Results

David Schwab Joins FusionOps Board of Directors

David Schwab Joins FusionOps Board of Directors

Davd-schwab

David C. Schwab, who  co-founded Scopus Technology and served as Vice President of Sales until it was acquired by Siebel Systems, has joined the board of FusionOps. FusionOps is a “domain-based” Business Intelligence (BI) company that brings together cloud, Big Data, and a user-friendly interface to provide insights into supply chains. 

Built in the cloud, FusionOps provides users with pre-built metrics, tickers, and analytic reports. Business users can also fine-tune existing reports, to create new analytics, and drill down into the details. In addition, the product includes collaboration and social networking features. The company currently serves a diverse set of industries including: apparel and sportswear, mining, medical equipment, electronics, and energy companies.

The company is currently recruiting sales engineers and sales managers. Resumes can be sent to [email protected].

Schwab has been a long time Director of Sierra Ventures and helped build Sierra’s enterprise software investment practice. His primary investment focus is business applications and next generation infrastructure. Portfolio companies Dave has worked with in the past include: Accruent (acquired by Vista Equity Partners), Crosslogix (acquired by BEA Systems Inc.), CSS (acquired by Partners Group), SalesLogix (IPO and acquired by Sage), Knova (Merger of Kanisa and ServiceWare), MicroMuse (sold to IBM), OnLink Technologies (sold to Siebel Systems), and 360Commerce (sold to Oracle). His portfolio includes Corrigo, Parature, Prelert, Revionics, Trivantis, Zebra Imaging, and Zoom Systems.

In addtion his MBA from Harvard, Schwab holds two graduate engineering degrees from Stanford University and an undergraduate degree from UC San Diego.

Tech Optimization Chief Information Officer

Trends: 10 Trends for #Cloud Computing in 2014 To Dominate #Digital Disruption [Slide Share]

Trends: 10 Trends for #Cloud Computing in 2014 To Dominate #Digital Disruption [Slide Share]

Ten Trends For Cloud Computing In 2014 To Dominate Digital Disruption

Constellation's cloud computing research falls under the Tech Optimization and Innovation business theme and throughout other areas where applications are applied.

The trends for 2014 cover across the entire cloud stack. Holger Mueller, VP and Principal Analyst, covers the impact of Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) as well as HR Technologies in the Future of Work. R "Ray" Wang researches the impact of Cloud Computing on business strategy and the application landscape.

Below are the 2014 trends for Cloud Computing. Join the Constellation experience as we set to help our clients dominate digital disruption.

Your POV.

Do you have a cloud strategy? Can you see how the cloud will help enable digital business disruption? Add your comments to the blog or reach me via email: R (at) ConstellationR (dot) com or R (at) SoftwareInsider (dot) org.
Please let us know if you need help with your Cloud and Digital Business transformation efforts. Here’s how we can assist:
  • Assessing cloud computing readiness
  • Developing your digital business strategy
  • Connecting with other pioneers
  • Sharing best practices
  • Vendor selection
  • Implementation partner selection
  • Providing contract negotiations and software licensing support
  • Demystifying software licensing
Resources

Reprints

Reprints can be purchased through Constellation Research, Inc. To request official reprints in PDF format, please contact Sales .

Disclosure

Although we work closely with many mega software vendors, we want you to trust us. For the full disclosure policy, stay tuned for the full client list on the Constellation Research website.

* Not responsible for any factual errors or omissions. However, happy to correct any errors upon email receipt.

Copyright © 2001 -2014 R Wang and Insider Associates, LLC All rights reserved.

Contact the Sales team to purchase this report on a a la carte basis or join the Constellation Customer Experience

 

New C-Suite Tech Optimization Data to Decisions Future of Work Innovation & Product-led Growth SoftwareInsider amazon Oracle Microsoft AI ML Machine Learning LLMs Agentic AI Generative AI Robotics Analytics Automation Cloud SaaS PaaS IaaS Quantum Computing Digital Transformation Disruptive Technology Enterprise IT Enterprise Acceleration Enterprise Software Next Gen Apps IoT Blockchain CRM ERP CCaaS UCaaS Collaboration Enterprise Service developer Metaverse VR Healthcare Supply Chain Leadership B2B B2C CX EX Employee Experience HR HCM business Marketing Growth eCommerce finance Social Customer Service Content Management M&A Chief Customer Officer Chief Financial Officer Chief People Officer Chief Information Officer Chief Marketing Officer Chief Technology Officer Chief Information Security Officer Chief Data Officer Chief Digital Officer Chief Analytics Officer Chief Executive Officer Chief Operating Officer Chief Revenue Officer Chief Experience Officer

Augmented Reality and the Future of Digital Business

Augmented Reality and the Future of Digital Business

InsideAR 2013. R "Ray" Wang discusses Augmented Reality

New C-Suite Chief Customer Officer On <iframe width="420" height="315" src="//www.youtube.com/embed/CGUkDuK9730" frameborder="0" allowfullscreen></iframe>
Media Name: screenshotcr.png

