Personal Information and consent - The New Normal
|
|
|
- Elinor Rogers
- 5 years ago
- Views:
Transcription
1 Predictive Analytics, Privacy & You: Creeping Up On Creepy Christopher Surdak, JD, Global Subject Matter Expert 13 February, 2015 Copyright Copyright Hewlett-Packard Development Company, Company, L.P. L.P. The information The information contained contained herein herein is subject is subject to change to change without without notice. notice.
2 Your 15 Minutes of Fame? 2
3 How Are Security and Privacy Different? Handling Mechanisms Individual Rights Fairness of Use Notice Choice Access Accountability Security Privacy Security Protection Mechanisms Authentication Access controls Availability Confidentiality Integrity Retention Storage Backup Incident response Recovery 3 Many Privacy Laws Also Restrict Trans-Border Data Flow of Personal Information
4 Wherefore Art Thou, Privacy? We are: Mobile: Connectivity, every-where, every-when Connected: All of our relationships, business, family, personal, are managed through Social Media Exposed: People share remarkable details about themselves online Dependent: Technologies ingrained into our very lives We are: Vulnerable: Constant, persistent attacks against our information Product: Our information is the basis of an entire economic structure Unarmed: We have few tools to manage our digital lives 4 Unaware: Of our actual level of exposure and vulnerability
5 Changing Expectations USC Annenberg Center for the Digital Future: 70% of Millennials say no one should have access to their data or online behavior. Yet: 25% will trade it away for more relevant advertising 56% will share their location for coupons or deals 51% say they ll share information with companies if they get something in return. 5
6 The Privacy Paradox I demand deep personalization What I want Where I want When I want How I want Pick *ONE* because you can t have both! I expect privacy Anonymity Freedom Protection
7 What is for sale? Top 6 Companies in the World, by Market Capitalization, June 2014 (Source, PwC) Rank Who? What do they Sell? Phones? Oil Nothing? Money Oil Stuff
8 YOU ARE THE PRODUCT! Companies like Google, Facebook, Yahoo, Twitter and Microsoft (Bing) spend tens of billions of dollars per year on servers, storage, networking and electricity How much did you pay to use their services?
9 Changing Expectations
10 Six Challenges of The New Normal Quality: Consumers expect perfection. Deliver less and your customers will abandon you forever. Ubiquity: Globalization means anything, anywhere, anytime. Anything less is unacceptable. Immediacy: Immediate gratification. There s an app for that instantly, predictively. Disengagement: Don t build, don t run, don t outsource, don t care. I only buy a result. Intimacy: Customers hunger for other forms of connectedness. Feeling like part of a community will be even more important as our needs are met more anonymously. Purpose: Support customers need for and sense of purpose. 10
11 The Customer Engagement Continuum Reactive Responsive Predictive Persuasive Timing: Past Present Future Future Topic: What has happened What is happening What might happen What should happen Purpose: Understand the Past Understand the Present Understand the Future Change the Future Value: What worked before may work again Is there an opportunity right now Is there an opportunity coming Can I create an opportunity 11
12 Creeping Towards Creepy 12
13 What s the Issue, What s at Stake? Intimacy Predictive Shipping Creepiness Needs Anticipation Behavior Manipulation Reverse Grouponing Behavior Modeling E- Coupons Liking Suggestion lists I-Coupons Geo- Tracking Cookies The best companies must walk the razor s edge between these two extremes
14 Innovation Outpaces Morality? Like this if you feel violated 14
15 Why Care? What if analytics and predictive technologies can change customer behavior 1%? In reality, these technologies easily double or triple results Can changes to the customer environs double their purchases? Triple? Do you know? Cha-Ching!!! $18 billion in increased revenue!
16 The Big Data balance sheet Monetize Differentiate Personalize Monitor Meter Optimize Predict Assets Liabilities Regulate Comply Control Secure Address Ensure and more 16
17 Are the Kids Alright? High School
18 And College?
19 And After That?
20 Everything, Forever There is NO DELETE on the Internet! The current trend is to analyze what you type, BEFORE you send it! When someone looks you up, they don t see how old the information is You CANNOT take it back!
