SlideShare a Scribd company logo
1 of 27
COOKIES


The Practitioner‟s Perspective



Presentation by Daragh O Brien, Regulatory Advisor IDMA and MD Castlebridge Associates.
• This slide deck was prepared for
an Interactive Direct Marketing
Association presentation to the
International Bar Association
Conference 2012
Confusion
What is a Cookie?
                “…is usually a small piece of data sent
                   from a website and stored in a
                  user's web browser while a user is
                  browsing a website” (Wikipedia)


                …”cookies are small, often encrypted
               text files, located in browser directories”
                           (allaboutcookies.org)


               “A cookie is information that a Web site
                 puts on your hard disk so that it can
                remember something about you at a
                              later time.”
              (http://searchsoftwarequality.techtarget.com/
                             definition/cookie)
What SI336 says…
• (3) A person shall not use an electronic communications network to store information, or to
  gain access to information already stored in the terminal equipment of a subscriber or user,
  unless
   (a) the subscriber or user has given his or her consent to that use, and
   (b) the subscriber or user has been provided with clear and comprehensive information in accordance
   with the Data Protection Acts which—
      • (i) is both prominently displayed and easily accessible, and
      • (ii) includes, without limitation, the purposes of the processing of the information.

• (4) For the purpose of paragraph (3), the methods of providing information and giving
  consent should be as user-friendly as possible. Where it is technically possible and effective,
  having regard to the relevant provisions of the Data Protection Acts, the user‟s consent to
  the storing of information or to gaining access to information already stored may be given by
  the use of appropriate browser settings or other technological application by means of which
  the user can be considered to have given his or her consent.
• (5) Paragraph (3) does not prevent any technical storage of, or access to, information for the
  sole purpose of carrying out the transmission of a communication over an electronic
  communications network or which is strictly necessary in order to provide an information
  society service explicitly requested by the subscriber or user.
Which Means?

             The Legislation
           covers a LOT more
              than just text
              Cookies and
                Browsers
•   Flash Local Objects

  •   Apps storing data
  •   SQLite databases



                                       •   HTML 5
                                            Local
                                           Storage



• Traditional
 browser cookies
   (plus SQLite,
   Flash, HTML5




        • Traditional
                                           •   Data
         browser cookies
                                             logging
           (plus SQLite,
                                           • Usage
           Flash, HTML5
                                               data
Exceptions?



                   Strictly Necessary?
              Information Society Service?

                 Explicitly Requested?
“So far, for 50 years, the
 information revolution has
   centered on data—their
     collection, storage,
transmission, analysis, and
     presentation. It has
  centered on the "T" in IT.

   The next information
revolution asks, what is the
 MEANING of information,
and what is its PURPOSE?”
Directive does not specify how consent
Questions of Consent & Guidance
                       should be obtained.

            ICO in the UK allowed “implied consent” at
                          the last minute.

            A29 Working Group Opinion (subsequently)
                 focused on “informed consent”.

               Guidance (to date) has focused on
            traditional web browser and flash cookies.
DPC Guidance
• Non-third party cookies:
   • Prominent Notice giving information on Cookies with ability to
      click through and make an informed choice re: consent


• Cookies in General:
 • Consent should be user friendly as possible
 • Require clear communication about what the user is being asked to
   consent to
 • A means of giving or refusing consent to data being stored or
   retrieved
Varying Degrees of Compliance
       utilities
   telecomms
        media
         legal
    insurance
industry group
  government
     financial
    consulting
       charity

                   0%      20%          40%            60%         80%          100%
    Mentioned in Privacy Statement   No Notice Given   Cookies Policy   Cookie Notice
An example of Compliance Confusion




   UK Website for a major multinational professional services
                            firm.
An example of Compliance Confusion




      Irish Website of same Professional Services firm.
Announcement on 5th September by leading UK web design firm that developed a leading Cookie Compliance
                                              solution
Don’t endorse this approach

                                          But can understand




Screen grab of Silktide.com’s “No Cookie Law” website
              (www.nocookielaw.com)
Motivation
• Unaware of what needs to be
  done?
• Aware but not willing to make
  changes until their peers are
  making changes?
Yes, I know we are not compliant but none of
our competitors are either. Given the limits on
our budgets we can‟t even begin to put those
changes on the table for discussion until our
competitors are also being forced to make the
change.
We don‟t see a “first mover advantage” here if
there is no enforcement and if the penalty is
less than the cost of development.




