Jeffrey Evans Presentation

23

description

 

Transcript of Jeffrey Evans Presentation

Page 1: Jeffrey Evans Presentation
Page 2: Jeffrey Evans Presentation

Executive Summary

• Texting has become the fastest growing and most prolific form of mobile communication

• Traditional Texting is inherently limited and void of any control

• TigertText’s mission is to transform text communication forever

Page 3: Jeffrey Evans Presentation

More than 4 billion text messages are sent in the US daily

90% of teens do not check email daily. Instead they use text messaging and social media to communicate

DIGITAL COMMUNICATION LIVES FOREVERSENDERS HAVE NO CONTROL

THE IMPORTANCE OF TEXTING

People don’t

think about the

fact that the

information lives

forever…

They don’t

realize the effect

that it can have

on them… and

their future.

Page 4: Jeffrey Evans Presentation

Media Coverage

Page 5: Jeffrey Evans Presentation

Example #1: Mark ZuckerbergTo: “A Friend”Subject: Facebook Users

THE IMPORTANCE OF IMPERMANENCE

What if, one day after this message

was sent, it was deleted from the receiver’s device,

the sender’s device, and all

servers in -between

Page 6: Jeffrey Evans Presentation

THE IMPORTANCE OF IMPERMANENCE

Example #2: Erik KadeTo: Mark Norris VP, SalesSubject: While in client meeting texting to determine what points to negotiate on.

What if these messages were sent to delete on read so that 1 minute after

they were opened the were deleted?

Page 7: Jeffrey Evans Presentation

USE AT YOUR OWN RISK

Example #1: Kimberly SwannWhere: FacebookWhat: Posted 'im so totally

bord!!!’Result: Loss of job

What if Kim communicated with

her friends in a manner that would not allow others to

see her messages?

Page 8: Jeffrey Evans Presentation

USE AT YOUR OWN RISK

Example #2: Stacy Snyder

Where: MySpace

What: Friend posted a pictureof her at a party with the caption ‘Drunken Pirate’

Result: Denied Teaching Degree

What if Stacy controlled what people did with

pictures of her that she sent them?

Page 9: Jeffrey Evans Presentation

USE AT YOUR OWN RISK

Example #3: Jesse Logan

Where: Text Message

What: Shared nude photos with her boyfriend via text.

Result: Suicide

What if the picture she texted was not able to be forwarded and deleted

itself after a set lifespan.

Page 10: Jeffrey Evans Presentation

• Sender determines WHEN A MESSAGE EXPIRES

• TigerTexts CANNOT BE COPIED & FORWARDED

• Sender knows when messages have been RECEIVED AND OPENED ON THE RECIPIENT’S DEVICE

DEVELOP THE FIRST SENDER-CONTROLLEDMOBILE MESSAGING PLATFORM/NETWORK

THE TIGERTEXT VISION

• Messages can be sent with RICH MEDIA (pictures, video, voice, documents)

• MESSAGE SIZE NOT LIMITED TO 160 CHARACTERS

• Sender can BRAND MESSAGES

• Sender can MASS BROADCAST MESSAGES

All messages sent SECURELY and KEPT PRIVATE

Page 11: Jeffrey Evans Presentation

C2C TRACTION

• HUNDREDS OF THOUSANDS OF DOWNLOADS since the launch of the application in March of 2010

• OVER 10% of the users OPEN the app 20+ TIMES A DAY

• Messages sent has GROWN 25% in the last 4 MONTHS

• OVER 2.5 MILLION MESSAGES SENT (as of 10/24/2010)

• DOWNLOADED in more than 100 COUNTRIES

BUILDING A STICKY BASEOF CORE USERS

• OVER 10% of the users OPEN the app 20+ TIMES A DAY

Page 12: Jeffrey Evans Presentation

12

PERSONAL COMMUNCATION NETWORK

Page 13: Jeffrey Evans Presentation

Beginning to Care

82% 73%

45% 52%

of respondentssee privacy as animportant topic

of respondentsfeel they lack controlover their personal data

claim to be very selectiveabout who they give personal to and why

of respondents are afraid of personal data being sold to third parties

76%of respondentsare concerned aboutprivacy violations

Study conducted by Nokia Siemens

Data Protection and Respecting Privacy is a Global Concern

Page 14: Jeffrey Evans Presentation

Two Out of Three Consumers Look for a Portal to Manage Their Personal Data

• Imagine there was a portal where you could manage and supervise all the permissions you had given to different parties regarding your personal data. Would this be an interesting option for you?

