SlideShare une entreprise Scribd logo
1  sur  63
Designing for Privacy in an Increasingly Public World
Product Design Meetup | 21 July 2021 | Robert Stribley
Street art by JR
I’m Robert Stribley
I’m a user experience designer and manager at
Publicis Sapient and I teach user experience design
at the School of Visual Arts in New York.
Introduction
• Corporations and non-profits consider the privacy of their
users’ data, their content, even their browsing behavior for
their clients’ benefit and safety
• But they also do it for their own personal and financial self
interest
• It’s increasingly important that they consider the privacy and
security issues affecting their customers and clients
• So how do we design these digital experiences—apps,
websites, etc — to ensure people’s privacy?
Background
Privacy and security are different concepts
Privacy: Your ability to control your personal information and
how it’s used
Security: How your personal information is protected by those
holding on to it
These concepts often overlap, so we’ll refer to both
Our focus: How we can ensure people’s privacy is maintained
as we design experiences for them
Purpose
Why Privacy?
Image by Jack Ferrentino for NPR
“Arguing that you don't
care about the right to
privacy because you
have nothing to hide is
no different than saying
you don't care about
free speech because
you have nothing to
say.”
— Edward Snowden, former CIA
employee, infamous NSA leaker
Why Privacy?
• If we’re not concerned with a particular privacy
issue, remember, we’re not designing for
ourselves
• If we’re designing with empathy, we’ll consider
the needs of people not like ourselves — people
with different backgrounds and experiences
• That means researching privacy issues, but also
engaging with people with diverse backgrounds
and lived experiences
Why Privacy?
Examples:
DayOne, a non-profit, provides services for
young people in abusive dating relationships.
These clients may worry about their partners
tracking their online activity or stalking them in
real life.
Similarly, LGBTQ youth need to feel their privacy
is secure when reaching out for help online.
In this sense, privacy issues are often diversity
issues.
Why Privacy?
Privacy Issues
In April, Facebook, the
largest social media platform
on the planet was hacked.
533 million user’s phone
numbers and personal data
were leaked online.
Data for half a billion people.
Data Security
Fraud & identity theft on the
rise during the pandemic.
FTC: 1.4 million reports of
identity theft in 2020 — double
from 2019.
Leaks of personal data can be
catastrophic to people’s lives.
Fraud & Identity
Theft
Photo by Kyle Glenn
Stores, such as Albertsons,
Rite-Aid, Macy’s, ACE
Hardware are using facial
recognition programs to
identify customers.
Some also use apps to track
customers around their stores
to present them with ads
online later.
Facial
Recognition
Amazon required delivery
drivers to sign consent
forms, which allowed the
company to collect their
biometric data and to use AI
cameras to monitor their
location, movement, their
driving patterns.
At least one driver quit over
this form of “AI surveillance.”
Biometric Data
• A donation site for Donald Trump
deployed “dark patterns” to trick
supporters into agreeing to recurring
donations
• Designers rolled out iterations of this
feature with increasingly confusing
language, fine print, bold text, all-
caps, and a pre-selected check box
• They referred to the feature as a
“money bomb”
• Donations grew astronomically — as
did fraud complaints from angry
supporters
• One 78-year-old supporter summed
up his thoughts: “Bandits!”
Dark Patterns
• Demand for personalized content, which benefits from
personal data seems higher than ever
• People say they want personalized ads, so you’d think
they enjoy sharing their data
• But a 2019 survey by network security company RSA
found only 17% of respondents said it was ethical to
track their online activity to personalize ads
• Earlier, Pew Research found 91% of adults believe
consumers have lost control over how their personal
information is collected and used by companies
Data Sharing
Data Sharing
Apple rolled out a new iPhone
feature called “App Tracking
Transparency,” an anti-tracking
shield, which prevents apps from
shadowing you across the internet.
Now, they have to ask first.
Only ~15% of iOS users worldwide
allowing apps to track them so far –
The Register, May 2021.
Impact of Regulations
GDPR stands for …
The General Data Protection Regulation
Law finalized in 2016, came into effect in
2018
Regulates how apps and sites can gather
and transfer or process personal data when
working within the European Union
Also, what happens to that data when it’s
transferred outside of the EU?
Impact of Regulations
Remember a while back
when you suddenly got a
gazillion emails from
companies telling you they
had updated their privacy
policies?
That was a result of the
GDPR.
Some things GDPR requires …
• Ask people to opt in to sharing their data
• Communicate to people in the moment, when
you’re collecting their personal data
• Be transparent about what you’re doing with it
• Allow people to download their data and
delete it — a “right to erasure” or “right to be
forgotten”
Impact of Regulations
California passed their own version of the GDPR —
the California Consumer Privacy Act.
Gives Californians more control over how their
personal data is used.
Requirements very similar to those in the GDPR.
CCPA differs in that it (currently) allows businesses
to collect your information by default—though they
do have to offer the ability to opt out.
California Consumer Privacy Act 2018
Impact of Regulations
In March, California announced they’re
banning “dark patterns.”
And a new “Privacy Options” icon for
businesses to show you where to opt out of
data collection.
The icon was designed by Carnegie Mellon’s
CyLab and the University of Michigan’s School
of Information.
Impact of Regulations
New York, Maryland, Massachusetts and Hawaii
are developing their own privacy laws, too.
So, if you’re designing for GDPR and California
privacy laws and more, you may as well design
for all — design for the highest common good.
Impact of Regulations
What’s Our Role?
Our Role
“You were not hired to get approval
or to have your work pinned to the
company fridge.”
“People hire you to be the expert, so
you might as well be the expert.”
—Mike Monteiro, designer, co-founder of Mule Design
in Ruined by Design
More specifically?
We have a responsibility to act as the
advocate for users — but even that’s
too abstract.
The term “user” tends to strip people of
their individual circumstances, their
personality, their history, even their
lives.
We have a responsibility to real human
beings.
We may need to push back where
necessary in terms our clients
understand.
Our Role
Photo by Vince Fleming
We may have to explain to our clients the impacts of ignoring privacy and security concerns.
What are these impacts, specifically?
• Civic responsibility. As user-centered designers, we really should be encouraging our clients to treat
their “end users” as human beings, who are members of their community
• Reputation management: We may have to remind our clients that what companies do can
undermine their brands
• Using dark patterns may anger people and cause them to abandon your site in favor of another with
a more transparent experience
• Data breaches and sloppy treatment of data may lead to the loss of their user base — likely affecting
their profits
• Financial consideration: Keep in mind the increasing number of laws and regulations and the
resulting fines for not following them
Even if there’s an up-front cost to designing for privacy and security, the long-term costs can be
devastating
Our Role
In 2019, 5 employees quit their jobs at
GitHub after learning the company
shared its data with ICE, the
government agency, which has been
accused repeatedly of human rights
violations — especially related to the
treatment of immigrants.
It might be tough to speak up in such
a situation, but we got into this
business to help people — and what
we do has a real-world impact.
Our Role
In the1940s a Frenchman, Rene Carmille was working on the
French Census.
He and his team have been dubbed the first “ethical
hackers.” They decided to sabotage their own machines, so
the punch cards couldn’t register people’s religion properly.
The team was discovered, arrested by the Nazis and
tortured. Carmille died at Dachau.
But they prevented the Nazis from discovering the identities
of tens of thousands Jewish people living in France, saving
their lives in the process.
They did so by changing an experience to maintain people’s
privacy.
Rene Carmille
Best Practices
In Privacy by Design, Dr. Ann Cavoukian
lays out 7 foundation principles for Fair
Information Practices.
She recommends making privacy the
“default setting” in our designs and
says privacy should be “embedded”
into design.
So, what are some practical ways to
