SlideShare uma empresa Scribd logo
1 de 54
Austin Alleman@allemanau The Accidental Chief Privacy Officer Jim AdlerChief Privacy Officer & General Manager, Data SystemsIntelius twitter: @jim_adlerhttp://jimadler.me Strata Conference, New YorkSeptember 2011
Direct-to-consumer provider of public information about people and businesses.  Discover each other to make better decisions and empower yourself to take control of your reputation. comScore top 100 site, 11M unique, paying customers. About INTELIUS
Billions of Records 300 Million People The “Big Data” People Search Problem 213 records mapped  to the correct 37 Jim Adlers Randolph Hutchins 5 People Philip Collins 375 People Jim Adler 213 Records37 People Jim Adler McKinney, TX Age 57 Gwen Fleming 2 People Jim Adler Houston, TX Age 68 Carol Brooks 9800 Records 1250 People Jim Adler Hastings, NE Age 32 Jim Adler Canaan, NH Age 59 Jim Adler Redmond, WA Age 48 Jim Adler Denver, CO Age 48
“Dennis Rodman” Profile
Intelligence I am not an Attorney Geek Dweeb Nerd SocialIneptitude Obsession Dork
Mark Zuckerberg Real Names Richard Feynman Physics Norio Ohga Sony President 74 min CD Jeff Jonas Big Data Privacy by Design Steve Jobs ‘nuff said Eclectic Innovators
Agenda Innocence Frontier Regulation Innovation Austin Alleman@allemanau
Frontier
The surface web is small… 167 Terabytes
Compared to the deep web… 91,000 Terabytes
~20Exabytes (20B GB) Data from  dawn of civilization through 2002 Data from  April 2011
Reconnecting out-of-touch family members Online shoppers verifying online sellers Caller ID of harassing phone calls Law enforcement Banking Services Adopted kids seeking their biological parents Learning about  a business Airlines trying to return lost luggage Networkers seeking business opportunities Social networkers looking to expand their friends list Professionals learning about colleagues at conferences Social workers who need to know more about their clients Singles curious about the people they meet Lawyers needing quick access to court records Find owner of dog’s relative for transplant Genealogists  cultivating their family tree Investigative journalists running down leads Checking out a prospective tenant Research Sales professionals looking for new prospects Non-profit organizations looking for supporters Alumni groups arranging reunions Parents  ensuring who their kids safety Anyone retrieving court records Businesses that need to update contact information on customers Checking out a prospective date Finding people that have the same illness as you Sharing Those in legally entangled looking for court records Anyone who need address histories for passports Fiancés and their curious family members Anyone curious about who's emailing or calling them Checking out a prospective social network connection Finding long-lost friends, military buddies, roommates, or classmates Researching a prospective employee Regulated For lots of reasons… (some regulated)
Providing major benefits… 51% “major benefit” is ease and convenience 41% “major benefit” is portability 39% “major benefit is sharing Use of Cloud Computing Applications and Services, Pew 2008
But real concerns… 90% “very concerned” if data sold 80% “very concerned” if photos used for marketing 68% “very concerned” if data used to serve them ads Use of Cloud Computing Applications and Services, Pew 2008
A Prescient Venn Diagram?
Innocence
When towns were small …
“The only thing worse than being talked about, is not being talked about.”− Oscar Wilde Density↓ ->Anonymity↓ ->Privacy Expectation↓
“Good Fences Make Good Neighbors” 					- Mending Wall, Robert Frost Density↑ ->Anonymity↑ ->Privacy Expectation↑
“In times of rapid change, experience could be your worst enemy.”						− J. Paul Getty #@?$!! “Privacy Vertigo” Density↓ ->Anonymity↓ ->Privacy Expectation↓
What’s in a Nym? Source: Intelius
Regulation
So, how do we think about public and private now?
Public speaking is publicly public
Voting is a privately public
And some things are publicly private
Your home is clearly private
And the Constitution protects your privacy from government …
But no Constitutional protections between citizens
It would be nice … to use familiar framework
Cloud banking clearly private
Tweeting is (mostly) public
Cloud dating is public confidential
FIPPs “Privacy by Design” Consent unnecessary for commonly accepted practices Increased transparency Federal Trade Commission Guidance
Confusion Matrix Predicted Actual
“Policy” Confusion Matrix Regulations Violations
Innovation
Compliance “Evolved” Raw Materials CPO Product Development Marketing Quality Acceptance Release Compliance
  Hilary Mason’s Maxim Math + Code = Awesome Quants Making a killing on Wall Street but still can’t impress the chicks Weakonomics.com
Corollary to Mason’s Maxim Values * (Math + Code) = Awesome
First Social Network: The Dinner Table We eat. We share.
A Pescatarian Digression
~10,000 GCal ~20Exabytes (20B GB) Data in April 2011 Food in April 2011
Food Policy Leads Privacy Policy Peanut Butter Hearings Pure FoodAct Labeling Reform FTC Est. CivilRights “SnakeOil” GMO Social MediaAdoption “RobberBarons” Packaged Foods FCRA
“Give Peas a Chance” Monsanto’s Corn Mendel’s Peas ? =
“Give me the bad news first, Doc” = “CDC reports investigations of outbreaks” “46 states & DC require notification of a databreach. National legislation upcoming.”
Opaque Transparency Does Not Inform
Transparency Allows Data Driven Decisions
= YOU % % % % % %
Control comes from Awareness TrueRep.com Awareness and control of your public profile Privacy controls Reputation management Stay tuned …
Innovation is a team sport Drive confluence of influencewithin your org Be the happy warrior Find clarity within confusion Reports of privacy’s death have been greatly exaggerated …
Questions? Jim AdlerChief Privacy Officer & General Manager, Data SystemsIntelius twitter: @jim_adlerhttp://jimadler.me Strata Conference, New YorkSeptember 2011

