SlideShare una empresa de Scribd logo
1 de 7
Mobile Privacy and Apps
New Legislation:
Location Privacy
and Apps
Class 7
Mobile Privacy and Apps
Location Privacy Protection Act
Introduced in Congress in June 2011 to address
voluntary location tracking of electronic
communications devices.
Covers these issues:
1. Voluntary location tracking of electronic
communications devices
A covered entity may not knowingly collect, receive, record,
obtain, or disclose to a nongovernmental individual or entity the
geolocation information from an electronic communications
device without the express authorization of the individual that is
using the electronic communications device.
Mobile Privacy and Apps
Location Privacy Protection Act
2. Geolocation information used in interstate
domestic violence or stalking
A covered entity that knowingly and willfully discloses
geolocation information about an individual to another
individual
3. Sale of geolocation information of young children
Any person who knowingly and willfully sells the geolocation
information of not less than 1,000 children under 11 years of age
shall be fined under this title, imprisoned for not more 2 years,
or both.
 
Mobile Privacy and Apps
Geolocation Privacy and
Surveillance Act
Introduced in Congress in June 2011.
The GPS Act would require federal, state, and local
authorities to cite probable cause and obtain a
warrant from a judge before conducting GPS-enabled
surveillance, such as the secret placement of
tracking devices on the cars of suspected terrorists
and criminals. It would also require a warrant to
obtain tracking data about individuals from wireless
companies.
In addition, the GPS Act would prohibit businesses
from disclosing geographical tracking data about its
customers to other companies without the
customers' permission.
Mobile Privacy and Apps
Mobile Device Privacy Act
Introduced in Congress in September 2012
Motivated by Carrier IQ controversy
- Carrier IQ software on smartphones and other devices
tracks user keystrokes, location and text messages without
their knowledge or consent.
- Was used on many smartphones and carrier systems
- Most cell phone manufactureres and cell phone
carriers have now discontinued use of Carrier IQ, but not
all.
Mobile Privacy and Apps
Mobile Device Privacy Act
The “Mobile Device Privacy Act” protects
consumers by requiring:
Disclosure of mobile telephone monitoring when a
consumer buys a mobile phone; after sale, if the
carrier, manufacturer, or operating system later
installs monitoring software; and if a consumer
downloads an app and that app contains monitoring
software
The disclosure includes the fact that the monitoring
software has been installed on the phone, the types
of information that are collected, the identity of the
parties to which the information is transmitted, and
how such information will be used
Mobile Privacy and Apps
Mobile Device Privacy Act
The “Mobile Device Privacy Act” protects
consumers by requiring:
Consumer consent before monitoring software
begins collecting and transmitting information
The party receiving the personal information must
have policies in place to secure the information
Agreements on information transmission must be
filed at the Federal Trade Commission (FTC) and
Federal Communications Commission (FCC)
An enforcement regime for the FTC and FCC, along
with State AG enforcement and a private right of
action

Más contenido relacionado

La actualidad más candente

1.03 ethics and_security_review_ppt (1)
1.03 ethics and_security_review_ppt (1)1.03 ethics and_security_review_ppt (1)
1.03 ethics and_security_review_ppt (1)
wright1908
 
Cyber laws and patents
Cyber laws and patentsCyber laws and patents
Cyber laws and patents
ravijain90
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
Akash Varaiya
 

La actualidad más candente (20)

Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
ICT / IT Law (Cyberlaw)
ICT / IT Law (Cyberlaw)ICT / IT Law (Cyberlaw)
ICT / IT Law (Cyberlaw)
 
E-commerce Law in the Philippines
E-commerce Law in the PhilippinesE-commerce Law in the Philippines
E-commerce Law in the Philippines
 
The e commerce law
The e commerce lawThe e commerce law
The e commerce law
 
The E-Commerce Act - Republic Act 8792
The E-Commerce Act - Republic Act 8792The E-Commerce Act - Republic Act 8792
The E-Commerce Act - Republic Act 8792
 
