SlideShare una empresa de Scribd logo
1 de 31
Designing location services for privacy and security  ,[object Object],[object Object],[object Object],[object Object]
Step 1 – risks with location data Step 2 – mistakes made by Google and Apple Step 3 – designing location systems properly   Presentation Identifier. Information Classification as Needed Step 1 >  Step 2 > Step 3 Social location privacy
Step 1: It is a problem for some Presentation Identifier. Information Classification as Needed Step 1 >  Step 2 > Step 3 Social location privacy
Does he know where you live? Presentation Identifier. Information Classification as Needed Step 1 >  Step 2 > Step 3 Social location privacy
Some people should not be found Presentation Identifier. Information Classification as Needed Step 1 >  Step 2 > Step 3 Social location privacy
If you aren't doing anything wrong, what do you have to hide?  Presentation Identifier. Information Classification as Needed Step 1 >  Step 2 > Step 3 Social location privacy
“ If I'm not doing anything wrong, then you have no cause to watch me”  Presentation Identifier. Information Classification as Needed Step 1 >  Step 2 > Step 3 Social location privacy
Watch someone long enough, and you'll find something to arrest -- or just blackmail with  Presentation Identifier. Information Classification as Needed Step 1 >  Step 2 > Step 3 Social location privacy
Quis custodiet custodes ipsos?   Presentation Identifier. Information Classification as Needed Step 1 >  Step 2 > Step 3 Social location privacy
Maybe some people should not know where you are….. Presentation Identifier. Information Classification as Needed Step 1 >  Step 2 > Step 3 Social location privacy
Maybe your boss shouldn’t either… Presentation Identifier. Information Classification as Needed Step 1 >  Step 2 > Step 3 Social location privacy
Comfortable with location based advertising? Presentation Identifier. Information Classification as Needed Step 1 >  Step 2 > Step 3 Social location privacy
Step 1 – risks with location data Step 2 – mistakes made by Google and Apple Step 3 – designing location systems properly   Presentation Identifier. Information Classification as Needed Step 1  > Step 2  > Step 3 Social location privacy
Step 2: clearly some mistakes were made Presentation Identifier. Information Classification as Needed Step 1 >  Step 2  > Step 3 Social location privacy
Consent buried in terms and conditions Presentation Identifier. Information Classification as Needed Step 1 >  Step 2  > Step 3 Social location privacy
Better… Presentation Identifier. Information Classification as Needed Step 1 >  Step 2  > Step 3 Social location privacy
“ Apple is not tracking the location of your iPhone” Presentation Identifier. Information Classification as Needed “ it’s maintaining a database of Wi-Fi hotspots and cell towers around your current location, some of which may be located more than one  hundred  miles  (or just one)  away from your iPhone,” Lack of clear communication on WHAT and PURPOSE Step 1 >  Step 2  > Step 3 Social location privacy
Unique identifiers are the enemy of anonymity Presentation Identifier. Information Classification as Needed Step 1 >  Step 2  > Step 3 Social location privacy
Why upload data in real time? Presentation Identifier. Information Classification as Needed Step 1 >  Step 2  > Step 3 Social location privacy
Apple “bug”: location tracking that won't stop… Step 1 >  Step 2  > Step 3 Social location privacy
No encryption Android v2.3  historical location data not deleted Step 1 >  Step 2  > Step 3 security Social location privacy
Too much historical data Step 1 >  Step 2  > Step 3 Social location privacy
Step 1 – risks with location data Step 2 – mistakes made by Google and Apple Step 3 – designing location systems properly   Presentation Identifier. Information Classification as Needed Step 1 >   Step 2 >  Step 3 Social location privacy
Consent and notice in context Presentation Identifier. Information Classification as Needed Step 1 >   Step 2 >  Step 3 Social location privacy
Use only for approved purpose Presentation Identifier. Information Classification as Needed Step 1 >   Step 2 >  Step 3 Social location privacy
Encrypt personal data in storage, transit and backup #bettersafethansony Presentation Identifier. Information Classification as Needed Step 1 >   Step 2 >  Step 3 Social location privacy
Presentation Identifier. Information Classification as Needed Step 1 >   Step 2 >  Step 3 Provide opt-out and disable Social location privacy
Presentation Identifier. Information Classification as Needed Step 1 >   Step 2 >  Step 3 Simple access to update and delete Social location privacy
Presentation Identifier. Information Classification as Needed Step 1 >   Step 2 >  Step 3 Careful of onward transfer and third party access Social location privacy
Recap Presentation Identifier. Information Classification as Needed Step 1 >   Step 2 >  Step 3 ,[object Object],[object Object],[object Object],Social location privacy
Designing location services for privacy and security  ,[object Object],[object Object],[object Object],[object Object]

