SlideShare uma empresa Scribd logo
1 de 39
Designing for Privacy in an
Increasingly Public World
Design Museum Week| 27 April 2022 | Robert Stribley
What do we mean by
designing for privacy?
• In 2021, we learned that
Facebook, the most popular
social media platform on the
planet had been hacked
• 533 million user’s phone
numbers and personal data
were leaked online
• Fraud & identity theft on the
rise during the pandemic
• FTC: 1.4 million reports of
identity theft in 2020 — double
from 2019
Data Security & Identity Theft
Clearview.ai, a facial
recognition platform offers
services to law
enforcement.
They downloaded over 3
billion photos of people
from the Internet and
social media and used
them to build facial
recognition models for
millions of people without
their permission.
Facial Recognition Illustration: Elena Lacy for
Wired
Photo by Kyle Glenn
The New York Times
reported on how the
donation site for Donald
Trump deployed “dark
patterns” to trick
supporters into agreeing
to recurring donations,
earning the campaign a
huge spike in
contributions
Dark Patterns
Data Sharing
A 2019 survey by RSA found only 17%
of respondents said it was ethical to
track their online activity to personalize
ads.
Apple rolled out a new iPhone privacy
feature called “App Tracking
Transparency,” which prevents apps
from following you across the internet.
Hugely popular in US: Only about 20%
of iOS users allowing apps to track them
so far.
What’s Our Role
as Designers?
“Arguing that you don't
care about the right to
privacy because you
have nothing to hide is
no different than saying
you don't care about
free speech because
you have nothing to
say.”
— Edward Snowden, former CIA
employee, NSA leaker
Why Care About Privacy?
• Even if we’re not concerned with a particular privacy
issue, we’re not designing for ourselves
• If we’re designing for privacy, we’ll consider the
needs of people not like ourselves — people with
different backgrounds and experiences
• That means researching privacy issues, but also
interviewing or talking to people with diverse
backgrounds and lived experiences
Why Care About Privacy?
For example, LGBTQ youth should
feel their privacy is secure when
reaching out for help online.
In this sense, privacy issues are
very often also diversity issues.
Privacy is a key consideration for
inclusive design.
Why Care About Privacy?
Screenshot from The Audre Lorde Project’s Facebook page
We may need to explain to our clients the impacts of ignoring privacy concerns.
• Civic responsibility: Encourage clients to treat their “end users” as human beings,
who are members of their community
• Reputation management: Remind clients that what companies do can undermine
their brands
• Site abandonment: Using dark patterns may anger people, prompting them to
leave your site for another with a more transparent experience
• Financial consideration: Fine for not following the increasing number of laws and
regulations (GDPR & California Consumer Privacy Act)
Even if there’s an up-front cost to designing for privacy, the long-term costs can be
devastating.
Our Role
Best Practices
In her Privacy by Design
manifesto, Dr. Ann Cavoukian
recommends making privacy the
“default setting” in our designs
and says privacy should be
“embedded” into design.
What are some practical ways to
ensure we’re doing that?
Best Practices
“Privacy by Design: The 7 Foundational Principles”
by Dr. Ann Cavoukian
Founder of Global Privacy & Security by Design and the former Information and Privacy
Commissioner for the Canadian province of Ontario
Avoid dark patterns
Dark Patterns
1
Dark Patterns
UX designer Harry Brignull
coined the term dark pattern: a
“user interface that has been
carefully crafted to trick users
into doing things” that you didn’t
mean to do — like buying or
signing up for something.
Dark Patterns
“Dark patterns are the
canaries in the coal mine
of unethical design.
A company who’s willing
to keep a customer
hostage is willing to do
worse.”
— Mike Monteiro, Ruined by
Design
Here on a major airline site, the customer
has already chosen Basic Economy but
"Move to Main Cabin”— which costs $100
more — is placed as a large red button
where you’d typically find a "Next" button.
Here the pattern is used to trick people
into an upsell.
But the same pattern is used to trick
people into sharing their personal
information in ways they didn’t intend to.
Dark Patterns
Strava, a popular app for runners, automatically
tagged other runners when you passed them if they
didn’t change their settings.
This feature had a name: Flyby.
If you clicked on a face, it showed the user’s full
name, picture and a map of their running route —
effectively revealing where they lived.
This happened without you following users and
without them knowing they were sharing their
activity.
After receiving criticism, Strava did change the
default setting to private. But it should have always
been private.
Dark Patterns
Be transparent about
what personal data is
used
What Data Is Used?
2
Be specific about what data is shared—
especially when sharing PII.
Personally identifiable information —
data points such as name, email, phone
number, social security number, mother’s
maiden name, can be used to steal
people’s identities and to commit fraud
87% of the U.S. can be uniquely
identified by just their date of birth,
gender, ZIP code (Those items aren’t
even considered PII.)
Imagine how much damage a bad actor
can do with just 3 data points of PII.
What Data Is Used?
Be transparent about
why specific personal
data is collected or
shared
Why Is Data Used?
3
Consider this an opportunity to explain the benefits of
sharing their data:
• Does it ensure a better experience in the future?
• Does it personalize ads and offers for them?
And if you can’t explain the benefits, consider whether
you’re designing the right sort of product.
Why Is Data Used?
Why Is Data Used?
The home insurance app Lemonade
sets a great standard for transparent
privacy policies.
They include an itemized, detailed
explanation of what personal
information you’re sharing, as well as
why.
They also promise never to sell your
information to third parties.
“TL;DR: We will never, ever, sell your data to
anyone.”
Always use clear,
approachable language
Clear Language
4
Clear Language
In 2019 The New York Times studied 150
privacy policies from various platforms.
They described what they found as an
“incomprehensible disaster.”
They described AirBnB’s privacy policy as
“particularly inscrutable.”
Vague language and jargon allow for
broad interpretation, making it easy
companies to defend their practices in a
lawsuit but hard for us to understand
what’s really going on.
Twitter advises you to read
their privacy policy in full
but highlights key aspects
of it up front advising you
to pay attention to those
specific points.
Clear Language
Give users options to
control their own data
User Controls
5
User Controls
Google offers a Privacy Checkup with high
level descriptions of how your personal data
is being used and why.
They allow you to turn off activity tracking,
location history, your YouTube history, your
Google photo settings, check which third
parties have access to your information, and
access other key settings all in one sort of
privacy dashboard.
Ensure these privacy
features are placed
contextually and easy to
find
Easy to Find
6
Easy to Find
Contextual and easy to find also means
…
Onboarding — Explaining in detail how
you use people’s data when they’re
using your app for the very first time.
“Just in time” alerts – Alerting users in
the moment—when they’re about to
share data in a new way—even if
they’ve already been using your
experience.
Easy to Find
Mozilla displays robust
Privacy information by
default in a dedicated tab
when you download and
open their Firefox
browser for the first time.
Remind users regularly about their
privacy options
And actively encourage them to take
advantage of them
Reminders
7
Reminders
Facebook allows you to set
reminders to do a privacy
checkup every week, month, 6
months or year.
Google also has a feature,
which will send you a reminder
to check your privacy settings.
One final point:
Never change users’ privacy settings
without telling them in advance.
And ensure they have the option to opt
out.
Never Change Without Notice
8
A few years ago, Facebook made users’ “likes” visible
overnight, which consequently may have outed some people
in the LGTBQ community or revealed people’s personal,
political or religious beliefs.
When I asked an employee how they justified this change,
they responded that the company valued transparency and
wanted people to be transparent about their interests.
Facebook’s founder Mark Zuckerberg had even famously said
privacy was no longer a “social norm.”
Never Change Without Notice
We don’t have the right to make decisions about other
people’s personal data on their behalf.
Assuming everyone’s information can safely be made
public is a belief that comes from a position of privilege.
We should never make decisions like this, which can
profoundly affect people’s privacy without their explicit
consent.
Never Change Without Notice
We talk a lot about “empathy” in
design.
If we design with empathy, we
won’t design experiences we
wouldn’t want to use ourselves.
And we won’t design using “dark
patterns” either.
Conclusion
Photo by Josh Calabrese
Privacy is not about secrecy.
It’s all about control.
— Dr. Ann Cavoukian
If we want to ensure people have control over their
own personal information
If we want to ensure the experiences we design are
user friendly and truly “user-centered”
We’ll keep these best practices for privacy in mind
Conclusion
Photo by Zanardi, Unsplash
Designing for Privacy in an Increasingly Public World — Speed Talk

