Digital Banks – Providing Banking Platform as Service

During the course of last two weeks, I was involved with a series of workshops with the IT department of a bank that operates in more than 30 countries. The workshops objective was to define a digital banking transformation roadmap.

During many years, for those that are involved in BPM projects have discussed the meaning of what is the definition of end-to end processes. One of the classic examples in the banking industry is when the account opening process ends. It ends when the account number is created or it ends when all the channels which the customer can consume financial services and execute operations are available and operative?

Today, opening a bank account trough a friction-less process is not a common desire. The wish of any customer that belong to retail banking is how it can construct the Bank of Me, how it can incorporate using the bank mobile app making transactions with 3rd parties, like a youngster paying the school fees, do social banking (transfers, borrowing from Facebook friends). Corporate banking, oriented to trading operations, which to integrate supply chain operations between, customers, suppliers, road haulage companies, combining the flow of documents, status of merchandise movement and money transfers.

Five years ago, under the new e-CMR regulation, there was the possibility in road freight to eliminate the famous paper based system (that still exists) and exchange information digitally between all the involved stakeholders – buyer, seller, transport company and banks [1]. The CMR is a document that underpins the legal transport contract between a seller, a transport company and a buyer. It ensures the goods were shipped and received accordingly, on which banks rely to wire the money between the involved trading parties. Without such a document, financial transactions are halted, supply chain document reconciliation is blocked, as well as financial close activities. Now, that piece of document travels physically in the truck. Some long haul trucks return to logistics head quarters every 15 days – because they need to optimise cargo utilisation, a key KPI for business viability – this means only when the physical CMR arrives to the logistics back office, payment processes between buyer and seller can start (digital copies are ignored, due fraud and contractual implications between the parties involved). In such kind of transactions there is room for optimisation and automation, but unless companies do not embrace the concept of open systems architecture is very unlikely that operations will suffer from the tangled syndrome.

The era of Open Socio-technical Systems

Fred Emery defined and evolved the concept [2] and defined such kind of systems as:

“Is a purposeful system composed of an interrelated social component (people, culture, norms,) and technical component (technology, tools, materials) which is embedded in a greater context, an environment, which the system is influenced by and also influences.”

Later, Merrelyn Emery [3] evolved the concept to “Socioecological” means:

“people-in-environments,” which is expressed by the concept of the open system […] expresses the transaction of system and environment, all components of which are governed by laws which are able to be known. “

Gartner [4] defines in the Magic Quadrant for Enterprise Integration Platform as a Service:

“integration platform as a service (iPaaS) is a cloud service that provides a platform to support application, data and process integration projects, usually involving a combination of cloud-based applications and data sources, APIs [5] and on-premises systems”.

Gartner single focus in the technical platform enablement plays the de-stratification of the Open Socio-technical Systems that goes against experimentation, multiplicity and intense social human interaction and important component of Open systems. When designing IT strategy, the peril for the CIO and the IT teams is to overdose the enterprise with integration technology and superpower the enterprise service bus, over-dosing on too much de-stratification decoupled from the new business models and human relationship management of digital banking.

Providing Banking Platform as Service

Exposing the Banking Platform As a Service – BPAaS, allows banking services to talk to other services. In this sense, leveraging on API allows you to open up data and functionality to other developers, to other businesses or even between departments and locations within the bank. It is increasingly the way in which banks exchange data, services and complex resources, both internally, externally with partners, and openly with the public.

BPAaS, can provide a common root so that transactions can flow from wherever they originate: mobile apps, integrations with clients, the client’s website or physical devices. All mapped into a strong ecosystems of partners that repurpose, resell and re-bundle assets to reach new customer segments – like the millennials – that the bank could never have reached alone.

Imagine for example, you want to offer a mortgage service coming from a real estate website or you want to open the possibility to customers subscribe financial products from 3rd party, like Brokers or the case were the bank can outsource loan services to partners keeping costs low. Providing the banking platform allows customers and partners to integrate them as a self-service adapted to their particular needs or bringing the reality of the Bank of Me.

Regulation want banks to embrace open ecosystems
The UK regulator, issued a report [6] that sates in the remedies section:

“mobile banking tools have been rapidly adopted, and a growing financial technology (‘FinTech’) sector is developing and applying new tools. Application programming interfaces (APIs) will allow publicly available data and customers’ own data to be shared with trusted third parties, and ‘open standard’ APIs can be particularly powerful (with necessary safeguards for security and privacy) in opening up new customer information and advice services.”

 

CMA states clearly about the importance of:

“development and implementation of an open API banking standard has the greatest potential to transform competition in retail banking markets […] by making it much easier for both personal customers and SMEs to compare what is offered by different banks and by paving the way to the development of new business models offering innovative services to customers.[…] APIs may also be used, with the customer’s informed consent, to share securely their transaction history to enable access to tailored current account comparisons and other services.”

As I pointed before in this post, banks can offer for example, in the retail segment, custom services like automated financial management based on your spending patterns, risk appetite and the phase of your personal life – before entering into labour market, in labour market, retirement – this is just a matter how soon banks want to enter in this new kind of business models before they are expelled from the market.

