BACK

Data Privacy and Consent | Fred Cate | TEDxIndianaUniversity

thank you I'm gonna warn you right now,there no there no audiovisuals and part,of that's because if you're looking at,someone I want you to be looking at me,and part of that's because after 30,years of working in technology I don't,trust it,but don't worry I have I have note cards,and when I told the organizers this they,look slightly chagrined but I said don't,worry it's only for the long boring,quote so I want to use and the,statistics that I want to bore the,audience with and that made them feel a,great deal better so let me say when I,heard the topic was entropy nothing came,to mind faster to my mind than data,because we are surrounded by data that,seems to be falling out of control data,being lost by corporations data being,stolen from government agencies data,that we are volunteering that's being,collected about us billions of bytes a,day,that seems hopelessly out of control and,just to continue the focus on entropy it,seems to be getting worse so I thought,what I might do this evening is talk,about particularly the challenge of,personal data and privacy so remember,all of this data that we are talking,about much of it we are volunteering we,are posting those pictures of our,delicious meals that we think our,friends care about we are engaging in,millions and millions of texts a second,we are posting images and videos at a,colossal rate at a rate that could not,have been imagined it's become almost,meaningless to talk about the volume,because unless you're a computer,scientists talking about things like,petabytes and terabytes I just start,starts to add up to the point it means,nothing but it has a tremendous impact,on our privacy it has a tremendous,impact on this data that's being um that,we are volunteering that's being,collected about us in some cases it's,being calculated or inferred about us,are you a good credit risk should you be,able to buy that car are you somebody,that we want to market to these may not,even be data that really exists,about you but rather that are being,created the New York Times reported in,2017 this begins the statistics that,accompany you've never heard of not,Facebook not Amazon not a company that,trips off your tongue engages in 50,trillion personal data transactions a,year that's buying and selling your data,and mine every year it seems completely,out of control and along with it our,privacy there are many reasons for this,but the one that I want to focus on,which I think will be I hope of interest,to you and I think is a tiny bit,controversial,is the role that consent plays in data,protection and privacy today modern,privacy law really came about in the,1960s and it came about from an academic,study so this makes people who work in,universities very happy dr. Alan Weston,who was at Columbia University wrote his,doctoral dissertation for which he later,got funding to turn into a book this,sounds familiar so far called privacy,and freedom and in that book he defined,privacy in a way that every country in,the

The above is a brief introduction to Customer Privacy

Let's move on to the first section of Customer Privacy

Consumer Privacy

Consumer Privacy

consumer privacy explainer written,interrupted by CLU students do you ever,feel like while you're on the computer,you are being watched,well if you are on the Internet most,likely you are being watched the Federal,Trade Commission issues a,self-regulation policy the law provides,people with a set of rights to enable,them to decide how to weigh the costs,and benefits of the collection use or,disclosure of their information people's,consent legitimizes nearly any form of,collection use and disclosure of,personal data new tools like the,do-not-track setting are now available,on select browsers but like,self-regulation it has its limitations,our business is not dependent collecting,personal data we have no interest in,amassing personal information about our,customers this is a recent claim right,Apple about its privacy policy but can,Apple seriously claim that while,operating a nearly compulsory email,service the world's largest digital,media store and digital media problem,payment platform and iCloud which,explicitly collects a personal data,virtually every iOS user when the,Microsoft's latest ad campaign promises,your privacy is our priority a Microsoft,led the way for companies to open up,their servers and massive data,warehouses to NSA and FBI data snooping,as for Facebook and it's automatically,default sent that people can be your,profile search for you on a search,engine view what you post on others,friends walls and take your information,of the image to be placing ads recently,it was discovered that cookies have to,be enabled Nordby use Facebook a survey,visa for recent phone interviews with,over a thousand adults reveals faced,with as the least trusted keeper of data,in a poll that includes the IRS Google,Internet service providers and the NSA,Google is one of the few companies out,there that explains in the privacy,policy what information they collect and,why they collect it how they use that,information and the choice that they,offer including how to access and update,information it's completely up to you,about whether to lavish or not not them,according to the Harris poll conducted,by Issa four out of five people have,changed their privacy settings on their,accounts for social media within the,last six months the Do Not Track button,that can be installed into people's web,browsers doesn't stop all web,trafficking,Christopher Killebrew ski a legislative,council at the American Civil Liberties,Union says that it's a good,but we want you to be able to not be,tracked at all if you choose so while,privacy is an issue of concern for many,Americans there are some who are less,interested in it research states that,some people are willing to give up a,certain amount of privacy if they,believe they are gaining something of,value in return the research states have,some privacy infringement might actually,be of benefit to a consumer if he or she,is receiving tangible benefits like a,monetary payment but there are also,significant intangible benefits s

