SlideShare una empresa de Scribd logo
1 de 54
Business & Privacy in the CloudInnovating from Good to Best Practices Jim AdlerChief Privacy Officer & General Manager, Data Systems twitter: @jim_adlerhttp://jimadler.me Drexel  UniversityJune 2011
What’s a Cloud? Data Use Data Access Data Control Privacy Evolution Questions What to talk about?
Intelligence I am not an Attorney Geek Dweeb Nerd SocialIneptitude Obsession Dork
The Players
The Playground Cloud (PKA server & mainframe & timeshare) Closed Open Client (PKA PC & workstation)
Data usein the cloud
The surface web is small… 167 Terabytes
Compared to the deep web… 91,000 Terabytes
Much of it uploaded by us… Facebook Pictures:  80M/day uploaded Tweets:  65M/day YouTube Videos:  19,000 hours/day
~20Exabytes (20B GB) Data from  dawn of civilization through 2002 Data from  April 2011
Reconnecting out-of-touch family members Online shoppers verifying online sellers Caller ID of harassing phone calls Law enforcement Banking Services Adopted kids seeking their biological parents Learning about  a business Airlines trying to return lost luggage Networkers seeking business opportunities Social networkers looking to expand their friends list Professionals learning about colleagues at conferences Social workers who need to know more about their clients Singles curious about the people they meet Lawyers needing quick access to court records Find owner of dog’s relative for transplant Genealogists  cultivating their family tree Investigative journalists running down leads Checking out a prospective tenant Research Sales professionals looking for new prospects Non-profit organizations looking for supporters Alumni groups arranging reunions Parents  ensuring who their kids safety Anyone retrieving court records Businesses that need to update contact information on customers Checking out a prospective date Finding people that have the same illness as you Sharing Those in legally entangled looking for court records Anyone who need address histories for passports Fiancés and their curious family members Anyone curious about who's emailing or calling them Checking out a prospective social network connection Finding long-lost friends, military buddies, roommates, or classmates Researching a prospective employee Regulated For lots of reasons… (some regulated)
Providing major benefits… 51% “major benefit” is ease and convenience 41% “major benefit” is portability 39% “major benefit is sharing Use of Cloud Computing Applications and Services, Pew 2008
But real concerns… 90% “very concerned” if data sold 80% “very concerned” if photos used for marketing 68% “very concerned” if data used to serve them ads Use of Cloud Computing Applications and Services, Pew 2008
A Prescient Venn Diagram?
Data accessin the cloud
When towns were small …
“The only thing worse than being talked about, is not being talked about.”− Oscar Wilde Density↓ -> Anonymity↓ -> Privacy Expectation↓
“Good Fences Make Good Neighbors”− Mending Wall, Robert Frost Density↑ -> Anonymity↑ -> Privacy Expectation↑
“In times of rapid change, experience could be your worst enemy.”								− J. Paul Getty #@?$!! Density↓ -> Anonymity↓ -> Privacy Expectation↓
So, how do we think about publicnessand privacy now?
Public speaking is publicly public
Voting is a privately public
And some things are publicly private
Your home is clearly private
And the 4th Amendment protects your privacy from government …
But no 4th Amendment protections between citizens
It would be nice …to use familiar framework for cloud
Cloud banking clearly private
Tweeting is (mostly) public
Cloud dating is public confidential
Data control In the cloud
Private data must be protected ,[object Object]
Enforce terms of service
GLBA, COPPA, DPPA, HIPAA, ECPA
Breach disclosure laws in 46 states,[object Object]
Though this reputational data can be tuned …
Reputation is a two-way street Awareness of data that’s out there Control to comment & correct The rest is in the hands of the world
And people want control of that reputation 57% of adult users use search engines to self-search. 47% of young users have deleted comments  that others have written. 41% of young users have removed their name from tagged photos. Reputation Management and Social Media, Pew 2010
Privacy evolutionin the cloud Austin Alleman@allemanau Innocence Frontier Regulation Innovation
Sometimes the signs are clear
Sometimes the signs are not so clear
Nor are the costs The present cost of a rare, future disaster is zero
Ball of Confusion (Matrix) Regulations Violations
2/3 of social network users have made adjustments to privacy settings  80% “very concerned” about photos 68% “very concerned” if data used for ads Pew Internet and American Life Project Frontier
Compliance is a necessary, but not sufficient, condition for innovation.  Regulation
Innovation Hilary Mason’s Maxim 𝑀𝑎𝑡h+𝐶𝑜𝑑𝑒=𝐴𝑤𝑒𝑠𝑜𝑚𝑒  
Quants Making a killing on Wall Street but still can’t impress the chicks Weakonomics.com
Innovation Corollary to Mason’s Maxim 𝑽𝒂𝒍𝒖𝒆𝒔 ∗𝑀𝑎𝑡h+𝐶𝑜𝑑𝑒=𝑆𝑢𝑝𝑒𝑟 𝐴𝑤𝑒𝑠𝑜𝑚𝑒  
When privacy gets religious, discussion grinds to a halt
Innovation is a Team Sport(and your critics are on the team)
Mark Zuckerberg Real Names Richard Feynman Physics Norio Ohga Sony President 74 min CD Jeff Jonas Big Data Privacy by Design Steve Jobs ‘nuff said Innovators Shape Civilization
“Give me a place to stand, and I will move the Earth.” – Archimedes