From a strategic point of view, some banks consider the remedy with a very strong dose or as a threat to their outdated business models. In my experience dealing with CIO’s and CEO’s from different banks is clear that the younger generations are much more prepared or already sparked business model transformation and look to this more as an opportunity. The generational gap – a self-acquired soft skill – can play a key role how the organisation perceives the way forward.

 
References:

[1] Unfortunately, due protective measures related with entry in force of the regulation, most countries in European Union delayed the application of the new regulation, meaning that a cargo travelling from Portugal to Germany will only benefit from the electronic act when enters in Germany, meaning that all way down the road the paper document should exist to present to customs and other government authorities. In other terms, the digitalisation of the process is impracticable, an outcome that is still a reality.

[2] Magic Quadrant for Enterprise Integration Platform as a Service, Worldwide, 2016. […] “Integration PaaS delivers some combination of the capabilities typically found in enterprise service buses, data integration tools, B2B gateways, managed file transfer products and API management platforms. IT departments, line-of-business developers, mobile application development teams, application teams and even business users (aka “citizen integrators”) leverage these capabilities to develop, execute and manage integration interfaces (or “integration flows”).”

[3] Emery, Fred E. “Characteristics of socio-technical systems”, in Design of Jobs: selected readings, Davis, L. E. And Taylor, J.C. (Eds.), Penguin Books, ASIN: B013KQY62S

[4] Merrelyn Emery “The current version of Emery’s Open System Theory” Systemic Practice and Action Research.

[5] Application Programming Interface

[6] CMA – Retail banking market investigation. Summary of final report. August 2016

Losing assertiveness in a macro-cosmos world

Today in Lusaka, I was sharing a ride with a literature historian.

We were talking about writing quality and how the publishing industry changed the way we read. Today, books must catch the readers attention in the first chapter or are condemned to be shelved.

During the short interaction, I came up with the idea that I remember during the first season of the TV series Californication, novelist Hank Moody was complaining about writing was changing from books to blogs (it was the era of social 1.0) and how writing quality was decreasing in favor of easy writing, as well as, the lack of depth, what Thierry de Baillon, refers to the lack of sensitivity humans are experiencing in reading come collapsed or compressed text. This is not occurs only in book writing, it also become a pattern in journalism, which journalist echoes what others say, without challenging, questioning or even being able to tell a story. In advisory and research services this is also true like the twitter feed as follows. A company announces a new feature and immediately this becomes a fact without proper verification, suffering from the maven dysfunction like it happen when a new consumer product is rumored or is launched. Fortunately, in the activity stream bellow, the players are all non-believers.

1.PNG

On open Text new cognitive BPM offering

The historian did not concur with my point of view, leveraged on the allusion of the TV series and on her point of view, what was important is the information explosion and ease of access, that allowed people to read and be exposed to new ideas, connect with others and expand the knowledge. She also pointed out, that without social media, hyper connectivity, combined with mobile, self writing agents, would never had a chance to publish a book, because classic book publishers are focused on the business economics.

Despite the fact this is somewhat close to the truth, not only in publishing industry, but also in music industry – think for example what happened with David Bowie’s the Leon Tapes case – is also true that today we are accelerated not to think properly on facts.

Everything is becoming to fast, temporary and instantaneous.

As I am diverting to more complex reading these days, like A Thousand Plateaus, probably because like Hank, I am an analogue person in a digital world, but as Thierry points

We being lead in a world of rising distrust, hate and despair

We are losing assertiveness .

A Thousand Plateaus

On June 2014, I was at Enterprise Architecture Conference Europe in London to present my work on the theme of cybernetics, called Viable System Model meets Enterprise Architecture. During the preparation of the presentation, I was exposed to the concept of the rhizome, created by two French philosophers, Deleuze and Guattari, designed to bring some random pointers about complexity theory, deeply related with the challenges a cybernetician like to reflect on. The rhizome was brought to life in a book called A Thousand Plateaus, that according to the authors, was written in random mode. Every day, they decide in which part of the book they will work on with no direction, rejecting ‘the law of narrative order’, like Robert Musil’s masterpiece Der Mann ohne Eigenschaften (the man without qualities), that by coincidence, was one of my inspirations for the talk at the conference. I bought the book when I was in London but once I buy more books I can read, I only started to read the book these days.

A thousand plateaus is broken down is many directions, that I would like to point only some, as follows:

  • Epistemological – how the models we create to understand the reality are fit in terms of meaning, completeness and de-territorialization (what Deleuze and Guattari refer to the true meaning of systems out of context of operation);
  • Ontological – how the meaning of concepts evolve in a way they are the result of constant change;
  • Anthropological – how human beings are able to interpret signs that will tell about the necessity of change. A theme I explored with Amy Santee in February 2015, when I was in Seattle;
  • Social – how individuals can self-organize in a knowledge oriented world, contrary to Kant’s ideas of following the natural order of laws, rules, regulations and procedures.