After seeing the first section, I believe you have a general understanding of Customer Privacy

Continue the next second section about Customer Privacy

Customer Privacy: the journey from compliance to customer trust

Customer Privacy: the journey from compliance to customer trust

well good afternoon and welcome everyone,to this panel discussion on custom,privacy,the journey from compliance to consumer,trust,as you all know um our world is changing,faster than we can imagine and for,businesses customer data,is at the center of innovation and the,very core to developing,new propositions products and,experiences,so this session will discuss how,businesses can focus,less on compliance and more on managing,personal information to create a,stronger customer relationship,and we've got four people here who are,ideally qualified to discuss this,i won't introduce them in detail i'll,simply give you their name and allow,them to say hello and tell you what they,do and why they're here,thank you thank you keith and good,afternoon everybody,um,i'm here because i am interested in um,really,engendering trust in our organization,both in terms of the employees the,customers we serve contractors suppliers,etc i,my background is in computer science and,statistics um i have taken on privacy,relatively recently in my,career but i have gone gung-ho and uh,and all in neck deep um i am currently,in the working in the retail industry,which is,having a light shone upon it at present,by um by government,uh and we really need to put extra focus,on,uh looking at the way we do things and,have done things in the past and seeing,what we can do to optimize,and design initiatives and and products,and services and experiences etc in a,privacy-centric way so,it really is all about moving from,compliance to trust um looking forward,to the chat,excellent,and,gunasekra gehan introduce yourself,please,yes good afternoon uh everyone uh i'm an,associate professor at the university of,auckland uh business school in the,department of commercial law,uh and i specialize in in data privacy,law uh i was also a member of the uh,advisory group to the law commission,advising it on reform of the privacy act,leading up to the 2020 legislation which,i helped in drafting,and,in my other work i am also currently the,chair of privacy foundation new zealand,which is a not-for-profit organization,some of you may have heard about uh that,lobbies for uh you know better privacy,education and better privacy rights for,for new zealanders um i should also say,that i teach courses here at the,university of auckland on the privacy,act and i teach courses on information,governance and we have a 100 online,program where you can uh study for a,master's degree in information,governance and that's a brand new,program,it's kicked off at the end of last year,and i'm currently teaching on that,program,thank you gehan and,hannah taylor hannah good morning and,welcome,good morning hello everyone my name is,henna and i also work for foodies,alongside mez um currently my role at,foodstuffs is i am the team leader for,our new world team for the north island,um obviously looking after our customers,in our stores on our ecommerce platform,um i've got over 15 years of experience,in retail project managem

After seeing the second section, I believe you have a general understanding of Customer Privacy

