SlideShare una empresa de Scribd logo
1 de 27
COOKIES


The Practitioner‟s Perspective



Presentation by Daragh O Brien, Regulatory Advisor IDMA and MD Castlebridge Associates.
• This slide deck was prepared for
an Interactive Direct Marketing
Association presentation to the
International Bar Association
Conference 2012
Confusion
What is a Cookie?
                “…is usually a small piece of data sent
                   from a website and stored in a
                  user's web browser while a user is
                  browsing a website” (Wikipedia)


                …”cookies are small, often encrypted
               text files, located in browser directories”
                           (allaboutcookies.org)


               “A cookie is information that a Web site
                 puts on your hard disk so that it can
                remember something about you at a
                              later time.”
              (http://searchsoftwarequality.techtarget.com/
                             definition/cookie)
What SI336 says…
• (3) A person shall not use an electronic communications network to store information, or to
  gain access to information already stored in the terminal equipment of a subscriber or user,
  unless
   (a) the subscriber or user has given his or her consent to that use, and
   (b) the subscriber or user has been provided with clear and comprehensive information in accordance
   with the Data Protection Acts which—
      • (i) is both prominently displayed and easily accessible, and
      • (ii) includes, without limitation, the purposes of the processing of the information.

• (4) For the purpose of paragraph (3), the methods of providing information and giving
  consent should be as user-friendly as possible. Where it is technically possible and effective,
  having regard to the relevant provisions of the Data Protection Acts, the user‟s consent to
  the storing of information or to gaining access to information already stored may be given by
  the use of appropriate browser settings or other technological application by means of which
  the user can be considered to have given his or her consent.
• (5) Paragraph (3) does not prevent any technical storage of, or access to, information for the
  sole purpose of carrying out the transmission of a communication over an electronic
  communications network or which is strictly necessary in order to provide an information
  society service explicitly requested by the subscriber or user.
Which Means?

             The Legislation
           covers a LOT more
              than just text
              Cookies and
                Browsers
•   Flash Local Objects

  •   Apps storing data
  •   SQLite databases



                                       •   HTML 5
                                            Local
                                           Storage



• Traditional
 browser cookies
   (plus SQLite,
   Flash, HTML5




        • Traditional
                                           •   Data
         browser cookies
                                             logging
           (plus SQLite,
                                           • Usage
           Flash, HTML5
                                               data
Exceptions?



                   Strictly Necessary?
              Information Society Service?

                 Explicitly Requested?
“So far, for 50 years, the
 information revolution has
   centered on data—their
     collection, storage,
transmission, analysis, and
     presentation. It has
  centered on the "T" in IT.

   The next information
revolution asks, what is the
 MEANING of information,
and what is its PURPOSE?”
Directive does not specify how consent
Questions of Consent & Guidance
                       should be obtained.

            ICO in the UK allowed “implied consent” at
                          the last minute.

            A29 Working Group Opinion (subsequently)
                 focused on “informed consent”.

               Guidance (to date) has focused on
            traditional web browser and flash cookies.
DPC Guidance
• Non-third party cookies:
   • Prominent Notice giving information on Cookies with ability to
      click through and make an informed choice re: consent


• Cookies in General:
 • Consent should be user friendly as possible
 • Require clear communication about what the user is being asked to
   consent to
 • A means of giving or refusing consent to data being stored or
   retrieved
Varying Degrees of Compliance
       utilities
   telecomms
        media
         legal
    insurance
industry group
  government
     financial
    consulting
       charity

                   0%      20%          40%            60%         80%          100%
    Mentioned in Privacy Statement   No Notice Given   Cookies Policy   Cookie Notice
An example of Compliance Confusion




   UK Website for a major multinational professional services
                            firm.
An example of Compliance Confusion




      Irish Website of same Professional Services firm.
Announcement on 5th September by leading UK web design firm that developed a leading Cookie Compliance
                                              solution
Don’t endorse this approach

                                          But can understand




Screen grab of Silktide.com’s “No Cookie Law” website
              (www.nocookielaw.com)
Motivation
• Unaware of what needs to be
  done?
• Aware but not willing to make
  changes until their peers are
  making changes?
Yes, I know we are not compliant but none of
our competitors are either. Given the limits on
our budgets we can‟t even begin to put those
changes on the table for discussion until our
competitors are also being forced to make the
change.
We don‟t see a “first mover advantage” here if
there is no enforcement and if the penalty is
less than the cost of development.