ensure we’re doing that?
Best Practices
Self Study:
“Privacy by Design: The 7 Foundational Principles”
by Dr. Ann Cavoukian
Founder of Global Privacy & Security by Design and the former Information and Privacy Commissioner
for the Canadian province of Ontario
Avoid dark patterns
Dark Patterns
1
Dark Patterns
UX designer Harry Brignull coined
the term “dark pattern” in 2010
He defines dark pattern: a “user
interface that has been carefully
crafted to trick users into doing
things” that you didn’t mean to do
— like buying or signing up for
something
Another researcher described dark
patterns as supplanting user value
“in favor of shareholder value”
Brignull identified about a dozen types of
dark patterns.
Bait and Switch – You set out to accomplish
one thing but something else completely
undesirable happens.
Confirmshaming – You try to unsubscribe
from something, for example, and the
feature to opt out uses language to guilt
you out of taking action.
Friend spamming – A site asks to access
your contacts, so you can find your friends,
then it emails all your friends without your
permission.
Dark Patterns
Example of confirmshaming
Dark Patterns
“Dark patterns are the canaries in the
coal mine of unethical design.
A company who’s willing to keep a
customer hostage is willing to do
worse.”
— Mike Monteiro, Ruined by Design
Dark patterns can expose users’ personal
information
When you make a payment on Venmo, it
defaults to public, so you automatically share
your payments with … everyone
The opposite of designing with privacy as a
default
Somebody created Vicemo, which scraped
payments listed with words associated with
drugs, alcohol or sex and posted them online
for all to see
Dark Patterns
Strava automatically tagged other runners when you
passed them if they didn’t change their settings.
This feature even had a name: Flyby.
If you clicked on a face, it showed the user’s full name,
picture and a map of their running route — effectively
revealing where they lived.
This happened without you following users and without
them knowing they were sharing their activity.
After receiving criticism, Strava did change the default
setting to private.
It should have always been private.
“Stalkerware”– Apps which allow people to be tracked —
intentionally or not
Dark Patterns
Be transparent
about what
personal data is
used
What Data Is Used?
2
It’s important to be very specific —
especially when sharing PII.
Personally identifiable information —
data points such as name, email, phone
number, social security number, mother’s
maiden name, which can be used to steal
people’s identities and commit fraud
87% of the U.S. population can be
uniquely identified by just their date of
birth, gender, ZIP code? (Those items
aren’t even considered PII.)
Imagine how much damage a bad actor
can do with just 3 data points of PII.
What Data Is Used?
Be transparent about
why specific personal
data is collected or
shared
Why Is Data Used?
3
Consider this as an opportunity to explain the benefits of
sharing their data:
• Does it ensure a better experience in the future?
• Does it personalize ads and offers for them?
Be prepared to explain those benefits in detail.
If you can’t, are you’re designing the right sort of product?
Why Is Data Used?
Why Is Data Used?
Lemonade includes an itemized,
detailed explanation of what
personal information you’re
sharing, and they also explain
why.
They also promise never to sell
your information to third parties.
“TL;DR: We will never, ever, sell your data to anyone.”
Always use clear,
approachable language
Clear Language
4
Clear Language
The New York Times studied 150 privacy policies
from various tech and media platforms. They
described what they found as an “incomprehensible
disaster.”
They described AirBnB’s privacy policy as
“particularly inscrutable.”
“This information is necessary for the adequate performance of
the contract between you and us and to allow us to comply with
our legal obligations.”
Vague language and jargon allow for a wide range
of interpretation, making it easy companies to
defend their practices in a lawsuit while making it
harder for us to understand what’s really going on
with their data.
Twitter advises you to read
their privacy policy in full but
highlights key aspects of it up
front — in a dedicated section
— advising you to pay
attention to those particular
things
Clear Language
Guidelines:
• Avoid legalese and jargon: Even your
terms and conditions content doesn’t
have to sound like legal content
• Consider different ages groups and levels
of savviness
• Most adult Americans read at about a
basic or intermediate literacy level
• 50% can’t read a book written at an 8th
grade level
• The Content Marketing Institute
recommends writing for about a 14- or
15-year-old (about 8th grade)
• Carefully crafted personas can help
determine if an experience’s reading level
should vary from that range
Clear Language
Photo by John-Mark Smith
Give users options to control their
own data
User Controls
5
User Controls
Google offers a Privacy Checkup with high
level descriptions of how your personal data is
being used and why.
This links to specific Privacy Controls, which
allow you to adjust how that data is accessed.
They allow you to turn off activity tracking,
location history, your YouTube history, your
Google photo settings, check which 3rd
parties have access to your account
information, and access other key settings all
in one privacy dashboard.
This seems like a good moment to
recall Dr. Cavoukian’s maxim:
Keep these settings private by
default
User Controls
Ensure these privacy
features and information are
placed contextually and
easy to find
Easy to Find
6
Easy to Find
Such important information
shouldn’t be placed in 8-point
font …
buried in the Terms &
Conditions …
hidden in the footer …
or several levels of navigation
down deep in your app
— and yet, that’s often where
we find it
A feature like California’s
new “Privacy Options” icon
could prove effective to
draw attention to these
privacy options.
Easy to Find
Contextual and easy to find also means …
Onboarding — Explaining in detail how you use people’s
data when they’re using your app for the very first time.
“Just in time” alerts – Alerting users in the moment—when
they’re about to share data in a new way—even if they have a
history of using your experience.
Easy to Find
Mozilla displays robust
Privacy information by
default in a dedicated tab
when you download and
open their Firefox
browser for the first time.
Remind users regularly about their privacy
options
And actively encourage them to take
advantage of them
Reminders
7
Reminders
Facebook allows you to set
reminders to do a privacy
checkup every week, month, 6
months or year
Google also has a feature, which
will send you a reminder to check
your privacy settings.
Never change users’ privacy settings
without telling them in advance.
They should also have the option to opt
out of such changes.
Never Change Without Notice
8
A few years ago, Facebook made users’ “likes” visible overnight,
which consequently may have outed some people in the
LGTBQ community or revealed people’s personal, political or
religious beliefs.
When I asked an employee how they justified this change, they
responded that the company valued transparency and wanted
people to be transparent about their interests.
The company’s founder, Mark Zuckerberg, had even famously
said privacy was no longer a “social norm.”
Never Change Without Notice
We don’t have the right to make decisions about other
people’s personal data and interests on their behalf.
Assuming everyone’s information can safely be made
public is a belief that comes from a position of privilege.
We should never make decisions like this, which can
profoundly affect people’s privacy without their explicit
consent.
Never Change Without Notice
In Conclusion
We talk a lot about “empathy” in
design.
If we design with empathy, we
won’t design experiences we
wouldn’t want to use ourselves.
And we won’t design using “dark
patterns” either.
Conclusion
Photo by Josh Calabrese
Privacy is not about secrecy.
It’s all about control.
— Dr.Ann Cavoukian
If we want to ensure people have control over their
own personal information
If we want to ensure experiences we design are user
friendly and truly “user-centered”
We’ll keep these best practices in mind
Conclusion
Photo by Zanardi, Unsplash
thank you
Further Study
Further Study
• California Consumer Privacy Act
• GDPR.eu
• “Privacy by Design: The 7 Foundational Principles” -
Dr. Ann Cavoukian
• The Privacy Project – New York Times
• “We Read 150 Privacy Policies. They Were an
Incomprehensible Disaster”– Kevin Litman-Navarro,
New York Times
• “Privacy UX - Common Concerns and Privacy in Web
Forms” – Vitaly Friedman, Smashing Magazine
• “What GDPR Means for UX” – Claire Barrett
• www.darkpatterns.org – Harry Brignull
• “How Dark Patterns Trick You Online” – YouTube
• Ruined by Design – Mike Monteiro

