SlideShare una empresa de Scribd logo
1 de 17
Candice Martinez
Deliberate Reasoning
Amazon Kindle Fire
• Silk Browser raises controversy
• Split browser partially operates from cloud
server
• Kindle Fire only allows the Silk Browser
http://www.youtube.com/watch?v=VV
sfLnMqOC4
• Joe Bar t on
• Republ i can, Texas
•Ed Mar key
•Democr at ,
Massachusset t
s
What does Amazon plan
on doing with this
information?
How does Amazon plan on
proceeding with a privacy
policy?
Will Amazon collect users’
browsing habits?
has a few questions for Amazon
• Geographic location
• Local time
• Browser used
• Screen resolution
• Time spent on page
• Content on page
• Previous page that was visited
• Internet speed
•Operating system
•Search engine used
•Key words
•Made purchases
•Number of made purchases
•Value of made purchases
•Number of visits
Compiled Data
‫ﺳ‬Discussion forums
‫ﺳ‬Blogs
‫ﺳ‬Message boards
‫ﺳ‬Social networking
sites
d u e t o a n E v o l v i n g I n d u s t r y
Products and Services
Products and Services
Consumer Habits and Behaviors
Consumer Habits and Behaviors
"The r i ght of t he peopl e t o be
secur e i n t hei r par ent s,
houses, paper s, and ef f ect s,
agai nst unr easonabl e
sear ches and sei zur es,
shal l not be vi ol at ed and
no war r ant s shal l i ssue, but
upon pr obabl e cause,
suppor t ed by oat h or
af f i r mat i on, and
par t i cul ar l y descr i bi ng
t he pl ace t o be sear ched,
and t he per sons of t hi ngs
t o be sei zed."
1. There has to be a
reasonable and logical
expectation of privacy.
2. General society
renders this
expectation as
acceptable custom.
Landmark Cases Two-Step Test
Reasonably released information; waives Fourth Amendment
protection once provided to an entity “upon supported by
affirmation.”
Federal Trade Commission Act of
1914
A) Prevent unfair methods of competition, and unfair or
deceptive acts or practices in or affecting commerce
B) Seek monetary redress and other relief for conduct
injurious to consumers
C) Prescribe trade regulation rules defining with
specificity acts or practices that are unfair or
deceptive, and establishing requirements designed to
prevent such acts or practices
D) Conduct investigations relating to the organization,
business, practices, and management of entities
engaged in commerce
E) Make reports and legislative recommendations to
Congress.
G
O
O
G
L
E
B
U
Z
Z
Sweet! Check out my buzz
Nah, go to my inbox
Made users’ contacts public without their knowledge
Followers were already setup
It did not fully removed user from the social network
“When you sign up for a particular service that
requires registration, we ask you to provide
personal information. If we use this information
for in a manner different than the purpose for
which it was collected , then we ask for your
consent prior to such use.”
October 2004 until October 2010
Gmail Privacy Policy
“Gmail stores, processes, and maintains
your messages, contact lists, and other
data related to your recent account in
order to provide the service to you.”
“Google adheres to the U.S. Safe Harbor
Privacy Principles of Notice, Choice,
Onward Transfer, Security, Data Integrity,
Access and Enforcement, and is registered
with the U.S. Department of Commerce’s
Safe Harbor Program.”
1) “Comprehensive privacy
program”
2) Privacy audits throughout the
next 20 years
http://www.youtube.com/watch?v=852OTK6IQ2A
"Fi ndi ng
i nt er connect i o
ns bet ween
peopl e,
compani es, and
cl i ent
act i vi t i es."
. -
LexisNexis
website
Provides data and tools for examining
A person’s actions are
involuntary :
1) Action is caused by an
external force
2) Actions were based on
ignorance.
“This is the first shot in the new
war for replacing the internet
with a privatized merchant data
aggregation network.”

