Personal Information and consent - The New Normal

Size: px
Start display at page:

Download "Personal Information and consent - The New Normal"

Transcription

1 Predictive Analytics, Privacy & You: Creeping Up On Creepy Christopher Surdak, JD, Global Subject Matter Expert 13 February, 2015 Copyright Copyright Hewlett-Packard Development Company, Company, L.P. L.P. The information The information contained contained herein herein is subject is subject to change to change without without notice. notice.

2 Your 15 Minutes of Fame? 2

3 How Are Security and Privacy Different? Handling Mechanisms Individual Rights Fairness of Use Notice Choice Access Accountability Security Privacy Security Protection Mechanisms Authentication Access controls Availability Confidentiality Integrity Retention Storage Backup Incident response Recovery 3 Many Privacy Laws Also Restrict Trans-Border Data Flow of Personal Information

4 Wherefore Art Thou, Privacy? We are: Mobile: Connectivity, every-where, every-when Connected: All of our relationships, business, family, personal, are managed through Social Media Exposed: People share remarkable details about themselves online Dependent: Technologies ingrained into our very lives We are: Vulnerable: Constant, persistent attacks against our information Product: Our information is the basis of an entire economic structure Unarmed: We have few tools to manage our digital lives 4 Unaware: Of our actual level of exposure and vulnerability

5 Changing Expectations USC Annenberg Center for the Digital Future: 70% of Millennials say no one should have access to their data or online behavior. Yet: 25% will trade it away for more relevant advertising 56% will share their location for coupons or deals 51% say they ll share information with companies if they get something in return. 5

6 The Privacy Paradox I demand deep personalization What I want Where I want When I want How I want Pick *ONE* because you can t have both! I expect privacy Anonymity Freedom Protection

7 What is for sale? Top 6 Companies in the World, by Market Capitalization, June 2014 (Source, PwC) Rank Who? What do they Sell? Phones? Oil Nothing? Money Oil Stuff

8 YOU ARE THE PRODUCT! Companies like Google, Facebook, Yahoo, Twitter and Microsoft (Bing) spend tens of billions of dollars per year on servers, storage, networking and electricity How much did you pay to use their services?

9 Changing Expectations

10 Six Challenges of The New Normal Quality: Consumers expect perfection. Deliver less and your customers will abandon you forever. Ubiquity: Globalization means anything, anywhere, anytime. Anything less is unacceptable. Immediacy: Immediate gratification. There s an app for that instantly, predictively. Disengagement: Don t build, don t run, don t outsource, don t care. I only buy a result. Intimacy: Customers hunger for other forms of connectedness. Feeling like part of a community will be even more important as our needs are met more anonymously. Purpose: Support customers need for and sense of purpose. 10

11 The Customer Engagement Continuum Reactive Responsive Predictive Persuasive Timing: Past Present Future Future Topic: What has happened What is happening What might happen What should happen Purpose: Understand the Past Understand the Present Understand the Future Change the Future Value: What worked before may work again Is there an opportunity right now Is there an opportunity coming Can I create an opportunity 11

12 Creeping Towards Creepy 12

13 What s the Issue, What s at Stake? Intimacy Predictive Shipping Creepiness Needs Anticipation Behavior Manipulation Reverse Grouponing Behavior Modeling E- Coupons Liking Suggestion lists I-Coupons Geo- Tracking Cookies The best companies must walk the razor s edge between these two extremes

14 Innovation Outpaces Morality? Like this if you feel violated 14

15 Why Care? What if analytics and predictive technologies can change customer behavior 1%? In reality, these technologies easily double or triple results Can changes to the customer environs double their purchases? Triple? Do you know? Cha-Ching!!! $18 billion in increased revenue!

16 The Big Data balance sheet Monetize Differentiate Personalize Monitor Meter Optimize Predict Assets Liabilities Regulate Comply Control Secure Address Ensure and more 16

17 Are the Kids Alright? High School

18 And College?

19 And After That?

20 Everything, Forever There is NO DELETE on the Internet! The current trend is to analyze what you type, BEFORE you send it! When someone looks you up, they don t see how old the information is You CANNOT take it back!

