SlideShare une entreprise Scribd logo
1  sur  55
Navigating Privacy Laws ,[object Object],May 19, 2009
Your Speaker ,[object Object],[object Object],[object Object],[object Object]
Disclaimer ,[object Object]
Contents ,[object Object],[object Object],[object Object],[object Object],[object Object]
Introduction
What’s the Problem?
What’s the Problem? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Privacy Law Overview
Sources of Relevant Privacy Law ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What Should Providers and Developers Do?
Basic Reference Model
Developers and Providers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Developers and Providers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Communicate it to Customers Obtain and record their consent or deny access Changes in customer preferences or co.’s privacy practices Communicate preferences internally and downstream Employee training and management to ensure compliance Enforce internal controls Respond to mitigate violations Monitor / audit abuses Draft Policy Notice & Consent Implement & Enforce Developers and Providers Privacy Policy Process Diagram Respond to mitigate violations Inform affected Consumers as required by law
Providers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Developers and Providers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Developers and Providers ,[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusion ,[object Object],[object Object],[object Object]
Appendices
[object Object],[object Object],[object Object],Contact Information
Reference Material ,[object Object],[object Object],[object Object],[object Object]
Reference Material ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Reference Material ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Reference Material ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Reference Material ,[object Object],Alaska  (ALASKA STAT. § 45.48.010 et seq.) Arizona  (ARIZ. REV. STAT. ANN. § 44-7501(h)) Arkansas  (ARK. CODE  ANN. § 4-110-101 et seq.) California  (CAL. CIV. CODE § 1798.82) Colorado  (COLO. REV. STAT. § 6-1-716) Connecticut  (CONN. GEN. STAT. § 36a-701b) Delaware  (DEL. CODE ANN. tit. 6, § 12B-101) District of Columbia  (District of Columbia B16-810, D.C. Code § 28-3851)  Florida  (FLA. STAT. § 817.5681) Georgia  (GA. CODE ANN. § 10-1-911) Hawaii  (Hawaii Revised Stat. §§ 487N-1 et seq.) Idaho  (IDAHO CODE ANN. § 28-51-104 et seq.) Illinois  (815 ILL. COMP. STAT. ANN. 530/5, /10) Indiana  (IND. CODE § 24-4.9) Iowa  (SF 2308) Kansas  (KAN. STAT. ANN. §§ 50-7a01-02) Louisiana  (LA. REV. STAT. ANN. § 51:3071 et seq.) Maine  (ME. REV. STAT. ANN. tit. 10, §1346 et seq.) Maryland  (MD Stat. Ann. § 14-3504) Massachusetts  (Massachusetts General Laws Ann. 93H §§ 1 et seq.) Michigan  (Michigan Compiled Laws Ann. 445.72) Minnesota  (MINN. STAT. § 325E.61) Montana  (MONT. CODE ANN. § 30-14-1704) Nebraska  (NEB. REV. STAT. § 87-801 et seq.) Nevada  (NEV. REV. STAT. 603A.010 et seq.) New Hampshire  (N.H. REV. STAT. ANN. § 359-C:19 et seq.) New Jersey  (N.J. STAT. ANN. § 56:8-163) New York  (N.Y. GEN. BUS. LAW § 899-aa) North Carolina  (N.C. GEN. STAT.§ 75-60 et seq.) North Dakota  (N.D. CENT. CODE § 51-30-01 et seq.) Ohio  (OHIO REV. CODE ANN. § 1349.19) Oklahoma  (Okla. Stat. § 74-3113.1) Oregon  (S.B. 583) Pennsylvania  (73 PA. CONS. STAT. ANN. § 2303) Puerto Rico  (Law 111 and Regulation 7207) Rhode Island  (R.I. GEN. LAWS § 11-49.2-3) South Carolina  (S.C. Code  § 37-20) Tennessee  (TENN. CODE ANN. § 47-18-21) Texas  (TEX. BUS. & COMM. CODE ANN. § 48.001 et seq.) Utah  (UTAH CODE ANN. § 13-44-101 et seq.) Vermont  (VT. STAT. ANN. tit. 9, § 2430 et seq.) Virginia  ( Va. Code § 18.2-186.6) Washington  (WASH. REV. CODE § 19.255.010) West Virginia  S.B. 340 Wisconsin  (WIS. STAT. § 134.98) Wyoming  (W.S. 40-12-501 through 40-12-509)