 It doesn’t help that Government and EU
   departments have failed to bring their
      websites and mobile apps into
               compliance.
A change of mind set and culture is
                             required
Compliance =
  GOOD!!       Cookies need to be seen as data assets
               that your organisation wants to store in
                      someone else’s property

               The focus needs to shift to PRIVACY not
               the Technology. Meaning and intent of
                    the stored data is imperative

                  Professional bodies like IDMA can
                      promote good practice.

                       Regulators must enforce

               Legal Counsel must look to the Meaning
                      and Purpose of Cookies
Is Self Regulation an Option?

                                                  • Comments here are not
                                                   necessarily the views of the
                                                   IDMA and are the
                                                   speaker‟s personal
                                                   opinions.




                  © Adam Zyglis
2008, http://www.adamzyglis.com/cartoon787.html
Self-Regulation  Light Touch  Rigid Rules




Self Policing /                                    Sensible
Peer Policing                                   Enforcement
                                                      &
                                                Enforceability
Self-Regulation  Light Touch  Rigid Rules




               Need to learn from mistakes and
               successes of other Regulatory
               regimes and laws.
Evidence based policy
                      objectives and
                      governance requirements
                      are key

“The Information Commissioner Christopher
Graham has questioned the effectiveness of the
EU cookie directive, suggesting that it was
„dreamed up by politicians in Brussels‟ without the
appropriate market research to back it up.”
                     - quoted in TechWorld.com, 15/09/2012
"More and more citizens and
consumers are waking up to the
implications of sharing personal
 data online," he said. "By fresh
 thinking that recognises where
     the consumer is coming
 from, we can develop policies
        that really work.“
 (speaking at launch of “Data Dialogue” Report, Sept 2012)
Solutions ?
Good Information Management culture

1.   Recognise cookies as a data asset
     •   Bring in advisors who understand Data Governance principles if necessary
     •   Think “Privacy” first, then “Technology”
2.   Think in terms of the process that is using the Data Asset
     •   Is the use of the asset essential to the objective/purpose of the process?
     •   Does the process require data to be shared with 3rd parties?
     •   How „invasive‟ is the process?
     •   Is the process adding value or creating risk?
3.   Document
4.   Promote transparency
     •   A GOOD Privacy Statement that can be read by HUMANS!!!
5.   Keep under regular review
6.   Consider spirit and intent of Directive, not just the literal interpretation.
7.   Implement appropriate (often low cost) solutions to design compliance and
     privacy controls into your processes.
8.   Think about PRIVACY then about TECHNOLOGY

Más contenido relacionado

La actualidad más candente

Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenienceDon Lovett
 
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...gallowayandcollens
 
Cloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association PresentationCloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association PresentationNicole Black
 
Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter GridEnlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Gridbradley_g
 
GDPR, User Data, Privacy, and Your Apps
GDPR, User Data, Privacy, and Your AppsGDPR, User Data, Privacy, and Your Apps
GDPR, User Data, Privacy, and Your AppsCarl Brown
 
Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"Cathy Dwyer
 
Gayna Hart Presentation - Personalised Healthcare Revolution
Gayna Hart Presentation - Personalised Healthcare RevolutionGayna Hart Presentation - Personalised Healthcare Revolution
Gayna Hart Presentation - Personalised Healthcare RevolutionBath & Bristol Enterprise Network
 
Blockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceBlockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceEryk Budi Pratama
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsIrish Future Internet Forum
 
Privacy by design
Privacy by designPrivacy by design
Privacy by designblogzilla
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYODK Singh
 
Internet of things enabling tech - challenges - opportunities (2016)
Internet of things   enabling tech - challenges - opportunities (2016)Internet of things   enabling tech - challenges - opportunities (2016)
Internet of things enabling tech - challenges - opportunities (2016)Davor Dokonal
 
Security And Legal In The Cloud Ats V2
Security And Legal In The Cloud Ats V2Security And Legal In The Cloud Ats V2
Security And Legal In The Cloud Ats V2dbarton944
 
Big data and information privacy 20190117
Big data and information privacy 20190117Big data and information privacy 20190117
Big data and information privacy 20190117Maria Correia
 
Make it Last: Principals for Digital Preservation and Conservation
Make it Last: Principals for Digital Preservation and ConservationMake it Last: Principals for Digital Preservation and Conservation
Make it Last: Principals for Digital Preservation and ConservationTrevor Owens
 
Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Peter Procházka
 
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...gallowayandcollens
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by DesignUnisys Corporation
 
Closer All The Time: Moving Toward Fiduciary Access to Digital Assets
Closer All The Time: Moving Toward Fiduciary Access to Digital AssetsCloser All The Time: Moving Toward Fiduciary Access to Digital Assets
Closer All The Time: Moving Toward Fiduciary Access to Digital Assetsgallowayandcollens
 
Reinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeReinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeUniversity of Geneva
 

La actualidad más candente (20)

Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
 
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
 
Cloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association PresentationCloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association Presentation
 
Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter GridEnlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Grid
 
GDPR, User Data, Privacy, and Your Apps
GDPR, User Data, Privacy, and Your AppsGDPR, User Data, Privacy, and Your Apps
GDPR, User Data, Privacy, and Your Apps
 
Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"
 
Gayna Hart Presentation - Personalised Healthcare Revolution
Gayna Hart Presentation - Personalised Healthcare RevolutionGayna Hart Presentation - Personalised Healthcare Revolution
Gayna Hart Presentation - Personalised Healthcare Revolution
 
Blockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceBlockchain for Accounting & Assurance
Blockchain for Accounting & Assurance
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
 
Privacy by design
Privacy by designPrivacy by design
Privacy by design
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
Internet of things enabling tech - challenges - opportunities (2016)
Internet of things   enabling tech - challenges - opportunities (2016)Internet of things   enabling tech - challenges - opportunities (2016)
Internet of things enabling tech - challenges - opportunities (2016)
 
Security And Legal In The Cloud Ats V2
Security And Legal In The Cloud Ats V2Security And Legal In The Cloud Ats V2
Security And Legal In The Cloud Ats V2
 
Big data and information privacy 20190117
Big data and information privacy 20190117Big data and information privacy 20190117
Big data and information privacy 20190117
 
Make it Last: Principals for Digital Preservation and Conservation
Make it Last: Principals for Digital Preservation and ConservationMake it Last: Principals for Digital Preservation and Conservation
Make it Last: Principals for Digital Preservation and Conservation
 
Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...
 
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by Design
 
Closer All The Time: Moving Toward Fiduciary Access to Digital Assets
Closer All The Time: Moving Toward Fiduciary Access to Digital AssetsCloser All The Time: Moving Toward Fiduciary Access to Digital Assets
Closer All The Time: Moving Toward Fiduciary Access to Digital Assets
 
Reinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeReinstating Trust in the Digital Age
Reinstating Trust in the Digital Age
 

Destacado

UCD Smurfit presentation: Cookies & Online Privacy
UCD Smurfit presentation: Cookies & Online PrivacyUCD Smurfit presentation: Cookies & Online Privacy
UCD Smurfit presentation: Cookies & Online PrivacyLara Zaccaria
 
Data Protection in Big Data world (EDW lighting talk)
Data Protection in Big Data world (EDW lighting talk)Data Protection in Big Data world (EDW lighting talk)
Data Protection in Big Data world (EDW lighting talk)Castlebridge Associates
 
E commerce, social and campaign tracking - web analytics fundamentals
E commerce, social and campaign tracking - web analytics fundamentalsE commerce, social and campaign tracking - web analytics fundamentals
E commerce, social and campaign tracking - web analytics fundamentalsSrikanth Dhondi
 
Basic site survey & design training
Basic site survey & design trainingBasic site survey & design training
Basic site survey & design trainingtulus_pl
 

Destacado (8)

UCD Smurfit presentation: Cookies & Online Privacy
UCD Smurfit presentation: Cookies & Online PrivacyUCD Smurfit presentation: Cookies & Online Privacy
UCD Smurfit presentation: Cookies & Online Privacy
 
EDW Lightning Talk 2014
EDW Lightning Talk 2014EDW Lightning Talk 2014
EDW Lightning Talk 2014
 
Data Protection in Big Data world (EDW lighting talk)
Data Protection in Big Data world (EDW lighting talk)Data Protection in Big Data world (EDW lighting talk)
Data Protection in Big Data world (EDW lighting talk)
 
Daragh O Brien 2014 IAIDQ presidency
Daragh O Brien 2014 IAIDQ presidencyDaragh O Brien 2014 IAIDQ presidency
Daragh O Brien 2014 IAIDQ presidency
 
E commerce, social and campaign tracking - web analytics fundamentals
E commerce, social and campaign tracking - web analytics fundamentalsE commerce, social and campaign tracking - web analytics fundamentals
E commerce, social and campaign tracking - web analytics fundamentals
 
