Dave Michels
Dave Michels is a Principal Analyst at TalkingPointz. His unique perspective on unified communications comes from a career involving telecommunications...
Read Full Bio >>

Dave Michels | December 07, 2011 |


It's [None of] Your Business

It's [None of] Your Business Over the next few years, privacy issues are going to drive a backlash against "free" services and perhaps even consumerization of IT.

Over the next few years, privacy issues are going to drive a backlash against "free" services and perhaps even consumerization of IT.

Last week the big news was Carrier IQ--a utility installed on a large percentage of smartphones that tracks an extraordinary amount of information and activity which is provided to the carriers without any consent or knowledge by the customer. The investigation is just getting started, but there are plenty of questions. HTC and Samsung phones have it pre-installed, but only on certain carriers. Why some carriers and why some devices is yet to unravel. From GigaOm:

"AT&T and T-Mobile USA are just the latest to admit they received data from Carrier IQ on the behavior of their customers' smartphones. However, like Sprint, they claimed it used that information solely for network optimization purposes. Verizon is the only major U.S. operator untarnished. Apple copped to installing Carrier IQ's software on all its iPhones before the release of iOS 5. HTC and Samsung acknowledged implementing Carrier IQ, but only at the behest of their carrier customers, which didn't prevent them from getting slapped with class action lawsuits."

Carrier IQ is obviously an extreme example of privacy invasion, but smartphones do hold a treasure trove of personal information--an end user agreement and a free app may be all it takes to legally access it. It is surprising the access rights all these "free" apps require.

There was a very clever application launched last October (as a Halloween stunt) called TakeThisLollipop. The name comes from the lesson our parents taught us about taking candy from strangers. The application requires permission to access Facebook information, which most of us quickly grant. What follows is a terrifying glimpse of the wrong person accessing your data. The video includes freak-boy driving to your home with your photo on his dashboard. After the video, I went back to Facebook and reviewed the apps I'd granted permission to over the years and decided it was time to prune. Of course, they already have all my information.

The rules changed over the past few decades. Consumers had an established arrangement with advertisers and agreed to accept ads in exchange for free or cheap stuff--be it a newspaper, a television show, or radio program. The consumer got content and services, but it wasn't so great for advertisers. The pricing was flawed--based on eyeball exposure rather than exposure to prospects. And the notion of eyeballs was a best effort guess.

In the 1992 movie Sneakers, Cosmo explained the shift of power:

"There's a war out there, old friend. A world war. And it's not about who's got the most bullets. It's about who controls the information. What we see and hear, how we work, what we's all about the information!...The world isn't run by weapons anymore, or energy, or money. It's run by little ones and zeroes, little bits of data. It's all just electrons."

Cosmo was talking about how information technology controls the world. Those that control the electrons has a decided advantage. That was 20 years ago, and things have changed ever so slightly. Rather than humans using information to derive wealth, the information now is derived from the wealth of human information. Your information.

Which brings us back to the smartphone in general. Not only does it include our email calendar and address book, but also knows our location, photos, our text messages and more. The Wall Street Journal recently did a report on corporate and foreign surveillance and profiled several companies that legally sell products to hack into IT systems such as FinFisher:

"The company also claims to have allowed an intelligence agency to trick users into downloading its software onto BlackBerry mobile phones "to monitor all communications, including [texts], email and BlackBerry Messenger." Its marketing documents say its programs enable spying using devices and software from Apple, Microsoft, and Google Inc., among others. FinFisher documents at the conference were offered in English, Arabic and other languages."

There are three trends converging that make this a priority to understand.

1.) The ease of tracking information thanks to web cookies, sophisticated websites, and the breadth of information smartphones contain.

2.)Lack of legislation around privacy compared to more mature aspects of the law such as negligence and other forms of consumer protection that give protections by default.

3.) The complexity and ignorance around terms of service and end user agreements that are generally accepted and overly complex.

Google and Facebook know a tremendous amount of information about their users. Microsoft poked fun at "The Gmail Man" because Gmail reads the "free" email to determine the best ads to serve. It is an generally considered an improvement over shotgun advertising (for viewer and advertiser) and allows Google to charge a premium for improved targeting. Few people complain as ads are accepted, so they may as well be more relevant. Though, Google does get it wrong sometimes, as the video shows.

The Facebook "Like" button makes web advertising more social and provides improved measures for ad conversions. It also extends Facebook's tentacles across the web as the Like buttons report informatoin back to Facebook about Facebook user visits, even if unclicked. Combined with Facebook's new "frictionless" sharing, the electronic bread crumbs of our Internet behaviors are turning into loaves. Keep in mind, Facebook audiences easily rival those of prime time television in size--budgets are dramatically swinging from television to the Internet.


Enterprise Connect Orlando 2017
March 27-30 | Orlando, FL
Connect with the Entire Enterprise Communications & Collaboration Ecosystem

Stay Up-to-Date: Hear industry visionaries in Keynotes and General Sessions delivering the latest insight on UC, mobility, collaboration and cloud

Grow Your Network: Connect with the largest gathering of enterprise IT and business leaders and influencers

Learn From Industry Leaders: Attend a full range of Conference Sessions, Free Programs and Special Events

Evaluate All Your Options: Engage with 190+ of the leading equipment, software and service providers

Have Fun! Mingle with sponsors, exhibitors, attendees, guest speakers and industry players during evening receptions

Special Offer - Save $200 Off Advance Rates

Register now with code NOJITTEREB to save $200 Off Advance Rates or get a FREE Expo Pass!

April 5, 2017

Its no secret that the cloud offers significant benefits to enterprises - including cost reduction, scalability, higher efficiency, and more flexibility. If your phone system and contact center are

March 22, 2017

As today's competitive business environments push workforces into overdrive, many enterprises are seeking ways of streamlining workflows while optimizing productivity, business agility, and speed.

March 8, 2017

Enterprise IT's ability to innovate is critical to the success of the business -- 80% of CIOs agree. But the CIO role has never been more challenging than it is today, with rising operational respo

March 23, 2017
Tim Banting, of Current Analysis, gives us a peek into what the next three years will bring in advance of his Enterprise Connect session exploring the question: Will there be a new model for enterpris....
March 15, 2017
Andrew Prokop, communications evangelist with Arrow Systems Integration, discusses the evolving role of the all-important session border controller.
March 9, 2017
Organizer Alan Quayle gives us the lowdown on programmable communications and all you need to know about participating in this pre-Enterprise Connect hackathon.
March 3, 2017
From protecting against new vulnerabilities to keeping security assessments up to date, security consultant Mark Collier shares tips on how best to protect your UC systems.
February 24, 2017
UC analyst Blair Pleasant sorts through the myriad cloud architectural models underlying UCaaS and CCaaS offerings, and explains why knowing the differences matter.
February 17, 2017
From the most basics of basics to the hidden gotchas, UC consultant Melissa Swartz helps demystify the complex world of SIP trunking.
February 7, 2017
UC&C consultant Kevin Kieller, a partner at enableUC, shares pointers for making the right architectural choices for your Skype for Business deployment.
February 1, 2017
Elka Popova, a Frost & Sullivan program director, shares a status report on the UCaaS market today and offers her perspective on what large enterprises need before committing to UC in the cloud.
January 26, 2017
Andrew Davis, co-founder of Wainhouse Research and chair of the Video track at Enterprise Connect 2017, sorts through the myriad cloud video service options and shares how to tell if your choice is en....
January 23, 2017
Sheila McGee-Smith, Contact Center/Customer Experience track chair for Enterprise Connect 2017, tells us what we need to know about the role cloud software is playing in contact centers today.