1 Understanding and Defending Big Data Presented to International Association of Privacy Professionals Princeton, New Jersey KnowledgeNet December 5, 2012 Mark S. Melodia, Paul Bond,
2 Understanding and Defending Big Data What is Big Data? Why is it under attack? What has the result been to date?
3 What is Big Data? Roughly 90% of all the digital data in the world has been created in the last two years. These data sets are: very large, even by modern standards, diverse, encompassing many data elements, often relating to different topics, and unstructured frequently, the data sets are really data dumps.
4 What is Big Data? Databases often includes non-traditional types of information. Data is collected and analyzed in closer-toreal-time than ever before. Companies are adopting new tools and processes.
5 What is Big Data? Better analytics have made data sets more valuable. Investors demand granular details on what information assets are held see Facebook IPO and other 2012 offerings. Per IBM s 2012 report, Analytics: The Real- World Use of Data, 75% of companies use or intend to use Big Data solutions.
6 What is Big Data? For example, when consumers drive the Ford Focus, an electric car, they generate driving data used by: Ford engineers to improve car design, Utilities to decide on choosing locations for charging stations, Traffic planners to speed up traffic flow.
7 What is Big Data? Other use cases: Health insurance plans use big data to make better coverage decisions and improve patient outcomes Epidemiologists can track the outbreak of diseases by monitoring online activity Use of Big Data can greatly improve the effectiveness of fraud detection, acting in real-time and drawing on multiple channels Studios track social media minute-by-minute as people react to movies playing on opening weekend.
8 What is Big Data? Other use cases: Improving the effectiveness of power grids by monitoring of smart meters Better tailoring advertisements to consumers: Online Over the phone (determining which upsell to try based on market segment information) And, for example, in-store (changing digital displays based on facial recognition) Better understanding customers and potential customers
9 Where Does Big Data Come From? Social media, online game worlds, and other self-expressive activity Other online activity that leaves a trail Offline activity that is tied into information streams Sensors and the Internet of Things.
10 Examples of Big Data Sources Online, Intentionally Expressive Conduct People feed into Big Data by what they do and say in online communities Through social network aggregation platforms, there is a multiplier effect of communications Social networks and game worlds capture a large amount of diverse interaction.
11 Examples of Big Data Sources Online, Intentional Use of Social and Game Networks Users don t just speak, they also: Say which brands they like Show which ideas they agree with Map out networks of friends and family Indicate social status Volunteer where they come from Make purchases Send gifts Calendar important upcoming dates in their lives.
12 Examples of Big Data Sources Online, Intentionally Expressive Conduct The wide variety of social media sites show the diversity of information captured, as well as how unstructured such information can be. Social media sites can be; General Use (e.g., Facebook, MySpace, Google+) Professional (e.g., LinkedIn) Mostly text-based (e.g., Twitter) Mostly visual (e.g., Pinterest, Instagram) Location-based (e.g., FourSquare) Question and answer (e.g., Quora) Debate (e.g., Debate.org) Online game worlds (e.g., World of Warcraft)
13 Examples of Big Data Sources Online, Intentional Use of Other Expressive Outlets In addition to participating in social media, consumers are creating more substantive, personal content: Multi-media (e.g., YouTube) Extended commentary (e.g., Tumblr, Reddit) Reviews (e.g., imdb, Amazon, goodreads, Yelp) Blogging and news aggregation.
14 Examples of Big Data Sources Conduct Not Intended to Be Expressive Internet searches (many of which are now performed through social media) Online activity: creating information stored on server logs generating information stored in cookies resulting in the user s receipt of a pixel or web beacon
15 In Addition, People Engage in Online Conduct Not Intended to Be Expressive, But Which Is Telling Purchases online can result in the creation of device prints for security Purchases online that can be processed by payment card networks Internet browsing activity can be logged Pulling up pages with social media plug-ins may tell social media sites where you are Accessing communications over other digital channels may create a trail: Cable viewing habits Streaming of online music or other multi-media
16 Offline Conduct Can Be Swept Into Big Data Location activity can be tracked with GPS-enabled devices Purchases with payment cards, or use of automatic payment devices Having a smart meter monitor energy consumption over time Filing court records or property records Walking past a monitor capable of facial recognition Driving past a monitor capable of license plate recognition Having an implanted device that sends information back to its manufacturer
17 Why is Big Data Under Attack? Anxiety Past failures of anonymization Concerns regarding how the profits of Big Data will be shared Additional concerns
18 Fear of Big Data And An Effort to Ward It Off
19 Facebook Privacy Notice Hoax This notice is a hoax Every so often, it spreads like wildfire over Facebook Even after being debunked month after month People want to believe there is a simple solution.
