SlideShare une entreprise Scribd logo
1  sur  37
When Past Performance May Be
Indicative of Future Results
Legal Implications of Using Location-Based
Services Data to Predict Future Behavior
Cyberspace Law Institute & Winter Working Meeting
January 31 - February 1, 2014
Denver, CO

Bruce Antley
Assistant General Counsel, AOL Inc.

Jason Haislmaier
Partner, Bryan Cave LLP
This presentation is intended for general informational purposes only and should not be
construed as legal advice or legal opinion on any specific facts or circumstances, nor is it
intended to address specific legal compliance issues that may arise in particular
circumstances. Please consult counsel concerning your own situation and any specific legal
questions you may have.
The thoughts and opinions expressed in this presentation are those of the individual
presenters and do not necessarily reflect the official or unofficial thoughts or opinions of
their employers.
For further information regarding this presentation, please contact the presenter(s) listed
in the presentation.
Unless otherwise noted, all original content in this presentation is licensed under the
Creative Commons Creative Commons Attribution-Share Alike 3.0 United States License
available at: http://creativecommons.org/licenses/by-sa/3.0/us.
Outline
Overview
Privacy

Data Security
Tort Liability
Other Considerations
3
Definitions
• Location-Based Services Defined
– Location-Based Services refers to a broad range of services that are based on (or enhanced by)
information about the physical location of a user and/or device.
– Typical location-based services for consumers might include real-time turn-by-turn directions, the
location of the nearest gas station or motel, or social networking services.
– Source: http://www.phonescoop.com/glossary/term.php?gid=276

• Predictive Analytics Defined
– Predictive analytics encompasses a variety of techniques from statistics, modeling, machine
learning, and data mining that analyze current and historical facts to make predictions about
future, or otherwise unknown, events.
– In business, predictive models exploit patterns found in historical and transactional data to
identify risks and opportunities.
– Models capture relationships among many factors to allow assessment of risk or potential
associated with a particular set of conditions, guiding decision making for candidate transactions.
– Source: http://en.wikipedia.org/wiki/Predictive_analytics

4
“It’s tough to make predictions,
especially about the future.”
Yogi Berra(?)
Samuel Goldwyn(?)
Niels Bohr(?)
5
6
Increasingly Omnipresent

http://pewinternet.org/Reports/2013/Smartphone-Ownership-2013/Findings.aspx

7
Location Data Collection
What location data can be collected?
• Current location
– GPS
– Cell tower location
– Wi-Fi locations
• Compass heading

8
The Tell-All Telephone
Striking illustration of data collected:

http://www.zeit.de/datenschutz/malte-spitz-data-retention/
9
LBS and Predictive Analysis
Uses of LBS Data with Predictive Analytics:
•
•
•
•
•

Targeted Advertising / Marketing
Social media
Navigation
Insurance / Fraud Prevention
Law enforcement and intelligence

10
Legal Implications
Predictive Analytics Can Be “Creepy”
“While it is not a universal reaction, predictive
analytics in certain contexts can prompt a ‘creepy’ or
unsettling feeling of being under the gaze of an
omniscient observer who knows something about us
and our behavior.”
http://www.priv.gc.ca/information/research-recherche/2012/pa_201208_e.asp

11
Privacy
Emerging 3-Tier Systems in the US
• Federal
• State
• Self-Regulatory Organizations

No comprehensive regime at any level. . .

12
Privacy

13
Privacy – Federal
Federal Privacy Laws
Privacy of Communications
•
The Electronic Communications Privacy Act (1986) [full text]
•
Telephone Consumer Protection Act of 1991 [full text]
Children's Privacy
•
Children's Online Privacy Protection Act (COPPA) of 1998 [ full text]
Privacy of Financial Information
•
Fair Credit Reporting Act (1970) [full text]
•
Right to Financial Privacy Act (1978) [ excerpts] [full text]
•
Taxpayer Browsing Protection Act (1997) [full text]
•
Gramm-Leach-Bliley Act (1999) [outline]
•
Fair and Accurate Credit Transactions Act (2003) [full text]
Privacy of Medical Records
•
Health Insurance Portability and Accountability Act of 1996 (HIPAA) [full text]
Privacy of Miscellaneous Records and Activities
•
Administrative Procedure Act [full text]
•
Family Education Rights and Privacy Act (1974) [excerpts]
•
Privacy Protection Act of 1980 [excerpts]
•
Cable Communications Policy Act of 1984 [excerpts]
•
Video Privacy Protection Act of 1988 [excerpts]
•
Employee Polygraph Protection Act of 1988 [full text]
•
Driver's Privacy Protection Act of 1994 [excerpts]
•
Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 [full text]
•
Do-Not-Call Implementation Act of 2003 [full text]
+ a lot more
14
Source: https://www.cdt.org/privacy/guide/protect/laws.php
Privacy – FTC

Federal Trade Commission Act
(15 U.S.C. 41, et seq)

Section 5: “Unfair or deceptive acts or practices”
15
Privacy – FTC
Trend toward increasing enforcement
•
•
•
•

More than 60 actions to date
Well over half in the past 5 years
Many more investigated but not brought
Covering largely electronically stored data and
information
• Recent trend toward privacy, but target security as well
• Increasing scrutiny of mobile data privacy
• Emphasis on “sensitive information”
16
Privacy – FTC

“Sensitive Information”
Medical Information
Social Security Numbers
Financial Records
Precise Geolocation Data

17
Privacy – FTC

“Sensitive Information”