Más contenido relacionado

Similar a Compiling data from the cloud. Make it rain ones and zeros

Online privacy; myth or reality?
Online privacy; myth or reality?Online privacy; myth or reality?
Online privacy; myth or reality?Swaleh Ahmed
 
Free geek class on Data privacy
Free geek class on Data privacyFree geek class on Data privacy
Free geek class on Data privacyJoshua Johnston
 
Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Matthew Asbell
 
Challenge Academy June 2018 - Digital Marketing, Web Traffic and Ecommerce
Challenge Academy June 2018 - Digital Marketing, Web Traffic and Ecommerce Challenge Academy June 2018 - Digital Marketing, Web Traffic and Ecommerce
Challenge Academy June 2018 - Digital Marketing, Web Traffic and Ecommerce OutserveWeb
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentationChande Kasita
 
Top Questions Asked About the CCPA
Top Questions Asked About the CCPATop Questions Asked About the CCPA
Top Questions Asked About the CCPARyan Foster
 
Terms of Use and Privacy Policy Best Practices
Terms of Use and Privacy Policy Best PracticesTerms of Use and Privacy Policy Best Practices
Terms of Use and Privacy Policy Best PracticesRoger Royse
 
Ethical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceEthical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceNicholas Davis
 
Ethical, social and political issues raised by e commerce
Ethical, social and political issues raised by e commerceEthical, social and political issues raised by e commerce
Ethical, social and political issues raised by e commerceNicholas Davis
 
Websites: do you tick all the boxes?
Websites: do you tick all the boxes?Websites: do you tick all the boxes?
Websites: do you tick all the boxes?walescva
 
CAN SPAM Legislation: Is your organization ready?
CAN SPAM Legislation: Is your organization ready?CAN SPAM Legislation: Is your organization ready?
CAN SPAM Legislation: Is your organization ready?Violeta Cohen
 
Big Data, Big Investment
Big Data, Big InvestmentBig Data, Big Investment
Big Data, Big InvestmentGGV Capital
 
Ethical Digital Marketing for Lawyers
Ethical Digital Marketing for LawyersEthical Digital Marketing for Lawyers
Ethical Digital Marketing for LawyersStacey Burke
 
5) How charities can protect themselves against data reform - ‘Emerging Digit...
5) How charities can protect themselves against data reform - ‘Emerging Digit...5) How charities can protect themselves against data reform - ‘Emerging Digit...
5) How charities can protect themselves against data reform - ‘Emerging Digit...Code Computerlove
 

Similar a Compiling data from the cloud. Make it rain ones and zeros (20)

Online privacy; myth or reality?
Online privacy; myth or reality?Online privacy; myth or reality?
Online privacy; myth or reality?
 
Online privacy
Online privacyOnline privacy
Online privacy
 
Free geek class on Data privacy
Free geek class on Data privacyFree geek class on Data privacy
Free geek class on Data privacy
 
Big data
Big dataBig data
Big data
 
Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10Social Media Marketing 03 24 2010 Updated 04 08 10
Social Media Marketing 03 24 2010 Updated 04 08 10
 
Challenge Academy June 2018 - Digital Marketing, Web Traffic and Ecommerce
Challenge Academy June 2018 - Digital Marketing, Web Traffic and Ecommerce Challenge Academy June 2018 - Digital Marketing, Web Traffic and Ecommerce
Challenge Academy June 2018 - Digital Marketing, Web Traffic and Ecommerce
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
 
Top Questions Asked About the CCPA
Top Questions Asked About the CCPATop Questions Asked About the CCPA
Top Questions Asked About the CCPA
 
Terms of Use and Privacy Policy Best Practices
Terms of Use and Privacy Policy Best PracticesTerms of Use and Privacy Policy Best Practices
Terms of Use and Privacy Policy Best Practices
 
Comply
ComplyComply
Comply
 
Ethical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceEthical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E Commerce
 
Ethical, social and political issues raised by e commerce
Ethical, social and political issues raised by e commerceEthical, social and political issues raised by e commerce
Ethical, social and political issues raised by e commerce
 
Websites: do you tick all the boxes?
Websites: do you tick all the boxes?Websites: do you tick all the boxes?
Websites: do you tick all the boxes?
 
Casl 2012 Final
Casl 2012 FinalCasl 2012 Final
Casl 2012 Final
 
CAN SPAM Legislation: Is your organization ready?
CAN SPAM Legislation: Is your organization ready?CAN SPAM Legislation: Is your organization ready?
CAN SPAM Legislation: Is your organization ready?
 
