SlideShare uma empresa Scribd logo
1 de 27
COOKIES


The Practitioner‟s Perspective



Presentation by Daragh O Brien, Regulatory Advisor IDMA and MD Castlebridge Associates.
• This slide deck was prepared for
an Interactive Direct Marketing
Association presentation to the
International Bar Association
Conference 2012
Confusion
What is a Cookie?
                “…is usually a small piece of data sent
                   from a website and stored in a
                  user's web browser while a user is
                  browsing a website” (Wikipedia)


                …”cookies are small, often encrypted
               text files, located in browser directories”
                           (allaboutcookies.org)


               “A cookie is information that a Web site
                 puts on your hard disk so that it can
                remember something about you at a
                              later time.”
              (http://searchsoftwarequality.techtarget.com/
                             definition/cookie)
What SI336 says…
• (3) A person shall not use an electronic communications network to store information, or to
  gain access to information already stored in the terminal equipment of a subscriber or user,
  unless
   (a) the subscriber or user has given his or her consent to that use, and
   (b) the subscriber or user has been provided with clear and comprehensive information in accordance
   with the Data Protection Acts which—
      • (i) is both prominently displayed and easily accessible, and
      • (ii) includes, without limitation, the purposes of the processing of the information.

• (4) For the purpose of paragraph (3), the methods of providing information and giving
  consent should be as user-friendly as possible. Where it is technically possible and effective,
  having regard to the relevant provisions of the Data Protection Acts, the user‟s consent to
  the storing of information or to gaining access to information already stored may be given by
  the use of appropriate browser settings or other technological application by means of which
  the user can be considered to have given his or her consent.
• (5) Paragraph (3) does not prevent any technical storage of, or access to, information for the
  sole purpose of carrying out the transmission of a communication over an electronic
  communications network or which is strictly necessary in order to provide an information
  society service explicitly requested by the subscriber or user.
Which Means?

             The Legislation
           covers a LOT more
              than just text
              Cookies and
                Browsers
•   Flash Local Objects

  •   Apps storing data
  •   SQLite databases



                                       •   HTML 5
                                            Local
                                           Storage



• Traditional
 browser cookies
   (plus SQLite,
   Flash, HTML5




        • Traditional
                                           •   Data
         browser cookies
                                             logging
           (plus SQLite,
                                           • Usage
           Flash, HTML5
                                               data
Exceptions?



                   Strictly Necessary?
              Information Society Service?

                 Explicitly Requested?
“So far, for 50 years, the
 information revolution has
   centered on data—their
     collection, storage,
transmission, analysis, and
     presentation. It has
  centered on the "T" in IT.

   The next information
revolution asks, what is the
 MEANING of information,
and what is its PURPOSE?”
Directive does not specify how consent
Questions of Consent & Guidance
                       should be obtained.

            ICO in the UK allowed “implied consent” at
                          the last minute.

            A29 Working Group Opinion (subsequently)
                 focused on “informed consent”.

               Guidance (to date) has focused on
            traditional web browser and flash cookies.
DPC Guidance
• Non-third party cookies:
   • Prominent Notice giving information on Cookies with ability to
      click through and make an informed choice re: consent


• Cookies in General:
 • Consent should be user friendly as possible
 • Require clear communication about what the user is being asked to
   consent to
 • A means of giving or refusing consent to data being stored or
   retrieved
Varying Degrees of Compliance
       utilities
   telecomms
        media
         legal
    insurance
industry group
  government
     financial
    consulting
       charity

                   0%      20%          40%            60%         80%          100%
    Mentioned in Privacy Statement   No Notice Given   Cookies Policy   Cookie Notice
An example of Compliance Confusion




   UK Website for a major multinational professional services
                            firm.
An example of Compliance Confusion




      Irish Website of same Professional Services firm.
Announcement on 5th September by leading UK web design firm that developed a leading Cookie Compliance
                                              solution
Don’t endorse this approach

                                          But can understand




Screen grab of Silktide.com’s “No Cookie Law” website
              (www.nocookielaw.com)
Motivation
• Unaware of what needs to be
  done?
• Aware but not willing to make
  changes until their peers are
  making changes?
Yes, I know we are not compliant but none of
our competitors are either. Given the limits on
our budgets we can‟t even begin to put those
changes on the table for discussion until our
competitors are also being forced to make the
change.
We don‟t see a “first mover advantage” here if
there is no enforcement and if the penalty is
less than the cost of development.