 It doesn’t help that Government and EU
   departments have failed to bring their
      websites and mobile apps into
               compliance.
A change of mind set and culture is
                             required
Compliance =
  GOOD!!       Cookies need to be seen as data assets
               that your organisation wants to store in
                      someone else’s property

               The focus needs to shift to PRIVACY not
               the Technology. Meaning and intent of
                    the stored data is imperative

                  Professional bodies like IDMA can
                      promote good practice.

                       Regulators must enforce

               Legal Counsel must look to the Meaning
                      and Purpose of Cookies
Is Self Regulation an Option?

                                                  • Comments here are not
                                                   necessarily the views of the
                                                   IDMA and are the
                                                   speaker‟s personal
                                                   opinions.




                  © Adam Zyglis
2008, http://www.adamzyglis.com/cartoon787.html
Self-Regulation  Light Touch  Rigid Rules




Self Policing /                                    Sensible
Peer Policing                                   Enforcement
                                                      &
                                                Enforceability
Self-Regulation  Light Touch  Rigid Rules




               Need to learn from mistakes and
               successes of other Regulatory
               regimes and laws.
Evidence based policy
                      objectives and
                      governance requirements
                      are key

“The Information Commissioner Christopher
Graham has questioned the effectiveness of the
EU cookie directive, suggesting that it was
„dreamed up by politicians in Brussels‟ without the
appropriate market research to back it up.”
                     - quoted in TechWorld.com, 15/09/2012
"More and more citizens and
consumers are waking up to the
implications of sharing personal
 data online," he said. "By fresh
 thinking that recognises where
     the consumer is coming
 from, we can develop policies
        that really work.“
 (speaking at launch of “Data Dialogue” Report, Sept 2012)
Solutions ?
Good Information Management culture

1.   Recognise cookies as a data asset
     •   Bring in advisors who understand Data Governance principles if necessary
     •   Think “Privacy” first, then “Technology”
2.   Think in terms of the process that is using the Data Asset
     •   Is the use of the asset essential to the objective/purpose of the process?
     •   Does the process require data to be shared with 3rd parties?
     •   How „invasive‟ is the process?
     •   Is the process adding value or creating risk?
3.   Document
4.   Promote transparency
     •   A GOOD Privacy Statement that can be read by HUMANS!!!
5.   Keep under regular review
6.   Consider spirit and intent of Directive, not just the literal interpretation.
7.   Implement appropriate (often low cost) solutions to design compliance and
     privacy controls into your processes.
8.   Think about PRIVACY then about TECHNOLOGY

More Related Content

What's hot

Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenienceDon Lovett
 
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...gallowayandcollens
 
Cloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association PresentationCloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association PresentationNicole Black
 
Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter GridEnlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Gridbradley_g
 
GDPR, User Data, Privacy, and Your Apps
GDPR, User Data, Privacy, and Your AppsGDPR, User Data, Privacy, and Your Apps
GDPR, User Data, Privacy, and Your AppsCarl Brown
 
Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"Cathy Dwyer
 
Gayna Hart Presentation - Personalised Healthcare Revolution
Gayna Hart Presentation - Personalised Healthcare RevolutionGayna Hart Presentation - Personalised Healthcare Revolution
Gayna Hart Presentation - Personalised Healthcare RevolutionBath & Bristol Enterprise Network
 
Blockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceBlockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceEryk Budi Pratama
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsIrish Future Internet Forum
 
Privacy by design
Privacy by designPrivacy by design
Privacy by designblogzilla
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYODK Singh
 
Internet of things enabling tech - challenges - opportunities (2016)
Internet of things   enabling tech - challenges - opportunities (2016)Internet of things   enabling tech - challenges - opportunities (2016)
Internet of things enabling tech - challenges - opportunities (2016)Davor Dokonal
 
Security And Legal In The Cloud Ats V2
Security And Legal In The Cloud Ats V2Security And Legal In The Cloud Ats V2
Security And Legal In The Cloud Ats V2dbarton944
 
