From Apple to Zynga, privacy and security have dominated the headlines this year. Legislators, regulators, investors, the press, and the public are all tuning into these issues.
Get the inside track from ACLU lawyers, venture capitalists, technologists, and tech journalists about why and how to avoid mistakes that have landed other companies in hot water and make early decisions that are good for customers and good for the bottom line. This session is part of the Big Data Track sponsored by Gemalto.
The Internet is a fantastic resource for sharing and storing ideas, information, and creative works. But users -- individuals and companies -- can't take advantage of that bounty without help from a network of large and small service providers, from social media services like Facebook to storage services such as DropBox and SpiderOak. Too often, these providers are cowed by legal threats into taking down perfectly legal material (like the Facebook page you use to network for your business) or revealing private information about their users. How can you earn your users' loyalty by doing better, and how can you help ensure that the services on which you rely do right by you and your customers? What legal risks do you need to watch out for, and how can you make them go away? A group of experienced lawyers and business owners will help you answer these questions from a legal and practical perspective.
Technological innovation has dramatically increased the types andvolume of personal information created and captured. Social networks,mobile devices, thermostats, cars, even kitchen appliances collect andaggregate data from and about users. Personal data is among the mostvaluable assets for the current crop of tech startups. On the darkside, consumers have very little conception of the amount of data theyare creating and sharing and little appreciation of the potential risksand harms. On the bright side, data-based innovation can lead to newproducts, more efficiency, and lower costs. How can we protectourselves, without overreacting, in the age of data abundance? Can wetrust in the market to deliver the appropriate controls and usereducation, or do we need regulatory intervention? This session is sponsored by CNET / CBS Interactive.
As former Representative Anthony Weiner discovered the hard way, remaining anonymous in this hyper-social world is becoming nearlyimpossible. But what sucks for Anthony Wiener has been great for conversations on the Web – with the rise of authenticated platforms, anonymous comments and posts are giving way to real dialogs between authors and their audiences.
For example, when comments on popular sites like TechCrunch became tied to real Facebook profiles, the experience went from a juvenile insult-fest to a civil value-add information exchange. There’s undoubtedly progress to be made, but authentication and social platforms are giving us a glimpse of what the future holds: low friction ways to connect your opinion to a piece of content, easier ways to see what your friends care about, and better ways to insert your POV.
For better or worse, it’s becoming harder to remain anonymous online. In this panel discussion, we will discuss how technology is changing online self-expression.
A discussion about how technologies that are often built in the west are being used around the world in extremely dangerous situations. Often there isn't an idea of how to protect individuals and their human rights when developing these tools, even when they're being used by activists and changemakers around the world. This panel will present concrete examples from Burma, Tibet, Liberia and Egypt.
Smart policies and practices for managing data and protecting your users’ personal information are good for business. It doesn't have to be a zero-sum game where you sacrifice privacy for usability, functionality or security. Whether you're part of a small team or a large organization, find out how to earn users' trust by applying Privacy by Design to your product development and business practices.
by Joe Ross, Joseph DeMarco, Monika Jedrzejowska, Michael Bruemmer and Terry Hemeyer
Over the past year, 90% of businesses have been hit by at least one IT security breach. What does this mean? Businesses should consider breaches a statistical certainty and be prepared. Breaches are not the only thing to worry about–most security incidents are not cyber-attacks, but process or other non-hacker issues, like employee activities outside the firm. And it’s not just an IT problem. The manner in how breaches occur, how companies respond and ensuing media coverage can destroy a brand, impacting the whole business. Today, leaders must know about technologies that enable companies to quickly respond and protect customers, plus communication techniques to ensure their brand weathers the storm. In this panel, you’ll hear from experts regarding crisis communications, legal issues and consumer concerns in the event of a breach. Learn how to be ready with a smart plan that includes proactive protection, company preparedness, customer communications and media outreach.
The ability of consumer electronics to sense location has no doubt opened the doors to a new dimension of mobile services that include navigation, local search, contextual social connectivity, and mobile advertising/marketing. And consumers have clearly iterated a preference to have these services delivered through their mobile devices, as evidenced by sharp declines in personal navigation device businesses over the past two years. But the vast opportunities of this new dimension come with an equally vast array of technological, safety, privacy and marketing issues, among others, that must be evaluated and addressed. In this session, leaders from different groups invested in the future of location technologies - from the device side to content developers to mobile marketers - will discuss the importance of location capabilities in mobile devices for evolving the consumer’s relationship to and affinity for their brands. Panelists will illustrate examples of value-added consumer use cases and discuss how marketers and application developers must prioritize the development of contextually relevant, sticky services to drive mobile advertising growth.