Más contenido relacionado

La actualidad más candente

The Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology SeminarThe Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology Seminar
Mike Linksvayer
 
Smartphones: Sacrificing privacy for convenience?
Smartphones: Sacrificing privacy for convenience? Smartphones: Sacrificing privacy for convenience?
Smartphones: Sacrificing privacy for convenience?
alexa4321
 

La actualidad más candente (20)

The Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology SeminarThe Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology Seminar
 
Teens and Sexting
Teens and SextingTeens and Sexting
Teens and Sexting
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
 
Film project 2
Film project 2Film project 2
Film project 2
 
Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011
Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011
Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011
 
Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?
 
The Internet of Things and Future Shock: Too Much Change Too Fast?
The Internet of Things and Future Shock: Too Much Change Too Fast?The Internet of Things and Future Shock: Too Much Change Too Fast?
The Internet of Things and Future Shock: Too Much Change Too Fast?
 
10 reasons why now is the perfect time to get started with the mobile web
10 reasons why now is the perfect time to get started with the mobile web10 reasons why now is the perfect time to get started with the mobile web
10 reasons why now is the perfect time to get started with the mobile web
 
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
 
Smartphones: Sacrificing privacy for convenience?
Smartphones: Sacrificing privacy for convenience? Smartphones: Sacrificing privacy for convenience?
Smartphones: Sacrificing privacy for convenience?
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
 
Mobile Privacy in the Digital Age
Mobile Privacy in the Digital AgeMobile Privacy in the Digital Age
Mobile Privacy in the Digital Age
 
Privacy In The Digital Age
Privacy In The Digital AgePrivacy In The Digital Age
Privacy In The Digital Age
 
Appreciating Contradications: The Cyberpsychology of Information Security
Appreciating Contradications: The Cyberpsychology of Information SecurityAppreciating Contradications: The Cyberpsychology of Information Security
Appreciating Contradications: The Cyberpsychology of Information Security
 
Social Cybersecurity , or, A Computer Scientist's View of HCI and Theory, at ...
Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at ...Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at ...
Social Cybersecurity , or, A Computer Scientist's View of HCI and Theory, at ...
 
Have we poisoned the internet for good?
Have we poisoned the internet for good?Have we poisoned the internet for good?
Have we poisoned the internet for good?
 
disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...
 
In defence of the human factor
In defence of the human factorIn defence of the human factor
In defence of the human factor
 
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingIncreasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
 
Transportation and privacy in the mobile age
Transportation and privacy in the mobile age Transportation and privacy in the mobile age
Transportation and privacy in the mobile age
 

Destacado

WomensBreakfastArticle_MMI_FINAL
WomensBreakfastArticle_MMI_FINALWomensBreakfastArticle_MMI_FINAL
WomensBreakfastArticle_MMI_FINAL
Tracy Fink
 
Hypothesis-2015 Wheeler Yaniv Fenske
Hypothesis-2015 Wheeler Yaniv FenskeHypothesis-2015 Wheeler Yaniv Fenske
Hypothesis-2015 Wheeler Yaniv Fenske
Noga Yaniv‬‏
 
Anglès Educació Infantil
Anglès Educació InfantilAnglès Educació Infantil
Anglès Educació Infantil
grasisoler
 

Destacado (14)

Marketing online peluquerias
Marketing online peluqueriasMarketing online peluquerias
Marketing online peluquerias
 