 It doesn’t help that Government and EU
   departments have failed to bring their
      websites and mobile apps into
               compliance.
A change of mind set and culture is
                             required
Compliance =
  GOOD!!       Cookies need to be seen as data assets
               that your organisation wants to store in
                      someone else’s property

               The focus needs to shift to PRIVACY not
               the Technology. Meaning and intent of
                    the stored data is imperative

                  Professional bodies like IDMA can
                      promote good practice.

                       Regulators must enforce

               Legal Counsel must look to the Meaning
                      and Purpose of Cookies
Is Self Regulation an Option?

                                                  • Comments here are not
                                                   necessarily the views of the
                                                   IDMA and are the
                                                   speaker‟s personal
                                                   opinions.




                  © Adam Zyglis
2008, http://www.adamzyglis.com/cartoon787.html
Self-Regulation  Light Touch  Rigid Rules




Self Policing /                                    Sensible
Peer Policing                                   Enforcement
                                                      &
                                                Enforceability
Self-Regulation  Light Touch  Rigid Rules




               Need to learn from mistakes and
               successes of other Regulatory
               regimes and laws.
Evidence based policy
                      objectives and
                      governance requirements
                      are key

“The Information Commissioner Christopher
Graham has questioned the effectiveness of the
EU cookie directive, suggesting that it was
„dreamed up by politicians in Brussels‟ without the
appropriate market research to back it up.”
                     - quoted in TechWorld.com, 15/09/2012
"More and more citizens and
consumers are waking up to the
implications of sharing personal
 data online," he said. "By fresh
 thinking that recognises where
     the consumer is coming
 from, we can develop policies
        that really work.“
 (speaking at launch of “Data Dialogue” Report, Sept 2012)
Solutions ?
Good Information Management culture

1.   Recognise cookies as a data asset
     •   Bring in advisors who understand Data Governance principles if necessary
     •   Think “Privacy” first, then “Technology”
2.   Think in terms of the process that is using the Data Asset
     •   Is the use of the asset essential to the objective/purpose of the process?
     •   Does the process require data to be shared with 3rd parties?
     •   How „invasive‟ is the process?
     •   Is the process adding value or creating risk?
3.   Document
4.   Promote transparency
     •   A GOOD Privacy Statement that can be read by HUMANS!!!
5.   Keep under regular review
6.   Consider spirit and intent of Directive, not just the literal interpretation.
7.   Implement appropriate (often low cost) solutions to design compliance and
     privacy controls into your processes.
8.   Think about PRIVACY then about TECHNOLOGY

Mais conteúdo relacionado

Mais procurados

Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenienceDon Lovett
 
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...gallowayandcollens
 
Cloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association PresentationCloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association PresentationNicole Black
 
Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter GridEnlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Gridbradley_g
 
GDPR, User Data, Privacy, and Your Apps
GDPR, User Data, Privacy, and Your AppsGDPR, User Data, Privacy, and Your Apps
GDPR, User Data, Privacy, and Your AppsCarl Brown
 
Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"Cathy Dwyer
 
Gayna Hart Presentation - Personalised Healthcare Revolution
Gayna Hart Presentation - Personalised Healthcare RevolutionGayna Hart Presentation - Personalised Healthcare Revolution
Gayna Hart Presentation - Personalised Healthcare RevolutionBath & Bristol Enterprise Network
 
Blockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceBlockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceEryk Budi Pratama
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsIrish Future Internet Forum
 
Privacy by design
Privacy by designPrivacy by design
Privacy by designblogzilla
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYODK Singh
 
Internet of things enabling tech - challenges - opportunities (2016)
Internet of things   enabling tech - challenges - opportunities (2016)Internet of things   enabling tech - challenges - opportunities (2016)
Internet of things enabling tech - challenges - opportunities (2016)Davor Dokonal
 
Security And Legal In The Cloud Ats V2
Security And Legal In The Cloud Ats V2Security And Legal In The Cloud Ats V2
Security And Legal In The Cloud Ats V2dbarton944
 
Big data and information privacy 20190117
Big data and information privacy 20190117Big data and information privacy 20190117
Big data and information privacy 20190117Maria Correia
 
Make it Last: Principals for Digital Preservation and Conservation
Make it Last: Principals for Digital Preservation and ConservationMake it Last: Principals for Digital Preservation and Conservation
Make it Last: Principals for Digital Preservation and ConservationTrevor Owens
 
Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Peter Procházka
 
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...gallowayandcollens
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by DesignUnisys Corporation
 
Closer All The Time: Moving Toward Fiduciary Access to Digital Assets
Closer All The Time: Moving Toward Fiduciary Access to Digital AssetsCloser All The Time: Moving Toward Fiduciary Access to Digital Assets
Closer All The Time: Moving Toward Fiduciary Access to Digital Assetsgallowayandcollens
 
Reinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeReinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeUniversity of Geneva
 

Mais procurados (20)

Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
 
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
 
Cloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association PresentationCloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association Presentation
 
Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter GridEnlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Grid
 
GDPR, User Data, Privacy, and Your Apps
GDPR, User Data, Privacy, and Your AppsGDPR, User Data, Privacy, and Your Apps
GDPR, User Data, Privacy, and Your Apps
 
Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"
 
Gayna Hart Presentation - Personalised Healthcare Revolution
Gayna Hart Presentation - Personalised Healthcare RevolutionGayna Hart Presentation - Personalised Healthcare Revolution
Gayna Hart Presentation - Personalised Healthcare Revolution
 
Blockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceBlockchain for Accounting & Assurance
Blockchain for Accounting & Assurance
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
 
Privacy by design
Privacy by designPrivacy by design
Privacy by design
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
Internet of things enabling tech - challenges - opportunities (2016)
Internet of things   enabling tech - challenges - opportunities (2016)Internet of things   enabling tech - challenges - opportunities (2016)
Internet of things enabling tech - challenges - opportunities (2016)
 
Security And Legal In The Cloud Ats V2
Security And Legal In The Cloud Ats V2Security And Legal In The Cloud Ats V2
Security And Legal In The Cloud Ats V2
 
Big data and information privacy 20190117
Big data and information privacy 20190117Big data and information privacy 20190117
Big data and information privacy 20190117
 
Make it Last: Principals for Digital Preservation and Conservation
Make it Last: Principals for Digital Preservation and ConservationMake it Last: Principals for Digital Preservation and Conservation
Make it Last: Principals for Digital Preservation and Conservation
 
Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...
 
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by Design
 
Closer All The Time: Moving Toward Fiduciary Access to Digital Assets
Closer All The Time: Moving Toward Fiduciary Access to Digital AssetsCloser All The Time: Moving Toward Fiduciary Access to Digital Assets
Closer All The Time: Moving Toward Fiduciary Access to Digital Assets
 
Reinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeReinstating Trust in the Digital Age
Reinstating Trust in the Digital Age
 

Destaque

UCD Smurfit presentation: Cookies & Online Privacy
UCD Smurfit presentation: Cookies & Online PrivacyUCD Smurfit presentation: Cookies & Online Privacy
UCD Smurfit presentation: Cookies & Online PrivacyLara Zaccaria
 
Data Protection in Big Data world (EDW lighting talk)
Data Protection in Big Data world (EDW lighting talk)Data Protection in Big Data world (EDW lighting talk)
Data Protection in Big Data world (EDW lighting talk)Castlebridge Associates
 
E commerce, social and campaign tracking - web analytics fundamentals
E commerce, social and campaign tracking - web analytics fundamentalsE commerce, social and campaign tracking - web analytics fundamentals
E commerce, social and campaign tracking - web analytics fundamentalsSrikanth Dhondi
 
Basic site survey & design training
Basic site survey & design trainingBasic site survey & design training
Basic site survey & design trainingtulus_pl
 

Destaque (8)

UCD Smurfit presentation: Cookies & Online Privacy
UCD Smurfit presentation: Cookies & Online PrivacyUCD Smurfit presentation: Cookies & Online Privacy
UCD Smurfit presentation: Cookies & Online Privacy
 
EDW Lightning Talk 2014
EDW Lightning Talk 2014EDW Lightning Talk 2014
EDW Lightning Talk 2014
 
Data Protection in Big Data world (EDW lighting talk)
Data Protection in Big Data world (EDW lighting talk)Data Protection in Big Data world (EDW lighting talk)
Data Protection in Big Data world (EDW lighting talk)
 
Daragh O Brien 2014 IAIDQ presidency
Daragh O Brien 2014 IAIDQ presidencyDaragh O Brien 2014 IAIDQ presidency
Daragh O Brien 2014 IAIDQ presidency
 
E commerce, social and campaign tracking - web analytics fundamentals
E commerce, social and campaign tracking - web analytics fundamentalsE commerce, social and campaign tracking - web analytics fundamentals
E commerce, social and campaign tracking - web analytics fundamentals
 