21 Is it Really Possible to Anonymise Data? Many regulations require that Personal Identifying Information (PII) be anonymised before use Anonymised Set 1 for other purposes: PIPEDA FOIPPA US HIPPA Complete Data Anonymised Set 2 Consolidated Data Reanimated Data Anonymised Data 21

22 BC PIPA Implicit consent 8 (1) An individual is deemed to consent to the collection, use or disclosure of personal information by Part Provision 3 Consent of consent 7 an (1) organization An individual for a purpose has not if given consent under this Act to an organization Consent required unless obvious to a reasonable person, and 6 (1) (a) An the organization must has provided not the individual with the information (a) collect required purpose. personal under section information 10 (1), about andan individual, (b) use (b) personal the individual's information consent about is provided an individual, in accordance or with this Act. (a) at the time the consent is deemed to be given, the purpose would be considered to be (b) the individual voluntarily provides the personal information to the organization for that (2) An individual is deemed to consent to the collection, use or disclosure of personal information for the purpose of his or her enrollment or coverage under an insurance, pension, benefit or similar plan, policy or contract if he or she (2) (c) An disclose personal information about an individual. (a) organization is a beneficiary must or has not, an interest as a condition as an insured of under supplying the plan, a product policy or contract, or service, and (2) require Subsection (b) an is not individual the applicant (1) does to consent for the not plan, apply to policy the collection, ifor contract. use or disclosure of (a) personal the individual information gives beyond consent what to the is necessary collection, to use provide or disclosure, the product or purposes if service. (b) this Act authorizes the collection, use or disclosure without the consent of the individual, or (3) If an information organization for those attempts purposes, to obtain consent for collecting, using or (c) disclosing this Act personal deems the information collection, by use or disclosure to be consented to by the (a) individual. providing false or misleading information respecting the collection, use collection, or disclosure use or disclosure, of the and information, or (b) using deceptive or misleading practices sensitivity of the personal information in the circumstances. any consent provided in those circumstances is not validly given. (3) An organization may collect, use or disclose personal information about an individual for specified (a) the organization provides the individual with a notice, in a form the individual can reasonably be considered to understand, that it intends to collect, use or disclose the individual's personal (b) the organization gives the individual a reasonable opportunity to decline within a reasonable time to have his or her personal information collected, used or disclosed for those purposes, (c) the individual does not decline, within the time allowed under paragraph (b), the proposed (d) the collection, use or disclosure of personal information is reasonable having regard to the (4) Subsection (1) does not authorize an organization to collect, use or disclose personal information for a different purpose than the purpose to which that subsection applies.

23 Do You Read Your EULAs? The Language in End User License Agreements (EULAs) are broad, open to a range of interpretations, and are designed to allow vendors to make money from your data 23

24 FaceBook EULA As of 12 February, 2015 By Amendments Sharing using Your Content or and accessing Information Facebook Special Provisions Applicable to Users Outside the United States About Advertisements and Other Commercial Content Served or Enhanced We ll notify by Facebook you before we make changes to these terms and give you We strive to create a global community with consistent standards for everyone, the opportunity to review and comment on the revised terms before but Services, we also strive to you respect agree local laws. The that following we provisions can collect apply to users and non-users use who such interact content with Facebook outside and the information United States: in You consent to having your personal data transferred to and processed in You own all of the content and information you post on Facebook, and you can Our control goal continuing how is to it deliver is shared to use advertising through our Services. and yourother privacy commercial and application or sponsored settings. content In that is valuable addition: If we to make our users changes and advertisers. to policies, In order guidelines to help or us other do that, terms you agree referenced to the in following: For incorporated content that is by covered this Statement, by intellectual we may property provide rights, notice like photos on the and Site accordance the You videos United give (IP us States. content), permission you to specifically use your name, give us profile the following picture, content, permission, and Governance Page. with the Data Policy as information subject to your in connection privacyand with application commercial, settings: sponsored, you grant or related us a nonexclusive, content (such amended Your as continued a brand you transferable, use like) from of served the sub-licensable, Facebook time or enhanced to Services, royalty-free, by time. us. This following means, worldwide notice for example, license of the to that changes you use permit to any our IP a content terms, business policies that or you other post or entity guidelines, on to or pay in connection us constitutes to display with your Facebook your name acceptance and/or (IP of our profile License). amended picture This terms, with IP License your policies content ends or or when guidelines. information, you delete without your IP any content compensation or your to you. account If you unless have selected your content a specific has been audience shared for with your others, content and or they information, have we Facebook if you are prohibited from receiving products, services, or will not respect deleted your it. choice when we use it. software We do not originating give your content from the or information United States. to advertisers without your consent. You understand that we may not always identify paid services and communications as such. If you are located in a country embargoed by the United States, or are on the U.S. Treasury Department's list of Specially Designated Nationals you will not engage in commercial activities on Facebook (such as advertising or payments) or operate a Platform application or website. You will not use

