SlideShare a Scribd company logo
1 of 33
Download to read offline
Trusted Download Program:
A Year in the Trenches
How Trusted Downloads Make More Money



               May 8, 2008




CONFIDENTIAL
INTRODUCTION

Today’s Speakers:
• Colin O’Malley, VP Strategic Partnerships & Programs, TRUSTe
• Aislinn Hettermann, Sr. Manager, Network Quality, Yahoo!
• Alissa Cooper, Chief Computer Scientist, CDT
• Irina Doliov, Sr. Product Manager, TDP, TRUSTe




CONFIDENTIAL                                         2
ABOUT TRUSTe
Colin O’Malley



CONFIDENTIAL     3
PRIVACY AND TRUST IN A NETWORKED WORLD




                                                                       BUSINESSES
          CONSUMERS                                          Need to Demonstrate Compliance with
Look to Identify Trustworthy Online                             Privacy Best Practices to Gain
            Businesses                                                 Consumer Trust




                                         REGULATORS
                                      Want Enforcement and
                                      Compliance Assurance




                                                                                     4
A GAP IN CONSUMER TRUST
                                                                              Consumers’
                                                                             Need for Trust
                                                                                Rising


   80%
 Concerned          40%
About Privacy Look for Privacy             50% of
               Policies / SealsIdentity
                                 Theft Shoppers Don’t
                                        Purchase Online
                                                     Consumer
                 Phishing                         Concern Affecting
                                                                                              Buying

                 Sources: Forester Research, October 2006, Pew Internet Research, May 2005,
                 TNS/TRUSTe Survey, Spring 2007
     Hacking


  CONFIDENTIAL                                                                                5
History

•   Independent trust authority headquartered in San Francisco
     – Formed in 1997 by EFF, CommerceNet, and a number of leading Internet
       companies - Microsoft, Intel, IBM, AOL, Excite
     – Washington, DC gov’t affairs office
                                                  1997           2007

•   Celebrated 10 Year Anniversary

•   Approach
     –   Widely accepted privacy best practices
     –   Elevate responsible players
     –   Help consumers identify who they can trust
     –   Supplement legislation and regulation
     –   Address emerging privacy vulnerabilities and threats
Trusted Download Program




CONFIDENTIAL               7
Program Objectives


•    Promote meaningful notice and control for consumers
•    Establish industry-wide standards for software publishers
•    Identify trustworthy software for distributors and advertisers
•    Bring transparency and accountability to affiliate and distribution
     relationships




    CONFIDENTIAL                                               8
Market Incentives


                                  Content
                 Advertisers
                               Aggregators and   Anti-Spyware
                     and
                                 Consumer          Software
                 Ad Networks
                                   Portals




Incentives
    =$

     = Install
                                Certified
     = Ratings                 Application




    CONFIDENTIAL                                           9
Client Outputs

•   Whitelist
     – Used by industry to determine where to deliver
       partnerships, distribution, and ad dollars
•   Seal
     – Boost conversions on your landing page




•   Consultative service
     – Detailed guidance from the leading authority on best
       practices



CONFIDENTIAL                                            10
Fighting Spyware:
Enforcement and Anti-Spyware Tools




Alissa Cooper
Chief Computer Scientist
Enforcement
FTC Enforcement
”I figured out a way theinstall a exe without
   "It's immoral, but to money makes it
any userJeanson James is the time to make
   right.” interaction. This Ancheta
$$$ while we can.” Sanford Wallace
State Enforcement
Department of Justice Enforcement
"It's immoral, but the money makes it
right.” Jeanson James Ancheta
Technology
Anti-Spyware Coalition Work
 Definitions
 Risk Model
 Best Practices
Benefits to Software Industry
 Sony Rootkit -- 2005
   AS vendors asked how to justify decision to flag software as
   “potentially unwanted.”
   Non-ASC member referred to ASC definitions.