Contenu connexe

Tendances

Social Distortion: Privacy, Consent, and Social Networks
Social Distortion: Privacy, Consent, and Social NetworksSocial Distortion: Privacy, Consent, and Social Networks
Social Distortion: Privacy, Consent, and Social Networksdariphagen
 
John Locke Essay Prize 2014
John Locke Essay Prize 2014John Locke Essay Prize 2014
John Locke Essay Prize 2014Marco Bertone
 
The Future Of Social Networks
The Future Of Social NetworksThe Future Of Social Networks
The Future Of Social NetworksCharlene Li
 
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, FedseMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, FedseMarketer
 
An introduction to internet marketing for small law firms
An introduction to internet marketing for small law firmsAn introduction to internet marketing for small law firms
An introduction to internet marketing for small law firmsBullsEye Internet Marketing
 
The Web Revolution: Data, Design & Driving Results
The Web Revolution: Data, Design & Driving ResultsThe Web Revolution: Data, Design & Driving Results
The Web Revolution: Data, Design & Driving ResultsHubbard One
 
Strategic American Four Data vs Privacy
Strategic American Four Data vs PrivacyStrategic American Four Data vs Privacy
Strategic American Four Data vs PrivacyJoel Drotts
 
What are they talking about
What are they talking aboutWhat are they talking about
What are they talking aboutMandy Stahl
 
AIIM New England Social Networking Presentation
AIIM New England  Social Networking PresentationAIIM New England  Social Networking Presentation
AIIM New England Social Networking PresentationDoug Cornelius
 
Carpe Datum! Who knows who you are?
Carpe Datum! Who knows who you are?Carpe Datum! Who knows who you are?
Carpe Datum! Who knows who you are?Kuliza Technologies
 
Personal identity Management
Personal identity ManagementPersonal identity Management
Personal identity ManagementGeorge Roberts
 
Social media and the future of e-discovery
Social media and the future of e-discoverySocial media and the future of e-discovery
Social media and the future of e-discoveryLogikcull.com
 
Digital identity - Progressive Recruitment - 29/04/2020
Digital identity - Progressive Recruitment - 29/04/2020Digital identity - Progressive Recruitment - 29/04/2020
Digital identity - Progressive Recruitment - 29/04/2020Denys Malengreau
 
Online Behavioral Advertising (OBA) Legal & Regulatory Compliance
Online Behavioral Advertising (OBA) Legal & Regulatory ComplianceOnline Behavioral Advertising (OBA) Legal & Regulatory Compliance
Online Behavioral Advertising (OBA) Legal & Regulatory ComplianceAdler Law Group
 
Marketing the Law Firm - October 2016
Marketing the Law Firm - October 2016Marketing the Law Firm - October 2016
Marketing the Law Firm - October 2016Social Sweet Spot
 

Tendances (20)

Social crm comes of age
Social crm comes of ageSocial crm comes of age
Social crm comes of age
 
Social Distortion: Privacy, Consent, and Social Networks
Social Distortion: Privacy, Consent, and Social NetworksSocial Distortion: Privacy, Consent, and Social Networks
Social Distortion: Privacy, Consent, and Social Networks
 
John Locke Essay Prize 2014
John Locke Essay Prize 2014John Locke Essay Prize 2014
John Locke Essay Prize 2014
 
The Future Of Social Networks
The Future Of Social NetworksThe Future Of Social Networks
The Future Of Social Networks
 
Social Technology Quarterly 08
Social Technology Quarterly 08Social Technology Quarterly 08
Social Technology Quarterly 08
 
SayanMitra.pdf
SayanMitra.pdfSayanMitra.pdf
SayanMitra.pdf
 
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, FedseMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
 
An introduction to internet marketing for small law firms
An introduction to internet marketing for small law firmsAn introduction to internet marketing for small law firms
An introduction to internet marketing for small law firms
 
The Web Revolution: Data, Design & Driving Results
The Web Revolution: Data, Design & Driving ResultsThe Web Revolution: Data, Design & Driving Results
The Web Revolution: Data, Design & Driving Results
 
Strategic American Four Data vs Privacy
Strategic American Four Data vs PrivacyStrategic American Four Data vs Privacy
Strategic American Four Data vs Privacy
 
What are they talking about
What are they talking aboutWhat are they talking about
What are they talking about
 
AIIM New England Social Networking Presentation
AIIM New England  Social Networking PresentationAIIM New England  Social Networking Presentation
AIIM New England Social Networking Presentation
 
Writing Sample
Writing SampleWriting Sample
Writing Sample
 
sixspans0102
sixspans0102sixspans0102
sixspans0102
 
Carpe Datum! Who knows who you are?
Carpe Datum! Who knows who you are?Carpe Datum! Who knows who you are?
Carpe Datum! Who knows who you are?
 