Mais conteúdo relacionado

Mais procurados

Edge Computing M&A Analysis
Edge Computing M&A AnalysisEdge Computing M&A Analysis
Edge Computing M&A AnalysisNetscribes
 
39018631 lte-overview
39018631 lte-overview39018631 lte-overview
39018631 lte-overviewcefer mecid
 
Internet Landscape in Thailand by Kittinan Sriprasert & Viraphan Smadi
Internet Landscape in Thailand by Kittinan Sriprasert & Viraphan SmadiInternet Landscape in Thailand by Kittinan Sriprasert & Viraphan Smadi
Internet Landscape in Thailand by Kittinan Sriprasert & Viraphan SmadiMyNOG
 
Smart City IoT Platforms - Benefits and Challenges
Smart City IoT Platforms - Benefits and ChallengesSmart City IoT Platforms - Benefits and Challenges
Smart City IoT Platforms - Benefits and ChallengesDr. Mazlan Abbas
 
sdr using rfid application
sdr using rfid applicationsdr using rfid application
sdr using rfid applicationPriyanka Singh
 
What Exactly Is The "Internet of Things"?
What Exactly Is The "Internet of Things"?What Exactly Is The "Internet of Things"?
What Exactly Is The "Internet of Things"?Postscapes
 
SGS Capabilities
SGS CapabilitiesSGS Capabilities
SGS CapabilitiesSGS
 
Artificial Intelligence in Telecom – Industry Adoption Analysis
Artificial Intelligence in Telecom – Industry Adoption AnalysisArtificial Intelligence in Telecom – Industry Adoption Analysis
Artificial Intelligence in Telecom – Industry Adoption AnalysisNetscribes
 
6G Training Course Part 9: Course Summary & Conclusion
6G Training Course Part 9: Course Summary & Conclusion6G Training Course Part 9: Course Summary & Conclusion
6G Training Course Part 9: Course Summary & Conclusion3G4G
 
Data Centre Hubs: Where to Next by Lim Kok Chen, Ciena
Data Centre Hubs: Where to Next by Lim Kok Chen, CienaData Centre Hubs: Where to Next by Lim Kok Chen, Ciena
Data Centre Hubs: Where to Next by Lim Kok Chen, CienaMyNOG
 
5G – Enable, elevate, and emerge Digitalising us to infinity and beyond
5G – Enable, elevate, and emerge Digitalising us to infinity and beyond5G – Enable, elevate, and emerge Digitalising us to infinity and beyond
5G – Enable, elevate, and emerge Digitalising us to infinity and beyondaakash malhotra
 
Elements of IoT connectivity technologies
Elements of IoT connectivity technologiesElements of IoT connectivity technologies
Elements of IoT connectivity technologiesusman sarwar
 
New SmartEMR Architecture Paradigm of Focus Based Contents Meta Model
New SmartEMR Architecture Paradigm of Focus Based Contents Meta ModelNew SmartEMR Architecture Paradigm of Focus Based Contents Meta Model
New SmartEMR Architecture Paradigm of Focus Based Contents Meta Model제관 이
 