Big data and information privacy 20190117
Big data and information privacy 20190117Big data and information privacy 20190117
Big data and information privacy 20190117Maria Correia
 
Make it Last: Principals for Digital Preservation and Conservation
Make it Last: Principals for Digital Preservation and ConservationMake it Last: Principals for Digital Preservation and Conservation
Make it Last: Principals for Digital Preservation and ConservationTrevor Owens
 
Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Peter Procházka
 
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...gallowayandcollens
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by DesignUnisys Corporation
 
Closer All The Time: Moving Toward Fiduciary Access to Digital Assets
Closer All The Time: Moving Toward Fiduciary Access to Digital AssetsCloser All The Time: Moving Toward Fiduciary Access to Digital Assets
Closer All The Time: Moving Toward Fiduciary Access to Digital Assetsgallowayandcollens
 
Reinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeReinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeUniversity of Geneva
 

What's hot (20)

Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
 
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
 
Cloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association PresentationCloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association Presentation
 
Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter GridEnlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Grid
 
GDPR, User Data, Privacy, and Your Apps
GDPR, User Data, Privacy, and Your AppsGDPR, User Data, Privacy, and Your Apps
GDPR, User Data, Privacy, and Your Apps
 
Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"
 
Gayna Hart Presentation - Personalised Healthcare Revolution
Gayna Hart Presentation - Personalised Healthcare RevolutionGayna Hart Presentation - Personalised Healthcare Revolution
Gayna Hart Presentation - Personalised Healthcare Revolution
 
Blockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceBlockchain for Accounting & Assurance
Blockchain for Accounting & Assurance
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
 
Privacy by design
Privacy by designPrivacy by design
Privacy by design
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
Internet of things enabling tech - challenges - opportunities (2016)
Internet of things   enabling tech - challenges - opportunities (2016)Internet of things   enabling tech - challenges - opportunities (2016)
Internet of things enabling tech - challenges - opportunities (2016)
 
Security And Legal In The Cloud Ats V2
Security And Legal In The Cloud Ats V2Security And Legal In The Cloud Ats V2
Security And Legal In The Cloud Ats V2
 
Big data and information privacy 20190117
Big data and information privacy 20190117Big data and information privacy 20190117
Big data and information privacy 20190117
 
Make it Last: Principals for Digital Preservation and Conservation
Make it Last: Principals for Digital Preservation and ConservationMake it Last: Principals for Digital Preservation and Conservation
Make it Last: Principals for Digital Preservation and Conservation
 
Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...
 
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by Design
 
Closer All The Time: Moving Toward Fiduciary Access to Digital Assets
Closer All The Time: Moving Toward Fiduciary Access to Digital AssetsCloser All The Time: Moving Toward Fiduciary Access to Digital Assets
Closer All The Time: Moving Toward Fiduciary Access to Digital Assets
 
Reinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeReinstating Trust in the Digital Age
Reinstating Trust in the Digital Age
 

Viewers also liked

UCD Smurfit presentation: Cookies & Online Privacy
UCD Smurfit presentation: Cookies & Online PrivacyUCD Smurfit presentation: Cookies & Online Privacy
UCD Smurfit presentation: Cookies & Online PrivacyLara Zaccaria
 
Data Protection in Big Data world (EDW lighting talk)
Data Protection in Big Data world (EDW lighting talk)Data Protection in Big Data world (EDW lighting talk)
Data Protection in Big Data world (EDW lighting talk)Castlebridge Associates
 
E commerce, social and campaign tracking - web analytics fundamentals
E commerce, social and campaign tracking - web analytics fundamentalsE commerce, social and campaign tracking - web analytics fundamentals
E commerce, social and campaign tracking - web analytics fundamentalsSrikanth Dhondi
 
Basic site survey & design training
Basic site survey & design trainingBasic site survey & design training
Basic site survey & design trainingtulus_pl
 

Viewers also liked (8)

UCD Smurfit presentation: Cookies & Online Privacy
UCD Smurfit presentation: Cookies & Online PrivacyUCD Smurfit presentation: Cookies & Online Privacy
UCD Smurfit presentation: Cookies & Online Privacy
 
EDW Lightning Talk 2014
EDW Lightning Talk 2014EDW Lightning Talk 2014
EDW Lightning Talk 2014
 