Contenu connexe

Tendances

Business And The Law
Business And The LawBusiness And The Law
Business And The LawRobbieA
 
HIPAA Privacy, Security, Breach Overview
HIPAA Privacy, Security, Breach OverviewHIPAA Privacy, Security, Breach Overview
HIPAA Privacy, Security, Breach OverviewHealthCare Too, LLC
 
Practical Guide to GDPR 2017
Practical Guide to GDPR 2017Practical Guide to GDPR 2017
Practical Guide to GDPR 2017Dryden Geary
 
05S-30-cell phone summary
05S-30-cell phone summary05S-30-cell phone summary
05S-30-cell phone summaryBridget Butler
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)BenjaminShalevSalovi
 
Legislation
LegislationLegislation
Legislationmegabyte
 
How will your business be affected and what you can do to stay ahead of the n...
How will your business be affected and what you can do to stay ahead of the n...How will your business be affected and what you can do to stay ahead of the n...
How will your business be affected and what you can do to stay ahead of the n...Carrenza
 
Preparing for Compliance: Canada's Anti-Spam Law (CASL)
Preparing for Compliance: Canada's Anti-Spam Law (CASL)Preparing for Compliance: Canada's Anti-Spam Law (CASL)
Preparing for Compliance: Canada's Anti-Spam Law (CASL)Act-On Software
 
GDPR: data needs to be in safe hands
GDPR: data needs to be in safe hands GDPR: data needs to be in safe hands
GDPR: data needs to be in safe hands legalandgeneral
 
GDPR - Are you ready?
GDPR - Are you ready?GDPR - Are you ready?
GDPR - Are you ready?VILT
 
Tech Connect Live 30th May 2018 ,GDPR Summit Hugh jones
Tech Connect Live 30th May 2018 ,GDPR Summit Hugh jonesTech Connect Live 30th May 2018 ,GDPR Summit Hugh jones
Tech Connect Live 30th May 2018 ,GDPR Summit Hugh jonesEvents2018
 
Key Issues on the new General Data Protection Regulation
Key Issues on the new General Data Protection RegulationKey Issues on the new General Data Protection Regulation
Key Issues on the new General Data Protection RegulationOlivier Vandeputte
 
CASL - Canadian Anti-Span Legislation
CASL - Canadian Anti-Span LegislationCASL - Canadian Anti-Span Legislation
CASL - Canadian Anti-Span LegislationScreencastSolutions
 
LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...
LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...
LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...Dr. Oliver Massmann
 
Computer Misuse Act
Computer Misuse ActComputer Misuse Act
Computer Misuse Actmrmwood
 
TCPA and Contact Center Law: What's on the Horizon in 2017?
TCPA and Contact Center Law: What's on the Horizon in 2017? TCPA and Contact Center Law: What's on the Horizon in 2017?
TCPA and Contact Center Law: What's on the Horizon in 2017? Ryan Thurman
 

Tendances (20)

Business And The Law
Business And The LawBusiness And The Law
Business And The Law
 
HIPAA Privacy, Security, Breach Overview
HIPAA Privacy, Security, Breach OverviewHIPAA Privacy, Security, Breach Overview
HIPAA Privacy, Security, Breach Overview
 
Practical Guide to GDPR 2017
Practical Guide to GDPR 2017Practical Guide to GDPR 2017
Practical Guide to GDPR 2017
 
05S-30-cell phone summary
05S-30-cell phone summary05S-30-cell phone summary
05S-30-cell phone summary
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Legislation
LegislationLegislation
Legislation
 
How will your business be affected and what you can do to stay ahead of the n...
How will your business be affected and what you can do to stay ahead of the n...How will your business be affected and what you can do to stay ahead of the n...
How will your business be affected and what you can do to stay ahead of the n...
 
