Mobile Privacy and Apps
New Legislation:
Location Privacy
and Apps
Class 7
Mobile Privacy and Apps
Location Privacy Protection Act
Introduced in Congress in June 2011 to address
voluntary location tracking of electronic
communications devices.
Covers these issues:
1. Voluntary location tracking of electronic
communications devices
A covered entity may not knowingly collect, receive, record,
obtain, or disclose to a nongovernmental individual or entity the
geolocation information from an electronic communications
device without the express authorization of the individual that is
using the electronic communications device.
Mobile Privacy and Apps
Location Privacy Protection Act
2. Geolocation information used in interstate
domestic violence or stalking
A covered entity that knowingly and willfully discloses
geolocation information about an individual to another
individual
3. Sale of geolocation information of young children
Any person who knowingly and willfully sells the geolocation
information of not less than 1,000 children under 11 years of age
shall be fined under this title, imprisoned for not more 2 years,
or both.
 
Mobile Privacy and Apps
Geolocation Privacy and
Surveillance Act
Introduced in Congress in June 2011.
The GPS Act would require federal, state, and local
authorities to cite probable cause and obtain a
warrant from a judge before conducting GPS-enabled
surveillance, such as the secret placement of
tracking devices on the cars of suspected terrorists
and criminals. It would also require a warrant to
obtain tracking data about individuals from wireless
companies.
In addition, the GPS Act would prohibit businesses
from disclosing geographical tracking data about its
customers to other companies without the
customers' permission.
Mobile Privacy and Apps
Mobile Device Privacy Act
Introduced in Congress in September 2012
Motivated by Carrier IQ controversy
- Carrier IQ software on smartphones and other devices
tracks user keystrokes, location and text messages without
their knowledge or consent.
- Was used on many smartphones and carrier systems
- Most cell phone manufactureres and cell phone
carriers have now discontinued use of Carrier IQ, but not
all.
Mobile Privacy and Apps
Mobile Device Privacy Act
The “Mobile Device Privacy Act” protects
consumers by requiring:
Disclosure of mobile telephone monitoring when a
consumer buys a mobile phone; after sale, if the
carrier, manufacturer, or operating system later
installs monitoring software; and if a consumer
downloads an app and that app contains monitoring
software
The disclosure includes the fact that the monitoring
software has been installed on the phone, the types
of information that are collected, the identity of the
parties to which the information is transmitted, and
how such information will be used
Mobile Privacy and Apps
Mobile Device Privacy Act
The “Mobile Device Privacy Act” protects
consumers by requiring:
Consumer consent before monitoring software
begins collecting and transmitting information
The party receiving the personal information must
have policies in place to secure the information
Agreements on information transmission must be
filed at the Federal Trade Commission (FTC) and
Federal Communications Commission (FCC)
An enforcement regime for the FTC and FCC, along
with State AG enforcement and a private right of
action

More Related Content

PPT
Presentation ICT2
PPT
Presentation Ict
PPT
24227541 cyber-law
PPTX
PPTX
electronic commerce act 8792 (2000)
PDF
It Amendments Act
PPTX
Legal Issues in Online Environment
PPTX
Regulation in the place of digital and mobile platform
Presentation ICT2
Presentation Ict
24227541 cyber-law
electronic commerce act 8792 (2000)
It Amendments Act
Legal Issues in Online Environment
Regulation in the place of digital and mobile platform

What's hot (20)

PPT
Cyberlaw An Overview
PDF
Cyber Law
PPT
ICT / IT Law (Cyberlaw)
PPTX
E-commerce Law in the Philippines
PPTX
The e commerce law
PDF
The E-Commerce Act - Republic Act 8792
PPT
LEGAL STRATEGIES FOR INDIAN BPOs – POST KKARAN BAHREE CASE
PPTX
1.03 ethics and_security_review_ppt (1)
PPTX
PPT
Cyber Law
PPTX
it act 2000
PPTX
Information act 2000
PPT
Cyber laws and patents
PPTX
I.T ACT 2000
PPTX
IT Act 2000
PPTX
Btk fatih akpinar
PDF
The Electronic Commerce Act and its Implementing Rules and Regulations
PPTX
Information technology act 2000
PDF
Cyberlaws report
PPT
Information Technology Act 2000 - Santosh K Pathak
Cyberlaw An Overview
Cyber Law
ICT / IT Law (Cyberlaw)
E-commerce Law in the Philippines
The e commerce law
The E-Commerce Act - Republic Act 8792
LEGAL STRATEGIES FOR INDIAN BPOs – POST KKARAN BAHREE CASE
1.03 ethics and_security_review_ppt (1)
Cyber Law
it act 2000
Information act 2000
Cyber laws and patents
I.T ACT 2000
IT Act 2000
Btk fatih akpinar
The Electronic Commerce Act and its Implementing Rules and Regulations
Information technology act 2000
Cyberlaws report
Information Technology Act 2000 - Santosh K Pathak
Ad

