Your Data, Your Rules: How to Regain Control of Your Digital Communications 1 2:00 p.m. EDT Thursday, March 26, 2015
Welcome & Introductions Today s Speaker Dan Kruger Founder and Chief Architect Absio Corporation 2
What enables private communication? Making digital communications reasonably private requires the same things as analog communication: 1. Control of who can approach you to talk 2. Control of who can participate in a conversation 3. Control of stored communications 4. Constraints (usually costs) on redistribution 3
Email communications Emails are copies of digital objects that: can be transmitted by anyone, to anyone, via an open public network, by relaying copies from server to server, any one of which can retain a copy, to and from end user devices you don t own or control, by people that can easily lie about who they are. 4
Partial compensation We ve been adding things to email that partially compensate: Spam filters Inbound and outbound inspection Transmission encryption Endpoint and server storage Policies and procedures Compensations produce repetitious inconvenience, not privacy Compensations are not solutions 5
Current State Product examples Integrates with Outlook? Protects email on my device? Recipient device? Protects email in transit? Protects email on server/cloud? How/when can I access email? Device Encryption - Bitlocker - SafeGuard - FileVault No - Yes - No No No Not an email technology Encrypted Connection - CipherPost - Zix Corp Yes - No - No Partially Partial protection (most providers have access to your content) Website (online only) Secure Webmail - Hushmail - Google end to end No - No - No Partially Partial protection (most providers have access to your content) Website (online only) File Sharing Services - Dropbox - Watchdox Partial - No - No N/A -Partial protection (most providers have access to your content) Not an email technology Partial control does not accomplish the goal 6
Solutions 1. Enable invitation and verification 2. Remove meaning from digital objects, except for the people that should have them every copy, everywhere 3. Make unauthorized acquisition useless 4. Make security automatic and invisible 5. Add controls and cost to redistribution: force unauthorized redistribution to analog 6. Make exercising control simple 7
Key features Add on for Outlook 2010, 2013 Standalone Windows app Automatic encryption, all the time, everywhere Connection by invitation Easy download and installation Free for casual use (250MB) Individual and business service plans ios and Android in June 8
Dispatch for Outlook: Inbox 9
Dispatch for Outlook: Compose 10
Dispatch for Outlook: Invitation Email 11
Dispatch for Outlook: Registration 12
Dispatch for Outlook: Connection Request 13
Dispatch for Outlook: Contacts 14
Dispatch for Windows: Inbox 15
Administrator 16
Future This year: Mobile platforms SMTP and Exchange email integration Forms and signatures Shared folders Usability features Archive management Single sign on Next year: SDK (privacy can be built into any application) More Absio applications 17
Conclusion Nothing significant has changed about email problems or compensations since the IAPP was founded in 2000. A real solution has been engineered and delivered to the marketplace. Barriers to adoption are low. This changes the game. How does that change what you do and recommend? 18
Questions & Answers Contact: Dan Kruger Founder and Chief Architect Absio Corporation dan.kruger@absio.com (720) 836-1222 www.absio.com 19
For a copy of these presentation slides and to view the recording of this web conference, please visit: https://absio.com/events
Web Conference Participant Feedback Survey Please take this quick (2 minute) survey to let us know how satisfied you were with this program and to provide us with suggestions for future improvement. Click here: IAPP Web Conference Participant Feedback Survey Thank you in advance! For more information: 21
Attention IAPP Certified Professionals: This IAPP web conference may be applied toward the continuing privacy education (CPE) requirements of your CIPP/US, CIPP/E, CIPP/G, CIPP/C, CIPT or CIPM credential worth 1.0 credit hours. IAPP-certified professionals who are the named participant of the registration will automatically receive credit. If another certified professional has participated in the program but is not the named participant then the individual may submit for credit by submitting the continuing education application form at www.privacyssociation.org. Continuing Legal Education Credits: The IAPP provides certificates of attendance to web conference attendees. Certificates must be self-submitted to the appropriate jurisdiction for continuing education credits. Please consult your specific governing body s rules and regulations to confirm if a web conference is an eligible format for attaining credits. Each IAPP web conference offers either 60 or 90 minutes of programming. 22
For questions on this or other IAPP Web Conferences or for a copy of the slide presentation, please contact: Dave Cohen, CIPP/US Knowledge Manager International Association of Privacy Professionals (IAPP) Dave@privacyassociation.org 603.427.9200 x 221 23