Basic site survey & design training
Basic site survey & design trainingBasic site survey & design training
Basic site survey & design training
 
Heuristic evaluation
Heuristic evaluationHeuristic evaluation
Heuristic evaluation
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Semelhante a Cookies and Data Protection - a Practitioner's perspective

eBusiness Club "Demystifying the EU Cookie Law presentation, Geldards
eBusiness Club  "Demystifying the EU Cookie Law presentation, GeldardseBusiness Club  "Demystifying the EU Cookie Law presentation, Geldards
eBusiness Club "Demystifying the EU Cookie Law presentation, GeldardsJon Egley
 
Why We Require GDPR?
Why We Require GDPR?Why We Require GDPR?
Why We Require GDPR?Jatin Kochhar
 
Global Data Privacy Regulation
Global Data Privacy RegulationGlobal Data Privacy Regulation
Global Data Privacy RegulationJatin Kochhar
 
Privacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User DataPrivacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User DataPrivacyCenter.cloud
 
Cookies: best practice September 2012 by Fedelma Good, Barclays
Cookies: best practice September 2012 by Fedelma Good, BarclaysCookies: best practice September 2012 by Fedelma Good, Barclays
Cookies: best practice September 2012 by Fedelma Good, Barclaystheidm_quals
 
EU cookie law - What you need to know
EU cookie law - What you need to knowEU cookie law - What you need to know
EU cookie law - What you need to knowCrafted
 
Cookie Law (Dwf 190511)
Cookie Law (Dwf 190511)Cookie Law (Dwf 190511)
Cookie Law (Dwf 190511)RobertMachin
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy ProgramDaniel Ayala
 
CIS14: NSTIC - Why the Identity Ecosystem Steering Group (IDESG)?
CIS14: NSTIC - Why the Identity Ecosystem Steering Group (IDESG)?CIS14: NSTIC - Why the Identity Ecosystem Steering Group (IDESG)?
CIS14: NSTIC - Why the Identity Ecosystem Steering Group (IDESG)?CloudIDSummit
 
Trends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the RisksTrends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the RisksNicole Garton
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSonny Hashmi
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb esSonny Hashmi
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueDeloitte United States
 
Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Catapult
 
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...MicheleNati
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-securityskumartarget
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things NetIQ
 

Semelhante a Cookies and Data Protection - a Practitioner's perspective (20)

eBusiness Club "Demystifying the EU Cookie Law presentation, Geldards
eBusiness Club  "Demystifying the EU Cookie Law presentation, GeldardseBusiness Club  "Demystifying the EU Cookie Law presentation, Geldards
eBusiness Club "Demystifying the EU Cookie Law presentation, Geldards
 
The DMA conference 2012
The DMA conference 2012The DMA conference 2012
The DMA conference 2012
 
Why We Require GDPR?
Why We Require GDPR?Why We Require GDPR?
Why We Require GDPR?
 
DMA Cookies update
DMA Cookies updateDMA Cookies update
DMA Cookies update
 
Global Data Privacy Regulation
Global Data Privacy RegulationGlobal Data Privacy Regulation
Global Data Privacy Regulation
 
Privacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User DataPrivacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User Data
 
Cookies: best practice September 2012 by Fedelma Good, Barclays
Cookies: best practice September 2012 by Fedelma Good, BarclaysCookies: best practice September 2012 by Fedelma Good, Barclays
Cookies: best practice September 2012 by Fedelma Good, Barclays
 
EU cookie law - What you need to know
EU cookie law - What you need to knowEU cookie law - What you need to know
EU cookie law - What you need to know
 
Cookie Law (Dwf 190511)
Cookie Law (Dwf 190511)Cookie Law (Dwf 190511)
Cookie Law (Dwf 190511)
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Program
 
CIS14: NSTIC - Why the Identity Ecosystem Steering Group (IDESG)?
CIS14: NSTIC - Why the Identity Ecosystem Steering Group (IDESG)?CIS14: NSTIC - Why the Identity Ecosystem Steering Group (IDESG)?
CIS14: NSTIC - Why the Identity Ecosystem Steering Group (IDESG)?
 