Personal identity Management
Personal identity ManagementPersonal identity Management
Personal identity Management
 
Social media and the future of e-discovery
Social media and the future of e-discoverySocial media and the future of e-discovery
Social media and the future of e-discovery
 
Digital identity - Progressive Recruitment - 29/04/2020
Digital identity - Progressive Recruitment - 29/04/2020Digital identity - Progressive Recruitment - 29/04/2020
Digital identity - Progressive Recruitment - 29/04/2020
 
Online Behavioral Advertising (OBA) Legal & Regulatory Compliance
Online Behavioral Advertising (OBA) Legal & Regulatory ComplianceOnline Behavioral Advertising (OBA) Legal & Regulatory Compliance
Online Behavioral Advertising (OBA) Legal & Regulatory Compliance
 
Marketing the Law Firm - October 2016
Marketing the Law Firm - October 2016Marketing the Law Firm - October 2016
Marketing the Law Firm - October 2016
 

Similaire à Designing for Privacy in an Increasingly Public World

Designing for Privacy in an Increasingly Public World — Speed Talk
Designing for Privacy in an Increasingly Public World — Speed TalkDesigning for Privacy in an Increasingly Public World — Speed Talk
Designing for Privacy in an Increasingly Public World — Speed TalkRobert Stribley
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy Carolina Rossini
 
Big Data's Big Paradox_Dr. Nita Rollins
Big Data's Big Paradox_Dr. Nita RollinsBig Data's Big Paradox_Dr. Nita Rollins
Big Data's Big Paradox_Dr. Nita RollinsNita Rollins, Ph.D.
 
Module 5 - Legislation - Online
Module 5 - Legislation - OnlineModule 5 - Legislation - Online
Module 5 - Legislation - Onlinecaniceconsulting
 
The Privacy Illusion
The Privacy IllusionThe Privacy Illusion
The Privacy IllusionMary Aviles
 
The Future Shape of Digital | Chartered Institute of Marketing
The Future Shape of Digital | Chartered Institute of MarketingThe Future Shape of Digital | Chartered Institute of Marketing
The Future Shape of Digital | Chartered Institute of MarketingiStrategy
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationcaniceconsulting
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsAT Internet
 
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Design
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by DesignSay Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Design
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Designbradley_g
 
Vint big data research privacy technology and the law
Vint big data research privacy technology and the lawVint big data research privacy technology and the law
Vint big data research privacy technology and the lawKarlos Svoboda
 
Big data 3 4- vint-big-data-research-privacy-technology-and-the-law - big dat...
Big data 3 4- vint-big-data-research-privacy-technology-and-the-law - big dat...Big data 3 4- vint-big-data-research-privacy-technology-and-the-law - big dat...
Big data 3 4- vint-big-data-research-privacy-technology-and-the-law - big dat...Rick Bouter
 
Sogeti big data research privacy technology and the law
Sogeti big data research privacy technology and the lawSogeti big data research privacy technology and the law
Sogeti big data research privacy technology and the lawYann SESE
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemSimon Aderinlola
 
Age Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAge Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAgeFriendlyEconomy
 
A people-centred approach to Data and the Internet of Things
A people-centred approach to Data and the Internet of ThingsA people-centred approach to Data and the Internet of Things
A people-centred approach to Data and the Internet of ThingsClaro Partners Inc.
 
TrustUX: balancing personalisation and privacy to create understanding and tr...
TrustUX: balancing personalisation and privacy to create understanding and tr...TrustUX: balancing personalisation and privacy to create understanding and tr...
TrustUX: balancing personalisation and privacy to create understanding and tr...Ann Wuyts
 
Privacy & Data Protection - Leon Sylvester Lemos - Privacy. That's iPhone.
Privacy & Data Protection - Leon Sylvester Lemos - Privacy.  That's iPhone.Privacy & Data Protection - Leon Sylvester Lemos - Privacy.  That's iPhone.
Privacy & Data Protection - Leon Sylvester Lemos - Privacy. That's iPhone.LeonLemos3
 

Similaire à Designing for Privacy in an Increasingly Public World (20)

Designing for Privacy in an Increasingly Public World — Speed Talk
Designing for Privacy in an Increasingly Public World — Speed TalkDesigning for Privacy in an Increasingly Public World — Speed Talk
Designing for Privacy in an Increasingly Public World — Speed Talk
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
 
Big Data's Big Paradox_Dr. Nita Rollins
Big Data's Big Paradox_Dr. Nita RollinsBig Data's Big Paradox_Dr. Nita Rollins
Big Data's Big Paradox_Dr. Nita Rollins
 
GDPR - Applift firstscreen june 2016
GDPR - Applift firstscreen june 2016GDPR - Applift firstscreen june 2016
GDPR - Applift firstscreen june 2016
 
Module 5 - Legislation - Online
Module 5 - Legislation - OnlineModule 5 - Legislation - Online
Module 5 - Legislation - Online
 
The Privacy Illusion
The Privacy IllusionThe Privacy Illusion
The Privacy Illusion
 
The Future Shape of Digital | Chartered Institute of Marketing
The Future Shape of Digital | Chartered Institute of MarketingThe Future Shape of Digital | Chartered Institute of Marketing
The Future Shape of Digital | Chartered Institute of Marketing
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
 
Role of CAs in cyber world
Role of CAs in cyber worldRole of CAs in cyber world
Role of CAs in cyber world
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Design
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by DesignSay Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Design
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Design
 
Vint big data research privacy technology and the law
Vint big data research privacy technology and the lawVint big data research privacy technology and the law
Vint big data research privacy technology and the law
 
Big data 3 4- vint-big-data-research-privacy-technology-and-the-law - big dat...
Big data 3 4- vint-big-data-research-privacy-technology-and-the-law - big dat...Big data 3 4- vint-big-data-research-privacy-technology-and-the-law - big dat...
Big data 3 4- vint-big-data-research-privacy-technology-and-the-law - big dat...
 
Sogeti big data research privacy technology and the law
Sogeti big data research privacy technology and the lawSogeti big data research privacy technology and the law
Sogeti big data research privacy technology and the law
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
 
Age Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAge Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data Use
 
A people-centred approach to Data and the Internet of Things
A people-centred approach to Data and the Internet of ThingsA people-centred approach to Data and the Internet of Things
A people-centred approach to Data and the Internet of Things
 
TrustUX: balancing personalisation and privacy to create understanding and tr...
TrustUX: balancing personalisation and privacy to create understanding and tr...TrustUX: balancing personalisation and privacy to create understanding and tr...
TrustUX: balancing personalisation and privacy to create understanding and tr...
 
Privacy & Data Protection - Leon Sylvester Lemos - Privacy. That's iPhone.
Privacy & Data Protection - Leon Sylvester Lemos - Privacy.  That's iPhone.Privacy & Data Protection - Leon Sylvester Lemos - Privacy.  That's iPhone.
Privacy & Data Protection - Leon Sylvester Lemos - Privacy. That's iPhone.
 
