SlideShare una empresa de Scribd logo
1 de 39
Designing for Privacy in an
Increasingly Public World
Design Museum Week| 27 April 2022 | Robert Stribley
What do we mean by
designing for privacy?
• In 2021, we learned that
Facebook, the most popular
social media platform on the
planet had been hacked
• 533 million user’s phone
numbers and personal data
were leaked online
• Fraud & identity theft on the
rise during the pandemic
• FTC: 1.4 million reports of
identity theft in 2020 — double
from 2019
Data Security & Identity Theft
Clearview.ai, a facial
recognition platform offers
services to law
enforcement.
They downloaded over 3
billion photos of people
from the Internet and
social media and used
them to build facial
recognition models for
millions of people without
their permission.
Facial Recognition Illustration: Elena Lacy for
Wired
Photo by Kyle Glenn
The New York Times
reported on how the
donation site for Donald
Trump deployed “dark
patterns” to trick
supporters into agreeing
to recurring donations,
earning the campaign a
huge spike in
contributions
Dark Patterns
Data Sharing
A 2019 survey by RSA found only 17%
of respondents said it was ethical to
track their online activity to personalize
ads.
Apple rolled out a new iPhone privacy
feature called “App Tracking
Transparency,” which prevents apps
from following you across the internet.
Hugely popular in US: Only about 20%
of iOS users allowing apps to track them
so far.
What’s Our Role
as Designers?
“Arguing that you don't
care about the right to
privacy because you
have nothing to hide is
no different than saying
you don't care about
free speech because
you have nothing to
say.”
— Edward Snowden, former CIA
employee, NSA leaker
Why Care About Privacy?
• Even if we’re not concerned with a particular privacy
issue, we’re not designing for ourselves
• If we’re designing for privacy, we’ll consider the
needs of people not like ourselves — people with
different backgrounds and experiences
• That means researching privacy issues, but also
interviewing or talking to people with diverse
backgrounds and lived experiences
Why Care About Privacy?
For example, LGBTQ youth should
feel their privacy is secure when
reaching out for help online.
In this sense, privacy issues are
very often also diversity issues.
Privacy is a key consideration for
inclusive design.
Why Care About Privacy?
Screenshot from The Audre Lorde Project’s Facebook page
We may need to explain to our clients the impacts of ignoring privacy concerns.
• Civic responsibility: Encourage clients to treat their “end users” as human beings,
who are members of their community
• Reputation management: Remind clients that what companies do can undermine
their brands
• Site abandonment: Using dark patterns may anger people, prompting them to
leave your site for another with a more transparent experience
• Financial consideration: Fine for not following the increasing number of laws and
regulations (GDPR & California Consumer Privacy Act)
Even if there’s an up-front cost to designing for privacy, the long-term costs can be
devastating.
Our Role
Best Practices
In her Privacy by Design
manifesto, Dr. Ann Cavoukian
recommends making privacy the
“default setting” in our designs
and says privacy should be
“embedded” into design.
What are some practical ways to
ensure we’re doing that?
Best Practices
“Privacy by Design: The 7 Foundational Principles”
by Dr. Ann Cavoukian
Founder of Global Privacy & Security by Design and the former Information and Privacy
Commissioner for the Canadian province of Ontario
Avoid dark patterns
Dark Patterns
1
Dark Patterns
UX designer Harry Brignull
coined the term dark pattern: a
“user interface that has been
carefully crafted to trick users
into doing things” that you didn’t
mean to do — like buying or
signing up for something.
Dark Patterns
“Dark patterns are the
canaries in the coal mine
of unethical design.
A company who’s willing
to keep a customer
hostage is willing to do
worse.”
— Mike Monteiro, Ruined by
Design
Here on a major airline site, the customer
has already chosen Basic Economy but
"Move to Main Cabin”— which costs $100
more — is placed as a large red button
where you’d typically find a "Next" button.
Here the pattern is used to trick people
into an upsell.
But the same pattern is used to trick
people into sharing their personal
information in ways they didn’t intend to.
Dark Patterns
Strava, a popular app for runners, automatically
tagged other runners when you passed them if they
didn’t change their settings.
This feature had a name: Flyby.
If you clicked on a face, it showed the user’s full
name, picture and a map of their running route —
effectively revealing where they lived.
This happened without you following users and
without them knowing they were sharing their
activity.
After receiving criticism, Strava did change the
default setting to private. But it should have always
been private.
Dark Patterns
Be transparent about
what personal data is
used
What Data Is Used?
2
Be specific about what data is shared—
especially when sharing PII.
Personally identifiable information —
data points such as name, email, phone
number, social security number, mother’s
maiden name, can be used to steal
people’s identities and to commit fraud
87% of the U.S. can be uniquely
identified by just their date of birth,
gender, ZIP code (Those items aren’t
even considered PII.)
Imagine how much damage a bad actor
can do with just 3 data points of PII.
What Data Is Used?
Be transparent about
why specific personal
data is collected or
shared
Why Is Data Used?
3
Consider this an opportunity to explain the benefits of
sharing their data:
• Does it ensure a better experience in the future?
• Does it personalize ads and offers for them?
And if you can’t explain the benefits, consider whether
you’re designing the right sort of product.
Why Is Data Used?
Why Is Data Used?
The home insurance app Lemonade
sets a great standard for transparent
privacy policies.
They include an itemized, detailed
explanation of what personal
information you’re sharing, as well as
why.
They also promise never to sell your
information to third parties.
“TL;DR: We will never, ever, sell your data to
anyone.”
Always use clear,
approachable language
Clear Language
4
Clear Language
In 2019 The New York Times studied 150
privacy policies from various platforms.
They described what they found as an
“incomprehensible disaster.”
They described AirBnB’s privacy policy as
“particularly inscrutable.”
Vague language and jargon allow for
broad interpretation, making it easy
companies to defend their practices in a
lawsuit but hard for us to understand
what’s really going on.
Twitter advises you to read
their privacy policy in full
but highlights key aspects
of it up front advising you
to pay attention to those
specific points.
Clear Language
Give users options to
control their own data
User Controls
5
User Controls
Google offers a Privacy Checkup with high
level descriptions of how your personal data
is being used and why.
They allow you to turn off activity tracking,
location history, your YouTube history, your
Google photo settings, check which third
parties have access to your information, and
access other key settings all in one sort of
privacy dashboard.
Ensure these privacy
features are placed
contextually and easy to
find
Easy to Find
6
Easy to Find
Contextual and easy to find also means
…
Onboarding — Explaining in detail how
you use people’s data when they’re
using your app for the very first time.
“Just in time” alerts – Alerting users in
the moment—when they’re about to
share data in a new way—even if
they’ve already been using your
experience.
Easy to Find
Mozilla displays robust
Privacy information by
default in a dedicated tab
when you download and
open their Firefox
browser for the first time.
Remind users regularly about their
privacy options
And actively encourage them to take
advantage of them
Reminders
7
Reminders
Facebook allows you to set
reminders to do a privacy
checkup every week, month, 6
months or year.
Google also has a feature,
which will send you a reminder
to check your privacy settings.
One final point:
Never change users’ privacy settings
without telling them in advance.
And ensure they have the option to opt
out.
Never Change Without Notice
8
A few years ago, Facebook made users’ “likes” visible
overnight, which consequently may have outed some people
in the LGTBQ community or revealed people’s personal,
political or religious beliefs.
When I asked an employee how they justified this change,
they responded that the company valued transparency and
wanted people to be transparent about their interests.
Facebook’s founder Mark Zuckerberg had even famously said
privacy was no longer a “social norm.”
Never Change Without Notice
We don’t have the right to make decisions about other
people’s personal data on their behalf.
Assuming everyone’s information can safely be made
public is a belief that comes from a position of privilege.
We should never make decisions like this, which can
profoundly affect people’s privacy without their explicit
consent.
Never Change Without Notice
We talk a lot about “empathy” in
design.
If we design with empathy, we
won’t design experiences we
wouldn’t want to use ourselves.
And we won’t design using “dark
patterns” either.
Conclusion
Photo by Josh Calabrese
Privacy is not about secrecy.
It’s all about control.
— Dr. Ann Cavoukian
If we want to ensure people have control over their
own personal information
If we want to ensure the experiences we design are
user friendly and truly “user-centered”
We’ll keep these best practices for privacy in mind
Conclusion
Photo by Zanardi, Unsplash
Designing for Privacy in an Increasingly Public World — Speed Talk

