SlideShare a Scribd company logo
1 of 31
Mobile Marketing
                                   Meltdown
                                   Privacy                 Monetization                    Design Best Practices




Business | Employment | Internet | Privacy | Information SecurityInternet
                               Business | Employment |                      | Privacy | Information Security
Business | Employment | Internet | Privacy | Information Security
Here’s What It’s About
• Privacy -- Privacy by Design: Advocates embedding
  privacy considerations at the requirements phase of
  development projects

• Monetization -- Including In-App Purchases -- Its
  Novelty is Both its Strength and Downfall

                 A Few Thoughts on Application Design


   Business | Employment | Internet | Privacy | Information Security
Why Should You Care
• There have been 3 FTC mobile application related
  settlements already announced, others are ongoing

• Several players in the ecosystem have been the target of
  called for Congressional investigations

• IN SHORT THE LIABILITY EXPOSURE – add class
  actions, and state investigations – IS REALLY
  FREAKING HIGH

   Business | Employment | Internet | Privacy | Information Security
Announced FTC Settlements




 Business | Employment | Internet | Privacy | Information Security
KEY FTC INVESTIGATION
TAKEAWAYS
• Advertising claims need be truthful. That means both
  literally and what your advertising claims implicitly

• Important terms of the app need to be stated clearly and
  upfront

• Tune in to privacy. There are a number of privacy laws,
  and emerging restrictions on the type of personal data
  your app can and should collect from users

    Business | Employment | Internet | Privacy | Information Security
THE MAIN TAKEAWAY: There is a
  lot of scrutiny of mobile apps. Be
proactive and take reasonable steps to
 make sure your mobile apps comply
              with the law


 Business | Employment | Internet | Privacy | Information Security
Let’s Talk Privacy
The amalgamation of so much behavior rich
information in a single very personal device
opens the possibility of radical innovations in
marketing
                                                                  Location Information
                                                                                            Access to a Network of
                                                                  (Consistent Broadcast)
                                                                                            Pre-Qualified Users
                                                                                            (Think Stored Contacts)

                                                                  Lots of Behavioral
                                                                  Tid-Bits                   Personal Financial and
                                                                                             Health Information


                                                                       1:1 User Corollary
                                                                                             Common SDK’s Create
                                                                                             Emerging Interesting
   Business | Employment | Internet | Privacy | Information Security                         Possibilities
But There Are Risks




  Business | Employment | Internet | Privacy | Information Security
Several Privacy Guidelines Out
There


  Future of Privacy Forum                                         Mobile Marketing Association




  Business | Employment | Internet | Privacy | Information Security
Its Still About Choice, Consent &
Control
                                                        Choice – Collection,
                                                        Storage, & Transfer




                                                                           Consent – Obtain
              Control – Utilization
                                                                             Agreement

  Business | Employment | Internet | Privacy | Information Security
You Got To Have a Privacy Policy
• Even if you do not believe you are collecting
  or using data that would trigger privacy
  concerns
• Provide a link to it in each app store listing, on
  your own site. If your app has a settings page
  put a privacy policy link there as well
• Make sure that it can easily be read on a
  mobile device
  Business | Employment | Internet | Privacy | Information Security
Get The Disclosures Rights




  Business | Employment | Internet | Privacy | Information Security
You Have to Timely Disclose
Unanticipated Uses




  Business | Employment | Internet | Privacy | Information Security
Don’t Forget Security
• Ensure reasonable security measures are in
  place
• Encrypt data in transit (SSL / TLS)
• Encrypt sensitive information stored including
  for example passwords
• Protect user application data

   Business | Employment | Internet | Privacy | Information Security
Good Housekeeping
• Stay within the boundaries of your disclosures – don’t
  use or collect data if you haven’t explained the
  practice to the user
• Don’t access or collect data unless your app requires
  it
• Delete old data
• Provide users with a way to contact you and respond
  to their questions and concerns