18
Privacy – FTC

“Personally Identifiable Information”

19
Privacy – FTC

“Personally Identifiable Information”

In the Matter of UPromise, Inc. (FTC File No. 102 3116, Jan. 5, 2012)

20
Privacy – FTC

“Personally Identifiable Information”

21
Privacy – FTC

In re Goldenshores Technologies, LLC
(December 5, 2013)

22
Privacy – FTC
In re Goldenshores Technologies, LLC (2013)
• Goldenshores made a popular free app called “Brightest Flashlight Free”
• FTC asserted deception regarding the collection and sharing of information
– Precise geolocation information
– Unique device identifier

• Privacy Policy
–
–

Provided for the collection and use of certain information by Goldenshores
Information actually shared with advertisers and other third parties

• “Opt-out” mechanism
–
–

Purported to offer users an opt-out from sharing
Did not actually lead to an opt-out

• Notice and Consent
–
–

Users presented with the opportunity to accept/reject a EULA
Data collection and sharing began before consent was actually given

23
Privacy – FTC
In re Goldenshores Technologies, LLC (2013)
• Case ended in settlement
• Goldenshores is prohibited from continuing misrepresentations regarding
collection, sharing, and use of user information
• Goldenshores required to provide a just-in-time disclosure informing users
when, how, and why their precise geolocation information is being collected,
used, and shared
• Requires Goldenshores to obtain affirmative express consent before
collecting, using, or sharing precise geolocation information of users
http://www.ftc.gov/sites/default/files/documents/cases/131205goldenshoresorder.pdf

24
Privacy – States
• State consumer protection statutes
– All 50 states
– Prohibitions on “unfair or deceptive” trade practices

• 28 States have “Little FTC Acts”
• Data breach notification statutes
– At least 46 states (DC and various US territories)
– Notification of state residents (and perhaps regulators) affected by
unauthorized access to sensitive personal information

• Data safeguards statutes
– (Significant) minority of states
– Safeguards to secure consumer information from unauthorized access

• Data privacy statutes
– Online privacy policies covering use and sharing of consumer information
– Use of personal information for direct marketing purposes

25
Privacy – California
• California has by far been the most active
• Privacy on the Go: Recommendations for the Mobile EcoSystem
• Recommendations for App Developers:
–
–
–
–
–
–

Be Transparent
Limit Data Collection
Limit Data Retention
Give Users Access
Use Security Safeguards
Be accountable

• http://oag.ca.gov/sites/all/files/pdfs/privacy/privacy_on_the_go.
pdf
26
Privacy – Industry Self-Regulation

“Consumer Privacy Bill of Rights”
27
Privacy – Industry Self-Regulation
Consumer Privacy Bill of Rights
• Combined effort of the White House, Department of
Commerce, and the FTC
• Provides a framework for consumer privacy protections
• Establishes principles covering personal data
• Modeled off of principles adopted by organizations in Europe
and Asia
• Proposes voluntary industry “codes of conduct” for data
privacy and security

28
Privacy – Industry Self-Regulation
Consumer Privacy Bill of Rights
• Industry codes of conduct
– Voluntary privacy and security “codes of conduct”
– Commerce Department National Telecommunications and Information
Administration (NTIA) to facilitate creation
– Other federal agencies may also convene industry stakeholders
– Industries can also convene stakeholders absent NTIA

• Inclusive and transparent “multi-stakeholder” processes
• Enforcement authority
– FTC to enforce codes of conduct
– Violations constitute a deceptive practice under Section 5 of the FTC Act
– Adherence to codes to be looked upon “favorably” in FTC investigations

29
Privacy – Industry Self-Regulation
NTIA
• Initial focus: Mobile devices
• Process completed: July 25, 2013
• Code of conduct released
– Focuses on short form notices
– “[P]rovide consumers enhanced transparency about the data collection and
sharing practices of apps that consumers use.”

• Key points
–
–
–
–

Data collected
Means of accessing long-form policy
Data sharing
Identity of entity providing the app

• http://www.ntia.doc.gov/files/ntia/publications/july_25_code_draft.pdf
• Next up: Facial recognition technology
30
Privacy – Industry Self-Regulation
Digital Advertising Alliance (DAA)
• Application of the DAA Self-Regulatory Principles to the
Mobile Environment (aka the “Mobile Guidance”)
• Establishes how the existing DAA principles apply to mobile
• Keys on “Transparency” and “control” (i.e., notice and choice)
– Transparency
•
•
•

Clear, meaningful and prominent notice of transfers (1st parties)
Clear, meaningful and prominent notice of collection and use practices (3rd
parties)
Enhanced notice in certain instances

– Consumer Control
• Consent (1st and 3rd party)

• http://www.aboutads.info/DAA_Mobile_Guidance.pdf
31
Privacy – Industry Self-Regulation
Network Advertising Initiative (NAI)
• Mobile Application Code
• Best practices for “mobile-specific data”
– Precise location information
– Personal directory data

• Keys points:
–
–
–
–
–
–

Education
Transparency and Notice
User Control
Use Limitations
Transfer Restrictions
Data Access, Quality, Security and Retention

• http://www.networkadvertising.org/mobile/NAI_Mobile_Application_
Code.pdf
32
Examples
Privacy Policy Link in App Store