Data Protection in Big Data world (EDW lighting talk)
Data Protection in Big Data world (EDW lighting talk)Data Protection in Big Data world (EDW lighting talk)
Data Protection in Big Data world (EDW lighting talk)
 
Daragh O Brien 2014 IAIDQ presidency
Daragh O Brien 2014 IAIDQ presidencyDaragh O Brien 2014 IAIDQ presidency
Daragh O Brien 2014 IAIDQ presidency
 
E commerce, social and campaign tracking - web analytics fundamentals
E commerce, social and campaign tracking - web analytics fundamentalsE commerce, social and campaign tracking - web analytics fundamentals
E commerce, social and campaign tracking - web analytics fundamentals
 
Basic site survey & design training
Basic site survey & design trainingBasic site survey & design training
Basic site survey & design training
 
Heuristic evaluation
Heuristic evaluationHeuristic evaluation
Heuristic evaluation
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Similar to Cookies and Data Protection - a Practitioner's perspective

eBusiness Club "Demystifying the EU Cookie Law presentation, Geldards
eBusiness Club  "Demystifying the EU Cookie Law presentation, GeldardseBusiness Club  "Demystifying the EU Cookie Law presentation, Geldards
eBusiness Club "Demystifying the EU Cookie Law presentation, GeldardsJon Egley
 
Why We Require GDPR?
Why We Require GDPR?Why We Require GDPR?
Why We Require GDPR?Jatin Kochhar
 
Global Data Privacy Regulation
Global Data Privacy RegulationGlobal Data Privacy Regulation
Global Data Privacy RegulationJatin Kochhar
 
Privacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User DataPrivacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User DataPrivacyCenter.cloud
 
Cookies: best practice September 2012 by Fedelma Good, Barclays
Cookies: best practice September 2012 by Fedelma Good, BarclaysCookies: best practice September 2012 by Fedelma Good, Barclays
Cookies: best practice September 2012 by Fedelma Good, Barclaystheidm_quals
 
EU cookie law - What you need to know
EU cookie law - What you need to knowEU cookie law - What you need to know
EU cookie law - What you need to knowCrafted
 
Cookie Law (Dwf 190511)
Cookie Law (Dwf 190511)Cookie Law (Dwf 190511)
Cookie Law (Dwf 190511)RobertMachin
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy ProgramDaniel Ayala
 
CIS14: NSTIC - Why the Identity Ecosystem Steering Group (IDESG)?
CIS14: NSTIC - Why the Identity Ecosystem Steering Group (IDESG)?CIS14: NSTIC - Why the Identity Ecosystem Steering Group (IDESG)?
CIS14: NSTIC - Why the Identity Ecosystem Steering Group (IDESG)?CloudIDSummit
 
Trends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the RisksTrends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the RisksNicole Garton
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSonny Hashmi
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb esSonny Hashmi
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueDeloitte United States
 
Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Catapult
 
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...MicheleNati
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-securityskumartarget
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things NetIQ
 

Similar to Cookies and Data Protection - a Practitioner's perspective (20)

eBusiness Club "Demystifying the EU Cookie Law presentation, Geldards
eBusiness Club  "Demystifying the EU Cookie Law presentation, GeldardseBusiness Club  "Demystifying the EU Cookie Law presentation, Geldards
eBusiness Club "Demystifying the EU Cookie Law presentation, Geldards
 
The DMA conference 2012
The DMA conference 2012The DMA conference 2012
The DMA conference 2012
 
Why We Require GDPR?
Why We Require GDPR?Why We Require GDPR?
Why We Require GDPR?
 
DMA Cookies update
DMA Cookies updateDMA Cookies update
DMA Cookies update
 
Global Data Privacy Regulation
Global Data Privacy RegulationGlobal Data Privacy Regulation
Global Data Privacy Regulation
 
Privacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User DataPrivacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User Data
 
Cookies: best practice September 2012 by Fedelma Good, Barclays
Cookies: best practice September 2012 by Fedelma Good, BarclaysCookies: best practice September 2012 by Fedelma Good, Barclays
Cookies: best practice September 2012 by Fedelma Good, Barclays
 
EU cookie law - What you need to know
EU cookie law - What you need to knowEU cookie law - What you need to know
EU cookie law - What you need to know
 
Cookie Law (Dwf 190511)
Cookie Law (Dwf 190511)Cookie Law (Dwf 190511)
Cookie Law (Dwf 190511)
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Program
 
CIS14: NSTIC - Why the Identity Ecosystem Steering Group (IDESG)?
CIS14: NSTIC - Why the Identity Ecosystem Steering Group (IDESG)?CIS14: NSTIC - Why the Identity Ecosystem Steering Group (IDESG)?
CIS14: NSTIC - Why the Identity Ecosystem Steering Group (IDESG)?
 