   Business | Employment | Internet | Privacy | Information Security
Use Reputable Partners

Keep in mind that many, if not most, privacy
issues for application developers come from
inserting…SDKs – such as those from
advertising networks and analytics providers –
into your app



   Business | Employment | Internet | Privacy | Information Security
Let’s Talk In-App Purchases

There is a value proposition disconnect that is in
part because of the novelty of the platform




   Business | Employment | Internet | Privacy | Information Security
Food for Thought


                                        http://bit.ly/sLWOp6




  Business | Employment | Internet | Privacy | Information Security
Another Class Action Suit




  Business | Employment | Internet | Privacy | Information Security
The Quid Pro Quo

• It’s got to make sense

• Its not all about the “Benjamins”



  Business | Employment | Internet | Privacy | Information Security
Get The Disclosures Rights
• Disclose the Existence of In-App Purchase
  Functionality
Although this application is free to download and play
certain features functionality, may require an in-app
purchase.
• Avoid confusion: Price points like $.99, $9.99 and
  $99.99



   Business | Employment | Internet | Privacy | Information Security
Consider Documenting Your
Pricing Strategy
• Calibrate using established revenue models: Think
  console gaming and associated marketplaces (i.e. the
  Wii)
• Incorporate average user revenue data overtime and
  tweak pricing to maintain reasonableness

       No this is not a mechanism that limits an apps revenue
   potential. Rather we have fixed the per user revenue variable,
   the obvious then to increase revenue is to acquire more users.
    This then drives better quality into the marketplace and culls
                        inferior apps over time
   Business | Employment | Internet | Privacy | Information Security
Consider Limits
• Daily Spending Caps

• Time Based Purchase Limits

• In-App Purchase Confirmation Alerts



  Business | Employment | Internet | Privacy | Information Security
Let’s Talk In-App Monetization


Apple thinks incentivization is a dirty word




   Business | Employment | Internet | Privacy | Information Security
Food for Thought


                               http://on.mash.to/zloUCV




  Business | Employment | Internet | Privacy | Information Security
How It Works


        Established Apps
         Incorporate 3rd
          Party SDK’s to
             Enable
          Monetization                   App Promotion Services Charge On A Per Unit
                                         Basis For Installs and Split Revenue with App
                                                 Developer who installed SDK

                                                                                             New Apps
                                                                                             Promoted
                                                                                          Sometimes with
                                                                                         Intent to Achieve
                                                                                         Top 25 App Store
                                                                                              Ranking




 Business | Employment | Internet | Privacy | Information Security
You Cannot Game The System




 Business | Employment | Internet | Privacy | Information Security
Thoughts on App Design

A little conservatism in the face of uncertainty
isn’t a bad thing.




   Business | Employment | Internet | Privacy | Information Security
These Work in App Design, Privacy
and Monetization




  Business | Employment | Internet | Privacy | Information Security
CONTACT ME
HAYDEN CREQUE
p. 320-247-3439
e. hayden@crequelaw.com
Twitter
@haydencreque