Más contenido relacionado

La actualidad más candente

China as the World's Technology Leader by Naubahar Sharif
China as the World's Technology Leader by Naubahar Sharif China as the World's Technology Leader by Naubahar Sharif
China as the World's Technology Leader by Naubahar Sharif HKUST IEMS
 
Data Ethics in the Workplace: Beyond AI, Privacy and Security
Data Ethics in the Workplace: Beyond AI, Privacy and SecurityData Ethics in the Workplace: Beyond AI, Privacy and Security
Data Ethics in the Workplace: Beyond AI, Privacy and SecurityCase IQ
 
普通の人でもDX人材になれる方法
普通の人でもDX人材になれる方法 普通の人でもDX人材になれる方法
普通の人でもDX人材になれる方法 Tatsuya Takemura
 
China Digital Economy
China Digital EconomyChina Digital Economy
China Digital EconomyMelanie Swan
 
180119 Digital Government in Japan
180119 Digital Government in Japan180119 Digital Government in Japan
180119 Digital Government in JapanKenji Hiramoto
 
Big data and AI presentation slides
Big data and AI presentation slidesBig data and AI presentation slides
Big data and AI presentation slidesCloudxLab
 
Agile kids - אג'ייל בבית עם המשפחה והילדים
Agile kids - אג'ייל בבית עם המשפחה והילדים Agile kids - אג'ייל בבית עם המשפחה והילדים
Agile kids - אג'ייל בבית עם המשפחה והילדים Shirly Ronen Harel
 
What Does it Mean to See Corporations as Political Actors
What Does it Mean to See Corporations as Political ActorsWhat Does it Mean to See Corporations as Political Actors
What Does it Mean to See Corporations as Political ActorsDr. Miya Burt-Stewart
 
Knowledge graphs for knowing more and knowing for sure
Knowledge graphs for knowing more and knowing for sureKnowledge graphs for knowing more and knowing for sure
Knowledge graphs for knowing more and knowing for sureSteffen Staab
 
Криптовалюта
КриптовалютаКриптовалюта
Криптовалютаmaxwillow93
 
Using AMITT and ATT&CK frameworks
Using AMITT and ATT&CK frameworksUsing AMITT and ATT&CK frameworks
Using AMITT and ATT&CK frameworksSara-Jayne Terp
 
Disruptive Technologies: Impact on Strategic Alliances, Partnerships & Channels
Disruptive Technologies: Impact on Strategic Alliances, Partnerships & ChannelsDisruptive Technologies: Impact on Strategic Alliances, Partnerships & Channels
Disruptive Technologies: Impact on Strategic Alliances, Partnerships & ChannelsPhil Hogg
 
Red Dead Redemption 2_Piggyback Guide (searchable).pdf
Red Dead Redemption 2_Piggyback Guide (searchable).pdfRed Dead Redemption 2_Piggyback Guide (searchable).pdf
Red Dead Redemption 2_Piggyback Guide (searchable).pdfvladvah77
 
Big Data can be fun!
Big Data can be fun!Big Data can be fun!
Big Data can be fun!Bruno Aziza
 
Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...Sara-Jayne Terp
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data ScienceEdureka!
 