Trends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the RisksTrends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the Risks
 
(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for value
 
Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Transformation Business Evolution
Digital Transformation Business Evolution
 
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-security
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 

More from Castlebridge Associates

From Asset to Impact - Presentation to ICS Data Protection Conference 2011
From Asset to Impact - Presentation to ICS Data Protection Conference 2011From Asset to Impact - Presentation to ICS Data Protection Conference 2011
From Asset to Impact - Presentation to ICS Data Protection Conference 2011Castlebridge Associates
 
Enterprise Computing - A Vision of Future Today (Presentation to DCU students)
Enterprise Computing - A Vision of Future Today (Presentation to DCU students)Enterprise Computing - A Vision of Future Today (Presentation to DCU students)
Enterprise Computing - A Vision of Future Today (Presentation to DCU students)Castlebridge Associates
 
Building Information Quality from the Inside Out
Building Information Quality from the Inside OutBuilding Information Quality from the Inside Out
Building Information Quality from the Inside OutCastlebridge Associates
 
From Near to Maturity - Presentation to European Data Forum
From Near to Maturity - Presentation to European Data ForumFrom Near to Maturity - Presentation to European Data Forum
From Near to Maturity - Presentation to European Data ForumCastlebridge Associates
 
Bring Your Own Device - a Misnamed Concept?
Bring Your Own Device - a Misnamed Concept?Bring Your Own Device - a Misnamed Concept?
Bring Your Own Device - a Misnamed Concept?Castlebridge Associates
 

More from Castlebridge Associates (6)

From Asset to Impact - Presentation to ICS Data Protection Conference 2011
From Asset to Impact - Presentation to ICS Data Protection Conference 2011From Asset to Impact - Presentation to ICS Data Protection Conference 2011
From Asset to Impact - Presentation to ICS Data Protection Conference 2011
 
Enterprise Computing - A Vision of Future Today (Presentation to DCU students)
Enterprise Computing - A Vision of Future Today (Presentation to DCU students)Enterprise Computing - A Vision of Future Today (Presentation to DCU students)
Enterprise Computing - A Vision of Future Today (Presentation to DCU students)
 
Building Information Quality from the Inside Out
Building Information Quality from the Inside OutBuilding Information Quality from the Inside Out
Building Information Quality from the Inside Out
 
From Near to Maturity - Presentation to European Data Forum
From Near to Maturity - Presentation to European Data ForumFrom Near to Maturity - Presentation to European Data Forum
From Near to Maturity - Presentation to European Data Forum
 
Bring Your Own Device - a Misnamed Concept?
Bring Your Own Device - a Misnamed Concept?Bring Your Own Device - a Misnamed Concept?
Bring Your Own Device - a Misnamed Concept?
 
Introduction to Information Quality
Introduction to Information QualityIntroduction to Information Quality
Introduction to Information Quality
 

Recently uploaded

Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17Celine George
 
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxslides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxCapitolTechU
 
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya - UEM Kolkata Quiz Club
 
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...Nguyen Thanh Tu Collection
 
Navigating the Misinformation Minefield: The Role of Higher Education in the ...
Navigating the Misinformation Minefield: The Role of Higher Education in the ...Navigating the Misinformation Minefield: The Role of Higher Education in the ...
Navigating the Misinformation Minefield: The Role of Higher Education in the ...Mark Carrigan
 
The Ultimate Guide to Social Media Marketing in 2024.pdf
The Ultimate Guide to Social Media Marketing in 2024.pdfThe Ultimate Guide to Social Media Marketing in 2024.pdf
The Ultimate Guide to Social Media Marketing in 2024.pdfdm4ashexcelr
 