20 Failures of Anonymization Privacy compliance concerns can chill adoption of Big Data solutions. Privacy focuses on personal information. So to get out of the privacy box, many companies rely on anonymization or psuedonomyziation. This approach offers significant comfort, but is not fail-safe.
21 Anonymization/Psuedonymization: Offers Significant Comfort in Principle GLBA excludes aggregate information or blind data from its privacy rules HIPAA has well-developed de-identification procedures In its report, Protecting Consumer Privacy in an Era of Rapid Change, the FTC also excluded such information: as long as (1) a given data set is not reasonably identifiable, (2) the company publicly commits not to re-identify it, and (3) the company requires any downstream users of the data to keep it in de-identified form, that data will fall outside the scope of the framework.
22 AOL Records Re-Identified Based On The Content of Searches Controls can fail. AOL released 20 million search records to the academic community in pseudonymous form. Journalists and researchers quickly re-identified individual users by name, using tells in searches. The release had already been mirrored all around the world, and could not be pulled back. This privacy event prompted a class action suit against AOL that lasted from 2006 to 2010.
23 Netflix Records Re-identified Based On Public Data At Other Film Websites Netflix released pseudonymous viewing records and reviews, as part of a contest to see who can improve search algorithms. Some academics compared the Netflix data with information on the Internet Movie Database. Since many movie lovers are on both, the researchers were able to deduce to the name of many Netflix users and see their viewing habits. Like AOL s release, the result was a class action against the releasing party, and a reduced public belief in psuedonymization.
24 Touched By A Flash Cookie: Tracking Litigation Adobe Flash video works, in part, but putting a Flash cookie onto the user s computer. That Flash cookie is not deleted when the user deletes browser cookies. Ad networks quickly realized the Flash cookie could be used to identify a device uniquely, and in a way that the user would be unlikely to address. Class actions followed against ad networks, resulting in settlements. Next, plaintiffs attorneys sued both ad networks and brands who used them in the same action resulting in a quick dismissal of the brands with prejudice.
25 Touched By A Flash Cookie: Tracking Litigation A rash of class action lawsuits have been filed against national brands in Missouri and Arkansas without naming the ad networks or third party trackers as defendants at all. The Complaints allege generally that the defendants collect information wrongfully through Flash cookies, and share it with third parties. In this and other litigation, the plaintiff s class action bar considers it irrelevant whether a name is connected with any cookie-generated information: Plaintiffs assume any data subject will be re-identified in the end, by Big Data tools And Plaintiffs assert that even a device-linked identifier is enough to trigger privacy protection requirements.
26 Opposition to Big Data From A Consumer Protection Point of View Many suits have been brought by groups of individuals who feel that companies shouldn t profit from personal information. Those individuals have sought compensation for the value of their data as a marketing or analytics tool. So far, such suits for the value of personal information have not gained much ground, as described in the slides below. Despite the failure of such litigation, regulatory pressure continues unabated.
27 Additional Concerns: Web-lining The Bipartisan Congressional Privacy Caucus posed a pointed question to 12 supposed data brokers earlier this year, asking for: Detailed information of what information each collected, stored, and use, potentially extend far beyond rage, race, and sex Whether that information is used to score individuals for purposes of offering access to education, healthcare, employment, and other economic opportunities The term the Caucus used for this scoring is web-lining, with explicit comparison to the prohibited, discriminatory practice of redlining that has caused so much litigation against mortgage companies and brokers.
28 Additional Concerns: Civil Liberties Governments and private industry routinely share information and cooperate with analytic projects There can be a negative public reaction to such projects, as evidenced by the costly NSA/Wiretap litigation In a recent Supreme Court case involving the use of GPS trackers, the Court noted that the device had sent more than 2,000 pages of locational data over 28 days, a level of surveillance that was not reasonable. United States v. Antoine Jones, 132 S. Ct. 945 (2012). The volume of information at issue may start to be one index of the reasonableness of government action.
29 Additional Concerns: Rights To Access And Duty To Destroy Because big data is large, diverse, and unstructured, it is correspondingly more difficult to search. Much of the data stored still consists of icebergs blocks of data from which there is no practical way to draw intelligence. Yet, there is a growing push to give information subjects access rights to all information about them on demand. The right to access, joined with the nascent right to be forgotten, will become all the more complex to accomplish in the Big Data era.
30 What Has The Result Been To Date?: For the most part, Courts have not stymied the collection, use, and re-use of information key to Big Data Objections that consumers have a right to more directly benefit from personal information have been largely unsuccessful. But litigation continues, and regulatory attention is at an all-time high.
