companies in 44 industries and 10 economic sectors” • “Customer satisfaction, as measured using the American Customer Satisfaction Index (ACSI), is a proven predictor of future financial performance.” Page 25 ©2011 280 Group LLC. All rights reserved.
  • 26. Brand Damage: Poor Customer Sat with Social Media websites • Key finding: “Satisfaction with social media sites remains low, yet stable, with an unchanged aggregate score of 70. …while Facebook remains the lowet-scoring … at 66, despite making some small improvements” • “… social media is among the lowest-scoring [across 47 industries] measured by the ACSI. Only airlines, cable television, and print newspapers manage to satisfy customers less than social media websites.” – Threat from Google + ? Page 26 ©2011 280 Group LLC. All rights reserved.
  • 27. Agenda • Why is user privacy an emerging concern? – recent privacy issues • Government regulation: precedents and potential new laws • Public concerns • Industry responses • Causes of lack of user privacy • Product manager responsibilities • Takeaway ideas • What is the 280 Group? Page 27 ©2011 280 Group LLC. All rights reserved.
  • 28. Mark Zuckerberg Doesn’t Value Privacy • January 9, 2010 • April 23, 2010 Page 28 ©2011 280 Group LLC. All rights reserved.
  • 29. Zuckerberg Admits Mistakes About Privacy • May 24, 2010 Page 29 ©2011 280 Group LLC. All rights reserved.
  • 30. Zuckerberg Public Letter Really Targets Federal Government • Zuckerberg letter to blogger and Op-Ed piece in Wash. Post, May 24, 2010 -- http://www.washingtonpost.com/wp- dyn/content/article/2010/05/23/AR2010052303828.html – “There needs to be a simpler way to control your information," he wrote. "In the coming weeks, we will add privacy controls that are much simpler to use. We will also give you an easy way to turn off all third-party services.” – First response to “furor over Facebook's user privacy moves that left the site with a public relations problem and fighting to defend its reputation.” Page 30 ©2011 280 Group LLC. All rights reserved.
  • 31. Tone Deaf Eric Schmidt calls for Young Adult “Witness Protection Program” • “[Schmidt ]predicts, apparently seriously, that every young person one day will be entitled automatically to change his or her name on reaching adulthood in order to disown youthful hijinks stored on their friends' social media sites.” • Doesn’t Google have any responsibility here? Page 31 ©2011 280 Group LLC. All rights reserved.
  • 32. Apple’s Very Different User Privacy Policy • Steve Jobs on user privacy: – “ … different view … than some of our colleagues in the Valley. We take privacy very seriously.” – “Privacy means people know what they‟re signing up for. In plain English. … repeatedly” – “Let them know precisely what you‟re going to do with their data.” – Wall Street Journal, Technology, Kara Swisher and Walt Mossberg, June 7, 2010, p. R3. Page 32 ©2011 280 Group LLC. All rights reserved.
  • 33. “Do Not Track” Option in FireFox 4 Browser • Released March 23 • Builds on “Privacy Mode” in FireFox, Internet Explorer • Depends on website voluntary compliance • Also in IE 9 Page 33 ©2011 280 Group LLC. All rights reserved.
  • 34. Causes of Privacy Threats • Corporate policy – Business model monetizes private data – Complete indifference to privacy issues • Poor operations and programming practices – Badly designed, buggy software and configurations – Poorly secured websites allow professional criminals to steal user private data • “contribute” content with “malware” • forcefully plant malware • Hijack user accounts to send spam and steal private data • Lack of user education – Users don‟t know how or why to protect private data – “Social Engineering” tricks users Page 34 ©2011 280 Group LLC. All rights reserved.
  • 35. Agenda • Why is user privacy an emerging concern? – recent privacy issues • Government regulation: precedents and potential new laws • Public concerns • Industry responses • Causes of lack of user privacy • Product manager responsibilities • Takeaway ideas • What is the 280 Group? Page 35 ©2011 280 Group LLC. All rights reserved.
  • 36. Define Market Requirements • Well-researched Market Requirements should cover both stated and unstated (latent) needs – Protect your company‟s brand and revenue – Perhaps protect your career • Privacy/Security requirements not called out because they are “universally understood” or perhaps not understood Page 36 ©2011 280 Group LLC. All rights reserved.
  • 37. Who Understands Privacy (Security) Issues? • Almost all end users (business, consumer) do not begin to understand privacy issues • Most Line of Business owners prioritize time- to-market, or won‟t invest in effective security • Many software developers do not know how to write secure code • IT often deploys insecure websites, networks • Most product managers not aware Page 37 ©2011 280 Group LLC. All rights reserved.