Impact of data science on Finance
Impact of data science on FinanceImpact of data science on Finance
Impact of data science on FinanceTyrone Systems
 

La actualidad más candente (20)

China as the World's Technology Leader by Naubahar Sharif
China as the World's Technology Leader by Naubahar Sharif China as the World's Technology Leader by Naubahar Sharif
China as the World's Technology Leader by Naubahar Sharif
 
Data Ethics in the Workplace: Beyond AI, Privacy and Security
Data Ethics in the Workplace: Beyond AI, Privacy and SecurityData Ethics in the Workplace: Beyond AI, Privacy and Security
Data Ethics in the Workplace: Beyond AI, Privacy and Security
 
普通の人でもDX人材になれる方法
普通の人でもDX人材になれる方法 普通の人でもDX人材になれる方法
普通の人でもDX人材になれる方法
 
China Digital Economy
China Digital EconomyChina Digital Economy
China Digital Economy
 
180119 Digital Government in Japan
180119 Digital Government in Japan180119 Digital Government in Japan
180119 Digital Government in Japan
 
Big data and AI presentation slides
Big data and AI presentation slidesBig data and AI presentation slides
Big data and AI presentation slides
 
Agile kids - אג'ייל בבית עם המשפחה והילדים
Agile kids - אג'ייל בבית עם המשפחה והילדים Agile kids - אג'ייל בבית עם המשפחה והילדים
Agile kids - אג'ייל בבית עם המשפחה והילדים
 
Big data ppt
Big  data pptBig  data ppt
Big data ppt
 
What Does it Mean to See Corporations as Political Actors
What Does it Mean to See Corporations as Political ActorsWhat Does it Mean to See Corporations as Political Actors
What Does it Mean to See Corporations as Political Actors
 
Sony Hacking Presentation
Sony Hacking PresentationSony Hacking Presentation
Sony Hacking Presentation
 
Knowledge graphs for knowing more and knowing for sure
Knowledge graphs for knowing more and knowing for sureKnowledge graphs for knowing more and knowing for sure
Knowledge graphs for knowing more and knowing for sure
 
Криптовалюта
КриптовалютаКриптовалюта
Криптовалюта
 
Using AMITT and ATT&CK frameworks
Using AMITT and ATT&CK frameworksUsing AMITT and ATT&CK frameworks
Using AMITT and ATT&CK frameworks
 
Disruptive Technologies: Impact on Strategic Alliances, Partnerships & Channels
Disruptive Technologies: Impact on Strategic Alliances, Partnerships & ChannelsDisruptive Technologies: Impact on Strategic Alliances, Partnerships & Channels
Disruptive Technologies: Impact on Strategic Alliances, Partnerships & Channels
 
Presentation on Big Data
Presentation on Big DataPresentation on Big Data
Presentation on Big Data
 
Red Dead Redemption 2_Piggyback Guide (searchable).pdf
Red Dead Redemption 2_Piggyback Guide (searchable).pdfRed Dead Redemption 2_Piggyback Guide (searchable).pdf
Red Dead Redemption 2_Piggyback Guide (searchable).pdf
 
Big Data can be fun!
Big Data can be fun!Big Data can be fun!
Big Data can be fun!
 
Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Impact of data science on Finance
Impact of data science on FinanceImpact of data science on Finance
Impact of data science on Finance
 

Similar a Designing for Privacy in an Increasingly Public World — Speed Talk

Designing for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldDesigning for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldRobert Stribley
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Robert Stribley
 
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, FedseMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, FedseMarketer
 
Social Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary TaleSocial Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary TaleMike Gotta
 
Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)Phil Cryer
 
Mobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by MobidiggerMobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by MobidiggerHubert Moik
 
Privacy study Mobile and online Dating
Privacy study Mobile and online DatingPrivacy study Mobile and online Dating
Privacy study Mobile and online DatingMobiDigger
 
Privacy in the digital era
Privacy in the digital eraPrivacy in the digital era
Privacy in the digital eraCHEMISTRY AGENCY
 
Technology makes us a marketing tool, demographic
Technology makes us a marketing tool, demographicTechnology makes us a marketing tool, demographic
Technology makes us a marketing tool, demographicsomethingsimple
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonPhil Cryer
 
Privacy & Data Protection - Leon Sylvester Lemos - Privacy. That's iPhone.
Privacy & Data Protection - Leon Sylvester Lemos - Privacy.  That's iPhone.Privacy & Data Protection - Leon Sylvester Lemos - Privacy.  That's iPhone.
Privacy & Data Protection - Leon Sylvester Lemos - Privacy. That's iPhone.LeonLemos3
 
Curiosity Stop Special: Techcrunch Disrupt 2016
Curiosity Stop Special: Techcrunch Disrupt 2016Curiosity Stop Special: Techcrunch Disrupt 2016
Curiosity Stop Special: Techcrunch Disrupt 2016We Are Social
 
Privacy & Data Protection_Leon Sylvester Lemos_Privacy. That's iPhone..pdf
Privacy & Data Protection_Leon Sylvester Lemos_Privacy. That's iPhone..pdfPrivacy & Data Protection_Leon Sylvester Lemos_Privacy. That's iPhone..pdf
Privacy & Data Protection_Leon Sylvester Lemos_Privacy. That's iPhone..pdfLeonLemos3
 
Social Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils FinalSocial Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils FinalKannan Subbiah
 
Big Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media NetworksBig Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media NetworksSylvia Ogweng
 

Similar a Designing for Privacy in an Increasingly Public World — Speed Talk (20)

Designing for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldDesigning for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public World
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21
 
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, FedseMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
 
Social Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary TaleSocial Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary Tale
 