31 In re Jetblue Airways Corp. Privacy Litigation, 379 F.Supp.2d 299 (E.D.N.Y. 2005). In general, information maintained by a company about an individual is not considered an economic asset of the individual. In Jetblue, airline passengers sued an airline for unlawfully transferring their personal information for use in a federally-funded study on military base security. Id. at 303. The court found that there was no support for the proposition that an individual passenger's personal information has or had any compensable value in the economy at large, and hence plaintiffs stated no actual damages.
32 In re DoubleClick Inc. Privacy Litigation, 154 F.Supp.2d 497, 525 (S.D.N.Y. 2001). Courts have also resisted claims that consumers should be compensated for the value of information about their online activity. [A]lthough demographic information is valued highly the value of its collection has never been considered a economic loss to the subject. Demographic information is constantly collected on all consumers by marketers, mail-order catalogues and retailers. However, we are unaware of any court that has held the value of this collected information constitutes damage to consumers or unjust enrichment to collectors.
33 CVS Caremark and Walgreens Cases There have even been suits about the resale of properly deidentified data sets, mainly involving pharmacy-level prescription data. These, too, have been rebuffed. Under the circumstances the plaintiffs could have no reasonable expectation of being compensated for the information related to that transaction [filling a prescription], because that information carries with it no compensable value at the individual level. Steinberg v. CVS Caremark Corp., 2012 WL at *9-10 (E.D. Pa. 2012). the sale of de-identified prescription data does not carry a compensable value to consumers, and thus plaintiff had not shown that he was harmed by defendants actions. Todd Murphy v. Walgreen Corporation, et al., docketed as CU- BT-CTL in the Superior Court of California, San Diego County (Minute Order of May 9, 2012).
34 Sorrell v. IMS Health Inc. United States Supreme Court case striking down a law designed to preclude certain analysis of Big Data sets Several states passed laws limiting the use of data about the prescription-writing habits of physicians. The laws prohibited companies like IMS from buying that information to derive actionable marketing intelligence for outreach to physicians. The Supreme Court found that these laws violated the First Amendment by limiting speech in a way that hinged on the content of the speech. In so doing, it gave short shrift to claims that outreach violated physician privacy.
35 However Privacy class actions continue to be filed en masse: Many of them presupposing that personal information has economic value Many of them presupposing that all information collected will eventually be re-linked to a person The FTC continues to evidence an interest in more fully regulating major platform providers and information brokers, as well as casting a wider net with existing statutes like the FCRA and COPPA The actual implementation of Big Data analysis raises a host of legal questions contracting, tax, cross-border transfer, insurance, anti-trust as to which very little has yet been settled.
Zep Inc.: Global Online Privacy Notice Effective Date: March 26, 2015 We at Zep Inc., along with our affiliates (collectively, Zep ), respect your concerns about privacy. This Global Online Privacy Notice
NBA Math Hoops Privacy Statement and Children s Privacy Statement Updated October 17, 2013. This Privacy Statement applies to the web sites mobile applications provided by Learn Fresh Education Co. (collectively,
What You Need to Know Before Distributing Your Infographic Improve your audience outreach efforts by learning why and how to use the best social, owned and earned platforms available. Targeting specific
Central Ohio s Small Business Resource Who is @Tonya Wilson? Program Coordinator for the Ohio SBDC at Columbus State Manage SBDC marketing, branding, outreach, digital media & events AAS Multimedia Production
Database Marketing Fall 2016 Web analytics (incl real-time data) Collaborative filtering Facebook advertising Mobile marketing Slide set 8 1 Web analytics: Data Collected via the Internet Customers can
Big Data Analytics Empowering SME s to think and act Author: Haricharan Mylaraiah Chief Operating Officer 1320 Greenway Drive, Irving, TX 75038 Contents Executive Summary... 3 Introduction... 4 What Big
Data Use Policy Revision 1.1 03/09/2014 Ramos M. Mays, Chief Technology Officer Table of Contents 1. Information Sources... 3 2. Information we receive... 3 3. How we use information... 4 4. How long we