Mais conteúdo relacionado

Mais procurados

Mapping the pii market
Mapping the pii marketMapping the pii market
Mapping the pii marketpii2011
 
Facebook and cambridge analytica scandal
Facebook and cambridge analytica scandalFacebook and cambridge analytica scandal
Facebook and cambridge analytica scandalSajibHossain17
 
Presentation to U.S. Chamber Government Affairs Conference
Presentation to U.S. Chamber Government Affairs ConferencePresentation to U.S. Chamber Government Affairs Conference
Presentation to U.S. Chamber Government Affairs ConferenceCurt Mercadante
 
Using New Technologies to Make Sense of Content Chaos: Text mining and visual...
Using New Technologies to Make Sense of Content Chaos: Text mining and visual...Using New Technologies to Make Sense of Content Chaos: Text mining and visual...
Using New Technologies to Make Sense of Content Chaos: Text mining and visual...KM Chicago
 
The elasticity of marketing & analytics ethics
The elasticity of marketing & analytics ethicsThe elasticity of marketing & analytics ethics
The elasticity of marketing & analytics ethicsStéphane Hamel
 
Essentials of Cyberspace Law: User Generated Content, Privacy and Online Adve...
Essentials of Cyberspace Law: User Generated Content, Privacy and Online Adve...Essentials of Cyberspace Law: User Generated Content, Privacy and Online Adve...
Essentials of Cyberspace Law: User Generated Content, Privacy and Online Adve...Internet Law Center
 
Cambridge Analytica as a Prime Example of the Manipulation of Democratic Deci...
Cambridge Analytica as a Prime Example of the Manipulation of Democratic Deci...Cambridge Analytica as a Prime Example of the Manipulation of Democratic Deci...
Cambridge Analytica as a Prime Example of the Manipulation of Democratic Deci...Anna Vollmer
 
The social house that google built
The social house that google builtThe social house that google built
The social house that google builtSean McGinnis
 
Top 6 Lies That Big Corporations Tell
Top 6 Lies That Big Corporations TellTop 6 Lies That Big Corporations Tell
Top 6 Lies That Big Corporations Tellzhmekapanova
 
Protecting Your Business and Employees: Crafting Beneficial Social Media Pol...
Protecting Your Business and Employees:  Crafting Beneficial Social Media Pol...Protecting Your Business and Employees:  Crafting Beneficial Social Media Pol...
Protecting Your Business and Employees: Crafting Beneficial Social Media Pol...Kelley Keller, Esq.
 