The price of free
The price of freeThe price of free
The price of free
 
Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)
 
Designing for Privacy
Designing for PrivacyDesigning for Privacy
Designing for Privacy
 
Designing for Privacy
Designing for PrivacyDesigning for Privacy
Designing for Privacy
 
Mobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by MobidiggerMobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by Mobidigger
 
Privacy study Mobile and online Dating
Privacy study Mobile and online DatingPrivacy study Mobile and online Dating
Privacy study Mobile and online Dating
 
Privacy in the digital era
Privacy in the digital eraPrivacy in the digital era
Privacy in the digital era
 
Technology makes us a marketing tool, demographic
Technology makes us a marketing tool, demographicTechnology makes us a marketing tool, demographic
Technology makes us a marketing tool, demographic
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the Dragon
 
Privacy & Data Protection - Leon Sylvester Lemos - Privacy. That's iPhone.
Privacy & Data Protection - Leon Sylvester Lemos - Privacy.  That's iPhone.Privacy & Data Protection - Leon Sylvester Lemos - Privacy.  That's iPhone.
Privacy & Data Protection - Leon Sylvester Lemos - Privacy. That's iPhone.
 
Curiosity Stop Special: Techcrunch Disrupt 2016
Curiosity Stop Special: Techcrunch Disrupt 2016Curiosity Stop Special: Techcrunch Disrupt 2016
Curiosity Stop Special: Techcrunch Disrupt 2016
 
Privacy & Data Protection_Leon Sylvester Lemos_Privacy. That's iPhone..pdf
Privacy & Data Protection_Leon Sylvester Lemos_Privacy. That's iPhone..pdfPrivacy & Data Protection_Leon Sylvester Lemos_Privacy. That's iPhone..pdf
Privacy & Data Protection_Leon Sylvester Lemos_Privacy. That's iPhone..pdf
 
Social Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils FinalSocial Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils Final
 
Big Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media NetworksBig Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media Networks
 
Ama Web Trends Presentation
Ama Web Trends PresentationAma Web Trends Presentation
Ama Web Trends Presentation
 
Social Technology Quarterly 08
Social Technology Quarterly 08Social Technology Quarterly 08
Social Technology Quarterly 08
 

Más de Robert Stribley

Best Practices for Simplifying User Experiences
Best Practices for Simplifying User ExperiencesBest Practices for Simplifying User Experiences
Best Practices for Simplifying User ExperiencesRobert Stribley
 
No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...
No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...
No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...Robert Stribley
 
Birds, Bats & Wind Turbines
Birds, Bats & Wind Turbines Birds, Bats & Wind Turbines
Birds, Bats & Wind Turbines Robert Stribley
 
Guidelines for Responsive UX Design 12/12/20
Guidelines for Responsive UX Design 12/12/20Guidelines for Responsive UX Design 12/12/20
Guidelines for Responsive UX Design 12/12/20Robert Stribley
 
Free Flow: The Economic Imperative for Restoring Immigration and Labor Movement
Free Flow: The Economic Imperative for Restoring Immigration and Labor MovementFree Flow: The Economic Imperative for Restoring Immigration and Labor Movement
Free Flow: The Economic Imperative for Restoring Immigration and Labor MovementRobert Stribley
 
No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...
No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...
No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...Robert Stribley
 
Introduction to User Experience Design 2/15/20
Introduction to User Experience Design 2/15/20Introduction to User Experience Design 2/15/20
Introduction to User Experience Design 2/15/20Robert Stribley
 
Introduction to User Experience Design 12/07/19
Introduction to User Experience Design 12/07/19Introduction to User Experience Design 12/07/19
Introduction to User Experience Design 12/07/19Robert Stribley
 
Guidelines for Responsive UX Design 11/16/19
Guidelines for Responsive UX Design 11/16/19Guidelines for Responsive UX Design 11/16/19
Guidelines for Responsive UX Design 11/16/19Robert Stribley
 
Introduction to User Experience Design 10/05/19
Introduction to User Experience Design 10/05/19Introduction to User Experience Design 10/05/19
Introduction to User Experience Design 10/05/19Robert Stribley
 
Guidelines for Responsive UX Design 07/20/19
Guidelines for Responsive UX Design 07/20/19Guidelines for Responsive UX Design 07/20/19
Guidelines for Responsive UX Design 07/20/19Robert Stribley
 
Introduction to User Experience Design 06/22/19
Introduction to User Experience Design 06/22/19Introduction to User Experience Design 06/22/19
Introduction to User Experience Design 06/22/19Robert Stribley
 
Introduction to User Experience Design 04/27/19
Introduction to User Experience Design 04/27/19Introduction to User Experience Design 04/27/19
Introduction to User Experience Design 04/27/19Robert Stribley
 
Guidelines for Responsive UX Design 03/23/2019
Guidelines for Responsive UX Design 03/23/2019Guidelines for Responsive UX Design 03/23/2019
Guidelines for Responsive UX Design 03/23/2019Robert Stribley
 
Introduction to User Experience Design 2/16/19
Introduction to User Experience Design 2/16/19Introduction to User Experience Design 2/16/19
Introduction to User Experience Design 2/16/19Robert Stribley
 
Introduction to User Experience Design 12/08/18
Introduction to User Experience Design 12/08/18Introduction to User Experience Design 12/08/18
Introduction to User Experience Design 12/08/18Robert Stribley
 
Guidelines for Responsive UX Design 11/15/2018
Guidelines for Responsive UX Design 11/15/2018Guidelines for Responsive UX Design 11/15/2018
Guidelines for Responsive UX Design 11/15/2018Robert Stribley
 
Introduction to User Experience Design 10/06/18
Introduction to User Experience Design 10/06/18Introduction to User Experience Design 10/06/18
Introduction to User Experience Design 10/06/18Robert Stribley
 
Guidelines for Responsive UX Design 07/07/2018
Guidelines for Responsive UX Design 07/07/2018Guidelines for Responsive UX Design 07/07/2018
Guidelines for Responsive UX Design 07/07/2018Robert Stribley
 

Más de Robert Stribley (20)

Best Practices for Simplifying User Experiences
Best Practices for Simplifying User ExperiencesBest Practices for Simplifying User Experiences
Best Practices for Simplifying User Experiences
 
No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...
No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...
No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...
 