Articles
ArticlesArticles
Articles
 
Arpan Patra
Arpan PatraArpan Patra
Arpan Patra
 
WSEAS2011
WSEAS2011WSEAS2011
WSEAS2011
 
WomensBreakfastArticle_MMI_FINAL
WomensBreakfastArticle_MMI_FINALWomensBreakfastArticle_MMI_FINAL
WomensBreakfastArticle_MMI_FINAL
 
Hypothesis-2015 Wheeler Yaniv Fenske
Hypothesis-2015 Wheeler Yaniv FenskeHypothesis-2015 Wheeler Yaniv Fenske
Hypothesis-2015 Wheeler Yaniv Fenske
 
Cuestionario unidad 2 said gomez
Cuestionario unidad 2 said gomezCuestionario unidad 2 said gomez
Cuestionario unidad 2 said gomez
 
Sistemas operativos por niveles y su definicion de cada una de las capas.
Sistemas operativos por niveles y su definicion de cada una de las capas.Sistemas operativos por niveles y su definicion de cada una de las capas.
Sistemas operativos por niveles y su definicion de cada una de las capas.
 
Landscape effects watershed anache
Landscape effects watershed   anacheLandscape effects watershed   anache
Landscape effects watershed anache
 
Cultura y-salud
Cultura y-saludCultura y-salud
Cultura y-salud
 
Anglès Educació Infantil
Anglès Educació InfantilAnglès Educació Infantil
Anglès Educació Infantil
 
Parque Natural das Serras de Aire e Candeeiros
Parque Natural das Serras de Aire e CandeeirosParque Natural das Serras de Aire e Candeeiros
Parque Natural das Serras de Aire e Candeeiros
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Pie de pagina
Pie de paginaPie de pagina
Pie de pagina
 

Similar a Drexel University: Business and Privacy in the Cloud

Transformation Communities
Transformation CommunitiesTransformation Communities
Transformation Communities
Kristin Wolff
 
Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014
Blair Gately
 

Similar a Drexel University: Business and Privacy in the Cloud (20)

iConference 2011: Reputation in the Cloud
iConference 2011: Reputation in the CloudiConference 2011: Reputation in the Cloud
iConference 2011: Reputation in the Cloud
 
The Impact of the Internet on Institutions in the Future
The Impact of the Internet on Institutions in the FutureThe Impact of the Internet on Institutions in the Future
The Impact of the Internet on Institutions in the Future
 
The REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on PrivacyThe REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on Privacy
 
Strata Conference NY: The Accidental Chief Privacy Officer
Strata Conference NY: The Accidental Chief Privacy OfficerStrata Conference NY: The Accidental Chief Privacy Officer
Strata Conference NY: The Accidental Chief Privacy Officer
 
Opportunities with data science
Opportunities with data scienceOpportunities with data science
Opportunities with data science
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 
Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?
Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?
Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?
 
Heavy, Messy, Misleading: why Big Data is a human problem, not a tech one
Heavy, Messy, Misleading: why Big Data is a human problem, not a tech oneHeavy, Messy, Misleading: why Big Data is a human problem, not a tech one
Heavy, Messy, Misleading: why Big Data is a human problem, not a tech one
 
Heavy, messy, misleading. Why Big Data is a human problem, not a technology one.
Heavy, messy, misleading. Why Big Data is a human problem, not a technology one.Heavy, messy, misleading. Why Big Data is a human problem, not a technology one.
Heavy, messy, misleading. Why Big Data is a human problem, not a technology one.
 
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwearThe Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
 
Social Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils FinalSocial Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils Final
 
Stream Computing: Defrag Conference
Stream Computing:  Defrag ConferenceStream Computing:  Defrag Conference
Stream Computing: Defrag Conference
 
Transformation Communities
Transformation CommunitiesTransformation Communities
Transformation Communities
 
The Role Of Digital Marketing
The Role Of Digital MarketingThe Role Of Digital Marketing
The Role Of Digital Marketing
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social Networks
 
Privacy, Emerging Technology, and Information Professionals
Privacy, Emerging Technology, and Information ProfessionalsPrivacy, Emerging Technology, and Information Professionals
Privacy, Emerging Technology, and Information Professionals
 