 Litigation Against AS Vendors -- Ongoing
   One judge has held that offering services to screen unwanted content
   immunizes AS vendor from mislabeling claims.
   Sets precedent that AS vendors cannot be intimidated into changing
   their minds about what gets flagged -- which means they can
   continue to leverage work of ASC, TRUSTe, etc.
TDP PROGRAM REQUIREMENTS
Irina Doliov
Anatomy of a “Trusted” Download

•   Notice
•   Consent
•   Easy, Clean Uninstall
•   Distribution and Promotion Practices
•   Absolute No-No’s




CONFIDENTIAL                               23
Notice
• Primary Notice
   –   Presented to the user during the installation process
   –   Unavoidable
   –   Written in plain language
   –   Explains what the user is downloading – the value proposition
   –   Links to Reference Notice(s)
   –   For advertising or tracking software
         • Types of ads and when displayed (pop-ups?)
         • If ads for adult content will be shown
         • Description of PII collected, uses of PII, sharing policies
• Reference Notice(s)
   – EULA, Privacy Policy, Terms of Use




CONFIDENTIAL                                                     24
Consent
 • The language used to describe Users’ options
   to consent to install must be plain and direct.
 • EULAs and "opt-out" mechanisms are
   insufficient for providing notice and obtaining
   consent.
 • The option to consent should not be the
   default option
    – Should not be able to hit “enter” all the way through
      the install process.
 • The option to decline consent to install
   software should be of equal prominence to
   the option to consent to the installation.



CONFIDENTIAL                                              25
Primary Notice and Consent




CONFIDENTIAL                 26
Uninstall
• Instructions must be easy to find and easy to
  understand
• Methods for uninstalling must be available in places
  where consumers are accustomed to finding them, such
  as Add/Remove Programs feature in the Windows
  Control Panel
• Uninstallation must remove all files associated with the
  particular application being uninstalled
• Cannot be contingent on a consumer's providing
  Personally Identifiable Information, unless that
  information is required for account verification.




CONFIDENTIAL                                             27
Affiliate Promotion and Distribution
       The risk in this model depends on the level of control:

              Distributor initiates the download but   Distributors host the
More Risk




              executable controlled by the             executable and serve
              software publisher (via “stub            notices
              installer”)


              Affiliates drive traffic to a landing    Download initiated on
              page where participant controls all      affiliates’ sites
Less Risk




              aspects of download process




                   Less Risk                                 More Risk


      CONFIDENTIAL                                                     28
Unacceptable Behaviors
Inducing the user to install software onto computer or preventing
efforts to block installation
Taking control of a consumer’s computer
Modifying security settings
Collecting personally identifiable information (PII) through the
use of keystroke logging or intentional misrepresentation
Defrauding, misleading, consumers, affiliates, merchants,
advertisers, or other software publishers




CONFIDENTIAL                                             29
Lessons From a Year in the Trenches

•   Our lawyer is insane. Do not tangle with him.
•   Controlling distributors takes an active effort
     – A contract is not enough as there are incentives ($$) for abuse but low
       possibility of getting caught
     – Requires proactive, ongoing monitoring
         • Are the correct (or any) disclosures being served to consumers
         • Are consumers being presented with opportunity to provide consent
         • Is the download being promoted on approved locations
     – Technological control over the consent process
         • Referral URL’s, consent mechanism
     – Solutions to verify validity of downloads
         • Audit download rate patterns, provide oppty for consumers to complain




CONFIDENTIAL                                                       30
Lessons Learned (con’t)

•   Clean uninstall means:
    – Remove/reverse ALL files, including hidden files, registry
      entries, cookies, settings
    – Where there’s a legitimate reason to leave assets behind (e.g.
      fraud-prevention), disclose it.
•   Bad behaviors include:
    – Fraud against consumers, affiliates, merchants, advertisers,
      software publishers, or any other third parties
    – “Cookie Stuffing”, “Affiliate Fraud”, “Shopping cart hijacking”,
      “forced clicks or redirects”




CONFIDENTIAL                                                     31
The Reward for being “Trusted”

•   TDP Seal at the point of download lifts conversions:
     – In testing, a TRUSTe seal was a “high influence” factor out of 16
       factors on the test page.
•   TRUSTe TDP Seal resulted in a 4.5% lift in conversions over not
    having a TDP Seal.




CONFIDENTIAL                                                          32
Questions?