Dai Big Data al Cognitive Computing Dematerializzazione, Senso, Decisione e A...
Dai Big Data al Cognitive Computing Dematerializzazione, Senso, Decisione e A...Dai Big Data al Cognitive Computing Dematerializzazione, Senso, Decisione e A...
Dai Big Data al Cognitive Computing Dematerializzazione, Senso, Decisione e A...Redazione InnovaPuglia
 
VSPEC social media / Jon Newman
VSPEC social media / Jon NewmanVSPEC social media / Jon Newman
VSPEC social media / Jon Newmanjonnewman12
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacySarah Pearson
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacyvoelkeld
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacyDanno320
 

Mais procurados (20)

Mapping the pii market
Mapping the pii marketMapping the pii market
Mapping the pii market
 
Facebook and cambridge analytica scandal
Facebook and cambridge analytica scandalFacebook and cambridge analytica scandal
Facebook and cambridge analytica scandal
 
Presentation to U.S. Chamber Government Affairs Conference
Presentation to U.S. Chamber Government Affairs ConferencePresentation to U.S. Chamber Government Affairs Conference
Presentation to U.S. Chamber Government Affairs Conference
 
Internet privacy
Internet privacyInternet privacy
Internet privacy
 
Using New Technologies to Make Sense of Content Chaos: Text mining and visual...
Using New Technologies to Make Sense of Content Chaos: Text mining and visual...Using New Technologies to Make Sense of Content Chaos: Text mining and visual...
Using New Technologies to Make Sense of Content Chaos: Text mining and visual...
 
The elasticity of marketing & analytics ethics
The elasticity of marketing & analytics ethicsThe elasticity of marketing & analytics ethics
The elasticity of marketing & analytics ethics
 
Essentials of Cyberspace Law: User Generated Content, Privacy and Online Adve...
Essentials of Cyberspace Law: User Generated Content, Privacy and Online Adve...Essentials of Cyberspace Law: User Generated Content, Privacy and Online Adve...
Essentials of Cyberspace Law: User Generated Content, Privacy and Online Adve...
 
Cambridge Analytica as a Prime Example of the Manipulation of Democratic Deci...
Cambridge Analytica as a Prime Example of the Manipulation of Democratic Deci...Cambridge Analytica as a Prime Example of the Manipulation of Democratic Deci...
Cambridge Analytica as a Prime Example of the Manipulation of Democratic Deci...
 
The social house that google built
The social house that google builtThe social house that google built
The social house that google built
 
Facebook Scandal
Facebook Scandal Facebook Scandal
Facebook Scandal
 
Top 6 Lies That Big Corporations Tell
Top 6 Lies That Big Corporations TellTop 6 Lies That Big Corporations Tell
Top 6 Lies That Big Corporations Tell
 
Cambridge analytica
Cambridge analyticaCambridge analytica
Cambridge analytica
 
Protecting Your Business and Employees: Crafting Beneficial Social Media Pol...
Protecting Your Business and Employees:  Crafting Beneficial Social Media Pol...Protecting Your Business and Employees:  Crafting Beneficial Social Media Pol...
Protecting Your Business and Employees: Crafting Beneficial Social Media Pol...
 
Dai Big Data al Cognitive Computing Dematerializzazione, Senso, Decisione e A...
Dai Big Data al Cognitive Computing Dematerializzazione, Senso, Decisione e A...Dai Big Data al Cognitive Computing Dematerializzazione, Senso, Decisione e A...
Dai Big Data al Cognitive Computing Dematerializzazione, Senso, Decisione e A...
 
Uga Social Media Privacy June2011
Uga Social Media Privacy June2011Uga Social Media Privacy June2011
Uga Social Media Privacy June2011
 
VSPEC social media / Jon Newman
VSPEC social media / Jon NewmanVSPEC social media / Jon Newman
VSPEC social media / Jon Newman
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacy
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacy
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacy
 
Facebook Scandal
Facebook ScandalFacebook Scandal
Facebook Scandal
 

Destaque

LSS@SMW: Bernie Hogan Rebuilding The Collapsed Contexts In Social Media
LSS@SMW:  Bernie Hogan Rebuilding The Collapsed Contexts In Social MediaLSS@SMW:  Bernie Hogan Rebuilding The Collapsed Contexts In Social Media
LSS@SMW: Bernie Hogan Rebuilding The Collapsed Contexts In Social MediaLocal Social Summit
 