Viewers also liked (20)

PPTX
Cse trans tel corporate presentation (2013)
DOC
Salesian founts2 2
PDF
Common Indications for Referral for Fetal Echo
PDF
Proceedings from the 7th Organic Seed Growers Conference
PDF
Estluciano8 vista fixa pb sup
PDF
Rose_Jarrett - Thesis, Final
PPT
Mobile Regulations, Laws and Procedures_Michael Hanley
PDF
Alabama's Opportunities and Challenges
PPTX
Sterling construction company
DOC
PDF
Q1 2009 Earning Report of Harley Davidson
DOC
PDF
FirstEnergy Annual_Report_2006_Low_Res
PDF
Quality enhancement plan newsletters
PPT
CONtv Affiliate Program Guide
DOCX
James Stewart Thesis Draft
PDF
Q3 2009 Earning Report of Harley-Davidson, Inc.
PPTX
Dennis Cuneo's Alabama Speech (Edited) June 2015
PDF
Overview Intel AppUp developer program
PPT
IBM Smarter Cities
Cse trans tel corporate presentation (2013)
Salesian founts2 2
Common Indications for Referral for Fetal Echo
Proceedings from the 7th Organic Seed Growers Conference
Estluciano8 vista fixa pb sup
Rose_Jarrett - Thesis, Final
Mobile Regulations, Laws and Procedures_Michael Hanley
Alabama's Opportunities and Challenges
Sterling construction company
Q1 2009 Earning Report of Harley Davidson
FirstEnergy Annual_Report_2006_Low_Res
Quality enhancement plan newsletters
CONtv Affiliate Program Guide
James Stewart Thesis Draft
Q3 2009 Earning Report of Harley-Davidson, Inc.
Dennis Cuneo's Alabama Speech (Edited) June 2015
Overview Intel AppUp developer program
IBM Smarter Cities
Ad

Similar to Mobile: Location Privacy and Apps_Michael Hanley (20)

PPTX
International trends in mobile law
PPTX
International Trends in Mobile Law
PDF
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
PPT
Privacy Implications of Mobile Advertising Location Data
PDF
National code for mobile operators on safe use of mobile phones in slovakia f...
PPTX
Legal and ethical issues modern technologies
PPT
Reasonable security practices and procedures and sensitive personal data or i...
PDF
Reasonable security practices and procedures and sensitive personal data or i...
PDF
Legal Obligations of Technology Service Providers as Intermediaries
DOCX
Workplace Surveilance
PPT
REPUBLIC ACT NO. 10175 CYBERCRIME PREVENTION ACT OF 2012.ppt
PPT
Legal do's and don'ts in setting up mobile marketplaces (stibbe)
PPT
REPUBLIC ACT NO. 10175 CYBERCRIME PREVENTION ACT OF 2012 (1).ppt
PDF
Session B: Handout 1
PPT
Challenges to Achieve Privacy for Online Consumers in Mexico
PPTX
Principles of mobile privacy
PDF
Privacy and Data Security: Minimizing Reputational and Legal Risks
PPTX
Cybercrime law
PPTX
Mobileprivacyazahir
PDF
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
International trends in mobile law
International Trends in Mobile Law
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
Privacy Implications of Mobile Advertising Location Data
National code for mobile operators on safe use of mobile phones in slovakia f...
Legal and ethical issues modern technologies
Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...
Legal Obligations of Technology Service Providers as Intermediaries
Workplace Surveilance
REPUBLIC ACT NO. 10175 CYBERCRIME PREVENTION ACT OF 2012.ppt
Legal do's and don'ts in setting up mobile marketplaces (stibbe)
REPUBLIC ACT NO. 10175 CYBERCRIME PREVENTION ACT OF 2012 (1).ppt
Session B: Handout 1
Challenges to Achieve Privacy for Online Consumers in Mexico
Principles of mobile privacy
Privacy and Data Security: Minimizing Reputational and Legal Risks
Cybercrime law
Mobileprivacyazahir
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf

More from Sara Quinn (20)

PPT
Mobile Research for Advertising_Michael Hanley
PPT
Mobile Analytics for Advertising_Michael Hanley
PPT
Mobile Advertising Strategy_Michael Hanley
PPT
Mobile Advertising Creative_Michael Hanley
PPT
Mobile Social Media and Advertising_Michael Hanley
PPT
Mobile Demographics and Consumer Trends_Michael Hanley
PPTX
mCommerce and Mobile Banking_Michael Hanley
PPT
Location Based and Proximity Marketing_Michael Hanley
PPT
Mobile Apps_Michael Hanley
PPT
Mobile Web and WAP_Michael Hanley
PPT
Mobile Message Delivery: SMS and MMS_Michael Hanley
PPT
Intro to Mobile Marketing_Michael Hanley
PPT
Mobile Marketing, Code of Ethics, Privacy and Children_Michael Hanley
PPT
Mobile Devices_Michael Hanley
PPT
Mobile Marketing: Pros and Cons_Michael Hanley
PPT
The Mobile Ecosystem_Michael Hanley
PDF
How Do People Know What to Tap?: Mobile Design
PDF
Typography and Grid for Mobile Design
PDF
Designing for a Small Screen: Mobile
PDF
What's So Special About Mobile?
Mobile Research for Advertising_Michael Hanley
Mobile Analytics for Advertising_Michael Hanley
Mobile Advertising Strategy_Michael Hanley
Mobile Advertising Creative_Michael Hanley
Mobile Social Media and Advertising_Michael Hanley
Mobile Demographics and Consumer Trends_Michael Hanley
mCommerce and Mobile Banking_Michael Hanley
Location Based and Proximity Marketing_Michael Hanley
Mobile Apps_Michael Hanley
Mobile Web and WAP_Michael Hanley
Mobile Message Delivery: SMS and MMS_Michael Hanley
Intro to Mobile Marketing_Michael Hanley
Mobile Marketing, Code of Ethics, Privacy and Children_Michael Hanley
Mobile Devices_Michael Hanley
Mobile Marketing: Pros and Cons_Michael Hanley
The Mobile Ecosystem_Michael Hanley
How Do People Know What to Tap?: Mobile Design
Typography and Grid for Mobile Design
Designing for a Small Screen: Mobile
What's So Special About Mobile?

Recently uploaded (20)

PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PDF
Literature_Review_methods_ BRACU_MKT426 course material
PDF
English Textual Question & Ans (12th Class).pdf
PDF
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
PPTX
What’s under the hood: Parsing standardized learning content for AI
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PPTX
Education and Perspectives of Education.pptx
PPTX
MICROPARA INTRODUCTION XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PPTX
Climate Change and Its Global Impact.pptx
PDF
CRP102_SAGALASSOS_Final_Projects_2025.pdf
PDF
M.Tech in Aerospace Engineering | BIT Mesra
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PDF
1.Salivary gland disease.pdf 3.Bleeding and Clotting Disorders.pdf important
PDF
Farming Based Livelihood Systems English Notes
PDF
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
PDF
PowerPoint for Climate Change by T.T.pdf
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
Cambridge-Practice-Tests-for-IELTS-12.docx
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
Literature_Review_methods_ BRACU_MKT426 course material
English Textual Question & Ans (12th Class).pdf
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
What’s under the hood: Parsing standardized learning content for AI
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
Education and Perspectives of Education.pptx
MICROPARA INTRODUCTION XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
Climate Change and Its Global Impact.pptx
CRP102_SAGALASSOS_Final_Projects_2025.pdf
M.Tech in Aerospace Engineering | BIT Mesra
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
1.Salivary gland disease.pdf 3.Bleeding and Clotting Disorders.pdf important
Farming Based Livelihood Systems English Notes
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
PowerPoint for Climate Change by T.T.pdf
AI-driven educational solutions for real-life interventions in the Philippine...