Más contenido relacionado

Similar a Designing location services for privacy

DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSOodit Jethwa
 
Communication Compliance in Microsoft 365
Communication Compliance in Microsoft 365Communication Compliance in Microsoft 365
Communication Compliance in Microsoft 365Joanne Klein
 
Logfiles? GDPR Says YES!
Logfiles? GDPR Says YES!Logfiles? GDPR Says YES!
Logfiles? GDPR Says YES!Jisc
 
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET-  	  Identification of Location of Laptop Devices using Raspberry Pi Mo...IRJET-  	  Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...IRJET Journal
 
La prossima Internet degli Oggetti
La prossima Internet degli OggettiLa prossima Internet degli Oggetti
La prossima Internet degli OggettiDavid Orban
 
Evolution or Extinction: Survive and Thrive with New Google Analytics Features
Evolution or Extinction:Survive and Thrive with New Google Analytics FeaturesEvolution or Extinction:Survive and Thrive with New Google Analytics Features
Evolution or Extinction: Survive and Thrive with New Google Analytics Features4Ps Marketing
 
Google Analytics location data visualised with CARTO & BigQuery
Google Analytics location data visualised with CARTO & BigQueryGoogle Analytics location data visualised with CARTO & BigQuery
Google Analytics location data visualised with CARTO & BigQueryCARTO
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss PreventionReza Kopaee
 
The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018Kaliya "Identity Woman" Young
 
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data PrivacyFalcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data PrivacyFalcon.io
 
Data Protection Scotland Summit 2019
Data Protection Scotland Summit 2019Data Protection Scotland Summit 2019
Data Protection Scotland Summit 2019Ray Bugg
 
1 - BBDS - Learning Paths.pdf
1 - BBDS - Learning Paths.pdf1 - BBDS - Learning Paths.pdf
1 - BBDS - Learning Paths.pdfssuserb475db
 
[IoTs & Wearables] Future proof your business for the Wearables & Internet of...
[IoTs & Wearables] Future proof your business for the Wearables & Internet of...[IoTs & Wearables] Future proof your business for the Wearables & Internet of...
[IoTs & Wearables] Future proof your business for the Wearables & Internet of...Globant
 
The Digital Presence Doctor Is In
The Digital Presence Doctor Is InThe Digital Presence Doctor Is In
The Digital Presence Doctor Is InLimelight Networks
 
Big Data: The Magic to Attain New Heights
Big Data:  The Magic to Attain New HeightsBig Data:  The Magic to Attain New Heights
Big Data: The Magic to Attain New HeightsTEST Huddle
 
Scottish Summit 2022 - Secure and manage your data in Microsoft Teams
Scottish Summit 2022 - Secure and manage your data in Microsoft TeamsScottish Summit 2022 - Secure and manage your data in Microsoft Teams
Scottish Summit 2022 - Secure and manage your data in Microsoft TeamsJasper Oosterveld
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital SecurityUjjwal Acharya
 

Similar a Designing location services for privacy (20)

12 Steps to Data Nirvana
12 Steps to Data Nirvana12 Steps to Data Nirvana
12 Steps to Data Nirvana
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTS
 
Communication Compliance in Microsoft 365
Communication Compliance in Microsoft 365Communication Compliance in Microsoft 365
Communication Compliance in Microsoft 365
 
Logfiles? GDPR Says YES!
Logfiles? GDPR Says YES!Logfiles? GDPR Says YES!
Logfiles? GDPR Says YES!
 
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET-  	  Identification of Location of Laptop Devices using Raspberry Pi Mo...IRJET-  	  Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...
 
