The API economy will bring data-sharing power to the people

Slides:



Advertisements
Similar presentations
Money is not everything
Advertisements

User-Managed Access UMA Work tinyurl.com/umawg | tinyurl.com/umafaq IIW 16, May
Privacy: Facebook, Twitter
PRIVACY A Consumer Reporting Agency Perspective. Collect and Sell Information on People Credit Bureaus – Equifax, Experian & TransUnion – are CRA’s But.
A Better Mobile Location Landscape May 2008 Sam Altman, Co-founder and CEO.
Privacy Issues and Techniques for Monitoring Applications Vibhor Rastogi RFID Security Group.
E-Profile-based Security for Critical Transactions in Web Applications Written by: Jean Stephan et al., 2009 Reported by: Renato Casipe, 2/15/2010.
1 WELCOME TO MY IEP. 2 My Strengths and Weaknesses Strengths Weaknesses
- Being hospitalized can be a very intimidating experience. - Patients find themselves thrown into a foreign environment and often feel that they.
Sprocket: Slides for Question 1 What kind of things can my website do for my business.
UMA Could I Manage My Own Data. Please?. Agenda Business Trends & Technical Solutions Distributed Business (Decentralisation) Mobility & Automation Delegation.
Protecting “Personal Clouds” with UMA and OpenID #UMApcloud for questions 19 June 2014 tinyurl.com/umawg for slides, recording, and more.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
© 2015 Nuance Communications, Inc. All rights reserved. Dragon Drive The Contextual Wave May 13th, 2015.
The Data Protection Act 1998 The Eight Principles.
Federal Trade Commission required to issue and enforce regulations concerning children’s online privacy. Initial COPPA Rule effective April 21, 2000;
ODU Safety Button Presented by Wayne Stilwell CS 495 Fall 2011.
Thank you #SPSTC sponsors! Who Am I? Haystax Technology.
Enforcement mechanisms for distributed authorization across domains in UMA – aka “UMA trust” Eve Maler | 22 Aug 2012 draft.
MBM Consulting | Presentation | © 2013 MBM Consulting, IT Security Services. All Rights Reserved. Company Profile MBM Consulting Services.
Welcome Back! DAY ONE. Classroom Rules  CLASSROOM RULES:  Show respect for each other.  NO Cell Phone s - Unless being used for instructional purposes.
Photo Album by User
5 or more raise the score 4 or less let it rest
Privacy by Design – Principles of Privacy-Aware Ubiquitous Systems Marc Langheinrich - Swiss Federal Institute of Technology, Zurich Whitney Hess.
1 DIG Lecture 2 (Game) The Acey-Deucey Game Michael Moshell University of Central Florida Media Software Design.
Tyler Capitan ET 280 How to install an Xbox 360 LIVE to a wireless network.
Access Management 2.0: UMA for the #UMAam20 for questions 20 March 2014 tinyurl.com/umawg for slides, recording, and more 1.
Respecting People's Privacy in Ministry 1. Context 2. Why should we bother? 3. APP Summary 4. Information Pathway.
Justin Richer The MITRE Corporation October 8, 2014 Overview of OAuth 2.0 and Blue Button + REST.
User-Managed Access Eve Maler, UMA Work Group | tinyurl.com/umawg 9 December
Risky business legal tips for safe selling online Internet World Nigel Miller Partner, Fox Williams LLP 1 May 2008.
Agenda App running in Outlook Write once, run everywhere Apps run on Outlook, Outlook Web App, and Mobile Outlook Web App. Standards based development.
DIGITAL SAFETY City of Edinburgh Council Digital Learning Team.
Subtitle Title Layout WHERE CAN I SHRED DOCUMENTS?
HOW FILLING OUT A SINGLE PROFILE CAN LEAD TO MULTIPLE SCHOLARSHIPS. CSF of Marlborough Dollars for Scholars, Inc © Scholarship America. November 2013.
Right 1 - ACCESS Right to access health and community services I have a right to access health and community services that meet my identified needs.
Visibook is instant, simple, and dynamic appointment booking We're headquartered in San Francisco, California "Visibook is awesome. My entire studio was.
Social Media Security: Understanding how to keep yourself safe.
Digital Safety City of Edinburgh Council Digital Learning Team.
Information Security.
Why API?.
Implicit Differentiation
Written by Cheron Verster
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Saturday, January 27 & Sunday, January 28
Product Pitch Template
Solve: 1. 4<
SMB practice development: Security play
A Patient has the Right to…..
Barack Obama !!!! Paola N. 13 8th Grade Period 6, Mrs. Ward.
GDPR (General Data Protection Regulation)
YOUR TITLE CHILDRENS’ DAY HOME ABOUT US BLOG CONTACT
مديريت موثر جلسات Running a Meeting that Works
YOUR TITLE CHILDRENS’ DAY HOME ABOUT US BLOG CONTACT
By The Data Protection Commissioner
Session III: Developments in the Post-Crisis Era
I (do not) consent to behavioural advertising
Participating in Meetings
CONTACT US My Best Natural Health
MOF Update Community Design
How to solve financial problem when we are unemployed?
Putting a face to a name: students’ use of profiles in VLE forums
Unwritten rules, cultural norms, and crossing cultures
BMS iPad Rules.
Financial (cyber) Security
Tips for classroom presentations
Privacy & Interfederation
ISOC Tanzania IoT Profile
Online Safety; Privacy and Sharing
Presentation transcript:

The API economy will bring data-sharing power to the people Eve Maler (@xmlgrrl)

Notice and consent at the time of the request for access are a WEAK method of ensuring user privacy.

Context, control, choice, and respect. Notice and consent don’t cut it.

my sharing rules my personal profile my financial data my photos my health data my credit score

From different sources

For “whitelisting” apps I want to use For requiring others to meet my Ts & Cs

?

It’s not just about “privacy” – it’s about selective sharing We have many reasons to share data with apps we use, and with other people/orgs Run-time consent is weak, but proactive consent directives and central consoles give us power The API economy accidentally solved for security and user consent; let’s run with this chance @xmlgrrl @UMAWG tinyurl.com/umawg Thanks!