Mobile: Location Privacy and Apps_Michael Hanley

  • 1. Mobile Privacy and Apps New Legislation: Location Privacy and Apps Class 7
  • 2. Mobile Privacy and Apps Location Privacy Protection Act Introduced in Congress in June 2011 to address voluntary location tracking of electronic communications devices. Covers these issues: 1. Voluntary location tracking of electronic communications devices A covered entity may not knowingly collect, receive, record, obtain, or disclose to a nongovernmental individual or entity the geolocation information from an electronic communications device without the express authorization of the individual that is using the electronic communications device.
  • 3. Mobile Privacy and Apps Location Privacy Protection Act 2. Geolocation information used in interstate domestic violence or stalking A covered entity that knowingly and willfully discloses geolocation information about an individual to another individual 3. Sale of geolocation information of young children Any person who knowingly and willfully sells the geolocation information of not less than 1,000 children under 11 years of age shall be fined under this title, imprisoned for not more 2 years, or both.  
  • 4. Mobile Privacy and Apps Geolocation Privacy and Surveillance Act Introduced in Congress in June 2011. The GPS Act would require federal, state, and local authorities to cite probable cause and obtain a warrant from a judge before conducting GPS-enabled surveillance, such as the secret placement of tracking devices on the cars of suspected terrorists and criminals. It would also require a warrant to obtain tracking data about individuals from wireless companies. In addition, the GPS Act would prohibit businesses from disclosing geographical tracking data about its customers to other companies without the customers' permission.
  • 5. Mobile Privacy and Apps Mobile Device Privacy Act Introduced in Congress in September 2012 Motivated by Carrier IQ controversy - Carrier IQ software on smartphones and other devices tracks user keystrokes, location and text messages without their knowledge or consent. - Was used on many smartphones and carrier systems - Most cell phone manufactureres and cell phone carriers have now discontinued use of Carrier IQ, but not all.
  • 6. Mobile Privacy and Apps Mobile Device Privacy Act The “Mobile Device Privacy Act” protects consumers by requiring: Disclosure of mobile telephone monitoring when a consumer buys a mobile phone; after sale, if the carrier, manufacturer, or operating system later installs monitoring software; and if a consumer downloads an app and that app contains monitoring software The disclosure includes the fact that the monitoring software has been installed on the phone, the types of information that are collected, the identity of the parties to which the information is transmitted, and how such information will be used
  • 7. Mobile Privacy and Apps Mobile Device Privacy Act The “Mobile Device Privacy Act” protects consumers by requiring: Consumer consent before monitoring software begins collecting and transmitting information The party receiving the personal information must have policies in place to secure the information Agreements on information transmission must be filed at the Federal Trade Commission (FTC) and Federal Communications Commission (FCC) An enforcement regime for the FTC and FCC, along with State AG enforcement and a private right of action