Technology Introduction Series: Edge Computing tutorial.pdf
Technology Introduction Series: Edge Computing tutorial.pdfTechnology Introduction Series: Edge Computing tutorial.pdf
Technology Introduction Series: Edge Computing tutorial.pdf3G4G
 
Should we stop the shutdown of 2G/3G to save lives??
Should we stop the shutdown of 2G/3G to save lives??Should we stop the shutdown of 2G/3G to save lives??
Should we stop the shutdown of 2G/3G to save lives??3G4G
 

Mais procurados (20)

ZTE-Product PPT
ZTE-Product  PPTZTE-Product  PPT
ZTE-Product PPT
 
Edge Computing M&A Analysis
Edge Computing M&A AnalysisEdge Computing M&A Analysis
Edge Computing M&A Analysis
 
39018631 lte-overview
39018631 lte-overview39018631 lte-overview
39018631 lte-overview
 
Internet Landscape in Thailand by Kittinan Sriprasert & Viraphan Smadi
Internet Landscape in Thailand by Kittinan Sriprasert & Viraphan SmadiInternet Landscape in Thailand by Kittinan Sriprasert & Viraphan Smadi
Internet Landscape in Thailand by Kittinan Sriprasert & Viraphan Smadi
 
3GPP
3GPP3GPP
3GPP
 
Smart City IoT Platforms - Benefits and Challenges
Smart City IoT Platforms - Benefits and ChallengesSmart City IoT Platforms - Benefits and Challenges
Smart City IoT Platforms - Benefits and Challenges
 
sdr using rfid application
sdr using rfid applicationsdr using rfid application
sdr using rfid application
 
What Exactly Is The "Internet of Things"?
What Exactly Is The "Internet of Things"?What Exactly Is The "Internet of Things"?
What Exactly Is The "Internet of Things"?
 
SGS Capabilities
SGS CapabilitiesSGS Capabilities
SGS Capabilities
 
VAS PPT
VAS PPTVAS PPT
VAS PPT
 
Artificial Intelligence in Telecom – Industry Adoption Analysis
Artificial Intelligence in Telecom – Industry Adoption AnalysisArtificial Intelligence in Telecom – Industry Adoption Analysis
Artificial Intelligence in Telecom – Industry Adoption Analysis
 
6G Training Course Part 9: Course Summary & Conclusion
6G Training Course Part 9: Course Summary & Conclusion6G Training Course Part 9: Course Summary & Conclusion
6G Training Course Part 9: Course Summary & Conclusion
 
Data Centre Hubs: Where to Next by Lim Kok Chen, Ciena
Data Centre Hubs: Where to Next by Lim Kok Chen, CienaData Centre Hubs: Where to Next by Lim Kok Chen, Ciena
Data Centre Hubs: Where to Next by Lim Kok Chen, Ciena
 
5G – Enable, elevate, and emerge Digitalising us to infinity and beyond
5G – Enable, elevate, and emerge Digitalising us to infinity and beyond5G – Enable, elevate, and emerge Digitalising us to infinity and beyond
5G – Enable, elevate, and emerge Digitalising us to infinity and beyond
 
Elements of IoT connectivity technologies
Elements of IoT connectivity technologiesElements of IoT connectivity technologies
Elements of IoT connectivity technologies
 
New SmartEMR Architecture Paradigm of Focus Based Contents Meta Model
New SmartEMR Architecture Paradigm of Focus Based Contents Meta ModelNew SmartEMR Architecture Paradigm of Focus Based Contents Meta Model
New SmartEMR Architecture Paradigm of Focus Based Contents Meta Model
 
Technology Introduction Series: Edge Computing tutorial.pdf
Technology Introduction Series: Edge Computing tutorial.pdfTechnology Introduction Series: Edge Computing tutorial.pdf
Technology Introduction Series: Edge Computing tutorial.pdf
 
Should we stop the shutdown of 2G/3G to save lives??
Should we stop the shutdown of 2G/3G to save lives??Should we stop the shutdown of 2G/3G to save lives??
Should we stop the shutdown of 2G/3G to save lives??
 
A2P SMS Market.pdf
A2P SMS Market.pdfA2P SMS Market.pdf
A2P SMS Market.pdf
 
IOT presentation
IOT presentationIOT presentation
IOT presentation
 

Semelhante a Designing for Privacy in an Increasingly Public World — Speed Talk

Designing for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldDesigning for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldRobert Stribley
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Robert Stribley
 
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, FedseMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, FedseMarketer
 
Social Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary TaleSocial Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary TaleMike Gotta
 
Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)Phil Cryer
 
Mobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by MobidiggerMobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by MobidiggerHubert Moik
 
Privacy study Mobile and online Dating
Privacy study Mobile and online DatingPrivacy study Mobile and online Dating
Privacy study Mobile and online DatingMobiDigger
 
Privacy in the digital era
Privacy in the digital eraPrivacy in the digital era
Privacy in the digital eraCHEMISTRY AGENCY
 
Technology makes us a marketing tool, demographic
Technology makes us a marketing tool, demographicTechnology makes us a marketing tool, demographic
Technology makes us a marketing tool, demographicsomethingsimple
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonPhil Cryer
 
Privacy & Data Protection - Leon Sylvester Lemos - Privacy. That's iPhone.
Privacy & Data Protection - Leon Sylvester Lemos - Privacy.  That's iPhone.Privacy & Data Protection - Leon Sylvester Lemos - Privacy.  That's iPhone.
Privacy & Data Protection - Leon Sylvester Lemos - Privacy. That's iPhone.LeonLemos3
 