25 Google s EULA From Support.Google.com; 8/11/2014 Contacts/Calendar Phone Photos/Media/Files Location Camera/Microphone Identity An An Device An app app can & can app use use history files your phone device's data and/or stored contacts location. camera its call your and/or history. device. calendar microphone. information. An An app app can can use use your one account or more of and/or the following: profile information on your Note: Contacts Photos/Media/Files Location Camera Depending access and calendar microphone may access your include: access plan, access may may you include may include include be the the charged ability ability the to: ability by to: your to: carrier device. for Read Approximate Take phone your the sensitive pictures calls. contents contacts location and log of data videos your (network-based) USB storage (example: SD card) Identity Retrieve your access system contacts may internal include state the ability to: Phone Modify Precise Record access or location audio delete may (GPS the include contents and the network-based) of ability your to: USB storage Find Read accounts calendar your web on events bookmarks the device Directly Format Access Record call external extra video phone location storage numbers; plus provider confidential and this commands history may cost information you money Read Add Retrieve or your modify running own calendar contact apps card events (example: and send name and to guests contact Write Mount GPS call access or log unmount (example: external call history) storage without information) owners Read Cellular call knowledge data log settings Modify An app your can own use settings contact card Reroute outgoing calls that control your mobile data Add connection or remove and accounts Modify phone state potentially the data you receive. Make calls without your intervention 25

26 Case Study: License Plate Recognition 26

27 Vehicle Recognition Used in association with ANPR Match Make and/or Model Easy to train Real-time matching Alert or Search for Vehicle without registration Validate database using ANPR result to identify illegal plated vehicles 27

28 Face Recognition Demo: Office Entrance 28

29 Use case Police surveillance 29

30 Use Case Counting and Access control 30

31 What to expect A Framework for Privacy Management Disclosure: Companies would notify consumers in detail what is collected, how frequently, by whom, and how it may be used. Transparency: Consumers would be notified when their data is being used, in real time, to influence their opinions or actions. Recourse: Consumers would be allowed to adjust how their data is used to suit their own comfort level. This would mean no more blanket authorizations when a user downloads an app or signs up for an account. Monitoring: Consumers must be able to confirm that businesses respect their wishes. 31

32 Disruption is Guaranteed Are you disrupting, or being disrupted? 32

33 Thank You M: If you d like to learn more, check out Data Crush, from AMACOM Publishing, getabstract s International Book of the Year, 2014 Also see my columns in European Business Review Magazine, Dataconomy.com and my blog posts on HP.com

ONLINE PRIVACY POLICY

ONLINE PRIVACY POLICY ONLINE PRIVACY POLICY The City of New Westminster is committed to protecting your privacy. Any personal information collected, used or disclosed by the City is in accordance with the Freedom of Information

More information

PRIVACY NOTICE. Last Updated: March 24, 2015

PRIVACY NOTICE. Last Updated: March 24, 2015 PRIVACY NOTICE Your access to and use of this website is governed by the TERMS OF WEBSITE USE and the following PRIVACY NOTICE. Please read them carefully as they constitute a legally binding agreement

More information

ETHICAL ELECTRIC PRIVACY POLICY. Last Revised: December 15, 2015

ETHICAL ELECTRIC PRIVACY POLICY. Last Revised: December 15, 2015 ETHICAL ELECTRIC PRIVACY POLICY Last Revised: December 15, 2015 This policy ("Policy") covers the privacy practices that Ethical Electric, Inc. ("Ethical Electric", "we" or "us") employs with respect to

More information

PRIVACY POLICY. Your Personal Information will be processed by Whistle Sports in the United States.

PRIVACY POLICY. Your Personal Information will be processed by Whistle Sports in the United States. PRIVACY POLICY This Policy was last changed on March 31, 2015. Kids Sports Entertainment, Inc. d/b/a The Whistle ( Whistle Sports ) and its affiliates operate this website, and any and all Whistle Sports

More information

Privacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction

Privacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction Privacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction Welcome! TripleFirrre, LLC, dba Just Seconds Apart knows that safeguarding your privacy is serious business. Your privacy

More information

Android Developer Applications

Android Developer Applications Android Developer Applications January 31, 2013 Contact Departmental Privacy Office U.S. Department of the Interior 1849 C Street NW Mail Stop MIB-7456 Washington, DC 20240 202-208-1605 [email protected]

More information

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS BYOD Bring Your Own Device AUP Authorized Use Policy User includes anyone, including employees, students, and guests, using

More information

BBVA Wallet Application Privacy Policy

BBVA Wallet Application Privacy Policy BBVA Wallet Application Privacy Policy Effective date: September 14, 2015 This Privacy Policy describes our practices related to the use, storage and disclosure of information we collect from or about

More information

Privacy Policy. MSI may collect information from you on a voluntary basis when you:

Privacy Policy. MSI may collect information from you on a voluntary basis when you: Last Updated: January 8, 2015 Privacy Policy Mind Sports International (MSI) respects the privacy rights of our customers and online visitors, and has adopted this privacy policy ("Privacy Policy") to

More information

This agreement applies to all users of Historica Canada websites and other social media tools ( social media tools or social media channels ).