21 Is it Really Possible to Anonymise Data? Many regulations require that Personal Identifying Information (PII) be anonymised before use Anonymised Set 1 for other purposes: PIPEDA FOIPPA US HIPPA Complete Data Anonymised Set 2 Consolidated Data Reanimated Data Anonymised Data 21
22 BC PIPA Implicit consent 8 (1) An individual is deemed to consent to the collection, use or disclosure of personal information by Part Provision 3 Consent of consent 7 an (1) organization An individual for a purpose has not if given consent under this Act to an organization Consent required unless obvious to a reasonable person, and 6 (1) (a) An the organization must has provided not the individual with the information (a) collect required purpose. personal under section information 10 (1), about andan individual, (b) use (b) personal the individual's information consent about is provided an individual, in accordance or with this Act. (a) at the time the consent is deemed to be given, the purpose would be considered to be (b) the individual voluntarily provides the personal information to the organization for that (2) An individual is deemed to consent to the collection, use or disclosure of personal information for the purpose of his or her enrollment or coverage under an insurance, pension, benefit or similar plan, policy or contract if he or she (2) (c) An disclose personal information about an individual. (a) organization is a beneficiary must or has not, an interest as a condition as an insured of under supplying the plan, a product policy or contract, or service, and (2) require Subsection (b) an is not individual the applicant (1) does to consent for the not plan, apply to policy the collection, ifor contract. use or disclosure of (a) personal the individual information gives beyond consent what to the is necessary collection, to use provide or disclosure, the product or purposes if service. (b) this Act authorizes the collection, use or disclosure without the consent of the individual, or (3) If an information organization for those attempts purposes, to obtain consent for collecting, using or (c) disclosing this Act personal deems the information collection, by use or disclosure to be consented to by the (a) individual. providing false or misleading information respecting the collection, use collection, or disclosure use or disclosure, of the and information, or (b) using deceptive or misleading practices sensitivity of the personal information in the circumstances. any consent provided in those circumstances is not validly given. (3) An organization may collect, use or disclose personal information about an individual for specified (a) the organization provides the individual with a notice, in a form the individual can reasonably be considered to understand, that it intends to collect, use or disclose the individual's personal (b) the organization gives the individual a reasonable opportunity to decline within a reasonable time to have his or her personal information collected, used or disclosed for those purposes, (c) the individual does not decline, within the time allowed under paragraph (b), the proposed (d) the collection, use or disclosure of personal information is reasonable having regard to the (4) Subsection (1) does not authorize an organization to collect, use or disclose personal information for a different purpose than the purpose to which that subsection applies.
23 Do You Read Your EULAs? The Language in End User License Agreements (EULAs) are broad, open to a range of interpretations, and are designed to allow vendors to make money from your data 23
24 FaceBook EULA As of 12 February, 2015 By Amendments Sharing using Your Content or and accessing Information Facebook Special Provisions Applicable to Users Outside the United States About Advertisements and Other Commercial Content Served or Enhanced We ll notify by Facebook you before we make changes to these terms and give you We strive to create a global community with consistent standards for everyone, the opportunity to review and comment on the revised terms before but Services, we also strive to you respect agree local laws. The that following we provisions can collect apply to users and non-users use who such interact content with Facebook outside and the information United States: in You consent to having your personal data transferred to and processed in You own all of the content and information you post on Facebook, and you can Our control goal continuing how is to it deliver is shared to use advertising through our Services. and yourother privacy commercial and application or sponsored settings. content In that is valuable addition: If we to make our users changes and advertisers. to policies, In order guidelines to help or us other do that, terms you agree referenced to the in following: For incorporated content that is by covered this Statement, by intellectual we may property provide rights, notice like photos on the and Site accordance the You videos United give (IP us States. content), permission you to specifically use your name, give us profile the following picture, content, permission, and Governance Page. with the Data Policy as information subject to your in connection privacyand with application commercial, settings: sponsored, you grant or related us a nonexclusive, content (such amended Your as continued a brand you transferable, use