SlideShare una empresa de Scribd logo
1 de 12
Mobile App Privacy
Jason Leung, Leo Lau
Privacy Concerns
1
Rank Concerns
#1 Consumers ranked Privacy as their primary concern on using
smartphone and mobile apps
#2 98% have a strong desire for better controls over their personal
information in mobile apps
#3 Nearly 75% feels uncomfortable on advertising tracking and
85% of the total wants to opt out
#4 77% of consumers does NOT want to share location data with
app developers
#5 Only 1 out of 3 consumers feel they are in control of their
personal information
Survey: Consumer Mobile Privacy Insights Report - Smart Privacy for Smartphones, TRUSTe,
in Feb 2011, Released on April 2011
What and Why
What is “Privacy on Mobile Apps”?
Rights and Controls of
Information captured and exposed by the mobile apps, that can be
associated with a user, e.g. YOU.
Usage Patterns: Individual and Personal Information aggregated across
mobile apps matter
Why “Privacy on Mobile Apps” is so important?
Compare with Privacy on Desktop Computers
“Hub of Personal Information”
Real-time data
Always on, always connected
Prevent the abuse and misuse
e.g. Frauds, Phishing, Intrusive Marketing Promotions
Mobile Apps Privacy is NOT Mobile Security
Personal Information are provided or observed, but not stolen.
2
Personal Information Flow
3
• App Users
(YOU)
• Send out
personal
information
• Build up usage
patterns
• Connected
Users
• Contact List
• Social friends’
list and sharing
• App, Service
Developers
• Collection
Control
• Apps, Service
Developers
• 3rd party
Business
Entities
• Advertising
Networks
• Personalized
intrusive
marketing
• Sell and Resell
of personal
information
• Public data
observers:
General Public
and
Governments
Sources of Personal
Information
Mobile Devices
Phones and Tablets
Wearables
Google Glass and
Smart Watches
Connected Peripherals:
Internet of Things
Car
Intelligent bracelets
Intelligent Bulb
Surveillance cameras
Mobile Apps
Accessed
Camera, NFC, GPS,
Heart sensor, Gyros
Services: Siri,
services on the
Cloud
4
Types of Personal Information
Provided
User Registrations, Personal Preferences, Locations and
Social Sharing
Accessed
Calendar, Contact Lists, Photos and Task Lists
Device information
Hardware configurations, Battery, Mobile Data usage
Connected peripherals
Bio-metrics
Personal preferences
Observed
Usage Patterns
5
Issues
Data for sales
Personal data and market data
Octopus sold 2M users data for HK$44M and CEO resigned
Public accessible data
Different sources provide data access API
Analytic, business intelligent, data mining
Mosaic effect
Pattern recognition
Prediction
6
Issues
Privacy policy
Only 19% top free apps have privacy policy
74% consumer believe it’s “very important” or “extremely
important” to understand what personal information a mobile
app collects
42% read and understand privacy policy before download
Rough and unspecific privacy policy,
http://www.apple.com/uk/privacy/
http://tos.ea.com/legalapp/WEBPRIVACY/US/en/PC
Privacy policy change
7
Source: TRUSTe Mobile Privacy Survey 2011
Regulations
8
US EU HK
Governing Bodies Federal Trade
Commission takes
primary role
European
Commission, National
Data Protection
Authorities in EU27
Office of the Privacy
Commissioner for
Personal Data
Regulation 8 federal laws; state
laws
EU Law, Data
Protection Directive
Personal Data
(Privacy) Ordinance
Definition of Personal
Information
No single definition,
depends on
corresponding law
Any information
relating
to an identified or
identifiable natural
person
Data relating to a
living individual, for
identity of individual,
access or processing
is practicable
Principles Notice, Choice,
Access, Integrity,
Enforcement
Notice, Purpose,
Consent, Security,
Disclosure, Access,
Accountability
Purpose and Notice,
Accuracy, Secondary
Purpose Consent,
Security, Policy and
Practices, Access
Anti-privacy, state
security
Patriot Act Countries-specific
anti-terrorism
Interception of
Communications and
Surveillance
Ordinance
Safe Harbor Arrangement
What we can do?
Information owner
Information owner has little control
Read privacy policy before download
Review OS and app level privacy setting
Pay attention to pop-up
Personal responsibility
App developer
Get serious about privacy
Ask BEFORE collect
Transparency and Choice
Collect only what is required
OS developer
Privacy by design
9
References
http://www.scmp.com/article/720620/octopus-sold-personal-data-customers-hk44m
http://www.computerworld.com/s/article/91109/Sidebar_The_Mosaic_Effect
http://en.wikipedia.org/wiki/Data_Protection_Directive
http://ec.europa.eu/justice/data-protection/
http://www.ftc.gov/reports/privacy3/fairinfo.shtm
http://wikibon.org/blog/big-data-statistics/
https://www.truste.com/blog/2012/10/18/are-businesses-smart-enough-about-smartphone-
privacy/
http://www.truste.com/blog/2011/04/27/5-privacy-tips-for-mobile-app-developers/
http://ag.ca.gov/cms_attachments/press/pdfs/n2630_signed_agreement.pdf
http://ag.ca.gov/cms_attachments/press/pdfs/n2630_updated_mobile_apps_info.pdf
http://mobiledeviceinsight.com/2011/12/sensors-in-smartphones/
http://www.w3.org/P3P/mobile-privacy-ws/papers/zks.html
http://bits.blogs.nytimes.com/2011/05/19/the-sensors-are-coming/
http://www.slideshare.net/kleinerperkins/kpcb-internet-trends-2013
http://www.businessinsider.com/wearable-computing-a-new-mobile-market-takes-shape-
2013-4
http://export.gov/safeharbor/
10
Q & A
and
11
Thank You!