Social Media and the Law
Social Media and the LawSocial Media and the Law
Social Media and the Law
 

Plus de Robert Stribley

Best Practices for Simplifying User Experiences
Best Practices for Simplifying User ExperiencesBest Practices for Simplifying User Experiences
Best Practices for Simplifying User ExperiencesRobert Stribley
 
No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...
No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...
No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...Robert Stribley
 
Birds, Bats & Wind Turbines
Birds, Bats & Wind Turbines Birds, Bats & Wind Turbines
Birds, Bats & Wind Turbines Robert Stribley
 
Guidelines for Responsive UX Design 12/12/20
Guidelines for Responsive UX Design 12/12/20Guidelines for Responsive UX Design 12/12/20
Guidelines for Responsive UX Design 12/12/20Robert Stribley
 
Free Flow: The Economic Imperative for Restoring Immigration and Labor Movement
Free Flow: The Economic Imperative for Restoring Immigration and Labor MovementFree Flow: The Economic Imperative for Restoring Immigration and Labor Movement
Free Flow: The Economic Imperative for Restoring Immigration and Labor MovementRobert Stribley
 
No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...
No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...
No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...Robert Stribley
 
Introduction to User Experience Design 2/15/20
Introduction to User Experience Design 2/15/20Introduction to User Experience Design 2/15/20
Introduction to User Experience Design 2/15/20Robert Stribley
 
Introduction to User Experience Design 12/07/19
Introduction to User Experience Design 12/07/19Introduction to User Experience Design 12/07/19
Introduction to User Experience Design 12/07/19Robert Stribley
 
Guidelines for Responsive UX Design 11/16/19
Guidelines for Responsive UX Design 11/16/19Guidelines for Responsive UX Design 11/16/19
Guidelines for Responsive UX Design 11/16/19Robert Stribley
 
Introduction to User Experience Design 10/05/19
Introduction to User Experience Design 10/05/19Introduction to User Experience Design 10/05/19
Introduction to User Experience Design 10/05/19Robert Stribley
 
Guidelines for Responsive UX Design 07/20/19
Guidelines for Responsive UX Design 07/20/19Guidelines for Responsive UX Design 07/20/19
Guidelines for Responsive UX Design 07/20/19Robert Stribley
 
Introduction to User Experience Design 06/22/19
Introduction to User Experience Design 06/22/19Introduction to User Experience Design 06/22/19
Introduction to User Experience Design 06/22/19Robert Stribley
 
Introduction to User Experience Design 04/27/19
Introduction to User Experience Design 04/27/19Introduction to User Experience Design 04/27/19
Introduction to User Experience Design 04/27/19Robert Stribley
 
Guidelines for Responsive UX Design 03/23/2019
Guidelines for Responsive UX Design 03/23/2019Guidelines for Responsive UX Design 03/23/2019
Guidelines for Responsive UX Design 03/23/2019Robert Stribley
 
Introduction to User Experience Design 2/16/19
Introduction to User Experience Design 2/16/19Introduction to User Experience Design 2/16/19
Introduction to User Experience Design 2/16/19Robert Stribley
 
Introduction to User Experience Design 12/08/18
Introduction to User Experience Design 12/08/18Introduction to User Experience Design 12/08/18
Introduction to User Experience Design 12/08/18Robert Stribley
 
Guidelines for Responsive UX Design 11/15/2018
Guidelines for Responsive UX Design 11/15/2018Guidelines for Responsive UX Design 11/15/2018
Guidelines for Responsive UX Design 11/15/2018Robert Stribley
 
Introduction to User Experience Design 10/06/18
Introduction to User Experience Design 10/06/18Introduction to User Experience Design 10/06/18
Introduction to User Experience Design 10/06/18Robert Stribley
 
Guidelines for Responsive UX Design 07/07/2018
Guidelines for Responsive UX Design 07/07/2018Guidelines for Responsive UX Design 07/07/2018
Guidelines for Responsive UX Design 07/07/2018Robert Stribley
 

Plus de Robert Stribley (20)

Best Practices for Simplifying User Experiences
Best Practices for Simplifying User ExperiencesBest Practices for Simplifying User Experiences
Best Practices for Simplifying User Experiences
 
No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...
No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...
No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...
 
Birds, Bats & Wind Turbines
Birds, Bats & Wind Turbines Birds, Bats & Wind Turbines
Birds, Bats & Wind Turbines
 
Guidelines for Responsive UX Design 12/12/20
Guidelines for Responsive UX Design 12/12/20Guidelines for Responsive UX Design 12/12/20
Guidelines for Responsive UX Design 12/12/20
 
Free Flow: The Economic Imperative for Restoring Immigration and Labor Movement
Free Flow: The Economic Imperative for Restoring Immigration and Labor MovementFree Flow: The Economic Imperative for Restoring Immigration and Labor Movement
Free Flow: The Economic Imperative for Restoring Immigration and Labor Movement
 
No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...
No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...
No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...
 
Immigrant Song
Immigrant SongImmigrant Song
Immigrant Song
 
Introduction to User Experience Design 2/15/20
Introduction to User Experience Design 2/15/20Introduction to User Experience Design 2/15/20
Introduction to User Experience Design 2/15/20
 
Introduction to User Experience Design 12/07/19
Introduction to User Experience Design 12/07/19Introduction to User Experience Design 12/07/19
Introduction to User Experience Design 12/07/19
 
Guidelines for Responsive UX Design 11/16/19
Guidelines for Responsive UX Design 11/16/19Guidelines for Responsive UX Design 11/16/19
Guidelines for Responsive UX Design 11/16/19
 
Introduction to User Experience Design 10/05/19
Introduction to User Experience Design 10/05/19Introduction to User Experience Design 10/05/19
Introduction to User Experience Design 10/05/19
 
Guidelines for Responsive UX Design 07/20/19
Guidelines for Responsive UX Design 07/20/19Guidelines for Responsive UX Design 07/20/19
Guidelines for Responsive UX Design 07/20/19
 
Introduction to User Experience Design 06/22/19
Introduction to User Experience Design 06/22/19Introduction to User Experience Design 06/22/19
Introduction to User Experience Design 06/22/19
 
Introduction to User Experience Design 04/27/19
Introduction to User Experience Design 04/27/19Introduction to User Experience Design 04/27/19
Introduction to User Experience Design 04/27/19
 
Guidelines for Responsive UX Design 03/23/2019
Guidelines for Responsive UX Design 03/23/2019Guidelines for Responsive UX Design 03/23/2019
Guidelines for Responsive UX Design 03/23/2019
 
Introduction to User Experience Design 2/16/19
Introduction to User Experience Design 2/16/19Introduction to User Experience Design 2/16/19
Introduction to User Experience Design 2/16/19
 
Introduction to User Experience Design 12/08/18
Introduction to User Experience Design 12/08/18Introduction to User Experience Design 12/08/18
Introduction to User Experience Design 12/08/18
 
Guidelines for Responsive UX Design 11/15/2018
Guidelines for Responsive UX Design 11/15/2018Guidelines for Responsive UX Design 11/15/2018
Guidelines for Responsive UX Design 11/15/2018
 
Introduction to User Experience Design 10/06/18
Introduction to User Experience Design 10/06/18Introduction to User Experience Design 10/06/18
Introduction to User Experience Design 10/06/18
 