like) from of served the sub-licensable, Facebook time or enhanced to Services, royalty-free, by time. us. This following means, worldwide notice for example, license of the to that changes you use permit to any our IP a content terms, business policies that or you other post or entity guidelines, on to or pay in connection us constitutes to display with your Facebook your name acceptance and/or (IP of our profile License). amended picture This terms, with IP License your policies content ends or or when guidelines. information, you delete without your IP any content compensation or your to you. account If you unless have selected your content a specific has been audience shared for with your others, content and or they information, have we Facebook if you are prohibited from receiving products, services, or will not respect deleted your it. choice when we use it. software We do not originating give your content from the or information United States. to advertisers without your consent. You understand that we may not always identify paid services and communications as such. If you are located in a country embargoed by the United States, or are on the U.S. Treasury Department's list of Specially Designated Nationals you will not engage in commercial activities on Facebook (such as advertising or payments) or operate a Platform application or website. You will not use
25 Google s EULA From Support.Google.com; 8/11/2014 Contacts/Calendar Phone Photos/Media/Files Location Camera/Microphone Identity An An Device An app app can & can app use use history files your phone device's data and/or stored contacts location. camera its call your and/or history. device. calendar microphone. information. An An app app can can use use your one account or more of and/or the following: profile information on your Note: Contacts Photos/Media/Files Location Camera Depending access and calendar microphone may access your include: access plan, access may may you include may include include be the the charged ability ability the to: ability by to: your to: carrier device. for Read Approximate Take phone your the sensitive pictures calls. contents contacts location and log of data videos your (network-based) USB storage (example: SD card) Identity Retrieve your access system contacts may internal include state the ability to: Phone Modify Precise Record access or location audio delete may (GPS the include contents and the network-based) of ability your to: USB storage Find Read accounts calendar your web on events bookmarks the device Directly Format Access Record call external extra video phone location storage numbers; plus provider confidential and this commands history may cost information you money Read Add Retrieve or your modify running own calendar contact apps card events (example: and send name and to guests contact Write Mount GPS call access or log unmount (example: external call history) storage without information) owners Read Cellular call knowledge data log settings Modify An app your can own use settings contact card Reroute outgoing calls that control your mobile data Add connection or remove and accounts Modify phone state potentially the data you receive. Make calls without your intervention 25
26 Case Study: License Plate Recognition 26
27 Vehicle Recognition Used in association with ANPR Match Make and/or Model Easy to train Real-time matching Alert or Search for Vehicle without registration Validate database using ANPR result to identify illegal plated vehicles 27
28 Face Recognition Demo: Office Entrance 28
29 Use case Police surveillance 29
30 Use Case Counting and Access control 30
31 What to expect A Framework for Privacy Management Disclosure: Companies would notify consumers in detail what is collected, how frequently, by whom, and how it may be used. Transparency: Consumers would be notified when their data is being used, in real time, to influence their opinions or actions. Recourse: Consumers would be allowed to adjust how their data is used to suit their own comfort level. This would mean no more blanket authorizations when a user downloads an app or signs up for an account. Monitoring: Consumers must be able to confirm that businesses respect their wishes. 31
32 Disruption is Guaranteed Are you disrupting, or being disrupted? 32
33 Thank You M: If you d like to learn more, check out Data Crush, from AMACOM Publishing, getabstract s International Book of the Year, 2014 Also see my columns in European Business Review Magazine, Dataconomy.com and my blog posts on HP.com
ONLINE PRIVACY POLICY
ONLINE PRIVACY POLICY The City of New Westminster is committed to protecting your privacy. Any personal information collected, used or disclosed by the City is in accordance with the Freedom of Information
PRIVACY NOTICE. Last Updated: March 24, 2015
PRIVACY NOTICE Your access to and use of this website is governed by the TERMS OF WEBSITE USE and the following PRIVACY NOTICE. Please read them carefully as they constitute a legally binding agreement
ETHICAL ELECTRIC PRIVACY POLICY. Last Revised: December 15, 2015
ETHICAL ELECTRIC PRIVACY POLICY Last Revised: December 15, 2015 This policy ("Policy") covers the privacy practices that Ethical Electric, Inc. ("Ethical Electric", "we" or "us") employs with respect to
PRIVACY POLICY. Your Personal Information will be processed by Whistle Sports in the United States.
