Personal Data Processing Policy
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Demystifying Content-Blockers: a Large-Scale Study of Actual Performance Gains
Demystifying Content-blockers: A Large-scale Study of Actual Performance Gains Ismael Castell-Uroz Josep Sole-Pareta´ Pere Barlet-Ros Universitat Politecnica` de Catalunya Universitat Politecnica` de Catalunya Universitat Politecnica` de Catalunya Barcelona, Spain Barcelona, Spain Barcelona, Spain [email protected] [email protected] [email protected] Abstract—With the evolution of the online advertisement and highly parallel network measurement system [10] that loads tracking ecosystem, content-filtering has become the reference every website using one of the most relevant content-blockers tool for improving the security, privacy and browsing experience of each category and compares their performance. when surfing the Internet. It is also commonly believed that using content-blockers to stop unsolicited content decreases the time We found that, although we can observe some improvements needed for loading websites. In this work, we perform a large- in terms of effective page size, the results do not directly scale study with the 100K most popular websites on the actual translate to gains in loading time. In some cases, there could performance improvements of using content-blockers. We focus even be an overhead to be paid. This is the case for two of the our study on two relevant metrics for measuring the browsing studied plugins, especially in small and fast loading websites. performance; page size and loading time. Our results show that using such tools results in small improvements in terms of page The measurement system and methodology proposed in this size but, contrary to popular belief, it has a negligible impact in paper can also be useful for network and service administrators terms of loading time. -
Seamless Interoperability and Data Portability in the Social Web for Facilitating an Open and Heterogeneous Online Social Network Federation
Seamless Interoperability and Data Portability in the Social Web for Facilitating an Open and Heterogeneous Online Social Network Federation vorgelegt von Dipl.-Inform. Sebastian Jürg Göndör geb. in Duisburg von der Fakultät IV – Elektrotechnik und Informatik der Technischen Universität Berlin zur Erlangung des akademischen Grades Doktor der Ingenieurwissenschaften - Dr.-Ing. - genehmigte Dissertation Promotionsausschuss: Vorsitzender: Prof. Dr. Thomas Magedanz Gutachter: Prof. Dr. Axel Küpper Gutachter: Prof. Dr. Ulrik Schroeder Gutachter: Prof. Dr. Maurizio Marchese Tag der wissenschaftlichen Aussprache: 6. Juni 2018 Berlin 2018 iii A Bill of Rights for Users of the Social Web Authored by Joseph Smarr, Marc Canter, Robert Scoble, and Michael Arrington1 September 4, 2007 Preamble: There are already many who support the ideas laid out in this Bill of Rights, but we are actively seeking to grow the roster of those publicly backing the principles and approaches it outlines. That said, this Bill of Rights is not a document “carved in stone” (or written on paper). It is a blog post, and it is intended to spur conversation and debate, which will naturally lead to tweaks of the language. So, let’s get the dialogue going and get as many of the major stakeholders on board as we can! A Bill of Rights for Users of the Social Web We publicly assert that all users of the social web are entitled to certain fundamental rights, specifically: Ownership of their own personal information, including: • their own profile data • the list of people they are connected to • the activity stream of content they create; • Control of whether and how such personal information is shared with others; and • Freedom to grant persistent access to their personal information to trusted external sites. -
The Impact of Data Access Regimes on Artificial Intelligence and Machine Learning
