SlideShare a Scribd company logo
1 of 18
Download to read offline
The Challenge of ‘Things’ and Consumer
Privacy: Building Trust in an Age of complexity
Pat Walshe, Cambridge Wireless Software SIG,
14 November 2013
© GSMA 2013

Restricted - Confidential Information
© GSM Association 2013
All GSMA meetings are conducted in full compliance with the
GSMA’s anti-trust compliance policy
GSMA By The Numbers

© GSMA 2013
Rethinking privacy in a hyper-connected mobile world

© GSMA 2013
GSMA Research: privacy and trust matters

© GSMA 2013

www.gsma.com/mobileprivacy
First IoT enforcement? Importance of designing for privacy,
security and trust

© GSMA 2013
European Commission: Trust is key

“

We cannot have a policy or create the impression that the Internet
of Things would create a an Orwellian world …. Our goal, and our
commitment, should be to create a vision that focuses on providing
real value for people ……
…. we cannot innovate in a bubble if citizens are not coming
along for the journey. So we need an ethical and legal framework
that enjoys broad support …
Technology and service developers should actively embrace this as a
corner stone of the Internet of Things. This is your future market and
your future customers need to be able to trust it.

”

Neelie Kroes Vice-President of the European Commission responsible for the Digital Agenda
http://ec.europa.eu/information_society/newsroom/cf/itemlongdetail.cfm?item_id=7008
© GSMA 2013
Privacy (and security): enablers of trust

© GSMA 2013
Change: it’s happening fast

© GSMA 2013
Consumer IoT experience: contextualising privacy

http://estimote.com

iBeacons: Bluetooth low energy indoor location tracking, targeting,
check-in
© GSMA 2013
IoT increased scale & complexity challenges privacy &
security
Some key characteristics:
globally distributed, hyper-connected and ubiquitous networks and
devices
architectured for collection and sharing of data by default
devices and users are broadcasters of data by default
sensor enabled environments (and sensor driven decision making)
automated multiparty data sharing across borders in real time
new data categories
behaviourally rich and contextualised data
increase use of predictive analytics
fragmented standards and approaches to privacy
poor privacy and security user experiences
from little to BIG data
© GSMA 2013
Time for change: Towards Usable Privacy & Security

© GSMA 2013
Challenges of law in IoT: designing for usable privacy &
security
definitions of what is and what is not ‘personal data’
transparency
notice
consent
data minimisation
purposes limitation
security
right to know
right to delete
right to obtain a copy
restrictions on cross border flows of data

© GSMA 2013
Towards Usable Privacy and Security – designing for
trustworthiness
Signalling trustworthiness by
communicating the intent behind the IoT device/service (data uses,
m2m use, value)
simplifying and making intuitive the user experience
–
contextualised notice and choice mechanisms
–
dashboards - transparency and permissioning over data and
security
–
adopting industry Codes and/or Privacy/Security Seals
ensuring security of devices, connections, services and data
–
identity and authentication
–
integrity and availability of service/data
–
interoperable standards
Responsible data use
Use of privacy enhancing approaches to data analytics – anonymity
an unlinkability
Adopting accountability framework

© GSMA 2013
Draft EU Data Protection Regulation: Coding for law assisting usability and trust?
Article 13(a) Standardised information
policies to provide notice:
(a) whether personal data are collected beyond
the minimum necessary for each specific
purpose of the processing;
(b) whether personal data are retained beyond
the minimum necessary for each specific
purpose of the processing;
(c) whether personal data are processed for
purposes other than the purposes for which
they were collected;
(d) whether personal data are disseminated to
commercial third parties; e) whether personal
data are sold or rented out;
(f) whether personal data are retained in
encrypted form.

http://www.janalbrecht.eu/fileadmin/material/Dokumente/DPR-Regulation-inofficial-consolidated-LIBE.pdf
© GSMA 2013
GSMA: Mobile Privacy Principles
1. Openness, Transparency and Notice
2. Purpose & Use
3. User Choice and Control
4. Data Minimisation and Retention
5. Respect User Rights
6. Security
6. Education
7. Children & Adolescents
8. Accountability and Enforcement
© GSMA 2013
Privacy Design Guidelines for app development
•

Express principles in functional terms

•

Provide Best Practice for Apps

•

Illustrative examples and use cases

•

Foster a ‘privacy by design’ approach

•

Include modules on:
•
•

Mobile advertising

•

Children

•

© GSMA 2013

Location

Social networking

16
Accountability in practice – leading the way

© GSMA 2013

17
Thank you

Pat Walshe
pwalshe [at] gsma [dot] com
www.gsma.com/mobileprivacy

© GSMA 2013

More Related Content

What's hot

MMU: Results from the 2012 Global Mobile Money Adoption Survey
MMU: Results from the 2012 Global Mobile Money Adoption SurveyMMU: Results from the 2012 Global Mobile Money Adoption Survey
MMU: Results from the 2012 Global Mobile Money Adoption Survey
GSMA Mobile for Development
 
