1 / 25

Data Privacy and Security

Data Privacy and Security. Prof Sunil Wattal. Consumer Analytics. Analytics with consumer data to derive meaningful insights on actions and behaviors of consumers Generally with the intention to offer products and services in a targeted manner. What could be wrong with that:. Target

hakan
Download Presentation

Data Privacy and Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Data Privacy and Security Prof Sunil Wattal

  2. Consumer Analytics • Analytics with consumer data to derive meaningful insights on actions and behaviors of consumers • Generally with the intention to offer products and services in a targeted manner.

  3. What could be wrong with that: • Target • Doubleclick • Facebook Beacon

  4. The dark side of data analytics

  5. List instances of information about you being collected and stored

  6. Invisible Information Gathering • Examples: • 800- or 900-number calls. • Loyalty cards. • Web-tracking data; cookies. • Warranty cards. • Purchasing records. • Membership lists. • Web activity. • Change-of-address forms. • GPS • Cell Phones • Smart Phones

  7. Using Consumer Information • Data Mining & Targeted Marketing • Trading/buying customer lists. • Telemarketing. • Data Mining. • Mass-marketing. • Web ads. • Spam (unsolicited e-mail). • Credit Records

  8. Privacy What is privacy? • Freedom from intrusion (being left alone) • Control of information about oneself • Freedom from surveillance (being tracked, followed, watched)

  9. Why are some thingsfree? • If a service does not charge you money, then you are paying in other ways • Marketing and Advertising • Privacy • Facebook has 1 Billion monthly active users • Revenues for Q2’12: $1.18 Billion, 84% from ads • LinkedinMarketing Solutions: $63.1 Million • Twitter uses Promoted Tweets based on you

  10. Consumer Protection • Costly and disruptive results of errors in databases • Ease with which personal information leaks out • Consumers need protection from their own lack of knowledge, judgment, or interest • Uses of personal information • Secondary Use • Using information for a purpose other than the one for which it was obtained. A few examples: • Sale (or trade) of consumer information to other businesses. • Credit check by a prospective employer. • Government agency use of consumer database.

  11. Privacy Policies • Have you seen opt-in and opt-out choices? Where? How were they worded? • Were any of them deceptive? • What are some common elements of privacy policies you have read?

  12. Self Regulation What are the roles of formal laws vs. free operation of the market? Supporters of self-regulation stress the private sector’s ability to identify and resolve problems. Critics argue that incentives for self-regulation are insufficiently compelling and true deterrence will not be achieved.

  13. Analytics with global data Privacy Regulations in the European Union (EU): • Privacy is a fundamental right • Data Protection Directive • In Europe, there are strict rules about what companies can and can't do in terms of collecting, using, disclosing and storing personal information. • Governments are pushing to make the regulations even stronger.

  14. EU Privacy Laws • Personal information cannot be collected without consumers’ permission, and they have the right to review the data and correct inaccuracies. • Companies that process data must register their activities with the government. • Employers cannot read workers’ private e-mail. • Personal information cannot be shared by companies or across borders without express permission from the data subject.  • Checkout clerks cannot ask for shoppers’ phone numbers. 

  15. Data Security

  16. Data Security Stolen and Lost Data • Hackers • Physical theft (laptops, thumb-drives, etc.) • Requesting information under false pretenses • Bribery of employees who have access • Have you heard of Thumbsucking??

  17. Implications for companies • Furious Constituents • Negative Publicity • Tarnished Reputation • Public Embarrassment • Investigations • Lawsuits, Fines and Penalties • Financial Losses • Waste of Valuable Resources

  18. Examples

  19. Availability • Data needs to be available at all necessary times • Data needs to be available to only the appropriate users • Need to be able to track who has access to and who has accessed what data

  20. Authenticity • Need to ensure that the data has been edited by an authorized source • Need to confirm that users accessing the system are who they say they are • Need to verify that all report requests are from authorized users • Need to verify that any outbound data is going to the expected receiver

  21. Integrity • Need to verify that any external data has the correct formatting and other metadata • Need to verify that all input data is accurate and verifiable • Need to ensure that data is following the correct work flow rules for your institution/corporation • Need to be able to report on all data changes and who authored them to ensure compliance with corporate rules and privacy laws.

  22. Confidentiality • Need to ensure that confidential data is only available to correct people • Need to ensure that entire database is security from external and internal system breaches • Need to provide for reporting on who has accessed what data and what they have done with it • Mission critical and Legal sensitive data must be highly security at the potential risk of lost business and litigation

  23. Approaches to Data Security • Implement Technological Solutions • Adopt “Soft” IT Security Approaches • Change the Corporate Culture • Can you think examples of these practices at Temple or elsewhere

  24. Next steps • Inclass Exercises

More Related