Colin O’Malley                                  Alissa Cooper
VP Strategic Partnerships & Programs            Chief Computer Scientist
TRUSTe
                                                CDT
415.520.3408
                                                202.637.9800
colin@truste.org
                                                acooper@cdt.org

Aislinn Hettermann                              Irina Doliov
Sr. Manager, Network Quality                    Sr. Product Manager, TDP
Yahoo!                                          TRUSTe
818.524.5768                                    415.520.3438
butlera@yahoo-inc.com                           idoliov@truste.org

  For additional information about the Trusted Download Program, contact:
           Heather Dorso at (415) 520-3405 or hdorso@truste.org




CONFIDENTIAL                                                                33

More Related Content

What's hot

Managing Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Managing Privacy Maximizing Data In Affiliate Marketing Gary KibelManaging Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Managing Privacy Maximizing Data In Affiliate Marketing Gary KibelAffiliate Summit
 
Data – the Lifeblood of the Affiliate Marketing industry
Data – the Lifeblood of the Affiliate Marketing industryData – the Lifeblood of the Affiliate Marketing industry
Data – the Lifeblood of the Affiliate Marketing industryAffiliate Summit
 
Data opportunities mini whitepaper
Data opportunities mini whitepaperData opportunities mini whitepaper
Data opportunities mini whitepaperRobert Bowstead
 
Content, Control and Socially Networked Media
Content, Control and Socially Networked MediaContent, Control and Socially Networked Media
Content, Control and Socially Networked MediaJon Garon
 
Social Media and Mortgage Regulation: What's Next?
Social Media and Mortgage Regulation: What's Next?Social Media and Mortgage Regulation: What's Next?
Social Media and Mortgage Regulation: What's Next?Smarsh
 
E Marketing Ethical and Legal Issues
E Marketing Ethical and Legal IssuesE Marketing Ethical and Legal Issues
E Marketing Ethical and Legal Issueskarthik indrajit
 
Emerging Privacy Themes That Will Impact Your Company
Emerging Privacy Themes That Will Impact Your CompanyEmerging Privacy Themes That Will Impact Your Company
Emerging Privacy Themes That Will Impact Your CompanyIAB Canada
 
Com 558_Internet Privacy Concerns
Com 558_Internet Privacy ConcernsCom 558_Internet Privacy Concerns
Com 558_Internet Privacy Concernsmbuitrago13
 
FTC Releases Recommendations on Mobile Privacy Disclosures
FTC Releases Recommendations on Mobile Privacy DisclosuresFTC Releases Recommendations on Mobile Privacy Disclosures
FTC Releases Recommendations on Mobile Privacy DisclosuresPatton Boggs LLP
 
Maximizing & Exploiting Big Data in Digital Media....Legally
Maximizing & Exploiting Big Data in Digital Media....LegallyMaximizing & Exploiting Big Data in Digital Media....Legally
Maximizing & Exploiting Big Data in Digital Media....LegallyMediaPost
 
Smarsh social media trends, insights, and best practices from 2015 compliance...
Smarsh social media trends, insights, and best practices from 2015 compliance...Smarsh social media trends, insights, and best practices from 2015 compliance...
Smarsh social media trends, insights, and best practices from 2015 compliance...Smarsh
 
Your Best Practice Guide to Social Media and the Law
Your Best Practice Guide to Social Media and the LawYour Best Practice Guide to Social Media and the Law
Your Best Practice Guide to Social Media and the LawNexus Publishing
 
Online Privacy and Your Company
Online Privacy and Your CompanyOnline Privacy and Your Company
Online Privacy and Your CompanyZach Evans
 
Designing for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldDesigning for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldRobert Stribley
 
Data Privacy: A Snapshot of Recent Federal Trade Commission Rulings
Data Privacy: A Snapshot of Recent Federal Trade Commission Rulings Data Privacy: A Snapshot of Recent Federal Trade Commission Rulings
Data Privacy: A Snapshot of Recent Federal Trade Commission Rulings Christina Gagnier
 

What's hot (18)

Managing Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Managing Privacy Maximizing Data In Affiliate Marketing Gary KibelManaging Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Managing Privacy Maximizing Data In Affiliate Marketing Gary Kibel
 
Data – the Lifeblood of the Affiliate Marketing industry
Data – the Lifeblood of the Affiliate Marketing industryData – the Lifeblood of the Affiliate Marketing industry
Data – the Lifeblood of the Affiliate Marketing industry
 
Data opportunities mini whitepaper
Data opportunities mini whitepaperData opportunities mini whitepaper
Data opportunities mini whitepaper
 
Content, Control and Socially Networked Media
Content, Control and Socially Networked MediaContent, Control and Socially Networked Media
Content, Control and Socially Networked Media
 
Ethics in emarketing
Ethics in emarketingEthics in emarketing
Ethics in emarketing
 
Social Media and Mortgage Regulation: What's Next?
Social Media and Mortgage Regulation: What's Next?Social Media and Mortgage Regulation: What's Next?
Social Media and Mortgage Regulation: What's Next?
 
