This session is a “behind the scenes look at Micrsoft’s internal privacy program.” See the agenda for more information. Participants: Kim Howell, Reese Solberg, Michelle Bruno.
From Kim: Website: is this a new domain, link to privacy statement? existing privacy statement and does it match/make sure it covers everything? Data collection (see above). Send questions to new site/organization, get information, iterate. More questions: authentication, communication, vendors. Are people creating new accounts? use of email? data access requests? Vendors? Next round of questions: how well does IT + PR + Lawyers work together? Does privacy statement match the service? where’s plausible deniability? Make sure what’s required is clear, what’s optional. Provide better notice about use of information, data retention. Using HTTPS? How easy/obvious is it to obtain informed consent when signing up? Companies often think that writing a privacy statement at the last minute. (Wrong)
Next iteration: What new data is being collected? being sent where? other (new) features coming up? what info is shared? location: is it always being sent, or only in use when app is open? what other info (unique device ID, cell tower info, gender, etc.) is being sent with location data? data retention? If services changes, company may need to re-opt in application users. Privacy controls? (example of circulating the data within different departments of the company, “accounting department loves this data.”) Who needs access? for what use? access to raw data or aggregated statistics? Have data handlers been trained? Unique identifiers are not the only way of identifying a person. What’s intended use of collected data?
Michelle Bruno, Technical Privacy Manager: see printed case study (not online). Focus areas:
- Level setting: focus on use of customer data, customer expectations, opting out
- Author guidance: “how to” guides, privacy review checklist, company activities, data sharing, research and betas
- Position yourself: pro-business privacy message, culture of privacy as a value-add
- Piggyback: identify existing processes that you can take advantage of: spec templates, guidelines, bug tracking, testing, release management…
- Analyze and assess: comprehensive data-gathering plan to understand company’s risk
- Educate: pro-privacy contacts in each group to help succeed, spread work to peers about new process/resources
- Identify triage partners: incident handling, partnerships in legal, customer support, operations, PR
- Measure: what are your success metrics?
Questions: tension between user controls and corporate collections? Make sure value matches, is understood by both sides. Look at what business can put in place to allow better user controls. Microsoft has a federated privacy team, Kim’s team defines what compliance looks like.