SlideShare une entreprise Scribd logo
1  sur  32
Télécharger pour lire hors ligne
Visualizing Privacy! 
Morgan Eisler (@mogasaur)! 
UX Researcher! 
2014 
! 
! 
10/09/14! 
#GHC14 
2014
2014
2014
2014
TL;DR! 
2014
2014
2014
2014 
Users With! 
Data Exposed! 
Data! 
Breaches!
2014
2014
2014
The NTIA Code of Conduct! 
§ Categories of Data Collected:! 
− Biometrics! 
− Browser History! 
− Phone or Text Log! 
− Contacts! 
− Financial Info! 
− Health, medical, or therapy info! 
− Location! 
− User Files! 
2014
The NTIA Code of Conduct! 
§ Entities Data is Shared With:! 
− Ad Networks! 
− Carriers! 
− Consumer Data Resellers! 
− Data Analytics Providers! 
− Government Entities! 
− Operating Systems and Platforms! 
− Other Apps! 
− Social Networks! 
2014
2014
2014
“I think this signifies a company 
that is very conscientious. A 
company that cares about people's 
privacy and is aware of people's 
concerns about how their 
information will be gathered, 
shared, and used.”! 
" "- Lookout Customer! 
2014 
!
“I think if a privacy policy was 
that way then everybody’s 
policy would get read. It would 
help a lot of people out if it 
looked like this.”! 
" "- Lookout Customer! 
2014
2014
2014
2014
2014
2014
Final Thoughts! 
§ Be more transparent! 
§ Inspire trust! 
§ Improve comprehension! 
§ Keep in mind:! 
− A short form policy is not a replacement for a 
2014 
full-length policy! 
− Make sure that users understand that a short 
form policy is just that!
References 
§ 2013, 9 May.“More than 2 billion people use 
the internet, here’s what they’re up to 
(inforgraphic)”. The Cultureist. Retrieved 
from <http://www.thecultureist.com/ 
2013/05/09/how-many-people-use-the-internet- 
more-than-2-billion-infographic/>.! 
§ O’Toole, James. 2014, 28 February. “Mobile 
apps overtake PC internet usage in U.S.”. 
CNN Money. Retrieved from http:// 
money.cnn.com/2014/02/28/technology/ 
mobile/mobile-apps-internet/>.! 
2014
References 
§ Ezor, Jonathan I. 2009, 12 August. “Why your 
web site’s privacy policy matters more than 
you think.” Bloomberg Businessweek. 
Retrieved from <http:// 
www.businessweek.com/smallbiz/ 
running_small_business/archives/2009/08/ 
why_web_site_pr.html>.! 
§ ,2012. “ Global Internet User Survey 
Summary Report”. The Internet Society. 
Retrieved from <https:// 
www.internetsociety.org/sites/default/files/ 
rep-GIUS2012global-201211-en.pdf>.! 
2014
References 
§ 2009, 10 March. “TRUSTe survey findings 
indicate majority of small business neglect 
vital privacy measures” [press release]. 
TRUSTe. Retrieved from <http:// 
www.truste.com/about-TRUSTe/press-room/ 
news_truste_smb_neglect_privacy>.! 
§ Bilton, Nick. 2010, 12 May. “Price of 
Facebook privacy? Start clicking.” The New 
York Times. Retrieved from <http:// 
www.nytimes.com/2010/05/13/technology/ 
personaltech/13basics.html? 
src=tptw&_r=0>.! 
2014
References 
§ Vedantam, Shankar. 2012, 19 April. “To read all 
those web privacy policies, just take a month off 
work.” NPR. Retrieved from <http:// 
www.npr.org/blogs/alltechconsidered/ 
2012/04/19/150905465/to-read-all-those-web-privacy- 
policies-just-take-a-month-off-work>.! 
§ McDonald, Aleecia M. & Faith Cranor, Lorrie, 
2008. “The cost of reading privacy policies.” I/ 
S: A Journal of Law and Policy for the 
Information Society, 2008 Privacy Year in 
Review Issue. Retrieved from <http:// 
lorrie.cranor.org/pubs/readingPolicyCost-authorDraft. 
2014 
pdf>.!
References 
§ Westerman, Ilana. 2013, 3 June. “What 
misconceptions do consumers have about 
privacy?” IAPP. Retrieved from <https:// 
privacyassociation.org/news/a/what-misconceptions- 
do-consumers-have-about-privacy/>. 
2014 
! 
§ Weise, Elizabeth. 2014, 24 September. “43% 
of companies had a data breach in the past 
year.” USA Today. Retrieved from <http:// 
www.usatoday.com/story/tech/2014/09/24/ 
data-breach-companies-60/16106197/>.!
References 
§ Pagliery, Jose. 2014, 28 May. “Half of 
American adults hacked this year.” CNN 
Money. Retrieved from <http:// 
money.cnn.com/2014/05/28/technology/ 
security/hack-data-breach/?iid=EL>.! 
§ Fiegerman, Seth. 2014, 20 June. “Yo gets 
hacked.” Mashable. Retrieved from <http:// 
mashable.com/2014/06/20/yo-gets-hacked/ 
>.! 
2014
References 
§ 2013, 25 July. “Short Form Notice Code of 
Conduct to Promote Transparency in Mobile 
App Practices”. The National 
Telecommunications and Information 
Administration. Retrieved from <http:// 
www.ntia.doc.gov/files/ntia/publications/ 
july_25_code_draft.pdf>.! 
§ 2014, 24 July. “Apps Alliance and Intuit partner 
to release new app privacy tool” [press release]. 
Application Developers Alliance. Retrieved from 
<http://www.appdevelopersalliance.org/news/ 
2014/7/23/new-tool-allows-developers-to-create-consumer- 
friendly-app-privacy-notices>.! 
2014
Links to Tools on GitHub! 
2014 
§ Lookout: ! 
− https://github.com/lookout/private-parts! 
§ Intuit/TRUSTe:! 
− https://github.com/appsalliance/privacynotices! 
§ Mozilla:! 
− https://github.com/flamsmark/privacy-policy-template 
!
Contact/Feedback! 
Questions?! 
MORGAN.EISLER@LOOKOUT.COM or! 
Lookout Booth at the Career Fair! 
! 
Rate and Review the session using the 
GHC Mobile App! 
To download visit www.gracehopper.org! 
2014