E Marketing Ethical and Legal Issues
E Marketing Ethical and Legal IssuesE Marketing Ethical and Legal Issues
E Marketing Ethical and Legal Issues
 
Emerging Privacy Themes That Will Impact Your Company
Emerging Privacy Themes That Will Impact Your CompanyEmerging Privacy Themes That Will Impact Your Company
Emerging Privacy Themes That Will Impact Your Company
 
E Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical LegalE Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical Legal
 
Com 558_Internet Privacy Concerns
Com 558_Internet Privacy ConcernsCom 558_Internet Privacy Concerns
Com 558_Internet Privacy Concerns
 
FTC Releases Recommendations on Mobile Privacy Disclosures
FTC Releases Recommendations on Mobile Privacy DisclosuresFTC Releases Recommendations on Mobile Privacy Disclosures
FTC Releases Recommendations on Mobile Privacy Disclosures
 
Maximizing & Exploiting Big Data in Digital Media....Legally
Maximizing & Exploiting Big Data in Digital Media....LegallyMaximizing & Exploiting Big Data in Digital Media....Legally
Maximizing & Exploiting Big Data in Digital Media....Legally
 
Smarsh social media trends, insights, and best practices from 2015 compliance...
Smarsh social media trends, insights, and best practices from 2015 compliance...Smarsh social media trends, insights, and best practices from 2015 compliance...
Smarsh social media trends, insights, and best practices from 2015 compliance...
 
Pciaa power point 10-24-11
Pciaa power point 10-24-11Pciaa power point 10-24-11
Pciaa power point 10-24-11
 
Your Best Practice Guide to Social Media and the Law
Your Best Practice Guide to Social Media and the LawYour Best Practice Guide to Social Media and the Law
Your Best Practice Guide to Social Media and the Law
 
Online Privacy and Your Company
Online Privacy and Your CompanyOnline Privacy and Your Company
Online Privacy and Your Company
 
Designing for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldDesigning for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public World
 
Data Privacy: A Snapshot of Recent Federal Trade Commission Rulings
Data Privacy: A Snapshot of Recent Federal Trade Commission Rulings Data Privacy: A Snapshot of Recent Federal Trade Commission Rulings
Data Privacy: A Snapshot of Recent Federal Trade Commission Rulings
 

Similar to Trusted Download Program: A Year in the Trenches - How Trusted Downloads Make More Money

DPS TRUSTE Pitch-a-Kucha
DPS TRUSTE Pitch-a-KuchaDPS TRUSTE Pitch-a-Kucha
DPS TRUSTE Pitch-a-KuchaDigiday
 
How to Integrate Privacy into Your Customer Care
How to Integrate Privacy into Your Customer CareHow to Integrate Privacy into Your Customer Care
How to Integrate Privacy into Your Customer CareTRUSTe
 
How to Integrate Privacy into Your Customer Care
How to Integrate Privacy into Your Customer CareHow to Integrate Privacy into Your Customer Care
How to Integrate Privacy into Your Customer CareTRUSTe
 
Creating Trust for the Internet of Things
Creating Trust for the Internet of ThingsCreating Trust for the Internet of Things
Creating Trust for the Internet of ThingsPECB
 
Putting the Consumer First
Putting the Consumer FirstPutting the Consumer First
Putting the Consumer FirstVivastream
 
Enhancing Authentication to Secure the Open Enterprise
Enhancing Authentication to Secure the Open EnterpriseEnhancing Authentication to Secure the Open Enterprise
Enhancing Authentication to Secure the Open EnterpriseSymantec
 
Putting The Consumer First
Putting The Consumer FirstPutting The Consumer First
Putting The Consumer FirstVivastream
 
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due DiligenceResilient Systems
 
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Design
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by DesignSay Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Design
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Designbradley_g
 
Authentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_webAuthentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_webSafeNet
 
