SlideShare uma empresa Scribd logo
1 de 10
Tech Talk: Data Privacy,
Ownership & IoT
December 11, 2017, 12:30 pm- 12:45 pm
By Lily Lim, Partner, Finnegan Henderson
The Intersection of IoT and Robotics: How Sensors, Data, and
Intelligence Are Redefining Industry
1
IoT Data: Ownership and Rights
Data Collected
Correlations Made
with Data Collected
Personally
Identifiable
Information
Company has ownership
rights:
Copyright, Trade Secrets,
Know-how, Patents
Company has ownership
rights to data that is mined
or correlated
Users Have Rights to
Control Their Personal
Data
2
Laws Protecting PII
 Personally Identifiable Information (PII)
 Federal Statutes
 Financial Records: Gramm-Leach-Bliley Act
 Health Records: HIPAA
 Educational Records: FERPA
 Interception of Communications: Electronic Communications Privacy
Act
 State Laws:
 Massachusetts Defines PII as: Person’s last name, first initial,
combined with SSN, driver’s license, bank account, credit card
account,
 California Constitutional Right to Privacy
 Illinois: PII includes user names with password & biometric data
 European General Data Protection Regulation (GDPR)
3
Data Collected
Cost of Breach of Privacy Data (External Attack)
 Class Actions:
 Target Breach: over $300 Million
 Home Depot: over $250 Million to date
(Forbes Magazine estimates total in recurring
expenses will be $10 Billion).
 Deal Devalued:
 Yahoo! Breach: Verizon cut $350 Million from
its deal with Yahoo! after the news of the
breach was released.
 Clean-up/ Rebuild costs:
 Sony Pictures Entertainment Breach
(Copyrighted materials, not yet released
movies, Sony’s trade secrets like business
negotiations):
 Clean-up costs $35 Million for FY 2015.
 Rebuilding Sony’s computer systems
estimated at $83 Million.
4
Open Source Software Vulnerabilities
 Apache Open Source License (Web
Servers) :
 Apache Strut vulnerability
 Equifax breach September 2017
(personal data for 143 million
people leaked)
 Apache Struts web-application
software had a bug (CVE-2017-
5638) for which Apache released a
patch in March 6, 2017.
 Equifax did not apply the patch
and the breach started in May
2017.
5
Data Collected
Bluetooth Vulnerabilities
 Bluetooth Vulnerability:
 USCERT (United States Computer
Emergency Readiness Team) issued
warning
 BlueBorne: potentially affecting millions of
IoT devices, mobile phones, and
computers.
 Remote attacker can take control of
affected devices
 Impacted systems:
 Windows, iOS, Android
 Affected Vendors:
 Apple, Google, Microsoft, Samsung,
Android
 Patches available for Windows, and iOS,
but patching for Android was delayed due
to disperse ecosystem
 USCERT Recommended action: disable
Bluetooth
6
Data Collected
IoT Data: Penalties When PII Collected Without
User Consent
 Data Mining Contacts from Email
Accounts
 Google Buzz allegedly automatically pulled
contacts from users’ Gmail accounts into a social
network without informing them.
 FTC Consent Decree: Google agreed to
implement a comprehensive privacy program and
to 20 years of privacy audits.
 Sweeping Up WiFi Passwords
 Google Street View: collection of passwords, email
and personal information from unsecured networks
collected by Google cars while the collected
location data for Street View.
 Google agreed to: $7 Million fine; self-policing of
employees, teaching public how to fend off privacy
violations.
7
Data Collected
Data Handling “Mishaps”
 Uber’s “God View” Tool and “GreyBall”
Program
 FTC is inquiring about Uber’s “data-handling
mishaps” including employees’ “misuse of
‘god view,’ a tool that had previously let
employees closely track individual riders,
such as politicians and celebrities.”.
 Department of Justice reportedly opened a
criminal probe regarding Uber’s use of its
Greyball program, which allegedly helped it
circumvent scrutiny from local transportation
regulators
8
Data Collected
Maximizing Data Set Values By Mitigating PII Risks
 Companies can use PII and sell it:
 Privacy-By-Design and Security-By-Design
 Rather than address privacy and security issues on the back end
of a product cycle, companies are making efforts to integrate
privacy and security into earlier phases of the design cycle.
 Privacy Policy: User Consent
Data Collected
9
Lily Lim, Partner
Finnegan Henderson
Intellectual property, cybersecurity, and privacy law.
Ms. Lim provides strategic counseling on cybersecurity and privacy
best practices, including security-by-design and privacy-by-design,
utilizing her depth of knowledge in both law and technology. Ms. Lim
is a Certified Information Privacy Professional (CIPP/US). Ms. Lim is
a frequently invited speaker and contributes to the Sedona
Conference Working Group on data security and privacy issues.
Ms. Lim has prevailed at trial and on appeal in cases involving
patent, copyright, and trade secret disputes in federal court and
before the U.S. International Trade Commission (ITC). She
represents U.S. and international clients whose technologies include
integrated circuits, satellite technologies, wireless devices, software,
and medical devices and diagnostic equipment. Ms. Lim also
provides strategic pre-litigation counseling regarding negotiating
patent and software licenses and international manufacturing and
marketing agreements.
Prior to joining private practice, Ms. Lim served as a law clerk to the
Honorable S. Jay Plager of the U.S. Court of Appeals for the
Federal Circuit. She also worked as a spacecraft navigation
engineer at NASA’s Jet Propulsion Laboratory.
Email:
Lily.Lim@Finnegan.com
10Copyright 2017