Managing Privacy and Context Collapse in the Facebook Age
Managing Privacy and Context Collapse in the Facebook AgeManaging Privacy and Context Collapse in the Facebook Age
Managing Privacy and Context Collapse in the Facebook AgeJessica Vitak
 
Quantifying the Invisible Audience in Social Networks
Quantifying the Invisible Audience in Social NetworksQuantifying the Invisible Audience in Social Networks
Quantifying the Invisible Audience in Social NetworksMichael Bernstein
 
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...summersocialwebshop
 
Context collapse on social media: implications for interpersonal and marketin...
Context collapse on social media: implications for interpersonal and marketin...Context collapse on social media: implications for interpersonal and marketin...
Context collapse on social media: implications for interpersonal and marketin...ACSM @ VU University Amsterdam
 
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniTo
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniToSocial Media - Introduzione al Corso [a.a. 2014-2015] - UniTo
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniToAgnese Vellar
 
Comunicare nell'era dei social media
Comunicare nell'era dei social mediaComunicare nell'era dei social media
Comunicare nell'era dei social mediaAgnese Vellar
 
Context Collapse on Social Networking Sites
Context Collapse on Social Networking SitesContext Collapse on Social Networking Sites
Context Collapse on Social Networking SitesStefanie Duguay
 
Theorizing the Future of Computer-Mediated Communication: The Changing Role o...
Theorizing the Future of Computer-Mediated Communication: The Changing Role o...Theorizing the Future of Computer-Mediated Communication: The Changing Role o...
Theorizing the Future of Computer-Mediated Communication: The Changing Role o...Jessica Vitak
 
WISDOM AT WORK: The Power of Personal Storytelling to Spark Insight, Breakthr...
WISDOM AT WORK: The Power of Personal Storytelling to Spark Insight, Breakthr...WISDOM AT WORK: The Power of Personal Storytelling to Spark Insight, Breakthr...
WISDOM AT WORK: The Power of Personal Storytelling to Spark Insight, Breakthr...Mitchell Ditkoff
 
Digital Footprint
Digital FootprintDigital Footprint
Digital FootprintRobin Low
 
Using Social Smarts to Engage Students on Social Media
Using Social Smarts to Engage Students on Social MediaUsing Social Smarts to Engage Students on Social Media
Using Social Smarts to Engage Students on Social MediaPaul Brown
 

Destaque (14)

LSS@SMW: Bernie Hogan Rebuilding The Collapsed Contexts In Social Media
LSS@SMW:  Bernie Hogan Rebuilding The Collapsed Contexts In Social MediaLSS@SMW:  Bernie Hogan Rebuilding The Collapsed Contexts In Social Media
LSS@SMW: Bernie Hogan Rebuilding The Collapsed Contexts In Social Media
 
A private sphereslideshare
A private sphereslideshareA private sphereslideshare
A private sphereslideshare
 
Managing Privacy and Context Collapse in the Facebook Age
Managing Privacy and Context Collapse in the Facebook AgeManaging Privacy and Context Collapse in the Facebook Age
Managing Privacy and Context Collapse in the Facebook Age
 
Quantifying the Invisible Audience in Social Networks
Quantifying the Invisible Audience in Social NetworksQuantifying the Invisible Audience in Social Networks
Quantifying the Invisible Audience in Social Networks
 
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
 
The Glass House: Anonymity Vs. Transparency on the Internet
The Glass House: Anonymity Vs. Transparency on the InternetThe Glass House: Anonymity Vs. Transparency on the Internet
The Glass House: Anonymity Vs. Transparency on the Internet
 
Context collapse on social media: implications for interpersonal and marketin...
Context collapse on social media: implications for interpersonal and marketin...Context collapse on social media: implications for interpersonal and marketin...
Context collapse on social media: implications for interpersonal and marketin...
 