The Customer Journey to Regular Usage - MMU Global Event 2013
The Customer Journey to Regular Usage - MMU Global Event 2013The Customer Journey to Regular Usage - MMU Global Event 2013
The Customer Journey to Regular Usage - MMU Global Event 2013
GSMA Mobile for Development
 
Openet dynamic services & real time charging 9 oct 2013, ngbss london
Openet dynamic services & real time charging 9 oct 2013, ngbss londonOpenet dynamic services & real time charging 9 oct 2013, ngbss london
Openet dynamic services & real time charging 9 oct 2013, ngbss london
Openet
 
Vodafone IoT Barometer 2016
Vodafone IoT Barometer 2016Vodafone IoT Barometer 2016
Vodafone IoT Barometer 2016
Paddy Collins
 

What's hot (20)

Handset Theft - A Case Study
Handset Theft  - A Case StudyHandset Theft  - A Case Study
Handset Theft - A Case Study
 
DWS16 - Connected things forum - Samuel Ropert, IDATE DigiWorld
DWS16 - Connected things forum - Samuel Ropert, IDATE DigiWorldDWS16 - Connected things forum - Samuel Ropert, IDATE DigiWorld
DWS16 - Connected things forum - Samuel Ropert, IDATE DigiWorld
 
DWS16 - Fintech forum - Yves Gassot, IDATE DigiWorld
DWS16 - Fintech forum - Yves Gassot, IDATE DigiWorldDWS16 - Fintech forum - Yves Gassot, IDATE DigiWorld
DWS16 - Fintech forum - Yves Gassot, IDATE DigiWorld
 
mAgri Webinar: Mobile market information systems for farmers: requirements fo...
mAgri Webinar: Mobile market information systems for farmers: requirements fo...mAgri Webinar: Mobile market information systems for farmers: requirements fo...
mAgri Webinar: Mobile market information systems for farmers: requirements fo...
 
DWS16 - Fintech forum - Alexis Collomb, CNAM
DWS16 - Fintech forum - Alexis Collomb, CNAMDWS16 - Fintech forum - Alexis Collomb, CNAM
DWS16 - Fintech forum - Alexis Collomb, CNAM
 
Univerisal Service Funds (USFs) - Time for a Re-think of USF Levy
Univerisal Service Funds (USFs) - Time for a Re-think of USF LevyUniverisal Service Funds (USFs) - Time for a Re-think of USF Levy
Univerisal Service Funds (USFs) - Time for a Re-think of USF Levy
 
MMU: Results from the 2012 Global Mobile Money Adoption Survey
MMU: Results from the 2012 Global Mobile Money Adoption SurveyMMU: Results from the 2012 Global Mobile Money Adoption Survey
MMU: Results from the 2012 Global Mobile Money Adoption Survey
 
DWS16 - TV and Video Forum - Florence Le Borgne, IDATE DigiWorld
DWS16 - TV and Video Forum - Florence Le Borgne, IDATE DigiWorldDWS16 - TV and Video Forum - Florence Le Borgne, IDATE DigiWorld
DWS16 - TV and Video Forum - Florence Le Borgne, IDATE DigiWorld
 
Over The Top Service ...How can telcos meet the OTT services challenge?
Over The Top Service ...How can telcos meet the OTT services challenge?Over The Top Service ...How can telcos meet the OTT services challenge?
Over The Top Service ...How can telcos meet the OTT services challenge?
 
Internet of Things (IoT) Business & Technology & Patent Integrated Strategy
Internet of Things (IoT) Business & Technology & Patent Integrated StrategyInternet of Things (IoT) Business & Technology & Patent Integrated Strategy
Internet of Things (IoT) Business & Technology & Patent Integrated Strategy
 
The Customer Journey to Regular Usage - MMU Global Event 2013
The Customer Journey to Regular Usage - MMU Global Event 2013The Customer Journey to Regular Usage - MMU Global Event 2013
The Customer Journey to Regular Usage - MMU Global Event 2013
 
Openet dynamic services & real time charging 9 oct 2013, ngbss london
Openet dynamic services & real time charging 9 oct 2013, ngbss londonOpenet dynamic services & real time charging 9 oct 2013, ngbss london
Openet dynamic services & real time charging 9 oct 2013, ngbss london
 
Views and practice on digital transformation
Views and practice on digital transformationViews and practice on digital transformation
Views and practice on digital transformation
 