NOTICE OF CLASS ACTION SETTLEMENT GRECO V. SELECTION MANAGEMENT SYSTEMS, INC. San Diego Superior Court Case No. 37-2014-00085074-CU-BT-CTL The Superior Court has authorized this notice. This is not a solicitation
Big Data & The Law Will Landecker & John Rake Portland Eugene Salem harrang.com 800.315.4172 2014 Harrang Long Gary Rudnick P.C. Introduction Clients need data to solve problems or predict results. Attorneys
This article first appeared in the October 2010 issue of The Corporate Counselor. Insurance Coverage In Consumer Class Actions John W. McGuinness and Justin F. Lavella The business world is an increasingly
ENTERTAINMENT, MEDIA & ADVERTISING MARKET RESEARCH HANDBOOK 2015-2016 Published by Richard K. Miller & Associates December 2014; 355 pages; ISBN # 9781577832010 PART I: MARKET SUMMARY 1 MARKET ASSESSMENT:
Social media importance in Businesses Social media networks were a novelty 5 years ago, but today their importance is no longer debated. Yes, businesses have definitely realized the power of social media
Demystifying Digital Digital Marketing 101 Mal Chia Digital Account Director @malchia @communikateetal Slides will be emailed after the session 2 Current state (and where have we come from) 15.7 million
Phone: 310.557.2009 Fax: 310.551.0283 Email: email@example.com Parry Cameron has over twenty-three years experience in commercial and business litigation at both the trial and appellate levels. He
How to Write a LinkedIn Profile Use LinkedIn to build a powerful personal brand and generate new business. David Adams Copyright 2015 Published by Revenue Wise, Inc. 1000 Fourth Street, Suite 595 San Rafael,
Before the Federal Trade Commission Washington, DC 20580 In the Matter of ) ) DoubleClick Inc. ) ) Complaint and Request for Injunction, Request for Investigation and for Other Relief INTRODUCTION 1. This
Qualcomm Retail Solutions Inc. GIMBAL PLATFORM DIGITAL INSIGHTS INTO THE PHYSICAL WORLD The Advantages of Gimbal for Retailers, Brands and Application Developers Revision 1 November 2013 1 Table of Contents
Chapter 2 The Elements of Internet Marketing Everyone is concerned about how to market their business in the new age of the internet. In the early years, just having a website was enough. Soon it became
Video Marketing for Restaurants Restaurants are Using Online Video to Reach More Consumers and Boost Brand Impact Online video is becoming ever more present in consumer life therefore businesses have started
MARKETING 360: DEVELOPING AN INTEGRATED MARKETING PLAN How a multimedia platform can drive the success of your business If you ve ever heard a good piano player, you know that a solo act can create beautiful
Talen Energy Corporation Website Privacy Notice Talen Energy Corporation and its affiliates (collectively referred to in this notice as Talen Energy, we, us, our and other similar pronouns), have developed
Presented by Spyros Mygdanis & Giorgos Kalaitzis About this presentation 1. Websites Elements of a successful website 2. Content 3. Internet Marketing Channels 4. Building your online strategy 1. Websites
Are You Ready for Big Data? Jim Gallo National Director, Business Analytics April 10, 2013 Agenda What is Big Data? How do you leverage Big Data in your company? How do you prepare for a Big Data initiative?
Are You Ready for Big Data? Jim Gallo National Director, Business Analytics February 11, 2013 Agenda What is Big Data? How do you leverage Big Data in your company? How do you prepare for a Big Data initiative?
DEALING WITH POLICE MISCONDUCT OR EXCESSIVE FORCE IN WISCONSIN Written by: Jonathan S. Safran This guide attempts to answer some of the most common questions and provides a basic understanding of the steps
Healthcare meets Social Networking 2014 The Good, Bad & Difficult What s going on in 2014. Pinkman Creative Paul Pinkman, owner of Paul Pinkman Creative Design 20 + years in online media development Focus
Your Privacy Center Your privacy is our priority. At Discover, our actions and decisions are guided by our mission to help people achieve a brighter financial future. And when it comes to your privacy,
UNDERSTANDING BEACONS A GUIDE TO BEACON TECHNOLOGIES By Greg Sterling, Jules Polonetsky & Stephany Fan Introduction UNDERSTANDING BEACONS LOCAL SEARCH ASSOCIATION & FUTURE OF PRIVACY FORUM 1 December 2014
5 KEYS TO CREATING AWESOME CONTENT FOR SOCIAL CAMPAIGNS PRESENTED BY Satisfying the consumer s need for useful content requires an authentic, organic, and dedicated voice that leverages the reputations
Pretrial Practice 2015 4:00 P.M. PANEL TOPIC SETTLEMENT AGGREGATE SETTLEMENT CONCERNS May 12, 2015 New York, New York Kelly Strange Crawford, Esq. AGGREGATE PROCEEDINGS Class Actions SINGLE LAW SUIT PROCEEDING