LEGAL STRATEGIES FOR INDIAN BPOs – POST KKARAN BAHREE CASE
LEGAL STRATEGIES FOR INDIAN BPOs –POST KKARAN BAHREE CASELEGAL STRATEGIES FOR INDIAN BPOs –POST KKARAN BAHREE CASE
LEGAL STRATEGIES FOR INDIAN BPOs – POST KKARAN BAHREE CASE
 
1.03 ethics and_security_review_ppt (1)
1.03 ethics and_security_review_ppt (1)1.03 ethics and_security_review_ppt (1)
1.03 ethics and_security_review_ppt (1)
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
it act 2000
it act 2000it act 2000
it act 2000
 
Information act 2000
Information act 2000Information act 2000
Information act 2000
 
Cyber laws and patents
Cyber laws and patentsCyber laws and patents
Cyber laws and patents
 
I.T ACT 2000
I.T ACT 2000 I.T ACT 2000
I.T ACT 2000
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
Btk fatih akpinar
Btk fatih akpinarBtk fatih akpinar
Btk fatih akpinar
 
The Electronic Commerce Act and its Implementing Rules and Regulations
The Electronic Commerce Act and its Implementing Rules and RegulationsThe Electronic Commerce Act and its Implementing Rules and Regulations
The Electronic Commerce Act and its Implementing Rules and Regulations
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Cyberlaws report
Cyberlaws reportCyberlaws report
Cyberlaws report
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 

Destacado

Estluciano8 vista fixa pb sup
Estluciano8 vista fixa pb supEstluciano8 vista fixa pb sup
Estluciano8 vista fixa pb sup
joserenato2012
 
Rose_Jarrett - Thesis, Final
Rose_Jarrett - Thesis, FinalRose_Jarrett - Thesis, Final
Rose_Jarrett - Thesis, Final
Jarrett Rose
 
FirstEnergy Annual_Report_2006_Low_Res
FirstEnergy Annual_Report_2006_Low_ResFirstEnergy Annual_Report_2006_Low_Res
FirstEnergy Annual_Report_2006_Low_Res
finance21
 
James Stewart Thesis Draft
James Stewart Thesis DraftJames Stewart Thesis Draft
James Stewart Thesis Draft
James Stewart
 

Destacado (20)

Cse trans tel corporate presentation (2013)
Cse trans tel corporate presentation (2013)Cse trans tel corporate presentation (2013)
Cse trans tel corporate presentation (2013)
 
Salesian founts2 2
Salesian founts2 2Salesian founts2 2
Salesian founts2 2
 
Common Indications for Referral for Fetal Echo
Common Indications for Referral for Fetal EchoCommon Indications for Referral for Fetal Echo
Common Indications for Referral for Fetal Echo
 
Proceedings from the 7th Organic Seed Growers Conference
Proceedings from the 7th Organic Seed Growers ConferenceProceedings from the 7th Organic Seed Growers Conference
Proceedings from the 7th Organic Seed Growers Conference
 
Estluciano8 vista fixa pb sup
Estluciano8 vista fixa pb supEstluciano8 vista fixa pb sup
Estluciano8 vista fixa pb sup
 
Rose_Jarrett - Thesis, Final
Rose_Jarrett - Thesis, FinalRose_Jarrett - Thesis, Final
Rose_Jarrett - Thesis, Final
 
Mobile Regulations, Laws and Procedures_Michael Hanley
Mobile Regulations, Laws and Procedures_Michael HanleyMobile Regulations, Laws and Procedures_Michael Hanley
Mobile Regulations, Laws and Procedures_Michael Hanley
 
Alabama's Opportunities and Challenges
Alabama's Opportunities and ChallengesAlabama's Opportunities and Challenges
Alabama's Opportunities and Challenges
 
Sterling construction company
Sterling construction companySterling construction company
Sterling construction company
 
