SlideShare uma empresa Scribd logo
1 de 22
Location services and privacy
Using geolocation in a trustworthy and compliant way
Simon.Hania@tomtom.com
2
Trends that threaten trust
3
Connected cars with downloadable apps
Location services, cloud, internet-of-thing, big data
4
4. TomTom HD Traffic
3. IQ Routes
2. Map Share
1. Base maps
Revolutionising navigation
In 4 steps
4. TomTom HD Traffic
3. IQ Routes
2. Map Share
1. Base maps
4. TomTom HD Traffic
3. IQ Routes
2. Map Share
1. Base maps
4. TomTom HD Traffic
3. IQ Routes
2. Map Share
1. Base maps
5
TomTom Traffic coverage
It covers up to 99.9% of all roads
6
Creating TomTom HD Traffic: data sources
Range of high-quality real-time data sources
TomToms trip archive
Anonymous location and speed information from the
TomTom user community
5 billion (10E9) speed measurements per day
5 trillion (10E12) speed measurements to date!
by customers driving 50 billion kilometres
and visiting every spot over 1,000 times
8
Travel times to hospital
Based on real world
measurements
LONDON
Based on theoretical
maximum speeds
The reality check that can help to save lives
Origin/Destination analysis
9
Example: Trips with Frankfurt Airport as destination
• Where are your
customers coming
from?
• What routes do they
take?
• How may drivers are
passing?
• Etc.
• Combine with other
geo-based data
sources for additional
analysis
Drivers, police & TomTom
10
An explosive mixture
Location privacy is top of mind
With bloggers, press, regulators, enforcers, legislators
and many users alike
11
• TomTom investigated by
leading European Data
Protection Authority in 2011
• TomTom’s use of location
data is in accordance with
EU Data Protection Laws
• Processing and delivery to
third parties 100% OK
• Informing users needed to
be more explicit, including
opt-in
Community input – with permission
12
We profile roads, not people
13
How to enact?
Nothing totally new, really
1. Principles - is what everyone should know
2. People - make the difference: good and bad
3. Policies - are like high level requirements
4. Projects - is where everything is put together
5. Processes - is what we use to stay predictable
6. Procedures - exist to avoid re-inventing wheels
7. Paperwork - document everything properly
also used
internally
TomTom & Privacy
14
Vision:
Community input (crowd
sourcing) is strategic
Privacy helps to realize business
objectives by ensuring trust
Privacy is integral part of
business continuity above and
beyond legal compliance
Principles:
1. Avoid unpleasant surprises:
• Customer insight is
paramount
• Be open and explain –
hesitation is an omen
• Keep it simple
2. The customer remains in
control of his personal data:
we have it “on a loan”
also used
internally
15
Privacy Policies, Standards & Guidelines
7 key objectives
1. We asses our intended use of PD early to drive requirements
2. We document PD: purpose, legitimate
ground, retention, access, jurisdiction(s)
3. We ensure we have obtained or will obtain informed user consent
4. We minimize the amount of PD (volume and time) and who has
access: we de-personalize or destroy PD as soon as possible
5. We keep ensuring adequate security measures based on risk
assessment of confidentiality, integrity and availability
6. We do not expose PD to any third party, unless the third party
contractually agrees to comply to our policies (or law forces us)
7. We enable the user to exercise his rights (information,
access/download, correction, deletion) also used
internally
16
The 6 privacy questions
1. What personal data are we processing?
2. Why are we processing personal data?
3. When can we destroy the personal data?
4. Who will have access and will be accountable?
5. Where will we process and store the personal data?
6. Will we have a legitimate basis for processing?
also used
internally
Privacy, amongst others, is about the
protection of personal data
Personal data:
• Contains (whatever) information
relating to a natural (“real”) person
• That person could be
identified, directly or indirectly
• Typically: data attached to unique
identifiers
Anonymous only:
• When no reasonable way exists to
identify (“single out”) a person
• Even when requiring correlation with
other data sources (e.g. maps and
phonebooks)
• By anyone with the right resources
17
also used
internally
18
Typical personal data misconceptions
very often present in technology companies
• We do not identify the user while using the data, so we have no
issues with privacy law
• We only use the serial number of the users device, so the data
is anonymous and we have no issues with privacy law
• We encrypt the data, so we are no longer
using/receiving/sending personal data
• We use hashes to replace all serial numbers, so the data is now
anonymous and we have no issues with privacy law
• We anonimize the data, so we are not using personal data
• We can use the users’ data for anything we want, as long as we
keep the data to ourselves
• Look: big name companies are doing the same,
so we are OK also used
internally
19
Can location data be anonymous?
Research indicates: hardly ever
Avoiding re-identification is key
TomTom has a strict code of conduct to adhere to privacy laws
• Historic trip archive only
to be used for road,
traffic and related
purposes
• No access to raw data
outside TomTom, ever
• TomTom performs
processing
• TomTom ensures re-
identification is
impossible e.g. through
sufficient aggregation
20
1 month
1 day
21
Lessons learnt
• It is about trust and credibility, not about privacy or laws:
• “Anonymous”, “aggregated” is evasive terminology
• Data given in good faith, used against me
• Be prepared to explain and take action, even if that hurts
• Have your act together:
• Avoid squirrel behavior – data minimization is key
• Tell what you do with your users data and stick to it
• Be able to produce all relevant documentation very timely
• Co-operate with privacy regulators, don’t fight them
22
Recommendations
• Incorporate data protection requirements from the start
• Take a multi-disciplinary approach: it is about your
“license to operate in the information society”
• Embed “privacy by design” into development processes
• Document your data: “what, why, when, who, where”
• Consider law enforcement/e-discovery implications
• Appoint a “privacy czar” in your organization