PRIVACY POLICY This Policy was last changed on March 31, 2015. Kids Sports Entertainment, Inc. d/b/a The Whistle ( Whistle Sports ) and its affiliates operate this website, and any and all Whistle Sports
Privacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction
Privacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction Welcome! TripleFirrre, LLC, dba Just Seconds Apart knows that safeguarding your privacy is serious business. Your privacy
Android Developer Applications
Android Developer Applications January 31, 2013 Contact Departmental Privacy Office U.S. Department of the Interior 1849 C Street NW Mail Stop MIB-7456 Washington, DC 20240 202-208-1605 [email protected]
Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy
Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS BYOD Bring Your Own Device AUP Authorized Use Policy User includes anyone, including employees, students, and guests, using
BBVA Wallet Application Privacy Policy
BBVA Wallet Application Privacy Policy Effective date: September 14, 2015 This Privacy Policy describes our practices related to the use, storage and disclosure of information we collect from or about
Privacy Policy. MSI may collect information from you on a voluntary basis when you:
Last Updated: January 8, 2015 Privacy Policy Mind Sports International (MSI) respects the privacy rights of our customers and online visitors, and has adopted this privacy policy ("Privacy Policy") to
This agreement applies to all users of Historica Canada websites and other social media tools ( social media tools or social media channels ).
Social Media Terms of Use Social media is an integral part of Historica Canada s communications efforts, offering an additional model to engage with participants, colleagues, other stakeholders and the
Information Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
NBA Math Hoops Privacy Statement and Children s Privacy Statement Updated October 17, 2013.
NBA Math Hoops Privacy Statement and Children s Privacy Statement Updated October 17, 2013. This Privacy Statement applies to the web sites mobile applications provided by Learn Fresh Education Co. (collectively,
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential
Are free Android virus scanners any good?
Authors: Hendrik Pilz, Steffen Schindler Published: 10. November 2011 Version: 1.1 Copyright 2011 AV-TEST GmbH. All rights reserved. Postal address: Klewitzstr. 7, 39112 Magdeburg, Germany Phone +49 (0)
Information Collected. Type of Information Collected. We may collect two general types of information when you use the Site:
Privacy Policy (Last revised March 1, 2016) This website is owned and operated by Temple Square Hospitality Corporation ( Operator ). The following Privacy Policy (the Policy ) describes how Operator collects,
Terms of Use The Human Face of Big Data Website
Terms of Use The Human Face of Big Data Website Effective Date: September 12 th, 2012 Welcome to The Human Face of Big Data, a project of Against All Odds Productions ( AAOP ). The Human Face of Big Data
Cloud Computing: Legal Risks and Best Practices
Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent
1. The information we collect and how we collect it.
PRIVACY POLICY AND YOUR PRIVACY RIGHTS CountySportsZone.com aggregates, reports, and publishes high school sports information for jurisdictions across the state of Maryland. In this Privacy Policy, Affiliates
Website Privacy Policy Statement
Website Privacy Policy Statement This website ( CRSF Website ) is operated by Cal Ripken, Sr. Foundation, Inc. ( Company ) and this policy applies to all websites owned, operated, controlled and otherwise
Acceptable Use Policy Holy Spirit Catholic School
Acceptable Use Policy Holy Spirit Catholic School For the use of Computers, Mobile Devices, Internet Access, Google Apps for Education Suite, and Internet Applications Definitions User includes anyone,
HUMAN RESOURCES POLICIES & PROCEDURES
HUMAN RESOURCES POLICIES & PROCEDURES Policy title Application IT systems and social networking policy All employees and students CONTENTS PAGE Introduction and scope 2 General points 2 Authorisation to
prevailing of JAMS/Endispute. The arbitrator's award shall be binding and may be entered as a judgment in any court of competent jurisdiction.
