Security Cloud Privacy Tech
Being Transparent With User Data

Being Transparent With User Data

Mornings With Mark no. 0052

Watch the episode on YouTube

Join the discussion on LinkedIn

Share on Twitter

Bad Robot Transcript

Good morning, everyone. How’s it going today? Wanted to talk to you about it a little bit this week back. Now in the home studio, Do you live on a Friday beautiful day outside? Hope it’s wonderful where you are. One of a kind of games are being transparent with what you do with user data and how you fluff it.

What kind of set me off down this path was I tweeted out two days ago that office had an update on the case across all of the office 2015 Mac applications Avalanche in anticipation of our next week. Emma’s larger question of what do you do with user data? How do you collect user? Data? What data are you collecting is really at the Forefront of special the location sharing from third parties for cell phone provider.

So talked about earlier in the week at locationsmart in the US carriers of some of the Canadian ones turns out there’s a Canadian a company called stream CBC had a great article on that and I’ll wait for that download the user agreement. So here’s what they’re doing behind the scenes and there’s a lot of this sort of Shaving this going on and it’s a shame because it’s definitely not in the sun one.

If you’ve been tuning into some of the other episodes of morning with Mark huge fan of externally and internally being transparent around what you’re doing and why Telling you we have an automated tool that’s looking for security threats in traffic encryption is actually in the end there vs. Other sites where we’re doing a man-in-the-middle and looking at the traffic for the formula of me getting them on board of the way to go to things like this Microsoft Office pop-up.

You don’t have a choice if you want to use the software that’s part of the agreement in I understand there’s a lot of value in that somehow we still have those user interfaces based on that information, but still trying TuneIn improve the product and then it started to go to for a nice ass service for any sort of modern security software service that you deliver his trying to get as much user feedback on autumn.

Michael you understand how the products being used so that you can not only market and sell more product. But you can prove that a massive 48-page legal document for people to sign. That’s essentially not off panel and non comprehensive really doesn’t get where you want to be with your understanding of what data is being harvested and why there are certain scenarios where you’re using something and you understand what I’m tweeting out that the public even if I walked into protected.

It’s probably going to be published and you treated as such because the broadcast using on a desktop that’s really sort of where this gets under. My Bonnie has been my keyword, I guess all week but the amount of so I’m using an FM firewall. Give me an example of firewall my Mac little snitch.

Talk to you every time is a program is trying to access that are online until you where it’s going and they don’t tell you that they’re tracking tools to determine desktop Behavior. But again without transparency sort of the worst everybody internal and external needs to put a lot of effort into the usability the understanding of how to make or philosophy.

There’s no methodology. It’s really just a bad exchange. If you want to harvest a massive amount of David as fine as long as Don’t take any never work for your business for your users is a clear understanding as to what’s going where when and why. That’s what you take away for today.

I hope you are set up before a fantastic Friday as always pick me up online Mark and see a dime on this network in every other time if you’re seeing this on YouTube and such, Let me know what you think. What’s your approach on this? I hope you have a great Friday and a great weekend.

It was a long weekend for me. I will do that to most likely on Tuesday with another episode. Thank you. Take care. Good morning, everyone. How’s it going today? Wanted to talk to you about it a little bit this week back. Now in the home studio, Do you live on a Friday beautiful day outside? Hope it’s wonderful where you are.

One of a kind of games are being transparent with what you do with user data and how you fluff it. What kind of set me off down this path was I tweeted out two days ago that office had an update on the case across all of the office 2015 Mac applications Avalanche in anticipation of our next week.

Emma’s larger question of what do you do with user data? How do you collect user? Data? What data are you collecting is really at the Forefront of special the location sharing from third parties for cell phone provider. So talked about earlier in the week at locationsmart in the US carriers of some of the Canadian ones turns out there’s a Canadian a company called stream CBC had a great article on that and I’ll wait for that download the user agreement.

So here’s what they’re doing behind the scenes and there’s a lot of this sort of Shaving this going on and it’s a shame because it’s definitely not in the sun one. If you’ve been tuning into some of the other episodes of morning with Mark huge fan of externally and internally being transparent around what you’re doing and why Telling you we have an automated tool that’s looking for security threats in traffic encryption is actually in the end there vs.

Other sites where we’re doing a man-in-the-middle and looking at the traffic for the formula of me getting them on board of the way to go to things like this Microsoft Office pop-up. You don’t have a choice if you want to use the software that’s part of the agreement in I understand there’s a lot of value in that somehow we still have those user interfaces based on that information, but still trying TuneIn improve the product and then it started to go to for a nice ass service for any sort of modern security software service that you deliver his trying to get as much user feedback on autumn.

Michael you understand how the products being used so that you can not only market and sell more product. But you can prove that a massive 48-page legal document for people to sign. That’s essentially not off panel and non comprehensive really doesn’t get where you want to be with your understanding of what data is being harvested and why there are certain scenarios where you’re using something and you understand what I’m tweeting out that the public even if I walked into protected.

It’s probably going to be published and you treated as such because the broadcast using on a desktop that’s really sort of where this gets under. My Bonnie has been my keyword, I guess all week but the amount of so I’m using an FM firewall. Give me an example of firewall my Mac little snitch.

Talk to you every time is a program is trying to access that are online until you where it’s going and they don’t tell you that they’re tracking tools to determine desktop Behavior. But again without transparency sort of the worst everybody internal and external needs to put a lot of effort into the usability the understanding of how to make or philosophy.

There’s no methodology. It’s really just a bad exchange. If you want to harvest a massive amount of David as fine as long as Don’t take any never work for your business for your users is a clear understanding as to what’s going where when and why. That’s what you take away for today.

I hope you are set up before a fantastic Friday as always pick me up online Mark and see a dime on this network in every other time if you’re seeing this on YouTube and such, Let me know what you think. What’s your approach on this? I hope you have a great Friday and a great weekend.

It was a long weekend for me. I will do that to most likely on Tuesday with another episode. Thank you. Take care.

More Content