Opt-in

33
Examples
Privacy Policy Link in App

Opt-Out

34
Tort Liability
• In re Apple Inc. iPhone/iPad Application Consumer
Privacy Litigation, 11-md-02250, U.S. District Court,
Northern District of California (San Jose)
• Similar case involving Google: In re Google Android
Consumer Privacy Litigation, U.S. District Court,
Northern District of California
• Rosenberg v. Harwood, No. 100916536 (Utah District
Court; May 27, 2011) (asserted Google provided bad
walking directions)
• Beckham v. Match.com:
http://www.courthousenews.com/2013/01/22/54143.
htm
35
Additional Considerations
• Legal process
• Law enforcement / National security
• Others

36
Thank you.
Bruce Antley
Assistant General Counsel, AOL Inc.
bruce.antley@teamaol.com

Jason Haislmaier
Partner, Bryan Cave LLP
jason.haislmaier@bryancave.com

37

Contenu connexe

Tendances

Browne Jacobson - Administrative and public law - October 2017
Browne Jacobson - Administrative and public law - October 2017Browne Jacobson - Administrative and public law - October 2017
Browne Jacobson - Administrative and public law - October 2017Browne Jacobson LLP
 
GDPR clinic - CloudWATCH at Cloud Security Expo 2017
GDPR clinic - CloudWATCH at Cloud Security Expo 2017GDPR clinic - CloudWATCH at Cloud Security Expo 2017
GDPR clinic - CloudWATCH at Cloud Security Expo 2017CloudWATCH Consortium
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Financial Poise
 
Saying "I Don't": the requirement of data subject consent for purposes of dat...
Saying "I Don't": the requirement of data subject consent for purposes of dat...Saying "I Don't": the requirement of data subject consent for purposes of dat...
Saying "I Don't": the requirement of data subject consent for purposes of dat...Werksmans Attorneys
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidanceAmy Purcell
 
Data Privacy
Data PrivacyData Privacy
Data PrivacyHome
 
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214Francoise Gilbert
 
Data protection and privacy framework in the design of learning analytics sys...
Data protection and privacy framework in the design of learning analytics sys...Data protection and privacy framework in the design of learning analytics sys...
Data protection and privacy framework in the design of learning analytics sys...Tore Hoel
 
Evolving international privacy regulations and cross border data transfer - g...
Evolving international privacy regulations and cross border data transfer - g...Evolving international privacy regulations and cross border data transfer - g...
Evolving international privacy regulations and cross border data transfer - g...Ulf Mattsson
 
Data Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive dataData Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive dataOpenAIRE
 
Wsgr eu data protection briefing march 20 2013 - final
Wsgr   eu data protection briefing march 20 2013 - finalWsgr   eu data protection briefing march 20 2013 - final
Wsgr eu data protection briefing march 20 2013 - finalValentin Korobkov
 
Put your left leg in, put your left leg out: the exclusions and exemptions of...
Put your left leg in, put your left leg out: the exclusions and exemptions of...Put your left leg in, put your left leg out: the exclusions and exemptions of...
Put your left leg in, put your left leg out: the exclusions and exemptions of...Werksmans Attorneys
 
Practical steps to take in preparation for the Protection of Personal Informa...
Practical steps to take in preparation for the Protection of Personal Informa...Practical steps to take in preparation for the Protection of Personal Informa...
Practical steps to take in preparation for the Protection of Personal Informa...Werksmans Attorneys
 
India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law Priyanka Aash
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and PrivacyVertex Holdings
 

Tendances (20)

Browne Jacobson - Administrative and public law - October 2017
Browne Jacobson - Administrative and public law - October 2017Browne Jacobson - Administrative and public law - October 2017
Browne Jacobson - Administrative and public law - October 2017
 
GDPR clinic - CloudWATCH at Cloud Security Expo 2017
GDPR clinic - CloudWATCH at Cloud Security Expo 2017GDPR clinic - CloudWATCH at Cloud Security Expo 2017
GDPR clinic - CloudWATCH at Cloud Security Expo 2017
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...
 
Saying "I Don't": the requirement of data subject consent for purposes of dat...
Saying "I Don't": the requirement of data subject consent for purposes of dat...Saying "I Don't": the requirement of data subject consent for purposes of dat...
Saying "I Don't": the requirement of data subject consent for purposes of dat...
 
Privacy Access Letter I Feb 5 07
Privacy Access Letter I   Feb 5 07Privacy Access Letter I   Feb 5 07
Privacy Access Letter I Feb 5 07
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
 
Privacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital WorldPrivacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital World
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
 
Data protection and privacy framework in the design of learning analytics sys...
Data protection and privacy framework in the design of learning analytics sys...Data protection and privacy framework in the design of learning analytics sys...
Data protection and privacy framework in the design of learning analytics sys...
 
Evolving international privacy regulations and cross border data transfer - g...
Evolving international privacy regulations and cross border data transfer - g...Evolving international privacy regulations and cross border data transfer - g...
Evolving international privacy regulations and cross border data transfer - g...
 
Data Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive dataData Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive data
 
Wsgr eu data protection briefing march 20 2013 - final
Wsgr   eu data protection briefing march 20 2013 - finalWsgr   eu data protection briefing march 20 2013 - final
Wsgr eu data protection briefing march 20 2013 - final
 
Put your left leg in, put your left leg out: the exclusions and exemptions of...
Put your left leg in, put your left leg out: the exclusions and exemptions of...Put your left leg in, put your left leg out: the exclusions and exemptions of...
Put your left leg in, put your left leg out: the exclusions and exemptions of...
 
Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
 
Practical steps to take in preparation for the Protection of Personal Informa...
Practical steps to take in preparation for the Protection of Personal Informa...Practical steps to take in preparation for the Protection of Personal Informa...
Practical steps to take in preparation for the Protection of Personal Informa...
 
Overview on data privacy
Overview on data privacy Overview on data privacy
Overview on data privacy
 
India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
 

En vedette

19888 annals 2_head
19888 annals 2_head19888 annals 2_head
19888 annals 2_headsundar sivam
 
Summer of Love Festival
Summer of Love FestivalSummer of Love Festival
Summer of Love FestivalStefantastik
 
Data Property Rights (Rocky Mountain IP and Technology Institute 2013) (May 2...
Data Property Rights (Rocky Mountain IP and Technology Institute 2013) (May 2...Data Property Rights (Rocky Mountain IP and Technology Institute 2013) (May 2...
Data Property Rights (Rocky Mountain IP and Technology Institute 2013) (May 2...Jason Haislmaier
 
Experiencia significativa bosa
Experiencia significativa bosaExperiencia significativa bosa
Experiencia significativa bosadaalvale
 
Gestión del talento global hdbr 0811
Gestión del talento global hdbr 0811Gestión del talento global hdbr 0811
Gestión del talento global hdbr 0811Savina Bueno
 
Project Delivery
Project DeliveryProject Delivery
Project DeliveryCODETE
 
[1] sk kd bina
[1] sk   kd bina[1] sk   kd bina
[1] sk kd binaferiyeye
 
Las poleas en la física
Las poleas en la física Las poleas en la física
Las poleas en la física Jhon3443
 
L'esperienza Erasmus Plus di Vanessa a Chester
L'esperienza Erasmus Plus di Vanessa a ChesterL'esperienza Erasmus Plus di Vanessa a Chester
L'esperienza Erasmus Plus di Vanessa a ChesterLuisella Mori
 
Follet: Alimentación en la Hipertensión arterial
Follet: Alimentación en la Hipertensión arterialFollet: Alimentación en la Hipertensión arterial
Follet: Alimentación en la Hipertensión arterialaulasaludable
 
Prevención del cáncer
Prevención del cáncerPrevención del cáncer
Prevención del cánceraulasaludable
 

En vedette (14)

19888 annals 2_head
19888 annals 2_head19888 annals 2_head
19888 annals 2_head
 
Session 2: Diagnostics in Africa
Session 2: Diagnostics in AfricaSession 2: Diagnostics in Africa
Session 2: Diagnostics in Africa
 
Summer of Love Festival
Summer of Love FestivalSummer of Love Festival
Summer of Love Festival
 
Data Property Rights (Rocky Mountain IP and Technology Institute 2013) (May 2...
Data Property Rights (Rocky Mountain IP and Technology Institute 2013) (May 2...Data Property Rights (Rocky Mountain IP and Technology Institute 2013) (May 2...
Data Property Rights (Rocky Mountain IP and Technology Institute 2013) (May 2...
 
Experiencia significativa bosa
Experiencia significativa bosaExperiencia significativa bosa
Experiencia significativa bosa
 
Can and-could
Can and-couldCan and-could
Can and-could
 
Gestión del talento global hdbr 0811
Gestión del talento global hdbr 0811Gestión del talento global hdbr 0811
Gestión del talento global hdbr 0811
 
Danone
DanoneDanone
Danone
 
Project Delivery
Project DeliveryProject Delivery
Project Delivery
 
[1] sk kd bina
[1] sk   kd bina[1] sk   kd bina
[1] sk kd bina
 
Las poleas en la física
Las poleas en la física Las poleas en la física
Las poleas en la física
 
L'esperienza Erasmus Plus di Vanessa a Chester
L'esperienza Erasmus Plus di Vanessa a ChesterL'esperienza Erasmus Plus di Vanessa a Chester
L'esperienza Erasmus Plus di Vanessa a Chester
 
Follet: Alimentación en la Hipertensión arterial
Follet: Alimentación en la Hipertensión arterialFollet: Alimentación en la Hipertensión arterial
Follet: Alimentación en la Hipertensión arterial
 
Prevención del cáncer
Prevención del cáncerPrevención del cáncer
Prevención del cáncer
 

Similaire à When Past Data Predicts the Future

Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analyticsshekharkanodia
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsFinancial Poise
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Financial Poise
 
Ethics and Politics of Big Data
Ethics and Politics of Big DataEthics and Politics of Big Data
Ethics and Politics of Big Datarobkitchin
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...Financial Poise
 
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 Introduction to EU General Data Protection Regulation: Planning, Implementat... Introduction to EU General Data Protection Regulation: Planning, Implementat...
Introduction to EU General Data Protection Regulation: Planning, Implementat...Financial Poise
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? SecurityScorecard
 
Scotland legal update 25 sept
Scotland legal update   25 septScotland legal update   25 sept
Scotland legal update 25 septRachel Aldighieri
 
Crash Course on Data Privacy (December 2012)
Crash Course on Data Privacy (December 2012)Crash Course on Data Privacy (December 2012)
Crash Course on Data Privacy (December 2012)Jason Haislmaier
 
Privacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSPrivacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSInteraktiv
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management Endcode_org
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Diana Maier
 
Ethics In DW & DM
Ethics In DW & DMEthics In DW & DM
Ethics In DW & DMabethan
 
IT risk discusion qustion.pdf
IT risk discusion qustion.pdfIT risk discusion qustion.pdf
IT risk discusion qustion.pdfstirlingvwriters
 
