What’s The Value Of Your Data?

Recently, Comcast reached a $33 million settlement over claims that it published personal information of more than 75,000 customers — even though those customers had specifically paid a fee for their information to be kept private. As a consequence, the company will pay $100 compensation to each victim.

This settlement is a turning point in our technological history. Not just because it involves the biggest cable company in the world, but, more importantly, because the clients who suffered the breach had specifically paid for their data to be protected.
This case is particularly interesting because, for the first time, it puts a price tag on the amount victims should receive when their personal information is illegally published.

Beyond this mere example, the issue of the value of personal data is key to our economy. Data has become the most important strategic asset of pure players like Google and Facebook. And among the biggest companies in the world, by market capitalization, a majority see their valuation estimated as a function of their user base and the data they collect.

A first approach could be to analyze the issue of valuation of personal data through the eyes of the shareholder. In other words, personal data is worth whatever the shareholder is willing to pay to acquire client data from a data-centric company, as was the case when, WhatsApp and Instagram were acquired by Facebook.

At the time of acquisition, these companies are often not profitable and are generally being valuated on the basis of their user base and data. It is not uncommon to hear that these acquisitions are aimed at buying the user base. However, one cannot buy an individual or a particular relationship. In the knowledge economy, it is the data about that individual that is being acquired and, in particular, an ability to maintain the quality and strength of that relationship over time.

In light of this valuation method, Facebook decided to acquire WhatsApp for $19 billion; that is, to pay $30 for each of its 600 million users. Similarly, the company headquartered in Menlo Park also paid $30 for each of the 33 million Instagram users back in 2012. A similar computation was applied when Minecraft was acquired by Microsoft.

Data has become a strategic asset that allows companies to acquire or maintain a competitive edge. In this situation, the value of a user varies from about $15 to more than $40. The difference lies mostly in the potential expected from each user. This potential depends on the company’s business and, therefore, on the type of data it collects. In the world of big data, the richer and wider the information the company has, the more money it can make from its users’ activity, and the bigger the company’s valuation. The valuation of a company, of its clients and of the data it owns are therefore intertwined.

A second way to approach this question is to account for the revenues generated by the customers (when they do. It was not the case for Instagram or Whatsapp at the time of their acquisitions.) The generally accepted valuation method in this situation is to estimate the value of a client as a function of the net present value it will generate for the company in the future. This is called the Customer Lifetime Value (CLV).

The CLV is predicted by using customers’ transaction data and allows decision makers to undertake the most relevant and profitable business actions. The CLV estimates the value of the commercial relationship the company has with individual customers. Hence it provides a maximalist range of our personal data valuation. The personal data collected by a company and its relationship with individual customers are therefore intertwined.

Finally, how do we, as users of products and services of digital companies, value our own personal data? It is interesting to note that while many fiercely oppose corporations using their personal data, very few are willing to pay an extra fee to protect it.

Indeed, many services offering to protect our data have emerged on the web. And unlike companies like Google or Facebook that monetize our data via their advertising services, those alternatives are often fee-based for obvious economic reasons. For instance, FastMail offers an alternative to Gmail. Or Zoho, which is a Google Docs-like offer. But these services have not really been successful until now. The dominant model remains one of free access to services in exchange for a commercial use of our data. This market tendency to monetize data collected on the Internet is accelerating. 

Techcrunch

 

« US Concerns Over Kremlin Links to Cyber Gangs
The World's First Hack: the Telegraph and the Invention of Cyber Privacy »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Cyberis

Cyberis

Cyberis are pioneers in customer-focussed information security. Since 2011, we’ve been helping businesses protect their brands, customers and reputation.

TUV Sud

TUV Sud

TÜV SÜD is a leading technical service organisation. We specialize in testing, certification, auditing, training, and advisory services for different industries.

Introspective Networks

Introspective Networks

Introspective Networks (IN) is a Cybersecurity company focusing on securing data in the network and automating knowledge work to decrease vulnerability points to critical infrastructure.

Bunifu Technologies

Bunifu Technologies

Bunifu Technologies is an Information Security and Custom Software Development Company.

SK IT Cyber Security

SK IT Cyber Security

SK IT provide services and solutions for cybersecurity and advanced information system engineering.

Global Lifecycle Solutions EMEA (Global EMEA)

Global Lifecycle Solutions EMEA (Global EMEA)

Global EMEA provides full lifecycle services to corporate Clients covering procurement, configuration, support, maintenance and end-of-life asset management.

CyVolve

CyVolve

Cyvolve is the next great leap forward in data security, ensuring constant encryption and pervasive control over all your data.

Billington CyberSecurity

Billington CyberSecurity

Billington CyberSecurity is a leading, independent education company with an exclusive focus on cybersecurity.

PreCog Security

PreCog Security

PreCog Security is a US based cybersecurity risk mitigation company. We specialize in helping you find, minimize and manage vulnerability risk within your product, network and process.

ScorpionShield

ScorpionShield

ScorpionShield CyberSecurity is an EC-Council Accredited Training Center, and an On-Demand Service for Cybersecurity professionals.

PhishProtection

PhishProtection

We created Phish Protection to prevent all types of phishing including spear phishing protection and office 365 email protection for your small business.

Ghost Security

Ghost Security

Ghost is a venture backed, product-led startup building the new standard in application security for the modern enterprise.

SGTech

SGTech

SGTech is the leading trade association for Singapore's tech industry, offering focused support and development to both strategic and emerging sectors in the industry.

Cambridge International Systems

Cambridge International Systems

For more than 25 years, Cambridge has been fighting bad actors in both the cyber and physical worlds.

Verosint

Verosint

Verosint (formerly 443ID) provides real-time account fraud prevention that reveals fraudsters hiding in user accounts and proactively blocks them before their attacks can cause harm.

Cyber Brain Academy

Cyber Brain Academy

At Cyber Brain Academy, our mission is to provide high-quality IT certification training for the cyber security workforce.