Mais conteúdo relacionado

Mais procurados

Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and PrivacyVertex Holdings
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Actmrmwood
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologiessidra batool
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
Data Protection (Download for slideshow)
Data Protection (Download for slideshow)Data Protection (Download for slideshow)
Data Protection (Download for slideshow)Andrew Sharpe
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data SecurityWilmerHale
 
Merit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data ProtectionMerit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data Protectionmeritnorthwest
 
Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Russell_Kennedy
 
Data protection act
Data protection act Data protection act
Data protection act Iqbal Bocus
 
Intercity technology - GDPR your training toolkit
Intercity technology - GDPR your training toolkitIntercity technology - GDPR your training toolkit
Intercity technology - GDPR your training toolkitjoshquarrie
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacyimehreenx
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protectionsp_krishna
 
GDPR Practicalities - The Data Shed
GDPR Practicalities - The Data ShedGDPR Practicalities - The Data Shed
GDPR Practicalities - The Data ShedStewart Norriss
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityJisc Scotland
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection ActSaimaRafiq
 
Data protection compliance for tech startups
Data protection compliance for tech startupsData protection compliance for tech startups
Data protection compliance for tech startupsEkoInnovationCentre
 
The Data Protection Act What You Need To Know
The Data Protection Act   What You Need To KnowThe Data Protection Act   What You Need To Know
The Data Protection Act What You Need To KnowEamonnORagh
 

Mais procurados (20)

Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Data Protection (Download for slideshow)
Data Protection (Download for slideshow)Data Protection (Download for slideshow)
Data Protection (Download for slideshow)
 
Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Merit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data ProtectionMerit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data Protection
 
Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)
 
Data protection act
Data protection act Data protection act
Data protection act
 
Intercity technology - GDPR your training toolkit
Intercity technology - GDPR your training toolkitIntercity technology - GDPR your training toolkit
Intercity technology - GDPR your training toolkit
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
 
GDPR Practicalities - The Data Shed
GDPR Practicalities - The Data ShedGDPR Practicalities - The Data Shed
GDPR Practicalities - The Data Shed
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information Security
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
 
EU GDPR (training)
EU GDPR (training)  EU GDPR (training)
EU GDPR (training)
 
Data protection compliance for tech startups
Data protection compliance for tech startupsData protection compliance for tech startups
Data protection compliance for tech startups
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
The Data Protection Act What You Need To Know
The Data Protection Act   What You Need To KnowThe Data Protection Act   What You Need To Know
The Data Protection Act What You Need To Know
 

Destaque

Presentacion adecco professional
Presentacion  adecco professionalPresentacion  adecco professional
Presentacion adecco professionalxaviermicheladecco
 
Edvinas_Meskys_Brno conference_Research biobanks_FINAL
Edvinas_Meskys_Brno conference_Research biobanks_FINALEdvinas_Meskys_Brno conference_Research biobanks_FINAL
Edvinas_Meskys_Brno conference_Research biobanks_FINALEdvinas Meskys
 
Reclutamiento y Seleccion Profesionales TIC
Reclutamiento y Seleccion Profesionales TICReclutamiento y Seleccion Profesionales TIC
Reclutamiento y Seleccion Profesionales TICCarlos Cabezón
 
2016 11-15 Lygature partnership meetup, Utrecht, Alain van Gool
2016 11-15 Lygature partnership meetup, Utrecht, Alain van Gool2016 11-15 Lygature partnership meetup, Utrecht, Alain van Gool
2016 11-15 Lygature partnership meetup, Utrecht, Alain van GoolAlain van Gool
 
