Cover Slide
Transcription
Cover Slide
Big Data, IoT and Privacy: The Need to Balance Between Targeting and Turnoff Cover Slide PRSA International Conference October 12, 2014 About Us – Rebecca & Kathy Rebecca Andersen, APR, M.S. IMC • Director of Public Relations, Coriant • 2014 PRSA-NCC President • Adjunct Faculty, West Virginia University, Integrated Marketing Communications Graduate Program • @PacificBridge Kathy Stershic, MIPP • Principal Consultant, Dialog Research & Communications • 2009 President, IABC Silicon Valley • bloggingatdialogrc.com • @kstershic • www.dialogrc.com Our Connected World How many objects do you have connected to the Internet? Tweetable Tidbit: How Many Internet Connections are in the World? Right now? Per second. We are taking best guesses at #PRSAICON, Wilson Room. #IoT en.wikipedia.org What’s on the Silicon Valley Mind? • Money & Famecentric • Innovative • Who’s the Smartest? • Lightening Pace What’s On the DC Mind? • Power-centric • Conformist • Who You Know • Snail’s Pace Red or Blue? Appropriations Polls Networking The news cycle The ‘Base’ The “Hill” House of Cards Perpetual Campaigning I should be President Committees, Bills, Laws PACs / Super PACs Fundraising Washington Post Style Section Invitation to White House State Dinner K Street Budget or CR? © Information Week Apr 2013 THE GOOD SIDE! Definition Alert! The Internet of Things Tweetable Tidbit: With #IoT, connected devices become an intelligent system of systems; transforming businesses, lives, & the world. #PRSAICON And by 2020…. Tweetable Tidbit: North America to Capture 55% #BigData Market Share by 2018, @IDC #PRSAICON So What Does This Mean? Consumers want content on multiple devices, wherever they are, and at any time. olap.com Tweetable Tidbit: #BigData is more than just 1&0’s; it is people, processes, and analysis that turn data into meaning #PRSAICON IoT 3.0 – Growth Areas How does it work? • Home - Google NEST, HVAC systems, smart lighting • Wearable – Google Glass, Fit Bit, Apple Health, Ringly • Business - Connected Energy, Shopping, connected cars • Public Sector - ParkMobile, Traffic Management, Natural Disaster Preparedness • Manufacturing- Factory automation, robotics, supply chain efficiency Tweetable Tidbit: 71% of those aged 16 to 24 want “wearable tech.” Men, at 69%, are keener in the aggregate than women, at 56%. @globalwebindex, #PRSAICON Reaching the Top Business Model Definition: The Magic Triangle University of St. Gallen, Institute of Technology Management, 2013 Our Toolbox of Tactics Has Changed The Inbound: Facilitation of inbound communications The Outbound: Increased precision in targeting Tweetable Tidbit: How do you use #BigData? How can we more effectively communicate with our publics given the data behind it all? #PRSAICON The Hectic Lives of Today’s Journalists Tweetable Tidbit: The lines b/w journalism & PR are blurred as business interests bypass traditional media to get the message across. #PRSAICON THE NOT-AS-GOOD SIDE Implementation Challenges No technology standards Integration gap [apps, devices, networks] Skilled talent shortage Source: Can Stock Photo Tweetable Tidbit: IPv6 allows for limitless # of addresses but with no technology standards between them. #PRSAICON Unprecedented Data Generation & Collection © 2013 libelium “50 Sensor Applications for a Smarter World” Privacy Concerns: Commercial • • • • • • The ‘classic’ – Target and Pregnancy Facebook ‘likes’ research “Glassholes” Celebrity hacks iTunes & U2 Yelp … and on! Tweetable Tidbit: Discussing the privacy concerns with #Googleglass, #NoGlassholes @ #PRSAICON Privacy Concerns: Government New IoT Privacy Questions • • • • What data is collected? By whom? Are sources trusted? Is consent granted? Needed? • Who is responsible for it… – At the point of collection? – As it is transferred? – As it is curated? IoT-Era Privacy: A Thread Reuters: The FBI is warning healthcare providers that the agency has observed malicious actors targeting healthcare related systems, perhaps for the purpose of obtaining Protected Healthcare Information (PHI) and/or Personally Identifiable Information (PII) … These actors have also been seen targeting multiple companies in the healthcare and medical device industry, typically targeting valuable intellectual property such as medical device and equipment development data. - August 2014 Photo property of US Federal Bureau of Investigation IoT-Era Privacy: A Thread IoT-Era Privacy: A Thread Tweetable Tidbit: How much do you want your bed to know about you? Smart bed tracks rest, claims to help stop snoring. #PRSAICON Cyber Security • High profile data breaches: – – – – – – Target JP Morgan Nieman Marcus Michael’s Home Depot PF Chang’s • Grand Theft Russian Style Trademarks are property of their respective