Data Privacy and Security

25
Data Privacy and Security Prof Sunil Wattal

description

Data Privacy and Security. Prof Sunil Wattal. Consumer Analytics. Analytics with consumer data to derive meaningful insights on actions and behaviors of consumers Generally with the intention to offer products and services in a targeted manner. What could be wrong with that:. Target - PowerPoint PPT Presentation

Transcript of Data Privacy and Security

Page 1: Data Privacy and Security

Data Privacy and SecurityProf Sunil Wattal

Page 2: Data Privacy and Security

Consumer Analytics Analytics with consumer data to derive

meaningful insights on actions and behaviors of consumers

Generally with the intention to offer products and services in a targeted manner.

Page 3: Data Privacy and Security
Page 4: Data Privacy and Security

What could be wrong with that:

Target

Doubleclick

Facebook Beacon

Page 5: Data Privacy and Security

The dark side of data analytics

Page 6: Data Privacy and Security

List instances of information about you being collected and stored

Page 7: Data Privacy and Security

Invisible Information Gathering

Examples: 800- or 900-number calls. Loyalty cards. Web-tracking data; cookies. Warranty cards. Purchasing records. Membership lists. Web activity. Change-of-address forms. GPS Cell Phones Smart Phones

Page 8: Data Privacy and Security

Using Consumer Information

Data Mining & Targeted Marketing Trading/buying customer lists. Telemarketing. Data Mining. Mass-marketing. Web ads. Spam (unsolicited e-mail). Credit Records

Page 9: Data Privacy and Security

Privacy

What is privacy? Freedom from intrusion (being left alone) Control of information about oneself Freedom from surveillance (being tracked, followed, watched)

Page 10: Data Privacy and Security

Why are some things free?

If a service does not charge you money, then you are paying in other ways Marketing and Advertising Privacy

Facebook has 1 Billion monthly active users Revenues for Q2’12: $1.18 Billion, 84% from ads

Linkedin Marketing Solutions: $63.1 Million

Twitter uses Promoted Tweets based on you

Page 11: Data Privacy and Security

Consumer Protection Costly and disruptive results of errors in databases

Ease with which personal information leaks out

Consumers need protection from their own lack of knowledge, judgment, or interest

Uses of personal information

Secondary Use Using information for a purpose other than the one for which it was obtained. A few

examples: Sale (or trade) of consumer information to other businesses. Credit check by a prospective employer. Government agency use of consumer database.

Page 12: Data Privacy and Security

Privacy Policies

Have you seen opt-in and opt-out choices? Where? How were they worded?

Were any of them deceptive?

What are some common elements of privacy policies you have read?

Page 13: Data Privacy and Security

Self Regulation

What are the roles of formal laws vs. free operation of the market?

Supporters of self-regulation stress the private sector’s ability to identify and resolve problems.

Critics argue that incentives for self-regulation are insufficiently compelling and true deterrence will not be achieved.

Page 14: Data Privacy and Security

Analytics with global data

Privacy Regulations in the European Union (EU): Privacy is a fundamental right Data Protection Directive

In Europe, there are strict rules about what companies can and can't do in terms of collecting, using, disclosing and storing personal information.

Governments are pushing to make the regulations even stronger.

Page 15: Data Privacy and Security

EU Privacy Laws Personal information cannot be collected without consumers’ permission, and

they have the right to review the data and correct inaccuracies.

Companies that process data must register their activities with the government.

Employers cannot read workers’ private e-mail.

Personal information cannot be shared by companies or across borders without express permission from the data subject. 

Checkout clerks cannot ask for shoppers’ phone numbers. 

Page 16: Data Privacy and Security

Data Security

Page 17: Data Privacy and Security

Data Security

Stolen and Lost Data Hackers Physical theft (laptops, thumb-drives, etc.) Requesting information under false pretenses Bribery of employees who have access

Have you heard of Thumbsucking??

Page 18: Data Privacy and Security

Furious Constituents Negative Publicity Tarnished Reputation Public Embarrassment Investigations Lawsuits, Fines and Penalties Financial Losses Waste of Valuable Resources

Implications for companies

Page 19: Data Privacy and Security

Examples

Page 20: Data Privacy and Security

Availability

Data needs to be available at all necessary times Data needs to be available to only the appropriate users Need to be able to track who has access to and who has accessed what

data

Page 21: Data Privacy and Security

Authenticity

Need to ensure that the data has been edited by an authorized source Need to confirm that users accessing the system are who they say they

are Need to verify that all report requests are from authorized users Need to verify that any outbound data is going to the expected receiver

Page 22: Data Privacy and Security

Integrity

Need to verify that any external data has the correct formatting and other metadata

Need to verify that all input data is accurate and verifiable Need to ensure that data is following the correct work flow rules for your

institution/corporation Need to be able to report on all data changes and who authored them to

ensure compliance with corporate rules and privacy laws.

Page 23: Data Privacy and Security

Confidentiality

Need to ensure that confidential data is only available to correct people Need to ensure that entire database is security from external and

internal system breaches Need to provide for reporting on who has accessed what data and what

they have done with it Mission critical and Legal sensitive data must be highly security at the

potential risk of lost business and litigation

Page 24: Data Privacy and Security

Implement Technological Solutions Adopt “Soft” IT Security Approaches Change the Corporate Culture

Can you think examples of these practices at Temple or elsewhere

Approaches to Data Security

Page 25: Data Privacy and Security

Next steps

Inclass Exercises