Mais conteúdo relacionado

Mais procurados

Personally Identifiable Information Protection
Personally Identifiable Information ProtectionPersonally Identifiable Information Protection
Personally Identifiable Information ProtectionPECB
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation tomasztopa
 
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...VALLOYD
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINamiable_indian
 
GDPR Is Coming – Are Emailers Ready?
GDPR Is Coming – Are Emailers Ready?GDPR Is Coming – Are Emailers Ready?
GDPR Is Coming – Are Emailers Ready?MediaPost
 
Open Letter From EFF Opposing CISPA
Open Letter From EFF Opposing CISPA Open Letter From EFF Opposing CISPA
Open Letter From EFF Opposing CISPA Small Business Trends
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data PrivacyWilmerHale
 
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Eric Vanderburg
 
Alfredo Mendez - Mexico - personal data protection and transparency
Alfredo Mendez - Mexico - personal data protection and transparencyAlfredo Mendez - Mexico - personal data protection and transparency
Alfredo Mendez - Mexico - personal data protection and transparencyAlfredo Mendez
 
Eight principles of consumer data privacy
Eight principles of consumer data privacyEight principles of consumer data privacy
Eight principles of consumer data privacySolix Technologies, Inc
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data SecurityWilmerHale
 
Data protection regulation
Data protection regulationData protection regulation
Data protection regulationGreg Ezeilo
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019Ulf Mattsson
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy IntroductionG Prachi
 
20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet LawKlemchuk LLP
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and SecurityAnuMarySunny
 

Mais procurados (20)

Personally Identifiable Information Protection
Personally Identifiable Information ProtectionPersonally Identifiable Information Protection
Personally Identifiable Information Protection
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Review questions
Review questionsReview questions
Review questions
 
GDPR Is Coming – Are Emailers Ready?
GDPR Is Coming – Are Emailers Ready?GDPR Is Coming – Are Emailers Ready?
GDPR Is Coming – Are Emailers Ready?
 
Open Letter From EFF Opposing CISPA
Open Letter From EFF Opposing CISPA Open Letter From EFF Opposing CISPA
Open Letter From EFF Opposing CISPA
 
Data Protection Presentation
Data Protection PresentationData Protection Presentation
Data Protection Presentation
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data Privacy
 
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
 
Alfredo Mendez - Mexico - personal data protection and transparency
Alfredo Mendez - Mexico - personal data protection and transparencyAlfredo Mendez - Mexico - personal data protection and transparency
Alfredo Mendez - Mexico - personal data protection and transparency
 
Eight principles of consumer data privacy
Eight principles of consumer data privacyEight principles of consumer data privacy
Eight principles of consumer data privacy
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Data protection regulation
Data protection regulationData protection regulation
Data protection regulation
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and Security
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 

Semelhante a Lily lim data privacy ownership and ethics

Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...Facultad de Informática UCM
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesGFI Software
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Druva
 
Data Privacy and Security in Clinical Data Management
Data Privacy and Security in Clinical Data ManagementData Privacy and Security in Clinical Data Management
Data Privacy and Security in Clinical Data ManagementClinosolIndia
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationcaniceconsulting
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia LunaAviva Spectrum™
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing rightblogzilla
 
Advanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionAdvanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionUlf Mattsson
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereJim Brashear
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxadampcarr67227
 
Privacy and Data Security: Minimizing Reputational and Legal Risks
Privacy and Data Security: Minimizing Reputational and Legal RisksPrivacy and Data Security: Minimizing Reputational and Legal Risks
Privacy and Data Security: Minimizing Reputational and Legal RisksTechWell
 
The TIPPSS Imperative for IoT - Ensuring Trust, Identity, Privacy, Protection...
The TIPPSS Imperative for IoT - Ensuring Trust, Identity, Privacy, Protection...The TIPPSS Imperative for IoT - Ensuring Trust, Identity, Privacy, Protection...
The TIPPSS Imperative for IoT - Ensuring Trust, Identity, Privacy, Protection...J On The Beach
 
All's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber WarfareAll's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber WarfareNationalUnderwriter
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Raleigh ISSA
 
Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014Adriana Sanford
 
Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Renub Research
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-finalDr. Donald Macfarlane
 

Semelhante a Lily lim data privacy ownership and ethics (20)

Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?
 
Data Privacy and Security in Clinical Data Management
Data Privacy and Security in Clinical Data ManagementData Privacy and Security in Clinical Data Management
Data Privacy and Security in Clinical Data Management
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
 
Cyber Risks
Cyber RisksCyber Risks
Cyber Risks
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing right
 
Document-3.docx
Document-3.docxDocument-3.docx
Document-3.docx
 
Advanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionAdvanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protection
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data Everywhere
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
Privacy and Data Security: Minimizing Reputational and Legal Risks
Privacy and Data Security: Minimizing Reputational and Legal RisksPrivacy and Data Security: Minimizing Reputational and Legal Risks
Privacy and Data Security: Minimizing Reputational and Legal Risks
 
The TIPPSS Imperative for IoT - Ensuring Trust, Identity, Privacy, Protection...
The TIPPSS Imperative for IoT - Ensuring Trust, Identity, Privacy, Protection...The TIPPSS Imperative for IoT - Ensuring Trust, Identity, Privacy, Protection...
The TIPPSS Imperative for IoT - Ensuring Trust, Identity, Privacy, Protection...
 
All's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber WarfareAll's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber Warfare
 
ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
 
Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014
 
Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
 

Mais de MassTLC

MassIntelligence 2018: Intelligent Connected Cities
MassIntelligence 2018: Intelligent Connected CitiesMassIntelligence 2018: Intelligent Connected Cities
MassIntelligence 2018: Intelligent Connected CitiesMassTLC
 
MassIntelligence 2018: How to Rapidly Prototype an AI Solution
MassIntelligence 2018: How to Rapidly Prototype an AI SolutionMassIntelligence 2018: How to Rapidly Prototype an AI Solution
MassIntelligence 2018: How to Rapidly Prototype an AI SolutionMassTLC
 
MassIntelligence 2018: Connecting the Nation's Top Fishing Port
MassIntelligence 2018: Connecting the Nation's Top Fishing PortMassIntelligence 2018: Connecting the Nation's Top Fishing Port
MassIntelligence 2018: Connecting the Nation's Top Fishing PortMassTLC
 
MassIntelligence 2018: Transportation & Mobility, Alex Wyglinski
MassIntelligence 2018: Transportation & Mobility, Alex WyglinskiMassIntelligence 2018: Transportation & Mobility, Alex Wyglinski
MassIntelligence 2018: Transportation & Mobility, Alex WyglinskiMassTLC
 
Andres Corrada-Emmanuel - Ground Truth Problems in Business
Andres Corrada-Emmanuel - Ground Truth Problems in BusinessAndres Corrada-Emmanuel - Ground Truth Problems in Business
Andres Corrada-Emmanuel - Ground Truth Problems in BusinessMassTLC
 
MassTLC product launch campaign strategies, Jason Baudreau, NetBrain
MassTLC product launch campaign strategies, Jason Baudreau, NetBrainMassTLC product launch campaign strategies, Jason Baudreau, NetBrain
MassTLC product launch campaign strategies, Jason Baudreau, NetBrainMassTLC
 
MassTLC product launch campaign strategies, ben austin, Carbon Black
MassTLC product launch campaign strategies, ben austin, Carbon BlackMassTLC product launch campaign strategies, ben austin, Carbon Black
MassTLC product launch campaign strategies, ben austin, Carbon BlackMassTLC
 