Securing the New Digital Enterprise: Trackable, Controlled, and Authorized
Securing the New Digital Enterprise: Trackable, Controlled, and AuthorizedSecuring the New Digital Enterprise: Trackable, Controlled, and Authorized
Securing the New Digital Enterprise: Trackable, Controlled, and AuthorizedEnterprise Management Associates
 
Mobility innovation and unknowns
Mobility innovation and unknownsMobility innovation and unknowns
Mobility innovation and unknownsLisa Marie Martinez
 
Avior Healthcare Security Compliance Webcast Final1
Avior Healthcare Security Compliance Webcast Final1Avior Healthcare Security Compliance Webcast Final1
Avior Healthcare Security Compliance Webcast Final1jhietala
 
Security Testing In The Secured World
Security Testing In The Secured WorldSecurity Testing In The Secured World
Security Testing In The Secured WorldJennifer Mary
 
Ethics in Action - Aligning Values and Business Practices to Create the Right...
Ethics in Action - Aligning Values and Business Practices to Create the Right...Ethics in Action - Aligning Values and Business Practices to Create the Right...
Ethics in Action - Aligning Values and Business Practices to Create the Right...hcreque
 
CIS14: Global Trends in BYOID
CIS14: Global Trends in BYOIDCIS14: Global Trends in BYOID
CIS14: Global Trends in BYOIDCloudIDSummit
 
Learn the 4 Essential Requirements. Part 2 of 4, Slides 77-152
Learn the 4 Essential Requirements. Part 2 of 4, Slides 77-152Learn the 4 Essential Requirements. Part 2 of 4, Slides 77-152
Learn the 4 Essential Requirements. Part 2 of 4, Slides 77-152Vivastream
 

Similar to Trusted Download Program: A Year in the Trenches - How Trusted Downloads Make More Money (20)

DPS TRUSTE Pitch-a-Kucha
DPS TRUSTE Pitch-a-KuchaDPS TRUSTE Pitch-a-Kucha
DPS TRUSTE Pitch-a-Kucha
 
How to Integrate Privacy into Your Customer Care
How to Integrate Privacy into Your Customer CareHow to Integrate Privacy into Your Customer Care
How to Integrate Privacy into Your Customer Care
 
How to Integrate Privacy into Your Customer Care
How to Integrate Privacy into Your Customer CareHow to Integrate Privacy into Your Customer Care
How to Integrate Privacy into Your Customer Care
 
Securing the Digital Enterprise
Securing the Digital EnterpriseSecuring the Digital Enterprise
Securing the Digital Enterprise
 
Creating Trust for the Internet of Things
Creating Trust for the Internet of ThingsCreating Trust for the Internet of Things
Creating Trust for the Internet of Things
 
Putting the Consumer First
Putting the Consumer FirstPutting the Consumer First
Putting the Consumer First
 
Mobile and Digital Innovation in Loyalty
Mobile and Digital Innovation in LoyaltyMobile and Digital Innovation in Loyalty
Mobile and Digital Innovation in Loyalty
 
Enhancing Authentication to Secure the Open Enterprise
Enhancing Authentication to Secure the Open EnterpriseEnhancing Authentication to Secure the Open Enterprise
Enhancing Authentication to Secure the Open Enterprise
 
Putting The Consumer First
Putting The Consumer FirstPutting The Consumer First
Putting The Consumer First
 
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
 
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Design
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by DesignSay Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Design
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Design
 
Authentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_webAuthentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_web
 
Securing the New Digital Enterprise: Trackable, Controlled, and Authorized
Securing the New Digital Enterprise: Trackable, Controlled, and AuthorizedSecuring the New Digital Enterprise: Trackable, Controlled, and Authorized
Securing the New Digital Enterprise: Trackable, Controlled, and Authorized
 
Mobility innovation and unknowns
Mobility innovation and unknownsMobility innovation and unknowns
Mobility innovation and unknowns
 
Avior Healthcare Security Compliance Webcast Final1
Avior Healthcare Security Compliance Webcast Final1Avior Healthcare Security Compliance Webcast Final1
Avior Healthcare Security Compliance Webcast Final1
 
Security Testing In The Secured World
Security Testing In The Secured WorldSecurity Testing In The Secured World
Security Testing In The Secured World
 
BEST CYBER SECURITY PRACTICES
BEST CYBER SECURITY PRACTICESBEST CYBER SECURITY PRACTICES
BEST CYBER SECURITY PRACTICES
 
Ethics in Action - Aligning Values and Business Practices to Create the Right...
Ethics in Action - Aligning Values and Business Practices to Create the Right...Ethics in Action - Aligning Values and Business Practices to Create the Right...
Ethics in Action - Aligning Values and Business Practices to Create the Right...
 