Curiosity Stop Special: Techcrunch Disrupt 2016
Curiosity Stop Special: Techcrunch Disrupt 2016Curiosity Stop Special: Techcrunch Disrupt 2016
Curiosity Stop Special: Techcrunch Disrupt 2016We Are Social
 
Privacy & Data Protection_Leon Sylvester Lemos_Privacy. That's iPhone..pdf
Privacy & Data Protection_Leon Sylvester Lemos_Privacy. That's iPhone..pdfPrivacy & Data Protection_Leon Sylvester Lemos_Privacy. That's iPhone..pdf
Privacy & Data Protection_Leon Sylvester Lemos_Privacy. That's iPhone..pdfLeonLemos3
 
Social Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils FinalSocial Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils FinalKannan Subbiah
 
Big Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media NetworksBig Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media NetworksSylvia Ogweng
 

Semelhante a Designing for Privacy in an Increasingly Public World — Speed Talk (20)

Designing for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldDesigning for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public World
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21
 
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, FedseMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
 
Social Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary TaleSocial Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary Tale
 
The price of free
The price of freeThe price of free
The price of free
 
Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)
 
Designing for Privacy
Designing for PrivacyDesigning for Privacy
Designing for Privacy
 
Designing for Privacy
Designing for PrivacyDesigning for Privacy
Designing for Privacy
 
Mobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by MobidiggerMobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by Mobidigger
 
Privacy study Mobile and online Dating
Privacy study Mobile and online DatingPrivacy study Mobile and online Dating
Privacy study Mobile and online Dating
 
Privacy in the digital era
Privacy in the digital eraPrivacy in the digital era
Privacy in the digital era
 
Technology makes us a marketing tool, demographic
Technology makes us a marketing tool, demographicTechnology makes us a marketing tool, demographic
Technology makes us a marketing tool, demographic
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the Dragon
 
Privacy & Data Protection - Leon Sylvester Lemos - Privacy. That's iPhone.
Privacy & Data Protection - Leon Sylvester Lemos - Privacy.  That's iPhone.Privacy & Data Protection - Leon Sylvester Lemos - Privacy.  That's iPhone.
Privacy & Data Protection - Leon Sylvester Lemos - Privacy. That's iPhone.
 
Curiosity Stop Special: Techcrunch Disrupt 2016
Curiosity Stop Special: Techcrunch Disrupt 2016Curiosity Stop Special: Techcrunch Disrupt 2016
Curiosity Stop Special: Techcrunch Disrupt 2016
 
Privacy & Data Protection_Leon Sylvester Lemos_Privacy. That's iPhone..pdf
Privacy & Data Protection_Leon Sylvester Lemos_Privacy. That's iPhone..pdfPrivacy & Data Protection_Leon Sylvester Lemos_Privacy. That's iPhone..pdf
Privacy & Data Protection_Leon Sylvester Lemos_Privacy. That's iPhone..pdf
 
Social Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils FinalSocial Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils Final
 
Big Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media NetworksBig Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media Networks
 
Ama Web Trends Presentation
Ama Web Trends PresentationAma Web Trends Presentation
Ama Web Trends Presentation
 
Social Technology Quarterly 08
Social Technology Quarterly 08Social Technology Quarterly 08
Social Technology Quarterly 08
 

Mais de Robert Stribley

Best Practices for Simplifying User Experiences
Best Practices for Simplifying User ExperiencesBest Practices for Simplifying User Experiences
Best Practices for Simplifying User ExperiencesRobert Stribley
 
No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...
No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...
No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...Robert Stribley
 
Birds, Bats & Wind Turbines
Birds, Bats & Wind Turbines Birds, Bats & Wind Turbines
Birds, Bats & Wind Turbines Robert Stribley
 
Guidelines for Responsive UX Design 12/12/20
Guidelines for Responsive UX Design 12/12/20Guidelines for Responsive UX Design 12/12/20
Guidelines for Responsive UX Design 12/12/20Robert Stribley
 
Free Flow: The Economic Imperative for Restoring Immigration and Labor Movement
Free Flow: The Economic Imperative for Restoring Immigration and Labor MovementFree Flow: The Economic Imperative for Restoring Immigration and Labor Movement
Free Flow: The Economic Imperative for Restoring Immigration and Labor MovementRobert Stribley
 
No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...
No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...
No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...Robert Stribley
 
Introduction to User Experience Design 2/15/20
Introduction to User Experience Design 2/15/20Introduction to User Experience Design 2/15/20
Introduction to User Experience Design 2/15/20Robert Stribley
 
Introduction to User Experience Design 12/07/19
Introduction to User Experience Design 12/07/19Introduction to User Experience Design 12/07/19
Introduction to User Experience Design 12/07/19Robert Stribley
 
Guidelines for Responsive UX Design 11/16/19
Guidelines for Responsive UX Design 11/16/19Guidelines for Responsive UX Design 11/16/19
Guidelines for Responsive UX Design 11/16/19Robert Stribley
 
Introduction to User Experience Design 10/05/19
Introduction to User Experience Design 10/05/19Introduction to User Experience Design 10/05/19
Introduction to User Experience Design 10/05/19Robert Stribley
 
Guidelines for Responsive UX Design 07/20/19
Guidelines for Responsive UX Design 07/20/19Guidelines for Responsive UX Design 07/20/19
Guidelines for Responsive UX Design 07/20/19Robert Stribley
 
Introduction to User Experience Design 06/22/19
Introduction to User Experience Design 06/22/19Introduction to User Experience Design 06/22/19
Introduction to User Experience Design 06/22/19Robert Stribley
 
Introduction to User Experience Design 04/27/19
Introduction to User Experience Design 04/27/19Introduction to User Experience Design 04/27/19
Introduction to User Experience Design 04/27/19Robert Stribley
 