From CMO and CIO to CDO

From CMO and CIO to CDO

Ray Wang and Esteban Kolsky, Milan Business Forum 2013

Data to Decisions Tech Optimization Chief Information Officer On <iframe src="//player.vimeo.com/video/80165276" width="500" height="281" frameborder="0" webkitallowfullscreen mozallowfullscreen allowfullscreen></iframe> <p><a href="http://vimeo.com/80165276">From CMO and CIO to CDO: Ray Wang and Esteban Kolsky, Milan Business Forum 2013</a> from <a href="http://vimeo.com/user22940496">Esteban Kolsky</a> on <a href="https://vimeo.com">Vimeo</a>.</p>
Media Name: screenshotcr.png

The ROI on hacking Target customers' cards

The ROI on hacking Target customers' cards

An unhappy holiday for Target customers

A week before Christmas, Target in the US revealed it had suffered a massive payment card data breach, with some 40 million customers affected. Details of the breach are still emerging. No well-informed criticism has yet to emerge of Target's security; instead most observers say that Target has very serious security, and therefore this latest attack must have been very sophisticated, or else an inside job. It appears Target was deemed PCI-DSS compliant -- which only goes to prove yet again the futility of the PCI audit regime for deterring organized criminals.

Security analyst Brian Krebs has already seen evidence of a "fire sale" on carding sites. Cardholder records are worth several dollars each, up to $44 according to Krebs for "fresh" accounts. So the Return on Investment for really big attacks like this one on Target (and before that, on Adobe, Heartland Payments Systems, TJMaxx and Sony) can approach one billion dollars.

We have to face the fact that no amount of conventional IT security can protect a digital asset worth a billion dollars. Conventional security can repel amateur attacks and prevent accidental losses, but security policies, audits and firewalls are not up to the job when a determined thief knows what they're looking for.

It's high time that we rendered payment card data immune to criminal reuse. This is not a difficult technological problem; it's been solved before in Card Present transactions around the world, and with a little will power, the payments industry could do it again for Internet payments, nullifying the black market in stolen card data.

A history of strong standardisation

The credit card payments system is a paragon of standardisation. No other industry has such a strong history of driving and adopting uniform technologies, infrastructure and business processes. No matter where you keep a bank account, you can use a globally branded credit card to go shopping in almost every corner of the world. This seamless interoperability is created by the universal Four Party settlement model, and a long-standing plastic card standard that works the same with ATMs and merchant terminals absolutely everywhere.

So with this determination to facilitate trustworthy and supremely convenient spending in every corner of the earth, it's astonishing that the industry is still yet to standardise Internet payments! We have for the most part settled on the EMV chip card standard for in-store transactions, but online we use a wide range of confusing and largely ineffective security measures. As a result, Card Not Present (CNP) fraud has boomed. I argue that all card payments -- offline and online -- should be properly secured using standardised hardware. In particular, CNP transactions should either use the very same EMV chip and cryptography as do Card Present payments, or it should exploit the capability of mobile handsets and especially Secure Elements.

CNP Fraud trends

The Australian Payments Clearing Association (APCA) releases twice-yearly card fraud statistics, broken down by fraud type: skimming & carding, Card Not Present, stolen cards and so on. Lockstep Consulting monitors the APCA releases and compiles a longitudinal series. The latest Australian card fraud figures are shown below.

Trends in Credit Card Fraud Categories

APCA like other regulators tend to varnish the rise in CNP fraud, saying it's smaller than the overall rise in e-commerce. There are several ways to interpret this contextualization. The population-wide systemic advantages of e-commerce can indeed be said to outweigh the fraud costs, yet this leaves the underlying vulnerability to payments fraud unaddressed, and ignores the qualitative problems suffered by the individual victims of fraud (as they say, history is written by the winners). It's pretty complacent to say the systemic benefit exceeds the cost of the fraud; it's would be like meekly attributing a high road toll to the popularity of motor cars. At some point, we have to do something about safety!

Frankly it's a mystery why the payments industry seems so bamboozled by CNP fraud, because technically it's a very simple problem. And it's one we've already solved elsewhere.

Card Not Present fraud is simply online carding.

Skimming and Carding

In carding, criminals replicate stolen customer data on blank cards; with CNP fraud they replay stolen data on merchant servers.

A magstripe card stores the customer's details as a string of ones and zeroes, and presents them to a POS terminal or ATM in the clear. It's child's play for criminals to scan the bits and copy them to a blank card.

The payments industry responded to skimming and carding with EMV (aka Chip-and-PIN). EMV replaces the magnetic storage with an integrated circuit, but more importantly, it secures the data transmitted from card to terminal. EMV works by first digitally signing those ones and zeros in the chip, and then verifying the signature at the terminal. The signing uses a Private Key unique to the cardholder and held safely inside the chip where it cannot be tampered with by fraudsters. It is not feasible to replicate the digital signature without having access to the inner workings of the chip, and thus EMV cards resist carding.

