The present invention relates to the field of privacy and security. More specifically, the present invention relates to website privacy and security.
Today's websites and web application interaction model involve a browser retrieving data over the Internet (e.g., WWW) from advertisers, data collectors, content delivery networks and enterprise servers. Interaction model refers to the flow of data and control between various entities. Browsers displaying the web application or website user interfaces directly interact with many types of systems on the internet (e.g., advertiser systems). The common perception is that the website or web application is driven from the software residing on enterprise servers. This might be the case for enterprises that are business-centric, but consumer-centric enterprises work with many partners and affiliates (e.g., Google Analytics, a data collector), and therefore the data and control flow is dynamically constructed based on the consumer activity on the website or web application.
This dynamic interaction model is important for implementation of today's business strategies. Unfortunately, there are people and businesses that are taking advantage of this model to collect and misuse consumer data that can lead to privacy and security issues.
Enterprises are providing free products (e.g., email application) and services in exchange for the right to collect user/consumer information. This was the start of consumer data privacy problems, and today this data collection is being taken advantage of by third-parties (partners, direct and indirect affiliates and others) without direct consent of users/consumers. Key problems associated with data collection are:
A live privacy policy method and system enables enterprises to update in real-time their privacy policy declaration by monitoring the third-party activities using the invention described herein. Once the software is integrated into the website and web applications, third-party related activities are captured continuously and used to build a live profile that is also updated continuously. This allows enterprises adhere to privacy policy regulations without any delays. This also benefits consumers who are able to view the data being collected to determine if they want to opt out.
A privacy policy is a legal statement made by businesses to declare their policy regarding collection, use, dissemination, and maintenance of user/consumer/client (“Consumer”) personally identifiable information (PII) during the course of normal business conducted using the software applications or website of the business. Businesses are required to provide this legal statement to protect Consumer privacy. The United States Federal Trade Commission, U.S. state government agencies and similar agencies from other countries have been using a variety of tools to protect consumers' privacy and personal information.
Businesses have developed websites and web applications to support the interactive and highly interconnected environment in which people live and work today. These implementations involve: sourcing of content that is displayed in realtime when a user (e.g., Consumer) is interacting with the software; sourcing of content that is personalized to a user. Personalizations are based on: location of a user, profile/personality of the user, usage history, customer data from other sources and more; sourcing content from a multitude of sources; first party content where a first party is the website or web application owner that has the direct relationship with the user;
third party content, where a third party (e.g., advertisement networks) refers to: a business that is a separate legal entity from the first party, a business not affiliated by a common ownership or corporate control with the first party, a business that has access to first party resources (websites, web applications and data sources), if that business is authorized to use the information gathered from the resources for marketing or other purposes; content generation in realtime using dynamically generated scripts and other techniques, content personalization in realtime, customer data collection by first party or third parties, a large volume of data collection to support profiling and personalization, execution of range of analytics involving personal data to provide insights into individual and group trends, movements, interests, and activities; frequent and complex interactions among various businesses that involve personal data; and global availability of personal data, supported by communications networks and platforms.
These implementations are leading to many problems such as:
A live privacy policy system that is generated by the collaborative efforts of key stakeholders involved in the PII collection, retention, usage, sharing and maintenance, includes: realtime data (who, what data, retention policy, usage policy and sharing policy) for a first party and third parties, consumer restrictions and business compliance information, and regulatory requirements and business compliance information.
The live privacy policy system is tailored to a user and reflects the true intent of privacy rights. The key stakeholders responsible for the privacy policy are representatives of the business, Consumers and Third parties. Each of the stakeholders contribute to the generation of the Live Privacy Policy using tools and data that is made available to them.
For websites 108, PII and PPI data transacted is able to be captured by a browser extension 110, and the data is saved in first party dataset 104 and in third party dataset 106.
Regulated PII and PPI is captured from the regulations and saved in a dataset 112.