  • 38. Define Market Requirements • Privacy Policy – User privacy respected by web site owner company and third parties, including advertisers – User data protected from unauthorized access by individuals and companies – Simplify data sharing options and default to NONE • User Education – Educate about managing their data – Educate about privacy implications of sharing data – Provide effective and timely advice and warnings about social engineering attacks – Provide effective help Page 38 ©2011 280 Group LLC. All rights reserved.
  • 39. Influence Company Policies • Programing, Administration and Operations – Test all changes to prevent exposure of user data – Ensure that user posted content is safe – Detect and remove malware planted by hackers – Work with security vendors on emerging threats – Notify users proactively of security breaches, even if not required by law – Include partners in security programs – Maintain ongoing programs and provide sufficient resources, including outside help Page 39 ©2011 280 Group LLC. All rights reserved.
  • 40. Agenda • Why is user privacy an emerging concern? – recent privacy issues • Government regulation: precedents and potential new laws • Public concerns • Industry responses • Causes of lack of user privacy • Product manager responsibilities • Takeaway ideas • What is the 280 Group? Page 40 ©2011 280 Group LLC. All rights reserved.
  • 41. Takeaway Ideas • You must understand the business consequences of poor user privacy – It‟s only your company‟s revenue, business model and maybe your career • As the product champion, you must articulate the issues, document the requirements, and influence overall policies in your company • You do not have to be security expert Page 41 ©2011 280 Group LLC. All rights reserved.
  • 42. Closure • Questions? • Contact me later – phil@280group.com – (650) 766 9970 – http://tungle.me/philburton to set up an appointment Page 42 ©2011 280 Group LLC. All rights reserved.
  • 43. Agenda • Why is user privacy an emerging concern? – recent privacy issues • Government regulation: precedents and potential new laws • Public concerns • Industry responses • Causes of lack of user privacy • Product manager responsibilities • Takeaway ideas • What is the 280 Group? Page 43 ©2011 280 Group LLC. All rights reserved.
  • 44. 280 Group • Based in Campbell, California • Exclusive focus on product management and product marketing – Consulting & Contractors – Toolkits & PM Office™ (Product Manager‟s, Roadmaps, Launches, Beta, Reviews) – Training: public & private – Certifications Page 44 ©2011 280 Group LLC. All rights reserved.
  • 45. Why are we the “280 Group?” Page 45 ©2011 280 Group LLC. All rights reserved.
  • 46. 280 Group Resources • Free templates • White papers • Product Management Manifesto • 280 Group Product Management 2.0 Newsletter • 280 LinkedIn Group • PM job hunting/listings • Product Management 2.0 Blog • 280 Group Press books Go to www.280group.com in the ―Resources‖ section. Page 46 ©2011 280 Group LLC. All rights reserved.
  • 47. ADDITIONAL BACKGROUND AND EXAMPLES OF PRIVACY LACK 47 ©2011 280 Group LLC. All rights reserved.
  • 48. California SB 242 User Opt-In • Bill failed to pass, June, 2011, due to opposition from industry – Facebook, Google, Twitter, Skype, Match.com, eH armony, Yahoo, others – Opposition claimed law would damage California businesses • New York Times Op-Ed piece referred to “Big Data,” as lobby similar to “Big Oil” Page 48 ©2011 280 Group LLC. All rights reserved.
  • 49. Poorly Protected Website Infected with “Drive-By” Malware • Hackers successfully penetrate well- known site – Plant “Drive-by downloads” on poorly protected sites • safeweb.norton.com /buzz Page 49 ©2011 280 Group LLC. All rights reserved.
  • 50. The Not-Private Blog • The “niece‟s blog” – The aunt periodically did Google search on nieces and nephews to keep up with their activities – College freshman niece wrote one blog for parents and relatives – Wrote second blog for just for friends • Password protected • Drugs, sex, wild parties, disparaging comments on family • Google found it with normal “spidering” Page 50 ©2011 280 Group LLC. All rights reserved.
  • 51. Facebook Policy Causes Privacy Threats • “Your Privacy Isn‟t So Private” – San Jose Mercury-News, Tech Files column, May 3, 2010 – Facebook is “cavalier” with privacy of its users – “Alarm bells went off in my head over the privacy issues” – “Astonishing how much information Facebook now considers „public‟ and is sharing with its marketing partners” Page 51 ©2011 280 Group LLC. All rights reserved.