Online card fraud

Conventional Card Not Present (CNP) transactions are vulnerable because, like the old magstripe cards themselves, they rest on cleartext cardholder data. On its own, a merchant server cannot tell the difference between the original card data and a copy, just as a terminal cannot tell an original magstripe card from a criminal's copy.

Despite the simplicity of the root problem, the past decade has seen a bewildering patchwork of flimsy and expensive online payments fixes. Various One Time Passwords have come and gone, from scratchy cards to electronic key fobs. Temporary SMS codes have been popular but were recently declared unsafe by the Communications Alliance in Australia, a policy body representing the major mobile carriers.

Meanwhile, extraordinary resources have been squandered on the novel "3D Secure" scheme (MasterCard SecureCode and Verified by Visa). 3D Secure take-up is piecemeal; it's widely derided by merchants and customers alike. It upsets the underlying Four Party settlements architecture, slowing transactions to a crawl and introducing untold legal complexities.

A solution is at hand -- we've done it before

Why doesn't the card payments industry go back to its roots, preserve its global architecture and standards, and tackle the real issue? We could stop most online fraud by using the same chip technologies we deployed to kill off skimming.

It is technically simple to reproduce the familiar card-present user experience in a standard computer or in digital form on a smart phone. It would just take the will of the financial services industry to standardise digital signatures on payment messages sent from a card holder's device or browser to a merchant server.

And there is ample room for innovative payments modalities in online and mobile commerce settings:

  • A smart phone can hold a digital wallet of keys corresponding to the owner's cards; the keys can be invoked by a payments app, ideally inside a Secure Element in the handset, to digitally sign each payment, preventing tampering, theft and replay.
  • A tablet computer or smart phone can interface a conventional contactless payment card over the NFC (Near Field Communications) channel and use that card to sign transactions (see also the NFC interface demo by IBM Research).
  • Many laptop computers feature smartcard readers (some like the Dell e-series Latitudes even have contactless readers) which could accept conventional credit or debit cards.

 

 

Conclusion

All serious payments systems use hardware security. The classic examples include SIM cards, EMV, the Hardware Security Modules mandated by regulators in all ATMs, and the Secure Elements of NFC mobile devices. With well-designed hardware security, we gain a lasting upper hand in the cybercrime arms race.
The Internet and mobile channels will one day overtake the traditional physical payments medium. Indeed, commentators already like to say that the "digital economy" is simply the economy. Therefore, let us stop struggling with stopgap Internet security measures, and let us stop pretending that PCI-DSS audits will stop organised crime stealing card numbers by the million. Instead, we should kill two birds with one stone, and use chip technology to secure both Card Present and CNP transactions, to deliver the same high standards of usability and security in all channels.

Download complimentary research

The FIDO Alliance - by Steve Wilson

The Consumerization of Identity - by Steve Wilson

 


New C-Suite Next-Generation Customer Experience Digital Safety, Privacy & Cybersecurity Infosec Security Zero Trust Chief Customer Officer Chief Executive Officer Chief Information Officer Chief Information Security Officer Chief Privacy Officer

Tuesday's Tip: Seven Lessons Learned In Customer Experience Strategies During A Data Breach (such as @Target's)

Tuesday's Tip: Seven Lessons Learned In Customer Experience Strategies During A Data Breach (such as @Target's)

Every Brand Should Have A Plan For A Data Breach

The confluence of centralized personally identifiable information, reliance on digital channels, ease of hacking of magnetic stripes, and the application of the Willy Sutton rule ( a.k.a. you rob banks because that’s where the money is) improve the odds that many organizations will face a data breach.  The question is not whether one will happen, but more a question of when and to what extent.  How a brand addresses the customer experience component during a data breach will have significant impact that will subsume all other brand efforts up and until the data breach.

Source: Target

On December 19th, Target confirmed reports of a data breach affecting 40 million customers between November 27th and December 15th, 2013.  In conversation with over 30 customer experience professionals, many lessons have been learned from the recent Target breach and the largest breach with TJX (TJ Maxx and Marshall’s).  The following seven approaches highlight pragmatic and effective strategies to responding and mitigating the damage:

  1. Begin by isolating and understanding the root cause of the breach. Understanding the root cause enables a realistic understanding of all the options.  While it may take some time to get to the source, the investment in resources is worth it.  The truth will set you free from weaving an ever growing snow ball of lies and half truths.  Saying that you don’t know yet is not good enough.  Sharing how you are resolving or approaching the problem helps folks understand the why not the what.
  2. Catalyze a crisis command center. The command center should not be an after thought but part of the communications readiness training.  Prioritize key data. Put all your data sources to work.  Identify a protocol for decision making.  Quickly agree on talking points and messaging.  Democratize decision making and out reach to as many spokes persons as possible.  Apply the 9C’s of engagement to build out the crisis journey map.  While Target has an excellent social media program, the challenge is tackling crisis communications in defense not offense during the holiday season.
  3. Trust that transparency is the right course of action. Communicate the breach as early as possible. Do not try to cover it up as Target did. In fact, Target was outed by security expert Brian Krebs first, then Target had to come clean. The result has been disastrous.  Get in front of the issue.  It’s always easier to proactively influence than react.  Customers ultimately value transparency when they can understand the process and the efforts provided to date.  Outcomes ultimately matter but in the absence of a solution, upfront communication of the situation and approach helps bridge the trust gap.
  4. Activate the advocates. Leverage social media to inform key advocates and influencers.  Share core messaging.  Update frequently.  Seek input and advice.  Provide the influencers with timely updates and in some cases first line information.  While Target has done a good job on Facebook, the issue is not the communications plan, but more that the resolution is not satisfactory.
  5. Resolve the root cause of the problem. Customers seek resolution, not a patchwork of disparate solutions.  In Target’s case, the root cause is a privacy breach on card data.  The cleanest way to resolve the situation would be mass card replacement through digital distribution and self service redemption.  Target unfortunately chose to use credit card monitoring and put the onus on customers to monitor their fraud status.  Customer perceive this as a half-assed measure.
  6. Make a valuable offer. Use the opportunity to bring back customers not push then away.  Provide perceived value.  Solicit feedback on potential strategies with brand advocates.  Providing a new card with a stored value amount or discount is one approach.  Target’s offer of 10% off, coverage for any fraud, and security protection made perfect sense.  However, not combining the offer with a brand new card made the offer seem hallow as it did not address the root cause.
  7. Rebuild trust with subsequent engagement. Determine the next course of actions.  Once the crisis has passed, brands must continue to reassure customers on security and privacy.  In Target’s case, they will need to announce what measures have been taken, how many folks have been breached, how have folks been compensated, and what is being done in the future to prevent breaches.  If the credit card industry is smart, they will also help Target in providing solutions and investing in marketing messages.

The Bottom Line: The Shift To Digital Businesses Require A New Level Of Authenticity

Good leadership is tested in a crisis. The actions any executive has to make during a crisis reflect on the core values of the company.  Trust and transparency are key pillars of an authentic business.  In a digital world, speed is the other factor that must be considered.  Preparing for a crisis is never easy.  Preparing for a data breach is actually a bit easier. Why? It’s inevitable and a key requirement in addressing customer experience as we enter a world of digital disruption.

While Monday morning quarterbacking is easy during a crisis, the point here is to take lessons learned from other disasters and get ahead of the issue.  One crisis can take down decades and billions of marketing dollars spent building a brand.  Handling a crisis well can also remake the image of a brand.  A great example is the Tylenol recall of 1982 where the mass drug recall while expensive, proved to reassure the public of J&J McNeil’s sincerity in addressing the root cause.

When product differentiation is not enough and when service differentiation is not enough, all we have our outcomes and experiences. Customer aren’t buying product or services any more.  Customers are buying outcomes and experiences.  All we have is our brand and how you handle a data breach will determine the future of your organization.  How will you prepare to dominate digital disruption?

Your POV.

Are you ready to address customer experience strategies and incorporate digital business transformation in advance of a data breach?  Are you embarking on a digital business transformation?  Let us know how it’s going!  Add your comments to the blog or reach me via email: R (at) ConstellationR (dot) com or R (at) SoftwareInsider (dot) com.

Please let us know if you need help with your Customer Centricity and Digital Business transformation efforts.  Here’s how we can assist:

  • Assessing customer centricity readiness
  • Developing your digital business strategy
  • Connecting with other pioneers
  • Sharing best practices
  • Vendor selection
  • Implementation partner selection
  • Providing contract negotiations and software licensing support
  • Demystifying software licensing

Related Research:

Reprints

Reprints can be purchased through Constellation Research, Inc. To request official reprints in PDF format, please contact Sales .

Disclosure

Although we work closely with many mega software vendors, we want you to trust us. For the full disclosure policy, stay tuned for the full client list on the Constellation Research website.

* Not responsible for any factual errors or omissions.  However, happy to correct any errors upon email receipt.

Copyright © 2001 – 2013 R Wang and Insider Associates, LLC All rights reserved.
Contact the Sales team to purchase this report on a a la carte basis or join the Constellation Customer Experience!

 

Marketing Transformation Matrix Commerce New C-Suite Next-Generation Customer Experience Data to Decisions Future of Work Digital Safety, Privacy & Cybersecurity Tech Optimization Innovation & Product-led Growth Revenue & Growth Effectiveness SoftwareInsider Digital Transformation Marketing B2B B2C CX Customer Experience EX Employee Experience AI ML Generative AI Analytics Automation Cloud Disruptive Technology Growth eCommerce Enterprise Software Next Gen Apps Social Customer Service Content Management Collaboration Machine Learning business SaaS PaaS CRM ERP Leadership LLMs Agentic AI HR HCM IaaS Supply Chain Enterprise IT Enterprise Acceleration IoT Blockchain finance M&A Enterprise Service Security Zero Trust Robotics Quantum Computing CCaaS UCaaS developer Metaverse VR Healthcare Chief Customer Officer Chief Executive Officer Chief Marketing Officer Chief Digital Officer Chief Data Officer Chief Experience Officer Chief People Officer Chief Information Officer Chief Technology Officer Chief Analytics Officer Chief Information Security Officer Chief Operating Officer Chief Privacy Officer Chief Revenue Officer Chief Financial Officer Chief Human Resources Officer

Santa gets product through customs…can you?