Trends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the RisksTrends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the Risks
 
(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for value
 
Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Transformation Business Evolution
Digital Transformation Business Evolution
 
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-security
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 

Mais de Castlebridge Associates

From Asset to Impact - Presentation to ICS Data Protection Conference 2011
From Asset to Impact - Presentation to ICS Data Protection Conference 2011From Asset to Impact - Presentation to ICS Data Protection Conference 2011
From Asset to Impact - Presentation to ICS Data Protection Conference 2011Castlebridge Associates
 
Enterprise Computing - A Vision of Future Today (Presentation to DCU students)
Enterprise Computing - A Vision of Future Today (Presentation to DCU students)Enterprise Computing - A Vision of Future Today (Presentation to DCU students)
Enterprise Computing - A Vision of Future Today (Presentation to DCU students)Castlebridge Associates
 
Building Information Quality from the Inside Out
Building Information Quality from the Inside OutBuilding Information Quality from the Inside Out
Building Information Quality from the Inside OutCastlebridge Associates
 
From Near to Maturity - Presentation to European Data Forum
From Near to Maturity - Presentation to European Data ForumFrom Near to Maturity - Presentation to European Data Forum
From Near to Maturity - Presentation to European Data ForumCastlebridge Associates
 
Bring Your Own Device - a Misnamed Concept?
Bring Your Own Device - a Misnamed Concept?Bring Your Own Device - a Misnamed Concept?
Bring Your Own Device - a Misnamed Concept?Castlebridge Associates
 

Mais de Castlebridge Associates (6)

From Asset to Impact - Presentation to ICS Data Protection Conference 2011
From Asset to Impact - Presentation to ICS Data Protection Conference 2011From Asset to Impact - Presentation to ICS Data Protection Conference 2011
From Asset to Impact - Presentation to ICS Data Protection Conference 2011
 
Enterprise Computing - A Vision of Future Today (Presentation to DCU students)
Enterprise Computing - A Vision of Future Today (Presentation to DCU students)Enterprise Computing - A Vision of Future Today (Presentation to DCU students)
Enterprise Computing - A Vision of Future Today (Presentation to DCU students)
 
Building Information Quality from the Inside Out
Building Information Quality from the Inside OutBuilding Information Quality from the Inside Out
Building Information Quality from the Inside Out
 
From Near to Maturity - Presentation to European Data Forum
From Near to Maturity - Presentation to European Data ForumFrom Near to Maturity - Presentation to European Data Forum
From Near to Maturity - Presentation to European Data Forum
 
Bring Your Own Device - a Misnamed Concept?
Bring Your Own Device - a Misnamed Concept?Bring Your Own Device - a Misnamed Concept?
Bring Your Own Device - a Misnamed Concept?
 
Introduction to Information Quality
Introduction to Information QualityIntroduction to Information Quality
Introduction to Information Quality
 

Último

On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 

Último (20)

