SlideShare una empresa de Scribd logo
1 de 20
Descargar para leer sin conexión
The Value of PI
            (Not π)



Constantine Karbaliotis, J.D., CIPP/C/IT
         Americas Privacy Leader
                Mercer
Constantine Karbaliotis, Mercer



•  Americas Privacy Leader, Chief Privacy Officer for the Americas
    •    Recently joined Mercer (July 2010), responsible for assisting Mercer in
         its privacy compliance program
    •    Previously acted as Symantec’s privacy lead managing its global
         privacy program
    •    Nine years consulting experience with small to large law firms, public
         legal sector as well as other public and private sector organizations
    •    Eight years experience in managing privacy and providing privacy
         advice to public and private sector clients
    •    Practiced law for ten years


•  Called to the Bar of the Province of Ontario, 1986
•  Certified Information Privacy Professional (2004), Certified
   Information Privacy Professional/Canada (2006), Certified
   Information Privacy Professional/IT (2008)
The Value of PI

•  Privacy is a human right; but there is also
   an aspect of ‘trading’ in our own
   information that makes it an asset, both in
   individuals’ hands and in the hands of
   corporations and the public sector
•  This dual nature is why we struggle with
   the notion of trading PI – even when
   we’ve traded it, we obviously retain an
   interest
There’s no free lunch
• So-called ‘free’ services are premised upon
  exchanging personal information in exchange
  for:

    – Free E-mail
    – Social networking
    – News alerts
    – Travel itineraries
    – Document sharing and collaboration
    – Business networking
    – Photo sharing
    – Music playlists
    – Dating sites

The
Value
of
PI
                           4

The trade in PI
 •  We routinely exchange data for services,
    discounts, convenience because companies see
    value in the information we share about ourselves
    – we create a substantial footprint electronically
    every day
 •  Coming soon to a browser near you: explicit
    exchanges of PI for money:
                   •  Wall Street Journal: Online Privacy: Would you sell
                      your private information to advertisers?
                      http://blogs.wsj.com/wsjam/2011/03/08/2773/



The
Value
of
PI

Why do we care?

•  As privacy professionals, the task is often
   to get organizations to take the charge of
   managing PI seriously…
  –  Investments in a tough economy, of staff,
     technology, effort
  –  Structuring business processes and
     implementing policy to foster a privacy-aware
     culture
•  We need to speak the language of
   business
Two premises

 •  Personal information in the hands of
    organizations should be treated and
    measured as an asset
 •  Personal information in the hands of
    individuals is currency, which can be
    exchanged for goods and services



The
Value
of
PI

Implications for Individuals

 • Individuals often do not understand the
   value of the currency they are ‘trading’ on
 • Our information is tremendously valuable –
   yet people give passwords up for chocolate
 • We don’t appreciate the value of the
   currency we generate until, typically, it is
   lost, or used in a way we don’t appreciate
   or expect – until it is devalued


The
Value
of
PI
                                  8

Implications for organizations

 •  So the question is, if it’s an asset,
    are organizations treating it the way
    an asset should be?
 •  If we have not valued it
    appropriately, how can it be
    protected appropriately?



The
Value
of
PI

What if we treated personal information as
        well as we treated buses…
Alternative measures of value
              (1)
•  Loss value:
  – $204 per record
  – $6.75 million per privacy incident
    • Ponemon Institute, 5th Annual Survey
•  “Lawsuit” value:
  – Recent decision of Federal Court to
    award $5000 for providing inaccurate
    data
Alternative measures of value
             (2)
•  What is the value of PI to the enterprise, in
   terms:
   –  Customer retention and trust
   –  Goodwill or intangible asset
   –  Royal Bank: Privacy accounts for an estimated 14% of
      overall Brand Value, and 7% of overall Shareholder
      Value - $679M and $979M respectively (2001)
•  Transactional value
   –  What happens when another entity wants to buy data,
      e.g. a professional buys another’s practice?
   –  There are ways to measure the value of such
      information in terms of retention, revenue, goodwill
Alternative measures of value
             (3)
•  “Meta” value:
  – Value associated with trends, statistical
    or aggregated information
•  Target value:
  – Value associated with knowing a
    particular individual’s buying habits,
    preferences, interests
Alternative measures of value
             (4)
•  Trade value
  – What is the value of the service (social
    networking, e-mail, etc.) being traded
    for one’s PI?
  – Alternatively, what is the amount bid for
    a person’s information to get them to
    part with it in terms of cash?
Alternative measures of value
             (5)
•  “Trust” value
  – If it costs a bank $y per loan application
    done online – versus $x in a bricks-and-
    mortar setting
  – The value of trust in using a website
    means a $x-y savings per transaction…
  – Conversely, lack of trust means bearing
    $x-y additional costs unnecessarily
Alternative measures of value
               (6)