Users/consumers 114 view the first party dataset 104, third party dataset 106, regulatory dataset 112 and specify the consumer restrictions on the dataset 116. A live privacy policy manager 118 forwards restrictions specified by users 114 to a do not track manager 120. The do not track manager 120 generates the appropriate do not track requests to third parties and to the business applications. In some embodiments, the do not track requests are managed and monitored by industry entities such as National Advertising Initiative (NAI) and Digital Advertising Alliance (DAA). They will contact the appropriate company and request them to adhere to the user request. Once a confirmation is received from these entities, the do not track manager 120 will report back to the Live Privacy Profile Manager 118, and the restriction status will be updated from Pending to Active or will remain in Pending status if a response is not received. In some embodiments, the do not track implementation is automatically executed.
PII and PPI from business applications is captured in the business application PII/PPI dataset 122.
Each time a user 114 requests a live privacy policy from a business, the live privacy policy manager 118 reads the first party dataset 104, third party dataset 106, consumer restrictions and the business apps dataset 122 to generate the live privacy profile 124.
In some embodiments, the live privacy policy application(s) 330 include several applications and/or modules. In some embodiments, modules include one or more sub-modules as well. In some embodiments, fewer or additional modules are able to be included.
Examples of suitable computing devices include a personal computer, a laptop computer, a computer workstation, a server, a mainframe computer, a handheld computer, a personal digital assistant, a cellular/mobile telephone, a smart appliance, a gaming console, a digital camera, a digital camcorder, a camera phone, a smart phone, a portable music player, a tablet computer, a mobile device, a video player, a video disc writer/player (e.g., DVD writer/player, high definition disc writer/player, ultra high definition disc writer/player), a television, an augmented reality device, a virtual reality device, a home entertainment system, smart jewelry (e.g., smart watch) or any other suitable computing device.
To utilize the live privacy policy method and system, data collection is monitored from enterprise mobile and web applications. Once software is integrated and installed, users using the mobile and web applications are able to: observe the data being collected and restrict the data the enterprise and third parties are able to collect, use and share.
In operation, live privacy policy method and system provides many advantages:
Enterprises will provide an accurate and up-to-date privacy policy to the consumers and others who they conduct business with. This will improve the credibility for the enterprise and provide more confidence to consumers and others while conducting online business with the enterprise.
Data trackers and advertisers are able to continue to provide valuable personalization services to consumers but with explicit consent from the consumers. This cooperative environment will enable more accurate personalization and reduce the risks of inadvertent data leaks and security issues around personal data.
Consumers get personalized content while controlling what they want to share with enterprises providing products and services.
Consumer awareness that is context-specific and transparent, such as identifying: PII and PPI that is collected, third parties involved and their PII and PPI activities and other data sharing relationships among third parties that are not directly attributed to business that have direct consumer relationships. A business is better able to establish and maintain consumer confidence and trust, by: enabling consumer participation in PII activities, viewing PII being collected, providing tools to update or remove inaccurate data, providing a process to allow users to register, track and view progress of complaints, enabling business to monitor and manage data minimization requirements, enabling business to monitor and manage PII including usage, quality and integrity and security, and implementing realtime updates to privacy policy. Businesses and consumers are offered a process to handle Customer “Do Not Track” requests.
The present invention has been described in terms of specific embodiments incorporating details to facilitate the understanding of principles of construction and operation of the invention. Such reference herein to specific embodiments and details thereof is not intended to limit the scope of the claims appended hereto. It will be readily apparent to one skilled in the art that other various modifications may be made in the embodiment chosen for illustration without departing from the spirit and scope of the invention as defined by the claims.
This application claims the benefit of U.S. Provisional Patent Application Ser. No. 62/214,786, filed Sep. 4, 2015, and titled “PRIVACY AWARENESS APPLICATION, LIVE PRIVACY POLICY, AND DISTRIBUTED AND MULTIPLEXED PEER TO PEER REAL-TIME MESSAGING UTILIZING BACK PRESSURE SIGNALLING,” which is hereby incorporated by reference in its entirety for all purposes.
| Number | Date | Country | |
|---|---|---|---|
| 62214786 | Sep 2015 | US |