Safety Alert Apps, Inc. End User License Agreement By installing and using any of the personal safety app software from Safety Alert Apps, Inc., you are agreeing to be bound by the terms of this End User
PRIVACY POLICY. The effective date of this Privacy Policy is December 15, 2010. Last Updated September 29, 2014. Overview
PRIVACY POLICY The effective date of this Privacy Policy is December 15, 2010 Last Updated September 29, 2014 Overview The Bay Area Toll Authority (BATA) is committed to ensuring customer privacy and security.
UNILEVER PRIVACY PRINCIPLES UNILEVER PRIVACY POLICY
UNILEVER PRIVACY PRINCIPLES Unilever takes privacy seriously. The following five principles underpin our approach to respecting your privacy: 1. We value the trust that you place in us by giving us your
INTRODUCTION We respect your privacy and are committed to protecting it through our compliance with this privacy policy.
Privacy Policy Last Modified: July 20, 2015 INTRODUCTION We respect your privacy and are committed to protecting it through our compliance with this privacy policy. This privacy policy describes the types
Comeet Privacy Policy
Comeet Privacy Policy Comeet Technologies Inc. ( Comeet or us, our, we ) provides a solution for the management of the information and interviewing of candidates for employment (the Solution ). Comeet
Thank you for visiting this website, which is owned by Essendant Co.
Essendant Online Privacy Policy Thank you for visiting this website, which is owned by Essendant Co. Please take a few minutes to review this Policy. It describes how we will collect, use, and share information
Privacy Policy Last Modified: April 3, 2015 1
Privacy Policy Last Modified: April 3, 2015 1 Introduction Jamberry Nails, LLC, a Utah limited liability company, U.S.A., (referred to herein as Jamberry, we, us and our ) understands the importance of
Privacy Policy Version 1.0, 1 st of May 2016
Privacy Policy Version 1.0, 1 st of May 2016 THIS PRIVACY POLICY APPLIES TO PERSONAL INFORMATION COLLECTED BY GOCIETY SOLUTIONS FROM USERS OF THE GOCIETY SOLUTIONS APPLICATIONS (GoLivePhone and GoLiveAssist)
Website Privacy Policy Statement. 1519 York Rd Lutherville, MD 21093. We may be reached via email at [email protected].
Website Privacy Policy Statement This website juliereisler.com is operated by Empowered Living, LLC and this policy applies to all websites owned, operated, controlled and otherwise made available by Company,
Keefo s Design wants to be an integral partner in your success!
Get you or your business on the web and let Keefo s Design help you to create an effective and competitive face to the public to get you and your business online! Below is a menu of our website design
Privacy Policy. log in to the Services with social networking credentials;
Privacy Policy Effective Date: November 20, 2015 This Privacy Policy is incorporated by this reference into the Mobli Media Inc. Terms of Use located at https://www.mobli.com/tou.html (the Terms of Use
Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)
Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) MYTH: The cyber threat is being exaggerated. FACT: Cyber attacks are a huge threat to American lives, national security,
You must be at least 18 years of age to use our website. By using our website you warrant and represent that you are at least 18 years of age.
TERMS AND CONDITIONS Terms of Website Use 1 Introduction These terms and conditions govern your use of the One Counselling (also referred to in these Terms & Conditions as us, we and our ), website; by
Privacy Policy. Introduction. Scope of Privacy Policy. 1. Definitions
Privacy Policy Introduction This Privacy Policy explains what information TORO Limited and its related entities ("TORO") collect about you and why, what we do with that information, how we share it, and
If you have any questions about our privacy practices, please refer to the end of this privacy policy for information on how to contact us.
c4m Privacy Policy Last Modified: July 20, 2015 Colbette II Ltd., Block 1, 195-197 Old Nicosia-Limassol Road, Dali Industrial Zone, Cyprus 2540 (hereinafter "c4m", Colbette we", "our" or "us") is always
Vyve Broadband Website Privacy Policy. What Information About Me Is Collected and Stored?