Guidelines for Responsive UX Design 07/07/2018
Guidelines for Responsive UX Design 07/07/2018Guidelines for Responsive UX Design 07/07/2018
Guidelines for Responsive UX Design 07/07/2018
 

Dernier

Verified Trusted Call Girls Adugodi💘 9352852248 Good Looking standard Profil...
Verified Trusted Call Girls Adugodi💘 9352852248  Good Looking standard Profil...Verified Trusted Call Girls Adugodi💘 9352852248  Good Looking standard Profil...
Verified Trusted Call Girls Adugodi💘 9352852248 Good Looking standard Profil...kumaririma588
 
VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...
VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...
VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...Call Girls in Nagpur High Profile
 
DragonBall PowerPoint Template for demo.pptx
DragonBall PowerPoint Template for demo.pptxDragonBall PowerPoint Template for demo.pptx
DragonBall PowerPoint Template for demo.pptxmirandajeremy200221
 
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 
CALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun serviceanilsa9823
 
Chapter 19_DDA_TOD Policy_First Draft 2012.pdf
Chapter 19_DDA_TOD Policy_First Draft 2012.pdfChapter 19_DDA_TOD Policy_First Draft 2012.pdf
Chapter 19_DDA_TOD Policy_First Draft 2012.pdfParomita Roy
 
Booking open Available Pune Call Girls Nanded City 6297143586 Call Hot India...
Booking open Available Pune Call Girls Nanded City  6297143586 Call Hot India...Booking open Available Pune Call Girls Nanded City  6297143586 Call Hot India...
Booking open Available Pune Call Girls Nanded City 6297143586 Call Hot India...Call Girls in Nagpur High Profile
 
Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)amitlee9823
 
VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130
VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130
VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130Suhani Kapoor
 
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...SUHANI PANDEY
 
The history of music videos a level presentation
The history of music videos a level presentationThe history of music videos a level presentation
The history of music videos a level presentationamedia6
 
Stark Industries Marketing Plan (1).pptx
Stark Industries Marketing Plan (1).pptxStark Industries Marketing Plan (1).pptx
Stark Industries Marketing Plan (1).pptxjeswinjees
 
Government polytechnic college-1.pptxabcd
Government polytechnic college-1.pptxabcdGovernment polytechnic college-1.pptxabcd
Government polytechnic college-1.pptxabcdshivubhavv
 
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...babafaisel
 
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...Pooja Nehwal
 
Case Study of Hotel Taj Vivanta, Pune
Case Study of Hotel Taj Vivanta, PuneCase Study of Hotel Taj Vivanta, Pune
Case Study of Hotel Taj Vivanta, PuneLukeKholes
 
Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...
Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...
Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...home
 
Best VIP Call Girls Noida Sector 44 Call Me: 8448380779
Best VIP Call Girls Noida Sector 44 Call Me: 8448380779Best VIP Call Girls Noida Sector 44 Call Me: 8448380779
Best VIP Call Girls Noida Sector 44 Call Me: 8448380779Delhi Call girls
 
Escorts Service Basapura ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Basapura ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Basapura ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Basapura ☎ 7737669865☎ Book Your One night Stand (Bangalore)amitlee9823
 
Top Rated Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...
Top Rated  Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...Top Rated  Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...
Top Rated Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...Call Girls in Nagpur High Profile
 

Dernier (20)

Verified Trusted Call Girls Adugodi💘 9352852248 Good Looking standard Profil...
Verified Trusted Call Girls Adugodi💘 9352852248  Good Looking standard Profil...Verified Trusted Call Girls Adugodi💘 9352852248  Good Looking standard Profil...
Verified Trusted Call Girls Adugodi💘 9352852248 Good Looking standard Profil...
 
VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...
VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...
VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...
 
DragonBall PowerPoint Template for demo.pptx
DragonBall PowerPoint Template for demo.pptxDragonBall PowerPoint Template for demo.pptx
DragonBall PowerPoint Template for demo.pptx
 
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
CALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun service
 
Chapter 19_DDA_TOD Policy_First Draft 2012.pdf
Chapter 19_DDA_TOD Policy_First Draft 2012.pdfChapter 19_DDA_TOD Policy_First Draft 2012.pdf
Chapter 19_DDA_TOD Policy_First Draft 2012.pdf
 
Booking open Available Pune Call Girls Nanded City 6297143586 Call Hot India...
Booking open Available Pune Call Girls Nanded City  6297143586 Call Hot India...Booking open Available Pune Call Girls Nanded City  6297143586 Call Hot India...
Booking open Available Pune Call Girls Nanded City 6297143586 Call Hot India...
 
Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)
 
VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130
VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130
VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130
 
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...
 
The history of music videos a level presentation
The history of music videos a level presentationThe history of music videos a level presentation
The history of music videos a level presentation
 
Stark Industries Marketing Plan (1).pptx
Stark Industries Marketing Plan (1).pptxStark Industries Marketing Plan (1).pptx
Stark Industries Marketing Plan (1).pptx
 
Government polytechnic college-1.pptxabcd
Government polytechnic college-1.pptxabcdGovernment polytechnic college-1.pptxabcd
Government polytechnic college-1.pptxabcd
 
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...
 
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...
 
Case Study of Hotel Taj Vivanta, Pune
Case Study of Hotel Taj Vivanta, PuneCase Study of Hotel Taj Vivanta, Pune
Case Study of Hotel Taj Vivanta, Pune
 
Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...
Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...
Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...
 
Best VIP Call Girls Noida Sector 44 Call Me: 8448380779
Best VIP Call Girls Noida Sector 44 Call Me: 8448380779Best VIP Call Girls Noida Sector 44 Call Me: 8448380779
Best VIP Call Girls Noida Sector 44 Call Me: 8448380779
 
Escorts Service Basapura ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Basapura ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Basapura ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Basapura ☎ 7737669865☎ Book Your One night Stand (Bangalore)
 
Top Rated Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...
Top Rated  Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...Top Rated  Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...
Top Rated Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...
 