Contenu connexe

En vedette

The Heroine's Journey World edition
The Heroine's Journey World edition The Heroine's Journey World edition
The Heroine's Journey World edition Peter de Kuster
 
Legal matters
Legal mattersLegal matters
Legal mattersPrgunn1
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google AccountLookout
 
20140905 AWS Night in ITHD LT2
20140905 AWS Night in ITHD LT220140905 AWS Night in ITHD LT2
20140905 AWS Night in ITHD LT2Nobuyuki Matsui
 
Parecer jurídico normativo 36 2011 CFESS
Parecer jurídico normativo 36 2011 CFESSParecer jurídico normativo 36 2011 CFESS
Parecer jurídico normativo 36 2011 CFESSFILIPE NERI
 
Brecha tecnológica y discapacidad.
Brecha tecnológica y discapacidad.Brecha tecnológica y discapacidad.
Brecha tecnológica y discapacidad.José María
 
横手版地方発信のソーシャルメディア
横手版地方発信のソーシャルメディア横手版地方発信のソーシャルメディア
横手版地方発信のソーシャルメディアSkunkWork.Co.,Ltd
 
PHP Hypertext Preprocessor
PHP Hypertext PreprocessorPHP Hypertext Preprocessor
PHP Hypertext Preprocessoradeel990
 
Investing 101: How to Prepare for Retirement
Investing 101: How to Prepare for RetirementInvesting 101: How to Prepare for Retirement
Investing 101: How to Prepare for RetirementExperian_US
 
3 d pie chart circular puzzle with hole in center process stages 11 style 3 p...
3 d pie chart circular puzzle with hole in center process stages 11 style 3 p...3 d pie chart circular puzzle with hole in center process stages 11 style 3 p...
3 d pie chart circular puzzle with hole in center process stages 11 style 3 p...SlideTeam.net
 