Forget about A.G.I. Let's Build Useable Ai Tools!
Forget about A.G.I. Let's Build Useable Ai Tools!Forget about A.G.I. Let's Build Useable Ai Tools!
Forget about A.G.I. Let's Build Useable Ai Tools!MassTLC
 
Cloud Edge Computing: Beyond the Data Center
Cloud Edge Computing: Beyond the Data CenterCloud Edge Computing: Beyond the Data Center
Cloud Edge Computing: Beyond the Data CenterMassTLC
 
Old Company - New Technology, Elixir @ the MBTA
Old Company - New Technology, Elixir @ the MBTAOld Company - New Technology, Elixir @ the MBTA
Old Company - New Technology, Elixir @ the MBTAMassTLC
 
Lisa seacat deluca io t robotics presentation
Lisa seacat deluca io t robotics presentationLisa seacat deluca io t robotics presentation
Lisa seacat deluca io t robotics presentationMassTLC
 
Smart cities thinking outside the box
Smart cities thinking outside the boxSmart cities thinking outside the box
Smart cities thinking outside the boxMassTLC
 
Abbas bagasra smart ag
Abbas bagasra smart agAbbas bagasra smart ag
Abbas bagasra smart agMassTLC
 
Ben goodman cybersecurity in the iiot
Ben goodman cybersecurity in the iiotBen goodman cybersecurity in the iiot
Ben goodman cybersecurity in the iiotMassTLC
 
MassTLC Opening Slides and Simulation Session
MassTLC Opening Slides and Simulation SessionMassTLC Opening Slides and Simulation Session
MassTLC Opening Slides and Simulation SessionMassTLC
 
Tom Hopcroft: State of the Tech Economy Key Findings
Tom Hopcroft: State of the Tech Economy Key FindingsTom Hopcroft: State of the Tech Economy Key Findings
Tom Hopcroft: State of the Tech Economy Key FindingsMassTLC
 
Michael Goodman: The State of the State Economy
Michael Goodman: The State of the State EconomyMichael Goodman: The State of the State Economy
Michael Goodman: The State of the State EconomyMassTLC
 
MassTLC summit_amacleod_predictiveanalytics
MassTLC summit_amacleod_predictiveanalyticsMassTLC summit_amacleod_predictiveanalytics
MassTLC summit_amacleod_predictiveanalyticsMassTLC
 
Brainshark mass tlc brand revitalizaion_final for distribution
Brainshark mass tlc brand revitalizaion_final for distributionBrainshark mass tlc brand revitalizaion_final for distribution
Brainshark mass tlc brand revitalizaion_final for distributionMassTLC
 
Mass tlc summit-mapping-content-strategy-customer-journey-final (002)
Mass tlc summit-mapping-content-strategy-customer-journey-final (002)Mass tlc summit-mapping-content-strategy-customer-journey-final (002)
Mass tlc summit-mapping-content-strategy-customer-journey-final (002)MassTLC
 

Mais de MassTLC (20)

MassIntelligence 2018: Intelligent Connected Cities
MassIntelligence 2018: Intelligent Connected CitiesMassIntelligence 2018: Intelligent Connected Cities
MassIntelligence 2018: Intelligent Connected Cities
 
MassIntelligence 2018: How to Rapidly Prototype an AI Solution
MassIntelligence 2018: How to Rapidly Prototype an AI SolutionMassIntelligence 2018: How to Rapidly Prototype an AI Solution
MassIntelligence 2018: How to Rapidly Prototype an AI Solution
 
MassIntelligence 2018: Connecting the Nation's Top Fishing Port
MassIntelligence 2018: Connecting the Nation's Top Fishing PortMassIntelligence 2018: Connecting the Nation's Top Fishing Port
MassIntelligence 2018: Connecting the Nation's Top Fishing Port
 
MassIntelligence 2018: Transportation & Mobility, Alex Wyglinski
MassIntelligence 2018: Transportation & Mobility, Alex WyglinskiMassIntelligence 2018: Transportation & Mobility, Alex Wyglinski
MassIntelligence 2018: Transportation & Mobility, Alex Wyglinski
 
Andres Corrada-Emmanuel - Ground Truth Problems in Business
Andres Corrada-Emmanuel - Ground Truth Problems in BusinessAndres Corrada-Emmanuel - Ground Truth Problems in Business
Andres Corrada-Emmanuel - Ground Truth Problems in Business
 