Continue the next third section about Customer Privacy

AWS Utility Customer Privacy & Security

AWS Utility Customer Privacy & Security

security plays a big part of what we do,a meter is installed or a sensor is,installed or a pump is installed,somewhere out in the field it's,transmitting that data it's a location,out there potentially at a customer's,home and so we're very sensitive to the,fact that we are dealing with data from,devices that exist out in the field that,could be interpreted in some governance,rules as customer utilities are,increasingly looking to leverage cloud,and cloud services to better support,their business operations to better,connect and enable their customers but,also to take advantage of some of the,security and resilience benefits AWS,supports sensitive security requirements,across the globe for critical,infrastructure customers as well as,public sector or government entities in,terms of security we have to put in,place different features thanks to the,cloud and AWS especially the first one,is the trust ability of the use of the,data across the globe each owner of data,must be sure that the data is used,correctly by others the second one is,the ability to put some anonymization in,correlation with the GDP era with AWS,security you're going to see the similar,security measures that you would have in,the data centers such as physical server,security physical security controls,server isolation isolation of the,network and isolation of storage instead,of having to maintain your own,infrastructure or your data center you,can apply those resources internally to,more innovation and then you can get as,needed services such as compute power,database and storage on an as-needed,regardless of the amount of investment,that you have in AWS you're able to,inherit the security controls that we've,put in place for security the cloud,infrastructure and these are controls,that we've put in place to meet the,needs of some of our most security risk,sensitive customers because their,customers are potentially logging into,and viewing data that we're presenting,on behalf of the utility we ask to,adhere to not only the audit,requirements and the governance rules,that we enforce upon ourselves or maybe,that our industry requirements but that,whatever the customer in their locale,are required to comply with as well AWS,makes that a lot easier and that we,don't have to worry about whether or not,the underlying infrastructure of DD are,compliant or gdpr compliant or CCPA,compliant that as long as we've added,that layer on top of that for ourselves,for that customer in the locale that,we're in that we can check the box on,that pretty easily and we're in a,position to meet customers and utility,and customers requirements a lot faster,than we were if we had to do it,individually for every single

After seeing the third section, I believe you have a general understanding of Customer Privacy

Continue the next fourth section about Customer Privacy

GDPR Customer Privacy Rules are TOO IMPORTANT to Ignore

GDPR Customer Privacy Rules are TOO IMPORTANT to Ignore

hello everyone welcome back to the man,who bite sound bites,I'm Amy pose are you curious about GDP,our regulations and how they might,impact your business today Anna breaks,down how you can protect yourself some,radical legislation was just passed in,May of 2018 and if you have a customer,base at all you should probably keep,listening the general data protection,regulations or GDP are is a privacy,legislation enacted by the European,Union because of the mere location of,these regulations it seems it might be,an easy thing for businesses based,elsewhere to dismiss especially if they,know that none of their customer base is,within that area however we would urge,you to reconsider that fact as you are,likely impacted even if you only do,business within the US and Canada first,things first what is GDP are the GDP are,is a legal framework that the EU,established to provide more protection,for the citizens of its 28 member,countries and States it establishes,guidelines that govern how businesses,can collect and process their customers,personal information in addition the GDP,are also set requirements for data,management and the protection of,individuals these regulations aren't,just on paper either companies that,breach them can be slapped with heavy,fines that equal up to 4 percent of,their global revenue,yikes the GDP our rules went into effect,on May 25 of 2018 it is unarguably the,most expansive change that privacy rules,have seen in decades in spite of a fair,amount of media coverage regarding its,impending implementation it's estimated,that only about half of the companies in,the US prepared for GDP are what's even,worse is that by not preparing these,companies could be setting themselves up,for disruptions in their customer,relations some more significant fines,and other things so what's involved in,complying with GDP are as I mentioned a,company that isn't based in one of the,EU states might think that they don't,need to follow the regulations but that,assumption would be false if such a,company has,one resident from the European Union on,their email list or collected,information from them during the,checkout process they are affected by,the GDP our not only does the GDP are,establish strict guidelines concerning,the way businesses collect store and,manage customer information they receive,these companies must also be more,transparent regarding those practices,any EU customer can request to access,that data and that information must be,provided to them within one month in,addition that data needs to be in,machine readable format the GDP are also,states that a business must be granted,consent before they can either store or,use any customer data if a company,experiences a breach in their data in,any form the people who have been,impacted must be notified within 72,hours so is your company impacted by the,GDP are any company that has any data on,any citizen of an EU members country or,state is impacted by the GDP are the,possibilities when it com

After seeing the fourth section, I believe you have a general understanding of Customer Privacy