Birds, Bats & Wind Turbines
Birds, Bats & Wind Turbines Birds, Bats & Wind Turbines
Birds, Bats & Wind Turbines
 
Guidelines for Responsive UX Design 12/12/20
Guidelines for Responsive UX Design 12/12/20Guidelines for Responsive UX Design 12/12/20
Guidelines for Responsive UX Design 12/12/20
 
Free Flow: The Economic Imperative for Restoring Immigration and Labor Movement
Free Flow: The Economic Imperative for Restoring Immigration and Labor MovementFree Flow: The Economic Imperative for Restoring Immigration and Labor Movement
Free Flow: The Economic Imperative for Restoring Immigration and Labor Movement
 
No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...
No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...
No Transit: The Criminal Treatment of Transgender Asylum Seekers in the Unite...
 
Immigrant Song
Immigrant SongImmigrant Song
Immigrant Song
 
Introduction to User Experience Design 2/15/20
Introduction to User Experience Design 2/15/20Introduction to User Experience Design 2/15/20
Introduction to User Experience Design 2/15/20
 
Introduction to User Experience Design 12/07/19
Introduction to User Experience Design 12/07/19Introduction to User Experience Design 12/07/19
Introduction to User Experience Design 12/07/19
 
Guidelines for Responsive UX Design 11/16/19
Guidelines for Responsive UX Design 11/16/19Guidelines for Responsive UX Design 11/16/19
Guidelines for Responsive UX Design 11/16/19
 
Introduction to User Experience Design 10/05/19
Introduction to User Experience Design 10/05/19Introduction to User Experience Design 10/05/19
Introduction to User Experience Design 10/05/19
 
Guidelines for Responsive UX Design 07/20/19
Guidelines for Responsive UX Design 07/20/19Guidelines for Responsive UX Design 07/20/19
Guidelines for Responsive UX Design 07/20/19
 
Introduction to User Experience Design 06/22/19
Introduction to User Experience Design 06/22/19Introduction to User Experience Design 06/22/19
Introduction to User Experience Design 06/22/19
 
Introduction to User Experience Design 04/27/19
Introduction to User Experience Design 04/27/19Introduction to User Experience Design 04/27/19
Introduction to User Experience Design 04/27/19
 
Guidelines for Responsive UX Design 03/23/2019
Guidelines for Responsive UX Design 03/23/2019Guidelines for Responsive UX Design 03/23/2019
Guidelines for Responsive UX Design 03/23/2019
 
Introduction to User Experience Design 2/16/19
Introduction to User Experience Design 2/16/19Introduction to User Experience Design 2/16/19
Introduction to User Experience Design 2/16/19
 
Introduction to User Experience Design 12/08/18
Introduction to User Experience Design 12/08/18Introduction to User Experience Design 12/08/18
Introduction to User Experience Design 12/08/18
 
Guidelines for Responsive UX Design 11/15/2018
Guidelines for Responsive UX Design 11/15/2018Guidelines for Responsive UX Design 11/15/2018
Guidelines for Responsive UX Design 11/15/2018
 
Introduction to User Experience Design 10/06/18
Introduction to User Experience Design 10/06/18Introduction to User Experience Design 10/06/18
Introduction to User Experience Design 10/06/18
 
Guidelines for Responsive UX Design 07/07/2018
Guidelines for Responsive UX Design 07/07/2018Guidelines for Responsive UX Design 07/07/2018
Guidelines for Responsive UX Design 07/07/2018
 

Último

Tapestry Clothing Brands: Collapsing the Funnel
Tapestry Clothing Brands: Collapsing the FunnelTapestry Clothing Brands: Collapsing the Funnel
Tapestry Clothing Brands: Collapsing the Funneljen_giacalone
 
Fashion trends before and after covid.pptx
Fashion trends before and after covid.pptxFashion trends before and after covid.pptx
Fashion trends before and after covid.pptxVanshNarang19
 
Design Inspiration for College by Slidesgo.pptx
Design Inspiration for College by Slidesgo.pptxDesign Inspiration for College by Slidesgo.pptx
Design Inspiration for College by Slidesgo.pptxTusharBahuguna2
 
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Gi...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Gi...Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Gi...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Gi...Pooja Nehwal
 
Kurla Call Girls Pooja Nehwal📞 9892124323 ✅ Vashi Call Service Available Nea...
Kurla Call Girls Pooja Nehwal📞 9892124323 ✅  Vashi Call Service Available Nea...Kurla Call Girls Pooja Nehwal📞 9892124323 ✅  Vashi Call Service Available Nea...
Kurla Call Girls Pooja Nehwal📞 9892124323 ✅ Vashi Call Service Available Nea...Pooja Nehwal
 
Editorial design Magazine design project.pdf
Editorial design Magazine design project.pdfEditorial design Magazine design project.pdf
Editorial design Magazine design project.pdftbatkhuu1
 
Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)amitlee9823
 
(AISHA) Ambegaon Khurd Call Girls Just Call 7001035870 [ Cash on Delivery ] P...
(AISHA) Ambegaon Khurd Call Girls Just Call 7001035870 [ Cash on Delivery ] P...(AISHA) Ambegaon Khurd Call Girls Just Call 7001035870 [ Cash on Delivery ] P...
(AISHA) Ambegaon Khurd Call Girls Just Call 7001035870 [ Cash on Delivery ] P...ranjana rawat
 