Privacy and Data Security: Minimizing Reputational and Legal Risks
Privacy and Data Security: Minimizing Reputational and Legal RisksPrivacy and Data Security: Minimizing Reputational and Legal Risks
Privacy and Data Security: Minimizing Reputational and Legal RisksTechWell
 
GDPR Benefits and a Technical Overview
GDPR  Benefits and a Technical OverviewGDPR  Benefits and a Technical Overview
GDPR Benefits and a Technical OverviewErnest Staats
 
Big Data
Big DataBig Data
Big Datacadmef
 
Cybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowCybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowShawn Tuma
 

Similaire à When Past Data Predicts the Future (20)

Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analytics
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
Ethics and Politics of Big Data
Ethics and Politics of Big DataEthics and Politics of Big Data
Ethics and Politics of Big Data
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
 
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 Introduction to EU General Data Protection Regulation: Planning, Implementat... Introduction to EU General Data Protection Regulation: Planning, Implementat...
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready?
 
Scotland legal update 25 sept
Scotland legal update   25 septScotland legal update   25 sept
Scotland legal update 25 sept
 
Crash Course on Data Privacy (December 2012)
Crash Course on Data Privacy (December 2012)Crash Course on Data Privacy (December 2012)
Crash Course on Data Privacy (December 2012)
 
Privacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSPrivacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMS
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
Ethics In DW & DM
Ethics In DW & DMEthics In DW & DM
Ethics In DW & DM
 
IT risk discusion qustion.pdf
IT risk discusion qustion.pdfIT risk discusion qustion.pdf
IT risk discusion qustion.pdf
 
Privacy and Data Security: Minimizing Reputational and Legal Risks
Privacy and Data Security: Minimizing Reputational and Legal RisksPrivacy and Data Security: Minimizing Reputational and Legal Risks
Privacy and Data Security: Minimizing Reputational and Legal Risks
 
GDPR Benefits and a Technical Overview
GDPR  Benefits and a Technical OverviewGDPR  Benefits and a Technical Overview
GDPR Benefits and a Technical Overview
 
Big Data
Big DataBig Data
Big Data
 
Cybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowCybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to Know
 
Mobileprivacyazahir
MobileprivacyazahirMobileprivacyazahir
Mobileprivacyazahir
 

Plus de Jason Haislmaier

Mobile Apps - Legal and Practical Considerations
Mobile Apps - Legal and Practical ConsiderationsMobile Apps - Legal and Practical Considerations
Mobile Apps - Legal and Practical ConsiderationsJason Haislmaier
 
Covidien - FDA Guidance on Mobile Medical Apps 140124
Covidien - FDA Guidance on Mobile Medical Apps 140124Covidien - FDA Guidance on Mobile Medical Apps 140124
Covidien - FDA Guidance on Mobile Medical Apps 140124Jason Haislmaier
 
Presentation - Mobile Medical Applications Guidance for Industry and Food and...
Presentation - Mobile Medical Applications Guidance for Industry and Food and...Presentation - Mobile Medical Applications Guidance for Industry and Food and...
Presentation - Mobile Medical Applications Guidance for Industry and Food and...Jason Haislmaier
 
Presentation - gener8tor - Data Privacy, Security, and Rights 130627
Presentation - gener8tor - Data Privacy, Security, and Rights 130627Presentation - gener8tor - Data Privacy, Security, and Rights 130627
Presentation - gener8tor - Data Privacy, Security, and Rights 130627Jason Haislmaier
 
Licensing in the Cloud (2013 Rocky Mountain IP and Technology Institute) (May...
Licensing in the Cloud (2013 Rocky Mountain IP and Technology Institute) (May...Licensing in the Cloud (2013 Rocky Mountain IP and Technology Institute) (May...
Licensing in the Cloud (2013 Rocky Mountain IP and Technology Institute) (May...Jason Haislmaier
 
Open Source License Compliance in the Cloud (CELESQ) (October 2012)
Open Source License Compliance in the Cloud (CELESQ) (October 2012)Open Source License Compliance in the Cloud (CELESQ) (October 2012)
Open Source License Compliance in the Cloud (CELESQ) (October 2012)Jason Haislmaier
 
"Crash Course" on Open Source Silicon Flatirons Center (2012)
"Crash Course" on Open Source Silicon Flatirons Center (2012) "Crash Course" on Open Source Silicon Flatirons Center (2012)
"Crash Course" on Open Source Silicon Flatirons Center (2012) Jason Haislmaier
 
Data Security and Privacy Landscape 2012 (September 2012)
Data Security and Privacy Landscape 2012 (September 2012)Data Security and Privacy Landscape 2012 (September 2012)
Data Security and Privacy Landscape 2012 (September 2012)Jason Haislmaier
 
Presentation ncsl - mobile privacy enforcement 130502 (as presented)
Presentation   ncsl - mobile privacy enforcement 130502 (as presented)Presentation   ncsl - mobile privacy enforcement 130502 (as presented)
Presentation ncsl - mobile privacy enforcement 130502 (as presented)Jason Haislmaier
 
Data Privacy & Security Update 2012
Data Privacy & Security Update 2012Data Privacy & Security Update 2012
Data Privacy & Security Update 2012Jason Haislmaier
 
Open Source License Compliance In The Cloud
Open Source License Compliance In The CloudOpen Source License Compliance In The Cloud
Open Source License Compliance In The CloudJason Haislmaier
 
