SlideShare a Scribd company logo
1 of 17
Candice Martinez
Deliberate Reasoning
Amazon Kindle Fire
• Silk Browser raises controversy
• Split browser partially operates from cloud
server
• Kindle Fire only allows the Silk Browser
http://www.youtube.com/watch?v=VV
sfLnMqOC4
• Joe Bar t on
• Republ i can, Texas
•Ed Mar key
•Democr at ,
Massachusset t
s
What does Amazon plan
on doing with this
information?
How does Amazon plan on
proceeding with a privacy
policy?
Will Amazon collect users’
browsing habits?
has a few questions for Amazon
• Geographic location
• Local time
• Browser used
• Screen resolution
• Time spent on page
• Content on page
• Previous page that was visited
• Internet speed
•Operating system
•Search engine used
•Key words
•Made purchases
•Number of made purchases
•Value of made purchases
•Number of visits
Compiled Data
‫ﺳ‬Discussion forums
‫ﺳ‬Blogs
‫ﺳ‬Message boards
‫ﺳ‬Social networking
sites
d u e t o a n E v o l v i n g I n d u s t r y
Products and Services
Products and Services
Consumer Habits and Behaviors
Consumer Habits and Behaviors
"The r i ght of t he peopl e t o be
secur e i n t hei r par ent s,
houses, paper s, and ef f ect s,
agai nst unr easonabl e
sear ches and sei zur es,
shal l not be vi ol at ed and
no war r ant s shal l i ssue, but
upon pr obabl e cause,
suppor t ed by oat h or
af f i r mat i on, and
par t i cul ar l y descr i bi ng
t he pl ace t o be sear ched,
and t he per sons of t hi ngs
t o be sei zed."
1. There has to be a
reasonable and logical
expectation of privacy.
2. General society
renders this
expectation as
acceptable custom.
Landmark Cases Two-Step Test
Reasonably released information; waives Fourth Amendment
protection once provided to an entity “upon supported by
affirmation.”
Federal Trade Commission Act of
1914
A) Prevent unfair methods of competition, and unfair or
deceptive acts or practices in or affecting commerce
B) Seek monetary redress and other relief for conduct
injurious to consumers
C) Prescribe trade regulation rules defining with
specificity acts or practices that are unfair or
deceptive, and establishing requirements designed to
prevent such acts or practices
D) Conduct investigations relating to the organization,
business, practices, and management of entities
engaged in commerce
E) Make reports and legislative recommendations to
Congress.
G
O
O
G
L
E
B
U
Z
Z
Sweet! Check out my buzz
Nah, go to my inbox
Made users’ contacts public without their knowledge
Followers were already setup
It did not fully removed user from the social network
“When you sign up for a particular service that
requires registration, we ask you to provide
personal information. If we use this information
for in a manner different than the purpose for
which it was collected , then we ask for your
consent prior to such use.”
October 2004 until October 2010
Gmail Privacy Policy
“Gmail stores, processes, and maintains
your messages, contact lists, and other
data related to your recent account in
order to provide the service to you.”
“Google adheres to the U.S. Safe Harbor
Privacy Principles of Notice, Choice,
Onward Transfer, Security, Data Integrity,
Access and Enforcement, and is registered
with the U.S. Department of Commerce’s
Safe Harbor Program.”
1) “Comprehensive privacy
program”
2) Privacy audits throughout the
next 20 years
http://www.youtube.com/watch?v=852OTK6IQ2A
"Fi ndi ng
i nt er connect i o
ns bet ween
peopl e,
compani es, and
cl i ent
act i vi t i es."
. -
LexisNexis
website
Provides data and tools for examining
A person’s actions are
involuntary :
1) Action is caused by an
external force
2) Actions were based on
ignorance.
“This is the first shot in the new
war for replacing the internet
with a privatized merchant data
aggregation network.”

