SlideShare uma empresa Scribd logo
1 de 32
Baixar para ler offline
Visualizing Privacy! 
Morgan Eisler (@mogasaur)! 
UX Researcher! 
2014 
! 
! 
10/09/14! 
#GHC14 
2014
2014
2014
2014
TL;DR! 
2014
2014
2014
2014 
Users With! 
Data Exposed! 
Data! 
Breaches!
2014
2014
2014
The NTIA Code of Conduct! 
§ Categories of Data Collected:! 
− Biometrics! 
− Browser History! 
− Phone or Text Log! 
− Contacts! 
− Financial Info! 
− Health, medical, or therapy info! 
− Location! 
− User Files! 
2014
The NTIA Code of Conduct! 
§ Entities Data is Shared With:! 
− Ad Networks! 
− Carriers! 
− Consumer Data Resellers! 
− Data Analytics Providers! 
− Government Entities! 
− Operating Systems and Platforms! 
− Other Apps! 
− Social Networks! 
2014
2014
2014
“I think this signifies a company 
that is very conscientious. A 
company that cares about people's 
privacy and is aware of people's 
concerns about how their 
information will be gathered, 
shared, and used.”! 
" "- Lookout Customer! 
2014 
!
“I think if a privacy policy was 
that way then everybody’s 
policy would get read. It would 
help a lot of people out if it 
looked like this.”! 
" "- Lookout Customer! 
2014
2014
2014
2014
2014
2014
Final Thoughts! 
§ Be more transparent! 
§ Inspire trust! 
§ Improve comprehension! 
§ Keep in mind:! 
− A short form policy is not a replacement for a 
2014 
full-length policy! 
− Make sure that users understand that a short 
form policy is just that!
References 
§ 2013, 9 May.“More than 2 billion people use 
the internet, here’s what they’re up to 
(inforgraphic)”. The Cultureist. Retrieved 
from <http://www.thecultureist.com/ 
2013/05/09/how-many-people-use-the-internet- 
more-than-2-billion-infographic/>.! 
§ O’Toole, James. 2014, 28 February. “Mobile 
apps overtake PC internet usage in U.S.”. 
CNN Money. Retrieved from http:// 
money.cnn.com/2014/02/28/technology/ 
mobile/mobile-apps-internet/>.! 
2014
References 
§ Ezor, Jonathan I. 2009, 12 August. “Why your 
web site’s privacy policy matters more than 
you think.” Bloomberg Businessweek. 
Retrieved from <http:// 
www.businessweek.com/smallbiz/ 
running_small_business/archives/2009/08/ 
why_web_site_pr.html>.! 
§ ,2012. “ Global Internet User Survey 
Summary Report”. The Internet Society. 
Retrieved from <https:// 
www.internetsociety.org/sites/default/files/ 
rep-GIUS2012global-201211-en.pdf>.! 
2014
References 
§ 2009, 10 March. “TRUSTe survey findings 
indicate majority of small business neglect 
vital privacy measures” [press release]. 
TRUSTe. Retrieved from <http:// 
www.truste.com/about-TRUSTe/press-room/ 
news_truste_smb_neglect_privacy>.! 
§ Bilton, Nick. 2010, 12 May. “Price of 
Facebook privacy? Start clicking.” The New 
York Times. Retrieved from <http:// 
www.nytimes.com/2010/05/13/technology/ 
personaltech/13basics.html? 
src=tptw&_r=0>.! 
2014
References 
§ Vedantam, Shankar. 2012, 19 April. “To read all 
those web privacy policies, just take a month off 
work.” NPR. Retrieved from <http:// 
www.npr.org/blogs/alltechconsidered/ 
2012/04/19/150905465/to-read-all-those-web-privacy- 
policies-just-take-a-month-off-work>.! 
§ McDonald, Aleecia M. & Faith Cranor, Lorrie, 
2008. “The cost of reading privacy policies.” I/ 
S: A Journal of Law and Policy for the 
Information Society, 2008 Privacy Year in 
Review Issue. Retrieved from <http:// 
lorrie.cranor.org/pubs/readingPolicyCost-authorDraft. 
2014 
pdf>.!
References 
§ Westerman, Ilana. 2013, 3 June. “What 
misconceptions do consumers have about 
privacy?” IAPP. Retrieved from <https:// 
privacyassociation.org/news/a/what-misconceptions- 
do-consumers-have-about-privacy/>. 
2014 
! 
§ Weise, Elizabeth. 2014, 24 September. “43% 
of companies had a data breach in the past 
year.” USA Today. Retrieved from <http:// 
www.usatoday.com/story/tech/2014/09/24/ 
data-breach-companies-60/16106197/>.!
References 
§ Pagliery, Jose. 2014, 28 May. “Half of 
American adults hacked this year.” CNN 
Money. Retrieved from <http:// 
money.cnn.com/2014/05/28/technology/ 
security/hack-data-breach/?iid=EL>.! 
§ Fiegerman, Seth. 2014, 20 June. “Yo gets 
hacked.” Mashable. Retrieved from <http:// 
mashable.com/2014/06/20/yo-gets-hacked/ 
>.! 
2014
References 
§ 2013, 25 July. “Short Form Notice Code of 
Conduct to Promote Transparency in Mobile 
App Practices”. The National 
Telecommunications and Information 
Administration. Retrieved from <http:// 
www.ntia.doc.gov/files/ntia/publications/ 
july_25_code_draft.pdf>.! 
§ 2014, 24 July. “Apps Alliance and Intuit partner 
to release new app privacy tool” [press release]. 
Application Developers Alliance. Retrieved from 
<http://www.appdevelopersalliance.org/news/ 
2014/7/23/new-tool-allows-developers-to-create-consumer- 
friendly-app-privacy-notices>.! 
2014
Links to Tools on GitHub! 
2014 
§ Lookout: ! 
− https://github.com/lookout/private-parts! 
§ Intuit/TRUSTe:! 
− https://github.com/appsalliance/privacynotices! 
§ Mozilla:! 
− https://github.com/flamsmark/privacy-policy-template 
!
Contact/Feedback! 
Questions?! 
MORGAN.EISLER@LOOKOUT.COM or! 
Lookout Booth at the Career Fair! 
! 
Rate and Review the session using the 
GHC Mobile App! 
To download visit www.gracehopper.org! 
2014