Designing for Privacy in an Increasingly Public World

  • 1. Designing for Privacy in an Increasingly Public World Product Design Meetup | 21 July 2021 | Robert Stribley Street art by JR
  • 2. I’m Robert Stribley I’m a user experience designer and manager at Publicis Sapient and I teach user experience design at the School of Visual Arts in New York. Introduction
  • 3. • Corporations and non-profits consider the privacy of their users’ data, their content, even their browsing behavior for their clients’ benefit and safety • But they also do it for their own personal and financial self interest • It’s increasingly important that they consider the privacy and security issues affecting their customers and clients • So how do we design these digital experiences—apps, websites, etc — to ensure people’s privacy? Background
  • 4. Privacy and security are different concepts Privacy: Your ability to control your personal information and how it’s used Security: How your personal information is protected by those holding on to it These concepts often overlap, so we’ll refer to both Our focus: How we can ensure people’s privacy is maintained as we design experiences for them Purpose
  • 5. Why Privacy? Image by Jack Ferrentino for NPR
  • 6. “Arguing that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about free speech because you have nothing to say.” — Edward Snowden, former CIA employee, infamous NSA leaker Why Privacy?
  • 7. • If we’re not concerned with a particular privacy issue, remember, we’re not designing for ourselves • If we’re designing with empathy, we’ll consider the needs of people not like ourselves — people with different backgrounds and experiences • That means researching privacy issues, but also engaging with people with diverse backgrounds and lived experiences Why Privacy?
  • 8. Examples: DayOne, a non-profit, provides services for young people in abusive dating relationships. These clients may worry about their partners tracking their online activity or stalking them in real life. Similarly, LGBTQ youth need to feel their privacy is secure when reaching out for help online. In this sense, privacy issues are often diversity issues. Why Privacy?
  • 10. In April, Facebook, the largest social media platform on the planet was hacked. 533 million user’s phone numbers and personal data were leaked online. Data for half a billion people. Data Security
  • 11. Fraud & identity theft on the rise during the pandemic. FTC: 1.4 million reports of identity theft in 2020 — double from 2019. Leaks of personal data can be catastrophic to people’s lives. Fraud & Identity Theft Photo by Kyle Glenn
  • 12. Stores, such as Albertsons, Rite-Aid, Macy’s, ACE Hardware are using facial recognition programs to identify customers. Some also use apps to track customers around their stores to present them with ads online later. Facial Recognition
  • 13. Amazon required delivery drivers to sign consent forms, which allowed the company to collect their biometric data and to use AI cameras to monitor their location, movement, their driving patterns. At least one driver quit over this form of “AI surveillance.” Biometric Data
  • 14. • A donation site for Donald Trump deployed “dark patterns” to trick supporters into agreeing to recurring donations • Designers rolled out iterations of this feature with increasingly confusing language, fine print, bold text, all- caps, and a pre-selected check box • They referred to the feature as a “money bomb” • Donations grew astronomically — as did fraud complaints from angry supporters • One 78-year-old supporter summed up his thoughts: “Bandits!” Dark Patterns
  • 15. • Demand for personalized content, which benefits from personal data seems higher than ever • People say they want personalized ads, so you’d think they enjoy sharing their data • But a 2019 survey by network security company RSA found only 17% of respondents said it was ethical to track their online activity to personalize ads • Earlier, Pew Research found 91% of adults believe consumers have lost control over how their personal information is collected and used by companies Data Sharing
  • 16. Data Sharing Apple rolled out a new iPhone feature called “App Tracking Transparency,” an anti-tracking shield, which prevents apps from shadowing you across the internet. Now, they have to ask first. Only ~15% of iOS users worldwide allowing apps to track them so far – The Register, May 2021.
  • 18. GDPR stands for … The General Data Protection Regulation Law finalized in 2016, came into effect in 2018 Regulates how apps and sites can gather and transfer or process personal data when working within the European Union Also, what happens to that data when it’s transferred outside of the EU? Impact of Regulations Remember a while back when you suddenly got a gazillion emails from companies telling you they had updated their privacy policies? That was a result of the GDPR.
  • 19. Some things GDPR requires … • Ask people to opt in to sharing their data • Communicate to people in the moment, when you’re collecting their personal data • Be transparent about what you’re doing with it • Allow people to download their data and delete it — a “right to erasure” or “right to be forgotten” Impact of Regulations
  • 20. California passed their own version of the GDPR — the California Consumer Privacy Act. Gives Californians more control over how their personal data is used. Requirements very similar to those in the GDPR. CCPA differs in that it (currently) allows businesses to collect your information by default—though they do have to offer the ability to opt out. California Consumer Privacy Act 2018 Impact of Regulations
  • 21. In March, California announced they’re banning “dark patterns.” And a new “Privacy Options” icon for businesses to show you where to opt out of data collection. The icon was designed by Carnegie Mellon’s CyLab and the University of Michigan’s School of Information. Impact of Regulations
  • 22. New York, Maryland, Massachusetts and Hawaii are developing their own privacy laws, too. So, if you’re designing for GDPR and California privacy laws and more, you may as well design for all — design for the highest common good. Impact of Regulations
  • 24. Our Role “You were not hired to get approval or to have your work pinned to the company fridge.” “People hire you to be the expert, so you might as well be the expert.” —Mike Monteiro, designer, co-founder of Mule Design in Ruined by Design
  • 25. More specifically? We have a responsibility to act as the advocate for users — but even that’s too abstract. The term “user” tends to strip people of their individual circumstances, their personality, their history, even their lives. We have a responsibility to real human beings. We may need to push back where necessary in terms our clients understand. Our Role Photo by Vince Fleming
  • 26. We may have to explain to our clients the impacts of ignoring privacy and security concerns. What are these impacts, specifically? • Civic responsibility. As user-centered designers, we really should be encouraging our clients to treat their “end users” as human beings, who are members of their community • Reputation management: We may have to remind our clients that what companies do can undermine their brands • Using dark patterns may anger people and cause them to abandon your site in favor of another with a more transparent experience • Data breaches and sloppy treatment of data may lead to the loss of their user base — likely affecting their profits • Financial consideration: Keep in mind the increasing number of laws and regulations and the resulting fines for not following them Even if there’s an up-front cost to designing for privacy and security, the long-term costs can be devastating Our Role
  • 27. In 2019, 5 employees quit their jobs at GitHub after learning the company shared its data with ICE, the government agency, which has been accused repeatedly of human rights violations — especially related to the treatment of immigrants. It might be tough to speak up in such a situation, but we got into this business to help people — and what we do has a real-world impact. Our Role
  • 28. In the1940s a Frenchman, Rene Carmille was working on the French Census. He and his team have been dubbed the first “ethical hackers.” They decided to sabotage their own machines, so the punch cards couldn’t register people’s religion properly. The team was discovered, arrested by the Nazis and tortured. Carmille died at Dachau. But they prevented the Nazis from discovering the identities of tens of thousands Jewish people living in France, saving their lives in the process. They did so by changing an experience to maintain people’s privacy. Rene Carmille
  • 30. In Privacy by Design, Dr. Ann Cavoukian lays out 7 foundation principles for Fair Information Practices. She recommends making privacy the “default setting” in our designs and says privacy should be “embedded” into design. So, what are some practical ways to ensure we’re doing that? Best Practices Self Study: “Privacy by Design: The 7 Foundational Principles” by Dr. Ann Cavoukian Founder of Global Privacy & Security by Design and the former Information and Privacy Commissioner for the Canadian province of Ontario