More Related Content

Similar to Compiling data from the cloud. Make it rain ones and zeros

Online privacy; myth or reality?
Online privacy; myth or reality?Online privacy; myth or reality?
Online privacy; myth or reality?Swaleh Ahmed
 
Free geek class on Data privacy
Free geek class on Data privacyFree geek class on Data privacy
Free geek class on Data privacyJoshua Johnston
 
Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Matthew Asbell
 
Challenge Academy June 2018 - Digital Marketing, Web Traffic and Ecommerce
Challenge Academy June 2018 - Digital Marketing, Web Traffic and Ecommerce Challenge Academy June 2018 - Digital Marketing, Web Traffic and Ecommerce
Challenge Academy June 2018 - Digital Marketing, Web Traffic and Ecommerce OutserveWeb
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentationChande Kasita
 
Top Questions Asked About the CCPA
Top Questions Asked About the CCPATop Questions Asked About the CCPA
Top Questions Asked About the CCPARyan Foster
 
Terms of Use and Privacy Policy Best Practices
Terms of Use and Privacy Policy Best PracticesTerms of Use and Privacy Policy Best Practices
Terms of Use and Privacy Policy Best PracticesRoger Royse
 
Ethical, social and political issues raised by e commerce
Ethical, social and political issues raised by e commerceEthical, social and political issues raised by e commerce
Ethical, social and political issues raised by e commerceNicholas Davis
 
Ethical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceEthical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceNicholas Davis
 
Websites: do you tick all the boxes?
Websites: do you tick all the boxes?Websites: do you tick all the boxes?
Websites: do you tick all the boxes?walescva
 
CAN SPAM Legislation: Is your organization ready?
CAN SPAM Legislation: Is your organization ready?CAN SPAM Legislation: Is your organization ready?
CAN SPAM Legislation: Is your organization ready?Violeta Cohen
 
Big Data, Big Investment
Big Data, Big InvestmentBig Data, Big Investment
Big Data, Big InvestmentGGV Capital
 
Ethical Digital Marketing for Lawyers
Ethical Digital Marketing for LawyersEthical Digital Marketing for Lawyers
Ethical Digital Marketing for LawyersStacey Burke
 
5) How charities can protect themselves against data reform - ‘Emerging Digit...
5) How charities can protect themselves against data reform - ‘Emerging Digit...5) How charities can protect themselves against data reform - ‘Emerging Digit...
5) How charities can protect themselves against data reform - ‘Emerging Digit...Code Computerlove
 

Similar to Compiling data from the cloud. Make it rain ones and zeros (20)

Online privacy; myth or reality?
Online privacy; myth or reality?Online privacy; myth or reality?
Online privacy; myth or reality?
 
Online privacy
Online privacyOnline privacy
Online privacy
 
Free geek class on Data privacy
Free geek class on Data privacyFree geek class on Data privacy
Free geek class on Data privacy
 
Big data
Big dataBig data
Big data
 
Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10
 
Challenge Academy June 2018 - Digital Marketing, Web Traffic and Ecommerce
Challenge Academy June 2018 - Digital Marketing, Web Traffic and Ecommerce Challenge Academy June 2018 - Digital Marketing, Web Traffic and Ecommerce
Challenge Academy June 2018 - Digital Marketing, Web Traffic and Ecommerce
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
 
Top Questions Asked About the CCPA
Top Questions Asked About the CCPATop Questions Asked About the CCPA
Top Questions Asked About the CCPA
 
Terms of Use and Privacy Policy Best Practices
Terms of Use and Privacy Policy Best PracticesTerms of Use and Privacy Policy Best Practices
Terms of Use and Privacy Policy Best Practices
 
Comply
ComplyComply
Comply
 
Ethical, social and political issues raised by e commerce
Ethical, social and political issues raised by e commerceEthical, social and political issues raised by e commerce
Ethical, social and political issues raised by e commerce
 
Ethical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceEthical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E Commerce
 
Websites: do you tick all the boxes?
Websites: do you tick all the boxes?Websites: do you tick all the boxes?
Websites: do you tick all the boxes?
 
Casl 2012 Final
Casl 2012 FinalCasl 2012 Final
Casl 2012 Final
 
CAN SPAM Legislation: Is your organization ready?
CAN SPAM Legislation: Is your organization ready?CAN SPAM Legislation: Is your organization ready?
CAN SPAM Legislation: Is your organization ready?
 