Heavy, Messy, Misleading: How Big Data is a human problem, not a tech one
Heavy, Messy, Misleading: How Big Data is a human problem, not a tech oneHeavy, Messy, Misleading: How Big Data is a human problem, not a tech one
Heavy, Messy, Misleading: How Big Data is a human problem, not a tech one
 
Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014
 
Understanding The Big Data Opportunity Final
Understanding The Big Data Opportunity FinalUnderstanding The Big Data Opportunity Final
Understanding The Big Data Opportunity Final
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Drexel University: Business and Privacy in the Cloud

  • 1. Business & Privacy in the CloudInnovating from Good to Best Practices Jim AdlerChief Privacy Officer & General Manager, Data Systems twitter: @jim_adlerhttp://jimadler.me Drexel UniversityJune 2011
  • 2. What’s a Cloud? Data Use Data Access Data Control Privacy Evolution Questions What to talk about?
  • 3. Intelligence I am not an Attorney Geek Dweeb Nerd SocialIneptitude Obsession Dork
  • 4.
  • 6. The Playground Cloud (PKA server & mainframe & timeshare) Closed Open Client (PKA PC & workstation)
  • 8. The surface web is small… 167 Terabytes
  • 9. Compared to the deep web… 91,000 Terabytes
  • 10. Much of it uploaded by us… Facebook Pictures: 80M/day uploaded Tweets: 65M/day YouTube Videos: 19,000 hours/day
  • 11. ~20Exabytes (20B GB) Data from dawn of civilization through 2002 Data from April 2011
  • 12. Reconnecting out-of-touch family members Online shoppers verifying online sellers Caller ID of harassing phone calls Law enforcement Banking Services Adopted kids seeking their biological parents Learning about a business Airlines trying to return lost luggage Networkers seeking business opportunities Social networkers looking to expand their friends list Professionals learning about colleagues at conferences Social workers who need to know more about their clients Singles curious about the people they meet Lawyers needing quick access to court records Find owner of dog’s relative for transplant Genealogists cultivating their family tree Investigative journalists running down leads Checking out a prospective tenant Research Sales professionals looking for new prospects Non-profit organizations looking for supporters Alumni groups arranging reunions Parents ensuring who their kids safety Anyone retrieving court records Businesses that need to update contact information on customers Checking out a prospective date Finding people that have the same illness as you Sharing Those in legally entangled looking for court records Anyone who need address histories for passports Fiancés and their curious family members Anyone curious about who's emailing or calling them Checking out a prospective social network connection Finding long-lost friends, military buddies, roommates, or classmates Researching a prospective employee Regulated For lots of reasons… (some regulated)
  • 13. Providing major benefits… 51% “major benefit” is ease and convenience 41% “major benefit” is portability 39% “major benefit is sharing Use of Cloud Computing Applications and Services, Pew 2008
  • 14. But real concerns… 90% “very concerned” if data sold 80% “very concerned” if photos used for marketing 68% “very concerned” if data used to serve them ads Use of Cloud Computing Applications and Services, Pew 2008
  • 15. A Prescient Venn Diagram?
  • 17. When towns were small …
  • 18. “The only thing worse than being talked about, is not being talked about.”− Oscar Wilde Density↓ -> Anonymity↓ -> Privacy Expectation↓
  • 19. “Good Fences Make Good Neighbors”− Mending Wall, Robert Frost Density↑ -> Anonymity↑ -> Privacy Expectation↑
  • 20. “In times of rapid change, experience could be your worst enemy.” − J. Paul Getty #@?$!! Density↓ -> Anonymity↓ -> Privacy Expectation↓
  • 21. So, how do we think about publicnessand privacy now?
  • 22. Public speaking is publicly public
  • 23. Voting is a privately public
  • 24. And some things are publicly private
  • 25. Your home is clearly private
  • 26. And the 4th Amendment protects your privacy from government …
  • 27. But no 4th Amendment protections between citizens
  • 28. It would be nice …to use familiar framework for cloud
  • 31. Cloud dating is public confidential
  • 32. Data control In the cloud
  • 33.
  • 35. GLBA, COPPA, DPPA, HIPAA, ECPA
  • 36.
  • 37. Though this reputational data can be tuned …
  • 38. Reputation is a two-way street Awareness of data that’s out there Control to comment & correct The rest is in the hands of the world
  • 39. And people want control of that reputation 57% of adult users use search engines to self-search. 47% of young users have deleted comments that others have written. 41% of young users have removed their name from tagged photos. Reputation Management and Social Media, Pew 2010
  • 40. Privacy evolutionin the cloud Austin Alleman@allemanau Innocence Frontier Regulation Innovation
  • 41. Sometimes the signs are clear
  • 42. Sometimes the signs are not so clear
  • 43. Nor are the costs The present cost of a rare, future disaster is zero
  • 44. Ball of Confusion (Matrix) Regulations Violations
  • 45. 2/3 of social network users have made adjustments to privacy settings 80% “very concerned” about photos 68% “very concerned” if data used for ads Pew Internet and American Life Project Frontier
  • 46. Compliance is a necessary, but not sufficient, condition for innovation. Regulation
  • 47. Innovation Hilary Mason’s Maxim 𝑀𝑎𝑡h+𝐶𝑜𝑑𝑒=𝐴𝑤𝑒𝑠𝑜𝑚𝑒  
  • 48. Quants Making a killing on Wall Street but still can’t impress the chicks Weakonomics.com
  • 49. Innovation Corollary to Mason’s Maxim 𝑽𝒂𝒍𝒖𝒆𝒔 ∗𝑀𝑎𝑡h+𝐶𝑜𝑑𝑒=𝑆𝑢𝑝𝑒𝑟 𝐴𝑤𝑒𝑠𝑜𝑚𝑒  
  • 50. When privacy gets religious, discussion grinds to a halt
  • 51. Innovation is a Team Sport(and your critics are on the team)
  • 52.
  • 53. Mark Zuckerberg Real Names Richard Feynman Physics Norio Ohga Sony President 74 min CD Jeff Jonas Big Data Privacy by Design Steve Jobs ‘nuff said Innovators Shape Civilization
  • 54. “Give me a place to stand, and I will move the Earth.” – Archimedes
  • 55. Reports of privacy’s death have been greatly exaggerated …
  • 56. Questions? Jim AdlerChief Privacy Officer & General Manager of Data Systemstwitter: @jim_adlerhttp://jimadler.me