2016 11-11 IHE jaarcongres 2016, Bussum, Alain van Gool
2016 11-11 IHE jaarcongres 2016, Bussum, Alain van Gool2016 11-11 IHE jaarcongres 2016, Bussum, Alain van Gool
2016 11-11 IHE jaarcongres 2016, Bussum, Alain van GoolAlain van Gool
 
2016 03-17 Health Valley Event 2016, Alain van Gool
2016 03-17 Health Valley Event 2016, Alain van Gool2016 03-17 Health Valley Event 2016, Alain van Gool
2016 03-17 Health Valley Event 2016, Alain van GoolAlain van Gool
 
Catálogo de Servicios de Consultoría y Capacitación
Catálogo de Servicios de Consultoría y CapacitaciónCatálogo de Servicios de Consultoría y Capacitación
Catálogo de Servicios de Consultoría y CapacitaciónParagon Project Partners
 
Simplify Localization with Design Pattern Automation
Simplify Localization with Design Pattern AutomationSimplify Localization with Design Pattern Automation
Simplify Localization with Design Pattern AutomationYan Cui
 
TomTom Presentation.
TomTom Presentation.TomTom Presentation.
TomTom Presentation.alfiepanda
 
Ten^H^H^H Many Cloud App Design Patterns
Ten^H^H^H Many Cloud App Design PatternsTen^H^H^H Many Cloud App Design Patterns
Ten^H^H^H Many Cloud App Design PatternsShlomo Swidler
 
Performance Monitoring with AOP and Amazon CloudWatch
Performance Monitoring with AOP and Amazon CloudWatchPerformance Monitoring with AOP and Amazon CloudWatch
Performance Monitoring with AOP and Amazon CloudWatchYan Cui
 
16. fadel abdellaoui fleet performance ignite mars 2010
16. fadel abdellaoui fleet performance   ignite mars 201016. fadel abdellaoui fleet performance   ignite mars 2010
16. fadel abdellaoui fleet performance ignite mars 2010Salah Benzakour
 
Build reactive systems on lambda
Build reactive systems on lambdaBuild reactive systems on lambda
Build reactive systems on lambdaYan Cui
 
AWS Lambda from the Trenches
AWS Lambda from the TrenchesAWS Lambda from the Trenches
AWS Lambda from the TrenchesYan Cui
 

Destaque (20)

Folleto exe mba consultoria
Folleto exe mba consultoriaFolleto exe mba consultoria
Folleto exe mba consultoria
 
Presentacion adecco professional
Presentacion  adecco professionalPresentacion  adecco professional
Presentacion adecco professional
 
Edvinas_Meskys_Brno conference_Research biobanks_FINAL
Edvinas_Meskys_Brno conference_Research biobanks_FINALEdvinas_Meskys_Brno conference_Research biobanks_FINAL
Edvinas_Meskys_Brno conference_Research biobanks_FINAL
 
Reclutamiento y Seleccion Profesionales TIC
Reclutamiento y Seleccion Profesionales TICReclutamiento y Seleccion Profesionales TIC
Reclutamiento y Seleccion Profesionales TIC
 
2016 11-15 Lygature partnership meetup, Utrecht, Alain van Gool
2016 11-15 Lygature partnership meetup, Utrecht, Alain van Gool2016 11-15 Lygature partnership meetup, Utrecht, Alain van Gool
2016 11-15 Lygature partnership meetup, Utrecht, Alain van Gool
 
Porters 5 force model
Porters 5 force modelPorters 5 force model
Porters 5 force model
 
2016 11-11 IHE jaarcongres 2016, Bussum, Alain van Gool
2016 11-11 IHE jaarcongres 2016, Bussum, Alain van Gool2016 11-11 IHE jaarcongres 2016, Bussum, Alain van Gool
2016 11-11 IHE jaarcongres 2016, Bussum, Alain van Gool
 
2016 03-17 Health Valley Event 2016, Alain van Gool
2016 03-17 Health Valley Event 2016, Alain van Gool2016 03-17 Health Valley Event 2016, Alain van Gool
2016 03-17 Health Valley Event 2016, Alain van Gool
 
Catálogo de Servicios de Consultoría y Capacitación
Catálogo de Servicios de Consultoría y CapacitaciónCatálogo de Servicios de Consultoría y Capacitación
Catálogo de Servicios de Consultoría y Capacitación
 
Tom Tom
Tom TomTom Tom
Tom Tom
 
Simplify Localization with Design Pattern Automation
Simplify Localization with Design Pattern AutomationSimplify Localization with Design Pattern Automation
Simplify Localization with Design Pattern Automation
 
TomTom Presentation.
TomTom Presentation.TomTom Presentation.
TomTom Presentation.
 
