Data Privacy and Security

Download Report

Transcript Data Privacy and Security

Data Privacy and Security
Prof Sunil Wattal
Consumer Analytics
 Analytics with consumer data to derive
meaningful insights on actions and behaviors of
consumers
 Generally with the intention to offer products
and services in a targeted manner.
What could be wrong with that:
 Target
 Doubleclick
 Facebook Beacon
 The dark side of data analytics
 List instances of information about you
being collected and stored
Invisible Information Gathering
 Examples:
 800- or 900-number calls.
 Loyalty cards.
 Web-tracking data; cookies.
 Warranty cards.
 Purchasing records.
 Membership lists.
 Web activity.
 Change-of-address forms.
 GPS
 Cell Phones
 Smart Phones
Using Consumer Information
 Data Mining & Targeted Marketing
 Trading/buying customer lists.
 Telemarketing.
 Data Mining.
 Mass-marketing.
 Web ads.
 Spam (unsolicited e-mail).
 Credit Records
Privacy
What is privacy?
 Freedom from intrusion (being left alone)
 Control of information about oneself
 Freedom from surveillance (being tracked, followed, watched)
Why are some things free?
 If a service does not charge you money, then you are paying in other ways
 Marketing and Advertising
 Privacy
 Facebook has 1 Billion monthly active users
 Revenues for Q2’12: $1.18 Billion, 84% from ads
 Linkedin Marketing Solutions: $63.1 Million
 Twitter uses Promoted Tweets based on you
Consumer Protection
 Costly and disruptive results of errors in databases
 Ease with which personal information leaks out
 Consumers need protection from their own lack of knowledge, judgment, or
interest
 Uses of personal information
 Secondary Use
 Using information for a purpose other than the one for which it was obtained. A few
examples:
 Sale (or trade) of consumer information to other businesses.
 Credit check by a prospective employer.
 Government agency use of consumer database.
Privacy Policies
 Have you seen opt-in and opt-out choices? Where? How were they worded?
 Were any of them deceptive?
 What are some common elements of privacy policies you have read?
Self Regulation
What are the roles of formal laws vs. free operation of the market?
Supporters of self-regulation stress the private sector’s ability to identify and resolve
problems.
Critics argue that incentives for self-regulation are insufficiently compelling and true
deterrence will not be achieved.
Analytics with global data
Privacy Regulations in the European Union (EU):
 Privacy is a fundamental right
 Data Protection Directive
 In Europe, there are strict rules about what companies can and can't do in terms of
collecting, using, disclosing and storing personal information.
 Governments are pushing to make the regulations even stronger.
EU Privacy Laws
 Personal information cannot be collected without consumers’ permission, and
they have the right to review the data and correct inaccuracies.
 Companies that process data must register their activities with the government.
 Employers cannot read workers’ private e-mail.
 Personal information cannot be shared by companies or across borders without
express permission from the data subject.
 Checkout clerks cannot ask for shoppers’ phone numbers.
Data Security
Data Security
Stolen and Lost Data
 Hackers
 Physical theft (laptops, thumb-drives, etc.)
 Requesting information under false pretenses
 Bribery of employees who have access
 Have you heard of Thumbsucking??
Implications for companies
 Furious Constituents
 Negative Publicity
 Tarnished Reputation
 Public Embarrassment
 Investigations
 Lawsuits, Fines and Penalties
 Financial Losses
 Waste of Valuable Resources
Examples
Availability
 Data needs to be available at all necessary times
 Data needs to be available to only the appropriate users
 Need to be able to track who has access to and who has accessed what
data
Authenticity
 Need to ensure that the data has been edited by an authorized source
 Need to confirm that users accessing the system are who they say they are
 Need to verify that all report requests are from authorized users
 Need to verify that any outbound data is going to the expected receiver
Integrity
 Need to verify that any external data has the correct formatting and other
metadata
 Need to verify that all input data is accurate and verifiable
 Need to ensure that data is following the correct work flow rules for your
institution/corporation
 Need to be able to report on all data changes and who authored them to
ensure compliance with corporate rules and privacy laws.
Confidentiality
 Need to ensure that confidential data is only available to correct people
 Need to ensure that entire database is security from external and internal
system breaches
 Need to provide for reporting on who has accessed what data and what
they have done with it
 Mission critical and Legal sensitive data must be highly security at the
potential risk of lost business and litigation
Approaches to Data Security
 Implement Technological Solutions
 Adopt “Soft” IT Security Approaches
 Change the Corporate Culture
 Can you think examples of these practices at Temple or elsewhere
Next steps
 Inclass Exercises