Santa gets product through customs…can you?

First I want to wish happy holidays to everyone and their families and friends. As a child we were told that jolly Saint Nick would come down our chimneys on December 24th and deliver presents to all the good boys and girls. The rotund man dressed in red would be able to canvass the globe only powered by a sleigh pulled by reindeer – and amazingly have 100% on time delivery and usually 100% perfect order (there are still some orders I placed that had substitute products). So how does he accomplish this? He has perfect visibility into the demand (all those letters, emails and texts he receives in the North Pole) as well as his inventory levels. One advantage Santa Claus has is that he is carrying all of the inventory and doing the delivery himself, tiring yes, but he really just needs a routing schedule. This is not as simple for the rest of us.

Visibility is a term that we throw around with reckless abandon, but the goal of visibility remains a centre piece to our supply chain strategies. The ability to gain visibility was a driving theme for the adoption of the cloud in supply chain. There are numerous example s of companies leveraging cloud enabled platforms to provide a richer view of what was happening with suppliers, providing insight into planning cycles, inventory levels, manufacturing capacities, point of sale information just to name a few. Improved visibility really begins with the better communications amongst our disparate systems that power our supply chains. Companies, such as Kinaxis, have developed the concept of a supply chain control tower. The control tower allowing faster visibility into supply chain events: a centralized tool that allows for a greater ability to read and react. Other companies like One Network and E2open been able to leverage the technical advantages of the cloud – greater connectivity, allowing for greater visibility and offering true network effect. Allowing for networks to be seamless created, where information exchange can happen with fewer limitations. At the foundation, it is about improved visibility into the supply chain.

However, one variable when it comes to better supply chain visibility that does not seem to get the attention is around inventory that is held up at ports, airport or any point of exit or entry for trade. In a recent SCM World report, 80% of the respondents agreed that customers and customs problems were impacting customer service in a material way.

So when it comes to gaining improved end to end supply chain visibility, the ability to have  more robust view of what is happening to your inventory at these locations is a key element. According to a calculation done by Kelly Thomas at JDA, at any given moment $12 trillion of inventory is either sitting or moving in the world. The question becomes, how much of this inventory is being delayed due to customs issues or because of not having the proper paperwork? Not only does this impact the movement of inventory but also impacts the positioning of inventory. Firms like Cisco, HP and Dell who have very tight service level agreements (SLAs) when it comes to servicing their customers have to take into account customs when placing their inventories in different parts of the globe. This can lead to having redundant inventory that is geographically close, but separated by a border that leads to custom issues…which could delay the ability to meet their SLAs.

Companies such as Amber Road and GT Nexus provide their customers with the ability to have greater visibility into inventory when it is in this state. Where is it in the process of such stages as clearing exports, or passing import hurdles? This level of visibility is key when it comes to managing the rest of the supply chain. Allowing customers to identify what can be a bottle neck – the points of entry. Gaining this added insight into what is happening where your inventory looks to cross a border clears up on more potential blind spot in your supply chain. Since the movement of global trade is not about to abate any time soon, this blind spot carries tremendous impact on your overall supply chain.

Santa Claus has found a way to move his inventory globally without worrying about it being held up at points of exit or entry. The rest of us still need to find ways for enhanced visibility into these physical choke points in our supply chain. When it comes to visibility, make sure you work with your service provider(s) to identify the granularity and speed at which you can see into where your inventory sits. We are striving to get closer to true end to end visibility, but there remain blind spots that we must be aware of.


Tech Optimization Matrix Commerce Data to Decisions Innovation & Product-led Growth Supply Chain Automation Cloud Digital Transformation Disruptive Technology Enterprise IT Enterprise Acceleration Enterprise Software IoT Blockchain ERP Leadership Collaboration M&A Chief Supply Chain Officer

Facebook's challenge to the Collection Limitation Principle

Facebook's challenge to the Collection Limitation Principle

Facebook's challenge to the Collection Limitation Principle

An extract from our chapter in the forthcoming Encyclopedia of Social Network Analysis and Mining.

Stephen Wilson, Lockstep Consulting, Sydney, Australia.
Anna Johnston, Salinger Privacy, Sydney, Australia.

Key Points

  • Facebook's business practices pose a risk of non-compliance with the Collection Limitation Principle (OECD Privacy Principle No. 1, and corresponding Australian National Privacy Principles NPP 1.1 through 1.4).
  • Privacy problems will likely remain while Facebook's business model remains unsettled, for the business is largely based on collecting and creating as much Personal Information as it can, for subsequent and as yet unspecified monetization.
  • If an OSN business doesn't know how it is eventually going to make money from Personal Information, then it has a fundamental difficulty with the Collection Limitation principle.