Ten^H^H^H Many Cloud App Design Patterns
Ten^H^H^H Many Cloud App Design PatternsTen^H^H^H Many Cloud App Design Patterns
Ten^H^H^H Many Cloud App Design Patterns
 
Performance Monitoring with AOP and Amazon CloudWatch
Performance Monitoring with AOP and Amazon CloudWatchPerformance Monitoring with AOP and Amazon CloudWatch
Performance Monitoring with AOP and Amazon CloudWatch
 
16. fadel abdellaoui fleet performance ignite mars 2010
16. fadel abdellaoui fleet performance   ignite mars 201016. fadel abdellaoui fleet performance   ignite mars 2010
16. fadel abdellaoui fleet performance ignite mars 2010
 
Build reactive systems on lambda
Build reactive systems on lambdaBuild reactive systems on lambda
Build reactive systems on lambda
 
AWS Lambda from the Trenches
AWS Lambda from the TrenchesAWS Lambda from the Trenches
AWS Lambda from the Trenches
 
Aldeanas
AldeanasAldeanas
Aldeanas
 
El Generalife. Granada.
El Generalife. Granada.El Generalife. Granada.
El Generalife. Granada.
 
Capilla Real. Granada.
Capilla Real. Granada.Capilla Real. Granada.
Capilla Real. Granada.
 

Semelhante a Tom tom - Location services and privacy | Simon Hania @ VINT symposium THINGS 2013

Workshop 'Big data' Simon Hania
Workshop 'Big data'  Simon HaniaWorkshop 'Big data'  Simon Hania
Workshop 'Big data' Simon HaniaSURFnet
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with PrivacyJason Hong
 
Are Your Data Ready for GDPR? (with MAPR and Talend)
Are Your Data Ready for GDPR? (with MAPR and Talend)Are Your Data Ready for GDPR? (with MAPR and Talend)
Are Your Data Ready for GDPR? (with MAPR and Talend)Jean-Michel Franco
 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible DataTom Walker
 
GDPR Privacy Introduction
GDPR Privacy IntroductionGDPR Privacy Introduction
GDPR Privacy IntroductionNiclasGranqvist
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by QualsysQualsys Ltd
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? SecurityScorecard
 
Privacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSPrivacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSInteraktiv
 
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 Introduction to EU General Data Protection Regulation: Planning, Implementat... Introduction to EU General Data Protection Regulation: Planning, Implementat...
Introduction to EU General Data Protection Regulation: Planning, Implementat...Financial Poise
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Financial Poise
 
What's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesWhat's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesOgilvy Consulting
 
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina TorinoTrustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina TorinoPeter Bihr
 
GDPR: Your Journey to Compliance
GDPR: Your Journey to ComplianceGDPR: Your Journey to Compliance
GDPR: Your Journey to ComplianceCobweb
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management Endcode_org
 
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital MarketersOne North
 
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018Human Capital Department
 
CHASE 2014 data protection presentation Paul Ticher
CHASE 2014 data protection presentation Paul TicherCHASE 2014 data protection presentation Paul Ticher
CHASE 2014 data protection presentation Paul Ticheramy_hatton
 

Semelhante a Tom tom - Location services and privacy | Simon Hania @ VINT symposium THINGS 2013 (20)

Workshop 'Big data' Simon Hania
Workshop 'Big data'  Simon HaniaWorkshop 'Big data'  Simon Hania
Workshop 'Big data' Simon Hania
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with Privacy
 
Are Your Data Ready for GDPR? (with MAPR and Talend)
Are Your Data Ready for GDPR? (with MAPR and Talend)Are Your Data Ready for GDPR? (with MAPR and Talend)
Are Your Data Ready for GDPR? (with MAPR and Talend)
 
GDPR Part 1: Quick Facts
GDPR Part 1: Quick FactsGDPR Part 1: Quick Facts
GDPR Part 1: Quick Facts
 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible Data
 
GDPR Privacy Introduction
GDPR Privacy IntroductionGDPR Privacy Introduction
GDPR Privacy Introduction
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
GDPRforum London
GDPRforum LondonGDPRforum London
GDPRforum London
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready?
 
Privacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSPrivacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMS
 
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 Introduction to EU General Data Protection Regulation: Planning, Implementat... Introduction to EU General Data Protection Regulation: Planning, Implementat...
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...
 