Notas del editor

  1. Cloud computing has significant implications for personal privacy and the confidentiality of sensitive business and government data. The dramatic rush to the cloud to take advantage of cost savings in the current economic environment warrants a more careful look at the consequences to privacy and confidentiality.
  2. What do we mean by ‘home’ in the digital age—our public information/reputation footprint—what can people learn about you?—what are the 4th amendment implications of cloud storage vs. what are citizens’ expectations?Access, control, use
  3. For those that don’t know, Intelius is a direct-to-consumer provider of public information about people and businessesLet me be clear, I’m not an attorney although I work with some great ones. I’m an engineer trained in signal processing, cryptography, software, and big data.So, I’m more of a geeky nerd—but relatively high functioning.I started my career designing avionics systems for space vehicles at what’s now Lockheed-Martin.
  4. So my first job out of college was working on the Space Shuttle. On January 27 1986, I show-up for my first day.The next day, the Challenger blows-up.In the ensuing Rogers Commission investigation, Nobel Laureate Richard Feynman famously demonstrated how the o-rings failed in that rare below freezing Cape Canaveral morning (28 F, previously coldest launch 53 F)Feynman resisted participating on the Rogers Commission that investigated, but he relented, after his wife urged him that there’d be 11 people running around in a knot and one lone mosquito finding anything there is to find.Turned out Feynman’s wife was right when Rogers said at one point that “Feynman is becoming a real pain”It turned out that the Morton-Thiokol engineers knew about the risk, but were overruled by corporate brass.The moral is that politics can’t trump physics or economics. And it takes an innovative generalist, like Feynman, to cut through the politics with the truth.The eclectic innovative generalist perspective is key to navigating a complex topic like cloud privacy.
  5. We know all the tech players since the 60s.It started with IBM and grew from there
  6. I like to decompose this timeline into a landscape of closed/open computing versus client/cloud computing. In fact, I’d argue that cloud computing is the “nouveau tech” term for what was server or mainframe or timeshare.When computing was young there was just Big Blue timeshare mainframes.Clients went from thin dumb terminals to fat PCs and workstations (MSFT, Adobe, Apple), and mainframes thinned out to servers (Sun, Oracle).Then came the Internet which allowed fat clients to talk to thickening servers. Jeez, sounds like a recap of a Biggest Loser season.This world was largely closed, but for the slowly growing open-source technologies that have enabled the thick web cloud services talking to thin devices like computer browsers and phones. Many of them use open-source technologies, like FB, LI.What’s interesting is that what’s old is new again. We started with thick timeshare mainframes and now we have thick cloud services. We started with thin, dumb terminals. We now have relativelythin clients.
  7. What’s in the cloud and what’s it used for?
  8. King James Bibles = 167TB (1e6MB /1TB) (1 King James Bible/4.13MB) = 40,435,835 BiblesI find religious metaphors helpful when discussing a subject that engenders such passion like “privacy”
  9. King James Bibles = 91,000TB (1e6MB /1TB) (1 King James Bible/4.13MB) = 22,033,898,305 Bibles (550+ times more)http://en.wikipedia.org/wiki/Deep_Web
  10. Facebook Pictures: 80M/day uploaded (Answers.com, http://wiki.answers.com/Q/How_many_pictures_are_uploaded_onto_facebook_every_second)Tweets: 65M tweets/day (Wikipedia, http://en.wikipedia.org/wiki/Twitter)YouTube Videos: 19,000 hours/day (Mahalo, http://www.mahalo.com/answers/how-many-hours-of-video-is-uploaded-to-youtube-daily)
  11. 20 Exabytes of data were created, transferred, replicated from the dawn of civilization thru 2002. Four times that amount was created, transferred, replicated and transferred in April alone. And April was a short month.http://themetricsystem.rjmetrics.com/eric-schmidts-5-exabytes-quote-is-a-load-of-c