Preparing for Compliance: Canada's Anti-Spam Law (CASL)
Preparing for Compliance: Canada's Anti-Spam Law (CASL)Preparing for Compliance: Canada's Anti-Spam Law (CASL)
Preparing for Compliance: Canada's Anti-Spam Law (CASL)
 
GDPR: data needs to be in safe hands
GDPR: data needs to be in safe hands GDPR: data needs to be in safe hands
GDPR: data needs to be in safe hands
 
GDPR - Are you ready?
GDPR - Are you ready?GDPR - Are you ready?
GDPR - Are you ready?
 
electronic commerce act 8792 (2000)
electronic commerce act 8792 (2000)electronic commerce act 8792 (2000)
electronic commerce act 8792 (2000)
 
Tech Connect Live 30th May 2018 ,GDPR Summit Hugh jones
Tech Connect Live 30th May 2018 ,GDPR Summit Hugh jonesTech Connect Live 30th May 2018 ,GDPR Summit Hugh jones
Tech Connect Live 30th May 2018 ,GDPR Summit Hugh jones
 
Key Issues on the new General Data Protection Regulation
Key Issues on the new General Data Protection RegulationKey Issues on the new General Data Protection Regulation
Key Issues on the new General Data Protection Regulation
 
CASL - Canadian Anti-Span Legislation
CASL - Canadian Anti-Span LegislationCASL - Canadian Anti-Span Legislation
CASL - Canadian Anti-Span Legislation
 
LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...
LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...
LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...
 
Computer Misuse Act
Computer Misuse ActComputer Misuse Act
Computer Misuse Act
 
Research and The Law
Research and The LawResearch and The Law
Research and The Law
 
TCPA and Contact Center Law: What's on the Horizon in 2017?
TCPA and Contact Center Law: What's on the Horizon in 2017? TCPA and Contact Center Law: What's on the Horizon in 2017?
TCPA and Contact Center Law: What's on the Horizon in 2017?
 
Aet wk 6
Aet wk 6 Aet wk 6
Aet wk 6
 
28014_EY Safe Harbor_UK
28014_EY Safe Harbor_UK28014_EY Safe Harbor_UK
28014_EY Safe Harbor_UK
 

Similaire à Navigating Privacy Laws When Developing And Deploying Location Tracking Applications Presentation 1

Best Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information SecurityBest Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information Securitysatyakam_biswas
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection ActYizi
 
EC2017 United Kingdom
EC2017  United KingdomEC2017  United Kingdom
EC2017 United KingdomRobert Bond
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINamiable_indian
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
"The EU General Data Protection Regulation: GDPR" - TRA Annual Meeting 2018
"The EU General Data Protection Regulation: GDPR" - TRA Annual Meeting 2018"The EU General Data Protection Regulation: GDPR" - TRA Annual Meeting 2018
"The EU General Data Protection Regulation: GDPR" - TRA Annual Meeting 2018TRA - Tax Representative Alliance
 
General data protection regulation
General data protection regulationGeneral data protection regulation
General data protection regulationFahad Ameen
 
Tangible Data Protection White Paper
Tangible Data Protection White PaperTangible Data Protection White Paper
Tangible Data Protection White PaperNick Banbury
 
Challenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in MexicoChallenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in MexicoJoel A. Gómez Treviño
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..home based
 
An Overview of the Major Compliance Requirements
An Overview of the Major Compliance RequirementsAn Overview of the Major Compliance Requirements
An Overview of the Major Compliance RequirementsDoubleHorn
 