Big Data, Big Investment
Big Data, Big InvestmentBig Data, Big Investment
Big Data, Big Investment
 
Spa bath accessories
Spa bath accessoriesSpa bath accessories
Spa bath accessories
 
Balancing Privacy and Digitization
Balancing Privacy and DigitizationBalancing Privacy and Digitization
Balancing Privacy and Digitization
 
Ethical Digital Marketing for Lawyers
Ethical Digital Marketing for LawyersEthical Digital Marketing for Lawyers
Ethical Digital Marketing for Lawyers
 
5) How charities can protect themselves against data reform - ‘Emerging Digit...
5) How charities can protect themselves against data reform - ‘Emerging Digit...5) How charities can protect themselves against data reform - ‘Emerging Digit...
5) How charities can protect themselves against data reform - ‘Emerging Digit...
 

Último

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Último (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Compiling data from the cloud. Make it rain ones and zeros

  • 3. Amazon Kindle Fire • Silk Browser raises controversy • Split browser partially operates from cloud server • Kindle Fire only allows the Silk Browser http://www.youtube.com/watch?v=VV sfLnMqOC4
  • 4. • Joe Bar t on • Republ i can, Texas •Ed Mar key •Democr at , Massachusset t s What does Amazon plan on doing with this information? How does Amazon plan on proceeding with a privacy policy? Will Amazon collect users’ browsing habits? has a few questions for Amazon
  • 5. • Geographic location • Local time • Browser used • Screen resolution • Time spent on page • Content on page • Previous page that was visited • Internet speed •Operating system •Search engine used •Key words •Made purchases •Number of made purchases •Value of made purchases •Number of visits Compiled Data
  • 7. d u e t o a n E v o l v i n g I n d u s t r y Products and Services Products and Services Consumer Habits and Behaviors Consumer Habits and Behaviors
  • 8. "The r i ght of t he peopl e t o be secur e i n t hei r par ent s, houses, paper s, and ef f ect s, agai nst unr easonabl e sear ches and sei zur es, shal l not be vi ol at ed and no war r ant s shal l i ssue, but upon pr obabl e cause, suppor t ed by oat h or af f i r mat i on, and par t i cul ar l y descr i bi ng t he pl ace t o be sear ched, and t he per sons of t hi ngs t o be sei zed."
  • 9. 1. There has to be a reasonable and logical expectation of privacy. 2. General society renders this expectation as acceptable custom. Landmark Cases Two-Step Test
  • 10. Reasonably released information; waives Fourth Amendment protection once provided to an entity “upon supported by affirmation.”
  • 11. Federal Trade Commission Act of 1914 A) Prevent unfair methods of competition, and unfair or deceptive acts or practices in or affecting commerce B) Seek monetary redress and other relief for conduct injurious to consumers C) Prescribe trade regulation rules defining with specificity acts or practices that are unfair or deceptive, and establishing requirements designed to prevent such acts or practices D) Conduct investigations relating to the organization, business, practices, and management of entities engaged in commerce E) Make reports and legislative recommendations to Congress.
  • 12. G O O G L E B U Z Z Sweet! Check out my buzz Nah, go to my inbox Made users’ contacts public without their knowledge Followers were already setup It did not fully removed user from the social network “When you sign up for a particular service that requires registration, we ask you to provide personal information. If we use this information for in a manner different than the purpose for which it was collected , then we ask for your consent prior to such use.”
  • 13. October 2004 until October 2010 Gmail Privacy Policy “Gmail stores, processes, and maintains your messages, contact lists, and other data related to your recent account in order to provide the service to you.” “Google adheres to the U.S. Safe Harbor Privacy Principles of Notice, Choice, Onward Transfer, Security, Data Integrity, Access and Enforcement, and is registered with the U.S. Department of Commerce’s Safe Harbor Program.” 1) “Comprehensive privacy program” 2) Privacy audits throughout the next 20 years
  • 15. "Fi ndi ng i nt er connect i o ns bet ween peopl e, compani es, and cl i ent act i vi t i es." . - LexisNexis website Provides data and tools for examining
  • 16. A person’s actions are involuntary : 1) Action is caused by an external force 2) Actions were based on ignorance.
  • 17. “This is the first shot in the new war for replacing the internet with a privatized merchant data aggregation network.”