Web
www.crequelaw.com




    Business | Employment | Internet | Privacy | Information Security

More Related Content

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Mobile Marketing Meltdown

  • 1. Mobile Marketing Meltdown Privacy Monetization Design Best Practices Business | Employment | Internet | Privacy | Information SecurityInternet Business | Employment | | Privacy | Information Security
  • 2. Business | Employment | Internet | Privacy | Information Security
  • 3. Here’s What It’s About • Privacy -- Privacy by Design: Advocates embedding privacy considerations at the requirements phase of development projects • Monetization -- Including In-App Purchases -- Its Novelty is Both its Strength and Downfall A Few Thoughts on Application Design Business | Employment | Internet | Privacy | Information Security
  • 4. Why Should You Care • There have been 3 FTC mobile application related settlements already announced, others are ongoing • Several players in the ecosystem have been the target of called for Congressional investigations • IN SHORT THE LIABILITY EXPOSURE – add class actions, and state investigations – IS REALLY FREAKING HIGH Business | Employment | Internet | Privacy | Information Security
  • 5. Announced FTC Settlements Business | Employment | Internet | Privacy | Information Security
  • 6. KEY FTC INVESTIGATION TAKEAWAYS • Advertising claims need be truthful. That means both literally and what your advertising claims implicitly • Important terms of the app need to be stated clearly and upfront • Tune in to privacy. There are a number of privacy laws, and emerging restrictions on the type of personal data your app can and should collect from users Business | Employment | Internet | Privacy | Information Security
  • 7. THE MAIN TAKEAWAY: There is a lot of scrutiny of mobile apps. Be proactive and take reasonable steps to make sure your mobile apps comply with the law Business | Employment | Internet | Privacy | Information Security
  • 8. Let’s Talk Privacy The amalgamation of so much behavior rich information in a single very personal device opens the possibility of radical innovations in marketing Location Information Access to a Network of (Consistent Broadcast) Pre-Qualified Users (Think Stored Contacts) Lots of Behavioral Tid-Bits Personal Financial and Health Information 1:1 User Corollary Common SDK’s Create Emerging Interesting Business | Employment | Internet | Privacy | Information Security Possibilities
  • 9. But There Are Risks Business | Employment | Internet | Privacy | Information Security
  • 10. Several Privacy Guidelines Out There Future of Privacy Forum Mobile Marketing Association Business | Employment | Internet | Privacy | Information Security
  • 11. Its Still About Choice, Consent & Control Choice – Collection, Storage, & Transfer Consent – Obtain Control – Utilization Agreement Business | Employment | Internet | Privacy | Information Security
  • 12. You Got To Have a Privacy Policy • Even if you do not believe you are collecting or using data that would trigger privacy concerns • Provide a link to it in each app store listing, on your own site. If your app has a settings page put a privacy policy link there as well • Make sure that it can easily be read on a mobile device Business | Employment | Internet | Privacy | Information Security
  • 13. Get The Disclosures Rights Business | Employment | Internet | Privacy | Information Security
  • 14. You Have to Timely Disclose Unanticipated Uses Business | Employment | Internet | Privacy | Information Security
  • 15. Don’t Forget Security • Ensure reasonable security measures are in place • Encrypt data in transit (SSL / TLS) • Encrypt sensitive information stored including for example passwords • Protect user application data Business | Employment | Internet | Privacy | Information Security
  • 16. Good Housekeeping • Stay within the boundaries of your disclosures – don’t use or collect data if you haven’t explained the practice to the user • Don’t access or collect data unless your app requires it • Delete old data • Provide users with a way to contact you and respond to their questions and concerns Business | Employment | Internet | Privacy | Information Security
  • 17. Use Reputable Partners Keep in mind that many, if not most, privacy issues for application developers come from inserting…SDKs – such as those from advertising networks and analytics providers – into your app Business | Employment | Internet | Privacy | Information Security
  • 18. Let’s Talk In-App Purchases There is a value proposition disconnect that is in part because of the novelty of the platform Business | Employment | Internet | Privacy | Information Security
  • 19. Food for Thought http://bit.ly/sLWOp6 Business | Employment | Internet | Privacy | Information Security
  • 20. Another Class Action Suit Business | Employment | Internet | Privacy | Information Security
  • 21. The Quid Pro Quo • It’s got to make sense • Its not all about the “Benjamins” Business | Employment | Internet | Privacy | Information Security
  • 22. Get The Disclosures Rights • Disclose the Existence of In-App Purchase Functionality Although this application is free to download and play certain features functionality, may require an in-app purchase. • Avoid confusion: Price points like $.99, $9.99 and $99.99 Business | Employment | Internet | Privacy | Information Security
  • 23. Consider Documenting Your Pricing Strategy • Calibrate using established revenue models: Think console gaming and associated marketplaces (i.e. the Wii) • Incorporate average user revenue data overtime and tweak pricing to maintain reasonableness No this is not a mechanism that limits an apps revenue potential. Rather we have fixed the per user revenue variable, the obvious then to increase revenue is to acquire more users. This then drives better quality into the marketplace and culls inferior apps over time Business | Employment | Internet | Privacy | Information Security
  • 24. Consider Limits • Daily Spending Caps • Time Based Purchase Limits • In-App Purchase Confirmation Alerts Business | Employment | Internet | Privacy | Information Security
  • 25. Let’s Talk In-App Monetization Apple thinks incentivization is a dirty word Business | Employment | Internet | Privacy | Information Security
  • 26. Food for Thought http://on.mash.to/zloUCV Business | Employment | Internet | Privacy | Information Security
  • 27. How It Works Established Apps Incorporate 3rd Party SDK’s to Enable Monetization App Promotion Services Charge On A Per Unit Basis For Installs and Split Revenue with App Developer who installed SDK New Apps Promoted Sometimes with Intent to Achieve Top 25 App Store Ranking Business | Employment | Internet | Privacy | Information Security
  • 28. You Cannot Game The System Business | Employment | Internet | Privacy | Information Security
  • 29. Thoughts on App Design A little conservatism in the face of uncertainty isn’t a bad thing. Business | Employment | Internet | Privacy | Information Security
  • 30. These Work in App Design, Privacy and Monetization Business | Employment | Internet | Privacy | Information Security
  • 31. CONTACT ME HAYDEN CREQUE p. 320-247-3439 e. hayden@crequelaw.com Twitter @haydencreque Web www.crequelaw.com Business | Employment | Internet | Privacy | Information Security