CIS14: Global Trends in BYOID
CIS14: Global Trends in BYOIDCIS14: Global Trends in BYOID
CIS14: Global Trends in BYOID
 
Learn the 4 Essential Requirements. Part 2 of 4, Slides 77-152
Learn the 4 Essential Requirements. Part 2 of 4, Slides 77-152Learn the 4 Essential Requirements. Part 2 of 4, Slides 77-152
Learn the 4 Essential Requirements. Part 2 of 4, Slides 77-152
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 

Recently uploaded (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

Trusted Download Program: A Year in the Trenches - How Trusted Downloads Make More Money

  • 1. Trusted Download Program: A Year in the Trenches How Trusted Downloads Make More Money May 8, 2008 CONFIDENTIAL
  • 2. INTRODUCTION Today’s Speakers: • Colin O’Malley, VP Strategic Partnerships & Programs, TRUSTe • Aislinn Hettermann, Sr. Manager, Network Quality, Yahoo! • Alissa Cooper, Chief Computer Scientist, CDT • Irina Doliov, Sr. Product Manager, TDP, TRUSTe CONFIDENTIAL 2
  • 4. PRIVACY AND TRUST IN A NETWORKED WORLD BUSINESSES CONSUMERS Need to Demonstrate Compliance with Look to Identify Trustworthy Online Privacy Best Practices to Gain Businesses Consumer Trust REGULATORS Want Enforcement and Compliance Assurance 4
  • 5. A GAP IN CONSUMER TRUST Consumers’ Need for Trust Rising 80% Concerned 40% About Privacy Look for Privacy 50% of Policies / SealsIdentity Theft Shoppers Don’t Purchase Online Consumer Phishing Concern Affecting Buying Sources: Forester Research, October 2006, Pew Internet Research, May 2005, TNS/TRUSTe Survey, Spring 2007 Hacking CONFIDENTIAL 5
  • 6. History • Independent trust authority headquartered in San Francisco – Formed in 1997 by EFF, CommerceNet, and a number of leading Internet companies - Microsoft, Intel, IBM, AOL, Excite – Washington, DC gov’t affairs office 1997 2007 • Celebrated 10 Year Anniversary • Approach – Widely accepted privacy best practices – Elevate responsible players – Help consumers identify who they can trust – Supplement legislation and regulation – Address emerging privacy vulnerabilities and threats
  • 8. Program Objectives • Promote meaningful notice and control for consumers • Establish industry-wide standards for software publishers • Identify trustworthy software for distributors and advertisers • Bring transparency and accountability to affiliate and distribution relationships CONFIDENTIAL 8
  • 9. Market Incentives Content Advertisers Aggregators and Anti-Spyware and Consumer Software Ad Networks Portals Incentives =$ = Install Certified = Ratings Application CONFIDENTIAL 9
  • 10. Client Outputs • Whitelist – Used by industry to determine where to deliver partnerships, distribution, and ad dollars • Seal – Boost conversions on your landing page • Consultative service – Detailed guidance from the leading authority on best practices CONFIDENTIAL 10
  • 11. Fighting Spyware: Enforcement and Anti-Spyware Tools Alissa Cooper Chief Computer Scientist
  • 14. ”I figured out a way theinstall a exe without "It's immoral, but to money makes it any userJeanson James is the time to make right.” interaction. This Ancheta $$$ while we can.” Sanford Wallace
  • 16.
  • 17. Department of Justice Enforcement
  • 18. "It's immoral, but the money makes it right.” Jeanson James Ancheta
  • 20. Anti-Spyware Coalition Work Definitions Risk Model Best Practices
  • 21. Benefits to Software Industry Sony Rootkit -- 2005 AS vendors asked how to justify decision to flag software as “potentially unwanted.” Non-ASC member referred to ASC definitions. Litigation Against AS Vendors -- Ongoing One judge has held that offering services to screen unwanted content immunizes AS vendor from mislabeling claims. Sets precedent that AS vendors cannot be intimidated into changing their minds about what gets flagged -- which means they can continue to leverage work of ASC, TRUSTe, etc.
  • 23. Anatomy of a “Trusted” Download • Notice • Consent • Easy, Clean Uninstall • Distribution and Promotion Practices • Absolute No-No’s CONFIDENTIAL 23