  • 32. Dark Patterns UX designer Harry Brignull coined the term “dark pattern” in 2010 He defines dark pattern: a “user interface that has been carefully crafted to trick users into doing things” that you didn’t mean to do — like buying or signing up for something Another researcher described dark patterns as supplanting user value “in favor of shareholder value”
  • 33. Brignull identified about a dozen types of dark patterns. Bait and Switch – You set out to accomplish one thing but something else completely undesirable happens. Confirmshaming – You try to unsubscribe from something, for example, and the feature to opt out uses language to guilt you out of taking action. Friend spamming – A site asks to access your contacts, so you can find your friends, then it emails all your friends without your permission. Dark Patterns Example of confirmshaming
  • 34. Dark Patterns “Dark patterns are the canaries in the coal mine of unethical design. A company who’s willing to keep a customer hostage is willing to do worse.” — Mike Monteiro, Ruined by Design
  • 35. Dark patterns can expose users’ personal information When you make a payment on Venmo, it defaults to public, so you automatically share your payments with … everyone The opposite of designing with privacy as a default Somebody created Vicemo, which scraped payments listed with words associated with drugs, alcohol or sex and posted them online for all to see Dark Patterns
  • 36. Strava automatically tagged other runners when you passed them if they didn’t change their settings. This feature even had a name: Flyby. If you clicked on a face, it showed the user’s full name, picture and a map of their running route — effectively revealing where they lived. This happened without you following users and without them knowing they were sharing their activity. After receiving criticism, Strava did change the default setting to private. It should have always been private. “Stalkerware”– Apps which allow people to be tracked — intentionally or not Dark Patterns
  • 37. Be transparent about what personal data is used What Data Is Used? 2
  • 38. It’s important to be very specific — especially when sharing PII. Personally identifiable information — data points such as name, email, phone number, social security number, mother’s maiden name, which can be used to steal people’s identities and commit fraud 87% of the U.S. population can be uniquely identified by just their date of birth, gender, ZIP code? (Those items aren’t even considered PII.) Imagine how much damage a bad actor can do with just 3 data points of PII. What Data Is Used?
  • 39. Be transparent about why specific personal data is collected or shared Why Is Data Used? 3
  • 40. Consider this as an opportunity to explain the benefits of sharing their data: • Does it ensure a better experience in the future? • Does it personalize ads and offers for them? Be prepared to explain those benefits in detail. If you can’t, are you’re designing the right sort of product? Why Is Data Used?
  • 41. Why Is Data Used? Lemonade includes an itemized, detailed explanation of what personal information you’re sharing, and they also explain why. They also promise never to sell your information to third parties. “TL;DR: We will never, ever, sell your data to anyone.”
  • 42. Always use clear, approachable language Clear Language 4
  • 43. Clear Language The New York Times studied 150 privacy policies from various tech and media platforms. They described what they found as an “incomprehensible disaster.” They described AirBnB’s privacy policy as “particularly inscrutable.” “This information is necessary for the adequate performance of the contract between you and us and to allow us to comply with our legal obligations.” Vague language and jargon allow for a wide range of interpretation, making it easy companies to defend their practices in a lawsuit while making it harder for us to understand what’s really going on with their data.
  • 44. Twitter advises you to read their privacy policy in full but highlights key aspects of it up front — in a dedicated section — advising you to pay attention to those particular things Clear Language
  • 45. Guidelines: • Avoid legalese and jargon: Even your terms and conditions content doesn’t have to sound like legal content • Consider different ages groups and levels of savviness • Most adult Americans read at about a basic or intermediate literacy level • 50% can’t read a book written at an 8th grade level • The Content Marketing Institute recommends writing for about a 14- or 15-year-old (about 8th grade) • Carefully crafted personas can help determine if an experience’s reading level should vary from that range Clear Language Photo by John-Mark Smith
  • 46. Give users options to control their own data User Controls 5
  • 47. User Controls Google offers a Privacy Checkup with high level descriptions of how your personal data is being used and why. This links to specific Privacy Controls, which allow you to adjust how that data is accessed. They allow you to turn off activity tracking, location history, your YouTube history, your Google photo settings, check which 3rd parties have access to your account information, and access other key settings all in one privacy dashboard.
  • 48. This seems like a good moment to recall Dr. Cavoukian’s maxim: Keep these settings private by default User Controls
  • 49. Ensure these privacy features and information are placed contextually and easy to find Easy to Find 6
  • 50. Easy to Find Such important information shouldn’t be placed in 8-point font … buried in the Terms & Conditions … hidden in the footer … or several levels of navigation down deep in your app — and yet, that’s often where we find it A feature like California’s new “Privacy Options” icon could prove effective to draw attention to these privacy options.
  • 51. Easy to Find Contextual and easy to find also means … Onboarding — Explaining in detail how you use people’s data when they’re using your app for the very first time. “Just in time” alerts – Alerting users in the moment—when they’re about to share data in a new way—even if they have a history of using your experience.
  • 52. Easy to Find Mozilla displays robust Privacy information by default in a dedicated tab when you download and open their Firefox browser for the first time.
  • 53. Remind users regularly about their privacy options And actively encourage them to take advantage of them Reminders 7
  • 54. Reminders Facebook allows you to set reminders to do a privacy checkup every week, month, 6 months or year Google also has a feature, which will send you a reminder to check your privacy settings.
  • 55. Never change users’ privacy settings without telling them in advance. They should also have the option to opt out of such changes. Never Change Without Notice 8
  • 56. A few years ago, Facebook made users’ “likes” visible overnight, which consequently may have outed some people in the LGTBQ community or revealed people’s personal, political or religious beliefs. When I asked an employee how they justified this change, they responded that the company valued transparency and wanted people to be transparent about their interests. The company’s founder, Mark Zuckerberg, had even famously said privacy was no longer a “social norm.” Never Change Without Notice
  • 57. We don’t have the right to make decisions about other people’s personal data and interests on their behalf. Assuming everyone’s information can safely be made public is a belief that comes from a position of privilege. We should never make decisions like this, which can profoundly affect people’s privacy without their explicit consent. Never Change Without Notice
  • 59. We talk a lot about “empathy” in design. If we design with empathy, we won’t design experiences we wouldn’t want to use ourselves. And we won’t design using “dark patterns” either. Conclusion Photo by Josh Calabrese
  • 60. Privacy is not about secrecy. It’s all about control. — Dr.Ann Cavoukian If we want to ensure people have control over their own personal information If we want to ensure experiences we design are user friendly and truly “user-centered” We’ll keep these best practices in mind Conclusion Photo by Zanardi, Unsplash
  • 63. Further Study • California Consumer Privacy Act • GDPR.eu • “Privacy by Design: The 7 Foundational Principles” - Dr. Ann Cavoukian • The Privacy Project – New York Times • “We Read 150 Privacy Policies. They Were an Incomprehensible Disaster”– Kevin Litman-Navarro, New York Times • “Privacy UX - Common Concerns and Privacy in Web Forms” – Vitaly Friedman, Smashing Magazine • “What GDPR Means for UX” – Claire Barrett • www.darkpatterns.org – Harry Brignull • “How Dark Patterns Trick You Online” – YouTube • Ruined by Design – Mike Monteiro