Escorts Service Basapura ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Basapura ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Basapura ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Basapura ☎ 7737669865☎ Book Your One night Stand (Bangalore)amitlee9823
 
The history of music videos a level presentation
The history of music videos a level presentationThe history of music videos a level presentation
The history of music videos a level presentationamedia6
 
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130Suhani Kapoor
 
Chapter 19_DDA_TOD Policy_First Draft 2012.pdf
Chapter 19_DDA_TOD Policy_First Draft 2012.pdfChapter 19_DDA_TOD Policy_First Draft 2012.pdf
Chapter 19_DDA_TOD Policy_First Draft 2012.pdfParomita Roy
 
VVIP CALL GIRLS Lucknow 💓 Lucknow < Renuka Sharma > 7877925207 Escorts Service
VVIP CALL GIRLS Lucknow 💓 Lucknow < Renuka Sharma > 7877925207 Escorts ServiceVVIP CALL GIRLS Lucknow 💓 Lucknow < Renuka Sharma > 7877925207 Escorts Service
VVIP CALL GIRLS Lucknow 💓 Lucknow < Renuka Sharma > 7877925207 Escorts Servicearoranaina404
 
Peaches App development presentation deck
Peaches App development presentation deckPeaches App development presentation deck
Peaches App development presentation decktbatkhuu1
 
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...babafaisel
 
Best VIP Call Girls Noida Sector 47 Call Me: 8448380779
Best VIP Call Girls Noida Sector 47 Call Me: 8448380779Best VIP Call Girls Noida Sector 47 Call Me: 8448380779
Best VIP Call Girls Noida Sector 47 Call Me: 8448380779Delhi Call girls
 
Booking open Available Pune Call Girls Nanded City 6297143586 Call Hot India...
Booking open Available Pune Call Girls Nanded City  6297143586 Call Hot India...Booking open Available Pune Call Girls Nanded City  6297143586 Call Hot India...
Booking open Available Pune Call Girls Nanded City 6297143586 Call Hot India...Call Girls in Nagpur High Profile
 
Top Rated Pune Call Girls Saswad ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Saswad ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Saswad ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Saswad ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Call Girls in Nagpur High Profile
 

Último (20)

Tapestry Clothing Brands: Collapsing the Funnel
Tapestry Clothing Brands: Collapsing the FunnelTapestry Clothing Brands: Collapsing the Funnel
Tapestry Clothing Brands: Collapsing the Funnel
 
Fashion trends before and after covid.pptx
Fashion trends before and after covid.pptxFashion trends before and after covid.pptx
Fashion trends before and after covid.pptx
 
Design Inspiration for College by Slidesgo.pptx
Design Inspiration for College by Slidesgo.pptxDesign Inspiration for College by Slidesgo.pptx
Design Inspiration for College by Slidesgo.pptx
 
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Gi...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Gi...Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Gi...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Gi...
 
Kurla Call Girls Pooja Nehwal📞 9892124323 ✅ Vashi Call Service Available Nea...
Kurla Call Girls Pooja Nehwal📞 9892124323 ✅  Vashi Call Service Available Nea...Kurla Call Girls Pooja Nehwal📞 9892124323 ✅  Vashi Call Service Available Nea...
Kurla Call Girls Pooja Nehwal📞 9892124323 ✅ Vashi Call Service Available Nea...
 
Editorial design Magazine design project.pdf
Editorial design Magazine design project.pdfEditorial design Magazine design project.pdf
Editorial design Magazine design project.pdf
 
Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)
 
(AISHA) Ambegaon Khurd Call Girls Just Call 7001035870 [ Cash on Delivery ] P...
(AISHA) Ambegaon Khurd Call Girls Just Call 7001035870 [ Cash on Delivery ] P...(AISHA) Ambegaon Khurd Call Girls Just Call 7001035870 [ Cash on Delivery ] P...
(AISHA) Ambegaon Khurd Call Girls Just Call 7001035870 [ Cash on Delivery ] P...
 
Escorts Service Basapura ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Basapura ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Basapura ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Basapura ☎ 7737669865☎ Book Your One night Stand (Bangalore)
 
The history of music videos a level presentation
The history of music videos a level presentationThe history of music videos a level presentation
The history of music videos a level presentation
 
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
 
Chapter 19_DDA_TOD Policy_First Draft 2012.pdf
Chapter 19_DDA_TOD Policy_First Draft 2012.pdfChapter 19_DDA_TOD Policy_First Draft 2012.pdf
Chapter 19_DDA_TOD Policy_First Draft 2012.pdf
 
VVIP CALL GIRLS Lucknow 💓 Lucknow < Renuka Sharma > 7877925207 Escorts Service
VVIP CALL GIRLS Lucknow 💓 Lucknow < Renuka Sharma > 7877925207 Escorts ServiceVVIP CALL GIRLS Lucknow 💓 Lucknow < Renuka Sharma > 7877925207 Escorts Service
VVIP CALL GIRLS Lucknow 💓 Lucknow < Renuka Sharma > 7877925207 Escorts Service
 
Peaches App development presentation deck
Peaches App development presentation deckPeaches App development presentation deck
Peaches App development presentation deck
 
Call Girls Service Mukherjee Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SER...
Call Girls Service Mukherjee Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SER...Call Girls Service Mukherjee Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SER...
Call Girls Service Mukherjee Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SER...
 
B. Smith. (Architectural Portfolio.).pdf
B. Smith. (Architectural Portfolio.).pdfB. Smith. (Architectural Portfolio.).pdf
B. Smith. (Architectural Portfolio.).pdf
 
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...
 