A Service of Leibniz-Informationszentrum econstor Wirtschaft Leibniz Information Centre Make Your Publications Visible. zbw for Economics Martens, Bertin Working Paper The impact of data access regimes on artificial intelligence and machine learning JRC Digital Economy Working Paper, No. 2018-09 Provided in Cooperation with: Joint Research Centre (JRC), European Commission Suggested Citation: Martens, Bertin (2018) : The impact of data access regimes on artificial intelligence and machine learning, JRC Digital Economy Working Paper, No. 2018-09, European Commission, Joint Research Centre (JRC), Seville This Version is available at: http://hdl.handle.net/10419/202237 Standard-Nutzungsbedingungen: Terms of use: Die Dokumente auf EconStor dürfen zu eigenen wissenschaftlichen Documents in EconStor may be saved and copied for your Zwecken und zum Privatgebrauch gespeichert und kopiert werden. personal and scholarly purposes. Sie dürfen die Dokumente nicht für öffentliche oder kommerzielle You are not to copy documents for public or commercial Zwecke vervielfältigen, öffentlich ausstellen, öffentlich zugänglich purposes, to exhibit the documents publicly, to make them machen, vertreiben oder anderweitig nutzen. publicly available on the internet, or to distribute or otherwise use the documents in public. Sofern die Verfasser die Dokumente unter Open-Content-Lizenzen (insbesondere CC-Lizenzen) zur Verfügung gestellt haben sollten, If the documents have been made available under an Open gelten abweichend von diesen Nutzungsbedingungen die in der dort Content Licence (especially Creative Commons Licences), you genannten Lizenz gewährten Nutzungsrechte. may exercise further usage rights as specified in the indicated licence. www.econstor.eu JRC Digital Economy Working Paper 2018-09 The impact of data access regimes on artificial intelligence and machine learning Bertin Martens December 2018 This publication is a Working Paper by the Joint Research Centre, the European Commission’s in-house science service. -
Data Portability and Privacy
SEPTEMBER 2019 CHARTING A WAY FORWARD Data Portability and Privacy Erin Egan VICE PRESIDENT AND CHIEF PRIVACY OFFICER, POLICY CHARTING A WAY FORWARD 1 Table of Contents 03 I. Intro 06 II. The Challenge 09 III. Five Questions About Portability and Responsibility 09 QUESTION 1 What is “data portability”? 13 QUESTION 2 Which data should be portable? 14 QUESTION 3 Whose data should be portable? 15 QUESTION 4 How should we protect privacy while enabling portability? 20 QUESTION 5 After people’s data is transferred, who is responsible if the data is misused or otherwise improperly protected? 24 IV. What’s Next? 25 End Notes CHARTING A WAY FORWARD 2 Data Portability and Privacy 01 There’s growing agreement among policymakers around the world that data portability—the principle that you should be able to take the data you share with one service and move it to another—can help promote competition online and encourage the emergence of new services. Competition and data protection experts agree that, although there are complicated issues involved, portability helps people control their data and can make it easier for them to choose among online service providers. The benefits of data portability to people and markets are clear, which is why our CEO, Mark Zuckerberg, recently called for laws that guarantee portability.1 But to build portability tools people can trust and use effectively, we should develop clear rules about what kinds of data should be portable and who is responsible for protecting that data as it moves to different providers.2 The purpose of this paper is to advance the conversation about what those rules should be. -
Data Transfer Project
Data Transfer Project August 20, 2018 Federal Trade Commission 600 Pennsylvania Ave NW Washington, DC 20580 To Whom It May Concern: Thank you for the opportunity to provide comment on the Federal Trade Commission’s Hearings on Competition and Consumer Protection in the 21st Century. As you may know, Google, Microsoft, Twitter, and Facebook recently announced the Data Transfer Project (datatransferproject.dev). We are excited to share our work on this project, including the thinking behind it, in response to your questions. Data portability is critical for user control and competition. Not only is this project relevant to the questions you raised in your request for comment on these topics, but we also encourage the Commission to consider the importance of portability throughout your process. The mission of the Data Transfer Project is to support direct, service-to-service portability. This will ultimately enable users to transfer data between two authenticated accounts behind the scenes, without having to download the data and relocate it themselves. This is an open-source project that will make it easier for people to switch services, or try new and innovative products, by improving the ease and speed of data portability. We have attached a detailed white paper that describes the technical foundations of the project and explains how our principles guided us toward this approach. The paper also includes detailed descriptions of the security and privacy considerations that are built into the project. Please let us know if you have any additional questions. Thanks, Keith Enright Julie Brill Damien Kieran Erin M. Egan Chief Privacy Officer Corporate Vice Data Protection Officer Vice President & Chief Google LLC President & Deputy Twitter, Inc Privacy Officer General Counsel Facebook, Inc. -