This agreement applies to all users of Historica Canada websites and other social media tools ( social media tools or social media channels ). Social Media Terms of Use Social media is an integral part of Historica Canada s communications efforts, offering an additional model to engage with participants, colleagues, other stakeholders and the

More information

Information Technology Acceptable Use Policy

Information Technology Acceptable Use Policy Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not

More information

NBA Math Hoops Privacy Statement and Children s Privacy Statement Updated October 17, 2013.

NBA Math Hoops Privacy Statement and Children s Privacy Statement Updated October 17, 2013. NBA Math Hoops Privacy Statement and Children s Privacy Statement Updated October 17, 2013. This Privacy Statement applies to the web sites mobile applications provided by Learn Fresh Education Co. (collectively,

More information

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential

More information

Are free Android virus scanners any good?

Are free Android virus scanners any good? Authors: Hendrik Pilz, Steffen Schindler Published: 10. November 2011 Version: 1.1 Copyright 2011 AV-TEST GmbH. All rights reserved. Postal address: Klewitzstr. 7, 39112 Magdeburg, Germany Phone +49 (0)

More information

Information Collected. Type of Information Collected. We may collect two general types of information when you use the Site:

Information Collected. Type of Information Collected. We may collect two general types of information when you use the Site: Privacy Policy (Last revised March 1, 2016) This website is owned and operated by Temple Square Hospitality Corporation ( Operator ). The following Privacy Policy (the Policy ) describes how Operator collects,

More information

Terms of Use The Human Face of Big Data Website

Terms of Use The Human Face of Big Data Website Terms of Use The Human Face of Big Data Website Effective Date: September 12 th, 2012 Welcome to The Human Face of Big Data, a project of Against All Odds Productions ( AAOP ). The Human Face of Big Data

More information

Cloud Computing: Legal Risks and Best Practices

Cloud Computing: Legal Risks and Best Practices Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent

More information

1. The information we collect and how we collect it.

1. The information we collect and how we collect it. PRIVACY POLICY AND YOUR PRIVACY RIGHTS CountySportsZone.com aggregates, reports, and publishes high school sports information for jurisdictions across the state of Maryland. In this Privacy Policy, Affiliates

More information

Website Privacy Policy Statement

Website Privacy Policy Statement Website Privacy Policy Statement This website ( CRSF Website ) is operated by Cal Ripken, Sr. Foundation, Inc. ( Company ) and this policy applies to all websites owned, operated, controlled and otherwise

More information

Acceptable Use Policy Holy Spirit Catholic School

Acceptable Use Policy Holy Spirit Catholic School Acceptable Use Policy Holy Spirit Catholic School For the use of Computers, Mobile Devices, Internet Access, Google Apps for Education Suite, and Internet Applications Definitions User includes anyone,

More information

HUMAN RESOURCES POLICIES & PROCEDURES

HUMAN RESOURCES POLICIES & PROCEDURES HUMAN RESOURCES POLICIES & PROCEDURES Policy title Application IT systems and social networking policy All employees and students CONTENTS PAGE Introduction and scope 2 General points 2 Authorisation to

More information

prevailing of JAMS/Endispute. The arbitrator's award shall be binding and may be entered as a judgment in any court of competent jurisdiction.

prevailing of JAMS/Endispute. The arbitrator's award shall be binding and may be entered as a judgment in any court of competent jurisdiction. Safety Alert Apps, Inc. End User License Agreement By installing and using any of the personal safety app software from Safety Alert Apps, Inc., you are agreeing to be bound by the terms of this End User

More information

PRIVACY POLICY. The effective date of this Privacy Policy is December 15, 2010. Last Updated September 29, 2014. Overview

PRIVACY POLICY. The effective date of this Privacy Policy is December 15, 2010. Last Updated September 29, 2014. Overview PRIVACY POLICY The effective date of this Privacy Policy is December 15, 2010 Last Updated September 29, 2014 Overview The Bay Area Toll Authority (BATA) is committed to ensuring customer privacy and security.

More information

UNILEVER PRIVACY PRINCIPLES UNILEVER PRIVACY POLICY

UNILEVER PRIVACY PRINCIPLES UNILEVER PRIVACY POLICY UNILEVER PRIVACY PRINCIPLES Unilever takes privacy seriously. The following five principles underpin our approach to respecting your privacy: 1. We value the trust that you place in us by giving us your

More information

INTRODUCTION We respect your privacy and are committed to protecting it through our compliance with this privacy policy.

INTRODUCTION We respect your privacy and are committed to protecting it through our compliance with this privacy policy. Privacy Policy Last Modified: July 20, 2015 INTRODUCTION We respect your privacy and are committed to protecting it through our compliance with this privacy policy. This privacy policy describes the types

More information

Comeet Privacy Policy

Comeet Privacy Policy Comeet Privacy Policy Comeet Technologies Inc. ( Comeet or us, our, we ) provides a solution for the management of the information and interviewing of candidates for employment (the Solution ). Comeet

More information

Thank you for visiting this website, which is owned by Essendant Co.