  • 24. Notice • Primary Notice – Presented to the user during the installation process – Unavoidable – Written in plain language – Explains what the user is downloading – the value proposition – Links to Reference Notice(s) – For advertising or tracking software • Types of ads and when displayed (pop-ups?) • If ads for adult content will be shown • Description of PII collected, uses of PII, sharing policies • Reference Notice(s) – EULA, Privacy Policy, Terms of Use CONFIDENTIAL 24
  • 25. Consent • The language used to describe Users’ options to consent to install must be plain and direct. • EULAs and "opt-out" mechanisms are insufficient for providing notice and obtaining consent. • The option to consent should not be the default option – Should not be able to hit “enter” all the way through the install process. • The option to decline consent to install software should be of equal prominence to the option to consent to the installation. CONFIDENTIAL 25
  • 26. Primary Notice and Consent CONFIDENTIAL 26
  • 27. Uninstall • Instructions must be easy to find and easy to understand • Methods for uninstalling must be available in places where consumers are accustomed to finding them, such as Add/Remove Programs feature in the Windows Control Panel • Uninstallation must remove all files associated with the particular application being uninstalled • Cannot be contingent on a consumer's providing Personally Identifiable Information, unless that information is required for account verification. CONFIDENTIAL 27
  • 28. Affiliate Promotion and Distribution The risk in this model depends on the level of control: Distributor initiates the download but Distributors host the More Risk executable controlled by the executable and serve software publisher (via “stub notices installer”) Affiliates drive traffic to a landing Download initiated on page where participant controls all affiliates’ sites Less Risk aspects of download process Less Risk More Risk CONFIDENTIAL 28
  • 29. Unacceptable Behaviors Inducing the user to install software onto computer or preventing efforts to block installation Taking control of a consumer’s computer Modifying security settings Collecting personally identifiable information (PII) through the use of keystroke logging or intentional misrepresentation Defrauding, misleading, consumers, affiliates, merchants, advertisers, or other software publishers CONFIDENTIAL 29
  • 30. Lessons From a Year in the Trenches • Our lawyer is insane. Do not tangle with him. • Controlling distributors takes an active effort – A contract is not enough as there are incentives ($$) for abuse but low possibility of getting caught – Requires proactive, ongoing monitoring • Are the correct (or any) disclosures being served to consumers • Are consumers being presented with opportunity to provide consent • Is the download being promoted on approved locations – Technological control over the consent process • Referral URL’s, consent mechanism – Solutions to verify validity of downloads • Audit download rate patterns, provide oppty for consumers to complain CONFIDENTIAL 30
  • 31. Lessons Learned (con’t) • Clean uninstall means: – Remove/reverse ALL files, including hidden files, registry entries, cookies, settings – Where there’s a legitimate reason to leave assets behind (e.g. fraud-prevention), disclose it. • Bad behaviors include: – Fraud against consumers, affiliates, merchants, advertisers, software publishers, or any other third parties – “Cookie Stuffing”, “Affiliate Fraud”, “Shopping cart hijacking”, “forced clicks or redirects” CONFIDENTIAL 31
  • 32. The Reward for being “Trusted” • TDP Seal at the point of download lifts conversions: – In testing, a TRUSTe seal was a “high influence” factor out of 16 factors on the test page. • TRUSTe TDP Seal resulted in a 4.5% lift in conversions over not having a TDP Seal. CONFIDENTIAL 32
  • 33. Questions? Colin O’Malley Alissa Cooper VP Strategic Partnerships & Programs Chief Computer Scientist TRUSTe CDT 415.520.3408 202.637.9800 colin@truste.org acooper@cdt.org Aislinn Hettermann Irina Doliov Sr. Manager, Network Quality Sr. Product Manager, TDP Yahoo! TRUSTe 818.524.5768 415.520.3438 butlera@yahoo-inc.com idoliov@truste.org For additional information about the Trusted Download Program, contact: Heather Dorso at (415) 520-3405 or hdorso@truste.org CONFIDENTIAL 33