  12. Lots of uses, some regulated, most not.“Needing to find the owner of a dog’s sibling to enable a canine bone marrow transplant”“Finding a son put up for a adoption to speak to his biological mother on her death bed”
  13. So is there any hope? Can the Internet and privacy coexist? Did the Internet kill privacy or are we?I’m a pragmatic optimist, and think there is common ground. There are some amazing innovations around reputation and control that are empowering people in this digital, social age – from the big boys and little startups. A thousand flowers are blooming.
  14. First important to ask what’s public and what’s private?
  15. Let’s get a little historical context
  16. When towns were small, typical of the 19th Century, everyone knew everyone’s business and there was little expectation of privacy. I spent some time in Greensboro AL (50m south of Tuscaloosa, population 2500)If you cut school, the whole town knew by dinnertime.
  17. In the 20th Century, privacy expectations rose with growth of big, dense, anonymous cities.
  18. And now social networks are returning us to the intimacy of the small town with huge growth in data availability.Privacy expectations just haven’t kept pace with the data deluge, giving us privacy vertigo. Other apropos quotes:“If you want to make enemies, try to change something.” – Woodrow Wilson“Every generation needs a new revolution” -- Thomas Jefferson“Most of our assumptions have outlived their uselessness.” – Marshall McLuhan
  19. Andrew Keen says we are “Losing ability to be alone”.JeffJarvis: “We are social animals. There are benefits to publicness.’We need to get more sophisticated, more granular about how we think about publicness and privacy online.Yentas and gossips have been around for millennia as a key glue to the society – matchmakers, news carriers, healers, ritual keepersActually, not much different than how we think about privacy and publicness offline.
  20. Privacy levels power disparities, like between citizens and governments (Bruce Schneier)That’s why there are privacy protections in the US Constitution
  21. But the 4th amendment doesn’t protect citizens from each other. We have statutory protections between citizens.
  22. Clear parallels between offline and online access and use.
  23. So, there are clear parallels between offline data access and use and online data access and use
  24. How can we control – empowerment or regulation?
  25. State breach disclosure laws: http://www.ncsl.org/default.aspx?tabid=13489
  26. When asked what his poems mean, Robert Frost answered (paraphrased: “Half of the meaning is what I write, and half of the meaning is what you read”Reputation is similar: some of your reputation is what you put out there (what you say and do) and the rest is what the world sees.
  27. And it’s the eclectic innovator who, I believe, is the prototype for how the Chief Privacy Officer role is evolving and where I professionally and, quite accidentally, find myself these days.Clearly environmentdrivesevolution and social networking is driving us from an innocent age without privacy officers, to today’s frontier era of regulatory privacy officers, and pushing privacy officers to be 1st class members of product teams – ones who have the privacy sensibilities and technical chops to get a product out the door.A special shout out to Austin Alleman for pulling this cool drawing together. Austin is a student at Santa Clara University, friend of my son Quin. Follow Austin @allemanau. He’s a tireless, talented kid who, literally, works for food.
  28. For example, “breach disclosure” is pretty clear. Don’t spill data.
  29. For example, when are you in public and when are you in private. Twitter and LinkedIn is mostly public. But Facebook can be either.
  30. Ashley Payne: Georgia teacher fired for pictures found on Facebook of her drinking on vacation.She made the claim (on CBS Sunday Morning) that it was like her home was invaded and the pictures were stolen. That’s an incorrect assessment. It was more like she shared her pictures with a gossipy friend.What was wrong was how the school board abused the data, not that they had access to it.