Guidelines for Responsive UX Design 03/23/2019
Guidelines for Responsive UX Design 03/23/2019Guidelines for Responsive UX Design 03/23/2019
Guidelines for Responsive UX Design 03/23/2019Robert Stribley
 
Introduction to User Experience Design 2/16/19
Introduction to User Experience Design 2/16/19Introduction to User Experience Design 2/16/19
Introduction to User Experience Design 2/16/19Robert Stribley
 
Introduction to User Experience Design 12/08/18
Introduction to User Experience Design 12/08/18Introduction to User Experience Design 12/08/18
Introduction to User Experience Design 12/08/18Robert Stribley
 
Guidelines for Responsive UX Design 11/15/2018
Guidelines for Responsive UX Design 11/15/2018Guidelines for Responsive UX Design 11/15/2018
Guidelines for Responsive UX Design 11/15/2018Robert Stribley
 
Introduction to User Experience Design 10/06/18
Introduction to User Experience Design 10/06/18Introduction to User Experience Design 10/06/18
Introduction to User Experience Design 10/06/18Robert Stribley
 
Guidelines for Responsive UX Design 07/07/2018
Guidelines for Responsive UX Design 07/07/2018Guidelines for Responsive UX Design 07/07/2018
Guidelines for Responsive UX Design 07/07/2018Robert Stribley
 

Mais de Robert Stribley (20)

Best Practices for Simplifying User Experiences
Best Practices for Simplifying User ExperiencesBest Practices for Simplifying User Experiences
Best Practices for Simplifying User Experiences
 
No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...
No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...
No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...
 
Birds, Bats & Wind Turbines
Birds, Bats & Wind Turbines Birds, Bats & Wind Turbines
Birds, Bats & Wind Turbines
 
Guidelines for Responsive UX Design 12/12/20
Guidelines for Responsive UX Design 12/12/20Guidelines for Responsive UX Design 12/12/20
Guidelines for Responsive UX Design 12/12/20
 
Free Flow: The Economic Imperative for Restoring Immigration and Labor Movement
Free Flow: The Economic Imperative for Restoring Immigration and Labor MovementFree Flow: The Economic Imperative for Restoring Immigration and Labor Movement
Free Flow: The Economic Imperative for Restoring Immigration and Labor Movement
 
No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...
No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...
No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...
 
Immigrant Song
Immigrant SongImmigrant Song
Immigrant Song
 
Introduction to User Experience Design 2/15/20
Introduction to User Experience Design 2/15/20Introduction to User Experience Design 2/15/20
Introduction to User Experience Design 2/15/20
 
Introduction to User Experience Design 12/07/19
Introduction to User Experience Design 12/07/19Introduction to User Experience Design 12/07/19
Introduction to User Experience Design 12/07/19
 
Guidelines for Responsive UX Design 11/16/19
Guidelines for Responsive UX Design 11/16/19Guidelines for Responsive UX Design 11/16/19
Guidelines for Responsive UX Design 11/16/19
 
Introduction to User Experience Design 10/05/19
Introduction to User Experience Design 10/05/19Introduction to User Experience Design 10/05/19
Introduction to User Experience Design 10/05/19
 
Guidelines for Responsive UX Design 07/20/19
Guidelines for Responsive UX Design 07/20/19Guidelines for Responsive UX Design 07/20/19
Guidelines for Responsive UX Design 07/20/19
 
Introduction to User Experience Design 06/22/19
Introduction to User Experience Design 06/22/19Introduction to User Experience Design 06/22/19
Introduction to User Experience Design 06/22/19
 
Introduction to User Experience Design 04/27/19
Introduction to User Experience Design 04/27/19Introduction to User Experience Design 04/27/19
Introduction to User Experience Design 04/27/19
 
Guidelines for Responsive UX Design 03/23/2019
Guidelines for Responsive UX Design 03/23/2019Guidelines for Responsive UX Design 03/23/2019
Guidelines for Responsive UX Design 03/23/2019
 
Introduction to User Experience Design 2/16/19
Introduction to User Experience Design 2/16/19Introduction to User Experience Design 2/16/19
Introduction to User Experience Design 2/16/19
 
Introduction to User Experience Design 12/08/18
Introduction to User Experience Design 12/08/18Introduction to User Experience Design 12/08/18
Introduction to User Experience Design 12/08/18
 
Guidelines for Responsive UX Design 11/15/2018
Guidelines for Responsive UX Design 11/15/2018Guidelines for Responsive UX Design 11/15/2018
Guidelines for Responsive UX Design 11/15/2018
 
Introduction to User Experience Design 10/06/18
Introduction to User Experience Design 10/06/18Introduction to User Experience Design 10/06/18
Introduction to User Experience Design 10/06/18
 
Guidelines for Responsive UX Design 07/07/2018
Guidelines for Responsive UX Design 07/07/2018Guidelines for Responsive UX Design 07/07/2018
Guidelines for Responsive UX Design 07/07/2018
 

Último

Anamika Escorts Service Darbhanga ❣️ 7014168258 ❣️ High Cost Unlimited Hard ...
Anamika Escorts Service Darbhanga ❣️ 7014168258 ❣️ High Cost Unlimited Hard  ...Anamika Escorts Service Darbhanga ❣️ 7014168258 ❣️ High Cost Unlimited Hard  ...
Anamika Escorts Service Darbhanga ❣️ 7014168258 ❣️ High Cost Unlimited Hard ...nirzagarg
 
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...SUHANI PANDEY
 
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Availabledollysharma2066
 
💫✅jodhpur 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATISFACT...
💫✅jodhpur 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATISFACT...💫✅jodhpur 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATISFACT...
💫✅jodhpur 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATISFACT...sonalitrivedi431
 