Vyve Broadband Website Privacy Policy Effective: July 31, 2015 Vyve Broadband ( Vyve, we, us, our ) is committed to letting you know how we will collect and use your information. This Website Privacy Policy
Advanced Diagnostics Limited ( We ) are committed to protecting and respecting your privacy.
MOBILE APPLICATION PRIVACY POLICY Advanced Diagnostics Limited ( We ) are committed to protecting and respecting your privacy. SCOPE OF POLICY This policy (together with our end-user licence agreement
Virginia Commonwealth University Police Department
Virginia Commonwealth University Police Department NUMBER SECTION CHIEF OF POLICE EFFECTIVE REVIEW DATE 2 9 1/2013 2/2013 SUBJECT SOCIAL MEDIA GENERAL The department endorses the secure use of social media
Your Privacy Center. Online Privacy Statement. About the Information We Collect
Your Privacy Center Your privacy is our priority. At Discover, our actions and decisions are guided by our mission to help people achieve a brighter financial future. And when it comes to your privacy,
Facebook Smart Card FB 121211_1800
Facebook Smart Card FB 121211_1800 Social Networks - Do s and Don ts Only establish and maintain connections with people you know and trust. Review your connections often. Assume that ANYONE can see any
Social Media Platform Agreements and Brand Risk
Social Media Platform Agreements and Brand Risk BRUCE GOLDNER AND NAOMI SOSNER, SKADDEN, ARPS, SLATE, MEAGHER & FLOM LLP, WITH PRACTICAL LAW INTELLECTUAL PROPERTY & TECHNOLOGY This Article summarizes key
Human Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
Introduction PriorFX LTD Right to Privacy Information
Privacy Policy 1.Introduction 1.1 PriorFX LTD ( PriorFx or we ) is a Cyprus Investment Firm regulated by the Cyprus Securities and Exchange Commission (License No. 221/13). 1.2 PriorFX is operating under
How Local Businesses Can Use Mobile Applications to Attract and Retain More Customers
How Local Businesses Can Use Mobile Applications to Attract and Retain More Customers Contents 1. Why not going mobile is unthinkable, for any business 2. How mobile apps can attract more customers 3.
RezScore SM Privacy Policy
RezScore SM Privacy Policy Last updated: August 19, 2011 Thank you for using RezScore.com. We are committed to protecting your privacy and, for that reason, we have adopted this Privacy Policy to memorialize
Zubi Advertising Privacy Policy
Zubi Advertising Privacy Policy This privacy policy applies to information collected by Zubi Advertising Services, Inc. ( Company, we or us ), on our Latino Emoji mobile application or via our Latino Emoji
WEBSITE & SOCIAL MEDIA PRIVACY POLICY
WEBSITE & SOCIAL MEDIA PRIVACY POLICY This website is the property of Girls on the Run of Northern Virginia ( Girls on the Run ), an Independent Council of Girls on the Run International, Inc. of Charlotte,
TERMS OF USE AGREEMENT
TERMS OF USE AGREEMENT Last Updated: October 20, 2010 PLEASE READ THIS TERMS CAREFULLY BEFORE ACCESSING THE WEBSITE I GENERAL 1) The Web Portal MEGA BRAZIL TV is a part of the MEGA LOPES, LLC family of
ConteGoView, Inc. Privacy Policy Last Updated on July 28, 2015
CONTEGOVIEW, INC. PRIVACY POLICY 1 ConteGoView, Inc. Privacy Policy Last Updated on July 28, 2015 This Privacy Policy discloses the privacy practices for ConteGoView, Inc. and its services and products.
Unless otherwise stated, our SaaS Products and our Downloadable Products are treated the same for the purposes of this document.
Privacy Policy This Privacy Policy explains what information Fundwave Pte Ltd and its related entities ("Fundwave") collect about you and why, what we do with that information, how we share it, and how
McZeely Coterie, LLC Privacy Notice. Effective Date of this Privacy Notice: February 11, 2015.