  • 52. Google and Facebook “Blurring the Line” • “A Blurring Line: Private and Public” – NY Times, Bits column, March 15, 2010 – Google Buzz service “complete disaster” by linking email accounts to status updates on social networks – Facebook makes members information public by default – Issue is “broader muddying of the line between what is private and what is public online.” Page 52 ©2011 280 Group LLC. All rights reserved.
  • 53. Facebook Places issue • Facebook announced location service “Places” August 18, 2010 • Immediate criticism of default “opt-in” – No single opt-out setting – No ability to control which people can see check-in – Can “check-in” friends without permission – Available to Facebook partners and phone apps Page 53 ©2011 280 Group LLC. All rights reserved.
  • 54. Corporate Indifference: Uploaded Photos Reveal Subject Location • “Geotags” in uploaded photos identify exact location • Children, friends, houses, expensive cars, etc. • Website APIs make it easy for criminals and stalkers to locate on Google Maps – “Cyber-casing” • Users “compromising their privacy, if not their safety” • Illegal under copyright law to strip out all “metadata” • Smartphones and websites need better user controls Page 54 ©2011 280 Group LLC. All rights reserved.
  • 55. Backlash Over Un-Deletable Cookies “Cookies' Cause Bitter Backlash” -- Wall Street Journal, September 19,2010 http://online.wsj.com/article_email/SB10001424052748704416904575502261335698370- lMyQjAxMTAwMDIwMDEyNDAyWj.html • Companies now using “Flash cookies” that can “re- spawn” after being deleted by user • Six lawsuits filed July – September, 2010 • "There are some in the industry who do not believe that users should be able to block tracking…," Chris Hoofnagle, director, Berkeley Center for Law & Technology's information-privacy programs • Two bills introduced into Congress Page 55 ©2011 280 Group LLC. All rights reserved.
  • 56. Credit Card Numbers Revealed • Web site Blippy.com revealed credit card numbers Page 56 ©2011 280 Group LLC. All rights reserved.
  • 57. Credit Card Numbers Revealed • Not enough testing – http://techie- buzz.com/tech- news/credit- card-numbers- of-blippy-users- show-up-on- google.html (April 23, 2010) Page 57 ©2011 280 Group LLC. All rights reserved.
  • 58. Not So Private Chats on Facebook • Insufficient testing or poor configuration revealed private chats on Facebook Page 58 ©2011 280 Group LLC. All rights reserved.
  • 59. Poor Operations Practices Reveals iPad phone and email info • AT&T website exposed phone IDs email addresses of 114,000 iPad owners – dozens of CEOs, military officials, and top politicians – FBI investigating – Wall Street Page 59 Journal, June 11, 2010 ©2011 280 Group LLC. All rights reserved.
  • 60. Brand Damage: Poor Customer Sat with Social Media websites – 2010 study • ForeSee Results, Annual E-Business Report for the American Customer Satisfaction Index (ACSI), July 20, 2010 – http://www.foreseeresults.com/research-white- papers/ACSI-e-business-report-2010.shtml • “…interviews with approx. 70,000 customers …to measure satisfaction with more than 200 companies in 44 industries and 10 economic sectors” • Key finding: “Social Media: Customer satisfaction with social media sites is poor (70) … lowest industry aggregate score of any of the e-business or e-retail industries.” – Better than only airlines and subscription TV (66) Page 60 ©2011 280 Group LLC. All rights reserved.

Notes de l'éditeur

  1. The National Do Not Call registry was established 2003. And the FTC periodically announces enforcement actions.
  2. Same year as FTC Do Not Call Registry. Focus was mainly ecommerce sites.
  3. Not picking on Facebook. Could have done similar for Google
  4. Higher than only the airlines and cable TV services (66).
  5. Higher than only the airlines and cable TV services (66).
  6. Why Washington Post, which is not exactly a tech center newspaper? Why not the New York Times, Wall Street Journal, or San Jose Mercury-News, any of which would be a more logical place? Because the audience for this message was in Congress and the FTC, not the general public.
  7. Why Washington Post, which is not exactly a tech center newspaper? Why not the New York Times, Wall Street Journal, or San Jose Mercury-News, any of which would be a more logical place? Because the audience for this message was in Congress and the FTC, not the general public.
  8. August, 2010
  9. Focus on social media web 2.0
  10. Of special concern to people who are being stalked or harassed
  11. Embarrassing for Apple and AT&T
  12. Higher than only the airlines and cable TV services (66).