Cap. ii
Cap. iiCap. ii
Cap. ii
 
Q1 2009 Earning Report of Harley Davidson
Q1 2009 Earning Report of Harley DavidsonQ1 2009 Earning Report of Harley Davidson
Q1 2009 Earning Report of Harley Davidson
 
2011 (7) 15 30 apr
2011 (7) 15 30 apr2011 (7) 15 30 apr
2011 (7) 15 30 apr
 
FirstEnergy Annual_Report_2006_Low_Res
FirstEnergy Annual_Report_2006_Low_ResFirstEnergy Annual_Report_2006_Low_Res
FirstEnergy Annual_Report_2006_Low_Res
 
Quality enhancement plan newsletters
Quality enhancement plan newslettersQuality enhancement plan newsletters
Quality enhancement plan newsletters
 
CONtv Affiliate Program Guide
CONtv Affiliate Program GuideCONtv Affiliate Program Guide
CONtv Affiliate Program Guide
 
James Stewart Thesis Draft
James Stewart Thesis DraftJames Stewart Thesis Draft
James Stewart Thesis Draft
 
Q3 2009 Earning Report of Harley-Davidson, Inc.
Q3 2009 Earning Report of Harley-Davidson, Inc.Q3 2009 Earning Report of Harley-Davidson, Inc.
Q3 2009 Earning Report of Harley-Davidson, Inc.
 
Dennis Cuneo's Alabama Speech (Edited) June 2015
Dennis Cuneo's Alabama Speech (Edited) June 2015 Dennis Cuneo's Alabama Speech (Edited) June 2015
Dennis Cuneo's Alabama Speech (Edited) June 2015
 
Overview Intel AppUp developer program
Overview Intel AppUp developer programOverview Intel AppUp developer program
Overview Intel AppUp developer program
 
IBM Smarter Cities
IBM Smarter CitiesIBM Smarter Cities
IBM Smarter Cities
 

Similar a Mobile: Location Privacy and Apps_Michael Hanley

National code for mobile operators on safe use of mobile phones in slovakia f...
National code for mobile operators on safe use of mobile phones in slovakia f...National code for mobile operators on safe use of mobile phones in slovakia f...
National code for mobile operators on safe use of mobile phones in slovakia f...
A.N.
 
Legal and ethical issues modern technologies
Legal and ethical issues                            modern technologiesLegal and ethical issues                            modern technologies
Legal and ethical issues modern technologies
rgermosen
 
Workplace Surveilance
Workplace SurveilanceWorkplace Surveilance
Workplace Surveilance
Sampath
 
Massachusetts Eye and Ear Infirmary HIPAA Violation
Massachusetts Eye and Ear Infirmary HIPAA  ViolationMassachusetts Eye and Ear Infirmary HIPAA  Violation
Massachusetts Eye and Ear Infirmary HIPAA Violation
data brackets
 

Similar a Mobile: Location Privacy and Apps_Michael Hanley (20)

International trends in mobile law
International trends in mobile lawInternational trends in mobile law
International trends in mobile law
 
International Trends in Mobile Law
International Trends in Mobile LawInternational Trends in Mobile Law
International Trends in Mobile Law
 
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
 
Privacy Implications of Mobile Advertising Location Data
Privacy Implications of Mobile Advertising Location DataPrivacy Implications of Mobile Advertising Location Data
Privacy Implications of Mobile Advertising Location Data
 
National code for mobile operators on safe use of mobile phones in slovakia f...
National code for mobile operators on safe use of mobile phones in slovakia f...National code for mobile operators on safe use of mobile phones in slovakia f...
National code for mobile operators on safe use of mobile phones in slovakia f...
 
Legal and ethical issues modern technologies
Legal and ethical issues                            modern technologiesLegal and ethical issues                            modern technologies
Legal and ethical issues modern technologies
 
Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...
 
Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...
 