怎样办理伯明翰大学学院毕业证(Birmingham毕业证书)成绩单留信认证
怎样办理伯明翰大学学院毕业证(Birmingham毕业证书)成绩单留信认证怎样办理伯明翰大学学院毕业证(Birmingham毕业证书)成绩单留信认证
怎样办理伯明翰大学学院毕业证(Birmingham毕业证书)成绩单留信认证eeanqy
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Escorts Service Basapura ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Basapura ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Basapura ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Basapura ☎ 7737669865☎ Book Your One night Stand (Bangalore)amitlee9823
 
How to Build a Simple Shopify Website
How to Build a Simple Shopify WebsiteHow to Build a Simple Shopify Website
How to Build a Simple Shopify Websitemark11275
 
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...Pooja Nehwal
 
➥🔝 7737669865 🔝▻ dharamshala Call-girls in Women Seeking Men 🔝dharamshala🔝 ...
➥🔝 7737669865 🔝▻ dharamshala Call-girls in Women Seeking Men  🔝dharamshala🔝  ...➥🔝 7737669865 🔝▻ dharamshala Call-girls in Women Seeking Men  🔝dharamshala🔝  ...
➥🔝 7737669865 🔝▻ dharamshala Call-girls in Women Seeking Men 🔝dharamshala🔝 ...amitlee9823
 
Book Paid In Vashi In 8976425520 Navi Mumbai Call Girls
Book Paid In Vashi In 8976425520 Navi Mumbai Call GirlsBook Paid In Vashi In 8976425520 Navi Mumbai Call Girls
Book Paid In Vashi In 8976425520 Navi Mumbai Call Girlsmodelanjalisharma4
 
Top Rated Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...
Top Rated  Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...Top Rated  Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...
Top Rated Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...Call Girls in Nagpur High Profile
 
Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...
Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...
Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...home
 
Call Girls In Jp Nagar ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Jp Nagar ☎ 7737669865 🥵 Book Your One night StandCall Girls In Jp Nagar ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Jp Nagar ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Editorial design Magazine design project.pdf
Editorial design Magazine design project.pdfEditorial design Magazine design project.pdf
Editorial design Magazine design project.pdftbatkhuu1
 
Hire 💕 8617697112 Meerut Call Girls Service Call Girls Agency
Hire 💕 8617697112 Meerut Call Girls Service Call Girls AgencyHire 💕 8617697112 Meerut Call Girls Service Call Girls Agency
Hire 💕 8617697112 Meerut Call Girls Service Call Girls AgencyNitya salvi
 
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 
Top Rated Pune Call Girls Saswad ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Saswad ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Saswad ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Saswad ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Call Girls in Nagpur High Profile
 

Último (20)

Anamika Escorts Service Darbhanga ❣️ 7014168258 ❣️ High Cost Unlimited Hard ...
Anamika Escorts Service Darbhanga ❣️ 7014168258 ❣️ High Cost Unlimited Hard  ...Anamika Escorts Service Darbhanga ❣️ 7014168258 ❣️ High Cost Unlimited Hard  ...
Anamika Escorts Service Darbhanga ❣️ 7014168258 ❣️ High Cost Unlimited Hard ...
 
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...
 
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
 
💫✅jodhpur 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATISFACT...
💫✅jodhpur 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATISFACT...💫✅jodhpur 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATISFACT...
💫✅jodhpur 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATISFACT...
 
怎样办理伯明翰大学学院毕业证(Birmingham毕业证书)成绩单留信认证
怎样办理伯明翰大学学院毕业证(Birmingham毕业证书)成绩单留信认证怎样办理伯明翰大学学院毕业证(Birmingham毕业证书)成绩单留信认证
怎样办理伯明翰大学学院毕业证(Birmingham毕业证书)成绩单留信认证
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Escorts Service Basapura ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Basapura ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Basapura ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Basapura ☎ 7737669865☎ Book Your One night Stand (Bangalore)
 
How to Build a Simple Shopify Website
How to Build a Simple Shopify WebsiteHow to Build a Simple Shopify Website
How to Build a Simple Shopify Website
 
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...
 
➥🔝 7737669865 🔝▻ dharamshala Call-girls in Women Seeking Men 🔝dharamshala🔝 ...
➥🔝 7737669865 🔝▻ dharamshala Call-girls in Women Seeking Men  🔝dharamshala🔝  ...➥🔝 7737669865 🔝▻ dharamshala Call-girls in Women Seeking Men  🔝dharamshala🔝  ...
➥🔝 7737669865 🔝▻ dharamshala Call-girls in Women Seeking Men 🔝dharamshala🔝 ...
 
Book Paid In Vashi In 8976425520 Navi Mumbai Call Girls
Book Paid In Vashi In 8976425520 Navi Mumbai Call GirlsBook Paid In Vashi In 8976425520 Navi Mumbai Call Girls
Book Paid In Vashi In 8976425520 Navi Mumbai Call Girls
 
Top Rated Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...
Top Rated  Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...Top Rated  Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...
Top Rated Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...
 
Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...
Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...
Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...
 