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdfPost Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdfPragya - UEM Kolkata Quiz Club
 
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45MysoreMuleSoftMeetup
 
Championnat de France de Tennis de table/
Championnat de France de Tennis de table/Championnat de France de Tennis de table/
Championnat de France de Tennis de table/siemaillard
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfQucHHunhnh
 
An Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxAn Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxCeline George
 
ppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyesppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyesashishpaul799
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Mohamed Rizk Khodair
 
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17Celine George
 
The Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. HenryThe Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. HenryEugene Lysak
 
The Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational ResourcesThe Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational Resourcesaileywriter
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticspragatimahajan3
 
philosophy and it's principles based on the life
philosophy and it's principles based on the lifephilosophy and it's principles based on the life
philosophy and it's principles based on the lifeNitinDeodare
 

Recently uploaded (20)

Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17
 
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxslides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
 
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
 
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
 
Navigating the Misinformation Minefield: The Role of Higher Education in the ...
Navigating the Misinformation Minefield: The Role of Higher Education in the ...Navigating the Misinformation Minefield: The Role of Higher Education in the ...
Navigating the Misinformation Minefield: The Role of Higher Education in the ...
 
“O BEIJO” EM ARTE .
“O BEIJO” EM ARTE                       .“O BEIJO” EM ARTE                       .
“O BEIJO” EM ARTE .
 
The Ultimate Guide to Social Media Marketing in 2024.pdf
The Ultimate Guide to Social Media Marketing in 2024.pdfThe Ultimate Guide to Social Media Marketing in 2024.pdf
The Ultimate Guide to Social Media Marketing in 2024.pdf
 
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdfPost Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
 
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
 
Championnat de France de Tennis de table/
Championnat de France de Tennis de table/Championnat de France de Tennis de table/
Championnat de France de Tennis de table/
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
 
Word Stress rules esl .pptx
Word Stress rules esl               .pptxWord Stress rules esl               .pptx
Word Stress rules esl .pptx
 
An Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxAn Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptx
 
ppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyesppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyes
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).
 
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
 
The Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. HenryThe Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. Henry
 
The Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational ResourcesThe Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational Resources
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceutics
 
philosophy and it's principles based on the life
philosophy and it's principles based on the lifephilosophy and it's principles based on the life
philosophy and it's principles based on the life
 