Continue the next fifth section about Customer Privacy

JahiaX DC 2016 - The Power of Customer Privacy

JahiaX DC 2016 - The Power of Customer Privacy

by the way thanks drive here for this,the passionate explanation about what,you do at European payment with drea and,as armor of facts the story with your,open apartment it's I mean we know each,other for the last ten years I think as,I said jay is probably the most deploy,technology as European Parliament but,also it's a great proof of how an open,source business model can help the,people that use the technology in a,win-win relationship so when we want the,first project it was an intranet back in,the days it alpers to build the first,document management classified by,dueling core metadata capabilities it,was a first project and the open,Parliament the open Zeus way contribute,that haskers to develop that and we put,that in the core of the system and that,it was a first project that started this,the story and this intimacy we have with,our customers the way when we say that,our customer are actually driving our,roadmap its I mean European Parliament,it's a great proof of that through our,subscription model every ideas every bug,because as a software we face on bug but,the thing is we pre ties we are customer,centric organization we fix those things,as soon as a cure but most importantly,it's not just about bugs it's also about,this type of request is the European,Parliament request thing about workflow,and is a workflow of 25 languages on,website and they have ideas about that,to improve our platform we have to,listen and actually our entire business,model we utilize the open-source,development model to build a better,software and if we have great things but,to carry on our customer privacy,today it's because we listened to a,customer for the last 10 years it's our,DNA and that's why having a customer,that actually request to someone in,charge of the roadmap which is claimed 0,on this event looks like something,unusual but yeah you are Jaya we are,special and this is always happening,this is a way we all listen to customer,so thanks again our beer and pls fuel us,with more ideas so customer privacy,remember true this morning I talked,about the fact that to lead the third,wave you need it's all about agility,it's all about customer privacy and what,we provide as a platform its innovative,customer experience with privacy that,buys design and a lot of time there is,an opposition between customer privacy,versus marketing tools we think that all,brands can really leverage the power of,customer privacy and you will see that,this resonate a lot with what Mark told,us this morning so more up and you are,the more trust you will have the more,happy customer and any recurring,customer you will get again we are able,with our technology to get a massive,amount of data that define customer even,where you download it you do not know,them but even after as soon as you know,them you collect you merge you,understand exactly what they are doing,and this is the best way to build a,one-to-one relationship but those days,if you want some website here in that,example

After seeing the fifth section, I believe you have a general understanding of Customer Privacy

Continue the next sixth section about Customer Privacy

Protect Customer Privacy While Enriching Data Analytics

Protect Customer Privacy While Enriching Data Analytics

hello and welcome to protects customer,privacy while in routine data analytics,my name is Ryan Peterson I'm the global,technology segment lead for data at,Amazon Web Services I'll be your host,moderator for today's webinar today I'm,joined by dr. Renaud Singh the,Enterprise Architect for data guys as,well as Tyrone Mills the chief,information security officer at row,today we're going to discuss how to,reduce risk by masking personally,identifiable information before enters,your data repositories we're gonna talk,about how to effectively inspect all,kinds of data including structured and,unstructured data for sensitive,information and we'll talk about,simplifying solutions to protect you,against gdpr,audits of personal data I'll go first,and talk a little about AWS and our,plans around data governance next data,guys will talk about what they do with,AWS and finally trove will talk about,how they've implemented these,capabilities within their environment so,our customers tell us that AWS has five,really unique benefits and the main,reasons that they choose us from an,agility perspective customers can stand,up very quickly and efficiently any of,the capabilities that are required for,their environment elasticity means that,they can scale and grow that,environments automated way so they don't,really have to think about that,infrastructure more no more having to,buy servers and send them up and try to,make it work and long lead time v4 they,can scale globalization because we have,facilities throughout the globe that are,all qualified for those particular,countries and regions that allows you to,scale that infrastructure into whatever,environment you may need to scale your,business into reduction in cost because,you no longer are buying that equipment,that you may not even need after you use,it for some period of time or maybe,you're having to buy too little and not,have enough to keep up with the,customers demand and finally,functionality with thousands of new,capabilities added to the environments,every year we look to be to the,best-in-class as far as new features and,functions you may need,but we're here today because we want to,talk about some problems and challenges,we're seeing in the world just in the,last couple minutes of talking we would,have seen over 10,000 records stolen,from environments in some way whether,that was a malicious outsider or,malicious insider this idea of data,breach is becoming a problem and usually,it's because of some sort of hacking,attempt but oftentimes because somebody,on the inside either walked out of with,the data by accident because a 18%,accidental loss or really what I worry,about is that 9% malicious insiders it's,one thing to have outside protection,perimeter protection so another thing to,try to protect against the people that,you in theory need to trust,we reached out the customers we talked,about this privacy issues being a,question we started asking what do you,know about your data and it was amazing,how