Call Girls In Jp Nagar ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Jp Nagar ☎ 7737669865 🥵 Book Your One night StandCall Girls In Jp Nagar ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Jp Nagar ☎ 7737669865 🥵 Book Your One night Stand
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Editorial design Magazine design project.pdf
Editorial design Magazine design project.pdfEditorial design Magazine design project.pdf
Editorial design Magazine design project.pdf
 
Hire 💕 8617697112 Meerut Call Girls Service Call Girls Agency
Hire 💕 8617697112 Meerut Call Girls Service Call Girls AgencyHire 💕 8617697112 Meerut Call Girls Service Call Girls Agency
Hire 💕 8617697112 Meerut Call Girls Service Call Girls Agency
 
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Top Rated Pune Call Girls Saswad ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Saswad ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Saswad ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Saswad ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
 
Abortion Pills in Oman (+918133066128) Cytotec clinic buy Oman Muscat
Abortion Pills in Oman (+918133066128) Cytotec clinic buy Oman MuscatAbortion Pills in Oman (+918133066128) Cytotec clinic buy Oman Muscat
Abortion Pills in Oman (+918133066128) Cytotec clinic buy Oman Muscat
 

Designing for Privacy in an Increasingly Public World — Speed Talk

  • 1. Designing for Privacy in an Increasingly Public World Design Museum Week| 27 April 2022 | Robert Stribley
  • 2. What do we mean by designing for privacy?
  • 3. • In 2021, we learned that Facebook, the most popular social media platform on the planet had been hacked • 533 million user’s phone numbers and personal data were leaked online • Fraud & identity theft on the rise during the pandemic • FTC: 1.4 million reports of identity theft in 2020 — double from 2019 Data Security & Identity Theft
  • 4. Clearview.ai, a facial recognition platform offers services to law enforcement. They downloaded over 3 billion photos of people from the Internet and social media and used them to build facial recognition models for millions of people without their permission. Facial Recognition Illustration: Elena Lacy for Wired Photo by Kyle Glenn
  • 5. The New York Times reported on how the donation site for Donald Trump deployed “dark patterns” to trick supporters into agreeing to recurring donations, earning the campaign a huge spike in contributions Dark Patterns
  • 6. Data Sharing A 2019 survey by RSA found only 17% of respondents said it was ethical to track their online activity to personalize ads. Apple rolled out a new iPhone privacy feature called “App Tracking Transparency,” which prevents apps from following you across the internet. Hugely popular in US: Only about 20% of iOS users allowing apps to track them so far.
  • 7. What’s Our Role as Designers?
  • 8. “Arguing that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about free speech because you have nothing to say.” — Edward Snowden, former CIA employee, NSA leaker Why Care About Privacy?
  • 9. • Even if we’re not concerned with a particular privacy issue, we’re not designing for ourselves • If we’re designing for privacy, we’ll consider the needs of people not like ourselves — people with different backgrounds and experiences • That means researching privacy issues, but also interviewing or talking to people with diverse backgrounds and lived experiences Why Care About Privacy?
  • 10. For example, LGBTQ youth should feel their privacy is secure when reaching out for help online. In this sense, privacy issues are very often also diversity issues. Privacy is a key consideration for inclusive design. Why Care About Privacy? Screenshot from The Audre Lorde Project’s Facebook page
  • 11. We may need to explain to our clients the impacts of ignoring privacy concerns. • Civic responsibility: Encourage clients to treat their “end users” as human beings, who are members of their community • Reputation management: Remind clients that what companies do can undermine their brands • Site abandonment: Using dark patterns may anger people, prompting them to leave your site for another with a more transparent experience • Financial consideration: Fine for not following the increasing number of laws and regulations (GDPR & California Consumer Privacy Act) Even if there’s an up-front cost to designing for privacy, the long-term costs can be devastating. Our Role
  • 13. In her Privacy by Design manifesto, Dr. Ann Cavoukian recommends making privacy the “default setting” in our designs and says privacy should be “embedded” into design. What are some practical ways to ensure we’re doing that? Best Practices “Privacy by Design: The 7 Foundational Principles” by Dr. Ann Cavoukian Founder of Global Privacy & Security by Design and the former Information and Privacy Commissioner for the Canadian province of Ontario
  • 15. Dark Patterns UX designer Harry Brignull coined the term dark pattern: a “user interface that has been carefully crafted to trick users into doing things” that you didn’t mean to do — like buying or signing up for something.
  • 16. Dark Patterns “Dark patterns are the canaries in the coal mine of unethical design. A company who’s willing to keep a customer hostage is willing to do worse.” — Mike Monteiro, Ruined by Design
  • 17. Here on a major airline site, the customer has already chosen Basic Economy but "Move to Main Cabin”— which costs $100 more — is placed as a large red button where you’d typically find a "Next" button. Here the pattern is used to trick people into an upsell. But the same pattern is used to trick people into sharing their personal information in ways they didn’t intend to. Dark Patterns
  • 18. Strava, a popular app for runners, automatically tagged other runners when you passed them if they didn’t change their settings. This feature had a name: Flyby. If you clicked on a face, it showed the user’s full name, picture and a map of their running route — effectively revealing where they lived. This happened without you following users and without them knowing they were sharing their activity. After receiving criticism, Strava did change the default setting to private. But it should have always been private. Dark Patterns
  • 19. Be transparent about what personal data is used What Data Is Used? 2
  • 20. Be specific about what data is shared— especially when sharing PII. Personally identifiable information — data points such as name, email, phone number, social security number, mother’s maiden name, can be used to steal people’s identities and to commit fraud 87% of the U.S. can be uniquely identified by just their date of birth, gender, ZIP code (Those items aren’t even considered PII.) Imagine how much damage a bad actor can do with just 3 data points of PII. What Data Is Used?
  • 21. Be transparent about why specific personal data is collected or shared Why Is Data Used? 3
  • 22. Consider this an opportunity to explain the benefits of sharing their data: • Does it ensure a better experience in the future? • Does it personalize ads and offers for them? And if you can’t explain the benefits, consider whether you’re designing the right sort of product. Why Is Data Used?
  • 23. Why Is Data Used? The home insurance app Lemonade sets a great standard for transparent privacy policies. They include an itemized, detailed explanation of what personal information you’re sharing, as well as why. They also promise never to sell your information to third parties. “TL;DR: We will never, ever, sell your data to anyone.”
  • 24. Always use clear, approachable language Clear Language 4
  • 25. Clear Language In 2019 The New York Times studied 150 privacy policies from various platforms. They described what they found as an “incomprehensible disaster.” They described AirBnB’s privacy policy as “particularly inscrutable.” Vague language and jargon allow for broad interpretation, making it easy companies to defend their practices in a lawsuit but hard for us to understand what’s really going on.
  • 26. Twitter advises you to read their privacy policy in full but highlights key aspects of it up front advising you to pay attention to those specific points. Clear Language
  • 27. Give users options to control their own data User Controls 5
  • 28. User Controls Google offers a Privacy Checkup with high level descriptions of how your personal data is being used and why. They allow you to turn off activity tracking, location history, your YouTube history, your Google photo settings, check which third parties have access to your information, and access other key settings all in one sort of privacy dashboard.
  • 29. Ensure these privacy features are placed contextually and easy to find Easy to Find 6
  • 30. Easy to Find Contextual and easy to find also means … Onboarding — Explaining in detail how you use people’s data when they’re using your app for the very first time. “Just in time” alerts – Alerting users in the moment—when they’re about to share data in a new way—even if they’ve already been using your experience.
  • 31. Easy to Find Mozilla displays robust Privacy information by default in a dedicated tab when you download and open their Firefox browser for the first time.
  • 32. Remind users regularly about their privacy options And actively encourage them to take advantage of them Reminders 7
  • 33. Reminders Facebook allows you to set reminders to do a privacy checkup every week, month, 6 months or year. Google also has a feature, which will send you a reminder to check your privacy settings.
  • 34. One final point: Never change users’ privacy settings without telling them in advance. And ensure they have the option to opt out. Never Change Without Notice 8
  • 35. A few years ago, Facebook made users’ “likes” visible overnight, which consequently may have outed some people in the LGTBQ community or revealed people’s personal, political or religious beliefs. When I asked an employee how they justified this change, they responded that the company valued transparency and wanted people to be transparent about their interests. Facebook’s founder Mark Zuckerberg had even famously said privacy was no longer a “social norm.” Never Change Without Notice
  • 36. We don’t have the right to make decisions about other people’s personal data on their behalf. Assuming everyone’s information can safely be made public is a belief that comes from a position of privilege. We should never make decisions like this, which can profoundly affect people’s privacy without their explicit consent. Never Change Without Notice
  • 37. We talk a lot about “empathy” in design. If we design with empathy, we won’t design experiences we wouldn’t want to use ourselves. And we won’t design using “dark patterns” either. Conclusion Photo by Josh Calabrese
  • 38. Privacy is not about secrecy. It’s all about control. — Dr. Ann Cavoukian If we want to ensure people have control over their own personal information If we want to ensure the experiences we design are user friendly and truly “user-centered” We’ll keep these best practices for privacy in mind Conclusion Photo by Zanardi, Unsplash

