Business model example.<br><br>Would you like a free mobile phone application that lets you know the name of the calling party, regardless of whether or not you have them on your phone's address book? Maybe even if they have concealed their number? Call it innovation! But the downside is that the application covertly uploads users' phone books and makes them part of its crowd-sourced database. As of January 22, 2013 the number had reached 10 million users. <a href="http://en.wikipedia.org/wiki/TrueCaller">http://en.wikipedia.org/wiki/TrueCaller</a> application website <a href="http://www.truecaller.com/">http://www.truecaller.com/</a><br>
<br>Alex<br> <br><br><br><br><br><br> <br><br><div class="gmail_quote">On Fri, Feb 1, 2013 at 9:48 PM, Carl Smith <span dir="ltr"><<a href="mailto:lectriclou@hotmail.com" target="_blank">lectriclou@hotmail.com</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div text="#000000" bgcolor="#FFFFFF">
<div>It seems to me to be some kind of
justification for invasion of privacy.<br>
<br>
Lou <br><div><div class="h5">
<br>
On 2/1/2013 12:47 PM, Kathy Kleiman wrote:<br>
</div></div></div><div><div class="h5">
<blockquote type="cite">
Hi All,<br>
I have not yet read the attached paper, but it is a background
paper that Fadi received at the World Economic Forum in Davos.
Fadi was in a meeting on user data and privacy, and found himself
speaking for users (those whose data is captured). Hooray! <br>
<br>
A good intersessional meeting in LA. A new experiment on having
the Noncommercial and Commercial meet together for meetings on
both policy issues, and administrative issues (for growth and
operation of our Stakeholder and constituency groups). I hope
others will comment. I found it very valuable -- and think we have
a great NCSG team!<br>
<br>
Best,<br>
Kathy<br>
<div><br>
<br>
-------- Original Message --------
<table border="0" cellpadding="0" cellspacing="0">
<tbody>
<tr>
<th align="RIGHT" nowrap valign="BASELINE">Subject:
</th>
<td>WEF Background Paper</td>
</tr>
<tr>
<th align="RIGHT" nowrap valign="BASELINE">Date:
</th>
<td>Wed, 30 Jan 2013 12:26:56 -0800</td>
</tr>
<tr>
<th align="RIGHT" nowrap valign="BASELINE">From:
</th>
<td>Fadi Chehade <a href="mailto:fadi.chehade@icann.org" target="_blank"><fadi.chehade@icann.org></a></td>
</tr>
<tr>
<th align="RIGHT" nowrap valign="BASELINE">To: </th>
<td>Robin Gross <a href="mailto:robin@ipjustice.org" target="_blank"><robin@ipjustice.org></a>,
Wendy Seltzer <a href="mailto:wendy@seltzer.com" target="_blank"><wendy@seltzer.com></a>,
Kathy Kleiman <a href="mailto:Kathy@KathyKleiman.com" target="_blank"><Kathy@KathyKleiman.com></a></td>
</tr>
</tbody>
</table>
<br>
<br>
<p class="MsoNormal"><font face="Calibri" size="3">Robin, Wendy
and Kathy:<u></u><u></u></font></p>
<p class="MsoNormal"><font face="Calibri" size="3"> </font></p>
<p class="MsoNormal"><font face="Calibri" size="3">As promised
during the GNSO NCPH Meeting yesterday, attached you will
find a copy of the Background Paper from the World Economic
Forum Annual Meeting 2013, Davos, Switzerland entitled
"Unlocking the Personal Data: From Collection to Usage”. <u></u><u></u></font></p>
<p class="MsoNormal"><font face="Calibri" size="3"> </font></p>
<p class="MsoNormal"><font face="Calibri" size="3">Please
forward it to the other NCPH members in attendance.<u></u><u></u></font></p>
<p class="MsoNormal"><font face="Calibri" size="3"> </font></p>
<p class="MsoNormal"><font face="Calibri" size="3">Thank you,<u></u><u></u></font></p>
<p class="MsoNormal"><font face="Calibri" size="3"><br>
Fadi <i><u></u><u></u></i></font></p>
<p class="MsoNormal" style="text-align:center" align="center"><i><font face="Calibri" size="3"> </font></i></p>
<br>
</div>
<br>
</blockquote>
<br>
</div></div></div>
</blockquote></div><br>