Mais conteúdo relacionado

Destaque

The Heroine's Journey World edition
The Heroine's Journey World edition The Heroine's Journey World edition
The Heroine's Journey World edition Peter de Kuster
 
Legal matters
Legal mattersLegal matters
Legal mattersPrgunn1
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google AccountLookout
 
20140905 AWS Night in ITHD LT2
20140905 AWS Night in ITHD LT220140905 AWS Night in ITHD LT2
20140905 AWS Night in ITHD LT2Nobuyuki Matsui
 
Parecer jurídico normativo 36 2011 CFESS
Parecer jurídico normativo 36 2011 CFESSParecer jurídico normativo 36 2011 CFESS
Parecer jurídico normativo 36 2011 CFESSFILIPE NERI
 
Brecha tecnológica y discapacidad.
Brecha tecnológica y discapacidad.Brecha tecnológica y discapacidad.
Brecha tecnológica y discapacidad.José María
 
横手版地方発信のソーシャルメディア
横手版地方発信のソーシャルメディア横手版地方発信のソーシャルメディア
横手版地方発信のソーシャルメディアSkunkWork.Co.,Ltd
 
PHP Hypertext Preprocessor
PHP Hypertext PreprocessorPHP Hypertext Preprocessor
PHP Hypertext Preprocessoradeel990
 
Investing 101: How to Prepare for Retirement
Investing 101: How to Prepare for RetirementInvesting 101: How to Prepare for Retirement
Investing 101: How to Prepare for RetirementExperian_US
 
3 d pie chart circular puzzle with hole in center process stages 11 style 3 p...
3 d pie chart circular puzzle with hole in center process stages 11 style 3 p...3 d pie chart circular puzzle with hole in center process stages 11 style 3 p...
3 d pie chart circular puzzle with hole in center process stages 11 style 3 p...SlideTeam.net
 