Legal Obligations of Technology Service Providers as Intermediaries
Legal Obligations of Technology Service Providers as IntermediariesLegal Obligations of Technology Service Providers as Intermediaries
Legal Obligations of Technology Service Providers as Intermediaries
 
Workplace Surveilance
Workplace SurveilanceWorkplace Surveilance
Workplace Surveilance
 
Legal do's and don'ts in setting up mobile marketplaces (stibbe)
Legal do's and don'ts in setting up mobile marketplaces (stibbe)Legal do's and don'ts in setting up mobile marketplaces (stibbe)
Legal do's and don'ts in setting up mobile marketplaces (stibbe)
 
Session B: Handout 1
Session B: Handout 1Session B: Handout 1
Session B: Handout 1
 
Challenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in MexicoChallenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in Mexico
 
Principles of mobile privacy
Principles of mobile privacyPrinciples of mobile privacy
Principles of mobile privacy
 
Privacy and Data Security: Minimizing Reputational and Legal Risks
Privacy and Data Security: Minimizing Reputational and Legal RisksPrivacy and Data Security: Minimizing Reputational and Legal Risks
Privacy and Data Security: Minimizing Reputational and Legal Risks
 
Cybercrime law
Cybercrime lawCybercrime law
Cybercrime law
 
Mobileprivacyazahir
MobileprivacyazahirMobileprivacyazahir
Mobileprivacyazahir
 
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfBipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
 
Protection of users mobile apps
Protection of users mobile appsProtection of users mobile apps
Protection of users mobile apps
 
Massachusetts Eye and Ear Infirmary HIPAA Violation
Massachusetts Eye and Ear Infirmary HIPAA  ViolationMassachusetts Eye and Ear Infirmary HIPAA  Violation
Massachusetts Eye and Ear Infirmary HIPAA Violation
 

Más de Sara Quinn

Más de Sara Quinn (20)

Mobile Research for Advertising_Michael Hanley
Mobile Research for Advertising_Michael HanleyMobile Research for Advertising_Michael Hanley
Mobile Research for Advertising_Michael Hanley
 
Mobile Analytics for Advertising_Michael Hanley
Mobile Analytics for Advertising_Michael HanleyMobile Analytics for Advertising_Michael Hanley
Mobile Analytics for Advertising_Michael Hanley
 
Mobile Advertising Strategy_Michael Hanley
Mobile Advertising Strategy_Michael HanleyMobile Advertising Strategy_Michael Hanley
Mobile Advertising Strategy_Michael Hanley
 
Mobile Advertising Creative_Michael Hanley
Mobile Advertising Creative_Michael HanleyMobile Advertising Creative_Michael Hanley
Mobile Advertising Creative_Michael Hanley
 
Mobile Social Media and Advertising_Michael Hanley
Mobile Social Media and Advertising_Michael HanleyMobile Social Media and Advertising_Michael Hanley
Mobile Social Media and Advertising_Michael Hanley
 
Mobile Demographics and Consumer Trends_Michael Hanley
Mobile Demographics and Consumer Trends_Michael HanleyMobile Demographics and Consumer Trends_Michael Hanley
Mobile Demographics and Consumer Trends_Michael Hanley
 
mCommerce and Mobile Banking_Michael Hanley
mCommerce and Mobile Banking_Michael HanleymCommerce and Mobile Banking_Michael Hanley
mCommerce and Mobile Banking_Michael Hanley
 
Location Based and Proximity Marketing_Michael Hanley
Location Based and Proximity Marketing_Michael HanleyLocation Based and Proximity Marketing_Michael Hanley
Location Based and Proximity Marketing_Michael Hanley
 
Mobile Apps_Michael Hanley
Mobile Apps_Michael HanleyMobile Apps_Michael Hanley
Mobile Apps_Michael Hanley
 