Más contenido relacionado

La actualidad más candente

Smartphone security
Smartphone  securitySmartphone  security
Smartphone securityManish Gupta
 
Data Privacy
Data PrivacyData Privacy
Data PrivacyHome
 
CYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIACYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIAcharitha garimella
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyThoughtworks
 
IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts Sophos
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation tomasztopa
 
Social Media Privacy
Social Media PrivacySocial Media Privacy
Social Media PrivacyLisa Turner
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data SecurityWilmerHale
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentationMatthew Momney
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentationmlw32785
 
Personal data protection bill
Personal data protection bill Personal data protection bill
Personal data protection bill Mathew Chacko
 
Trade secrets and conflicts of interest
Trade secrets and conflicts of interestTrade secrets and conflicts of interest
Trade secrets and conflicts of interestHagi Sahib
 
Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer PrivacyAshish Jain
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protectionatuljaybhaye
 

La actualidad más candente (20)

Data privacy & social media
Data privacy & social mediaData privacy & social media
Data privacy & social media
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone security
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
CYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIACYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIA
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny Leroy
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
 
IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
Social Media Privacy
Social Media PrivacySocial Media Privacy
Social Media Privacy
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
Personal data protection bill
Personal data protection bill Personal data protection bill
Personal data protection bill
 
Trade secrets and conflicts of interest
Trade secrets and conflicts of interestTrade secrets and conflicts of interest
Trade secrets and conflicts of interest
 
Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer Privacy
 
Ensuring Mobile Device Security
Ensuring Mobile Device SecurityEnsuring Mobile Device Security
Ensuring Mobile Device Security
 
Privacy in the Digital Age
Privacy in the Digital AgePrivacy in the Digital Age
Privacy in the Digital Age
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Data Privacy Compliance
Data Privacy ComplianceData Privacy Compliance
Data Privacy Compliance
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 

Destacado

An Analysis of the Privacy and Security Risks of Android VPN Permission-enabl...
An Analysis of the Privacy and Security Risks of Android VPN Permission-enabl...An Analysis of the Privacy and Security Risks of Android VPN Permission-enabl...
An Analysis of the Privacy and Security Risks of Android VPN Permission-enabl...Narseo Rodriguez
 
UCB Corporate Compliance Training - Module 5 Gramm-Leach-Bliley-Act (GLBA)-Ti...
UCB Corporate Compliance Training - Module 5 Gramm-Leach-Bliley-Act (GLBA)-Ti...UCB Corporate Compliance Training - Module 5 Gramm-Leach-Bliley-Act (GLBA)-Ti...
UCB Corporate Compliance Training - Module 5 Gramm-Leach-Bliley-Act (GLBA)-Ti...Timothy Ledoux, MSCS, CISSO, CPTE
 
Sql injection ( http://etabz.blogspot.com/2014/11/sql-injection.html )
Sql injection ( http://etabz.blogspot.com/2014/11/sql-injection.html )Sql injection ( http://etabz.blogspot.com/2014/11/sql-injection.html )
Sql injection ( http://etabz.blogspot.com/2014/11/sql-injection.html )Ehtisham Ullah
 
VPN Types, Vulnerabilities & Solutions - Tareq Hanaysha
VPN Types, Vulnerabilities & Solutions - Tareq HanayshaVPN Types, Vulnerabilities & Solutions - Tareq Hanaysha
VPN Types, Vulnerabilities & Solutions - Tareq HanayshaHanaysha
 
Storage in the Windows Azure Platform - ericnel
Storage in the Windows Azure Platform - ericnelStorage in the Windows Azure Platform - ericnel
Storage in the Windows Azure Platform - ericnelukdpe
 
Information Security and Privacy
Information Security and PrivacyInformation Security and Privacy
Information Security and PrivacyAnika Tasnim Hafiz
 
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Jishnu Pradeep
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNinh Nguyen
 
Privacy and mobile apps - status 2013 Belgium
Privacy and mobile apps - status 2013 BelgiumPrivacy and mobile apps - status 2013 Belgium
Privacy and mobile apps - status 2013 BelgiumMobile Monday Brussels
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 

Destacado (15)

An Analysis of the Privacy and Security Risks of Android VPN Permission-enabl...
An Analysis of the Privacy and Security Risks of Android VPN Permission-enabl...An Analysis of the Privacy and Security Risks of Android VPN Permission-enabl...
An Analysis of the Privacy and Security Risks of Android VPN Permission-enabl...
 