生日快乐
生日快乐生日快乐
生日快乐Paul Ni
 
Event Report - Salesforce Dreamforce 2016 - Einstein is show, platform progre...
Event Report - Salesforce Dreamforce 2016 - Einstein is show, platform progre...Event Report - Salesforce Dreamforce 2016 - Einstein is show, platform progre...
Event Report - Salesforce Dreamforce 2016 - Einstein is show, platform progre...Holger Mueller
 
SuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringSuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringTieu Luu
 
Delivering Vertical Social Apps - Dreamforce - 9/18
Delivering Vertical Social Apps - Dreamforce - 9/18Delivering Vertical Social Apps - Dreamforce - 9/18
Delivering Vertical Social Apps - Dreamforce - 9/18Salesforce Partners
 

Destaque (19)

The Heroine's Journey World edition
The Heroine's Journey World edition The Heroine's Journey World edition
The Heroine's Journey World edition
 
Legal matters
Legal mattersLegal matters
Legal matters
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account
 
20140905 AWS Night in ITHD LT2
20140905 AWS Night in ITHD LT220140905 AWS Night in ITHD LT2
20140905 AWS Night in ITHD LT2
 
Parecer jurídico normativo 36 2011 CFESS
Parecer jurídico normativo 36 2011 CFESSParecer jurídico normativo 36 2011 CFESS
Parecer jurídico normativo 36 2011 CFESS
 
Brecha tecnológica y discapacidad.
Brecha tecnológica y discapacidad.Brecha tecnológica y discapacidad.
Brecha tecnológica y discapacidad.
 
横手版地方発信のソーシャルメディア
横手版地方発信のソーシャルメディア横手版地方発信のソーシャルメディア
横手版地方発信のソーシャルメディア
 
ตารางแนวทางกำหนดการจัดเวทีฯ
ตารางแนวทางกำหนดการจัดเวทีฯตารางแนวทางกำหนดการจัดเวทีฯ
ตารางแนวทางกำหนดการจัดเวทีฯ
 
Comic analysis powerpoint
Comic analysis powerpointComic analysis powerpoint
Comic analysis powerpoint
 
PHP Hypertext Preprocessor
PHP Hypertext PreprocessorPHP Hypertext Preprocessor
PHP Hypertext Preprocessor
 
Investing 101: How to Prepare for Retirement
Investing 101: How to Prepare for RetirementInvesting 101: How to Prepare for Retirement
Investing 101: How to Prepare for Retirement
 
Glossary
GlossaryGlossary
Glossary
 
3 d pie chart circular puzzle with hole in center process stages 11 style 3 p...
3 d pie chart circular puzzle with hole in center process stages 11 style 3 p...3 d pie chart circular puzzle with hole in center process stages 11 style 3 p...
3 d pie chart circular puzzle with hole in center process stages 11 style 3 p...
 
生日快乐
生日快乐生日快乐
生日快乐
 
The Link Between Processed Meat and Cancer Risk
The Link Between Processed Meat and Cancer RiskThe Link Between Processed Meat and Cancer Risk
The Link Between Processed Meat and Cancer Risk
 
Event Report - Salesforce Dreamforce 2016 - Einstein is show, platform progre...
Event Report - Salesforce Dreamforce 2016 - Einstein is show, platform progre...Event Report - Salesforce Dreamforce 2016 - Einstein is show, platform progre...
Event Report - Salesforce Dreamforce 2016 - Einstein is show, platform progre...
 
SuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringSuprTEK Continuous Monitoring
SuprTEK Continuous Monitoring
 
Delivering Vertical Social Apps - Dreamforce - 9/18
Delivering Vertical Social Apps - Dreamforce - 9/18Delivering Vertical Social Apps - Dreamforce - 9/18
Delivering Vertical Social Apps - Dreamforce - 9/18
 
Logo
LogoLogo
Logo
 

Semelhante a Visualizing Privacy

GRBN Trust and Personal Data Survey - Market Research Industry Special Report
GRBN Trust and Personal Data Survey - Market Research Industry Special ReportGRBN Trust and Personal Data Survey - Market Research Industry Special Report
GRBN Trust and Personal Data Survey - Market Research Industry Special ReportAndrew Cannon
 