MNO, MVNO, MVNA, MVNE: Different types of mobile operators
MNO, MVNO, MVNA, MVNE: Different types of mobile operatorsMNO, MVNO, MVNA, MVNE: Different types of mobile operators
MNO, MVNO, MVNA, MVNE: Different types of mobile operators
 
Internet of Things (IoT) Smart City Insights from Patents
Internet of Things (IoT) Smart City Insights from PatentsInternet of Things (IoT) Smart City Insights from Patents
Internet of Things (IoT) Smart City Insights from Patents
 
Day 2 C2C - SACF: Impact of OTT services
Day 2 C2C - SACF: Impact of OTT servicesDay 2 C2C - SACF: Impact of OTT services
Day 2 C2C - SACF: Impact of OTT services
 
Policy Virtualization: Realizing the Potential
Policy Virtualization: Realizing the PotentialPolicy Virtualization: Realizing the Potential
Policy Virtualization: Realizing the Potential
 
Vodafone IoT Barometer 2016
Vodafone IoT Barometer 2016Vodafone IoT Barometer 2016
Vodafone IoT Barometer 2016
 
Creating Digital Transformation with IoT Deployments
Creating Digital Transformation with IoT DeploymentsCreating Digital Transformation with IoT Deployments
Creating Digital Transformation with IoT Deployments
 
DWS16 - Fintech forum - Francis Barel, PayPal
DWS16 - Fintech forum - Francis Barel, PayPalDWS16 - Fintech forum - Francis Barel, PayPal
DWS16 - Fintech forum - Francis Barel, PayPal
 

Similar to Internet of Things Software SIG

TelcoME2015_IOTRegulation
TelcoME2015_IOTRegulationTelcoME2015_IOTRegulation
TelcoME2015_IOTRegulation
EamonHolley
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
amitkhanna2070
 
5GIC 2015 BSAC
5GIC 2015 BSAC5GIC 2015 BSAC
5GIC 2015 BSAC
Mark Selby
 
WP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONWP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTION
John Pinson
 
UXPSystems_whitepaper_Privacy_Nov182016
UXPSystems_whitepaper_Privacy_Nov182016UXPSystems_whitepaper_Privacy_Nov182016
UXPSystems_whitepaper_Privacy_Nov182016
Andrey Plotnikov
 
5G Drones with 5G Gaming and Application of 5G in Other Industries A ChatGPT ...
5G Drones with 5G Gaming and Application of 5G in Other Industries A ChatGPT ...5G Drones with 5G Gaming and Application of 5G in Other Industries A ChatGPT ...
5G Drones with 5G Gaming and Application of 5G in Other Industries A ChatGPT ...
ijtsrd
 
survey project-1
survey project-1survey project-1
survey project-1
NAVIT GAUR
 

Similar to Internet of Things Software SIG (20)

Final projet
Final  projetFinal  projet
Final projet
 
Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013
Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013
Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013
 
What is the difference between fingerprinting and background checks
What is the difference between fingerprinting and background checksWhat is the difference between fingerprinting and background checks
What is the difference between fingerprinting and background checks
 
TelcoME2015_IOTRegulation
TelcoME2015_IOTRegulationTelcoME2015_IOTRegulation
TelcoME2015_IOTRegulation
 
Designing for privacy
Designing for privacy  Designing for privacy
Designing for privacy
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
 
5GIC 2015 BSAC
5GIC 2015 BSAC5GIC 2015 BSAC
5GIC 2015 BSAC
 
WP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONWP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTION
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
 
UXPSystems_whitepaper_Privacy_Nov182016
UXPSystems_whitepaper_Privacy_Nov182016UXPSystems_whitepaper_Privacy_Nov182016
UXPSystems_whitepaper_Privacy_Nov182016
 
Gemalto Review: 5G Feature
Gemalto Review: 5G FeatureGemalto Review: 5G Feature
Gemalto Review: 5G Feature
 
Cor review2018-a
Cor review2018-aCor review2018-a
Cor review2018-a
 
Quick Quote App Portfolio
Quick Quote App PortfolioQuick Quote App Portfolio
Quick Quote App Portfolio
 
Trust in the mobile internet of things
Trust in the mobile internet of thingsTrust in the mobile internet of things
Trust in the mobile internet of things
 
5G Drones with 5G Gaming and Application of 5G in Other Industries A ChatGPT ...
5G Drones with 5G Gaming and Application of 5G in Other Industries A ChatGPT ...5G Drones with 5G Gaming and Application of 5G in Other Industries A ChatGPT ...
5G Drones with 5G Gaming and Application of 5G in Other Industries A ChatGPT ...
 