Basic site survey & design training
Basic site survey & design trainingBasic site survey & design training
Basic site survey & design training
 
Heuristic evaluation
Heuristic evaluationHeuristic evaluation
Heuristic evaluation
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Similar a COOKIES: THE PRACTITIONER'S PERSPECTIVE

eBusiness Club "Demystifying the EU Cookie Law presentation, Geldards
eBusiness Club  "Demystifying the EU Cookie Law presentation, GeldardseBusiness Club  "Demystifying the EU Cookie Law presentation, Geldards
eBusiness Club "Demystifying the EU Cookie Law presentation, GeldardsJon Egley
 
Why We Require GDPR?
Why We Require GDPR?Why We Require GDPR?
Why We Require GDPR?Jatin Kochhar
 
Global Data Privacy Regulation
Global Data Privacy RegulationGlobal Data Privacy Regulation
Global Data Privacy RegulationJatin Kochhar
 
Privacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User DataPrivacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User DataPrivacyCenter.cloud
 
Cookies: best practice September 2012 by Fedelma Good, Barclays
Cookies: best practice September 2012 by Fedelma Good, BarclaysCookies: best practice September 2012 by Fedelma Good, Barclays
Cookies: best practice September 2012 by Fedelma Good, Barclaystheidm_quals
 
EU cookie law - What you need to know
EU cookie law - What you need to knowEU cookie law - What you need to know
EU cookie law - What you need to knowCrafted
 
Cookie Law (Dwf 190511)
Cookie Law (Dwf 190511)Cookie Law (Dwf 190511)
Cookie Law (Dwf 190511)RobertMachin
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy ProgramDaniel Ayala
 
CIS14: NSTIC - Why the Identity Ecosystem Steering Group (IDESG)?
CIS14: NSTIC - Why the Identity Ecosystem Steering Group (IDESG)?CIS14: NSTIC - Why the Identity Ecosystem Steering Group (IDESG)?
CIS14: NSTIC - Why the Identity Ecosystem Steering Group (IDESG)?CloudIDSummit
 
Trends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the RisksTrends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the RisksNicole Garton
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSonny Hashmi
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb esSonny Hashmi
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueDeloitte United States
 
Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Catapult
 
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...MicheleNati
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-securityskumartarget
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things NetIQ
 

Similar a COOKIES: THE PRACTITIONER'S PERSPECTIVE (20)

eBusiness Club "Demystifying the EU Cookie Law presentation, Geldards
eBusiness Club  "Demystifying the EU Cookie Law presentation, GeldardseBusiness Club  "Demystifying the EU Cookie Law presentation, Geldards
eBusiness Club "Demystifying the EU Cookie Law presentation, Geldards
 
The DMA conference 2012
The DMA conference 2012The DMA conference 2012
The DMA conference 2012
 
Why We Require GDPR?
Why We Require GDPR?Why We Require GDPR?
Why We Require GDPR?
 
DMA Cookies update
DMA Cookies updateDMA Cookies update
DMA Cookies update
 
Global Data Privacy Regulation
Global Data Privacy RegulationGlobal Data Privacy Regulation
Global Data Privacy Regulation
 
Privacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User DataPrivacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User Data
 
Cookies: best practice September 2012 by Fedelma Good, Barclays
Cookies: best practice September 2012 by Fedelma Good, BarclaysCookies: best practice September 2012 by Fedelma Good, Barclays
Cookies: best practice September 2012 by Fedelma Good, Barclays
 
EU cookie law - What you need to know
EU cookie law - What you need to knowEU cookie law - What you need to know
EU cookie law - What you need to know
 
Cookie Law (Dwf 190511)
Cookie Law (Dwf 190511)Cookie Law (Dwf 190511)
Cookie Law (Dwf 190511)
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Program
 
CIS14: NSTIC - Why the Identity Ecosystem Steering Group (IDESG)?
CIS14: NSTIC - Why the Identity Ecosystem Steering Group (IDESG)?CIS14: NSTIC - Why the Identity Ecosystem Steering Group (IDESG)?
CIS14: NSTIC - Why the Identity Ecosystem Steering Group (IDESG)?
 