Introduction

Facebook is an Internet and societal phenomenon. Launched in 2004, in just a few years it has claimed a significant proportion of the world's population as regular users, becoming by far the most dominant Online Social Network (OSN). With its success has come a good deal of controversy, especially over privacy. Does Facebook herald a true shift in privacy values? Or, despite occasional reckless revelations, are most users no more promiscuous than they were eight years ago? We argue it's too early to draw conclusions about society as a whole from the OSN experience to date. In fact, under laws that currently stand, many OSNs face a number of compliance risks in dozens of jurisdictions.

Over 80 countries worldwide now have enacted data privacy laws, around half of which are based on privacy principles articulated by the OECD. Amongst these are the Collection Limitation Principle which requires businesses to not gather more Personal Information than they need for the tasks at hand, and the Use Limitation Principle which dictates that Personal Information collected for one purpose not be arbitrarily used for others without consent.
Overt collection, covert collection (including generation) and "innovative" secondary use of Personal Information are the lifeblood of Facebook. While Facebook's founder would have us believe that social mores have changed, a clash with orthodox data privacy laws creates challenges for the OSN business model in general.

This article examines a number of areas of privacy compliance risk for Facebook. We focus on how Facebook collects Personal Information indirectly, through the import of members' email address books for "finding friends", and by photo tagging. Taking Australia's National Privacy Principles from the Privacy Act 1988 (Cth) as our guide, we identify a number of potential breaches of privacy law, and issues that may be generalised across all OECD-based privacy environments.

Terminology

Australian law tends to use the term "Personal Information" rather than "Personally Identifying Information" although they are essentially synonymous for our purposes.

Terms of reference: OECD Privacy Principles and Australian law

The Organisation for Economic Cooperation and Development has articulated eight privacy principles for helping to protect personal information. The OECD principles are as follows:

1. Collection Limitation Principle
2. Data Quality Principle
3. Purpose Specification Principle
4. Use Limitation Principle
5. Security Safeguards Principle
6. Openness Principle
7. Individual Participation Principle
8. Accountability Principle

Of most interest to us here are principles one and four:

  • Collection Limitation Principle: There should be limits to the collection of personal data and any such data should be obtained by lawful and fair means and, where appropriate, with the knowledge or consent of the data subject.
  • Use Limitation Principle: Personal data should not be disclosed, made available or otherwise used for purposes other than those specified in accordance with [the Purpose Specification] except with the consent of the data subject, or by the authority of law.

At least 89 counties have some sort of data protection legislation in place [Greenleaf, 2012]. Of these, in excess of 30 jurisdictions have derived their particular privacy regulations from the OECD principles. One example is Australia.

We will use Australia's National Privacy Principles NPPs in the Privacy Act 1988 as our terms of reference for analysing some of Facebook's systemic privacy issues. In Australia, Personal Information is defined as: information or an opinion (including information or an opinion forming part of a database), whether true or not, and whether recorded in a material form or not, about an individual whose identity is apparent, or can reasonably be ascertained, from the information or opinion.

Indirect collection of contacts

One of the most significant collections of Personal Information by Facebook is surely the email address book of those members that elect to have the site help "find friends". This facility provides Facebook with a copy of all contacts from the address book of the member's nominated email account. It's the very first thing that a new user is invited to do when they register. Facebook refer to this as "contact import" in the Data Use Policy (accessed 10 August 2012).

"Find friends" is curtly described as "Search your email for friends already on Facebook". A link labelled "Learn more" in fine print leads to the following additional explanation:

  • "Facebook won't share the email addresses you import with anyone, but we will store them on your behalf and may use them later to help others search for people or to generate friend suggestions for you and others. Depending on your email provider, addresses from your contacts list and mail folders may be imported. You should only import contacts from accounts you've set up for personal use." [underline added by us].

Without any further elaboration, new users are invited to enter their email address and password if they have a cloud based email account (such as Hotmail, gmail, Yahoo and the like). These types of services have an API through which any third party application can programmatically access the account, after presenting the user name and password.

It is entirely possible that casual users will not fully comprehend what is happening when they opt in to have Facebook "find friends". Further, there is no indication that, by default, imported contact details are shared with everyone. The underlined text in the passage quoted above shows Facebook reserves the right to use imported contacts to make direct approaches to people who might not even be members.

Importing contacts represents an indirect collection by Facebook of Personal Information of others, without their authorisation or even knowledge. The short explanatory information quoted above is not provided to the individuals whose details are imported and therefore does not constitute a Collection Notice. Furthermore, it leaves the door open for Facebook to use imported contacts for other, unspecified purposes. The Data Use Policy imposes no limitations as to how Facebook may make use of imported contacts.