•  “Theft” or criminal enterprise value:
   –  Symantec’s Internet Security Threat Report,
      vol. XIV
Organizational Implication

•  This conversation needs to be with
   your CFO:
  – Is this asset valued appropriately?
  – Protected appropriately?
  – Insured?
  – Depreciated?
•  With your CIO:
  – Do we know how PI is managed through
    its lifecyle?
Policy Implications

•  Privacy Notices
  – Is notice sufficient – or a contract un-
    read?
  – Is reasonableness more important?
  – Is a social contract or bill of rights
    better to establish a ‘standard contract’?
Implications for Accountability
       – to the business
•  Protecting PI means protecting the
   currency of individuals from
   ‘debasement’ of their currency
  – Data losses, identity theft are all
    debasing the currency
  – Individuals lose value of what they hope
    to trade
  – Means an loss in asset value to the
    organization
Conclusions?

•  This is not to suggest there is one
   way to measure the value of PI
•  This will vary by the nature of the PI,
   the business, and its uses
•  It does suggest however a
   persuasive way to get organizations
   to see management of PI in a
   different light

Más contenido relacionado

Similar a The Value of Personal Information - IAPP Canada 2011

Donors, Data Privacy & Security, and Doing What’s “Right”
Donors, Data Privacy & Security, and Doing What’s “Right”Donors, Data Privacy & Security, and Doing What’s “Right”
Donors, Data Privacy & Security, and Doing What’s “Right”Bloomerang
 
How the Private Equity Industry is Maturing and Innovating
How the Private Equity Industry is Maturing and InnovatingHow the Private Equity Industry is Maturing and Innovating
How the Private Equity Industry is Maturing and InnovatingPrivcap
 
Data Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a PositiveData Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a PositiveTargetX
 
Notes Version: Is More Data Always Better The Legal Risks of Data Collection,...
Notes Version: Is More Data Always Better The Legal Risks of Data Collection,...Notes Version: Is More Data Always Better The Legal Risks of Data Collection,...
Notes Version: Is More Data Always Better The Legal Risks of Data Collection,...Vivastream
 
Notes Version: Is More Data Always Better The Legal Risks of Data Collection,...
Notes Version: Is More Data Always Better The Legal Risks of Data Collection,...Notes Version: Is More Data Always Better The Legal Risks of Data Collection,...
Notes Version: Is More Data Always Better The Legal Risks of Data Collection,...Vivastream
 
Protect Your Brand by Protecting Privacy
Protect Your Brand by Protecting PrivacyProtect Your Brand by Protecting Privacy
Protect Your Brand by Protecting Privacyproductcampnyc
 
OSC2012: Identity Analytics: Exploiting Digital Breadcrumbs
OSC2012: Identity Analytics: Exploiting Digital BreadcrumbsOSC2012: Identity Analytics: Exploiting Digital Breadcrumbs
OSC2012: Identity Analytics: Exploiting Digital BreadcrumbsAccenture the Netherlands
 
Trust sharing economy-part_I-introduction
Trust sharing economy-part_I-introductionTrust sharing economy-part_I-introduction
Trust sharing economy-part_I-introductionshareNL
 
Trust sharing economy-part_I-introduction
Trust sharing economy-part_I-introductionTrust sharing economy-part_I-introduction
Trust sharing economy-part_I-introductionJessica Slijpen
 
Thinking inside the box data permission strategies - Wednesday 18 November
Thinking inside the box data permission strategies - Wednesday 18 NovemberThinking inside the box data permission strategies - Wednesday 18 November
Thinking inside the box data permission strategies - Wednesday 18 NovemberRachel Aldighieri
 
Thinking inside the box: data permission strategies - 18 November
Thinking inside the box: data permission strategies - 18 NovemberThinking inside the box: data permission strategies - 18 November
Thinking inside the box: data permission strategies - 18 NovemberRachel Aldighieri
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
How to create a kick ass business case for accessibility
How to create a kick ass business case for accessibilityHow to create a kick ass business case for accessibility
How to create a kick ass business case for accessibilityIntopia
 
How to create people-centric services enabled by personal data
How to create people-centric services enabled by personal dataHow to create people-centric services enabled by personal data
How to create people-centric services enabled by personal dataClaro Partners Inc.
 