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniTo
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniToSocial Media - Introduzione al Corso [a.a. 2014-2015] - UniTo
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniTo
 
Comunicare nell'era dei social media
Comunicare nell'era dei social mediaComunicare nell'era dei social media
Comunicare nell'era dei social media
 
Context Collapse on Social Networking Sites
Context Collapse on Social Networking SitesContext Collapse on Social Networking Sites
Context Collapse on Social Networking Sites
 
Theorizing the Future of Computer-Mediated Communication: The Changing Role o...
Theorizing the Future of Computer-Mediated Communication: The Changing Role o...Theorizing the Future of Computer-Mediated Communication: The Changing Role o...
Theorizing the Future of Computer-Mediated Communication: The Changing Role o...
 
WISDOM AT WORK: The Power of Personal Storytelling to Spark Insight, Breakthr...
WISDOM AT WORK: The Power of Personal Storytelling to Spark Insight, Breakthr...WISDOM AT WORK: The Power of Personal Storytelling to Spark Insight, Breakthr...
WISDOM AT WORK: The Power of Personal Storytelling to Spark Insight, Breakthr...
 
Digital Footprint
Digital FootprintDigital Footprint
Digital Footprint
 
Using Social Smarts to Engage Students on Social Media
Using Social Smarts to Engage Students on Social MediaUsing Social Smarts to Engage Students on Social Media
Using Social Smarts to Engage Students on Social Media
 

Semelhante a Strata Conference NY: The Accidental Chief Privacy Officer

Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?
Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?
Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?Jim Adler
 
iConference 2011: Reputation in the Cloud
iConference 2011: Reputation in the CloudiConference 2011: Reputation in the Cloud
iConference 2011: Reputation in the CloudJim Adler
 
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...Jim Adler
 
Making sense of big data
Making sense of big dataMaking sense of big data
Making sense of big databis_foresight
 
Drexel University: Business and Privacy in the Cloud
Drexel University: Business and Privacy in the Cloud Drexel University: Business and Privacy in the Cloud
Drexel University: Business and Privacy in the Cloud Jim Adler
 
Finger On The Pulse
Finger On The PulseFinger On The Pulse
Finger On The Pulsemccannpulse
 
Finger On The Pulse
Finger On The PulseFinger On The Pulse
Finger On The Pulsemccannpulse
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsideredBrian Rowe
 
Data Analytics and Artificial Intelligence in the era of Digital Transformation
Data Analytics and Artificial Intelligence in the era of Digital TransformationData Analytics and Artificial Intelligence in the era of Digital Transformation
Data Analytics and Artificial Intelligence in the era of Digital TransformationJan Wiegelmann
 
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...Sherry Jones
 
New Developments in Machine Learning - Prof. Dr. Max Welling
New Developments in Machine Learning - Prof. Dr. Max WellingNew Developments in Machine Learning - Prof. Dr. Max Welling
New Developments in Machine Learning - Prof. Dr. Max WellingTextkernel
 
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...FLUZO
 
The Future of Information Architecture
The Future of Information ArchitectureThe Future of Information Architecture
The Future of Information ArchitectureChristina Wodtke
 
Designing Against a Data Dystopia
Designing Against a Data DystopiaDesigning Against a Data Dystopia
Designing Against a Data DystopiaAgnes Pyrchla
 
Data Ethics in the Workplace: Beyond AI, Privacy and Security
Data Ethics in the Workplace: Beyond AI, Privacy and SecurityData Ethics in the Workplace: Beyond AI, Privacy and Security
Data Ethics in the Workplace: Beyond AI, Privacy and SecurityCase IQ
 
The Data Brokers: Selling your personal information
The Data Brokers: Selling your personal informationThe Data Brokers: Selling your personal information
The Data Brokers: Selling your personal informationminiaturequery546
 
Introduction to Ethics of Big Data
Introduction to Ethics of Big DataIntroduction to Ethics of Big Data
Introduction to Ethics of Big Data28 Burnside
 

Semelhante a Strata Conference NY: The Accidental Chief Privacy Officer (20)

Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?
Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?
Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?
 
iConference 2011: Reputation in the Cloud
iConference 2011: Reputation in the CloudiConference 2011: Reputation in the Cloud
iConference 2011: Reputation in the Cloud
 
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
 
Making sense of big data
Making sense of big dataMaking sense of big data
Making sense of big data
 