生日快乐
生日快乐生日快乐
生日快乐Paul Ni
 
Event Report - Salesforce Dreamforce 2016 - Einstein is show, platform progre...
Event Report - Salesforce Dreamforce 2016 - Einstein is show, platform progre...Event Report - Salesforce Dreamforce 2016 - Einstein is show, platform progre...
Event Report - Salesforce Dreamforce 2016 - Einstein is show, platform progre...Holger Mueller
 
SuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringSuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringTieu Luu
 
Delivering Vertical Social Apps - Dreamforce - 9/18
Delivering Vertical Social Apps - Dreamforce - 9/18Delivering Vertical Social Apps - Dreamforce - 9/18
Delivering Vertical Social Apps - Dreamforce - 9/18Salesforce Partners
 

En vedette (19)

The Heroine's Journey World edition
The Heroine's Journey World edition The Heroine's Journey World edition
The Heroine's Journey World edition
 
Legal matters
Legal mattersLegal matters
Legal matters
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account
 
20140905 AWS Night in ITHD LT2
20140905 AWS Night in ITHD LT220140905 AWS Night in ITHD LT2
20140905 AWS Night in ITHD LT2
 
Parecer jurídico normativo 36 2011 CFESS
Parecer jurídico normativo 36 2011 CFESSParecer jurídico normativo 36 2011 CFESS
Parecer jurídico normativo 36 2011 CFESS
 
Brecha tecnológica y discapacidad.
Brecha tecnológica y discapacidad.Brecha tecnológica y discapacidad.
Brecha tecnológica y discapacidad.
 
横手版地方発信のソーシャルメディア
横手版地方発信のソーシャルメディア横手版地方発信のソーシャルメディア
横手版地方発信のソーシャルメディア
 
ตารางแนวทางกำหนดการจัดเวทีฯ
ตารางแนวทางกำหนดการจัดเวทีฯตารางแนวทางกำหนดการจัดเวทีฯ
ตารางแนวทางกำหนดการจัดเวทีฯ
 
Comic analysis powerpoint
Comic analysis powerpointComic analysis powerpoint
Comic analysis powerpoint
 
PHP Hypertext Preprocessor
PHP Hypertext PreprocessorPHP Hypertext Preprocessor
PHP Hypertext Preprocessor
 
Investing 101: How to Prepare for Retirement
Investing 101: How to Prepare for RetirementInvesting 101: How to Prepare for Retirement
Investing 101: How to Prepare for Retirement
 
Glossary
GlossaryGlossary
Glossary
 
3 d pie chart circular puzzle with hole in center process stages 11 style 3 p...
3 d pie chart circular puzzle with hole in center process stages 11 style 3 p...3 d pie chart circular puzzle with hole in center process stages 11 style 3 p...
3 d pie chart circular puzzle with hole in center process stages 11 style 3 p...
 
生日快乐
生日快乐生日快乐
生日快乐
 
The Link Between Processed Meat and Cancer Risk
The Link Between Processed Meat and Cancer RiskThe Link Between Processed Meat and Cancer Risk
The Link Between Processed Meat and Cancer Risk
 
Event Report - Salesforce Dreamforce 2016 - Einstein is show, platform progre...
Event Report - Salesforce Dreamforce 2016 - Einstein is show, platform progre...Event Report - Salesforce Dreamforce 2016 - Einstein is show, platform progre...
Event Report - Salesforce Dreamforce 2016 - Einstein is show, platform progre...
 
SuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringSuprTEK Continuous Monitoring
SuprTEK Continuous Monitoring
 
Delivering Vertical Social Apps - Dreamforce - 9/18
Delivering Vertical Social Apps - Dreamforce - 9/18Delivering Vertical Social Apps - Dreamforce - 9/18
Delivering Vertical Social Apps - Dreamforce - 9/18
 
Logo
LogoLogo
Logo
 

Similaire à Visualizing Privacy

GRBN Trust and Personal Data Survey - Market Research Industry Special Report
GRBN Trust and Personal Data Survey - Market Research Industry Special ReportGRBN Trust and Personal Data Survey - Market Research Industry Special Report
GRBN Trust and Personal Data Survey - Market Research Industry Special ReportAndrew Cannon
 
