The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Designing location services for privacy
1.
2. Step 1 – risks with location data Step 2 – mistakes made by Google and Apple Step 3 – designing location systems properly Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Social location privacy
3. Step 1: It is a problem for some Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Social location privacy
4. Does he know where you live? Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Social location privacy
5. Some people should not be found Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Social location privacy
6. If you aren't doing anything wrong, what do you have to hide? Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Social location privacy
7. “ If I'm not doing anything wrong, then you have no cause to watch me” Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Social location privacy
8. Watch someone long enough, and you'll find something to arrest -- or just blackmail with Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Social location privacy
9. Quis custodiet custodes ipsos? Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Social location privacy
10. Maybe some people should not know where you are….. Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Social location privacy
11. Maybe your boss shouldn’t either… Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Social location privacy
12. Comfortable with location based advertising? Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Social location privacy
13. Step 1 – risks with location data Step 2 – mistakes made by Google and Apple Step 3 – designing location systems properly Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Social location privacy
14. Step 2: clearly some mistakes were made Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Social location privacy
15. Consent buried in terms and conditions Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Social location privacy
17. “ Apple is not tracking the location of your iPhone” Presentation Identifier. Information Classification as Needed “ it’s maintaining a database of Wi-Fi hotspots and cell towers around your current location, some of which may be located more than one hundred miles (or just one) away from your iPhone,” Lack of clear communication on WHAT and PURPOSE Step 1 > Step 2 > Step 3 Social location privacy
18. Unique identifiers are the enemy of anonymity Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Social location privacy
19. Why upload data in real time? Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Social location privacy
20. Apple “bug”: location tracking that won't stop… Step 1 > Step 2 > Step 3 Social location privacy
21. No encryption Android v2.3 historical location data not deleted Step 1 > Step 2 > Step 3 security Social location privacy
23. Step 1 – risks with location data Step 2 – mistakes made by Google and Apple Step 3 – designing location systems properly Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Social location privacy
24. Consent and notice in context Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Social location privacy
25. Use only for approved purpose Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Social location privacy
26. Encrypt personal data in storage, transit and backup #bettersafethansony Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Social location privacy
28. Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Simple access to update and delete Social location privacy
29. Presentation Identifier. Information Classification as Needed Step 1 > Step 2 > Step 3 Careful of onward transfer and third party access Social location privacy