MassTLC product launch campaign strategies, Jason Baudreau, NetBrain
MassTLC product launch campaign strategies, Jason Baudreau, NetBrainMassTLC product launch campaign strategies, Jason Baudreau, NetBrain
MassTLC product launch campaign strategies, Jason Baudreau, NetBrain
 
MassTLC product launch campaign strategies, ben austin, Carbon Black
MassTLC product launch campaign strategies, ben austin, Carbon BlackMassTLC product launch campaign strategies, ben austin, Carbon Black
MassTLC product launch campaign strategies, ben austin, Carbon Black
 
Forget about A.G.I. Let's Build Useable Ai Tools!
Forget about A.G.I. Let's Build Useable Ai Tools!Forget about A.G.I. Let's Build Useable Ai Tools!
Forget about A.G.I. Let's Build Useable Ai Tools!
 
Cloud Edge Computing: Beyond the Data Center
Cloud Edge Computing: Beyond the Data CenterCloud Edge Computing: Beyond the Data Center
Cloud Edge Computing: Beyond the Data Center
 
Old Company - New Technology, Elixir @ the MBTA
Old Company - New Technology, Elixir @ the MBTAOld Company - New Technology, Elixir @ the MBTA
Old Company - New Technology, Elixir @ the MBTA
 
Lisa seacat deluca io t robotics presentation
Lisa seacat deluca io t robotics presentationLisa seacat deluca io t robotics presentation
Lisa seacat deluca io t robotics presentation
 
Smart cities thinking outside the box
Smart cities thinking outside the boxSmart cities thinking outside the box
Smart cities thinking outside the box
 
Abbas bagasra smart ag
Abbas bagasra smart agAbbas bagasra smart ag
Abbas bagasra smart ag
 
Ben goodman cybersecurity in the iiot
Ben goodman cybersecurity in the iiotBen goodman cybersecurity in the iiot
Ben goodman cybersecurity in the iiot
 
MassTLC Opening Slides and Simulation Session
MassTLC Opening Slides and Simulation SessionMassTLC Opening Slides and Simulation Session
MassTLC Opening Slides and Simulation Session
 
Tom Hopcroft: State of the Tech Economy Key Findings
Tom Hopcroft: State of the Tech Economy Key FindingsTom Hopcroft: State of the Tech Economy Key Findings
Tom Hopcroft: State of the Tech Economy Key Findings
 
Michael Goodman: The State of the State Economy
Michael Goodman: The State of the State EconomyMichael Goodman: The State of the State Economy
Michael Goodman: The State of the State Economy
 
MassTLC summit_amacleod_predictiveanalytics
MassTLC summit_amacleod_predictiveanalyticsMassTLC summit_amacleod_predictiveanalytics
MassTLC summit_amacleod_predictiveanalytics
 
Brainshark mass tlc brand revitalizaion_final for distribution
Brainshark mass tlc brand revitalizaion_final for distributionBrainshark mass tlc brand revitalizaion_final for distribution
Brainshark mass tlc brand revitalizaion_final for distribution
 
Mass tlc summit-mapping-content-strategy-customer-journey-final (002)
Mass tlc summit-mapping-content-strategy-customer-journey-final (002)Mass tlc summit-mapping-content-strategy-customer-journey-final (002)
Mass tlc summit-mapping-content-strategy-customer-journey-final (002)
 

Último

Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 

Último (20)

Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 

Lily lim data privacy ownership and ethics

  • 1. Tech Talk: Data Privacy, Ownership & IoT December 11, 2017, 12:30 pm- 12:45 pm By Lily Lim, Partner, Finnegan Henderson The Intersection of IoT and Robotics: How Sensors, Data, and Intelligence Are Redefining Industry 1
  • 2. IoT Data: Ownership and Rights Data Collected Correlations Made with Data Collected Personally Identifiable Information Company has ownership rights: Copyright, Trade Secrets, Know-how, Patents Company has ownership rights to data that is mined or correlated Users Have Rights to Control Their Personal Data 2
  • 3. Laws Protecting PII  Personally Identifiable Information (PII)  Federal Statutes  Financial Records: Gramm-Leach-Bliley Act  Health Records: HIPAA  Educational Records: FERPA  Interception of Communications: Electronic Communications Privacy Act  State Laws:  Massachusetts Defines PII as: Person’s last name, first initial, combined with SSN, driver’s license, bank account, credit card account,  California Constitutional Right to Privacy  Illinois: PII includes user names with password & biometric data  European General Data Protection Regulation (GDPR) 3
  • 4. Data Collected Cost of Breach of Privacy Data (External Attack)  Class Actions:  Target Breach: over $300 Million  Home Depot: over $250 Million to date (Forbes Magazine estimates total in recurring expenses will be $10 Billion).  Deal Devalued:  Yahoo! Breach: Verizon cut $350 Million from its deal with Yahoo! after the news of the breach was released.  Clean-up/ Rebuild costs:  Sony Pictures Entertainment Breach (Copyrighted materials, not yet released movies, Sony’s trade secrets like business negotiations):  Clean-up costs $35 Million for FY 2015.  Rebuilding Sony’s computer systems estimated at $83 Million. 4
  • 5. Open Source Software Vulnerabilities  Apache Open Source License (Web Servers) :  Apache Strut vulnerability  Equifax breach September 2017 (personal data for 143 million people leaked)  Apache Struts web-application software had a bug (CVE-2017- 5638) for which Apache released a patch in March 6, 2017.  Equifax did not apply the patch and the breach started in May 2017. 5 Data Collected
  • 6. Bluetooth Vulnerabilities  Bluetooth Vulnerability:  USCERT (United States Computer Emergency Readiness Team) issued warning  BlueBorne: potentially affecting millions of IoT devices, mobile phones, and computers.  Remote attacker can take control of affected devices  Impacted systems:  Windows, iOS, Android  Affected Vendors:  Apple, Google, Microsoft, Samsung, Android  Patches available for Windows, and iOS, but patching for Android was delayed due to disperse ecosystem  USCERT Recommended action: disable Bluetooth 6 Data Collected
  • 7. IoT Data: Penalties When PII Collected Without User Consent  Data Mining Contacts from Email Accounts  Google Buzz allegedly automatically pulled contacts from users’ Gmail accounts into a social network without informing them.  FTC Consent Decree: Google agreed to implement a comprehensive privacy program and to 20 years of privacy audits.  Sweeping Up WiFi Passwords  Google Street View: collection of passwords, email and personal information from unsecured networks collected by Google cars while the collected location data for Street View.  Google agreed to: $7 Million fine; self-policing of employees, teaching public how to fend off privacy violations. 7 Data Collected
  • 8. Data Handling “Mishaps”  Uber’s “God View” Tool and “GreyBall” Program  FTC is inquiring about Uber’s “data-handling mishaps” including employees’ “misuse of ‘god view,’ a tool that had previously let employees closely track individual riders, such as politicians and celebrities.”.  Department of Justice reportedly opened a criminal probe regarding Uber’s use of its Greyball program, which allegedly helped it circumvent scrutiny from local transportation regulators 8 Data Collected
  • 9. Maximizing Data Set Values By Mitigating PII Risks  Companies can use PII and sell it:  Privacy-By-Design and Security-By-Design  Rather than address privacy and security issues on the back end of a product cycle, companies are making efforts to integrate privacy and security into earlier phases of the design cycle.  Privacy Policy: User Consent Data Collected 9
  • 10. Lily Lim, Partner Finnegan Henderson Intellectual property, cybersecurity, and privacy law. Ms. Lim provides strategic counseling on cybersecurity and privacy best practices, including security-by-design and privacy-by-design, utilizing her depth of knowledge in both law and technology. Ms. Lim is a Certified Information Privacy Professional (CIPP/US). Ms. Lim is a frequently invited speaker and contributes to the Sedona Conference Working Group on data security and privacy issues. Ms. Lim has prevailed at trial and on appeal in cases involving patent, copyright, and trade secret disputes in federal court and before the U.S. International Trade Commission (ITC). She represents U.S. and international clients whose technologies include integrated circuits, satellite technologies, wireless devices, software, and medical devices and diagnostic equipment. Ms. Lim also provides strategic pre-litigation counseling regarding negotiating patent and software licenses and international manufacturing and marketing agreements. Prior to joining private practice, Ms. Lim served as a law clerk to the Honorable S. Jay Plager of the U.S. Court of Appeals for the Federal Circuit. She also worked as a spacecraft navigation engineer at NASA’s Jet Propulsion Laboratory. Email: Lily.Lim@Finnegan.com 10Copyright 2017