GRBN Trust and Personal Data Survey report - Part 1 - Concern, familiarity, t...
GRBN Trust and Personal Data Survey report - Part 1 - Concern, familiarity, t...GRBN Trust and Personal Data Survey report - Part 1 - Concern, familiarity, t...
GRBN Trust and Personal Data Survey report - Part 1 - Concern, familiarity, t...Andrew Cannon
 
GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...
GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...
GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...Andrew Cannon
 
Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017Steve Mckee
 
ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)Zohra Razaq
 
Mobile Engagement 2012: A Winning Strategy
Mobile Engagement 2012:  A Winning StrategyMobile Engagement 2012:  A Winning Strategy
Mobile Engagement 2012: A Winning StrategyDawn Yankeelov
 
Do you know you the data you are wasting can make you a millionaire
Do you know you the data you are wasting can make you a millionaire Do you know you the data you are wasting can make you a millionaire
Do you know you the data you are wasting can make you a millionaire OboeziAppeal
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy Carolina Rossini
 
Privacy & Data Ethics
Privacy & Data EthicsPrivacy & Data Ethics
Privacy & Data EthicsErik Kokkonen
 
Big Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media NetworksBig Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media NetworksSylvia Ogweng
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...Frances Coronel
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Fullgloriakt
 
Staying on the Right Side of the Fence when Analyzing Human Data
Staying on the Right Side of the Fence when Analyzing Human DataStaying on the Right Side of the Fence when Analyzing Human Data
Staying on the Right Side of the Fence when Analyzing Human DataMolly O'Shea
 
Staying on the Right Side of the Fence when Analyzing Human Data
Staying on the Right Side of the Fence when Analyzing Human DataStaying on the Right Side of the Fence when Analyzing Human Data
Staying on the Right Side of the Fence when Analyzing Human DataDataSift
 
Insight Presentation: "What Wearables Mean For Marketers"
Insight Presentation: "What Wearables Mean For Marketers"Insight Presentation: "What Wearables Mean For Marketers"
Insight Presentation: "What Wearables Mean For Marketers"iMedia Connection
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235brendaylo
 
Demand Media Shares New Insights About Tech Consumers
Demand Media Shares New Insights About Tech Consumers Demand Media Shares New Insights About Tech Consumers
Demand Media Shares New Insights About Tech Consumers DemandMedia
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things The Center for Identity
 

Semelhante a Visualizing Privacy (20)

GRBN Trust and Personal Data Survey - Market Research Industry Special Report
GRBN Trust and Personal Data Survey - Market Research Industry Special ReportGRBN Trust and Personal Data Survey - Market Research Industry Special Report
GRBN Trust and Personal Data Survey - Market Research Industry Special Report
 
GRBN Trust and Personal Data Survey report - Part 1 - Concern, familiarity, t...
GRBN Trust and Personal Data Survey report - Part 1 - Concern, familiarity, t...GRBN Trust and Personal Data Survey report - Part 1 - Concern, familiarity, t...
GRBN Trust and Personal Data Survey report - Part 1 - Concern, familiarity, t...
 
GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...
GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...
GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...
 
Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017
 
ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)
 
Mobile Engagement 2012: A Winning Strategy
Mobile Engagement 2012:  A Winning StrategyMobile Engagement 2012:  A Winning Strategy
Mobile Engagement 2012: A Winning Strategy
 
Do you know you the data you are wasting can make you a millionaire
Do you know you the data you are wasting can make you a millionaire Do you know you the data you are wasting can make you a millionaire
Do you know you the data you are wasting can make you a millionaire
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
 
Privacy & Data Ethics
Privacy & Data EthicsPrivacy & Data Ethics
Privacy & Data Ethics
 
Big Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media NetworksBig Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media Networks
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
 
Staying on the Right Side of the Fence when Analyzing Human Data
Staying on the Right Side of the Fence when Analyzing Human DataStaying on the Right Side of the Fence when Analyzing Human Data
Staying on the Right Side of the Fence when Analyzing Human Data
 