Thank you for visiting this website, which is owned by Essendant Co. Essendant Online Privacy Policy Thank you for visiting this website, which is owned by Essendant Co. Please take a few minutes to review this Policy. It describes how we will collect, use, and share information

More information

Privacy Policy Last Modified: April 3, 2015 1

Privacy Policy Last Modified: April 3, 2015 1 Privacy Policy Last Modified: April 3, 2015 1 Introduction Jamberry Nails, LLC, a Utah limited liability company, U.S.A., (referred to herein as Jamberry, we, us and our ) understands the importance of

More information

Privacy Policy Version 1.0, 1 st of May 2016

Privacy Policy Version 1.0, 1 st of May 2016 Privacy Policy Version 1.0, 1 st of May 2016 THIS PRIVACY POLICY APPLIES TO PERSONAL INFORMATION COLLECTED BY GOCIETY SOLUTIONS FROM USERS OF THE GOCIETY SOLUTIONS APPLICATIONS (GoLivePhone and GoLiveAssist)

More information

Website Privacy Policy Statement. 1519 York Rd Lutherville, MD 21093. We may be reached via email at [email protected].

Website Privacy Policy Statement. 1519 York Rd Lutherville, MD 21093. We may be reached via email at julie@juliereisler.com. Website Privacy Policy Statement This website juliereisler.com is operated by Empowered Living, LLC and this policy applies to all websites owned, operated, controlled and otherwise made available by Company,

More information

Keefo s Design wants to be an integral partner in your success!

Keefo s Design wants to be an integral partner in your success! Get you or your business on the web and let Keefo s Design help you to create an effective and competitive face to the public to get you and your business online! Below is a menu of our website design

More information

Privacy Policy. log in to the Services with social networking credentials;

Privacy Policy. log in to the Services with social networking credentials; Privacy Policy Effective Date: November 20, 2015 This Privacy Policy is incorporated by this reference into the Mobli Media Inc. Terms of Use located at https://www.mobli.com/tou.html (the Terms of Use

More information

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) MYTH: The cyber threat is being exaggerated. FACT: Cyber attacks are a huge threat to American lives, national security,

More information

You must be at least 18 years of age to use our website. By using our website you warrant and represent that you are at least 18 years of age.

You must be at least 18 years of age to use our website. By using our website you warrant and represent that you are at least 18 years of age. TERMS AND CONDITIONS Terms of Website Use 1 Introduction These terms and conditions govern your use of the One Counselling (also referred to in these Terms & Conditions as us, we and our ), website; by

More information

Privacy Policy. Introduction. Scope of Privacy Policy. 1. Definitions

Privacy Policy. Introduction. Scope of Privacy Policy. 1. Definitions Privacy Policy Introduction This Privacy Policy explains what information TORO Limited and its related entities ("TORO") collect about you and why, what we do with that information, how we share it, and

More information

If you have any questions about our privacy practices, please refer to the end of this privacy policy for information on how to contact us.

If you have any questions about our privacy practices, please refer to the end of this privacy policy for information on how to contact us. c4m Privacy Policy Last Modified: July 20, 2015 Colbette II Ltd., Block 1, 195-197 Old Nicosia-Limassol Road, Dali Industrial Zone, Cyprus 2540 (hereinafter "c4m", Colbette we", "our" or "us") is always

More information

Vyve Broadband Website Privacy Policy. What Information About Me Is Collected and Stored?

Vyve Broadband Website Privacy Policy. What Information About Me Is Collected and Stored? Vyve Broadband Website Privacy Policy Effective: July 31, 2015 Vyve Broadband ( Vyve, we, us, our ) is committed to letting you know how we will collect and use your information. This Website Privacy Policy

More information

Advanced Diagnostics Limited ( We ) are committed to protecting and respecting your privacy.

Advanced Diagnostics Limited ( We ) are committed to protecting and respecting your privacy. MOBILE APPLICATION PRIVACY POLICY Advanced Diagnostics Limited ( We ) are committed to protecting and respecting your privacy. SCOPE OF POLICY This policy (together with our end-user licence agreement

More information

Virginia Commonwealth University Police Department

Virginia Commonwealth University Police Department Virginia Commonwealth University Police Department NUMBER SECTION CHIEF OF POLICE EFFECTIVE REVIEW DATE 2 9 1/2013 2/2013 SUBJECT SOCIAL MEDIA GENERAL The department endorses the secure use of social media

More information

Your Privacy Center. Online Privacy Statement. About the Information We Collect

Your Privacy Center. Online Privacy Statement. About the Information We Collect Your Privacy Center Your privacy is our priority. At Discover, our actions and decisions are guided by our mission to help people achieve a brighter financial future. And when it comes to your privacy,