Mobile Web and WAP_Michael Hanley
Mobile Web and WAP_Michael HanleyMobile Web and WAP_Michael Hanley
Mobile Web and WAP_Michael Hanley
 
Mobile Message Delivery: SMS and MMS_Michael Hanley
Mobile Message Delivery: SMS and MMS_Michael HanleyMobile Message Delivery: SMS and MMS_Michael Hanley
Mobile Message Delivery: SMS and MMS_Michael Hanley
 
Intro to Mobile Marketing_Michael Hanley
Intro to Mobile Marketing_Michael HanleyIntro to Mobile Marketing_Michael Hanley
Intro to Mobile Marketing_Michael Hanley
 
Mobile Marketing, Code of Ethics, Privacy and Children_Michael Hanley
Mobile Marketing, Code of Ethics, Privacy and Children_Michael HanleyMobile Marketing, Code of Ethics, Privacy and Children_Michael Hanley
Mobile Marketing, Code of Ethics, Privacy and Children_Michael Hanley
 
Mobile Devices_Michael Hanley
Mobile Devices_Michael HanleyMobile Devices_Michael Hanley
Mobile Devices_Michael Hanley
 
Mobile Marketing: Pros and Cons_Michael Hanley
Mobile Marketing: Pros and Cons_Michael HanleyMobile Marketing: Pros and Cons_Michael Hanley
Mobile Marketing: Pros and Cons_Michael Hanley
 
The Mobile Ecosystem_Michael Hanley
The Mobile Ecosystem_Michael HanleyThe Mobile Ecosystem_Michael Hanley
The Mobile Ecosystem_Michael Hanley
 
How Do People Know What to Tap?: Mobile Design
How Do People Know What to Tap?: Mobile DesignHow Do People Know What to Tap?: Mobile Design
How Do People Know What to Tap?: Mobile Design
 
Typography and Grid for Mobile Design
Typography and Grid for Mobile DesignTypography and Grid for Mobile Design
Typography and Grid for Mobile Design
 
Designing for a Small Screen: Mobile
Designing for a Small Screen: MobileDesigning for a Small Screen: Mobile
Designing for a Small Screen: Mobile
 
What's So Special About Mobile?
What's So Special About Mobile?What's So Special About Mobile?
What's So Special About Mobile?
 

Último

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 

Último (20)

Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 

Mobile: Location Privacy and Apps_Michael Hanley

  • 1. Mobile Privacy and Apps New Legislation: Location Privacy and Apps Class 7
  • 2. Mobile Privacy and Apps Location Privacy Protection Act Introduced in Congress in June 2011 to address voluntary location tracking of electronic communications devices. Covers these issues: 1. Voluntary location tracking of electronic communications devices A covered entity may not knowingly collect, receive, record, obtain, or disclose to a nongovernmental individual or entity the geolocation information from an electronic communications device without the express authorization of the individual that is using the electronic communications device.
  • 3. Mobile Privacy and Apps Location Privacy Protection Act 2. Geolocation information used in interstate domestic violence or stalking A covered entity that knowingly and willfully discloses geolocation information about an individual to another individual 3. Sale of geolocation information of young children Any person who knowingly and willfully sells the geolocation information of not less than 1,000 children under 11 years of age shall be fined under this title, imprisoned for not more 2 years, or both.  
  • 4. Mobile Privacy and Apps Geolocation Privacy and Surveillance Act Introduced in Congress in June 2011. The GPS Act would require federal, state, and local authorities to cite probable cause and obtain a warrant from a judge before conducting GPS-enabled surveillance, such as the secret placement of tracking devices on the cars of suspected terrorists and criminals. It would also require a warrant to obtain tracking data about individuals from wireless companies. In addition, the GPS Act would prohibit businesses from disclosing geographical tracking data about its customers to other companies without the customers' permission.
  • 5. Mobile Privacy and Apps Mobile Device Privacy Act Introduced in Congress in September 2012 Motivated by Carrier IQ controversy - Carrier IQ software on smartphones and other devices tracks user keystrokes, location and text messages without their knowledge or consent. - Was used on many smartphones and carrier systems - Most cell phone manufactureres and cell phone carriers have now discontinued use of Carrier IQ, but not all.
  • 6. Mobile Privacy and Apps Mobile Device Privacy Act The “Mobile Device Privacy Act” protects consumers by requiring: Disclosure of mobile telephone monitoring when a consumer buys a mobile phone; after sale, if the carrier, manufacturer, or operating system later installs monitoring software; and if a consumer downloads an app and that app contains monitoring software The disclosure includes the fact that the monitoring software has been installed on the phone, the types of information that are collected, the identity of the parties to which the information is transmitted, and how such information will be used
  • 7. Mobile Privacy and Apps Mobile Device Privacy Act The “Mobile Device Privacy Act” protects consumers by requiring: Consumer consent before monitoring software begins collecting and transmitting information The party receiving the personal information must have policies in place to secure the information Agreements on information transmission must be filed at the Federal Trade Commission (FTC) and Federal Communications Commission (FCC) An enforcement regime for the FTC and FCC, along with State AG enforcement and a private right of action