Best VIP Call Girls Noida Sector 47 Call Me: 8448380779
Best VIP Call Girls Noida Sector 47 Call Me: 8448380779Best VIP Call Girls Noida Sector 47 Call Me: 8448380779
Best VIP Call Girls Noida Sector 47 Call Me: 8448380779
 
Booking open Available Pune Call Girls Nanded City 6297143586 Call Hot India...
Booking open Available Pune Call Girls Nanded City  6297143586 Call Hot India...Booking open Available Pune Call Girls Nanded City  6297143586 Call Hot India...
Booking open Available Pune Call Girls Nanded City 6297143586 Call Hot India...
 
Top Rated Pune Call Girls Saswad ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Saswad ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Saswad ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Saswad ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
 

Designing for Privacy in an Increasingly Public World — Speed Talk

  • 1. Designing for Privacy in an Increasingly Public World Design Museum Week| 27 April 2022 | Robert Stribley
  • 2. What do we mean by designing for privacy?
  • 3. • In 2021, we learned that Facebook, the most popular social media platform on the planet had been hacked • 533 million user’s phone numbers and personal data were leaked online • Fraud & identity theft on the rise during the pandemic • FTC: 1.4 million reports of identity theft in 2020 — double from 2019 Data Security & Identity Theft
  • 4. Clearview.ai, a facial recognition platform offers services to law enforcement. They downloaded over 3 billion photos of people from the Internet and social media and used them to build facial recognition models for millions of people without their permission. Facial Recognition Illustration: Elena Lacy for Wired Photo by Kyle Glenn
  • 5. The New York Times reported on how the donation site for Donald Trump deployed “dark patterns” to trick supporters into agreeing to recurring donations, earning the campaign a huge spike in contributions Dark Patterns
  • 6. Data Sharing A 2019 survey by RSA found only 17% of respondents said it was ethical to track their online activity to personalize ads. Apple rolled out a new iPhone privacy feature called “App Tracking Transparency,” which prevents apps from following you across the internet. Hugely popular in US: Only about 20% of iOS users allowing apps to track them so far.
  • 7. What’s Our Role as Designers?
  • 8. “Arguing that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about free speech because you have nothing to say.” — Edward Snowden, former CIA employee, NSA leaker Why Care About Privacy?
  • 9. • Even if we’re not concerned with a particular privacy issue, we’re not designing for ourselves • If we’re designing for privacy, we’ll consider the needs of people not like ourselves — people with different backgrounds and experiences • That means researching privacy issues, but also interviewing or talking to people with diverse backgrounds and lived experiences Why Care About Privacy?
  • 10. For example, LGBTQ youth should feel their privacy is secure when reaching out for help online. In this sense, privacy issues are very often also diversity issues. Privacy is a key consideration for inclusive design. Why Care About Privacy? Screenshot from The Audre Lorde Project’s Facebook page
  • 11. We may need to explain to our clients the impacts of ignoring privacy concerns. • Civic responsibility: Encourage clients to treat their “end users” as human beings, who are members of their community • Reputation management: Remind clients that what companies do can undermine their brands • Site abandonment: Using dark patterns may anger people, prompting them to leave your site for another with a more transparent experience • Financial consideration: Fine for not following the increasing number of laws and regulations (GDPR & California Consumer Privacy Act) Even if there’s an up-front cost to designing for privacy, the long-term costs can be devastating. Our Role
  • 13. In her Privacy by Design manifesto, Dr. Ann Cavoukian recommends making privacy the “default setting” in our designs and says privacy should be “embedded” into design. What are some practical ways to ensure we’re doing that? Best Practices “Privacy by Design: The 7 Foundational Principles” by Dr. Ann Cavoukian Founder of Global Privacy & Security by Design and the former Information and Privacy Commissioner for the Canadian province of Ontario
  • 15. Dark Patterns UX designer Harry Brignull coined the term dark pattern: a “user interface that has been carefully crafted to trick users into doing things” that you didn’t mean to do — like buying or signing up for something.
  • 16. Dark Patterns “Dark patterns are the canaries in the coal mine of unethical design. A company who’s willing to keep a customer hostage is willing to do worse.” — Mike Monteiro, Ruined by Design
  • 17. Here on a major airline site, the customer has already chosen Basic Economy but "Move to Main Cabin”— which costs $100 more — is placed as a large red button where you’d typically find a "Next" button. Here the pattern is used to trick people into an upsell. But the same pattern is used to trick people into sharing their personal information in ways they didn’t intend to. Dark Patterns
  • 18. Strava, a popular app for runners, automatically tagged other runners when you passed them if they didn’t change their settings. This feature had a name: Flyby. If you clicked on a face, it showed the user’s full name, picture and a map of their running route — effectively revealing where they lived. This happened without you following users and without them knowing they were sharing their activity. After receiving criticism, Strava did change the default setting to private. But it should have always been private. Dark Patterns
  • 19. Be transparent about what personal data is used What Data Is Used? 2
  • 20. Be specific about what data is shared— especially when sharing PII. Personally identifiable information — data points such as name, email, phone number, social security number, mother’s maiden name, can be used to steal people’s identities and to commit fraud 87% of the U.S. can be uniquely identified by just their date of birth, gender, ZIP code (Those items aren’t even considered PII.) Imagine how much damage a bad actor can do with just 3 data points of PII. What Data Is Used?
  • 21. Be transparent about why specific personal data is collected or shared Why Is Data Used? 3
  • 22. Consider this an opportunity to explain the benefits of sharing their data: • Does it ensure a better experience in the future? • Does it personalize ads and offers for them? And if you can’t explain the benefits, consider whether you’re designing the right sort of product. Why Is Data Used?
  • 23. Why Is Data Used? The home insurance app Lemonade sets a great standard for transparent privacy policies. They include an itemized, detailed explanation of what personal information you’re sharing, as well as why. They also promise never to sell your information to third parties. “TL;DR: We will never, ever, sell your data to anyone.”
  • 24. Always use clear, approachable language Clear Language 4
  • 25. Clear Language In 2019 The New York Times studied 150 privacy policies from various platforms. They described what they found as an “incomprehensible disaster.” They described AirBnB’s privacy policy as “particularly inscrutable.” Vague language and jargon allow for broad interpretation, making it easy companies to defend their practices in a lawsuit but hard for us to understand what’s really going on.
  • 26. Twitter advises you to read their privacy policy in full but highlights key aspects of it up front advising you to pay attention to those specific points. Clear Language
  • 27. Give users options to control their own data User Controls 5
  • 28. User Controls Google offers a Privacy Checkup with high level descriptions of how your personal data is being used and why. They allow you to turn off activity tracking, location history, your YouTube history, your Google photo settings, check which third parties have access to your information, and access other key settings all in one sort of privacy dashboard.
  • 29. Ensure these privacy features are placed contextually and easy to find Easy to Find 6
  • 30. Easy to Find Contextual and easy to find also means … Onboarding — Explaining in detail how you use people’s data when they’re using your app for the very first time. “Just in time” alerts – Alerting users in the moment—when they’re about to share data in a new way—even if they’ve already been using your experience.
  • 31. Easy to Find Mozilla displays robust Privacy information by default in a dedicated tab when you download and open their Firefox browser for the first time.
  • 32. Remind users regularly about their privacy options And actively encourage them to take advantage of them Reminders 7
  • 33. Reminders Facebook allows you to set reminders to do a privacy checkup every week, month, 6 months or year. Google also has a feature, which will send you a reminder to check your privacy settings.
  • 34. One final point: Never change users’ privacy settings without telling them in advance. And ensure they have the option to opt out. Never Change Without Notice 8
  • 35. A few years ago, Facebook made users’ “likes” visible overnight, which consequently may have outed some people in the LGTBQ community or revealed people’s personal, political or religious beliefs. When I asked an employee how they justified this change, they responded that the company valued transparency and wanted people to be transparent about their interests. Facebook’s founder Mark Zuckerberg had even famously said privacy was no longer a “social norm.” Never Change Without Notice
  • 36. We don’t have the right to make decisions about other people’s personal data on their behalf. Assuming everyone’s information can safely be made public is a belief that comes from a position of privilege. We should never make decisions like this, which can profoundly affect people’s privacy without their explicit consent. Never Change Without Notice
  • 37. We talk a lot about “empathy” in design. If we design with empathy, we won’t design experiences we wouldn’t want to use ourselves. And we won’t design using “dark patterns” either. Conclusion Photo by Josh Calabrese
  • 38. Privacy is not about secrecy. It’s all about control. — Dr. Ann Cavoukian If we want to ensure people have control over their own personal information If we want to ensure the experiences we design are user friendly and truly “user-centered” We’ll keep these best practices for privacy in mind Conclusion Photo by Zanardi, Unsplash