Acquisiton with permission - Community Fundraising stream, 2017 IoF Fundraisi...
Acquisiton with permission - Community Fundraising stream, 2017 IoF Fundraisi...Acquisiton with permission - Community Fundraising stream, 2017 IoF Fundraisi...
Acquisiton with permission - Community Fundraising stream, 2017 IoF Fundraisi...Purple Vision
 
005. Ethics, Privacy and Security
005. Ethics, Privacy and Security005. Ethics, Privacy and Security
005. Ethics, Privacy and SecurityArianto Muditomo
 
7 ways to ringfence customers - How to protect clients, sell more to clients...
7 ways to ringfence customers  - How to protect clients, sell more to clients...7 ways to ringfence customers  - How to protect clients, sell more to clients...
7 ways to ringfence customers - How to protect clients, sell more to clients...Dan Richards
 
Prospecting leads for your solar business
Prospecting leads for your solar businessProspecting leads for your solar business
Prospecting leads for your solar businessSmaart House
 

Similar a The Value of Personal Information - IAPP Canada 2011 (20)

Donors, Data Privacy & Security, and Doing What’s “Right”
Donors, Data Privacy & Security, and Doing What’s “Right”Donors, Data Privacy & Security, and Doing What’s “Right”
Donors, Data Privacy & Security, and Doing What’s “Right”
 
Tmw20098 land
Tmw20098 landTmw20098 land
Tmw20098 land
 
How the Private Equity Industry is Maturing and Innovating
How the Private Equity Industry is Maturing and InnovatingHow the Private Equity Industry is Maturing and Innovating
How the Private Equity Industry is Maturing and Innovating
 
Data Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a PositiveData Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a Positive
 
Notes Version: Is More Data Always Better The Legal Risks of Data Collection,...
Notes Version: Is More Data Always Better The Legal Risks of Data Collection,...Notes Version: Is More Data Always Better The Legal Risks of Data Collection,...
Notes Version: Is More Data Always Better The Legal Risks of Data Collection,...
 
Notes Version: Is More Data Always Better The Legal Risks of Data Collection,...
Notes Version: Is More Data Always Better The Legal Risks of Data Collection,...Notes Version: Is More Data Always Better The Legal Risks of Data Collection,...
Notes Version: Is More Data Always Better The Legal Risks of Data Collection,...
 
Protect Your Brand by Protecting Privacy
Protect Your Brand by Protecting PrivacyProtect Your Brand by Protecting Privacy
Protect Your Brand by Protecting Privacy
 
OSC2012: Identity Analytics: Exploiting Digital Breadcrumbs
OSC2012: Identity Analytics: Exploiting Digital BreadcrumbsOSC2012: Identity Analytics: Exploiting Digital Breadcrumbs
OSC2012: Identity Analytics: Exploiting Digital Breadcrumbs
 
Trust sharing economy-part_I-introduction
Trust sharing economy-part_I-introductionTrust sharing economy-part_I-introduction
Trust sharing economy-part_I-introduction
 
Trust sharing economy-part_I-introduction
Trust sharing economy-part_I-introductionTrust sharing economy-part_I-introduction
Trust sharing economy-part_I-introduction
 
Thinking inside the box data permission strategies - Wednesday 18 November
Thinking inside the box data permission strategies - Wednesday 18 NovemberThinking inside the box data permission strategies - Wednesday 18 November
Thinking inside the box data permission strategies - Wednesday 18 November
 
Thinking inside the box: data permission strategies - 18 November
Thinking inside the box: data permission strategies - 18 NovemberThinking inside the box: data permission strategies - 18 November
Thinking inside the box: data permission strategies - 18 November
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
How to create a kick ass business case for accessibility
How to create a kick ass business case for accessibilityHow to create a kick ass business case for accessibility
How to create a kick ass business case for accessibility
 
How to create people-centric services enabled by personal data
How to create people-centric services enabled by personal dataHow to create people-centric services enabled by personal data
How to create people-centric services enabled by personal data
 
Acquisiton with permission - Community Fundraising stream, 2017 IoF Fundraisi...
Acquisiton with permission - Community Fundraising stream, 2017 IoF Fundraisi...Acquisiton with permission - Community Fundraising stream, 2017 IoF Fundraisi...
Acquisiton with permission - Community Fundraising stream, 2017 IoF Fundraisi...
 