Cookies and Data Protection - a Practitioner's perspective

  • 1. COOKIES The Practitioner‟s Perspective Presentation by Daragh O Brien, Regulatory Advisor IDMA and MD Castlebridge Associates.
  • 2. • This slide deck was prepared for an Interactive Direct Marketing Association presentation to the International Bar Association Conference 2012
  • 4. What is a Cookie? “…is usually a small piece of data sent from a website and stored in a user's web browser while a user is browsing a website” (Wikipedia) …”cookies are small, often encrypted text files, located in browser directories” (allaboutcookies.org) “A cookie is information that a Web site puts on your hard disk so that it can remember something about you at a later time.” (http://searchsoftwarequality.techtarget.com/ definition/cookie)
  • 5. What SI336 says… • (3) A person shall not use an electronic communications network to store information, or to gain access to information already stored in the terminal equipment of a subscriber or user, unless (a) the subscriber or user has given his or her consent to that use, and (b) the subscriber or user has been provided with clear and comprehensive information in accordance with the Data Protection Acts which— • (i) is both prominently displayed and easily accessible, and • (ii) includes, without limitation, the purposes of the processing of the information. • (4) For the purpose of paragraph (3), the methods of providing information and giving consent should be as user-friendly as possible. Where it is technically possible and effective, having regard to the relevant provisions of the Data Protection Acts, the user‟s consent to the storing of information or to gaining access to information already stored may be given by the use of appropriate browser settings or other technological application by means of which the user can be considered to have given his or her consent. • (5) Paragraph (3) does not prevent any technical storage of, or access to, information for the sole purpose of carrying out the transmission of a communication over an electronic communications network or which is strictly necessary in order to provide an information society service explicitly requested by the subscriber or user.
  • 6. Which Means? The Legislation covers a LOT more than just text Cookies and Browsers
  • 7. Flash Local Objects • Apps storing data • SQLite databases • HTML 5 Local Storage • Traditional browser cookies (plus SQLite, Flash, HTML5 • Traditional • Data browser cookies logging (plus SQLite, • Usage Flash, HTML5 data
  • 8. Exceptions? Strictly Necessary? Information Society Service? Explicitly Requested?
  • 9. “So far, for 50 years, the information revolution has centered on data—their collection, storage, transmission, analysis, and presentation. It has centered on the "T" in IT. The next information revolution asks, what is the MEANING of information, and what is its PURPOSE?”
  • 10. Directive does not specify how consent Questions of Consent & Guidance should be obtained. ICO in the UK allowed “implied consent” at the last minute. A29 Working Group Opinion (subsequently) focused on “informed consent”. Guidance (to date) has focused on traditional web browser and flash cookies.
  • 11. DPC Guidance • Non-third party cookies: • Prominent Notice giving information on Cookies with ability to click through and make an informed choice re: consent • Cookies in General: • Consent should be user friendly as possible • Require clear communication about what the user is being asked to consent to • A means of giving or refusing consent to data being stored or retrieved
  • 12. Varying Degrees of Compliance utilities telecomms media legal insurance industry group government financial consulting charity 0% 20% 40% 60% 80% 100% Mentioned in Privacy Statement No Notice Given Cookies Policy Cookie Notice
  • 13. An example of Compliance Confusion UK Website for a major multinational professional services firm.
  • 14. An example of Compliance Confusion Irish Website of same Professional Services firm.
  • 15. Announcement on 5th September by leading UK web design firm that developed a leading Cookie Compliance solution
  • 16. Don’t endorse this approach But can understand Screen grab of Silktide.com’s “No Cookie Law” website (www.nocookielaw.com)
  • 18. • Unaware of what needs to be done? • Aware but not willing to make changes until their peers are making changes?
  • 19. Yes, I know we are not compliant but none of our competitors are either. Given the limits on our budgets we can‟t even begin to put those changes on the table for discussion until our competitors are also being forced to make the change. We don‟t see a “first mover advantage” here if there is no enforcement and if the penalty is less than the cost of development. It doesn’t help that Government and EU departments have failed to bring their websites and mobile apps into compliance.
  • 20. A change of mind set and culture is required Compliance = GOOD!! Cookies need to be seen as data assets that your organisation wants to store in someone else’s property The focus needs to shift to PRIVACY not the Technology. Meaning and intent of the stored data is imperative Professional bodies like IDMA can promote good practice. Regulators must enforce Legal Counsel must look to the Meaning and Purpose of Cookies
  • 21. Is Self Regulation an Option? • Comments here are not necessarily the views of the IDMA and are the speaker‟s personal opinions. © Adam Zyglis 2008, http://www.adamzyglis.com/cartoon787.html
  • 22. Self-Regulation  Light Touch  Rigid Rules Self Policing / Sensible Peer Policing Enforcement & Enforceability
  • 23. Self-Regulation  Light Touch  Rigid Rules Need to learn from mistakes and successes of other Regulatory regimes and laws.
  • 24. Evidence based policy objectives and governance requirements are key “The Information Commissioner Christopher Graham has questioned the effectiveness of the EU cookie directive, suggesting that it was „dreamed up by politicians in Brussels‟ without the appropriate market research to back it up.” - quoted in TechWorld.com, 15/09/2012
  • 25. "More and more citizens and consumers are waking up to the implications of sharing personal data online," he said. "By fresh thinking that recognises where the consumer is coming from, we can develop policies that really work.“ (speaking at launch of “Data Dialogue” Report, Sept 2012)
  • 27. Good Information Management culture 1. Recognise cookies as a data asset • Bring in advisors who understand Data Governance principles if necessary • Think “Privacy” first, then “Technology” 2. Think in terms of the process that is using the Data Asset • Is the use of the asset essential to the objective/purpose of the process? • Does the process require data to be shared with 3rd parties? • How „invasive‟ is the process? • Is the process adding value or creating risk? 3. Document 4. Promote transparency • A GOOD Privacy Statement that can be read by HUMANS!!! 5. Keep under regular review 6. Consider spirit and intent of Directive, not just the literal interpretation. 7. Implement appropriate (often low cost) solutions to design compliance and privacy controls into your processes. 8. Think about PRIVACY then about TECHNOLOGY