Digital Privacy
DIGITAL PRIVACY Web-Tracking stoppen Sie haben Interesse an den Kompaktseminaren Digital Privacy? E-Mail: [email protected] Die Inhalte dieses Dokuments wurden sehr sorgfältig recherchiert und verfasst. Die dargestellten Tipps&Tricks, Apps, Links und Programme wurden bereits tausendfach erfolgreich zur Anwendung gebracht. Bitte haben Sie Verständnis, dass eine Garantie, Gewährleistung oder Haftung dennoch ausgeschlossen ist. Sollten sich trotz aller Sorgfalt Fehler eingeschlichen haben, freue ich mich auf Ihre E-Mail [email protected] QUICK-GUIDE – TRACKING KONTROLLIEREN Auf den folgenden Seiten findet sich Hintergründiges zum Thema „Tracking kontrollieren“. Abgewo- gen werden verschiedene Wege zum Ziel, die Vor- und Nachteile von Erweiterungen (sogenannter Add-ons) für den Firefox-Browser unter Windows/Android, Installationshinweise sowie einige Tra- cking-Stopp-Tipps für das iPhone. Für alle, die sich direkt an die Umsetzung machen wollen, hier vorab ein kleiner Quick-Guide für Windows und Android. Unabdingbar: Der Mozilla Firefox-Browser (… vgl. jedoch auch „Tipp! Brave-Browser“) Mozilla Firefox (Windows) - https://www.mozilla.org/de/firefox/new/ Mozilla Firefox (Android) - https://www.mozilla.org/de/firefox/android/ oder Google Play Store Ab Version 70 kommt der Firefox-Browser mit einem sehr gut funktionierendem integrierten Tracker- und Fingerprintblocker daher. Das war auch schon in früheren Versionen der Fall, jedoch nur an- wählbar für den 'Privatmodus' bzw. nicht ganz so leistungsstark. Der Firefox-Browser -
Who Filters the Filters: Understanding the Growth, Usefulness and EIciency of Crowdsourced Ad Blocking
Who Filters the Filters: Understanding the Growth, Usefulness and Eiciency of Crowdsourced Ad Blocking Peter Snyder Antoine Vastel Benjamin Livshits Brave Soware University of Lille / INRIA Brave Soware / Imperial College USA France London [email protected] [email protected] United Kingdom [email protected] ABSTRACT 1 INTRODUCTION Ad and tracking blocking extensions are popular tools for improv- As the web has become more popular as a platform for information ing web performance, privacy and aesthetics. Content blocking and application delivery, users have looked for ways to improve the extensions generally rely on lter lists to decide whether a web privacy and performance of their browsing. Such eorts include request is associated with tracking or advertising, and so should popup blockers, hosts.txt les that blackhole suspect domains, be blocked. Millions of web users rely on lter lists to protect their and privacy-preserving proxies (like Privoxy 1) that lter unwanted privacy and improve their browsing experience. content. Currently, the most popular ltering tools are ad-blocking Despite their importance, the growth and health of lter lists are browser extensions, which determine whether to fetch a web re- poorly understood. Filter lists are maintained by a small number of source based on its URL. e most popular ad-blocking extensions contributors who use undocumented heuristics and intuitions to are Adblock Plus 2, uBlock Origin 3 and Ghostery 4, all of which determine what rules should be included. Lists quickly accumulate use lter lists to block unwanted web resources. rules, and rules are rarely removed. As a result, users’ browsing Filter lists play a large and growing role in making the web pleas- experiences are degraded as the number of stale, dead or otherwise ant and useful. -
Be Library Smart: Protecting Your Privacy