More information

Facebook Smart Card FB 121211_1800

Facebook Smart Card FB 121211_1800 Facebook Smart Card FB 121211_1800 Social Networks - Do s and Don ts Only establish and maintain connections with people you know and trust. Review your connections often. Assume that ANYONE can see any

More information

Social Media Platform Agreements and Brand Risk

Social Media Platform Agreements and Brand Risk Social Media Platform Agreements and Brand Risk BRUCE GOLDNER AND NAOMI SOSNER, SKADDEN, ARPS, SLATE, MEAGHER & FLOM LLP, WITH PRACTICAL LAW INTELLECTUAL PROPERTY & TECHNOLOGY This Article summarizes key

More information

Human Resources Policy and Procedure Manual

Human Resources Policy and Procedure Manual Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use

More information

Introduction PriorFX LTD Right to Privacy Information

Introduction PriorFX LTD Right to Privacy Information Privacy Policy 1.Introduction 1.1 PriorFX LTD ( PriorFx or we ) is a Cyprus Investment Firm regulated by the Cyprus Securities and Exchange Commission (License No. 221/13). 1.2 PriorFX is operating under

More information

How Local Businesses Can Use Mobile Applications to Attract and Retain More Customers

How Local Businesses Can Use Mobile Applications to Attract and Retain More Customers How Local Businesses Can Use Mobile Applications to Attract and Retain More Customers Contents 1. Why not going mobile is unthinkable, for any business 2. How mobile apps can attract more customers 3.

More information

RezScore SM Privacy Policy

RezScore SM Privacy Policy RezScore SM Privacy Policy Last updated: August 19, 2011 Thank you for using RezScore.com. We are committed to protecting your privacy and, for that reason, we have adopted this Privacy Policy to memorialize

More information

Zubi Advertising Privacy Policy

Zubi Advertising Privacy Policy Zubi Advertising Privacy Policy This privacy policy applies to information collected by Zubi Advertising Services, Inc. ( Company, we or us ), on our Latino Emoji mobile application or via our Latino Emoji

More information

WEBSITE & SOCIAL MEDIA PRIVACY POLICY

WEBSITE & SOCIAL MEDIA PRIVACY POLICY WEBSITE & SOCIAL MEDIA PRIVACY POLICY This website is the property of Girls on the Run of Northern Virginia ( Girls on the Run ), an Independent Council of Girls on the Run International, Inc. of Charlotte,

More information

TERMS OF USE AGREEMENT

TERMS OF USE AGREEMENT TERMS OF USE AGREEMENT Last Updated: October 20, 2010 PLEASE READ THIS TERMS CAREFULLY BEFORE ACCESSING THE WEBSITE I GENERAL 1) The Web Portal MEGA BRAZIL TV is a part of the MEGA LOPES, LLC family of

More information

ConteGoView, Inc. Privacy Policy Last Updated on July 28, 2015

ConteGoView, Inc. Privacy Policy Last Updated on July 28, 2015 CONTEGOVIEW, INC. PRIVACY POLICY 1 ConteGoView, Inc. Privacy Policy Last Updated on July 28, 2015 This Privacy Policy discloses the privacy practices for ConteGoView, Inc. and its services and products.

More information

Unless otherwise stated, our SaaS Products and our Downloadable Products are treated the same for the purposes of this document.

Unless otherwise stated, our SaaS Products and our Downloadable Products are treated the same for the purposes of this document. Privacy Policy This Privacy Policy explains what information Fundwave Pte Ltd and its related entities ("Fundwave") collect about you and why, what we do with that information, how we share it, and how

More information

McZeely Coterie, LLC Privacy Notice. Effective Date of this Privacy Notice: February 11, 2015.

McZeely Coterie, LLC Privacy Notice. Effective Date of this Privacy Notice: February 11, 2015. McZeely Coterie, LLC Privacy Notice Effective Date of this Privacy Notice: February 11, 2015. We at McZeely Coterie, LLC, the company that proudly brings you Plan Z by Zola ( Plan Z ), respect your concerns

More information

Websites & Social Media. in the Professional Environment. A practical guide to navigating the world of social media

Websites & Social Media. in the Professional Environment. A practical guide to navigating the world of social media Websites & Social Media in the Professional Environment @ A practical guide to navigating the world of social media istockphoto.com/andrearoad Introduction Your Online Presence An online presence is essential

More information

Privacy Policy. What is Covered in This Privacy Policy. What Information Do We Collect, and How is it Used?

Privacy Policy. What is Covered in This Privacy Policy. What Information Do We Collect, and How is it Used? Privacy Policy The Friends of the Public Garden ("FoPG" or "We") is a non-profit corporation and the owner and operator of www.friendsof thepblicgarden.org (the "Website"), which is intended to supply

More information

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013 INFORMATION SECURITY GUIDE Cloud Computing Outsourcing Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Background...2 2. Legislative and Policy Requirements...3 3.