  31. A note of confusion with metaphor taken from machine learning “confusion matrices”Don’t confuse inappropriate access with inappropriate useFCRA, passed in 1970Dialogs like this are necessary, but not sufficient, but we won’t legislate or regulate ourselves out of this confusion. Frankly, “default anti-social” is antithetical to the human “default social” experience.
  32. So, consumers are starting to notice the privacy & reputational issues.They are actually finding their privacy settings, and realizing when privacy policies abruptly change.
  33. But compliance alone won’t cut it.Compliance is too prescriptive, too slow, and too blunt.You know Einstein’s adage: “make things as simple as possible, but not simpler”. Compliance alone is just too simple.
  34. Well, to dabble in the heretical for a moment, how about ditching compliance for innovation?To borrow from Hilary Mason, the Chief Scientist at Bit.ly, Math+Code = Awesome But as some of you are, no doubt, thinking there’s a bit of a problem with this.
  35. Sometimes “awesome” means awesomely destructive – like when the Wall Street “quants” nearly destroyed the world’s economy by concocting derivatives – “financial weapons of mass destruction” as Warren Buffet called them.So maybe we need a corollary to Mason’s Maxim that scales technology with values.
  36. Negative values, super bad. Positive values, like fine-grained privacy controls, super awesome.
  37. You get to the right solutions with a discussion around the tough, sometimes seemingly religious, issues.
  38. An example, when I first joined Intelius nearly 3 years ago, I went on a listening tour of the company’s toughest critics (some in this room).Top of the list was Cindy Southworth, an exec at the National Network to End Domestic Violence.I asked her what Intelius could do better.She said bluntly (not uncharacteristic for those of you that know Cindy): “get my women out of your data”.I said absolutely, but as we began to work through the details, she suggested that it would be better to simply remove the latest contact information so the trail would run cold, frustrating any offender or stalker.I loved the suggestion and worked to get it on the product roadmap. This feature is now offered to all customers of our TrueRep product.
  39. Another example is our opt-outOur opt-out is free, doesn’t require a reason, but we do require proof-of-identity so we opt-out the right record.And folks have asked us to make our opt-out easier. So, now (announced at pii2011) we allow secure upload of ID in addition to fax and mail.And something we added that wasn’t ask for. We’ve integrated our opt-out into our online ads, so self-searchers on Google can easily get to the new opt-out.
  40. Innovators like Feynman shape technology and how we think about it.We know these others. But I wanted to highlight Norio Ohga – the President of Sony during the invention of the compact audio disk in the late 1970’s.Being an opera student, he mandated that the CD hold 74 minutes of music so that he could listen to Beethoven’s 9th uninterrupted. Mr. Ohga died last month. I think he’s a great example of the class, taste, and technical know-how that goes into eclectic innovation.
  41. And that place to stand is often with the product teams, your toughest critics, and your customers.Innovation is a team sport, risky, but that’s where the rewards are. The key is to balance that risk with knowledge—often from others because you can’t know everything. Customers tell whether it's valuableCritics tell you whether is viableRegulators tell you if it's legal (politicians tell you if it will be)Competitors whether it's scalableThe worst thing is a tone deaf innovator.
  42. Reports of privacy’s death have been greatly exaggerated …Dialogues like this are key to unraveling the “ball of confusion”. Innovation is a team sport: CDT, NNEDV, IAPP, Truste, Consumer Action, FPF
  43. Humans have been grappling with the freedom, power, and responsibilities of new media since the first cave dweller scrawled on a wall. And from there came stone tablets, and parchment, and the printing press, and the telephone, and the television, and the internet. The media change. The social rituals and traditions do not.I’ve heard that we’re undergoing a social revolution in online media. I would say that we’re undergoing a media revolution that’s catching up to our social traditions.Thanks!