Boulder/Denver Software Club Presentation: "All Things Data - Data Right...
Boulder/Denver Software Club Presentation: "All Things Data - Data Right...Boulder/Denver Software Club Presentation: "All Things Data - Data Right...
Boulder/Denver Software Club Presentation: "All Things Data - Data Right...Jason Haislmaier
 
2011 "Crash Course" on Open Source
2011 "Crash Course" on Open Source2011 "Crash Course" on Open Source
2011 "Crash Course" on Open SourceJason Haislmaier
 
2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers
2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers
2011 Silicon Flatirons IP (Crash Course) For EntrepreneurersJason Haislmaier
 
Fundamentals in Software Licensing (J. Haislmaier - IP Institute 2010)
Fundamentals in Software Licensing (J. Haislmaier - IP Institute 2010)Fundamentals in Software Licensing (J. Haislmaier - IP Institute 2010)
Fundamentals in Software Licensing (J. Haislmaier - IP Institute 2010)Jason Haislmaier
 
Legal Issues in Cloud Computing (J. Haislmaier - IP Institute 2010)
Legal Issues in Cloud Computing (J. Haislmaier - IP Institute 2010)Legal Issues in Cloud Computing (J. Haislmaier - IP Institute 2010)
Legal Issues in Cloud Computing (J. Haislmaier - IP Institute 2010)Jason Haislmaier
 

Plus de Jason Haislmaier (16)

Mobile Apps - Legal and Practical Considerations
Mobile Apps - Legal and Practical ConsiderationsMobile Apps - Legal and Practical Considerations
Mobile Apps - Legal and Practical Considerations
 
Covidien - FDA Guidance on Mobile Medical Apps 140124
Covidien - FDA Guidance on Mobile Medical Apps 140124Covidien - FDA Guidance on Mobile Medical Apps 140124
Covidien - FDA Guidance on Mobile Medical Apps 140124
 
Presentation - Mobile Medical Applications Guidance for Industry and Food and...
Presentation - Mobile Medical Applications Guidance for Industry and Food and...Presentation - Mobile Medical Applications Guidance for Industry and Food and...
Presentation - Mobile Medical Applications Guidance for Industry and Food and...
 
Presentation - gener8tor - Data Privacy, Security, and Rights 130627
Presentation - gener8tor - Data Privacy, Security, and Rights 130627Presentation - gener8tor - Data Privacy, Security, and Rights 130627
Presentation - gener8tor - Data Privacy, Security, and Rights 130627
 
Licensing in the Cloud (2013 Rocky Mountain IP and Technology Institute) (May...
Licensing in the Cloud (2013 Rocky Mountain IP and Technology Institute) (May...Licensing in the Cloud (2013 Rocky Mountain IP and Technology Institute) (May...
Licensing in the Cloud (2013 Rocky Mountain IP and Technology Institute) (May...
 
Open Source License Compliance in the Cloud (CELESQ) (October 2012)
Open Source License Compliance in the Cloud (CELESQ) (October 2012)Open Source License Compliance in the Cloud (CELESQ) (October 2012)
Open Source License Compliance in the Cloud (CELESQ) (October 2012)
 
"Crash Course" on Open Source Silicon Flatirons Center (2012)
"Crash Course" on Open Source Silicon Flatirons Center (2012) "Crash Course" on Open Source Silicon Flatirons Center (2012)
"Crash Course" on Open Source Silicon Flatirons Center (2012)
 
Data Security and Privacy Landscape 2012 (September 2012)
Data Security and Privacy Landscape 2012 (September 2012)Data Security and Privacy Landscape 2012 (September 2012)
Data Security and Privacy Landscape 2012 (September 2012)
 
Presentation ncsl - mobile privacy enforcement 130502 (as presented)
Presentation   ncsl - mobile privacy enforcement 130502 (as presented)Presentation   ncsl - mobile privacy enforcement 130502 (as presented)
Presentation ncsl - mobile privacy enforcement 130502 (as presented)
 
Data Privacy & Security Update 2012
Data Privacy & Security Update 2012Data Privacy & Security Update 2012
Data Privacy & Security Update 2012
 
Open Source License Compliance In The Cloud
Open Source License Compliance In The CloudOpen Source License Compliance In The Cloud
Open Source License Compliance In The Cloud
 
Boulder/Denver Software Club Presentation: "All Things Data - Data Right...
Boulder/Denver Software Club Presentation: "All Things Data - Data Right...Boulder/Denver Software Club Presentation: "All Things Data - Data Right...
Boulder/Denver Software Club Presentation: "All Things Data - Data Right...
 
2011 "Crash Course" on Open Source
2011 "Crash Course" on Open Source2011 "Crash Course" on Open Source
2011 "Crash Course" on Open Source
 
2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers
2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers
2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers
 
Fundamentals in Software Licensing (J. Haislmaier - IP Institute 2010)
Fundamentals in Software Licensing (J. Haislmaier - IP Institute 2010)Fundamentals in Software Licensing (J. Haislmaier - IP Institute 2010)
Fundamentals in Software Licensing (J. Haislmaier - IP Institute 2010)
 
Legal Issues in Cloud Computing (J. Haislmaier - IP Institute 2010)
Legal Issues in Cloud Computing (J. Haislmaier - IP Institute 2010)Legal Issues in Cloud Computing (J. Haislmaier - IP Institute 2010)
Legal Issues in Cloud Computing (J. Haislmaier - IP Institute 2010)
 

Dernier

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Dernier (20)