Notas del editor

  1. The Mobile Ecosystem: Players and Playing Field --The Initiative Owner or their Marketing Agency/Ad Agency create the mobile initiative idea and specifications --The Application Service Provider (ASP) provides the mobile software and hardware back end technology, mobile management services, and mobile expertise in helping create, develop and manage mobile initiatives --The Network Aggregator’s main function is to provide a single point connection to the multiple wireless carriers --The Wireless Carriers: The “pipe” that carries the mobile messages/content (Cingular, Verizon, T-Mobile, Sprint/Nextel et al.) Yellow arrows represent the actual text or content messages sent and received through the system. Via their cell phones, consumers communicate through the carriers/aggregator to the application provider who processes their communication. The ASP responds back through the aggregator/carriers back to the consumer. The Carrier “Walled Garden” Since the carriers own the wireless “pipe”, in some instances they will control or prohibit the distribution of messages or content to their subscribers that does not originate from them. Some carriers only allow mobile content (ringtones, wallpapers, video, music etc.) to be downloaded through them, and do not allow any third party to directly offer content to their subscribers–hence the “walled garden”.
  2. The Mobile Ecosystem: Players and Playing Field --The Initiative Owner or their Marketing Agency/Ad Agency create the mobile initiative idea and specifications --The Application Service Provider (ASP) provides the mobile software and hardware back end technology, mobile management services, and mobile expertise in helping create, develop and manage mobile initiatives --The Network Aggregator’s main function is to provide a single point connection to the multiple wireless carriers --The Wireless Carriers: The “pipe” that carries the mobile messages/content (Cingular, Verizon, T-Mobile, Sprint/Nextel et al.) Yellow arrows represent the actual text or content messages sent and received through the system. Via their cell phones, consumers communicate through the carriers/aggregator to the application provider who processes their communication. The ASP responds back through the aggregator/carriers back to the consumer. The Carrier “Walled Garden” Since the carriers own the wireless “pipe”, in some instances they will control or prohibit the distribution of messages or content to their subscribers that does not originate from them. Some carriers only allow mobile content (ringtones, wallpapers, video, music etc.) to be downloaded through them, and do not allow any third party to directly offer content to their subscribers–hence the “walled garden”.
  3. The Mobile Ecosystem: Players and Playing Field --The Initiative Owner or their Marketing Agency/Ad Agency create the mobile initiative idea and specifications --The Application Service Provider (ASP) provides the mobile software and hardware back end technology, mobile management services, and mobile expertise in helping create, develop and manage mobile initiatives --The Network Aggregator’s main function is to provide a single point connection to the multiple wireless carriers --The Wireless Carriers: The “pipe” that carries the mobile messages/content (Cingular, Verizon, T-Mobile, Sprint/Nextel et al.) Yellow arrows represent the actual text or content messages sent and received through the system. Via their cell phones, consumers communicate through the carriers/aggregator to the application provider who processes their communication. The ASP responds back through the aggregator/carriers back to the consumer. The Carrier “Walled Garden” Since the carriers own the wireless “pipe”, in some instances they will control or prohibit the distribution of messages or content to their subscribers that does not originate from them. Some carriers only allow mobile content (ringtones, wallpapers, video, music etc.) to be downloaded through them, and do not allow any third party to directly offer content to their subscribers–hence the “walled garden”.