Editor's Notes

  1. . It’s also important to know with whom you can share that information, and to disclose how your app collects, uses and shares such data lawfully. If your mobile app is designed to collect data from the consumer (whether contact information, geolocational information, or other identifying data), monitor industry guidelines.Failure to take these steps can make a mobile app company and its individual owners the latest FTC target. If you think a settlement with the FTC isn’t too bad, you might want to reconsider. Take note that these FTC settlements will last for 20 years, and closely regulate all future business conduct concerning said mobile app (and potentially other mobile apps and business practices that a company and its owners wish to develop). Violations of an FTC settlement can also result in up to $16,000 per violation which, when calculated, can amount to millions of dollars in civil penalties.
  2. . It’s also important to know with whom you can share that information, and to disclose how your app collects, uses and shares such data lawfully. If your mobile app is designed to collect data from the consumer (whether contact information, geolocational information, or other identifying data), monitor industry guidelines.Failure to take these steps can make a mobile app company and its individual owners the latest FTC target. If you think a settlement with the FTC isn’t too bad, you might want to reconsider. Take note that these FTC settlements will last for 20 years, and closely regulate all future business conduct concerning said mobile app (and potentially other mobile apps and business practices that a company and its owners wish to develop). Violations of an FTC settlement can also result in up to $16,000 per violation which, when calculated, can amount to millions of dollars in civil penalties.
  3. The main takeaway: The FTC is monitoring mobile apps, and you don’t want yours caught in the scrutiny. Be proactive and take reasonable steps to make sure your mobile apps comply with the law.
  4. If your app make use of data in a way that users might not expect you should make clear conspicuous and timely disclosures of that fact.
  5. Sometimes you won’t even know that the organization’s values have been usurped.
  6. If you plug someone else’s code into your application you are on the hook both legall and to users, with regard to the third parties you work with, and the analytics practices they engage in.
  7. Use Good Judgment at All Times – NordstromsDon’t Be Evil -- GoogleBe the Number one or Number two Business in the Industry -- GE
  8. Sometimes you won’t even know that the organization’s values have been usurped.
  9. Sometimes you won’t even know that the organization’s values have been usurped.