Privacy harms are possible in social networking if members blur the distinction between work and private lives. Recent research has pointed to the risky use of Facebook by young doctors, involving inappropriate discussion of patients [Moubarak et al, 2010]. Even if doctors are discreet in their online chat, we are concerned that they may run foul of the Find Friends feature exposing their connections to named patients. Doctors on Facebook who happen to have patients in their webmail address books can have associations between individuals and their doctors become public. In mental health, sexual health, family planning, substance abuse and similar sensitive fields, naming patients could be catastrophic for them.

While most healthcare professionals may use a specific workplace email account which would not be amenable to contacts import, many allied health professionals, counsellors, specialists and the like run their sole practices as small businesses, and naturally some will use low cost or free cloud-based email services. Note that the substance of a doctor's communications with their patients over webmail is not at issue here. The problem of exposing associations between patients and doctors arises simply from the presence of a name in an address book, even if the email was only ever used for non-clinical purposes such as appointments or marketing.

Photo tagging and biometric facial recognitio

One of Facebook's most "innovative" forms of Personal Information Collection would have to be photo tagging and the creation of biometric facial recognition templates.

Photo tagging and "face matching" has been available in social media for some years now. On photo sharing sites such as Picasa, this technology "lets you organize your photos according to the people in them" in the words of the Picasa help pages. But in more complicated OSN settings, biometrics has enormous potential to both enhance the services on offer and to breach privacy.

In thinking about facial recognition, we start once more with the Collection Principle. Importantly, nothing in the Australian Privacy Act circumscribes the manner of collection; no matter how a data custodian comes to be in possession of Personal Information (being essentially any data about a person whose identity is apparent) they may be deemed to have collected it. When one Facebook member tags another in a photo on the site, then the result is that Facebook has overtly but indirectly collected PI about the tagged person.

Facial recognition technologies are deployed within Facebook to allow its servers to automatically make tag suggestions; in our view this process constitutes a new type of Personal Information Collection, on a potentially vast scale.

Biometric facial recognition works by processing image data to extract certain distinguishing features (like the separation of the eyes, nose, ears and so on) and computing a numerical data set known as a template that is highly specific to the face, though not necessarily unique. Facebook's online help indicates that they create templates from multiple tagged photos; if a user removes a tag from one of their photo, that image is not used in the template.

Facebook subsequently makes tag suggestions when a member views photos of their friends. They explain the process thus:

  • "We are able to suggest that your friend tag you in a picture by scanning and comparing your friend's pictures to information we've put together from the other photos you've been tagged in".

So we see that Facebook must be more or less continuously checking images from members' photo albums against its store of facial recognition templates. When a match is detected, a tag suggestion is generated and logged, ready to be displayed next time the member is online.

What concerns us is that the proactive creation of biometric matches constitutes a new type of PI Collection, for Facebook must be attaching names -- even tentatively, as metadata -- to photos. This is a covert and indirect process.

Photos of anonymous strangers are not Personal Information, but metadata that identifies people in those photos most certainly is. Thus facial recognition is converting hitherto anonymous data -- uploaded in the past for personal reasons unrelated to photo tagging let alone covert identification -- into Personal Information.

Facebook limits the ability to tag photos to members who are friends of the target. This is purportedly a privacy enhancing feature, but unfortunately Facebook has nothing in its Data Use Policy to limit the use of the biometric data compiled through tagging. Restricting tagging to friends is likely to actually benefit Facebook for it reduces the number of specious or mischievous tags, and it probably enhances accuracy by having faces identified only by those who know the individuals.

A fundamental clash with the Collection Limitation Principle

In Australian privacy law, as with the OECD framework, the first and foremost privacy principle concerns Collection. Australia's National Privacy Principle NPP 1 requires that an organisation refrain from collecting Personal Information unless (a) there is a clear need to collect that information; (b) the collection is done by fair means, and (c) the individual concerned is made aware of the collection and the reasons for it.

In accordance with the Collection Principle (and others besides), a conventional privacy notice and/or privacy policy must give a full account of what Personal Information an organisation collects (including that which it creates internally) and for what purposes. And herein lies a fundamental challenge for most online social networks.

The core business model of many Online Social Networks is to take advantage of Personal Information, in many and varied ways. From the outset, Facebook founder, Mark Zuckerberg, appears to have been enthusiastic for information built up in his system to be used by others. In 2004, he told a colleague "if you ever need info about anyone at Harvard, just ask" (as reported by Business Insider). Since then, Facebook has experienced a string of privacy controversies, including the "Beacon" sharing feature in 2007, which automatically imported members' activities on external websites and re-posted the information on Facebook for others to see.

Facebook's privacy missteps are characterised by the company using the data it collects in unforeseen and barely disclosed ways. Yet this is surely what Facebook's investors expect the company to be doing: innovating in the commercial exploitation of personal information. The company's huge market valuation derives from a widespread faith in the business community that Facebook will eventually generate huge revenues. An inherent clash with privacy arises from the fact that Facebook is a pure play information company: its only significant asset is the information it holds about its members. There is a market expectation that this asset will be monetized and maximised. Logically, anything that checks the network's flux in Personal Information -- such as the restraints inherent in privacy protection, whether adopted from within or imposed from without -- must affect the company's futures.