UCB Corporate Compliance Training - Module 5 Gramm-Leach-Bliley-Act (GLBA)-Ti...
UCB Corporate Compliance Training - Module 5 Gramm-Leach-Bliley-Act (GLBA)-Ti...UCB Corporate Compliance Training - Module 5 Gramm-Leach-Bliley-Act (GLBA)-Ti...
UCB Corporate Compliance Training - Module 5 Gramm-Leach-Bliley-Act (GLBA)-Ti...
 
Sql injection ( http://etabz.blogspot.com/2014/11/sql-injection.html )
Sql injection ( http://etabz.blogspot.com/2014/11/sql-injection.html )Sql injection ( http://etabz.blogspot.com/2014/11/sql-injection.html )
Sql injection ( http://etabz.blogspot.com/2014/11/sql-injection.html )
 
SQL Injection Attacks
SQL Injection AttacksSQL Injection Attacks
SQL Injection Attacks
 
VPN Types, Vulnerabilities & Solutions - Tareq Hanaysha
VPN Types, Vulnerabilities & Solutions - Tareq HanayshaVPN Types, Vulnerabilities & Solutions - Tareq Hanaysha
VPN Types, Vulnerabilities & Solutions - Tareq Hanaysha
 
Apps and Privacy
Apps and PrivacyApps and Privacy
Apps and Privacy
 
Storage in the Windows Azure Platform - ericnel
Storage in the Windows Azure Platform - ericnelStorage in the Windows Azure Platform - ericnel
Storage in the Windows Azure Platform - ericnel
 
Information Security and Privacy
Information Security and PrivacyInformation Security and Privacy
Information Security and Privacy
 
App Privacy
App PrivacyApp Privacy
App Privacy
 
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)
 
Cloud Computing Security Issues
Cloud Computing Security Issues Cloud Computing Security Issues
Cloud Computing Security Issues
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Privacy and mobile apps - status 2013 Belgium
Privacy and mobile apps - status 2013 BelgiumPrivacy and mobile apps - status 2013 Belgium
Privacy and mobile apps - status 2013 Belgium
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 

Similar a Mobile app privacy

Getting users to trust your Mobile Apps and Mobile Web sites
Getting users to trust your Mobile Apps and Mobile Web sitesGetting users to trust your Mobile Apps and Mobile Web sites
Getting users to trust your Mobile Apps and Mobile Web sitesJanet Jaiswal
 
Three things to know about mobile marketing
Three things to know about mobile marketingThree things to know about mobile marketing
Three things to know about mobile marketingKPWriterMarketing
 
MEF Global Consumer Trust Report
MEF Global Consumer Trust ReportMEF Global Consumer Trust Report
MEF Global Consumer Trust ReportAVG Technologies
 
MEF Mobile Apps Privacy Policy Research 2013
MEF Mobile Apps Privacy Policy Research 2013MEF Mobile Apps Privacy Policy Research 2013
MEF Mobile Apps Privacy Policy Research 2013MEFContentandCommerce
 
How your data can be used against you #DataScienceWeek presentation by Leigh-...
How your data can be used against you #DataScienceWeek presentation by Leigh-...How your data can be used against you #DataScienceWeek presentation by Leigh-...
How your data can be used against you #DataScienceWeek presentation by Leigh-...Leigh-Chantelle
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile SecurityTharaka Mahadewa
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone SecurityMalasta Hill
 
Chris Babel Presentation
Chris Babel PresentationChris Babel Presentation
Chris Babel PresentationMediabistro
 
Consumer Mobile Policy & Security - Lightspeed & Kantar
Consumer Mobile Policy & Security - Lightspeed & KantarConsumer Mobile Policy & Security - Lightspeed & Kantar
Consumer Mobile Policy & Security - Lightspeed & KantarMerlien Institute
 
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...AIRCC Publishing Corporation
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportSymantec
 
Consumer acceptance of app only model of e commerce
Consumer acceptance of app only model of e commerceConsumer acceptance of app only model of e commerce
Consumer acceptance of app only model of e commerceAkash Gupta
 