First Data C-Store
First Data C-Store First Data C-Store
First Data C-Store
 
005. Ethics, Privacy and Security
005. Ethics, Privacy and Security005. Ethics, Privacy and Security
005. Ethics, Privacy and Security
 
7 ways to ringfence customers - How to protect clients, sell more to clients...
7 ways to ringfence customers  - How to protect clients, sell more to clients...7 ways to ringfence customers  - How to protect clients, sell more to clients...
7 ways to ringfence customers - How to protect clients, sell more to clients...
 
Prospecting leads for your solar business
Prospecting leads for your solar businessProspecting leads for your solar business
Prospecting leads for your solar business
 

Más de Constantine Karbaliotis

Getting to Accountability Karbaliotis and Patrikios-Oct 22 2015
Getting to Accountability Karbaliotis and Patrikios-Oct 22 2015Getting to Accountability Karbaliotis and Patrikios-Oct 22 2015
Getting to Accountability Karbaliotis and Patrikios-Oct 22 2015Constantine Karbaliotis
 
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada SymposiumImpact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada SymposiumConstantine Karbaliotis
 
Canadian Response to the Draft EU Regulation - May 2013
Canadian Response to the Draft EU Regulation - May 2013Canadian Response to the Draft EU Regulation - May 2013
Canadian Response to the Draft EU Regulation - May 2013Constantine Karbaliotis
 
International Perspectives on Data Breach
International Perspectives on Data BreachInternational Perspectives on Data Breach
International Perspectives on Data BreachConstantine Karbaliotis
 
Update on enterprise social media risks
Update on enterprise social media risks Update on enterprise social media risks
Update on enterprise social media risks Constantine Karbaliotis
 

Más de Constantine Karbaliotis (8)

Getting to Accountability Karbaliotis and Patrikios-Oct 22 2015
Getting to Accountability Karbaliotis and Patrikios-Oct 22 2015Getting to Accountability Karbaliotis and Patrikios-Oct 22 2015
Getting to Accountability Karbaliotis and Patrikios-Oct 22 2015
 
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada SymposiumImpact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
 
Canadian Response to the Draft EU Regulation - May 2013
Canadian Response to the Draft EU Regulation - May 2013Canadian Response to the Draft EU Regulation - May 2013
Canadian Response to the Draft EU Regulation - May 2013
 
International Perspectives on Data Breach
International Perspectives on Data BreachInternational Perspectives on Data Breach
International Perspectives on Data Breach
 
Privacy issues in the cloud
Privacy issues in the cloudPrivacy issues in the cloud
Privacy issues in the cloud
 
Update on enterprise social media risks
Update on enterprise social media risks Update on enterprise social media risks
Update on enterprise social media risks
 
Privacy Access Letter I Feb 5 07
Privacy Access Letter I   Feb 5 07Privacy Access Letter I   Feb 5 07
Privacy Access Letter I Feb 5 07
 
Data Safety And Security
Data Safety And SecurityData Safety And Security
Data Safety And Security
 

Último

BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 

Último (20)

BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 

The Value of Personal Information - IAPP Canada 2011

  • 1. The Value of PI (Not π) Constantine Karbaliotis, J.D., CIPP/C/IT Americas Privacy Leader Mercer
  • 2. Constantine Karbaliotis, Mercer •  Americas Privacy Leader, Chief Privacy Officer for the Americas •  Recently joined Mercer (July 2010), responsible for assisting Mercer in its privacy compliance program •  Previously acted as Symantec’s privacy lead managing its global privacy program •  Nine years consulting experience with small to large law firms, public legal sector as well as other public and private sector organizations •  Eight years experience in managing privacy and providing privacy advice to public and private sector clients •  Practiced law for ten years •  Called to the Bar of the Province of Ontario, 1986 •  Certified Information Privacy Professional (2004), Certified Information Privacy Professional/Canada (2006), Certified Information Privacy Professional/IT (2008)
  • 3. The Value of PI •  Privacy is a human right; but there is also an aspect of ‘trading’ in our own information that makes it an asset, both in individuals’ hands and in the hands of corporations and the public sector •  This dual nature is why we struggle with the notion of trading PI – even when we’ve traded it, we obviously retain an interest
  • 4. There’s no free lunch • So-called ‘free’ services are premised upon exchanging personal information in exchange for: – Free E-mail – Social networking – News alerts – Travel itineraries – Document sharing and collaboration – Business networking – Photo sharing – Music playlists – Dating sites The
Value
of
PI
 4