What's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesWhat's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) Changes
 
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina TorinoTrustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
 
GDPR: Your Journey to Compliance
GDPR: Your Journey to ComplianceGDPR: Your Journey to Compliance
GDPR: Your Journey to Compliance
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management
 
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
 
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
 
CHASE 2014 data protection presentation Paul Ticher
CHASE 2014 data protection presentation Paul TicherCHASE 2014 data protection presentation Paul Ticher
CHASE 2014 data protection presentation Paul Ticher
 

Mais de VINTlabs | The Sogeti Trendlab

Design to Disrupt: New Digital Competition - Sogeti VINT
Design to Disrupt: New Digital Competition - Sogeti VINTDesign to Disrupt: New Digital Competition - Sogeti VINT
Design to Disrupt: New Digital Competition - Sogeti VINTVINTlabs | The Sogeti Trendlab
 
Design to Disrupt: An Executive Introduction - Sogeti VINT
Design to Disrupt: An Executive Introduction - Sogeti VINTDesign to Disrupt: An Executive Introduction - Sogeti VINT
Design to Disrupt: An Executive Introduction - Sogeti VINTVINTlabs | The Sogeti Trendlab
 
Design2Disrupt: Patrick Naef (Emirates) - A 30 year old start up
Design2Disrupt: Patrick Naef (Emirates) -  A 30 year old start upDesign2Disrupt: Patrick Naef (Emirates) -  A 30 year old start up
Design2Disrupt: Patrick Naef (Emirates) - A 30 year old start upVINTlabs | The Sogeti Trendlab
 
Design2Disrupt: Mark Plakias (Orange Institute) - Unicorns, Startups & Giants
Design2Disrupt: Mark Plakias (Orange Institute) -   Unicorns, Startups & GiantsDesign2Disrupt: Mark Plakias (Orange Institute) -   Unicorns, Startups & Giants
Design2Disrupt: Mark Plakias (Orange Institute) - Unicorns, Startups & GiantsVINTlabs | The Sogeti Trendlab
 
Design2Disrupt: Patrick Kalaher (Frog) - A Dirty New World
Design2Disrupt: Patrick Kalaher (Frog) - A Dirty New WorldDesign2Disrupt: Patrick Kalaher (Frog) - A Dirty New World
Design2Disrupt: Patrick Kalaher (Frog) - A Dirty New WorldVINTlabs | The Sogeti Trendlab
 
Design2Disrupt Summit: Tim O'brien - The New Rule of IT
Design2Disrupt Summit: Tim O'brien -  The New Rule of ITDesign2Disrupt Summit: Tim O'brien -  The New Rule of IT
Design2Disrupt Summit: Tim O'brien - The New Rule of ITVINTlabs | The Sogeti Trendlab
 
Design2Disrupt Summit: Ted Schadler - The Mobile Mind Shift
Design2Disrupt Summit: Ted Schadler - The Mobile Mind ShiftDesign2Disrupt Summit: Ted Schadler - The Mobile Mind Shift
Design2Disrupt Summit: Ted Schadler - The Mobile Mind ShiftVINTlabs | The Sogeti Trendlab
 
Design2Disrupt: Hannu Kauppinen - The Programmable World
Design2Disrupt: Hannu Kauppinen - The Programmable WorldDesign2Disrupt: Hannu Kauppinen - The Programmable World
Design2Disrupt: Hannu Kauppinen - The Programmable WorldVINTlabs | The Sogeti Trendlab
 
Design2Disrupt Summit: Joseph Pine - Destructive Recreation
Design2Disrupt Summit: Joseph Pine  - Destructive RecreationDesign2Disrupt Summit: Joseph Pine  - Destructive Recreation
Design2Disrupt Summit: Joseph Pine - Destructive RecreationVINTlabs | The Sogeti Trendlab
 
Design2Disrupt Summit: John Hogan - The New Epoch of Computing
Design2Disrupt Summit: John Hogan - The New Epoch of ComputingDesign2Disrupt Summit: John Hogan - The New Epoch of Computing
Design2Disrupt Summit: John Hogan - The New Epoch of ComputingVINTlabs | The Sogeti Trendlab
 
Design2Disrupt Summit: Didier Bonnet - Leading Digital
Design2Disrupt Summit: Didier Bonnet - Leading DigitalDesign2Disrupt Summit: Didier Bonnet - Leading Digital
Design2Disrupt Summit: Didier Bonnet - Leading DigitalVINTlabs | The Sogeti Trendlab
 
SMACT and the City: How will the Internet of Things Change our Cities?
SMACT and the City: How will the Internet of Things Change our Cities?SMACT and the City: How will the Internet of Things Change our Cities?
SMACT and the City: How will the Internet of Things Change our Cities?VINTlabs | The Sogeti Trendlab
 
The Fourth Industrial Revolution – Internet of Things to Tighten the Link bet...
The Fourth Industrial Revolution – Internet of Things to Tighten the Link bet...The Fourth Industrial Revolution – Internet of Things to Tighten the Link bet...
The Fourth Industrial Revolution – Internet of Things to Tighten the Link bet...VINTlabs | The Sogeti Trendlab
 