Ten Laws Internet Businesses Should Consider Part I
Ten Laws Internet Businesses Should Consider Part ITen Laws Internet Businesses Should Consider Part I
Ten Laws Internet Businesses Should Consider Part IRyan K. Hew
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-finalDr. Donald Macfarlane
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalDr. Donald Macfarlane
 
Farm Data: Examining the Legal Issues
Farm Data: Examining the Legal Issues Farm Data: Examining the Legal Issues
Farm Data: Examining the Legal Issues Roger Royse
 
Group 5 Banking Laws Semi Finals.pptx
Group 5 Banking Laws Semi Finals.pptxGroup 5 Banking Laws Semi Finals.pptx
Group 5 Banking Laws Semi Finals.pptxStephenQuijano3
 
I’m attaching some info on the agency I work for. I work remot.docx
I’m attaching some info on the agency I work for. I work remot.docxI’m attaching some info on the agency I work for. I work remot.docx
I’m attaching some info on the agency I work for. I work remot.docxdonnajames55
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc
 
TBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance ServiceTBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance Servicegorsline
 

Similaire à Navigating Privacy Laws When Developing And Deploying Location Tracking Applications Presentation 1 (20)

Best Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information SecurityBest Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information Security
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
Protecting your business
Protecting your businessProtecting your business
Protecting your business
 
EC2017 United Kingdom
EC2017  United KingdomEC2017  United Kingdom
EC2017 United Kingdom
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
"The EU General Data Protection Regulation: GDPR" - TRA Annual Meeting 2018
"The EU General Data Protection Regulation: GDPR" - TRA Annual Meeting 2018"The EU General Data Protection Regulation: GDPR" - TRA Annual Meeting 2018
"The EU General Data Protection Regulation: GDPR" - TRA Annual Meeting 2018
 
General data protection regulation
General data protection regulationGeneral data protection regulation
General data protection regulation
 
Tangible Data Protection White Paper
Tangible Data Protection White PaperTangible Data Protection White Paper
Tangible Data Protection White Paper
 
Challenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in MexicoChallenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in Mexico
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..
 
An Overview of the Major Compliance Requirements
An Overview of the Major Compliance RequirementsAn Overview of the Major Compliance Requirements
An Overview of the Major Compliance Requirements
 
Ten Laws Internet Businesses Should Consider Part I
Ten Laws Internet Businesses Should Consider Part ITen Laws Internet Businesses Should Consider Part I
Ten Laws Internet Businesses Should Consider Part I
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
Farm Data: Examining the Legal Issues
Farm Data: Examining the Legal Issues Farm Data: Examining the Legal Issues
Farm Data: Examining the Legal Issues
 
Group 5 Banking Laws Semi Finals.pptx
Group 5 Banking Laws Semi Finals.pptxGroup 5 Banking Laws Semi Finals.pptx
Group 5 Banking Laws Semi Finals.pptx
 
I’m attaching some info on the agency I work for. I work remot.docx
I’m attaching some info on the agency I work for. I work remot.docxI’m attaching some info on the agency I work for. I work remot.docx
I’m attaching some info on the agency I work for. I work remot.docx
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
 
TBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance ServiceTBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance Service
 

Plus de Ben Allen

Sense networks
Sense networksSense networks
Sense networksBen Allen
 
Michael metcalf
Michael metcalfMichael metcalf
Michael metcalfBen Allen
 
Harris Interactive, Placecast LBS Marketing Poll
Harris Interactive, Placecast LBS Marketing PollHarris Interactive, Placecast LBS Marketing Poll
Harris Interactive, Placecast LBS Marketing PollBen Allen
 
Xtify overview
Xtify overviewXtify overview
Xtify overviewBen Allen
 
Google Mobile Local
Google Mobile LocalGoogle Mobile Local
Google Mobile LocalBen Allen
 
Microsoft Localizing the Portal
Microsoft Localizing the PortalMicrosoft Localizing the Portal
Microsoft Localizing the PortalBen Allen
 
Parking Data Ventures
Parking Data VenturesParking Data Ventures
Parking Data VenturesBen Allen
 