On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 

Cookies and Data Protection - a Practitioner's perspective

  • 1. COOKIES The Practitioner‟s Perspective Presentation by Daragh O Brien, Regulatory Advisor IDMA and MD Castlebridge Associates.
  • 2. • This slide deck was prepared for an Interactive Direct Marketing Association presentation to the International Bar Association Conference 2012
  • 4. What is a Cookie? “…is usually a small piece of data sent from a website and stored in a user's web browser while a user is browsing a website” (Wikipedia) …”cookies are small, often encrypted text files, located in browser directories” (allaboutcookies.org) “A cookie is information that a Web site puts on your hard disk so that it can remember something about you at a later time.” (http://searchsoftwarequality.techtarget.com/ definition/cookie)
  • 5. What SI336 says… • (3) A person shall not use an electronic communications network to store information, or to gain access to information already stored in the terminal equipment of a subscriber or user, unless (a) the subscriber or user has given his or her consent to that use, and (b) the subscriber or user has been provided with clear and comprehensive information in accordance with the Data Protection Acts which— • (i) is both prominently displayed and easily accessible, and • (ii) includes, without limitation, the purposes of the processing of the information. • (4) For the purpose of paragraph (3), the methods of providing information and giving consent should be as user-friendly as possible. Where it is technically possible and effective, having regard to the relevant provisions of the Data Protection Acts, the user‟s consent to the storing of information or to gaining access to information already stored may be given by the use of appropriate browser settings or other technological application by means of which the user can be considered to have given his or her consent. • (5) Paragraph (3) does not prevent any technical storage of, or access to, information for the sole purpose of carrying out the transmission of a communication over an electronic communications network or which is strictly necessary in order to provide an information society service explicitly requested by the subscriber or user.
  • 6. Which Means? The Legislation covers a LOT more than just text Cookies and Browsers
  • 7. Flash Local Objects • Apps storing data • SQLite databases • HTML 5 Local Storage • Traditional browser cookies (plus SQLite, Flash, HTML5 • Traditional • Data browser cookies logging (plus SQLite, • Usage Flash, HTML5 data
  • 8. Exceptions? Strictly Necessary? Information Society Service? Explicitly Requested?
  • 9. “So far, for 50 years, the information revolution has centered on data—their collection, storage, transmission, analysis, and presentation. It has centered on the "T" in IT. The next information revolution asks, what is the MEANING of information, and what is its PURPOSE?”
  • 10. Directive does not specify how consent Questions of Consent & Guidance should be obtained. ICO in the UK allowed “implied consent” at the last minute. A29 Working Group Opinion (subsequently) focused on “informed consent”. Guidance (to date) has focused on traditional web browser and flash cookies.
  • 11. DPC Guidance • Non-third party cookies: • Prominent Notice giving information on Cookies with ability to click through and make an informed choice re: consent • Cookies in General: • Consent should be user friendly as possible • Require clear communication about what the user is being asked to consent to • A means of giving or refusing consent to data being stored or retrieved
  • 12. Varying Degrees of Compliance utilities telecomms media legal insurance industry group government financial consulting charity 0% 20% 40% 60% 80% 100% Mentioned in Privacy Statement No Notice Given Cookies Policy Cookie Notice
  • 13. An example of Compliance Confusion UK Website for a major multinational professional services firm.
  • 14. An example of Compliance Confusion Irish Website of same Professional Services firm.
  • 15. Announcement on 5th September by leading UK web design firm that developed a leading Cookie Compliance solution
  • 16. Don’t endorse this approach But can understand Screen grab of Silktide.com’s “No Cookie Law” website (www.nocookielaw.com)
  • 18. • Unaware of what needs to be done? • Aware but not willing to make changes until their peers are making changes?
  • 19. Yes, I know we are not compliant but none of our competitors are either. Given the limits on our budgets we can‟t even begin to put those changes on the table for discussion until our competitors are also being forced to make the change. We don‟t see a “first mover advantage” here if there is no enforcement and if the penalty is less than the cost of development. It doesn’t help that Government and EU departments have failed to bring their websites and mobile apps into compliance.
  • 20. A change of mind set and culture is required Compliance = GOOD!! Cookies need to be seen as data assets that your organisation wants to store in someone else’s property The focus needs to shift to PRIVACY not the Technology. Meaning and intent of the stored data is imperative Professional bodies like IDMA can promote good practice. Regulators must enforce Legal Counsel must look to the Meaning and Purpose of Cookies
  • 21. Is Self Regulation an Option? • Comments here are not necessarily the views of the IDMA and are the speaker‟s personal opinions. © Adam Zyglis 2008, http://www.adamzyglis.com/cartoon787.html
  • 22. Self-Regulation  Light Touch  Rigid Rules Self Policing / Sensible Peer Policing Enforcement & Enforceability
  • 23. Self-Regulation  Light Touch  Rigid Rules Need to learn from mistakes and successes of other Regulatory regimes and laws.
  • 24. Evidence based policy objectives and governance requirements are key “The Information Commissioner Christopher Graham has questioned the effectiveness of the EU cookie directive, suggesting that it was „dreamed up by politicians in Brussels‟ without the appropriate market research to back it up.” - quoted in TechWorld.com, 15/09/2012
  • 25. "More and more citizens and consumers are waking up to the implications of sharing personal data online," he said. "By fresh thinking that recognises where the consumer is coming from, we can develop policies that really work.“ (speaking at launch of “Data Dialogue” Report, Sept 2012)
  • 27. Good Information Management culture 1. Recognise cookies as a data asset • Bring in advisors who understand Data Governance principles if necessary • Think “Privacy” first, then “Technology” 2. Think in terms of the process that is using the Data Asset • Is the use of the asset essential to the objective/purpose of the process? • Does the process require data to be shared with 3rd parties? • How „invasive‟ is the process? • Is the process adding value or creating risk? 3. Document 4. Promote transparency • A GOOD Privacy Statement that can be read by HUMANS!!! 5. Keep under regular review 6. Consider spirit and intent of Directive, not just the literal interpretation. 7. Implement appropriate (often low cost) solutions to design compliance and privacy controls into your processes. 8. Think about PRIVACY then about TECHNOLOGY