Trends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the RisksTrends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the Risks
 
(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for value
 
Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Transformation Business Evolution
Digital Transformation Business Evolution
 
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-security
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 

Más de Castlebridge Associates

From Asset to Impact - Presentation to ICS Data Protection Conference 2011
From Asset to Impact - Presentation to ICS Data Protection Conference 2011From Asset to Impact - Presentation to ICS Data Protection Conference 2011
From Asset to Impact - Presentation to ICS Data Protection Conference 2011Castlebridge Associates
 
Enterprise Computing - A Vision of Future Today (Presentation to DCU students)
Enterprise Computing - A Vision of Future Today (Presentation to DCU students)Enterprise Computing - A Vision of Future Today (Presentation to DCU students)
Enterprise Computing - A Vision of Future Today (Presentation to DCU students)Castlebridge Associates
 
Building Information Quality from the Inside Out
Building Information Quality from the Inside OutBuilding Information Quality from the Inside Out
Building Information Quality from the Inside OutCastlebridge Associates
 
From Near to Maturity - Presentation to European Data Forum
From Near to Maturity - Presentation to European Data ForumFrom Near to Maturity - Presentation to European Data Forum
From Near to Maturity - Presentation to European Data ForumCastlebridge Associates
 
Bring Your Own Device - a Misnamed Concept?
Bring Your Own Device - a Misnamed Concept?Bring Your Own Device - a Misnamed Concept?
Bring Your Own Device - a Misnamed Concept?Castlebridge Associates
 

Más de Castlebridge Associates (6)

From Asset to Impact - Presentation to ICS Data Protection Conference 2011
From Asset to Impact - Presentation to ICS Data Protection Conference 2011From Asset to Impact - Presentation to ICS Data Protection Conference 2011
From Asset to Impact - Presentation to ICS Data Protection Conference 2011
 
Enterprise Computing - A Vision of Future Today (Presentation to DCU students)
Enterprise Computing - A Vision of Future Today (Presentation to DCU students)Enterprise Computing - A Vision of Future Today (Presentation to DCU students)
Enterprise Computing - A Vision of Future Today (Presentation to DCU students)
 
Building Information Quality from the Inside Out
Building Information Quality from the Inside OutBuilding Information Quality from the Inside Out
Building Information Quality from the Inside Out
 
From Near to Maturity - Presentation to European Data Forum
From Near to Maturity - Presentation to European Data ForumFrom Near to Maturity - Presentation to European Data Forum
From Near to Maturity - Presentation to European Data Forum
 
Bring Your Own Device - a Misnamed Concept?
Bring Your Own Device - a Misnamed Concept?Bring Your Own Device - a Misnamed Concept?
Bring Your Own Device - a Misnamed Concept?
 
Introduction to Information Quality
Introduction to Information QualityIntroduction to Information Quality
Introduction to Information Quality
 

Último

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 

Último (20)