Big Data, Big Investment
Big Data, Big InvestmentBig Data, Big Investment
Big Data, Big Investment
 
Spa bath accessories
Spa bath accessoriesSpa bath accessories
Spa bath accessories
 
Balancing Privacy and Digitization
Balancing Privacy and DigitizationBalancing Privacy and Digitization
Balancing Privacy and Digitization
 
Ethical Digital Marketing for Lawyers
Ethical Digital Marketing for LawyersEthical Digital Marketing for Lawyers
Ethical Digital Marketing for Lawyers
 
5) How charities can protect themselves against data reform - ‘Emerging Digit...
5) How charities can protect themselves against data reform - ‘Emerging Digit...5) How charities can protect themselves against data reform - ‘Emerging Digit...
5) How charities can protect themselves against data reform - ‘Emerging Digit...
 

Recently uploaded

Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideStefan Dietze
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPTiSEO AI
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?Paolo Missier
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 

Recently uploaded (20)

Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 

Compiling data from the cloud. Make it rain ones and zeros

  • 3. Amazon Kindle Fire • Silk Browser raises controversy • Split browser partially operates from cloud server • Kindle Fire only allows the Silk Browser http://www.youtube.com/watch?v=VV sfLnMqOC4
  • 4. • Joe Bar t on • Republ i can, Texas •Ed Mar key •Democr at , Massachusset t s What does Amazon plan on doing with this information? How does Amazon plan on proceeding with a privacy policy? Will Amazon collect users’ browsing habits? has a few questions for Amazon
  • 5. • Geographic location • Local time • Browser used • Screen resolution • Time spent on page • Content on page • Previous page that was visited • Internet speed •Operating system •Search engine used •Key words •Made purchases •Number of made purchases •Value of made purchases •Number of visits Compiled Data
  • 7. d u e t o a n E v o l v i n g I n d u s t r y Products and Services Products and Services Consumer Habits and Behaviors Consumer Habits and Behaviors
  • 8. "The r i ght of t he peopl e t o be secur e i n t hei r par ent s, houses, paper s, and ef f ect s, agai nst unr easonabl e sear ches and sei zur es, shal l not be vi ol at ed and no war r ant s shal l i ssue, but upon pr obabl e cause, suppor t ed by oat h or af f i r mat i on, and par t i cul ar l y descr i bi ng t he pl ace t o be sear ched, and t he per sons of t hi ngs t o be sei zed."
  • 9. 1. There has to be a reasonable and logical expectation of privacy. 2. General society renders this expectation as acceptable custom. Landmark Cases Two-Step Test
  • 10. Reasonably released information; waives Fourth Amendment protection once provided to an entity “upon supported by affirmation.”
  • 11. Federal Trade Commission Act of 1914 A) Prevent unfair methods of competition, and unfair or deceptive acts or practices in or affecting commerce B) Seek monetary redress and other relief for conduct injurious to consumers C) Prescribe trade regulation rules defining with specificity acts or practices that are unfair or deceptive, and establishing requirements designed to prevent such acts or practices D) Conduct investigations relating to the organization, business, practices, and management of entities engaged in commerce E) Make reports and legislative recommendations to Congress.
  • 12. G O O G L E B U Z Z Sweet! Check out my buzz Nah, go to my inbox Made users’ contacts public without their knowledge Followers were already setup It did not fully removed user from the social network “When you sign up for a particular service that requires registration, we ask you to provide personal information. If we use this information for in a manner different than the purpose for which it was collected , then we ask for your consent prior to such use.”
  • 13. October 2004 until October 2010 Gmail Privacy Policy “Gmail stores, processes, and maintains your messages, contact lists, and other data related to your recent account in order to provide the service to you.” “Google adheres to the U.S. Safe Harbor Privacy Principles of Notice, Choice, Onward Transfer, Security, Data Integrity, Access and Enforcement, and is registered with the U.S. Department of Commerce’s Safe Harbor Program.” 1) “Comprehensive privacy program” 2) Privacy audits throughout the next 20 years
  • 15. "Fi ndi ng i nt er connect i o ns bet ween peopl e, compani es, and cl i ent act i vi t i es." . - LexisNexis website Provides data and tools for examining
  • 16. A person’s actions are involuntary : 1) Action is caused by an external force 2) Actions were based on ignorance.
  • 17. “This is the first shot in the new war for replacing the internet with a privatized merchant data aggregation network.”