More information

Beasley Broadcast Group, Inc. Privacy Policy

Beasley Broadcast Group, Inc. Privacy Policy Beasley Broadcast Group, Inc. Privacy Policy Last Updated and Effective December 31, 2015 This Privacy Policy has been updated to include a section regarding your California privacy rights if you are a

More information

WEBSITE PRIVACY POLICY. Last modified 10/20/11

WEBSITE PRIVACY POLICY. Last modified 10/20/11 WEBSITE PRIVACY POLICY Last modified 10/20/11 1. Introduction 1.1 Questions. This website is owned and operated by. If you have any questions or concerns about our Privacy Policy, feel free to email us

More information

WidePoint Solutions Corp. SAFE HARBOR PRIVACY POLICY

WidePoint Solutions Corp. SAFE HARBOR PRIVACY POLICY WidePoint Solutions Corp. SAFE HARBOR PRIVACY POLICY Your privacy is important to us. At WidePoint Solutions Corp. we value your trust. We want you to know how we collect, use, and share and protect information

More information

SHORT FORM NOTICE CODE OF CONDUCT TO PROMOTE TRANSPARENCY IN MOBILE APP PRACTICES. I. Preamble: Principles Underlying the Code of Conduct

SHORT FORM NOTICE CODE OF CONDUCT TO PROMOTE TRANSPARENCY IN MOBILE APP PRACTICES. I. Preamble: Principles Underlying the Code of Conduct SHORT FORM NOTICE CODE OF CONDUCT TO PROMOTE TRANSPARENCY IN MOBILE APP PRACTICES I. Preamble: Principles Underlying the Code of Conduct Below is a voluntary Code of Conduct for mobile application ( app

More information

NOTE: SERVICE AGREEMENTS WILL BE DRAFTED BY RISK SERVICES SERVICE AGREEMENT

NOTE: SERVICE AGREEMENTS WILL BE DRAFTED BY RISK SERVICES SERVICE AGREEMENT NOTE: SERVICE AGREEMENTS WILL BE DRAFTED BY RISK SERVICES SERVICE AGREEMENT Between: And: XXXXXX (the Contractor") Langara College 100 West 49 th Avenue Vancouver, BC V5Y 2Z6 (the College") The College

More information

CHAPTER 149 FORMERLY SENATE SUBSTITUTE NO. 1 FOR SENATE BILL NO. 79

CHAPTER 149 FORMERLY SENATE SUBSTITUTE NO. 1 FOR SENATE BILL NO. 79 CHAPTER 149 FORMERLY SENATE SUBSTITUTE NO. 1 FOR SENATE BILL NO. 79 AN ACT TO AMEND TITLE 14 OF THE DELAWARE CODE RELATING TO EDUCATIONAL DATA GOVERNANCE. BE IT ENACTED BY THE GENERAL ASSEMBLY OF THE STATE

More information

10 Steps To Getting Started With. Marketing Automation

10 Steps To Getting Started With. Marketing Automation So the buzz about marketing automation and what the future holds for marketing in general finally got to you. Now you are ready to start using marketing automation and are not really sure where to start.

More information

Acceptable Use of Information Technology

Acceptable Use of Information Technology Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:

More information

PRIVACY POLICY. Types of Information Collected

PRIVACY POLICY. Types of Information Collected PRIVACY POLICY Tres Carnes ( we, our, or us, ) respects and is committed to protecting your privacy. That is why we have adopted this Privacy Policy. This Privacy Policy lets you know how and for what

More information

Service Agreement: January 2008

Service Agreement: January 2008 International Consultants in Medicine Service Agreement: January 2008 Prior to enrolling in the service as a Member of any degree, you must agree to the following terms and conditions. You may accept these

More information

Without prejudice to the generality of the foregoing paragraph, The Gallery Tattoo Studio does not warrant that:

Without prejudice to the generality of the foregoing paragraph, The Gallery Tattoo Studio does not warrant that: WEBSITE DISCLAIMER No warranties This website is provided as is without any representations or warranties, express or implied. The Gallery Tattoo Studio makes no representations or warranties in relation

More information

Estée Lauder Companies Global Jobs Website Privacy Policy

Estée Lauder Companies Global Jobs Website Privacy Policy Effective Date: August 14, 2014 Estée Lauder Companies Global Jobs Website Privacy Policy The Estée Lauder Companies ( we, us, or our ) respects your concerns about privacy and value the relationship we

More information

Adaptive Business Management Systems Privacy Policy

Adaptive Business Management Systems Privacy Policy Adaptive Business Management Systems Privacy Policy Updated policy: Effective on July 01, 2013 This privacy statement describes how Adaptive Business Management Systems collects and uses the personal information