BE LIBRARY SMART: PROTECTING YOUR PRIVACY Browsers and Search Engines duckduckgo.com This search engine doesn’t track your activity, and their mobile app that assigns grades based on sites’ privacy offers more secure mobile browsing. startpage.com This search engine uses Google’s results but does not track your IP address or use cookies. brave.com Brave is a browser that blocks trackers and ads and automatically upgrades to https when available. Their mobile app features the same protections. torproject.org The Tor browser routes users’ activity through proxies all over the world to help provide anonymity. Add-ons/extensions disconnect.me This browser extension blocks third-party trackers. Available for Chrome, Firefox, and Opera, with laptop/desktop and mobile versions. noscript.net This browser extension disables JavaScript, Flash, and other elements of websites that can be used to track or infect a computer. Available for Firefox and Chrome. HTTPS Everywhere If a secure version of a website exists, this extension will automatically connect to it over the insecure default version. Available for Firefox, Chrome, and Opera. eff.org/https-everywhere Privacy Badger This add-on prevents websites from using invisible trackers. It learns from trackers’ behavior to block tracking across multiple sites. Available for Firefox, Chrome, and Opera. eff.org/privacybadger uBlock Origin This add-on blocks ads, trackers, and malware. Available for Firefox, Chrome, Microsoft Edge, and Safari. github.com/gorhill/uBlock Brought to you by the Maryland Library Association's Intellectual Freedom Panel and the Ruth Enlow Library. BE LIBRARY SMART: PROTECTING YOUR PRIVACY Apps and Services VPN Short for Virtual Private Network, this will route your internet connection through different IP addresses to better protect your privacy. -
Browsercookies Und Alternative Tracking-Technologien: Technische Und Datenschutzrechtliche Aspekte
Browsercookies und alternative Tracking-Technologien: technische und datenschutzrechtliche Aspekte Inhaltsübersicht 1. Einleitung 2. Tracking und Datenschutz 2.1. Personenbezogene Daten 2.2. Nutzungsdaten 2.3. Pseudonyme Daten 2.4. Anonyme Daten 2.5. Praktische Relevanz der Unterscheidung 3. Browser-Cookies 3.1. First- und Third-Party-Cookies 3.2. Einsatz von Browser-Cookies zur Messung, Steuerung und Profilbildung 3.3. Cookies und Datenschutz 3.3.1. Datenschutzrechtliche Regelungen im Telemediengesetz (TMG) 3.3.2. Die Cookie-Richtlinie 3.3.3. Fazit 4. Alternative Tracking-Technologien 4.1. Browser-basierte Technologien 4.1.1. Fingerprinting 4.1.2. Common-IDs 4.1.3. eTag 4.1.4. Local Storage (auch Web Storage, DOM Storage) 4.1.5. Flash-Cookies 4.1.6. Authentication Cache 4.2. Mobile app-basierte Technologien 4.2.1. Device abhängige IDs von Apple iOS 4.2.2. Device abhängige IDs von Google Android 4.3. Datenschutzrechtliche Aspekte bei alternativen Tracking-Technologien 5. Selbstregulierung in Deutschland (DDOW) 5.1. Technologieneutraler Geltungsbereich 5.2. Die Informationspflichten 5.3. Die Kontrollmöglichkeiten für Verbraucher 5.4. Weitere Verpflichtungen 6. Ausblicke – Regelungen einer künftigen Datenschutzgrundverordnung 1. Einleitung Im Internet versteht man unter Tracking die quantitative Messung und das Nachvollziehen des Nutzerverhaltens auf Websites sowie in einem weiteren Nutzungskontext die Messung von Werbeeinblendungen zum Zweck der Auslieferungskontrolle und -steuerung. Ein verlässlich funktionierendes Tracking, das eindeutige Ergebnisse über alle benötigten Metriken liefert und zugleich eine optimale Aussteuerung erlaubt, ist für Webangebote und werbetreibende Unternehmen im heute bestehenden wirtschaftlichen Konkurrenzumfeld absolut unerlässlich. Den technologischen Schlüssel zu einem leistungsfähigen Tracking liefert bis heute das Browsercookie, das häufig auch einfach nur als „Cookie“ bezeichnet wird. -
Consumer Data Rights and Competition - Background Note by the Secretariat
Organisation for Economic Co-operation and Development DAF/COMP(2020)1 Unclassified English - Or. English 29 April 2020 DIRECTORATE FOR FINANCIAL AND ENTERPRISE AFFAIRS COMPETITION COMMITTEE Consumer Data Rights and Competition - Background note by the Secretariat 10-12 June 2020 This document was prepared by the OECD Secretariat to serve as background material for the meeting of the Competition Committee on 12 June 2020. The opinions expressed and arguments employed herein do not necessarily reflect the official views of the Organisation or of the governments of its member countries. More documentation related to this discussion can be found at: http://www.oecd.org/daf/competition/consumer-data-rights-and-competition.htm. Please contact Mr. Antonio Capobianco if you have any questions about this document [E-mail: [email protected]] JT03461266 OFDE This document, as well as any data and map included herein, are without