Social Intelligence Report Adobe Digital Index Q2 2015 Key Insights Paid Social Cost per click (CPC) rates for Facebook are flat YoY while impressions fell by half and click through rates doubled 51% of
MARKETING AND MEDIA RELATIONS Social Media Guidelines Emporia State University Last Updated: July 09, 2011 Introduction What is Social Media? Social media consists of web-based tools used to interact with
General Statement Lotlinx has two separate marketing/advertising functions. Firstly, we market our customers (auto dealers) inventory to shoppers currently searching the Internet with the intent to purchase,
IN THE COURT OF COMMON PLEAS OF PHILADELPHIA COUNTY FIRST JUDICIAL DISTRICT OF PENNSYLVANIA CIVIL TRIAL DIVISION KAREN M. McSHANE, et al., FEBRUARY TERM, 2003 Plaintiffs, No. 01117 v. Control No. 070576
The Evolving Legal Framework Regulating Commercial Data Security Standards By Bret Cohen Late one evening in December 2010, an employee of a commercial blood bank left his office with four backup tapes
Legal Issues Associated with Augmented Reality 2014 IP and the Internet Conference June 12, 2014 Presented by: Ben Esplin, Partner Pillsbury Winthrop Shaw Pittman LLP What is Augmented Reality? Augmentation
Content is King, Strategy is Queen A Springboard E-Book Content is King Advances in Web-based technology have ushered in a new era of content creation. Barrier to entry for publishers is lower than ever
Privacy and Information Security Law Randy Canis CLASS 15 Marketing and Tracking; Cookies and Transactional Marketing 1 Domestic Cookies Litigation 2 2001 S.D.NY Issue Do the use of advertising cookies
The Matrix Reloaded: Cybersecurity and Data Protection for Employers Jodi D. Taylor Why Talk About This Now? Landscape is changing Enforcement by federal and state governments on the rise Legislation on
Data Protection in the United States Bruce E. H. Johnson Chair, Privacy and Security Group Davis Wright Tremaine LLP Pacific Rim Advisory Council Singapore, October 18, 2011 Overview of US Privacy Regulations
Employer Liability for Employee Conduct by Lisa Mann 05-01-2000 EMPLOYER LIABILITY FOR EMPLOYEE CONDUCT: When Does An Employer Have to Pay? by Lisa Mann Modrall, Sperling, Roehl, Harris & Sisk, P.A. Employers
Social Media for Business and Professional Use An Introduction to Queens Library s Presence on Today s Most Popular Online Communities Why Should My Company Care About Social Media? It s a global phenomenon:
Guide to Social Marketing for Tourist Destinations & Travel Agents Introduction There has been a dramatic increase in the number of people who are becoming self-reliant travelers; using online communities,
Consumer Reaction to Advisor Use of Social Networking Presentation for LIMRA Marketing & Research Conference May 2013 Mathew Greenwald & Associates BACKGROUND: Multi-Sponsor Surveys & Greenwald Research
6 BEST PRACTICES for Influencer Marketing 1 THE INCREASING IMPORTANCE OF INFLUENCER MARKETING Influencer marketing isn t a new concept. Getting the right people excited, engaged, and talking about your
TIP SHEET HOW TO GET SOCIAL MEDIA INFLUENCERS TALKING ABOUT YOU A social media influencer is someone who talks positively about your brand and products on Twitter, Facebook, Google+, Pinterest or any other
M-112997 Rev 07/2015 FACTS Why? What? How? WHAT DOES CREDIT ONE BANK, N.A. DO WITH YOUR PERSONAL INFORMATION? Financial companies choose how they share your personal information. Federal law gives consumers
Cookies Compliance Advisory Note: this is an advisory notice that summarises the current position of the Article 29 Working Group and makes suggestions as to how organisations might practically achieve
Setting the Record Straight: Press Releases that Stand Out in the Digital Age Press releases are among the most widely used tools that PR professionals have in their tool kit, helping their clients win
CDT ISSUE BRIEF ON FEDERAL DATA BREACH NOTIFICATION LEGISLATION January 27, 2015 A September 2014 Ponemon study found that 60% of U.S. companies have experienced more than one data breach in the past two
Healthcare Marketing White Paper 2016 Healthcare Marketing Trends Speed and personalization of content are popular themes in 2016 H E ALTH C A R E M A R K ETI N G TRE NDS 2016 HEALTHCARE MARKETING TRENDS
Social Media Statement Social media is changing the way our society interacts and engages in conversation and dialogue. It has become an important and influential communication channel for the University.
Social Media Strategy: The Beginners Guide to Strategy Success in 7 Steps A Simple Guide In association with: Chapter Title Contents Page Page 2 What is Social Media...3 What is a Social Media Strategy