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 

COOKIES: THE PRACTITIONER'S PERSPECTIVE

  • 1. COOKIES The Practitioner‟s Perspective Presentation by Daragh O Brien, Regulatory Advisor IDMA and MD Castlebridge Associates.
  • 2. • This slide deck was prepared for an Interactive Direct Marketing Association presentation to the International Bar Association Conference 2012
  • 4. What is a Cookie? “…is usually a small piece of data sent from a website and stored in a user's web browser while a user is browsing a website” (Wikipedia) …”cookies are small, often encrypted text files, located in browser directories” (allaboutcookies.org) “A cookie is information that a Web site puts on your hard disk so that it can remember something about you at a later time.” (http://searchsoftwarequality.techtarget.com/ definition/cookie)
  • 5. What SI336 says… • (3) A person shall not use an electronic communications network to store information, or to gain access to information already stored in the terminal equipment of a subscriber or user, unless (a) the subscriber or user has given his or her consent to that use, and (b) the subscriber or user has been provided with clear and comprehensive information in accordance with the Data Protection Acts which— • (i) is both prominently displayed and easily accessible, and • (ii) includes, without limitation, the purposes of the processing of the information. • (4) For the purpose of paragraph (3), the methods of providing information and giving consent should be as user-friendly as possible. Where it is technically possible and effective, having regard to the relevant provisions of the Data Protection Acts, the user‟s consent to the storing of information or to gaining access to information already stored may be given by the use of appropriate browser settings or other technological application by means of which the user can be considered to have given his or her consent. • (5) Paragraph (3) does not prevent any technical storage of, or access to, information for the sole purpose of carrying out the transmission of a communication over an electronic communications network or which is strictly necessary in order to provide an information society service explicitly requested by the subscriber or user.
  • 6. Which Means? The Legislation covers a LOT more than just text Cookies and Browsers
  • 7. Flash Local Objects • Apps storing data • SQLite databases • HTML 5 Local Storage • Traditional browser cookies (plus SQLite, Flash, HTML5 • Traditional • Data browser cookies logging (plus SQLite, • Usage Flash, HTML5 data
  • 8. Exceptions? Strictly Necessary? Information Society Service? Explicitly Requested?
  • 9. “So far, for 50 years, the information revolution has centered on data—their collection, storage, transmission, analysis, and presentation. It has centered on the "T" in IT. The next information revolution asks, what is the MEANING of information, and what is its PURPOSE?”
  • 10. Directive does not specify how consent Questions of Consent & Guidance should be obtained. ICO in the UK allowed “implied consent” at the last minute. A29 Working Group Opinion (subsequently) focused on “informed consent”. Guidance (to date) has focused on traditional web browser and flash cookies.
  • 11. DPC Guidance • Non-third party cookies: • Prominent Notice giving information on Cookies with ability to click through and make an informed choice re: consent • Cookies in General: • Consent should be user friendly as possible • Require clear communication about what the user is being asked to consent to • A means of giving or refusing consent to data being stored or retrieved
  • 12. Varying Degrees of Compliance utilities telecomms media legal insurance industry group government financial consulting charity 0% 20% 40% 60% 80% 100% Mentioned in Privacy Statement No Notice Given Cookies Policy Cookie Notice
  • 13. An example of Compliance Confusion UK Website for a major multinational professional services firm.
  • 14. An example of Compliance Confusion Irish Website of same Professional Services firm.
  • 15. Announcement on 5th September by leading UK web design firm that developed a leading Cookie Compliance solution
  • 16. Don’t endorse this approach But can understand Screen grab of Silktide.com’s “No Cookie Law” website (www.nocookielaw.com)
  • 18. • Unaware of what needs to be done? • Aware but not willing to make changes until their peers are making changes?
  • 19. Yes, I know we are not compliant but none of our competitors are either. Given the limits on our budgets we can‟t even begin to put those changes on the table for discussion until our competitors are also being forced to make the change. We don‟t see a “first mover advantage” here if there is no enforcement and if the penalty is less than the cost of development. It doesn’t help that Government and EU departments have failed to bring their websites and mobile apps into compliance.
  • 20. A change of mind set and culture is required Compliance = GOOD!! Cookies need to be seen as data assets that your organisation wants to store in someone else’s property The focus needs to shift to PRIVACY not the Technology. Meaning and intent of the stored data is imperative Professional bodies like IDMA can promote good practice. Regulators must enforce Legal Counsel must look to the Meaning and Purpose of Cookies
  • 21. Is Self Regulation an Option? • Comments here are not necessarily the views of the IDMA and are the speaker‟s personal opinions. © Adam Zyglis 2008, http://www.adamzyglis.com/cartoon787.html
  • 22. Self-Regulation  Light Touch  Rigid Rules Self Policing / Sensible Peer Policing Enforcement & Enforceability
  • 23. Self-Regulation  Light Touch  Rigid Rules Need to learn from mistakes and successes of other Regulatory regimes and laws.
  • 24. Evidence based policy objectives and governance requirements are key “The Information Commissioner Christopher Graham has questioned the effectiveness of the EU cookie directive, suggesting that it was „dreamed up by politicians in Brussels‟ without the appropriate market research to back it up.” - quoted in TechWorld.com, 15/09/2012
  • 25. "More and more citizens and consumers are waking up to the implications of sharing personal data online," he said. "By fresh thinking that recognises where the consumer is coming from, we can develop policies that really work.“ (speaking at launch of “Data Dialogue” Report, Sept 2012)
  • 27. Good Information Management culture 1. Recognise cookies as a data asset • Bring in advisors who understand Data Governance principles if necessary • Think “Privacy” first, then “Technology” 2. Think in terms of the process that is using the Data Asset • Is the use of the asset essential to the objective/purpose of the process? • Does the process require data to be shared with 3rd parties? • How „invasive‟ is the process? • Is the process adding value or creating risk? 3. Document 4. Promote transparency • A GOOD Privacy Statement that can be read by HUMANS!!! 5. Keep under regular review 6. Consider spirit and intent of Directive, not just the literal interpretation. 7. Implement appropriate (often low cost) solutions to design compliance and privacy controls into your processes. 8. Think about PRIVACY then about TECHNOLOGY