Staying on the Right Side of the Fence when Analyzing Human Data
Staying on the Right Side of the Fence when Analyzing Human DataStaying on the Right Side of the Fence when Analyzing Human Data
Staying on the Right Side of the Fence when Analyzing Human Data
 
Insight Presentation: "What Wearables Mean For Marketers"
Insight Presentation: "What Wearables Mean For Marketers"Insight Presentation: "What Wearables Mean For Marketers"
Insight Presentation: "What Wearables Mean For Marketers"
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 
Tech Consumer Insights
Tech Consumer InsightsTech Consumer Insights
Tech Consumer Insights
 
Demand Media Shares New Insights About Tech Consumers
Demand Media Shares New Insights About Tech Consumers Demand Media Shares New Insights About Tech Consumers
Demand Media Shares New Insights About Tech Consumers
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 

Mais de Lookout

The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsLookout
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLookout
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile SecurityLookout
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notLookout
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?Lookout
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingLookout
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity PredictionsLookout
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatibleLookout
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidLookout
 
When Android Apps Go Evil
When Android Apps Go EvilWhen Android Apps Go Evil
When Android Apps Go EvilLookout
 
Scaling Mobile Development
Scaling Mobile DevelopmentScaling Mobile Development
Scaling Mobile DevelopmentLookout
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring HackersLookout
 
How to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneHow to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneLookout
 
3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple AccountLookout
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone GuideLookout
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World CupLookout
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneLookout
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to MeasureLookout
 
Security & Privacy at the Olympics
Security & Privacy at the OlympicsSecurity & Privacy at the Olympics
Security & Privacy at the OlympicsLookout
 
5 Types of Shady Apps
5 Types of Shady Apps5 Types of Shady Apps
5 Types of Shady AppsLookout
 

Mais de Lookout (20)

The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or not
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatible
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to Avoid
 
When Android Apps Go Evil
When Android Apps Go EvilWhen Android Apps Go Evil
When Android Apps Go Evil
 
Scaling Mobile Development
Scaling Mobile DevelopmentScaling Mobile Development
Scaling Mobile Development
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring Hackers
 
How to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneHow to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhone
 
3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone Guide
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World Cup
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your Smartphone
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to Measure
 
Security & Privacy at the Olympics
Security & Privacy at the OlympicsSecurity & Privacy at the Olympics
Security & Privacy at the Olympics
 
5 Types of Shady Apps
5 Types of Shady Apps5 Types of Shady Apps
5 Types of Shady Apps
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Último (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Visualizing Privacy