GRBN Trust and Personal Data Survey report - Part 1 - Concern, familiarity, t...
GRBN Trust and Personal Data Survey report - Part 1 - Concern, familiarity, t...GRBN Trust and Personal Data Survey report - Part 1 - Concern, familiarity, t...
GRBN Trust and Personal Data Survey report - Part 1 - Concern, familiarity, t...Andrew Cannon
 
GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...
GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...
GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...Andrew Cannon
 
Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017Steve Mckee
 
ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)Zohra Razaq
 
Mobile Engagement 2012: A Winning Strategy
Mobile Engagement 2012:  A Winning StrategyMobile Engagement 2012:  A Winning Strategy
Mobile Engagement 2012: A Winning StrategyDawn Yankeelov
 
Do you know you the data you are wasting can make you a millionaire
Do you know you the data you are wasting can make you a millionaire Do you know you the data you are wasting can make you a millionaire
Do you know you the data you are wasting can make you a millionaire OboeziAppeal
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy Carolina Rossini
 
Privacy & Data Ethics
Privacy & Data EthicsPrivacy & Data Ethics
Privacy & Data EthicsErik Kokkonen
 
Big Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media NetworksBig Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media NetworksSylvia Ogweng
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...Frances Coronel
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Fullgloriakt
 
Staying on the Right Side of the Fence when Analyzing Human Data
Staying on the Right Side of the Fence when Analyzing Human DataStaying on the Right Side of the Fence when Analyzing Human Data
Staying on the Right Side of the Fence when Analyzing Human DataMolly O'Shea
 
Staying on the Right Side of the Fence when Analyzing Human Data
Staying on the Right Side of the Fence when Analyzing Human DataStaying on the Right Side of the Fence when Analyzing Human Data
Staying on the Right Side of the Fence when Analyzing Human DataDataSift
 
Insight Presentation: "What Wearables Mean For Marketers"
Insight Presentation: "What Wearables Mean For Marketers"Insight Presentation: "What Wearables Mean For Marketers"
Insight Presentation: "What Wearables Mean For Marketers"iMedia Connection
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235brendaylo
 
Demand Media Shares New Insights About Tech Consumers
Demand Media Shares New Insights About Tech Consumers Demand Media Shares New Insights About Tech Consumers
Demand Media Shares New Insights About Tech Consumers DemandMedia
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things The Center for Identity
 

Similaire à Visualizing Privacy (20)

GRBN Trust and Personal Data Survey - Market Research Industry Special Report
GRBN Trust and Personal Data Survey - Market Research Industry Special ReportGRBN Trust and Personal Data Survey - Market Research Industry Special Report
GRBN Trust and Personal Data Survey - Market Research Industry Special Report
 
GRBN Trust and Personal Data Survey report - Part 1 - Concern, familiarity, t...
GRBN Trust and Personal Data Survey report - Part 1 - Concern, familiarity, t...GRBN Trust and Personal Data Survey report - Part 1 - Concern, familiarity, t...
GRBN Trust and Personal Data Survey report - Part 1 - Concern, familiarity, t...
 
GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...
GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...
GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...
 
Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017
 
ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)
 
Mobile Engagement 2012: A Winning Strategy
Mobile Engagement 2012:  A Winning StrategyMobile Engagement 2012:  A Winning Strategy
Mobile Engagement 2012: A Winning Strategy
 
Do you know you the data you are wasting can make you a millionaire
Do you know you the data you are wasting can make you a millionaire Do you know you the data you are wasting can make you a millionaire
Do you know you the data you are wasting can make you a millionaire
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
 
Privacy & Data Ethics
Privacy & Data EthicsPrivacy & Data Ethics
Privacy & Data Ethics
 
Big Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media NetworksBig Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media Networks
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
 
Staying on the Right Side of the Fence when Analyzing Human Data
Staying on the Right Side of the Fence when Analyzing Human DataStaying on the Right Side of the Fence when Analyzing Human Data
Staying on the Right Side of the Fence when Analyzing Human Data
 