Kelsey: Top 5 Mobile Trends
Kelsey: Top 5 Mobile TrendsKelsey: Top 5 Mobile Trends
Kelsey: Top 5 Mobile TrendsBen Allen
 
Michael Boland Local Social
Michael Boland Local SocialMichael Boland Local Social
Michael Boland Local SocialBen Allen
 
iPromote - Self Service Display
iPromote - Self Service DisplayiPromote - Self Service Display
iPromote - Self Service DisplayBen Allen
 
Marchex Reputation Mgt
Marchex Reputation MgtMarchex Reputation Mgt
Marchex Reputation MgtBen Allen
 
Kelsey: Digital Out of Home
Kelsey: Digital Out of HomeKelsey: Digital Out of Home
Kelsey: Digital Out of HomeBen Allen
 
Local.com - Local SEO
Local.com - Local SEOLocal.com - Local SEO
Local.com - Local SEOBen Allen
 

Plus de Ben Allen (20)

Layar
LayarLayar
Layar
 
Sense networks
Sense networksSense networks
Sense networks
 
Reserve x
Reserve xReserve x
Reserve x
 
Ogilvy
OgilvyOgilvy
Ogilvy
 
Michael metcalf
Michael metcalfMichael metcalf
Michael metcalf
 
Marketmap
MarketmapMarketmap
Marketmap
 
Forrester
ForresterForrester
Forrester
 
Tyler bell
Tyler bellTyler bell
Tyler bell
 
Harris Interactive, Placecast LBS Marketing Poll
Harris Interactive, Placecast LBS Marketing PollHarris Interactive, Placecast LBS Marketing Poll
Harris Interactive, Placecast LBS Marketing Poll
 
Xtify overview
Xtify overviewXtify overview
Xtify overview
 
Google Mobile Local
Google Mobile LocalGoogle Mobile Local
Google Mobile Local
 
Microsoft Localizing the Portal
Microsoft Localizing the PortalMicrosoft Localizing the Portal
Microsoft Localizing the Portal
 
Parking Data Ventures
Parking Data VenturesParking Data Ventures
Parking Data Ventures
 
DirectoryM
DirectoryMDirectoryM
DirectoryM
 
Kelsey: Top 5 Mobile Trends
Kelsey: Top 5 Mobile TrendsKelsey: Top 5 Mobile Trends
Kelsey: Top 5 Mobile Trends
 
Michael Boland Local Social
Michael Boland Local SocialMichael Boland Local Social
Michael Boland Local Social
 
iPromote - Self Service Display
iPromote - Self Service DisplayiPromote - Self Service Display
iPromote - Self Service Display
 
Marchex Reputation Mgt
Marchex Reputation MgtMarchex Reputation Mgt
Marchex Reputation Mgt
 
Kelsey: Digital Out of Home
Kelsey: Digital Out of HomeKelsey: Digital Out of Home
Kelsey: Digital Out of Home
 
Local.com - Local SEO
Local.com - Local SEOLocal.com - Local SEO
Local.com - Local SEO
 

Dernier

Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?Paolo Missier
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...SOFTTECHHUB
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistandanishmna97
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfOverkill Security
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfAnubhavMangla3
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 

Dernier (20)

Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 

Navigating Privacy Laws When Developing And Deploying Location Tracking Applications Presentation 1

  • 1.
  • 2.
  • 3.
  • 4.
  • 7.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40. What Should Providers and Developers Do?
  • 42.
  • 43.
  • 44. Communicate it to Customers Obtain and record their consent or deny access Changes in customer preferences or co.’s privacy practices Communicate preferences internally and downstream Employee training and management to ensure compliance Enforce internal controls Respond to mitigate violations Monitor / audit abuses Draft Policy Notice & Consent Implement & Enforce Developers and Providers Privacy Policy Process Diagram Respond to mitigate violations Inform affected Consumers as required by law
  • 45.
  • 46.
  • 47.
  • 48.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.