After seeing the sixth section, I believe you have a general understanding of Customer Privacy

Continue the next seventh section about Customer Privacy

#PassauDPE: 'Protecting customer privacy is good for firms'

#PassauDPE: 'Protecting customer privacy is good for firms'

today,it's our great pleasure to welcome,professor kelly martin,from from colorado state university,she's a well-known marketing expert,on for example the marketing ethic,ethics firm strategy interface,and particularly focuses on,the topic on several topics on political,marketing strategy,firm approaches creating well-being but,in particular also,on the topic of data privacy,due to your background and,your interest also in these political,aspects and consumer well-being aspects,you're also currently the,co-editor-in-chief of the journal of,public,policy and marketing and,um yeah you are particularly well known,for your work on consumer reactions to,their,vulnerability towards privacy breaches,which has been published in the,journal of marketing in your talk you,will now,address the critical tensions that,exists,between customers firms and regulatory,interests,which pose unique challenges for,understanding and protecting consumer,privacy and,this is of course very relevant,particularly in a,platform ecosystem context where we have,very,different interests a lot of tensions,that need to be addressed and need to be,considered and yeah,you really focus in your talk now on,those,digital platform ecosystems the topic is,protecting customer privacy is good for,firms research insights and implications,for digital,platform ecosystems thank you,kelly for being here um it's very early,in,colorado right now um it's great that,you,that you made it the stage is yours,all right seeing everything just fine,then,okay wonderful um well it's just,wonderful to be here,and yes a little early but what a what a,great,way to begin the day and uh talk about a,topic that is of course very,uh near and dear to my interests and as,not,as john mentioned a topic that certainly,fits well under the broader heading of,digital platform ecosystem ecosystems,and,i'm excited about the initiatives,happening at the university of pasau,and hopefully um there will be some,insights from the talk today that,resonate,with the great work that your team is,doing so to begin,i'll just give you a little overview of,my talk for today jan already provided a,very kind introduction,um so i'll kind of breeze past that part,but uh provide a few definitions that,will help,sort of work through the topics that,i'll be discussing today,and then i'd like to share three broad,research insights from my work over the,years that i think,kind of do a nice job of coalescing some,implications for digital platform,ecosystems and so i'll try to spend,uh quite a bit of time talking about,that and then some concluding thoughts,right yeah we cannot see the slides yet,oh my goodness,yeah this by the way gives me the,opportunity,um to say something which i forgot which,is that,the talk will be recorded um so,everybody who has a question,um needs to be aware that when asking,that question during the talk,also the questions will be recorded um,afterwards we have a q a session which,will not be,recorded yeah so it's not t

After seeing the seventh section, I believe you have a general understanding of Customer Privacy

Continue the next eighth section about Customer Privacy

AWS re:Inforce 2019: Protect Customer Privacy with AWS (GRC351)

AWS re:Inforce 2019: Protect Customer Privacy with AWS (GRC351)

