Cover Image



出版商 Mobile Market Development Ltd 商品編碼 357118
出版日期 內容資訊 英文 42 Pages
商品交期: 最快1-2個工作天內
Back to Top
出版日期: 2016年04月29日 內容資訊: 英文 42 Pages



第1章 概要

第2章 簡介

  • 本報告的背景情況
  • 分析內容
  • 匯率
  • 問題票與回答內容

第3章 安全上、隱私上的威脅

  • 用語定義:安全、隱私、可靠性
    • 問題的規模
  • 威脅的概要
    • 電腦網路攻擊
    • 沒受保護的通訊
    • ID盜用
      • 數位ID
    • 設備
      • Bittium Tough Mobile
      • Silent Circle Blackphone
    • 廣告
    • cookie
    • 行動應用程式
    • 非認證收費
      • 快取、Cache Cramming
      • App內收費
    • 對外部的資料流出
    • 政府的監視
    • 巨量資料及客戶分析
      • 資料保護原則

第4章 法規、法規

  • 客戶、財團需求和安全性上的必要平衡調整
  • EU各國
    • 一般的資料保護條例
    • PECR (隱私、電子通訊法規)
    • 英國
  • 美國
    • 美國自由法 (The Freedom Act,2015年)
    • CPNI (客戶專用網路資訊)

第5章 行動通訊業者 (MNO) 的安全、隱私的方法

  • 客戶參與跟對話
  • Telefonica的案例
    • 資料保護和隱私
    • Telefonica Dynamic Insights
    • 隱私服務
      • The Data Transparency Lab (資料的透明度研究所)
  • Vodafone的案例
    • 資料保護和隱私
    • VESS (Vodafone Enterprise Security Services:企業用安全服務)
    • Vodafone Protect
    • Vodafone Guardian
    • Vodafone的企業用隱私服務

第6章 主要分析結果

  • 結論

第7章 建議



Personal privacy and data security are extremely important aspects of the digital economy. The use and abuse of personal or company data is a subject that occurs regularly online and in print, in legislation, in industry regulation, and as a discussion point for consumers. Uncertainty and concern about data privacy and security is compounded by an increasing number of political and industry debates which, in addition to dealing with personal data security, have moved into areas such as data sovereignty and internet governance.

With ever more data being generated, collected, harvested and processed, issues around data privacy and protection can only grow. The expanding uptake of IoT services, mHealth, mEducation and mMoney increase concerns that our homes, our health and our bank accounts might be open to invasions of privacy.

Data security and privacy are critical in order to foster digital confidence amongst mobile users, and customer concerns must be overcome so that the mobile ecosystem can continue to thrive.

Operators have a large amount of valuable but sensitive customer data in their systems, and are seeking ways to exploit that data to build services and improve revenues. At the same time, they must not destroy their customer relationships with reckless use of personal data.

  • If an MNO did not protect personal information, the loss of trust would be considerable and could ruin brand reputation.

Mobile operators must help their customers, whether consumers or enterprises, to keep their data and networks safe. They may also look to new products and working methods to help turn the challenges of privacy and security into opportunities. The fact that so many digital services are delivered via connected mobile devices means that operators are in a good position to play a significant role in helping consumers and enterprises keep their data safe, whilst also improving their brand credentials.

The issue of customer privacy and security is a difficult one for organisations to gauge, with legislation and regulation becoming more stringent, and with consumers having to make choices between how much data they are willing to offer up in return for new services or for convenience.

This report looks at some of the issues and dilemmas facing operators in their quest to keep customer data safe in a way that satisfies their customers, whilst at the same time trying to build new services out of the customer data that resides in their networks. It contains a brief overview of new legislation that has recently been implemented in the European Union, and looks at some data and regulatory breaches that have occurred recently. It also looks at how best practice operators are dealing with their customers' concerns about the handling of their private data.

Companies: Vodafone, Orange, Telefonica, Apple, AT&T, Verizon

Countries: UK, US, EU

Table of Contents

1. Overview

2. Introduction

  • 2.1. Background to the Report
  • 2.2. Report Content
  • 2.3. Currency and Conversions
  • 2.4. Further Questions and Feedback

3. Security & Privacy Threats

  • 3.1. Definition of Terms: Security, Privacy & Trust
    • 3.1.1. The Size of the Problem
  • 3.2. What the Threats are
    • 3.2.1. Cyber-Attacks
    • 3.2.2. Unsecured Communications
    • 3.2.3. Identity Theft
      • Digital Identity
    • 3.2.4. Devices
      • Bittium Tough Mobile
      • Silent Circle Blackphone
    • 3.2.5. Advertising
    • 3.2.6. Cookies
    • 3.2.7. Mobile Apps
    • 3.2.8. Unauthorised Charges
      • Cramming
      • In-App Charges
    • 3.2.9. Third Party Data Breaches
    • 3.2.10. Government Surveillance
    • 3.2.11. Big Data & Customer Analytics
    • Data Protection Principles

4. Regulation & Legislation

  • 4.1. Balancing Consumer, Security & Corporate Needs
  • 4.2. European Union
    • 4.2.1. General Data Protection Regulation
    • 4.2.2. Privacy and Electronic Communications Regulations (PECR)
    • 4.2.3. UK
  • 4.3. US
    • 4.3.1. The Freedom Act 2015
    • 4.3.2. Customer Proprietary Network Information (CPNI)

5. MNO Approaches to Security & Privacy

  • 5.1. Commitment and Dialogue
  • 5.2. Telefónica
    • 5.2.1. Data Protection & Privacy
    • 5.2.2. Telefónica Dynamic Insights
    • 5.2.3. Privacy Services
      • The Data Transparency Lab
  • 5.3. Vodafone
    • 5.3.1. Data Protection & Privacy
    • 5.3.2. Vodafone Enterprise Security Services (VESS)
    • 5.3.3. Vodafone Protect
    • 5.3.4. Vodafone Guardian
    • 5.3.5. Enterprise Privacy Services from Vodafone

6. Key Findings

  • 6.1. Conclusions

7. Recommendations

Appendix - Feedback Questions

Back to Top