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

When Past Data Predicts the Future

  • 1. When Past Performance May Be Indicative of Future Results Legal Implications of Using Location-Based Services Data to Predict Future Behavior Cyberspace Law Institute & Winter Working Meeting January 31 - February 1, 2014 Denver, CO Bruce Antley Assistant General Counsel, AOL Inc. Jason Haislmaier Partner, Bryan Cave LLP
  • 2. This presentation is intended for general informational purposes only and should not be construed as legal advice or legal opinion on any specific facts or circumstances, nor is it intended to address specific legal compliance issues that may arise in particular circumstances. Please consult counsel concerning your own situation and any specific legal questions you may have. The thoughts and opinions expressed in this presentation are those of the individual presenters and do not necessarily reflect the official or unofficial thoughts or opinions of their employers. For further information regarding this presentation, please contact the presenter(s) listed in the presentation. Unless otherwise noted, all original content in this presentation is licensed under the Creative Commons Creative Commons Attribution-Share Alike 3.0 United States License available at: http://creativecommons.org/licenses/by-sa/3.0/us.
  • 4. Definitions • Location-Based Services Defined – Location-Based Services refers to a broad range of services that are based on (or enhanced by) information about the physical location of a user and/or device. – Typical location-based services for consumers might include real-time turn-by-turn directions, the location of the nearest gas station or motel, or social networking services. – Source: http://www.phonescoop.com/glossary/term.php?gid=276 • Predictive Analytics Defined – Predictive analytics encompasses a variety of techniques from statistics, modeling, machine learning, and data mining that analyze current and historical facts to make predictions about future, or otherwise unknown, events. – In business, predictive models exploit patterns found in historical and transactional data to identify risks and opportunities. – Models capture relationships among many factors to allow assessment of risk or potential associated with a particular set of conditions, guiding decision making for candidate transactions. – Source: http://en.wikipedia.org/wiki/Predictive_analytics 4
  • 5. “It’s tough to make predictions, especially about the future.” Yogi Berra(?) Samuel Goldwyn(?) Niels Bohr(?) 5
  • 6. 6
  • 8. Location Data Collection What location data can be collected? • Current location – GPS – Cell tower location – Wi-Fi locations • Compass heading 8
  • 9. The Tell-All Telephone Striking illustration of data collected: http://www.zeit.de/datenschutz/malte-spitz-data-retention/ 9
  • 10. LBS and Predictive Analysis Uses of LBS Data with Predictive Analytics: • • • • • Targeted Advertising / Marketing Social media Navigation Insurance / Fraud Prevention Law enforcement and intelligence 10
  • 11. Legal Implications Predictive Analytics Can Be “Creepy” “While it is not a universal reaction, predictive analytics in certain contexts can prompt a ‘creepy’ or unsettling feeling of being under the gaze of an omniscient observer who knows something about us and our behavior.” http://www.priv.gc.ca/information/research-recherche/2012/pa_201208_e.asp 11
  • 12. Privacy Emerging 3-Tier Systems in the US • Federal • State • Self-Regulatory Organizations No comprehensive regime at any level. . . 12
  • 14. Privacy – Federal Federal Privacy Laws Privacy of Communications • The Electronic Communications Privacy Act (1986) [full text] • Telephone Consumer Protection Act of 1991 [full text] Children's Privacy • Children's Online Privacy Protection Act (COPPA) of 1998 [ full text] Privacy of Financial Information • Fair Credit Reporting Act (1970) [full text] • Right to Financial Privacy Act (1978) [ excerpts] [full text] • Taxpayer Browsing Protection Act (1997) [full text] • Gramm-Leach-Bliley Act (1999) [outline] • Fair and Accurate Credit Transactions Act (2003) [full text] Privacy of Medical Records • Health Insurance Portability and Accountability Act of 1996 (HIPAA) [full text] Privacy of Miscellaneous Records and Activities • Administrative Procedure Act [full text] • Family Education Rights and Privacy Act (1974) [excerpts] • Privacy Protection Act of 1980 [excerpts] • Cable Communications Policy Act of 1984 [excerpts] • Video Privacy Protection Act of 1988 [excerpts] • Employee Polygraph Protection Act of 1988 [full text] • Driver's Privacy Protection Act of 1994 [excerpts] • Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 [full text] • Do-Not-Call Implementation Act of 2003 [full text] + a lot more 14 Source: https://www.cdt.org/privacy/guide/protect/laws.php
  • 15. Privacy – FTC Federal Trade Commission Act (15 U.S.C. 41, et seq) Section 5: “Unfair or deceptive acts or practices” 15
  • 16. Privacy – FTC Trend toward increasing enforcement • • • • More than 60 actions to date Well over half in the past 5 years Many more investigated but not brought Covering largely electronically stored data and information • Recent trend toward privacy, but target security as well • Increasing scrutiny of mobile data privacy • Emphasis on “sensitive information” 16
  • 17. Privacy – FTC “Sensitive Information” Medical Information Social Security Numbers Financial Records Precise Geolocation Data 17
  • 18. Privacy – FTC “Sensitive Information” 18
  • 19. Privacy – FTC “Personally Identifiable Information” 19
  • 20. Privacy – FTC “Personally Identifiable Information” In the Matter of UPromise, Inc. (FTC File No. 102 3116, Jan. 5, 2012) 20
  • 21. Privacy – FTC “Personally Identifiable Information” 21
  • 22. Privacy – FTC In re Goldenshores Technologies, LLC (December 5, 2013) 22