good afternoon everyone my name is Rohit,Poojari I'm with AWS as a part of,solutions architecture team with me I,also have my colleague unheard Preet,Singh here who is from Data guys and,will be sharing the slides together to,present to you how we protect the,customer privacy with AWS as we go to,this presentation you will get to hear,about the AWS in the context of data,Lake and as well as in the later part of,presentation we're gonna talk about what,data guys is truly doing to make data,Lake secure and at their secret sauce in,making sure how they offer the customer,privacy protection offerings with their,with their suite of products so before,we dive in let's take a look at some,metrics with every security presentation,I'm sure you've been to there's some,level of fear-mongering so I'm not going,to use this as a fear-mongering slide,but just to emphasize on the fact that,if you look at the breach index present,if you look at the breach index survey,and they have done the surveys across,multiple breaches that have happened,over the years one metric I want to draw,your attention to is there are almost,like seven million records stolen every,day and if you look at the most recent,stats you're gonna find out that there,are over 14 billion records that have,been stolen since 2013,an interesting fact about that is only,four percent of the records that were,stolen were actually encrypted right so,that's an amazing stat for me because,rest of the 96% of the data was in clear,plain text right that goes to emphasize,the fact that encrypt your data like,everyone's watching not that we want to,watch your data writing encryption,should be as a design principle,incorporated into every single use case,that you work towards another statistics,I want to draw your attention to is 18%,of the data loss that customers or,different types of institutions who have,breached C is 18 percent of that data is,an accidental loss which means the data,that was lost because there weren't,governance processes in place or was in,an unintentional or they just did not,have good security controls from that,data,so it could have been completely,preventable if they had those guardrails,in place and at the heart of that is the,PII data and the reason why PII data is,important and also can cut you in a very,skatey way is because if your records,are stolen and if you have customer,personally identifiable information,embedded within those records you can,tie the two together and clearly,identify the person who that data,belongs to and that could create,magnitudes more risk in terms of the,possible impact through making sure to,through leading that data to exposure,that's the first and the second would be,misused by the third parties and also,the malicious actors can use that data,to external forms of hacking they can,take that information and maybe do,social engineering right and I would say,that my grandmother would completely,fall prey to a social engineering,activity where your perso

After seeing the eighth section, I believe you have a general understanding of Customer Privacy

Continue the next ninth section about Customer Privacy

7 Steps to Protecting Customer Privacy

7 Steps to Protecting Customer Privacy

the research that we did we actually got,in 2012 perhaps the only piece of,research around big data and retail and,again you know this year an interesting,shift in terms of just what retailers,perceive as the biggest challenge the,first year it was data volume so,handling you know this huge huge swathes,of data that come and retailers are,pretty good at it you know with POS,transactions this year retailer said,that handling get a velocity organizing,it and integrating is the biggest,challenge and you know it's fairly,obvious why you think so because a lot,of unstructured data coming in the fact,that they're facing this problem now,having evolved over last year in terms,of using these different data sources to,make decisions so I think from a,challenge perspective that's I think how,the challenge is come you know come,forth and I think it will continue to be,that that important and challenging I,think the first step is you know take,stock of what data you collect why do,you collect it what's the relationship,between it because just that exercise is,an exercise in both organizing data,asking questions I think that prompts,the decision for resources investments,like master data man but like a single,way of the customer which are all good,and should happen I think the first step,is just an assessment of you know what,area that you have you secure it well,how is it organized enough for the,semantic layer which I think will become,even more important going forward as,retailers think of themselves and I,think they now think of themselves as,being custodians of the customer,experience and at the same time you have,a deep crust with the customer because,if the customer is giving that,information to either explicitly or,implicitly when they browse to you,there's a great deal of trust that,happens there and I think breaking that,trust has huge repercussions for the,brand for the retailer no probs and,we've seen examples of this across,industries and also in retail I think,from a best practices perspective I,think there are there actual number of,directives both in us as well as in,you're up around just PVC laws I think,for best practices I think there are,broad seven steps that you kind of take,and I think this is modeled on the thing,the European directive of privacy where,the first question is so you know no am,I being track right now so notify the,user whether he or she is being tracked,the second is who is tracking me is it a,retailer or is it a third party for what,purpose are you tracking,so clear disclosure of intent and also,purpose so what will you use this for so,and at the same time promising the,security aspect so making sure that you,secure the data in the best possible way,that you can then is about access to the,data so even though I have provided some,data implicitly or explicitly to you I,should have the option of turning that,off adding new data deleting data and,finally around accountability of this,data and I think those you know broad 7

Congratulation! You bave finally finished reading Customer Privacy and believe you bave enougb understending Customer Privacy

Come on and read the rest of the article!

I am a shopify merchant, I am opening several shopify stores. I use ppspy to find Shopify stores and track competitor stores. PPSPY really helped me a lot, I also subscribe to PPSPY's service, I hope more people can like PPSPY! — Ecomvy

Join PPSPY to find the shopify store & products

To make it happen in 3 seconds.

Sign Up
App rating
4.9
Shopify Store
2M+
Trusted Customers
1000+
No complicated
No difficulty
Free trial