owners Cyber Security & PR: Some Expert Opinions “The combination of social engineering and spear phishing creates grave concerns regarding trust. Cyber-impersonation of trusted sources can become a vehicle to manipulate public opinion, financial markets, and even public safety.” Stuart Itkin, Chief Marketing Officer, ThreatTrack Security STARS Mentor, MACH37 "As the adversary evolves and data become both more important and diverse, the industry must adopt an integrated approach to security that starts with a single, comprehensive view of risk across the enterprise. Technology matters, but people and process are key. Increasingly, non-technology functions ranging from executives to marketing and PR teams play an integral role in managing a breach and minimizing its negative implications. Everyone is responsible for security." Jacob West, CTO, Enterprise Security Products, HP Cyber Ice Bucket? “Can you protect the unknown? The public relations executive must pay close attention to the inner workings of government. The real key to cybersecurity is going to be collaboration and cooperation between government and industry. Public relations experts must lean into the conversation to fully understand the complexities of cybersecurity, and in the process provide clear educational commentary about the seriousness of these attacks — without sounding alarmist. The public relations executive’s learning curve is a steep climb – and the route is unknown. But it must be traveled to ensure that your message is woven in a way to offer a sense of security and careful attention to the critical path of information that responds to the volume of attacks that happen – daily if not hourly. For PR professionals, cybersecurity awareness is your Ice Bucket Challenge.” Casey Beyer, Sr. Advisor to the President, Silicon Valley Leadership Group Private Sector Responses • Opt-out / Do Not Track • Self-regulation • Encryption Photo credit: Jesse in Programming, Python Software The Right Strategy? Tweetable Tidbit: From @CNNMoney, Target has given investors ZERO reason to be encouraged that a global turnaround is secretly emerging. #PRSAICON Legal / Policy Responses Older: • US Children’s Online Privacy Protection Act • 1986 Electronic Communications Privacy Act • HIPAA • Gramm-Leach-Bliley Act Current and Growing: • Security breach notification legislation – 47 US states, DC, Guam, Puerto Rico and & Virgin Islands • FTC / Federal Bureau of Consumer Protection Rules • EU Right To Be Forgotten • EU Binding Corporate Rules • Asia-Pacific Economic Cooperation (APEC) Cross Border Privacy Rules • South Korea – Personal Information Protection Act • People’s Republic of China criminal law In the Works: • U.S.-EU Safe Harbor Framework • And… Photo: Smartplanet.com New IoT Privacy Questions “A lot of data is going to be collected, whether it’s needed or not. It will most likely take a big breach of data for people to understand what is being collected about them, for the public and the Congress to get it. That will cause a lot of negative pressure, which is what Congress reacts to. They don’t have their minds around Internet of Things yet; when they do, it will overwhelm them. The awareness of the collection of data is building.” US Senator Saxby Chambliss Vice Chair, Senate Select Committee on Intelligence Case Study: Center for Democracy & Technology 3000-word policy easily accessible from home page Encrypted connection Log data saved for 30 days, limited use No cookies! Doesn’t sell, rent, exchange or disclose data Pikwik Analytics This is the type of information CDT can see via our analytics program. How Can YOU Prepare – Personally? • Educate yourself! • Educate your clients, your social circle Tweetable Tidbit: Speak to balance – PR & marketing are under pressure to for targeted outreach, be the balance in your organization between too much & privacy. #PRSAICON How Can YOU Prepare & Lead – Professionally? • Take the LEAD your organization • ACT proactively, not reactively • Make TRUST central to your brand promise and core message • Develop a STRATEGY on what data you really need & what you will do with it • Consider technology alternatives, 3rd party restrictions • Prepare for a breach response: Crisis Communications & Scenario Plan www.bravatrak.com Tweetable Tidbit: #BigData Challenge – Educate your company & client about #BigData policy & privacy, don’t be caught in the dark. #PRSAICON And in the end…. This is what you want your senior executives and clients to do! Tell Us Your Stories Additional Resources • www.cdt.org • https://www.privacylaws.com/ • http://www.ncsl.org/research/telecommunications-and-informationtechnology/security-breach-notification-laws.aspx • http://www.business.ftc.gov/privacy-and-security • http://bigdataandthelaw.com/