Smart grid
Smart gridSmart grid
Smart grid
 
Securing data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsSecuring data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law Firms
 
survey project-1
survey project-1survey project-1
survey project-1
 
KPN and Connectivity
KPN and ConnectivityKPN and Connectivity
KPN and Connectivity
 
Real time mobile Commerce
Real time mobile CommerceReal time mobile Commerce
Real time mobile Commerce
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 

Internet of Things Software SIG

  • 1. The Challenge of ‘Things’ and Consumer Privacy: Building Trust in an Age of complexity Pat Walshe, Cambridge Wireless Software SIG, 14 November 2013 © GSMA 2013 Restricted - Confidential Information © GSM Association 2013 All GSMA meetings are conducted in full compliance with the GSMA’s anti-trust compliance policy
  • 2. GSMA By The Numbers © GSMA 2013
  • 3. Rethinking privacy in a hyper-connected mobile world © GSMA 2013
  • 4. GSMA Research: privacy and trust matters © GSMA 2013 www.gsma.com/mobileprivacy
  • 5. First IoT enforcement? Importance of designing for privacy, security and trust © GSMA 2013
  • 6. European Commission: Trust is key “ We cannot have a policy or create the impression that the Internet of Things would create a an Orwellian world …. Our goal, and our commitment, should be to create a vision that focuses on providing real value for people …… …. we cannot innovate in a bubble if citizens are not coming along for the journey. So we need an ethical and legal framework that enjoys broad support … Technology and service developers should actively embrace this as a corner stone of the Internet of Things. This is your future market and your future customers need to be able to trust it. ” Neelie Kroes Vice-President of the European Commission responsible for the Digital Agenda http://ec.europa.eu/information_society/newsroom/cf/itemlongdetail.cfm?item_id=7008 © GSMA 2013
  • 7. Privacy (and security): enablers of trust © GSMA 2013
  • 8. Change: it’s happening fast © GSMA 2013
  • 9. Consumer IoT experience: contextualising privacy http://estimote.com iBeacons: Bluetooth low energy indoor location tracking, targeting, check-in © GSMA 2013
  • 10. IoT increased scale & complexity challenges privacy & security Some key characteristics: globally distributed, hyper-connected and ubiquitous networks and devices architectured for collection and sharing of data by default devices and users are broadcasters of data by default sensor enabled environments (and sensor driven decision making) automated multiparty data sharing across borders in real time new data categories behaviourally rich and contextualised data increase use of predictive analytics fragmented standards and approaches to privacy poor privacy and security user experiences from little to BIG data © GSMA 2013
  • 11. Time for change: Towards Usable Privacy & Security © GSMA 2013
  • 12. Challenges of law in IoT: designing for usable privacy & security definitions of what is and what is not ‘personal data’ transparency notice consent data minimisation purposes limitation security right to know right to delete right to obtain a copy restrictions on cross border flows of data © GSMA 2013
  • 13. Towards Usable Privacy and Security – designing for trustworthiness Signalling trustworthiness by communicating the intent behind the IoT device/service (data uses, m2m use, value) simplifying and making intuitive the user experience – contextualised notice and choice mechanisms – dashboards - transparency and permissioning over data and security – adopting industry Codes and/or Privacy/Security Seals ensuring security of devices, connections, services and data – identity and authentication – integrity and availability of service/data – interoperable standards Responsible data use Use of privacy enhancing approaches to data analytics – anonymity an unlinkability Adopting accountability framework © GSMA 2013
  • 14. Draft EU Data Protection Regulation: Coding for law assisting usability and trust? Article 13(a) Standardised information policies to provide notice: (a) whether personal data are collected beyond the minimum necessary for each specific purpose of the processing; (b) whether personal data are retained beyond the minimum necessary for each specific purpose of the processing; (c) whether personal data are processed for purposes other than the purposes for which they were collected; (d) whether personal data are disseminated to commercial third parties; e) whether personal data are sold or rented out; (f) whether personal data are retained in encrypted form. http://www.janalbrecht.eu/fileadmin/material/Dokumente/DPR-Regulation-inofficial-consolidated-LIBE.pdf © GSMA 2013
  • 15. GSMA: Mobile Privacy Principles 1. Openness, Transparency and Notice 2. Purpose & Use 3. User Choice and Control 4. Data Minimisation and Retention 5. Respect User Rights 6. Security 6. Education 7. Children & Adolescents 8. Accountability and Enforcement © GSMA 2013
  • 16. Privacy Design Guidelines for app development • Express principles in functional terms • Provide Best Practice for Apps • Illustrative examples and use cases • Foster a ‘privacy by design’ approach • Include modules on: • • Mobile advertising • Children • © GSMA 2013 Location Social networking 16
  • 17. Accountability in practice – leading the way © GSMA 2013 17
  • 18. Thank you Pat Walshe pwalshe [at] gsma [dot] com www.gsma.com/mobileprivacy © GSMA 2013