McZeely Coterie, LLC Privacy Notice Effective Date of this Privacy Notice: February 11, 2015. We at McZeely Coterie, LLC, the company that proudly brings you Plan Z by Zola ( Plan Z ), respect your concerns
Websites & Social Media. in the Professional Environment. A practical guide to navigating the world of social media
Websites & Social Media in the Professional Environment @ A practical guide to navigating the world of social media istockphoto.com/andrearoad Introduction Your Online Presence An online presence is essential
Privacy Policy. What is Covered in This Privacy Policy. What Information Do We Collect, and How is it Used?
Privacy Policy The Friends of the Public Garden ("FoPG" or "We") is a non-profit corporation and the owner and operator of www.friendsof thepblicgarden.org (the "Website"), which is intended to supply
INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013
INFORMATION SECURITY GUIDE Cloud Computing Outsourcing Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Background...2 2. Legislative and Policy Requirements...3 3.
Beasley Broadcast Group, Inc. Privacy Policy
Beasley Broadcast Group, Inc. Privacy Policy Last Updated and Effective December 31, 2015 This Privacy Policy has been updated to include a section regarding your California privacy rights if you are a
WEBSITE PRIVACY POLICY. Last modified 10/20/11
WEBSITE PRIVACY POLICY Last modified 10/20/11 1. Introduction 1.1 Questions. This website is owned and operated by. If you have any questions or concerns about our Privacy Policy, feel free to email us
WidePoint Solutions Corp. SAFE HARBOR PRIVACY POLICY
WidePoint Solutions Corp. SAFE HARBOR PRIVACY POLICY Your privacy is important to us. At WidePoint Solutions Corp. we value your trust. We want you to know how we collect, use, and share and protect information
SHORT FORM NOTICE CODE OF CONDUCT TO PROMOTE TRANSPARENCY IN MOBILE APP PRACTICES. I. Preamble: Principles Underlying the Code of Conduct
SHORT FORM NOTICE CODE OF CONDUCT TO PROMOTE TRANSPARENCY IN MOBILE APP PRACTICES I. Preamble: Principles Underlying the Code of Conduct Below is a voluntary Code of Conduct for mobile application ( app
NOTE: SERVICE AGREEMENTS WILL BE DRAFTED BY RISK SERVICES SERVICE AGREEMENT
NOTE: SERVICE AGREEMENTS WILL BE DRAFTED BY RISK SERVICES SERVICE AGREEMENT Between: And: XXXXXX (the Contractor") Langara College 100 West 49 th Avenue Vancouver, BC V5Y 2Z6 (the College") The College
CHAPTER 149 FORMERLY SENATE SUBSTITUTE NO. 1 FOR SENATE BILL NO. 79
CHAPTER 149 FORMERLY SENATE SUBSTITUTE NO. 1 FOR SENATE BILL NO. 79 AN ACT TO AMEND TITLE 14 OF THE DELAWARE CODE RELATING TO EDUCATIONAL DATA GOVERNANCE. BE IT ENACTED BY THE GENERAL ASSEMBLY OF THE STATE
10 Steps To Getting Started With. Marketing Automation
So the buzz about marketing automation and what the future holds for marketing in general finally got to you. Now you are ready to start using marketing automation and are not really sure where to start.