  • 5. The trade in PI •  We routinely exchange data for services, discounts, convenience because companies see value in the information we share about ourselves – we create a substantial footprint electronically every day •  Coming soon to a browser near you: explicit exchanges of PI for money: •  Wall Street Journal: Online Privacy: Would you sell your private information to advertisers? http://blogs.wsj.com/wsjam/2011/03/08/2773/ The
Value
of
PI

  • 6. Why do we care? •  As privacy professionals, the task is often to get organizations to take the charge of managing PI seriously… –  Investments in a tough economy, of staff, technology, effort –  Structuring business processes and implementing policy to foster a privacy-aware culture •  We need to speak the language of business
  • 7. Two premises •  Personal information in the hands of organizations should be treated and measured as an asset •  Personal information in the hands of individuals is currency, which can be exchanged for goods and services The
Value
of
PI

  • 8. Implications for Individuals • Individuals often do not understand the value of the currency they are ‘trading’ on • Our information is tremendously valuable – yet people give passwords up for chocolate • We don’t appreciate the value of the currency we generate until, typically, it is lost, or used in a way we don’t appreciate or expect – until it is devalued The
Value
of
PI
 8

  • 9. Implications for organizations •  So the question is, if it’s an asset, are organizations treating it the way an asset should be? •  If we have not valued it appropriately, how can it be protected appropriately? The
Value
of
PI

  • 10. What if we treated personal information as well as we treated buses…
  • 11. Alternative measures of value (1) •  Loss value: – $204 per record – $6.75 million per privacy incident • Ponemon Institute, 5th Annual Survey •  “Lawsuit” value: – Recent decision of Federal Court to award $5000 for providing inaccurate data
  • 12. Alternative measures of value (2) •  What is the value of PI to the enterprise, in terms: –  Customer retention and trust –  Goodwill or intangible asset –  Royal Bank: Privacy accounts for an estimated 14% of overall Brand Value, and 7% of overall Shareholder Value - $679M and $979M respectively (2001) •  Transactional value –  What happens when another entity wants to buy data, e.g. a professional buys another’s practice? –  There are ways to measure the value of such information in terms of retention, revenue, goodwill
  • 13. Alternative measures of value (3) •  “Meta” value: – Value associated with trends, statistical or aggregated information •  Target value: – Value associated with knowing a particular individual’s buying habits, preferences, interests
  • 14. Alternative measures of value (4) •  Trade value – What is the value of the service (social networking, e-mail, etc.) being traded for one’s PI? – Alternatively, what is the amount bid for a person’s information to get them to part with it in terms of cash?
  • 15. Alternative measures of value (5) •  “Trust” value – If it costs a bank $y per loan application done online – versus $x in a bricks-and- mortar setting – The value of trust in using a website means a $x-y savings per transaction… – Conversely, lack of trust means bearing $x-y additional costs unnecessarily
  • 16. Alternative measures of value (6) •  “Theft” or criminal enterprise value: –  Symantec’s Internet Security Threat Report, vol. XIV
  • 17. Organizational Implication •  This conversation needs to be with your CFO: – Is this asset valued appropriately? – Protected appropriately? – Insured? – Depreciated? •  With your CIO: – Do we know how PI is managed through its lifecyle?
  • 18. Policy Implications •  Privacy Notices – Is notice sufficient – or a contract un- read? – Is reasonableness more important? – Is a social contract or bill of rights better to establish a ‘standard contract’?
  • 19. Implications for Accountability – to the business •  Protecting PI means protecting the currency of individuals from ‘debasement’ of their currency – Data losses, identity theft are all debasing the currency – Individuals lose value of what they hope to trade – Means an loss in asset value to the organization
  • 20. Conclusions? •  This is not to suggest there is one way to measure the value of PI •  This will vary by the nature of the PI, the business, and its uses •  It does suggest however a persuasive way to get organizations to see management of PI in a different light