  • 23. Privacy – FTC In re Goldenshores Technologies, LLC (2013) • Goldenshores made a popular free app called “Brightest Flashlight Free” • FTC asserted deception regarding the collection and sharing of information – Precise geolocation information – Unique device identifier • Privacy Policy – – Provided for the collection and use of certain information by Goldenshores Information actually shared with advertisers and other third parties • “Opt-out” mechanism – – Purported to offer users an opt-out from sharing Did not actually lead to an opt-out • Notice and Consent – – Users presented with the opportunity to accept/reject a EULA Data collection and sharing began before consent was actually given 23
  • 24. Privacy – FTC In re Goldenshores Technologies, LLC (2013) • Case ended in settlement • Goldenshores is prohibited from continuing misrepresentations regarding collection, sharing, and use of user information • Goldenshores required to provide a just-in-time disclosure informing users when, how, and why their precise geolocation information is being collected, used, and shared • Requires Goldenshores to obtain affirmative express consent before collecting, using, or sharing precise geolocation information of users http://www.ftc.gov/sites/default/files/documents/cases/131205goldenshoresorder.pdf 24
  • 25. Privacy – States • State consumer protection statutes – All 50 states – Prohibitions on “unfair or deceptive” trade practices • 28 States have “Little FTC Acts” • Data breach notification statutes – At least 46 states (DC and various US territories) – Notification of state residents (and perhaps regulators) affected by unauthorized access to sensitive personal information • Data safeguards statutes – (Significant) minority of states – Safeguards to secure consumer information from unauthorized access • Data privacy statutes – Online privacy policies covering use and sharing of consumer information – Use of personal information for direct marketing purposes 25
  • 26. Privacy – California • California has by far been the most active • Privacy on the Go: Recommendations for the Mobile EcoSystem • Recommendations for App Developers: – – – – – – Be Transparent Limit Data Collection Limit Data Retention Give Users Access Use Security Safeguards Be accountable • http://oag.ca.gov/sites/all/files/pdfs/privacy/privacy_on_the_go. pdf 26
  • 27. Privacy – Industry Self-Regulation “Consumer Privacy Bill of Rights” 27
  • 28. Privacy – Industry Self-Regulation Consumer Privacy Bill of Rights • Combined effort of the White House, Department of Commerce, and the FTC • Provides a framework for consumer privacy protections • Establishes principles covering personal data • Modeled off of principles adopted by organizations in Europe and Asia • Proposes voluntary industry “codes of conduct” for data privacy and security 28
  • 29. Privacy – Industry Self-Regulation Consumer Privacy Bill of Rights • Industry codes of conduct – Voluntary privacy and security “codes of conduct” – Commerce Department National Telecommunications and Information Administration (NTIA) to facilitate creation – Other federal agencies may also convene industry stakeholders – Industries can also convene stakeholders absent NTIA • Inclusive and transparent “multi-stakeholder” processes • Enforcement authority – FTC to enforce codes of conduct – Violations constitute a deceptive practice under Section 5 of the FTC Act – Adherence to codes to be looked upon “favorably” in FTC investigations 29
  • 30. Privacy – Industry Self-Regulation NTIA • Initial focus: Mobile devices • Process completed: July 25, 2013 • Code of conduct released – Focuses on short form notices – “[P]rovide consumers enhanced transparency about the data collection and sharing practices of apps that consumers use.” • Key points – – – – Data collected Means of accessing long-form policy Data sharing Identity of entity providing the app • http://www.ntia.doc.gov/files/ntia/publications/july_25_code_draft.pdf • Next up: Facial recognition technology 30
  • 31. Privacy – Industry Self-Regulation Digital Advertising Alliance (DAA) • Application of the DAA Self-Regulatory Principles to the Mobile Environment (aka the “Mobile Guidance”) • Establishes how the existing DAA principles apply to mobile • Keys on “Transparency” and “control” (i.e., notice and choice) – Transparency • • • Clear, meaningful and prominent notice of transfers (1st parties) Clear, meaningful and prominent notice of collection and use practices (3rd parties) Enhanced notice in certain instances – Consumer Control • Consent (1st and 3rd party) • http://www.aboutads.info/DAA_Mobile_Guidance.pdf 31
  • 32. Privacy – Industry Self-Regulation Network Advertising Initiative (NAI) • Mobile Application Code • Best practices for “mobile-specific data” – Precise location information – Personal directory data • Keys points: – – – – – – Education Transparency and Notice User Control Use Limitations Transfer Restrictions Data Access, Quality, Security and Retention • http://www.networkadvertising.org/mobile/NAI_Mobile_Application_ Code.pdf 32
  • 33. Examples Privacy Policy Link in App Store Opt-in 33
  • 34. Examples Privacy Policy Link in App Opt-Out 34
  • 35. Tort Liability • In re Apple Inc. iPhone/iPad Application Consumer Privacy Litigation, 11-md-02250, U.S. District Court, Northern District of California (San Jose) • Similar case involving Google: In re Google Android Consumer Privacy Litigation, U.S. District Court, Northern District of California • Rosenberg v. Harwood, No. 100916536 (Utah District Court; May 27, 2011) (asserted Google provided bad walking directions) • Beckham v. Match.com: http://www.courthousenews.com/2013/01/22/54143. htm 35
  • 36. Additional Considerations • Legal process • Law enforcement / National security • Others 36
  • 37. Thank you. Bruce Antley Assistant General Counsel, AOL Inc. bruce.antley@teamaol.com Jason Haislmaier Partner, Bryan Cave LLP jason.haislmaier@bryancave.com 37