  • 1. Visualizing Privacy! Morgan Eisler (@mogasaur)! UX Researcher! 2014 ! ! 10/09/14! #GHC14 2014
  • 8. 2014 Users With! Data Exposed! Data! Breaches!
  • 10. 2014
  • 11. 2014
  • 12. The NTIA Code of Conduct! § Categories of Data Collected:! − Biometrics! − Browser History! − Phone or Text Log! − Contacts! − Financial Info! − Health, medical, or therapy info! − Location! − User Files! 2014
  • 13. The NTIA Code of Conduct! § Entities Data is Shared With:! − Ad Networks! − Carriers! − Consumer Data Resellers! − Data Analytics Providers! − Government Entities! − Operating Systems and Platforms! − Other Apps! − Social Networks! 2014
  • 14. 2014
  • 15. 2014
  • 16. “I think this signifies a company that is very conscientious. A company that cares about people's privacy and is aware of people's concerns about how their information will be gathered, shared, and used.”! " "- Lookout Customer! 2014 !
  • 17. “I think if a privacy policy was that way then everybody’s policy would get read. It would help a lot of people out if it looked like this.”! " "- Lookout Customer! 2014
  • 18. 2014
  • 19. 2014
  • 20. 2014
  • 21. 2014
  • 22. 2014
  • 23. Final Thoughts! § Be more transparent! § Inspire trust! § Improve comprehension! § Keep in mind:! − A short form policy is not a replacement for a 2014 full-length policy! − Make sure that users understand that a short form policy is just that!
  • 24. References § 2013, 9 May.“More than 2 billion people use the internet, here’s what they’re up to (inforgraphic)”. The Cultureist. Retrieved from <http://www.thecultureist.com/ 2013/05/09/how-many-people-use-the-internet- more-than-2-billion-infographic/>.! § O’Toole, James. 2014, 28 February. “Mobile apps overtake PC internet usage in U.S.”. CNN Money. Retrieved from http:// money.cnn.com/2014/02/28/technology/ mobile/mobile-apps-internet/>.! 2014
  • 25. References § Ezor, Jonathan I. 2009, 12 August. “Why your web site’s privacy policy matters more than you think.” Bloomberg Businessweek. Retrieved from <http:// www.businessweek.com/smallbiz/ running_small_business/archives/2009/08/ why_web_site_pr.html>.! § ,2012. “ Global Internet User Survey Summary Report”. The Internet Society. Retrieved from <https:// www.internetsociety.org/sites/default/files/ rep-GIUS2012global-201211-en.pdf>.! 2014
  • 26. References § 2009, 10 March. “TRUSTe survey findings indicate majority of small business neglect vital privacy measures” [press release]. TRUSTe. Retrieved from <http:// www.truste.com/about-TRUSTe/press-room/ news_truste_smb_neglect_privacy>.! § Bilton, Nick. 2010, 12 May. “Price of Facebook privacy? Start clicking.” The New York Times. Retrieved from <http:// www.nytimes.com/2010/05/13/technology/ personaltech/13basics.html? src=tptw&_r=0>.! 2014
  • 27. References § Vedantam, Shankar. 2012, 19 April. “To read all those web privacy policies, just take a month off work.” NPR. Retrieved from <http:// www.npr.org/blogs/alltechconsidered/ 2012/04/19/150905465/to-read-all-those-web-privacy- policies-just-take-a-month-off-work>.! § McDonald, Aleecia M. & Faith Cranor, Lorrie, 2008. “The cost of reading privacy policies.” I/ S: A Journal of Law and Policy for the Information Society, 2008 Privacy Year in Review Issue. Retrieved from <http:// lorrie.cranor.org/pubs/readingPolicyCost-authorDraft. 2014 pdf>.!
  • 28. References § Westerman, Ilana. 2013, 3 June. “What misconceptions do consumers have about privacy?” IAPP. Retrieved from <https:// privacyassociation.org/news/a/what-misconceptions- do-consumers-have-about-privacy/>. 2014 ! § Weise, Elizabeth. 2014, 24 September. “43% of companies had a data breach in the past year.” USA Today. Retrieved from <http:// www.usatoday.com/story/tech/2014/09/24/ data-breach-companies-60/16106197/>.!
  • 29. References § Pagliery, Jose. 2014, 28 May. “Half of American adults hacked this year.” CNN Money. Retrieved from <http:// money.cnn.com/2014/05/28/technology/ security/hack-data-breach/?iid=EL>.! § Fiegerman, Seth. 2014, 20 June. “Yo gets hacked.” Mashable. Retrieved from <http:// mashable.com/2014/06/20/yo-gets-hacked/ >.! 2014
  • 30. References § 2013, 25 July. “Short Form Notice Code of Conduct to Promote Transparency in Mobile App Practices”. The National Telecommunications and Information Administration. Retrieved from <http:// www.ntia.doc.gov/files/ntia/publications/ july_25_code_draft.pdf>.! § 2014, 24 July. “Apps Alliance and Intuit partner to release new app privacy tool” [press release]. Application Developers Alliance. Retrieved from <http://www.appdevelopersalliance.org/news/ 2014/7/23/new-tool-allows-developers-to-create-consumer- friendly-app-privacy-notices>.! 2014
  • 31. Links to Tools on GitHub! 2014 § Lookout: ! − https://github.com/lookout/private-parts! § Intuit/TRUSTe:! − https://github.com/appsalliance/privacynotices! § Mozilla:! − https://github.com/flamsmark/privacy-policy-template !
  • 32. Contact/Feedback! Questions?! MORGAN.EISLER@LOOKOUT.COM or! Lookout Booth at the Career Fair! ! Rate and Review the session using the GHC Mobile App! To download visit www.gracehopper.org! 2014