Notas del editor

  1. Design for Privacy & Security – Presentation for Early Careers Experience new employees by Robert Stribley As presented on 14 March 2022
  2. Privacy Issues – What do we mean by designing for privacy? Photo by Matthew Henry, unsplash - https://unsplash.com/photos/fPxOowbR6ls
  3. Early April and one half billion users’ personal data revealed hacked, leaked online https://www.businessinsider.com/stolen-data-of-533-million-facebook-users-leaked-online-2021-4
  4. Facial Recognition Illustration: Elena Lacy for Wired https://www.wired.com/story/clearview-ai-scraping-web/
  5. Dark Patterns NYT – How Trump Steered Supporters Into Unwitting Donations https://www.nytimes.com/2021/04/03/us/politics/trump-donations.html
  6. Data Sharing Apple’s anti-tracking shield - https://www.nytimes.com/2021/09/16/technology/digital-privacy.html
  7. What’s Our Role as Designers?
  8. Edward Snowden
  9. Why Privacy?
  10. Why Privacy?
  11. Our Role
  12. Best Practices
  13. Best Practices
  14. Dark Patterns
  15. Dark Patterns
  16. Delta dark pattern
  17. Dark Patterns
  18. Maintain transparency about what personal data is used
  19. Be transparent about why specific personal data is collected or shared Illustration from here: https://www.imperva.com/learn/data-security/personally-identifiable-information-pii/
  20. Be transparent about why specific personal data is collected or shared
  21. Be transparent about why specific personal data is collected or shared
  22. Transparency - Explain the specific purpose behind collecting or sharing personal data – Lemonade as a good example
  23. NYT - We Read 150 Privacy Policies. They Were an Incomprehensible Disaster by Kevin Litman-Navarro - https://www.nytimes.com/interactive/2019/06/12/opinion/facebook-google-privacy-policies.html
  24. NYT - We Read 150 Privacy Policies. They Were an Incomprehensible Disaster by Kevin Litman-Navarro - https://www.nytimes.com/interactive/2019/06/12/opinion/facebook-google-privacy-policies.html
  25. Clear Language
  26. User Controls
  27. User Controls
  28. Easy to Find
  29. Onboarding + Just-in-time alerts
  30. Easy to Find – Firefox example
  31. Reminders
  32. Reminders – Facebook example
  33. Never Change Without Notice
  34. Never Change Without Notice https://www.theguardian.com/technology/2009/dec/10/facebook-privacy
  35. Never Change Without Notice https://www.theguardian.com/technology/2009/dec/10/facebook-privacy
  36. Conclusion Photo by Josh Calabrese, Unsplash https://unsplash.com/photos/XXpbdU_31Sg
  37. Conclusion Photo by Zanardi on Unsplash https://unsplash.com/photos/GJY1eAw6tn8
  38. Thank you!