Conclusion

Perhaps the toughest privacy dilemma for innovation in commercial Online Social Networking is that these businesses still don't know how they are going to make money from their Personal Information lode. Even if they wanted to, they cannot tell what use they will eventually make of it, and so a fundamental clash with the Collection Limitation Principle remains.

Acknowledgements

An earlier version of this article was originally published by LexisNexis in the Privacy Law Bulletin (2010).

References

Greenleaf G., "Global Data Privacy Laws: 89 Countries, and Accelerating", Privacy Laws & Business International Report, Issue 115, Special Supplement, February 2012 Queen Mary School of Law Legal Studies Research Paper No. 98/2012

Moubarak G., Guiot A. et al "Facebook activity of residents and fellows and its impact on the doctor--patient relationship" J Med Ethics, 15 December 2010

New C-Suite Marketing Transformation Matrix Commerce Chief Customer Officer Chief Information Officer Chief Marketing Officer

Oracle Acquires Responsys

Oracle Acquires Responsys

Oracle-logo   Responsys

Adding to its portfolio of CRM solutions, Oracle Corporation (NYSE: ORCL) has entered into an agreement to acquire Responsys (NASDAQ: MKTG),  a cloud-based email and social marketing company to be part of the Oracle Marketing Cloud. Under the terms of the deal Oracle will acquire the company for $27 per share in cash or approximately $1.5 billion, net of Responsys’ cash. This represents a 38% premium over its share price the day before the transaction. In response to the annoucement, Responsys shares climbed to $26.90 in morning trading. Oracle Corp.'s stock added 3 cents to $36.63.

Founded in 1998 to sell software to design, execute and manage email campaigns Responsys launched the industry’s first Cloud email marketing platform. By 2004, with a new management team, Responsys started moving towards engaging customers in an interactive dialogues beyond email. In 2005,  the company introduced the concept of Cross-Channel Lifecycle Marketing. In 2009, the company introduced the Responsys Interact Suite. But it was only in April 2011, Responsys became a public company.

In a press release Oracle stated "By bringing together Responsys and Oracle Eloqua in the Marketing Cloud, for the first time CMOs that support industries with B2C or B2B business models will be equipped to drive exceptional customer experiences across marketing interactions and throughout the customer lifecycle from a single platform"

“As a part of Oracle, we will only accelerate our efforts,” said Dan Springer, CEO, Responsys and former McKinsey consultant. “We couldn’t be more excited about what this means.”

Customers include Ascena, JetBlue, City Sports, Freshpair.com, Barratts, Build.com, Pictage, Epson, Lenovo, and Lufthansa.

This transaction comes on the heels of Salesforce.com's similar acquisition of Exact Target and will make Constant Contact (Nasdaq: CTCT) a more appealing acquistion. This news will fuel venture capital investment in marketing software companies and contribute to the bubble forming around cloud and marketing CRM companies. 

The proposed transaction is subject to Responsys stockholders tendering a majority of the outstanding shares , certain regulatory approvals and other customary closing conditions, and is expected to close in the first half of 2014. 

If this happens (and it is very likely to) it will give existing customers yet another way to innovate around the edges of Oracle Siebel.

My analysis of the FIDO Alliance

My analysis of the FIDO Alliance

I've written a new Constellation Research "Quark" Report on the FIDO Alliance ("Fast Identity Online"), a fresh, fast growing consortium working out protocols and standards to connect authentication endpoints to services.

Download the Quark snapshot

With a degree of clarity that is uncommon in Identity and Access Management (IDAM), FIDO envisages simply "doing for authentication what Ethernet did for networking".

Not quite one year old, 2013, the FIDO Alliance has already grown to nearly 70 members, amongst which are heavyweights like Google, Lenovo, MasterCard, Microsoft and PayPal as well as a dozen biometrics vendors and several global players in the smartcard supply chain.

STOP PRESS! Discover Card joined a few days ago at board level.

FIDO is different. The typical hackneyed IDAM elevator pitch in promises to "fix the password crisis" but usually with unintended impacts on how business is done. Most IDAM initiatives unwittingly convert clear-cut technology problems into open-ended business transformation problems.

In welcome contrast, FIDO's mission is clear cut: it seeks to make strong authentication interoperable between devices and servers. When users have activated FIDO-compliant endpoints, reliable fine-grained information about the state of authentication becomes readily discoverable by any server, which can then make access control decisions according to its own security policy.

FIDO is not about federation; it's not even about "identity"!

With its focus, pragmatism and critical mass, FIDO is justifiably today's go-to authentication industry standards effort.

For more detail, please have a look at "The FIDO Alliance".

Download the Quark snapshot

 

Data to Decisions Matrix Commerce New C-Suite Next-Generation Customer Experience Digital Safety, Privacy & Cybersecurity Tech Optimization Future of Work FIDO Security Zero Trust Chief Customer Officer Chief Executive Officer Chief People Officer Chief Information Officer Chief Information Security Officer Chief Privacy Officer