4 6 22 42 27 69%

4

11

31 40 12 52%

4

15

27 42 16 16%

6

13

34 36 10 46%

• Do you think your provider could be a useful partner in helping to manage and protect the circulation of your personal data?

Global result(n=9186)

Mobile provider(n=9115)

Internet provider(n=5147)

Landline telephone provider(n=6721)

0% 20% 40% 60% 80% 100%

Definitely not

Probably not

Neither yes or no

Probably yes

Definitely yes

Page 15: Jeffrey Evans Presentation

Who do you trust

To what degree do you trust the following institutions concerning data protection and respecting your privacy?

Decreasing C

redibility

Global n=min 9,126

Page 16: Jeffrey Evans Presentation

Do your physicians text message to communicate?

Is your SMS communication HIPAA compliant?

Do you experience lapses in patient safety due to poor physician or nurse mobile communication?

Mobile Healthcare – A risk and an opportunity

16

Page 17: Jeffrey Evans Presentation

Security:  Concerns about “privacy and security" are cited by 1/3rd of PCPs and 41% of specialists as the top concern about adopting mobile health solutions

Coverage: 78% of Physicians experience difficulty in connecting or communicating with colleagues.

Communication: Physicians interviewed report they are overwhelmed by the daily volume of communications received from colleagues, care team members, and patients

Efficiency: 40% of physicians surveyed said they could eliminate 11% to 30% of office visits through the use of mobile health technologies.

Such shifts could rewrite physician supply and shortage forecasts for the next decade and beyond.

17

Physician Stats

 

Source: Spyglass Consulting Report July 2010 & PWC Nov 2010

Page 18: Jeffrey Evans Presentation

• All TIGERTEXT messages have a finite life

- Enterprise determines how long all messages live on platform

• Messages are not forwardable or copyable

• Healthcare Provider choose to delete all expired messages off Sender’s and Receiver’s mobile phones while archiving a copy for later retrieval

• TIGERTEXT works across Blackberry, iPhone, Android and Windows operating systems

Manage mobile messaging characteristics for first time

TIGERTEXT messages are sent thru a private gateway which reduces costs while increases privacy, productivity and flexibility

Create Your Own HIPAA CompliantPrivate Mobile Network

The “HIPAATEXT” Solution

18

Page 19: Jeffrey Evans Presentation

Reduces Business Risk

RISK = Asset Value x Vulnerability x Threat x Probability

• TigerText reduces probability of privacy breach to near zero which reduces RISK

o Lower risk of data breach from full message trail not being available

o No data retained thus privacy breach risk significantly reduced

• Text messaging capabilities achieve broader acceptance as valued and trusted business tool

*2009 Annual Study: Ponemon Institute

$204 per compromised customer record and $6.75 million per data breach

SECURITY THROUGH PRIVACYSECURITY THROUGH PRIVACY

Business Value

19

8 CA hospitals fined $800,000 due to recent Privacy Breaches (Nov. 2010)

Page 20: Jeffrey Evans Presentation

The “HIPAATEXT” Solution

20

Expiredmessage

Lifespanremaining

Lifespanremaining

Delivered &readnotifications

Page 21: Jeffrey Evans Presentation

Constantly Pushing the Privacy Envelope

On Friday, we expanded the information you are able to share with external websites and applications to include your address and mobile number. ... Over the weekend, we got some useful feedback that we could make people more clearly aware of when they are granting access to this data.

We agree, and we are making changes to help ensure you only share this information when you intend to do so. We'll be working to launch these updates as soon as possible, and will be temporarily disabling this feature until those changes are ready. We look forward to re-enabling this improved feature in the next few weeks."

Page 22: Jeffrey Evans Presentation

Big Brother Getting Bolder

January 5, 2011

California Supreme Court: Cell Phone Searches Don't Need a Warrant

Awful 4th amendment decision in California that searching one's cell phone data does not require a warrant, in a time and place where a cell phone is more like a computer than a phone.

Page 23: Jeffrey Evans Presentation