What’s The Value Of Your Data?

Recently, Comcast reached a $33 million settlement over claims that it published personal information of more than 75,000 customers — even though those customers had specifically paid a fee for their information to be kept private. As a consequence, the company will pay $100 compensation to each victim.

This settlement is a turning point in our technological history. Not just because it involves the biggest cable company in the world, but, more importantly, because the clients who suffered the breach had specifically paid for their data to be protected.
This case is particularly interesting because, for the first time, it puts a price tag on the amount victims should receive when their personal information is illegally published.

Beyond this mere example, the issue of the value of personal data is key to our economy. Data has become the most important strategic asset of pure players like Google and Facebook. And among the biggest companies in the world, by market capitalization, a majority see their valuation estimated as a function of their user base and the data they collect.

A first approach could be to analyze the issue of valuation of personal data through the eyes of the shareholder. In other words, personal data is worth whatever the shareholder is willing to pay to acquire client data from a data-centric company, as was the case when, WhatsApp and Instagram were acquired by Facebook.

At the time of acquisition, these companies are often not profitable and are generally being valuated on the basis of their user base and data. It is not uncommon to hear that these acquisitions are aimed at buying the user base. However, one cannot buy an individual or a particular relationship. In the knowledge economy, it is the data about that individual that is being acquired and, in particular, an ability to maintain the quality and strength of that relationship over time.

In light of this valuation method, Facebook decided to acquire WhatsApp for $19 billion; that is, to pay $30 for each of its 600 million users. Similarly, the company headquartered in Menlo Park also paid $30 for each of the 33 million Instagram users back in 2012. A similar computation was applied when Minecraft was acquired by Microsoft.

Data has become a strategic asset that allows companies to acquire or maintain a competitive edge. In this situation, the value of a user varies from about $15 to more than $40. The difference lies mostly in the potential expected from each user. This potential depends on the company’s business and, therefore, on the type of data it collects. In the world of big data, the richer and wider the information the company has, the more money it can make from its users’ activity, and the bigger the company’s valuation. The valuation of a company, of its clients and of the data it owns are therefore intertwined.

A second way to approach this question is to account for the revenues generated by the customers (when they do. It was not the case for Instagram or Whatsapp at the time of their acquisitions.) The generally accepted valuation method in this situation is to estimate the value of a client as a function of the net present value it will generate for the company in the future. This is called the Customer Lifetime Value (CLV).

The CLV is predicted by using customers’ transaction data and allows decision makers to undertake the most relevant and profitable business actions. The CLV estimates the value of the commercial relationship the company has with individual customers. Hence it provides a maximalist range of our personal data valuation. The personal data collected by a company and its relationship with individual customers are therefore intertwined.

Finally, how do we, as users of products and services of digital companies, value our own personal data? It is interesting to note that while many fiercely oppose corporations using their personal data, very few are willing to pay an extra fee to protect it.

Indeed, many services offering to protect our data have emerged on the web. And unlike companies like Google or Facebook that monetize our data via their advertising services, those alternatives are often fee-based for obvious economic reasons. For instance, FastMail offers an alternative to Gmail. Or Zoho, which is a Google Docs-like offer. But these services have not really been successful until now. The dominant model remains one of free access to services in exchange for a commercial use of our data. This market tendency to monetize data collected on the Internet is accelerating. 

Techcrunch

 

« US Concerns Over Kremlin Links to Cyber Gangs
The World's First Hack: the Telegraph and the Invention of Cyber Privacy »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Energy Sec

Energy Sec

EnergySec is a United States 501(c)(3) non-profit corporation formed to support energy sector organizations with the security of their critical technology infrastructures.

Payload Security

Payload Security

Payload Security's VxStream Sandbox is a fully automated malware analysis system.

Soracom

Soracom

Soracom offers secure, scalable, cloud-native connectivity developed specifically for the Internet of Things.

CSI

CSI

CSI is a Managed Service Provider (MSP) delivering Hybrid Multi-Cloud, Data Protection, and Cyber Security solutions to highly regulated industries.

RiskIQ

RiskIQ

RiskIQ is the leader in digital threat management, providing the most comprehensive discovery, intelligence, and mitigation of threats associated with an organization’s digital presence.

Shape Security

Shape Security

Shape Security provide best-in-class defense against malicious automated cyberattacks on web and mobile applications.

Mnemonica

Mnemonica

Mnemonica specializes in providing data protection system, information security compliance solutions, cloud and managed services.

European Society of Criminology (ESC)

European Society of Criminology (ESC)

The ESC Working Group on Cybercrime is focused on cybercrime, its causes and offenders, impact on victims, and our response to it at the individual, corporate, and governmental levels.

Zamna

Zamna

Zamna (formerly VChain Technology) is an award-winning software company building GDPR compliant identity platforms for the aviation industry.

Qmulos

Qmulos

Qmulos’ real-time continuous monitoring risk management suite, Q-Compliance, provides a massively flexible and scalable solution to optimizing operational security.

Carve Systems

Carve Systems

Carve Systems was founded to bring enterprise level information security, training, and risk management services to organizations of any size and industry.

Avertro

Avertro

Avertro helps leaders manage the business of cyber. We help explain cybersecurity to executives, forecasting outcomes, right-sizing your spend, and validating your cyber strategy.

Infopercept Consulting

Infopercept Consulting

Infopercept is a leading cybersecurity company in India, providing a critical layer of security to protect business information, infrastructure & assets across the organization.

Fullstack Academy

Fullstack Academy

A trailblazer in bootcamp education, Fullstack Academy prepares students for fulfilling careers in tech through our NYC campus, online learning, and university partnerships.

Kirk ISS

Kirk ISS

Kirk ISS are the leading provider of IT services in the Cayman Islands. We offer best-in class hardware, software, communications and cloud computing, all backed by professional services support.

Inholo

Inholo

Inholo offers tools to manage the risks of synthetic realities, starting with an AI-photo detection service.