Notas do Editor

  1. Design for Privacy & Security – Presentation for Early Careers Experience new employees by Robert Stribley As presented on 14 March 2022
  2. Privacy Issues – What do we mean by designing for privacy? Photo by Matthew Henry, unsplash - https://unsplash.com/photos/fPxOowbR6ls
  3. Early April and one half billion users’ personal data revealed hacked, leaked online https://www.businessinsider.com/stolen-data-of-533-million-facebook-users-leaked-online-2021-4
  4. Facial Recognition Illustration: Elena Lacy for Wired https://www.wired.com/story/clearview-ai-scraping-web/
  5. Dark Patterns NYT – How Trump Steered Supporters Into Unwitting Donations https://www.nytimes.com/2021/04/03/us/politics/trump-donations.html
  6. Data Sharing Apple’s anti-tracking shield - https://www.nytimes.com/2021/09/16/technology/digital-privacy.html
  7. What’s Our Role as Designers?
  8. Edward Snowden
  9. Why Privacy?
  10. Why Privacy?
  11. Our Role
  12. Best Practices
  13. Best Practices
  14. Dark Patterns
  15. Dark Patterns
  16. Delta dark pattern
  17. Dark Patterns
  18. Maintain transparency about what personal data is used
  19. Be transparent about why specific personal data is collected or shared Illustration from here: https://www.imperva.com/learn/data-security/personally-identifiable-information-pii/
  20. Be transparent about why specific personal data is collected or shared
  21. Be transparent about why specific personal data is collected or shared
  22. Transparency - Explain the specific purpose behind collecting or sharing personal data – Lemonade as a good example
  23. NYT - We Read 150 Privacy Policies. They Were an Incomprehensible Disaster by Kevin Litman-Navarro - https://www.nytimes.com/interactive/2019/06/12/opinion/facebook-google-privacy-policies.html
  24. NYT - We Read 150 Privacy Policies. They Were an Incomprehensible Disaster by Kevin Litman-Navarro - https://www.nytimes.com/interactive/2019/06/12/opinion/facebook-google-privacy-policies.html
  25. Clear Language
  26. User Controls
  27. User Controls
  28. Easy to Find
  29. Onboarding + Just-in-time alerts
  30. Easy to Find – Firefox example
  31. Reminders
  32. Reminders – Facebook example
  33. Never Change Without Notice
  34. Never Change Without Notice https://www.theguardian.com/technology/2009/dec/10/facebook-privacy
  35. Never Change Without Notice https://www.theguardian.com/technology/2009/dec/10/facebook-privacy
  36. Conclusion Photo by Josh Calabrese, Unsplash https://unsplash.com/photos/XXpbdU_31Sg
  37. Conclusion Photo by Zanardi on Unsplash https://unsplash.com/photos/GJY1eAw6tn8
  38. Thank you!