prejudice to the status of or sovereignty over any territory, to the delimitation of international frontiers and boundaries and to the name of any territory, city or area. 2 DAF/COMP(2020)1 Consumer Data Rights and Competition By the Secretariat* Consumer data rights are gaining more attention across the globe as more consumers come to rely on data-driven services in the digital economy. Consumer data rights can include fundamental rights to privacy, as well as a range of measures, such as data portability, that aim to provide consumers with greater control over their data. This paper looks at the role for competition policy and enforcement in driving competitive outcomes in markets involving consumer data. -
Understanding the Performance Costs and Benefits of Privacy-Focused
Understanding the Performance Costs and Benefits of Privacy-focused Browser Extensions Kevin Borgolte Nick Feamster [email protected] [email protected] Princeton University University of Chicago ABSTRACT 1 INTRODUCTION Advertisements and behavioral tracking have become an invasive The online advertisement (ad) industry has been one of the fastest nuisance on the Internet in recent years. Indeed, privacy advocates growing industries in the recent years, growing from over 108 and expert users consider the invasion signifcant enough to war- billion US dollars in 2018 to an estimated 129 billion US dollars rant the use of ad blockers and anti-tracking browser extensions. in 2019 in the United States [34], and to estimated 333 billion US At the same time, one of the largest advertisement companies in dollars in 2019 globally [12]. This growth has sparked numerous the world, Google, is developing the most popular browser, Google academic studies of various angles of online ads, from understand- Chrome. This confict of interest, that is developing a browser (a ing the underlying economics, the overall scale of it, mechanisms user agent) and being fnancially motivated to track users’ online and techniques used, as well as how miscreants are abusing it to behavior, possibly violating their privacy expectations, while claim- proft. ing to be a "user agent," did not remain unnoticed. As a matter of Academic and industry studies on the techniques that online fact, Google recently sparked an outrage when proposing changes ads are relying on have led to privacy advocates and expert users to Chrome how extensions can inspect and modify requests to "im- arguing that the ad companies’ tracking and data collection, which prove extension performance and privacy," which would render provides the foundation for the most prevalent online ads today, existing privacy-focused extensions inoperable. -
Understanding Ad Blockers
Understanding Ad Blockers A Major Qualifying Project Submitted to the Faculty of Worcester Polytechnic Institute In partial fulfillment of the requirements for the Degree of Bachelor of Science In Computer Science By _________________________________ Doruk Uzunoglu March 21, 2016 _______________________ Professor Craig E. Wills, Project Advisor Professor and Department Head Department of Computer Science ABSTRACT This project aims to provide useful information for users and researchers who would like to learn more about ad blocking. Three main research areas are explored in this project. The first research area provides general information about ad blocking tools and aims to explore ad blockers from a user’s perspective. The second research area provides analyses regarding thirdparty sites that appear on popular firstparty sites in order to explore the behavior of thirdparties. Finally, the third research area provides analyses regarding filter lists, which are sets of ad filtering rules used by ad blocking tools. The third research area aims to convey the differences and similarities between individual filter lists as well as sets of filter lists that form the defaults of ad blocking tools. 1 ACKNOWLEDGEMENTS I would like to thank Professor Craig Wills for advising my project, providing insight, and gathering the popular thirdparty domains data which I analyzed as part of this project. In addition, I would like to thank Jinyan Zang for sharing the thirdparty data regarding mobile apps, which they have gathered as part of their 2015 paper named “Who Knows What About Me? A Survey of Behind the Scenes Personal Data Sharing to Third Parties by Mobile Apps.” The data provided by Jinyan Zang was also analyzed as part of this project.