What’s The Value Of Your Data?

Recently, Comcast reached a $33 million settlement over claims that it published personal information of more than 75,000 customers — even though those customers had specifically paid a fee for their information to be kept private. As a consequence, the company will pay $100 compensation to each victim.

This settlement is a turning point in our technological history. Not just because it involves the biggest cable company in the world, but, more importantly, because the clients who suffered the breach had specifically paid for their data to be protected.
This case is particularly interesting because, for the first time, it puts a price tag on the amount victims should receive when their personal information is illegally published.

Beyond this mere example, the issue of the value of personal data is key to our economy. Data has become the most important strategic asset of pure players like Google and Facebook. And among the biggest companies in the world, by market capitalization, a majority see their valuation estimated as a function of their user base and the data they collect.

A first approach could be to analyze the issue of valuation of personal data through the eyes of the shareholder. In other words, personal data is worth whatever the shareholder is willing to pay to acquire client data from a data-centric company, as was the case when, WhatsApp and Instagram were acquired by Facebook.

At the time of acquisition, these companies are often not profitable and are generally being valuated on the basis of their user base and data. It is not uncommon to hear that these acquisitions are aimed at buying the user base. However, one cannot buy an individual or a particular relationship. In the knowledge economy, it is the data about that individual that is being acquired and, in particular, an ability to maintain the quality and strength of that relationship over time.

In light of this valuation method, Facebook decided to acquire WhatsApp for $19 billion; that is, to pay $30 for each of its 600 million users. Similarly, the company headquartered in Menlo Park also paid $30 for each of the 33 million Instagram users back in 2012. A similar computation was applied when Minecraft was acquired by Microsoft.

Data has become a strategic asset that allows companies to acquire or maintain a competitive edge. In this situation, the value of a user varies from about $15 to more than $40. The difference lies mostly in the potential expected from each user. This potential depends on the company’s business and, therefore, on the type of data it collects. In the world of big data, the richer and wider the information the company has, the more money it can make from its users’ activity, and the bigger the company’s valuation. The valuation of a company, of its clients and of the data it owns are therefore intertwined.

A second way to approach this question is to account for the revenues generated by the customers (when they do. It was not the case for Instagram or Whatsapp at the time of their acquisitions.) The generally accepted valuation method in this situation is to estimate the value of a client as a function of the net present value it will generate for the company in the future. This is called the Customer Lifetime Value (CLV).

The CLV is predicted by using customers’ transaction data and allows decision makers to undertake the most relevant and profitable business actions. The CLV estimates the value of the commercial relationship the company has with individual customers. Hence it provides a maximalist range of our personal data valuation. The personal data collected by a company and its relationship with individual customers are therefore intertwined.

Finally, how do we, as users of products and services of digital companies, value our own personal data? It is interesting to note that while many fiercely oppose corporations using their personal data, very few are willing to pay an extra fee to protect it.

Indeed, many services offering to protect our data have emerged on the web. And unlike companies like Google or Facebook that monetize our data via their advertising services, those alternatives are often fee-based for obvious economic reasons. For instance, FastMail offers an alternative to Gmail. Or Zoho, which is a Google Docs-like offer. But these services have not really been successful until now. The dominant model remains one of free access to services in exchange for a commercial use of our data. This market tendency to monetize data collected on the Internet is accelerating. 

Techcrunch

 

« US Concerns Over Kremlin Links to Cyber Gangs
The World's First Hack: the Telegraph and the Invention of Cyber Privacy »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Mimecast

Mimecast

Mimecast delivers cloud-based email management for Microsoft Exchange and Microsoft Office 365 including archiving, continuity and security.

National Institute of Standards & Technology (NIST)

National Institute of Standards & Technology (NIST)

NIST is a measurement standards laboratory, and a non-regulatory agency of the United States Department of Commerce. Areas covered include IT and cybersecurity.

MaxMind

MaxMind

MaxMind is an industry-leading provider of IP intelligence and online fraud detection tools.

United Biometrics

United Biometrics

United Biometrics is an anonymous and real-time authentication platform designed to stop the fraud for mobile payments, e-Commerce and applications.

Netacea

Netacea

Netacea provides a revolutionary bot management solution that protects websites, mobile apps and APIs from malicious attacks such as scraping, credential stuffing and account takeover.

GLESEC

GLESEC

GLESEC offer a complete range of Cyber Security services from Operations & Intelligence Services to Auditing & Compliance and Simulation and Training.

Dynics

Dynics

The Dynics ICS-Defender is an Industrial Control System Security Appliance for OT or OT/IT convergent environments.

Infinite Ranges

Infinite Ranges

Infinite Ranges delivers secure, comprehensive digital solutions by connecting experts with the best products and services for the digital age.

Kocho

Kocho

Kocho (formerly TiG) is a provider of identity and access, cyber security, cloud transformation, and managed IT services.

Revere Technologies

Revere Technologies

Revere Technologies is a pure-play cyber security solutions and services provider in Sub-Saharan Africa.

IPKeys Technologies

IPKeys Technologies

IPKeys delivers innovative cybersecurity and technology solutions focused on helping the federal government reduce risk and protect the US from cyberattacks.

Hub71

Hub71

Hub71 is a world-class tech ecosystem opening doors to global opportunities from an optimal business environment for entrepreneurial-minded innovators.

HashDit

HashDit

HashDit products and services focus on helping build a safe ecosystem for both protocol users and smart contract developers on BNB Chain.

NextGen Cyber Talent

NextGen Cyber Talent

NextGen Cyber Talent is a non-profit providing a platform to increase diversity and inclusion in the cybersecurity industry.

Pointsharp

Pointsharp

Pointsharp delivers software and services that help organizations secure data, identities, and access in a user-friendly way.

Reveald

Reveald

Reveald is making Exposure Management a reality to solve the biggest challenges in cybersecurity with a trailblazing ‘offense to defense’ approach that gives the advantage back to the business.