  4. The Mobile Ecosystem: Players and Playing Field --The Initiative Owner or their Marketing Agency/Ad Agency create the mobile initiative idea and specifications --The Application Service Provider (ASP) provides the mobile software and hardware back end technology, mobile management services, and mobile expertise in helping create, develop and manage mobile initiatives --The Network Aggregator’s main function is to provide a single point connection to the multiple wireless carriers --The Wireless Carriers: The “pipe” that carries the mobile messages/content (Cingular, Verizon, T-Mobile, Sprint/Nextel et al.) Yellow arrows represent the actual text or content messages sent and received through the system. Via their cell phones, consumers communicate through the carriers/aggregator to the application provider who processes their communication. The ASP responds back through the aggregator/carriers back to the consumer. The Carrier “Walled Garden” Since the carriers own the wireless “pipe”, in some instances they will control or prohibit the distribution of messages or content to their subscribers that does not originate from them. Some carriers only allow mobile content (ringtones, wallpapers, video, music etc.) to be downloaded through them, and do not allow any third party to directly offer content to their subscribers–hence the “walled garden”.
  5. The Mobile Ecosystem: Players and Playing Field --The Initiative Owner or their Marketing Agency/Ad Agency create the mobile initiative idea and specifications --The Application Service Provider (ASP) provides the mobile software and hardware back end technology, mobile management services, and mobile expertise in helping create, develop and manage mobile initiatives --The Network Aggregator’s main function is to provide a single point connection to the multiple wireless carriers --The Wireless Carriers: The “pipe” that carries the mobile messages/content (Cingular, Verizon, T-Mobile, Sprint/Nextel et al.) Yellow arrows represent the actual text or content messages sent and received through the system. Via their cell phones, consumers communicate through the carriers/aggregator to the application provider who processes their communication. The ASP responds back through the aggregator/carriers back to the consumer. The Carrier “Walled Garden” Since the carriers own the wireless “pipe”, in some instances they will control or prohibit the distribution of messages or content to their subscribers that does not originate from them. Some carriers only allow mobile content (ringtones, wallpapers, video, music etc.) to be downloaded through them, and do not allow any third party to directly offer content to their subscribers–hence the “walled garden”.
  6. The Mobile Ecosystem: Players and Playing Field --The Initiative Owner or their Marketing Agency/Ad Agency create the mobile initiative idea and specifications --The Application Service Provider (ASP) provides the mobile software and hardware back end technology, mobile management services, and mobile expertise in helping create, develop and manage mobile initiatives --The Network Aggregator’s main function is to provide a single point connection to the multiple wireless carriers --The Wireless Carriers: The “pipe” that carries the mobile messages/content (Cingular, Verizon, T-Mobile, Sprint/Nextel et al.) Yellow arrows represent the actual text or content messages sent and received through the system. Via their cell phones, consumers communicate through the carriers/aggregator to the application provider who processes their communication. The ASP responds back through the aggregator/carriers back to the consumer. The Carrier “Walled Garden” Since the carriers own the wireless “pipe”, in some instances they will control or prohibit the distribution of messages or content to their subscribers that does not originate from them. Some carriers only allow mobile content (ringtones, wallpapers, video, music etc.) to be downloaded through them, and do not allow any third party to directly offer content to their subscribers–hence the “walled garden”.