Exponential Innovation | Federico Pistono @ VINT symposium THINGS 2013
Exponential Innovation | Federico Pistono @ VINT symposium THINGS 2013Exponential Innovation | Federico Pistono @ VINT symposium THINGS 2013
Exponential Innovation | Federico Pistono @ VINT symposium THINGS 2013VINTlabs | The Sogeti Trendlab
 
Internet of Scenarios | Sander Duivestein @ VINT symposium THINGS 2013
Internet of Scenarios | Sander Duivestein @ VINT symposium THINGS 2013Internet of Scenarios | Sander Duivestein @ VINT symposium THINGS 2013
Internet of Scenarios | Sander Duivestein @ VINT symposium THINGS 2013VINTlabs | The Sogeti Trendlab
 
Digital Innovation: The next step in the digital journey | Alberto Prado @ VI...
Digital Innovation: The next step in the digital journey | Alberto Prado @ VI...Digital Innovation: The next step in the digital journey | Alberto Prado @ VI...
Digital Innovation: The next step in the digital journey | Alberto Prado @ VI...VINTlabs | The Sogeti Trendlab
 
There Is No Internet Of Things | Sarah Rotman Epps @ VINT symposium THINGS 2013
There Is No Internet Of Things | Sarah Rotman Epps @ VINT symposium THINGS 2013There Is No Internet Of Things | Sarah Rotman Epps @ VINT symposium THINGS 2013
There Is No Internet Of Things | Sarah Rotman Epps @ VINT symposium THINGS 2013VINTlabs | The Sogeti Trendlab
 

Mais de VINTlabs | The Sogeti Trendlab (20)

Design to Disrupt: New Digital Competition - Sogeti VINT
Design to Disrupt: New Digital Competition - Sogeti VINTDesign to Disrupt: New Digital Competition - Sogeti VINT
Design to Disrupt: New Digital Competition - Sogeti VINT
 
Design to Disrupt: An Executive Introduction - Sogeti VINT
Design to Disrupt: An Executive Introduction - Sogeti VINTDesign to Disrupt: An Executive Introduction - Sogeti VINT
Design to Disrupt: An Executive Introduction - Sogeti VINT
 
Design2Disrupt: Patrick Naef (Emirates) - A 30 year old start up
Design2Disrupt: Patrick Naef (Emirates) -  A 30 year old start upDesign2Disrupt: Patrick Naef (Emirates) -  A 30 year old start up
Design2Disrupt: Patrick Naef (Emirates) - A 30 year old start up
 
Design2Disrupt: Mark Plakias (Orange Institute) - Unicorns, Startups & Giants
Design2Disrupt: Mark Plakias (Orange Institute) -   Unicorns, Startups & GiantsDesign2Disrupt: Mark Plakias (Orange Institute) -   Unicorns, Startups & Giants
Design2Disrupt: Mark Plakias (Orange Institute) - Unicorns, Startups & Giants
 
Design2Disrupt: Patrick Kalaher (Frog) - A Dirty New World
Design2Disrupt: Patrick Kalaher (Frog) - A Dirty New WorldDesign2Disrupt: Patrick Kalaher (Frog) - A Dirty New World
Design2Disrupt: Patrick Kalaher (Frog) - A Dirty New World
 
Design2Disrupt Summit: Tim O'brien - The New Rule of IT
Design2Disrupt Summit: Tim O'brien -  The New Rule of ITDesign2Disrupt Summit: Tim O'brien -  The New Rule of IT
Design2Disrupt Summit: Tim O'brien - The New Rule of IT
 
Design2Disrupt Summit: Ted Schadler - The Mobile Mind Shift
Design2Disrupt Summit: Ted Schadler - The Mobile Mind ShiftDesign2Disrupt Summit: Ted Schadler - The Mobile Mind Shift
Design2Disrupt Summit: Ted Schadler - The Mobile Mind Shift
 
Design2Disrupt: Hannu Kauppinen - The Programmable World
Design2Disrupt: Hannu Kauppinen - The Programmable WorldDesign2Disrupt: Hannu Kauppinen - The Programmable World
Design2Disrupt: Hannu Kauppinen - The Programmable World
 
Design2Disrupt: Menno van Doorn - Setting the Stage
Design2Disrupt: Menno van Doorn - Setting the StageDesign2Disrupt: Menno van Doorn - Setting the Stage
Design2Disrupt: Menno van Doorn - Setting the Stage
 
Design2Disrupt Summit: Joseph Pine - Destructive Recreation
Design2Disrupt Summit: Joseph Pine  - Destructive RecreationDesign2Disrupt Summit: Joseph Pine  - Destructive Recreation
Design2Disrupt Summit: Joseph Pine - Destructive Recreation
 