The #BigData Dilemna
The #BigData Dilemna The #BigData Dilemna
The #BigData Dilemna
 
Drexel University: Business and Privacy in the Cloud
Drexel University: Business and Privacy in the Cloud Drexel University: Business and Privacy in the Cloud
Drexel University: Business and Privacy in the Cloud
 
Finger On The Pulse
Finger On The PulseFinger On The Pulse
Finger On The Pulse
 
Finger On The Pulse
Finger On The PulseFinger On The Pulse
Finger On The Pulse
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
2008 earth intelligence network at hope
2008 earth intelligence network at hope2008 earth intelligence network at hope
2008 earth intelligence network at hope
 
Data Analytics and Artificial Intelligence in the era of Digital Transformation
Data Analytics and Artificial Intelligence in the era of Digital TransformationData Analytics and Artificial Intelligence in the era of Digital Transformation
Data Analytics and Artificial Intelligence in the era of Digital Transformation
 
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
 
New Developments in Machine Learning - Prof. Dr. Max Welling
New Developments in Machine Learning - Prof. Dr. Max WellingNew Developments in Machine Learning - Prof. Dr. Max Welling
New Developments in Machine Learning - Prof. Dr. Max Welling
 
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
 
The Future of Information Architecture
The Future of Information ArchitectureThe Future of Information Architecture
The Future of Information Architecture
 
Designing Against a Data Dystopia
Designing Against a Data DystopiaDesigning Against a Data Dystopia
Designing Against a Data Dystopia
 
Data Ethics in the Workplace: Beyond AI, Privacy and Security
Data Ethics in the Workplace: Beyond AI, Privacy and SecurityData Ethics in the Workplace: Beyond AI, Privacy and Security
Data Ethics in the Workplace: Beyond AI, Privacy and Security
 
THE GREAT HACK.docx
THE GREAT HACK.docxTHE GREAT HACK.docx
THE GREAT HACK.docx
 
The Data Brokers: Selling your personal information
The Data Brokers: Selling your personal informationThe Data Brokers: Selling your personal information
The Data Brokers: Selling your personal information
 
Introduction to Ethics of Big Data
Introduction to Ethics of Big DataIntroduction to Ethics of Big Data
Introduction to Ethics of Big Data
 

Último

Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 

Último (20)

Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 

Strata Conference NY: The Accidental Chief Privacy Officer

  • 1. Austin Alleman@allemanau The Accidental Chief Privacy Officer Jim AdlerChief Privacy Officer & General Manager, Data SystemsIntelius twitter: @jim_adlerhttp://jimadler.me Strata Conference, New YorkSeptember 2011
  • 2. Direct-to-consumer provider of public information about people and businesses. Discover each other to make better decisions and empower yourself to take control of your reputation. comScore top 100 site, 11M unique, paying customers. About INTELIUS
  • 3. Billions of Records 300 Million People The “Big Data” People Search Problem 213 records mapped to the correct 37 Jim Adlers Randolph Hutchins 5 People Philip Collins 375 People Jim Adler 213 Records37 People Jim Adler McKinney, TX Age 57 Gwen Fleming 2 People Jim Adler Houston, TX Age 68 Carol Brooks 9800 Records 1250 People Jim Adler Hastings, NE Age 32 Jim Adler Canaan, NH Age 59 Jim Adler Redmond, WA Age 48 Jim Adler Denver, CO Age 48
  • 5. Intelligence I am not an Attorney Geek Dweeb Nerd SocialIneptitude Obsession Dork
  • 6.
  • 7. Mark Zuckerberg Real Names Richard Feynman Physics Norio Ohga Sony President 74 min CD Jeff Jonas Big Data Privacy by Design Steve Jobs ‘nuff said Eclectic Innovators
  • 8. Agenda Innocence Frontier Regulation Innovation Austin Alleman@allemanau
  • 10. The surface web is small… 167 Terabytes
  • 11. Compared to the deep web… 91,000 Terabytes
  • 12. ~20Exabytes (20B GB) Data from dawn of civilization through 2002 Data from April 2011
  • 13. Reconnecting out-of-touch family members Online shoppers verifying online sellers Caller ID of harassing phone calls Law enforcement Banking Services Adopted kids seeking their biological parents Learning about a business Airlines trying to return lost luggage Networkers seeking business opportunities Social networkers looking to expand their friends list Professionals learning about colleagues at conferences Social workers who need to know more about their clients Singles curious about the people they meet Lawyers needing quick access to court records Find owner of dog’s relative for transplant Genealogists cultivating their family tree Investigative journalists running down leads Checking out a prospective tenant Research Sales professionals looking for new prospects Non-profit organizations looking for supporters Alumni groups arranging reunions Parents ensuring who their kids safety Anyone retrieving court records Businesses that need to update contact information on customers Checking out a prospective date Finding people that have the same illness as you Sharing Those in legally entangled looking for court records Anyone who need address histories for passports Fiancés and their curious family members Anyone curious about who's emailing or calling them Checking out a prospective social network connection Finding long-lost friends, military buddies, roommates, or classmates Researching a prospective employee Regulated For lots of reasons… (some regulated)
  • 14. Providing major benefits… 51% “major benefit” is ease and convenience 41% “major benefit” is portability 39% “major benefit is sharing Use of Cloud Computing Applications and Services, Pew 2008
  • 15. But real concerns… 90% “very concerned” if data sold 80% “very concerned” if photos used for marketing 68% “very concerned” if data used to serve them ads Use of Cloud Computing Applications and Services, Pew 2008
  • 16. A Prescient Venn Diagram?
  • 18. When towns were small …
  • 19. “The only thing worse than being talked about, is not being talked about.”− Oscar Wilde Density↓ ->Anonymity↓ ->Privacy Expectation↓
  • 20. “Good Fences Make Good Neighbors” - Mending Wall, Robert Frost Density↑ ->Anonymity↑ ->Privacy Expectation↑
  • 21. “In times of rapid change, experience could be your worst enemy.” − J. Paul Getty #@?$!! “Privacy Vertigo” Density↓ ->Anonymity↓ ->Privacy Expectation↓
  • 22. What’s in a Nym? Source: Intelius
  • 24. So, how do we think about public and private now?
  • 25. Public speaking is publicly public
  • 26. Voting is a privately public
  • 27. And some things are publicly private
  • 28. Your home is clearly private
  • 29. And the Constitution protects your privacy from government …
  • 30. But no Constitutional protections between citizens
  • 31. It would be nice … to use familiar framework
  • 34. Cloud dating is public confidential
  • 35. FIPPs “Privacy by Design” Consent unnecessary for commonly accepted practices Increased transparency Federal Trade Commission Guidance
  • 37. “Policy” Confusion Matrix Regulations Violations
  • 39. Compliance “Evolved” Raw Materials CPO Product Development Marketing Quality Acceptance Release Compliance
  • 40.   Hilary Mason’s Maxim Math + Code = Awesome Quants Making a killing on Wall Street but still can’t impress the chicks Weakonomics.com
  • 41. Corollary to Mason’s Maxim Values * (Math + Code) = Awesome
  • 42. First Social Network: The Dinner Table We eat. We share.
  • 44. ~10,000 GCal ~20Exabytes (20B GB) Data in April 2011 Food in April 2011
  • 45. Food Policy Leads Privacy Policy Peanut Butter Hearings Pure FoodAct Labeling Reform FTC Est. CivilRights “SnakeOil” GMO Social MediaAdoption “RobberBarons” Packaged Foods FCRA
  • 46. “Give Peas a Chance” Monsanto’s Corn Mendel’s Peas ? =
  • 47. “Give me the bad news first, Doc” = “CDC reports investigations of outbreaks” “46 states & DC require notification of a databreach. National legislation upcoming.”
  • 49. Transparency Allows Data Driven Decisions
  • 50. = YOU % % % % % %
  • 51. Control comes from Awareness TrueRep.com Awareness and control of your public profile Privacy controls Reputation management Stay tuned …
  • 52.
  • 53. Innovation is a team sport Drive confluence of influencewithin your org Be the happy warrior Find clarity within confusion Reports of privacy’s death have been greatly exaggerated …
  • 54. Questions? Jim AdlerChief Privacy Officer & General Manager, Data SystemsIntelius twitter: @jim_adlerhttp://jimadler.me Strata Conference, New YorkSeptember 2011