Staying on the Right Side of the Fence when Analyzing Human Data
Staying on the Right Side of the Fence when Analyzing Human DataStaying on the Right Side of the Fence when Analyzing Human Data
Staying on the Right Side of the Fence when Analyzing Human Data
 
Insight Presentation: "What Wearables Mean For Marketers"
Insight Presentation: "What Wearables Mean For Marketers"Insight Presentation: "What Wearables Mean For Marketers"
Insight Presentation: "What Wearables Mean For Marketers"
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 
Tech Consumer Insights
Tech Consumer InsightsTech Consumer Insights
Tech Consumer Insights
 
Demand Media Shares New Insights About Tech Consumers
Demand Media Shares New Insights About Tech Consumers Demand Media Shares New Insights About Tech Consumers
Demand Media Shares New Insights About Tech Consumers
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 

Plus de Lookout

The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsLookout
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLookout
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile SecurityLookout
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notLookout
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?Lookout
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingLookout
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity PredictionsLookout
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatibleLookout
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidLookout
 
When Android Apps Go Evil
When Android Apps Go EvilWhen Android Apps Go Evil
When Android Apps Go EvilLookout
 
Scaling Mobile Development
Scaling Mobile DevelopmentScaling Mobile Development
Scaling Mobile DevelopmentLookout
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring HackersLookout
 
How to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneHow to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneLookout
 
3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple AccountLookout
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone GuideLookout
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World CupLookout
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneLookout
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to MeasureLookout
 
Security & Privacy at the Olympics
Security & Privacy at the OlympicsSecurity & Privacy at the Olympics
Security & Privacy at the OlympicsLookout
 
5 Types of Shady Apps
5 Types of Shady Apps5 Types of Shady Apps
5 Types of Shady AppsLookout
 

Plus de Lookout (20)

The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or not
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatible
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to Avoid
 
When Android Apps Go Evil
When Android Apps Go EvilWhen Android Apps Go Evil
When Android Apps Go Evil
 
Scaling Mobile Development
Scaling Mobile DevelopmentScaling Mobile Development
Scaling Mobile Development
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring Hackers
 
How to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneHow to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhone
 
3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone Guide
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World Cup
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your Smartphone
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to Measure
 
Security & Privacy at the Olympics
Security & Privacy at the OlympicsSecurity & Privacy at the Olympics
Security & Privacy at the Olympics
 
5 Types of Shady Apps
5 Types of Shady Apps5 Types of Shady Apps
5 Types of Shady Apps
 

Dernier

Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 

Dernier (20)

Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 

Visualizing Privacy

  • 1. Visualizing Privacy! Morgan Eisler (@mogasaur)! UX Researcher! 2014 ! ! 10/09/14! #GHC14 2014
  • 8. 2014 Users With! Data Exposed! Data! Breaches!
  • 10. 2014
  • 11. 2014
  • 12. The NTIA Code of Conduct! § Categories of Data Collected:! − Biometrics! − Browser History! − Phone or Text Log! − Contacts! − Financial Info! − Health, medical, or therapy info! − Location! − User Files! 2014
  • 13. The NTIA Code of Conduct! § Entities Data is Shared With:! − Ad Networks! − Carriers! − Consumer Data Resellers! − Data Analytics Providers! − Government Entities! − Operating Systems and Platforms! − Other Apps! − Social Networks! 2014
  • 14. 2014
  • 15. 2014
  • 16. “I think this signifies a company that is very conscientious. A company that cares about people's privacy and is aware of people's concerns about how their information will be gathered, shared, and used.”! " "- Lookout Customer! 2014 !
  • 17. “I think if a privacy policy was that way then everybody’s policy would get read. It would help a lot of people out if it looked like this.”! " "- Lookout Customer! 2014
  • 18. 2014
  • 19. 2014
  • 20. 2014
  • 21. 2014
  • 22. 2014
  • 23. Final Thoughts! § Be more transparent! § Inspire trust! § Improve comprehension! § Keep in mind:! − A short form policy is not a replacement for a 2014 full-length policy! − Make sure that users understand that a short form policy is just that!
  • 24. References § 2013, 9 May.“More than 2 billion people use the internet, here’s what they’re up to (inforgraphic)”. The Cultureist. Retrieved from <http://www.thecultureist.com/ 2013/05/09/how-many-people-use-the-internet- more-than-2-billion-infographic/>.! § O’Toole, James. 2014, 28 February. “Mobile apps overtake PC internet usage in U.S.”. CNN Money. Retrieved from http:// money.cnn.com/2014/02/28/technology/ mobile/mobile-apps-internet/>.! 2014
  • 25. References § Ezor, Jonathan I. 2009, 12 August. “Why your web site’s privacy policy matters more than you think.” Bloomberg Businessweek. Retrieved from <http:// www.businessweek.com/smallbiz/ running_small_business/archives/2009/08/ why_web_site_pr.html>.! § ,2012. “ Global Internet User Survey Summary Report”. The Internet Society. Retrieved from <https:// www.internetsociety.org/sites/default/files/ rep-GIUS2012global-201211-en.pdf>.! 2014
  • 26. References § 2009, 10 March. “TRUSTe survey findings indicate majority of small business neglect vital privacy measures” [press release]. TRUSTe. Retrieved from <http:// www.truste.com/about-TRUSTe/press-room/ news_truste_smb_neglect_privacy>.! § Bilton, Nick. 2010, 12 May. “Price of Facebook privacy? Start clicking.” The New York Times. Retrieved from <http:// www.nytimes.com/2010/05/13/technology/ personaltech/13basics.html? src=tptw&_r=0>.! 2014
  • 27. References § Vedantam, Shankar. 2012, 19 April. “To read all those web privacy policies, just take a month off work.” NPR. Retrieved from <http:// www.npr.org/blogs/alltechconsidered/ 2012/04/19/150905465/to-read-all-those-web-privacy- policies-just-take-a-month-off-work>.! § McDonald, Aleecia M. & Faith Cranor, Lorrie, 2008. “The cost of reading privacy policies.” I/ S: A Journal of Law and Policy for the Information Society, 2008 Privacy Year in Review Issue. Retrieved from <http:// lorrie.cranor.org/pubs/readingPolicyCost-authorDraft. 2014 pdf>.!
  • 28. References § Westerman, Ilana. 2013, 3 June. “What misconceptions do consumers have about privacy?” IAPP. Retrieved from <https:// privacyassociation.org/news/a/what-misconceptions- do-consumers-have-about-privacy/>. 2014 ! § Weise, Elizabeth. 2014, 24 September. “43% of companies had a data breach in the past year.” USA Today. Retrieved from <http:// www.usatoday.com/story/tech/2014/09/24/ data-breach-companies-60/16106197/>.!
  • 29. References § Pagliery, Jose. 2014, 28 May. “Half of American adults hacked this year.” CNN Money. Retrieved from <http:// money.cnn.com/2014/05/28/technology/ security/hack-data-breach/?iid=EL>.! § Fiegerman, Seth. 2014, 20 June. “Yo gets hacked.” Mashable. Retrieved from <http:// mashable.com/2014/06/20/yo-gets-hacked/ >.! 2014
  • 30. References § 2013, 25 July. “Short Form Notice Code of Conduct to Promote Transparency in Mobile App Practices”. The National Telecommunications and Information Administration. Retrieved from <http:// www.ntia.doc.gov/files/ntia/publications/ july_25_code_draft.pdf>.! § 2014, 24 July. “Apps Alliance and Intuit partner to release new app privacy tool” [press release]. Application Developers Alliance. Retrieved from <http://www.appdevelopersalliance.org/news/ 2014/7/23/new-tool-allows-developers-to-create-consumer- friendly-app-privacy-notices>.! 2014
  • 31. Links to Tools on GitHub! 2014 § Lookout: ! − https://github.com/lookout/private-parts! § Intuit/TRUSTe:! − https://github.com/appsalliance/privacynotices! § Mozilla:! − https://github.com/flamsmark/privacy-policy-template !
  • 32. Contact/Feedback! Questions?! MORGAN.EISLER@LOOKOUT.COM or! Lookout Booth at the Career Fair! ! Rate and Review the session using the GHC Mobile App! To download visit www.gracehopper.org! 2014