Acceptable Use of Information Technology
Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:
PRIVACY POLICY. Types of Information Collected
PRIVACY POLICY Tres Carnes ( we, our, or us, ) respects and is committed to protecting your privacy. That is why we have adopted this Privacy Policy. This Privacy Policy lets you know how and for what
Service Agreement: January 2008
International Consultants in Medicine Service Agreement: January 2008 Prior to enrolling in the service as a Member of any degree, you must agree to the following terms and conditions. You may accept these
Without prejudice to the generality of the foregoing paragraph, The Gallery Tattoo Studio does not warrant that:
WEBSITE DISCLAIMER No warranties This website is provided as is without any representations or warranties, express or implied. The Gallery Tattoo Studio makes no representations or warranties in relation
Estée Lauder Companies Global Jobs Website Privacy Policy
Effective Date: August 14, 2014 Estée Lauder Companies Global Jobs Website Privacy Policy The Estée Lauder Companies ( we, us, or our ) respects your concerns about privacy and value the relationship we
Adaptive Business Management Systems Privacy Policy
Adaptive Business Management Systems Privacy Policy Updated policy: Effective on July 01, 2013 This privacy statement describes how Adaptive Business Management Systems collects and uses the personal information
Terms and conditions of use
Terms and conditions of use 1. Introduction 1.1 These terms and conditions govern your use of our website. 1.2 By using our website, you accept these terms and conditions in full; accordingly, if you disagree
OAuth Web Authorization Protocol Barry Leiba
www.computer.org/internet computing OAuth Web Authorization Protocol Barry Leiba Vol. 16, No. 1 January/February, 2012 This material is presented to ensure timely dissemination of scholarly and technical
Privacy Policy. Effective Date: November 20, 2014
Privacy Policy Effective Date: November 20, 2014 Welcome to the American Born Moonshine website (this Site ). This policy describes the Privacy Policy (this Policy ) for this Site and describes how Windy
Social Media Guidelines
Northern Virginia Community College Social Media Guidelines social networks, social media, blogs, wikis and virtual worlds April 2013 (revised) 04.11.13 Page 1 Table of Contents Introduction 3 Connect
Verified Volunteers. A division of SterlingBackcheck. Privacy Policy. Last Updated: November 5, 2014
1 Verified Volunteers A division of SterlingBackcheck Privacy Policy Last Updated: November 5, 2014 Verified Volunteers, a division of Sterling Backcheck ( Company, we, us, or our ) provide this Privacy
Privacy Statement. What Personal Information We Collect. Australia
Privacy Statement Kelly Services, Inc. and its subsidiaries ("Kelly Services" or Kelly ) respect your privacy and we acknowledge that you have certain rights related to any personal information we collect
DEVELOPING A SOCIAL MEDIA STRATEGY
DEVELOPING A SOCIAL MEDIA STRATEGY Creating a social media strategy for your business 2 April 2012 Version 1.0 Contents Contents 2 Introduction 3 Skill Level 3 Video Tutorials 3 Getting Started with Social
Voya Financial Advisors, Inc. Registered Representative s Website Terms of Use
Voya Financial Advisors, Inc. Registered Representative s Website Terms of Use Welcome to our site. This page provides important information about use of this site and other legal matters. Please read
Website Privacy Policy
Rockford Mutual Insurance Company 527 Colman Center Drive, Rockford, Illinois 61108 (815) 229 1500 The last update to our Privacy Policy was posted on August 6, 2014. This document governs the privacy
ONLINE REPUTATION MANAGEMENT
ONLINE REPUTATION MANAGEMENT WORKBOOK This Online Reputation Management (ORM) Workbook provides basic instructions on kick start the process to managing your online reputation. You will be able to start
USES OF INTERNET TECHNOLOGIES IN CHILD SEXUAL ABUSE CASES. Peer to Peer Networking TYPES OF TECHNOLOGY. Presentation Supplement. How can it be used?
TYPES OF TECHNOLOGY Peer to Peer Networking Networks in which computers are equal partners using common file sharing programs that allow users to connect directly to each other s computer hard drive to
Information Technology Security Policies
Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral
Mobilebits Inc. Privacy Policy
Mobilebits Inc. Privacy Policy Notice: We have updated our Privacy Policy as of February 1, 2016 Protection of your privacy is of the utmost importance to the Mobilebits Inc. ( MI, us, or we ). Please
How To Use Etechglobal Online Store
5204 S. Sand Cherry Circle, Sioux Falls SD 57108 www.etechglobal.com Phone: (605) 339-4529 Merchant Service and Licensing Agreement AGREEMENT The EtechGlobal Online Store service ("EtechGlobal Online Store"
Zep Inc.: Global Online Privacy Notice
Zep Inc.: Global Online Privacy Notice Effective Date: March 26, 2015 We at Zep Inc., along with our affiliates (collectively, Zep ), respect your concerns about privacy. This Global Online Privacy Notice