More information

Terms and conditions of use

Terms and conditions of use Terms and conditions of use 1. Introduction 1.1 These terms and conditions govern your use of our website. 1.2 By using our website, you accept these terms and conditions in full; accordingly, if you disagree

More information

OAuth Web Authorization Protocol Barry Leiba

OAuth Web Authorization Protocol Barry Leiba www.computer.org/internet computing OAuth Web Authorization Protocol Barry Leiba Vol. 16, No. 1 January/February, 2012 This material is presented to ensure timely dissemination of scholarly and technical

More information

Privacy Policy. Effective Date: November 20, 2014

Privacy Policy. Effective Date: November 20, 2014 Privacy Policy Effective Date: November 20, 2014 Welcome to the American Born Moonshine website (this Site ). This policy describes the Privacy Policy (this Policy ) for this Site and describes how Windy

More information

Social Media Guidelines

Social Media Guidelines Northern Virginia Community College Social Media Guidelines social networks, social media, blogs, wikis and virtual worlds April 2013 (revised) 04.11.13 Page 1 Table of Contents Introduction 3 Connect

More information

Verified Volunteers. A division of SterlingBackcheck. Privacy Policy. Last Updated: November 5, 2014

Verified Volunteers. A division of SterlingBackcheck. Privacy Policy. Last Updated: November 5, 2014 1 Verified Volunteers A division of SterlingBackcheck Privacy Policy Last Updated: November 5, 2014 Verified Volunteers, a division of Sterling Backcheck ( Company, we, us, or our ) provide this Privacy

More information

Privacy Statement. What Personal Information We Collect. Australia

Privacy Statement. What Personal Information We Collect. Australia Privacy Statement Kelly Services, Inc. and its subsidiaries ("Kelly Services" or Kelly ) respect your privacy and we acknowledge that you have certain rights related to any personal information we collect

More information

DEVELOPING A SOCIAL MEDIA STRATEGY

DEVELOPING A SOCIAL MEDIA STRATEGY DEVELOPING A SOCIAL MEDIA STRATEGY Creating a social media strategy for your business 2 April 2012 Version 1.0 Contents Contents 2 Introduction 3 Skill Level 3 Video Tutorials 3 Getting Started with Social

More information

Voya Financial Advisors, Inc. Registered Representative s Website Terms of Use

Voya Financial Advisors, Inc. Registered Representative s Website Terms of Use Voya Financial Advisors, Inc. Registered Representative s Website Terms of Use Welcome to our site. This page provides important information about use of this site and other legal matters. Please read

More information

Website Privacy Policy

Website Privacy Policy Rockford Mutual Insurance Company 527 Colman Center Drive, Rockford, Illinois 61108 (815) 229 1500 The last update to our Privacy Policy was posted on August 6, 2014. This document governs the privacy

More information

ONLINE REPUTATION MANAGEMENT

ONLINE REPUTATION MANAGEMENT ONLINE REPUTATION MANAGEMENT WORKBOOK This Online Reputation Management (ORM) Workbook provides basic instructions on kick start the process to managing your online reputation. You will be able to start

More information

USES OF INTERNET TECHNOLOGIES IN CHILD SEXUAL ABUSE CASES. Peer to Peer Networking TYPES OF TECHNOLOGY. Presentation Supplement. How can it be used?

USES OF INTERNET TECHNOLOGIES IN CHILD SEXUAL ABUSE CASES. Peer to Peer Networking TYPES OF TECHNOLOGY. Presentation Supplement. How can it be used? TYPES OF TECHNOLOGY Peer to Peer Networking Networks in which computers are equal partners using common file sharing programs that allow users to connect directly to each other s computer hard drive to

More information

Information Technology Security Policies

Information Technology Security Policies Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral

More information

Mobilebits Inc. Privacy Policy

Mobilebits Inc. Privacy Policy Mobilebits Inc. Privacy Policy Notice: We have updated our Privacy Policy as of February 1, 2016 Protection of your privacy is of the utmost importance to the Mobilebits Inc. ( MI, us, or we ). Please

More information

How To Use Etechglobal Online Store

How To Use Etechglobal Online Store 5204 S. Sand Cherry Circle, Sioux Falls SD 57108 www.etechglobal.com Phone: (605) 339-4529 Merchant Service and Licensing Agreement AGREEMENT The EtechGlobal Online Store service ("EtechGlobal Online Store"

More information

Zep Inc.: Global Online Privacy Notice

Zep Inc.: Global Online Privacy Notice Zep Inc.: Global Online Privacy Notice Effective Date: March 26, 2015 We at Zep Inc., along with our affiliates (collectively, Zep ), respect your concerns about privacy. This Global Online Privacy Notice

More information