During "Sex, Lies, and Cookies: Web Privacy EXPOSED!", panelists look into the world of data collection and privacy on the internet, asking tough questions about what “tracking” really entails. The discussion focuses on how data collection is integrated into the current structure of the web, and what (if anything) people can do to make informed choices about how they allow their information to be used. Moderated by Andy Kahl, Ghostery’s product manager, the panel includes Lydia Parnes (former director, Bureau of Consumer Protection at FTC), Christopher Soghoian (graduate fellow at Center for Applied Cybersecurity Research), Lorrie Cranor (associate professor of Computer Science and Engineering, Carnegie Mellon), and Berin Szoka (founder, TechFreedom).
So you've worked for months writing code, assembling creative, and testing out your app until it it's finally ready for mass consumption. The App Store has approved it and you are getting solid reviews. But how are you storing your users' registration information? Have you taken adequate steps to ensure its authenticity? Do you know how old your users are or what information is being passed on to advertisers? A wrong answer to these questions could land you in hot water with the authorities. And Congress is considering regulations to strictly monitor the relationships you have with your customers. Our panel discusses avoiding privacy pitfalls. Experts will share their experiences negotiating with Congress and explain how to modify your app to avoid enforcement action by regulators.
We’re living in an age when even powerful politicians can’t keep track of their digital dating trail. Employers and exes are likely reading your words. How can you write about sex, participate in online dating and social networking sites, and still maintain your privacy? Bloggers and authors Violet Blue (sex author, tech columnist; @violet blue and tinynibbles.com), Rachel Kramer Bussel (Lusty Lady, Best Sex Writing series editor), Twanna A. Hines (Funky Brown Chick®, The Late Sex Show with Twanna Hines), and Samhita Mukhopadhyay (author, Outdated: Why Dating is Ruining Your Love Life, Executive Editor, Feministing.com).
Our wallets are one of the last remaining bastions of a pre-digital lifestyle, relics of an era of payment that has since come and gone.
Coupons are now Groupons, rewards cards are digitally stored on our smartphones and Square wants to power all our payments. With all these new ways to slim down and streamline our wallets, why are we still getting a paper receipt every time we check out at the grocery store? With so much progress, why are men still sporting the infamous Costanza bulge and women toting around pocketbooks that look like small filing cabinets? As more commerce shifts from offline to online, and even offline retailers are experimenting with digital marketing & transactions, the Costanza wallet is due for a makeover.
What are the brands and startups that are changing how we think about receipts? What will the implications of Big Data and privacy be in this transition? And what systems will ultimately come to define how we all chronicle our shopping experiences moving forward?
Our wallets have been ceding themselves over to the digital age for quite some time now. It’s about time we took that final leap and made the upgrade to Wallet 2.0.
As our networks expand, our profiles get more public, and our work requires a human face, where do we draw the line between personal and professional identities online? How do we maintain those boundaries for our community members? How do we respond to attacks, opportunities, and over-shares online? When does over-sharing hurt the community? When should you share your own personal stories as a manager, or personally reach out to community members?
Growing and cultivating an active community also requires that the community manager walk the fine line of personal and professional sharing. Every community manager wonders when and how to professionally cultivate leaders and members to create a thriving community while still being personal. On the reverse side, sometimes community members share too much, which can hurt the health of the community.
This panel will address these questions and more from experience in nonprofit and public media sectors.
With the developments in social shopping such as real time social shopping sites, Facebook shopping, and location-based check-ins, recommendations, and deals, the fashion industry is catering to the customer like never before. But how social can—and should—shopping get? While consumers may want to consume together, over-sharing of information is all too easy. Apple’s Ping, Facebook’s Beacon and Blippy are but three familiar examples.This core conversation will discuss how privacy fits in and explores the question of just who is safe guarding the community.
There are tools and tutorials out there to teach developers all sorts of things about mobile apps, taking them from "Hello World!" to sophisticated products ready for the big time. But if you want help building privacy into your app, that's a lot harder to find.
This workshop seeks to change that. Through demos of existing resources and Q&A with attendees, we will provide you with the tools and skills you need to build the next killer mobile app while protecting your users' privacy and avoiding the media firestorms and government investigations that can kill a fledgling product.
We'll include hands-on demos of existing apps and developer kits and tools that help you think through and address the privacy implications of the data you collect and use. We'll also discuss what other resources are needed to give designers and developers the ability to meet their deadlines, pull in revenue, and still stand up for their users' privacy.
The benevolent Internet promotes expression, collaboration and experimentation. But the current legal scheme can make the Internet a place where digital tracks persist long after their intended use. In a world of d0xing and h8ing, we face a critical juncture for reconciling freedom of speech with privacy.
This panel will review of norms of online and offline conduct and suggest possible ways of striking a balance, without breaking the Internet along the way.
1. Reputation Bankruptcy may be an option to rehabilitate a ruined reputation in the reputation economy, and a solution to peer-to-peer privacy problems.
2. (Re)Contextualization has pros and cons as a remedy in a legal scheme when third-party online speech is treated differently from printed speech.
3. Disownership of Content: Should "disown this" features become the norm, allowing users to release content into the wild?
4. Ephemerality: Should certain types of content be designed to degrade over time?
9th–13th March 2012