Design2Disrupt Summit: John Hogan - The New Epoch of Computing
Design2Disrupt Summit: John Hogan - The New Epoch of ComputingDesign2Disrupt Summit: John Hogan - The New Epoch of Computing
Design2Disrupt Summit: John Hogan - The New Epoch of Computing
 
Design2Disrupt Summit: Didier Bonnet - Leading Digital
Design2Disrupt Summit: Didier Bonnet - Leading DigitalDesign2Disrupt Summit: Didier Bonnet - Leading Digital
Design2Disrupt Summit: Didier Bonnet - Leading Digital
 
SMACT and the City: How will the Internet of Things Change our Cities?
SMACT and the City: How will the Internet of Things Change our Cities?SMACT and the City: How will the Internet of Things Change our Cities?
SMACT and the City: How will the Internet of Things Change our Cities?
 
The Fourth Industrial Revolution – Internet of Things to Tighten the Link bet...
The Fourth Industrial Revolution – Internet of Things to Tighten the Link bet...The Fourth Industrial Revolution – Internet of Things to Tighten the Link bet...
The Fourth Industrial Revolution – Internet of Things to Tighten the Link bet...
 
Sander Duivestein @ VINT Symposium 2014
Sander Duivestein @ VINT Symposium 2014Sander Duivestein @ VINT Symposium 2014
Sander Duivestein @ VINT Symposium 2014
 
Empathic Computing: From Wearables to Biohacking
Empathic Computing: From Wearables to BiohackingEmpathic Computing: From Wearables to Biohacking
Empathic Computing: From Wearables to Biohacking
 
Exponential Innovation | Federico Pistono @ VINT symposium THINGS 2013
Exponential Innovation | Federico Pistono @ VINT symposium THINGS 2013Exponential Innovation | Federico Pistono @ VINT symposium THINGS 2013
Exponential Innovation | Federico Pistono @ VINT symposium THINGS 2013
 
Internet of Scenarios | Sander Duivestein @ VINT symposium THINGS 2013
Internet of Scenarios | Sander Duivestein @ VINT symposium THINGS 2013Internet of Scenarios | Sander Duivestein @ VINT symposium THINGS 2013
Internet of Scenarios | Sander Duivestein @ VINT symposium THINGS 2013
 
Digital Innovation: The next step in the digital journey | Alberto Prado @ VI...
Digital Innovation: The next step in the digital journey | Alberto Prado @ VI...Digital Innovation: The next step in the digital journey | Alberto Prado @ VI...
Digital Innovation: The next step in the digital journey | Alberto Prado @ VI...
 
There Is No Internet Of Things | Sarah Rotman Epps @ VINT symposium THINGS 2013
There Is No Internet Of Things | Sarah Rotman Epps @ VINT symposium THINGS 2013There Is No Internet Of Things | Sarah Rotman Epps @ VINT symposium THINGS 2013
There Is No Internet Of Things | Sarah Rotman Epps @ VINT symposium THINGS 2013
 

Último

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Último (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Tom tom - Location services and privacy | Simon Hania @ VINT symposium THINGS 2013