La prossima Internet degli Oggetti
La prossima Internet degli OggettiLa prossima Internet degli Oggetti
La prossima Internet degli Oggetti
 
Google Analytics Intro for TCPRA
Google Analytics Intro for TCPRAGoogle Analytics Intro for TCPRA
Google Analytics Intro for TCPRA
 
Evolution or Extinction: Survive and Thrive with New Google Analytics Features
Evolution or Extinction:Survive and Thrive with New Google Analytics FeaturesEvolution or Extinction:Survive and Thrive with New Google Analytics Features
Evolution or Extinction: Survive and Thrive with New Google Analytics Features
 
Google Analytics location data visualised with CARTO & BigQuery
Google Analytics location data visualised with CARTO & BigQueryGoogle Analytics location data visualised with CARTO & BigQuery
Google Analytics location data visualised with CARTO & BigQuery
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
GDPR- The Buck Stops Here
GDPR-  The Buck Stops HereGDPR-  The Buck Stops Here
GDPR- The Buck Stops Here
 
The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018
 
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data PrivacyFalcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
 
Data Protection Scotland Summit 2019
Data Protection Scotland Summit 2019Data Protection Scotland Summit 2019
Data Protection Scotland Summit 2019
 
1 - BBDS - Learning Paths.pdf
1 - BBDS - Learning Paths.pdf1 - BBDS - Learning Paths.pdf
1 - BBDS - Learning Paths.pdf
 
[IoTs & Wearables] Future proof your business for the Wearables & Internet of...
[IoTs & Wearables] Future proof your business for the Wearables & Internet of...[IoTs & Wearables] Future proof your business for the Wearables & Internet of...
[IoTs & Wearables] Future proof your business for the Wearables & Internet of...
 
The Digital Presence Doctor Is In
The Digital Presence Doctor Is InThe Digital Presence Doctor Is In
The Digital Presence Doctor Is In
 
Big Data: The Magic to Attain New Heights
Big Data:  The Magic to Attain New HeightsBig Data:  The Magic to Attain New Heights
Big Data: The Magic to Attain New Heights
 
Scottish Summit 2022 - Secure and manage your data in Microsoft Teams
Scottish Summit 2022 - Secure and manage your data in Microsoft TeamsScottish Summit 2022 - Secure and manage your data in Microsoft Teams
Scottish Summit 2022 - Secure and manage your data in Microsoft Teams
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
 

Último

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Último (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Designing location services for privacy

  • 1.
  • 2. Step 1 – risks with location data Step 2 – mistakes made by Google and Apple Step 3 – designing location systems properly Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Social location privacy
  • 3. Step 1: It is a problem for some Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Social location privacy
  • 4. Does he know where you live? Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Social location privacy
  • 5. Some people should not be found Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Social location privacy
  • 6. If you aren't doing anything wrong, what do you have to hide? Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Social location privacy
  • 7. “ If I'm not doing anything wrong, then you have no cause to watch me” Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Social location privacy
  • 8. Watch someone long enough, and you'll find something to arrest -- or just blackmail with Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Social location privacy
  • 9. Quis custodiet custodes ipsos? Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Social location privacy
  • 10. Maybe some people should not know where you are….. Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Social location privacy
  • 11. Maybe your boss shouldn’t either… Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Social location privacy
  • 12. Comfortable with location based advertising? Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Social location privacy
  • 13. Step 1 – risks with location data Step 2 – mistakes made by Google and Apple Step 3 – designing location systems properly Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Social location privacy
  • 14. Step 2: clearly some mistakes were made Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Social location privacy
  • 15. Consent buried in terms and conditions Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Social location privacy
  • 16. Better… Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Social location privacy
  • 17. “ Apple is not tracking the location of your iPhone” Presentation Identifier. Information Classification as Needed “ it’s maintaining a database of Wi-Fi hotspots and cell towers around your current location, some of which may be located more than one hundred miles (or just one) away from your iPhone,” Lack of clear communication on WHAT and PURPOSE Step 1 > Step 2 > Step 3 Social location privacy
  • 18. Unique identifiers are the enemy of anonymity Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Social location privacy
  • 19. Why upload data in real time? Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Social location privacy
  • 20. Apple “bug”: location tracking that won't stop… Step 1 > Step 2 > Step 3 Social location privacy
  • 21. No encryption Android v2.3 historical location data not deleted Step 1 > Step 2 > Step 3 security Social location privacy
  • 22. Too much historical data Step 1 > Step 2 > Step 3 Social location privacy
  • 23. Step 1 – risks with location data Step 2 – mistakes made by Google and Apple Step 3 – designing location systems properly Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Social location privacy
  • 24. Consent and notice in context Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Social location privacy
  • 25. Use only for approved purpose Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Social location privacy
  • 26. Encrypt personal data in storage, transit and backup #bettersafethansony Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Social location privacy
  • 27. Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Provide opt-out and disable Social location privacy
  • 28. Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Simple access to update and delete Social location privacy
  • 29. Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Careful of onward transfer and third party access Social location privacy
  • 30.
  • 31.