Chapter 11 Privacy Policies and Behavioral Marketing.

Slides:



Advertisements
Similar presentations
1 SANS Technology Institute - Candidate for Master of Science Degree 1 Assessing Privacy Risks of Flash Cookies Kevin Fuller and Stacy Jordan February.
Advertisements

3.04 Understand the use of direct marketing to attract attention and to build a brand.
Unit 11 Using the Internet & Browsing the Web.  Define the Internet and the Web  Set up & troubleshoot an Internet connection  Categorize webs sites.
Silicon Valley Apps for Kids Meetup Laura D. Berger October 22, 2012 The views expressed herein are those of the speaker, and do not represent the views.
Back to Table of Contents
Children's Online Privacy Protection Act and the Video Privacy Protection Act By: Alana Rushing.
Ethical Issues concerning Internet Privacy 1.  Personal information on the Internet has become a hot commodity because it can be collected, exchanged,
The Internet industry’s privacy seal program Silicon Valley Web Guild.
1 Privacy Online Jane Turk, Ph.D. CIS 610 Summer 2003.
Third Party Web Tracking Policy and Technology based on the paper of Jonathan R. Mayer and John C. Mitchell Stanford University Stanford, CA
Unit 12 Using the Internet & Browsing the Web.  Understand the difference between the Internet and the World Wide Web  Identify items on a web page.
Ji Yeon Chu, Lindsey Fong, Jonathan Bender, Yi Low, and Umang Patel.
Privacy as an International Information Issue MD823 October 18, 2004.
Privacy as an International Information Issue MD823 September 22, 2003.
Tutorial 9: Electronic Commerce. Session 9.1 – Understand the basics of e-commerce – Explore Web sites that conduct e-commerce – Learn how companies generate.
Lab 3 Cookie Stealing using XSS Kara James, Chelsea Collins, Trevor Norwood, David Johnson.
 Digital marketing: Uses digital media to develop communications and exchanges with customers  Electronic media (E-marketing): Refers to the strategic.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Behavior Tracking Dhaval Patel.
3 rd Party Data & Audience Targeting © All rights reserved. 3 rd Party Data – Collected both online and offline by 3 rd party data companies such.
By: Justin Mauss Privacy vs. Convenience. Agenda Finding the Balance: Privacy vs. Convenience Revisit Privacy vs. Convenience Overview of Online Tracking.
Privacy Aziz Doumith Michael Kot Luis Pacheco Emory Petermann Wyatt Pierson Henry Stigler.
How Can We Deal with Risks from the Internet: Why Privacy Legislation Is Hot Right Now Professor Peter Swire Ohio State University/Center for American.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
Class 6 Internet Privacy Law Social Media Privacy.
The Internet Industry Week Four. RISE OF THE INTERNET THE INTERNET – a global system of interconnected private, public, academic, business, and government.
The Significance and Evolution of End User Privacy Julie Earp College of Management North Carolina State University WISE 2010 Sponsored by TRUST June 21-24,
Smart Machines, Smart Privacy: Rules of the Road and Challenges Ahead The views expressed are those of the speaker and not necessarily those of the FTC.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
SEM Online Advertising
BEHAVIORAL TARGETING IN ADVERTISING By Rita Aliperti.
Apple Privacy Policy Derek Nalodka Kathleen Sweeney.
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
ECT 455/HCI 513 ECT 4 55/HCI 513 E-Commerce Web Site Engineering Legal Issues.
Chapter Twelve Digital Interactive Media Arens|Schaefer|Weigold Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution.
Marketing / Law / Digital Keith Arrowsmith. Court ActionPress Complaints CommissionTrading StandardsGambling Commission.
Restoring Privacy, Cleaning Your Computer's Cookies and Beacons.
DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on.
1 Trustworthy Browsing Ian Moulster Software + Services Lead Microsoft Ltd.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Goal: By the end of this lesson you should understand how social media are taking away your privacy rights.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Facebook Custom Audiences Compliance Plan: Ads Targeted to Defendants By Charles V. Hardenbergh, Esq. President, CAMS Marketing April 15, 2016.
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Online Marketing: Industry Innovation and Government Enforcement Actions Privacy Symposium Wednesday, August 22, 2007 Christine Varney Partner, Hogan &
1 DATA-DRIVEN SOLUTIONS. 2 KEYWORD-LEVEL SEARCH RETARGETING TARGET USERS BASED ON THEIR RECENT SEARCH HISTORY AND SEARCH QUERIES. A user performs a search.
Chapter 8 Data Privacy. Data Collection IP addresses Visited urls Anonymized? If so, supposed to prevent personal identification Europe considers IP address.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Some from Chapter 11.9 – “Web” 4 th edition and SY306 Web and Databases for Cyber Operations Cookies and.
Consumer Information Federal Trade Commission Act grants Federal Trade Commission (FTC) responsibility regarding unfair methods of competition and unfair.
Facebook privacy policy
Big Data Considerations
The Internet Industry Week Two.
Unit 11 Using the Internet & Browsing the Web
Unit 12 Using the Internet & Browsing the Web
Shavonne Henry, Nikia Clarke, David Heymann, Brandon Knight
Legal and Ethical Issues in E-Commerce
Latest Updates on BlackHawk Mines Music : Privacy Policy
BA 625: Privacy Law and Policy
Importance of Privacy Internet Safety
Guide: How to Set, Get, and Delete Cookies in WordPress? Guided By: wpglobalsupportwpglobalsupport.
Big Data Considerations
Unit 27 Web Server Scripting Extended Diploma in ICT
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
HOW DO I KEEP MY COMPUTER SAFE?
Presentation transcript:

Chapter 11 Privacy Policies and Behavioral Marketing

Website Privacy Policies- Geocities Geocities allowed customers to build free websites Monetized with banner ads Collected customer demographic data ‘we will never give your information to anyone without your permission’ Geocities sold data in violation of own policy Fined by FTC PgP BUSA331

Website Privacy Policy- Toysmart Toysmart collected data, privacy policy to never disclose Toysmart goes into bankruptcy, data is valuable, creditors want to sell US Bankruptcy court says no, destroy data, per privacy policy… PgP BUSA331

Perception Vs Reality Company privacy policy, not law is restriction on data collection Americans believe online browsing is private…NOT! PgP BUSA331

Web Site Privacy Policies People want privacy, marketers want to target audiences, so personal data is very valuable Some companies not responsible hire inmates to input data, so sex offenders steal and misuse… Better to not have privacy policy? Matter of trust with customers… EU has ‘Safe Harbor’ with US companies due to more restrictive EU laws PgP BUSA331

Model Privacy Policy See pages 246 to 248 Simple is best Make sure employees do not violate Record dates enacted, and changed Archive copies PgP BUSA331

Burden of Proof Issue- what company promised in privacy policy Or what plaintiff read? Not clear See Northwest Airlines and JetBlue cases PgP BUSA331

Behavioral Marketing Online advertising is $45B industry Movement is from contextual to behavioral marketing Use clickstream data to track visited sites Creates profile Targeted advertising based on profile PgP BUSA331

Cookies Most common form of behavioral marketing Saves website settings Use 3 rd party cookies to deliver ads based on history Session cookies occur when user logs in, allows personal tracking Facebook users are ‘products offered to advertisers’ PgP BUSA331

IE Cookie PgP BUSA331

Flash Cookies Not deletable by normal methods Security concern, lots of data Collect across browsers Do not expire, Zombie cookies Flash Player Manager Settings: n/flashplayer/help/settings_manager07.html n/flashplayer/help/settings_manager07.html PgP BUSA331

Stored Browser Histories Browser urls store personal information Fb page visited PgP BUSA331

Device Fingerprinting Panopticlick Clock settings, time zones, fonts, plug-ins… PgP BUSA331

Privacy Concerns To prevent cookies look into Ghostery DoNotTrackMe FTC favors industry self-regulation, but outdated by technology State data is being collected Secure data Obtain consent Express consent to collect sensitive data PgP BUSA331

Deep Packet Inspection ISPs have greater ability to harvest customer clickstream data than Google, but have not…yet, but could… Deep Packet Inspection –like Total Information Awareness Privacy advocates worried Communications Act of 1934 prohibits companies transmitting cannot divulge contents! ECPA allows divulging with consent Cable TV Privacy Act of 1984 prohibits disclosure of PII… PgP BUSA331

Behavioral Marketing and Privacy Policies Failing to disclose that PII is shared can cost company, like Toys R Us… PII = Personally Identifiable Information! PgP BUSA331

Society, Technology and the Law Privacy policy problems Long, so seldom read Confusing legalese, contradictory language Misleading about data-harvesting practices End users need to get educated Beware of social engineering Development of browsers that emphasize privacy Congress and FTC can enact laws and regulations PgP BUSA331