Tips for creating Effective & HIPPA compliant mobile.pptx
Tips for creating Effective & HIPPA compliant mobile.pptxTips for creating Effective & HIPPA compliant mobile.pptx
Tips for creating Effective & HIPPA compliant mobile.pptxMyAppGurus
 
What does your Data Say about you?
What does your Data Say about you?What does your Data Say about you?
What does your Data Say about you?Crowdsourcing Week
 
App Development and Its Privacy Segment.pdf
App Development and Its Privacy Segment.pdfApp Development and Its Privacy Segment.pdf
App Development and Its Privacy Segment.pdfMobile App Experts India
 
App Development and Its Privacy Segment.pdf
App Development and Its Privacy Segment.pdfApp Development and Its Privacy Segment.pdf
App Development and Its Privacy Segment.pdfMobile App Experts India
 
Smart phones
Smart phonesSmart phones
Smart phoneskumanmm
 

Similar a Mobile app privacy (20)

Getting users to trust your Mobile Apps and Mobile Web sites
Getting users to trust your Mobile Apps and Mobile Web sitesGetting users to trust your Mobile Apps and Mobile Web sites
Getting users to trust your Mobile Apps and Mobile Web sites
 
Three things to know about mobile marketing
Three things to know about mobile marketingThree things to know about mobile marketing
Three things to know about mobile marketing
 
Mobile security article
Mobile security articleMobile security article
Mobile security article
 
MEF Global Consumer Trust Report
MEF Global Consumer Trust ReportMEF Global Consumer Trust Report
MEF Global Consumer Trust Report
 
MEF Mobile Apps Privacy Policy Research 2013
MEF Mobile Apps Privacy Policy Research 2013MEF Mobile Apps Privacy Policy Research 2013
MEF Mobile Apps Privacy Policy Research 2013
 
Mobile Analytics
Mobile AnalyticsMobile Analytics
Mobile Analytics
 
How your data can be used against you #DataScienceWeek presentation by Leigh-...
How your data can be used against you #DataScienceWeek presentation by Leigh-...How your data can be used against you #DataScienceWeek presentation by Leigh-...
How your data can be used against you #DataScienceWeek presentation by Leigh-...
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone Security
 
Chris Babel Presentation
Chris Babel PresentationChris Babel Presentation
Chris Babel Presentation
 
Consumer Mobile Policy & Security - Lightspeed & Kantar
Consumer Mobile Policy & Security - Lightspeed & KantarConsumer Mobile Policy & Security - Lightspeed & Kantar
Consumer Mobile Policy & Security - Lightspeed & Kantar
 
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey Report
 
Mobileprivacyazahir
MobileprivacyazahirMobileprivacyazahir
Mobileprivacyazahir
 
Consumer acceptance of app only model of e commerce
Consumer acceptance of app only model of e commerceConsumer acceptance of app only model of e commerce
Consumer acceptance of app only model of e commerce
 
Tips for creating Effective & HIPPA compliant mobile.pptx
Tips for creating Effective & HIPPA compliant mobile.pptxTips for creating Effective & HIPPA compliant mobile.pptx
Tips for creating Effective & HIPPA compliant mobile.pptx
 
What does your Data Say about you?
What does your Data Say about you?What does your Data Say about you?
What does your Data Say about you?
 
App Development and Its Privacy Segment.pdf
App Development and Its Privacy Segment.pdfApp Development and Its Privacy Segment.pdf
App Development and Its Privacy Segment.pdf
 
App Development and Its Privacy Segment.pdf
App Development and Its Privacy Segment.pdfApp Development and Its Privacy Segment.pdf
App Development and Its Privacy Segment.pdf
 
Smart phones
Smart phonesSmart phones
Smart phones
 

Último

The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Último (20)

The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

Mobile app privacy

Notas del editor

  1. Subjects: 1,000 US Consumers aged 18+ who are owning/using smartphonesUS residentsAge 18 or aboveCurrently owning or using a smartphoneNot employed in advertising, marketing research or telecom
  2. device
  3. The Ginger.io app runs silently in the background of participants’ smartphones, collecting text message habits, call frequency, and location. All that data is analyzed and sent back to both patients via the app and doctors and researchers via an online dashboard. If you suddenly stop calling your friends, or don’t go to work for a few days, that could be a sign to your doctors that they need to check in on you more aggressively.
  4. Contacted 2 times on average, selling 4.5 years
  5. TRUSTe Survey
  6. France passed 13 anti-terrorism measures on Oct. 31, 2001, the United Kingdom passed the Anti-Terrorism, Crime and Security Act on Dec. 15, 2001 since replaced by the Prevention of Terrorism Act 2005; Belgium in December 2003 enacted legislation outlawing any action with the purpose of “destabilizing or destroying the fundamental political, constitutional, economic or social structures of a country”“the cure should not be worse than the disease”