Download presentation
Presentation is loading. Please wait.
Published byBridget Black Modified over 8 years ago
1
2014 Visualizing Privacy Morgan Eisler (@mogasaur) UX Researcher 10/09/14 #GHC14 2014
5
TL;DR
6
2014
8
Users With Data Exposed Data Breaches
9
2014
12
The NTIA Code of Conduct Data Collected: −Biometrics −Browser History −Phone or Text Log −Contacts −Financial Info −Health, medical, or therapy info −Location −User Files
13
2014 The NTIA Code of Conduct Data Shared: −Ad Networks −Carriers −Consumer Data Resellers −Data Analytics Providers −Government Entities −Operating Systems and Platforms −Other Apps −Social Networks
14
2014
16
“I think this signifies a company that is very conscientious. A company that cares about people's privacy and is aware of people's concerns about how their information will be gathered, shared, and used.” - Lookout Customer
17
2014 “I think if a privacy policy was that way then everybody’s policy would get read. It would help a lot of people out if it looked like this.” - Lookout Customer
18
2014
23
Final Thoughts Be more transparent Inspire trust Improve comprehension Keep in mind: −A short form policy is not a replacement for a full-length policy −Make sure that users understand that a short form policy is just that
24
2014 References 2013, 9 May.“More than 2 billion people use the internet, here’s what they’re up to (inforgraphic)”. The Cultureist. Retrieved from. O’Toole, James. 2014, 28 February. “Mobile apps overtake PC internet usage in U.S.”. CNN Money. Retrieved from http://money.cnn.com/2014/02/28/technology/ mobile/mobile-apps-internet/>.
25
2014 References Ezor, Jonathan I. 2009, 12 August. “Why your web site’s privacy policy matters more than you think.” Bloomberg Businessweek. Retrieved from. ,2012. “ Global Internet User Survey Summary Report”. The Internet Society. Retrieved from.
26
2014 References 2009, 10 March. “TRUSTe survey findings indicate majority of small business neglect vital privacy measures” [press release]. TRUSTe. Retrieved from. Bilton, Nick. 2010, 12 May. “Price of Facebook privacy? Start clicking.” The New York Times. Retrieved from.
27
2014 References Vedantam, Shankar. 2012, 19 April. “To read all those web privacy policies, just take a month off work.” NPR. Retrieved from. McDonald, Aleecia M. & Faith Cranor, Lorrie, 2008. “The cost of reading privacy policies.” I/S: A Journal of Law and Policy for the Information Society, 2008 Privacy Year in Review Issue. Retrieved from.
28
2014 References Westerman, Ilana. 2013, 3 June. “What misconceptions do consumers have about privacy?” IAPP. Retrieved from. Weise, Elizabeth. 2014, 24 September. “43% of companies had a data breach in the past year.” USA Today. Retrieved from.
29
2014 References Pagliery, Jose. 2014, 28 May. “Half of American adults hacked this year.” CNN Money. Retrieved from. Fiegerman, Seth. 2014, 20 June. “Yo gets hacked.” Mashable. Retrieved from.
30
2014 References 2013, 25 July. “Short Form Notice Code of Conduct to Promote Transparency in Mobile App Practices”. The National Telecommunications and Information Administration. Retrieved from. 2014, 24 July. “Apps Alliance and Intuit partner to release new app privacy tool” [press release]. Application Developers Alliance. Retrieved from.
31
2014 Links to Tools on GitHub Lookout: −https://github.com/lookout/private-parts Intuit/TRUSTe: − https://github.com/appsalliance/privacynotices Mozilla: − https://github.com/flamsmark/privacy-policy- template
32
2014 Contact/Feedback Questions? MORGAN.EISLER@LOOKOUT.COM or Lookout Booth at the Career Fair Rate and Review the session using the GHC Mobile App To download visit www.gracehopper.org
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.