Editor's Notes

  • #3: The Mobile Ecosystem: Players and Playing Field --The Initiative Owner or their Marketing Agency/Ad Agency create the mobile initiative idea and specifications --The Application Service Provider (ASP) provides the mobile software and hardware back end technology, mobile management services, and mobile expertise in helping create, develop and manage mobile initiatives --The Network Aggregator’s main function is to provide a single point connection to the multiple wireless carriers --The Wireless Carriers: The “pipe” that carries the mobile messages/content (Cingular, Verizon, T-Mobile, Sprint/Nextel et al.) Yellow arrows represent the actual text or content messages sent and received through the system. Via their cell phones, consumers communicate through the carriers/aggregator to the application provider who processes their communication. The ASP responds back through the aggregator/carriers back to the consumer. The Carrier “Walled Garden” Since the carriers own the wireless “pipe”, in some instances they will control or prohibit the distribution of messages or content to their subscribers that does not originate from them. Some carriers only allow mobile content (ringtones, wallpapers, video, music etc.) to be downloaded through them, and do not allow any third party to directly offer content to their subscribers–hence the “walled garden”.
  • #4: The Mobile Ecosystem: Players and Playing Field --The Initiative Owner or their Marketing Agency/Ad Agency create the mobile initiative idea and specifications --The Application Service Provider (ASP) provides the mobile software and hardware back end technology, mobile management services, and mobile expertise in helping create, develop and manage mobile initiatives --The Network Aggregator’s main function is to provide a single point connection to the multiple wireless carriers --The Wireless Carriers: The “pipe” that carries the mobile messages/content (Cingular, Verizon, T-Mobile, Sprint/Nextel et al.) Yellow arrows represent the actual text or content messages sent and received through the system. Via their cell phones, consumers communicate through the carriers/aggregator to the application provider who processes their communication. The ASP responds back through the aggregator/carriers back to the consumer. The Carrier “Walled Garden” Since the carriers own the wireless “pipe”, in some instances they will control or prohibit the distribution of messages or content to their subscribers that does not originate from them. Some carriers only allow mobile content (ringtones, wallpapers, video, music etc.) to be downloaded through them, and do not allow any third party to directly offer content to their subscribers–hence the “walled garden”.
  • #5: The Mobile Ecosystem: Players and Playing Field --The Initiative Owner or their Marketing Agency/Ad Agency create the mobile initiative idea and specifications --The Application Service Provider (ASP) provides the mobile software and hardware back end technology, mobile management services, and mobile expertise in helping create, develop and manage mobile initiatives --The Network Aggregator’s main function is to provide a single point connection to the multiple wireless carriers --The Wireless Carriers: The “pipe” that carries the mobile messages/content (Cingular, Verizon, T-Mobile, Sprint/Nextel et al.) Yellow arrows represent the actual text or content messages sent and received through the system. Via their cell phones, consumers communicate through the carriers/aggregator to the application provider who processes their communication. The ASP responds back through the aggregator/carriers back to the consumer. The Carrier “Walled Garden” Since the carriers own the wireless “pipe”, in some instances they will control or prohibit the distribution of messages or content to their subscribers that does not originate from them. Some carriers only allow mobile content (ringtones, wallpapers, video, music etc.) to be downloaded through them, and do not allow any third party to directly offer content to their subscribers–hence the “walled garden”.
  • #6: The Mobile Ecosystem: Players and Playing Field --The Initiative Owner or their Marketing Agency/Ad Agency create the mobile initiative idea and specifications --The Application Service Provider (ASP) provides the mobile software and hardware back end technology, mobile management services, and mobile expertise in helping create, develop and manage mobile initiatives --The Network Aggregator’s main function is to provide a single point connection to the multiple wireless carriers --The Wireless Carriers: The “pipe” that carries the mobile messages/content (Cingular, Verizon, T-Mobile, Sprint/Nextel et al.) Yellow arrows represent the actual text or content messages sent and received through the system. Via their cell phones, consumers communicate through the carriers/aggregator to the application provider who processes their communication. The ASP responds back through the aggregator/carriers back to the consumer. The Carrier “Walled Garden” Since the carriers own the wireless “pipe”, in some instances they will control or prohibit the distribution of messages or content to their subscribers that does not originate from them. Some carriers only allow mobile content (ringtones, wallpapers, video, music etc.) to be downloaded through them, and do not allow any third party to directly offer content to their subscribers–hence the “walled garden”.
  • #7: The Mobile Ecosystem: Players and Playing Field --The Initiative Owner or their Marketing Agency/Ad Agency create the mobile initiative idea and specifications --The Application Service Provider (ASP) provides the mobile software and hardware back end technology, mobile management services, and mobile expertise in helping create, develop and manage mobile initiatives --The Network Aggregator’s main function is to provide a single point connection to the multiple wireless carriers --The Wireless Carriers: The “pipe” that carries the mobile messages/content (Cingular, Verizon, T-Mobile, Sprint/Nextel et al.) Yellow arrows represent the actual text or content messages sent and received through the system. Via their cell phones, consumers communicate through the carriers/aggregator to the application provider who processes their communication. The ASP responds back through the aggregator/carriers back to the consumer. The Carrier “Walled Garden” Since the carriers own the wireless “pipe”, in some instances they will control or prohibit the distribution of messages or content to their subscribers that does not originate from them. Some carriers only allow mobile content (ringtones, wallpapers, video, music etc.) to be downloaded through them, and do not allow any third party to directly offer content to their subscribers–hence the “walled garden”.
  • #8: The Mobile Ecosystem: Players and Playing Field --The Initiative Owner or their Marketing Agency/Ad Agency create the mobile initiative idea and specifications --The Application Service Provider (ASP) provides the mobile software and hardware back end technology, mobile management services, and mobile expertise in helping create, develop and manage mobile initiatives --The Network Aggregator’s main function is to provide a single point connection to the multiple wireless carriers --The Wireless Carriers: The “pipe” that carries the mobile messages/content (Cingular, Verizon, T-Mobile, Sprint/Nextel et al.) Yellow arrows represent the actual text or content messages sent and received through the system. Via their cell phones, consumers communicate through the carriers/aggregator to the application provider who processes their communication. The ASP responds back through the aggregator/carriers back to the consumer. The Carrier “Walled Garden” Since the carriers own the wireless “pipe”, in some instances they will control or prohibit the distribution of messages or content to their subscribers that does not originate from them. Some carriers only allow mobile content (ringtones, wallpapers, video, music etc.) to be downloaded through them, and do not allow any third party to directly offer content to their subscribers–hence the “walled garden”.