  • 1. Location services and privacy Using geolocation in a trustworthy and compliant way Simon.Hania@tomtom.com
  • 3. 3 Connected cars with downloadable apps Location services, cloud, internet-of-thing, big data
  • 4. 4 4. TomTom HD Traffic 3. IQ Routes 2. Map Share 1. Base maps Revolutionising navigation In 4 steps 4. TomTom HD Traffic 3. IQ Routes 2. Map Share 1. Base maps 4. TomTom HD Traffic 3. IQ Routes 2. Map Share 1. Base maps 4. TomTom HD Traffic 3. IQ Routes 2. Map Share 1. Base maps
  • 5. 5 TomTom Traffic coverage It covers up to 99.9% of all roads
  • 6. 6 Creating TomTom HD Traffic: data sources Range of high-quality real-time data sources
  • 7. TomToms trip archive Anonymous location and speed information from the TomTom user community 5 billion (10E9) speed measurements per day 5 trillion (10E12) speed measurements to date! by customers driving 50 billion kilometres and visiting every spot over 1,000 times
  • 8. 8 Travel times to hospital Based on real world measurements LONDON Based on theoretical maximum speeds The reality check that can help to save lives
  • 9. Origin/Destination analysis 9 Example: Trips with Frankfurt Airport as destination • Where are your customers coming from? • What routes do they take? • How may drivers are passing? • Etc. • Combine with other geo-based data sources for additional analysis
  • 10. Drivers, police & TomTom 10 An explosive mixture
  • 11. Location privacy is top of mind With bloggers, press, regulators, enforcers, legislators and many users alike 11 • TomTom investigated by leading European Data Protection Authority in 2011 • TomTom’s use of location data is in accordance with EU Data Protection Laws • Processing and delivery to third parties 100% OK • Informing users needed to be more explicit, including opt-in
  • 12. Community input – with permission 12 We profile roads, not people
  • 13. 13 How to enact? Nothing totally new, really 1. Principles - is what everyone should know 2. People - make the difference: good and bad 3. Policies - are like high level requirements 4. Projects - is where everything is put together 5. Processes - is what we use to stay predictable 6. Procedures - exist to avoid re-inventing wheels 7. Paperwork - document everything properly also used internally
  • 14. TomTom & Privacy 14 Vision: Community input (crowd sourcing) is strategic Privacy helps to realize business objectives by ensuring trust Privacy is integral part of business continuity above and beyond legal compliance Principles: 1. Avoid unpleasant surprises: • Customer insight is paramount • Be open and explain – hesitation is an omen • Keep it simple 2. The customer remains in control of his personal data: we have it “on a loan” also used internally
  • 15. 15 Privacy Policies, Standards & Guidelines 7 key objectives 1. We asses our intended use of PD early to drive requirements 2. We document PD: purpose, legitimate ground, retention, access, jurisdiction(s) 3. We ensure we have obtained or will obtain informed user consent 4. We minimize the amount of PD (volume and time) and who has access: we de-personalize or destroy PD as soon as possible 5. We keep ensuring adequate security measures based on risk assessment of confidentiality, integrity and availability 6. We do not expose PD to any third party, unless the third party contractually agrees to comply to our policies (or law forces us) 7. We enable the user to exercise his rights (information, access/download, correction, deletion) also used internally
  • 16. 16 The 6 privacy questions 1. What personal data are we processing? 2. Why are we processing personal data? 3. When can we destroy the personal data? 4. Who will have access and will be accountable? 5. Where will we process and store the personal data? 6. Will we have a legitimate basis for processing? also used internally
  • 17. Privacy, amongst others, is about the protection of personal data Personal data: • Contains (whatever) information relating to a natural (“real”) person • That person could be identified, directly or indirectly • Typically: data attached to unique identifiers Anonymous only: • When no reasonable way exists to identify (“single out”) a person • Even when requiring correlation with other data sources (e.g. maps and phonebooks) • By anyone with the right resources 17 also used internally
  • 18. 18 Typical personal data misconceptions very often present in technology companies • We do not identify the user while using the data, so we have no issues with privacy law • We only use the serial number of the users device, so the data is anonymous and we have no issues with privacy law • We encrypt the data, so we are no longer using/receiving/sending personal data • We use hashes to replace all serial numbers, so the data is now anonymous and we have no issues with privacy law • We anonimize the data, so we are not using personal data • We can use the users’ data for anything we want, as long as we keep the data to ourselves • Look: big name companies are doing the same, so we are OK also used internally
  • 19. 19 Can location data be anonymous? Research indicates: hardly ever
  • 20. Avoiding re-identification is key TomTom has a strict code of conduct to adhere to privacy laws • Historic trip archive only to be used for road, traffic and related purposes • No access to raw data outside TomTom, ever • TomTom performs processing • TomTom ensures re- identification is impossible e.g. through sufficient aggregation 20 1 month 1 day
  • 21. 21 Lessons learnt • It is about trust and credibility, not about privacy or laws: • “Anonymous”, “aggregated” is evasive terminology • Data given in good faith, used against me • Be prepared to explain and take action, even if that hurts • Have your act together: • Avoid squirrel behavior – data minimization is key • Tell what you do with your users data and stick to it • Be able to produce all relevant documentation very timely • Co-operate with privacy regulators, don’t fight them
  • 22. 22 Recommendations • Incorporate data protection requirements from the start • Take a multi-disciplinary approach: it is about your “license to operate in the information society” • Embed “privacy by design” into development processes • Document your data: “what, why, when, who, where” • Consider law enforcement/e-discovery implications • Appoint a “privacy czar” in your organization

Notas do Editor

  1. Animated, updated GSM, supersized imageRange of different sources, to enable reliable traffic detection on all roads in all situationsQuality of each source is important: precision of location (GPS better than GSM) and update frequency (logged every 2-5s, uploaded ~every 2 minutes)LIVE PND are connected TomTom GPS navigation devicesIn dash navigation currently limited to Europe (Renault, Fiat, Mazda)iPhone data is only from users of TomTom navigation application on the device – and GPS trace data only passed to TomTom if the user subscribes to LIVE services and the device is docked in the TomTom holderBusiness solutions is the TomTom unit focused on connected products for fleet owners (delivery vans, maintenance cars, etc)3rd party GPS data only used in selected countries (USA, South Africa & New Zealand)GSM probes only active in 8 countries (notably not in USA)Incident data = journalistic data describing the cause of the congestion / delay e.g. accident