The emergent self-organization is a matter in focus which is materialized in the concept of chaosmos, that explain the functioning of the universe as a meta-system composed of abstract machines, very well aligned with cybernetic principles. Exciting days are coming.

BPM Conference Portugal 2016

This is the transcript of my opening act as Chair of the conference. In this edition, the event attracted on average 200 attendees, a breakthrough and important milestone.

This years edition theme is about Digital Transformation. I am not here to bring definitions about what Digital Transformation is. Definitions are, by definition, pretty useless, incomplete and valueless, hence, let me bring you real world examples what digital transformation is all about.

Let’s start by the banking industry

Some banks, there are some good examples just on the other side of the border, are leveraging on the power of Fintechs to expand the value chain. Fintechs are tech startups that are bridging the gaps, for example in trading operations and loan provisioning.

Today some banks are offering real end to end transactions, starting from the manufacturer that wants to collect the money as soon as possible, the transport companies and the manufacturer’s customer that wants to chase and track,
in order to prevent disruption in the supply chain. Today it is possible to share all the documents involved in transaction, that will determine if payment can be processed, broadcast merchandise tracking and predict delivery.

In loans the market is experiencing the loom of new business models like hybrid lending. Imagine your company needs equity and the bank does not to be exposed to risk. The bank can provide you, let’s say, 60% of the required equity and the company trough a network of venture capitalists, or equity firms can get the remaining 40%.

There is also Blockchain. Blockchain is changing the way we execute transactions in a way we do not need banks anymore. You can just wire money to other person. No one needs to have a bank account. Just Imagine the possibilities on how easy it is to process payments.

Let’s shift industry sector, like Oil and Gas or Utilities.

For reasons that I do not understand (I assume it is related with lack of industry knowledge) we constantly read articles in reference magazines about the power of digital business in retail leveraged on big data. Well, let me tell you are being deceived. The real power of big data is in manufacturing, utilities and oil and gas. Let me put you into perspective. People say Portugal have a population of 11 million. In Lagos, in Nigeria, live 25 million people, it fits twice the size of Portugal and some change. Now imagine in countries that produce oil, the thousands and thousands of kilometers of pipelines with thousands and thousands of pumps and other equipment and on each pump you can
control in real time the temperature, the pressure, the velocity, whatever. Now imagine you can predict based on operating conditions when the pump it is going to fail and you can prevent expensive repair cost (just think that most of this equipment is made to order and when it fails, it fails in the middle of nowhere) and the cost of non productive time.

This is what digital business is all about. This drives us to insurgency spot and asset  protection. Oil & Gas companies are very keen on militia do not blow up their pipelines.

Cyber-security

This leads to the development and implementation a new IT capability, context-awareness, by the realization of a Context Awareness System, a sophisticated surveillance technology solution that aggregates and analyses public safety data in real time, providing security investigators and analysts with a comprehensive view of potential threats and criminal activity.

To put you on perspective, I need to borrow this quote from Frances Stonor Saunders at a London Review of Books talk.

On the evening of 3rd of October of 2013 a boat carrying more than 500 Eritreans and Somalis founded out the tiny island of Lampedusa, in the darkness, locals mistook the desperate cries for help from the sounds of seagulls, the boat sunk within minutes, survivors were in the water for five hours, some of them close the bodies of the dead
companions at float. Many of 368 people who drowned never made off the capsizing boat and were drowned to the sea floor still on board. Among of the 108 people trapped inside the bow was an Eritrean woman thought to have 20 years old were, as she given birth as she drowned, her waters have been broken in the water, rescue drivers found the dead infant still attached by the umbilical cord

We are facing a dilemma on how cyber-security should be used for. On one hand these systems are used to fight and eliminate terror, protecting innocent lives to be taken, to protect company assets from being attacked and looted by contemporary pirates. We cannot make a so selfish decision about abandon and condemning thousands of refugees to death, because the same kind of Context Awareness System cannot be used in preventing people to die. The political discussion about where the refugees should be steered to Europe of send back to their failed state countries, it not an argument about the responsibility of protecting human life only in the case where terror is being perpetrated, except when people are escaping and running away from the same terror source.

Privacy

Once upon a time autonomy and anonymity were part of our self.

It is very interesting to analyze from a societal point of view, is how some people are deeply concerned with personal data access from 3rd parties, when such concern does not exist about how a bank account manager can understand our lifestyle just looking to the bank statement entries. Even so, many people are not particularly bothered by what faceless corporations or even governments can learn about them from our own data exhale. However, there is not a black or white resolution because today there are two kinds of people: the ones that have two selfs and the one that have three selfs. The first self is related with our personality, who we are, our outer self is our attitude that changes according to the behavior with whom we interact and our virtual self is a a wishful thinking what we want to be normally expressed in social networks which most of these faceless companies invest every bit of information we broadcast. Still, the lines start to blur when the virtual self blends with our attitude and we start to expose parts of our real behavior and thoughts. And still, you think you are protected, do you? By those smartphones with bio-metric authentication, like the San Bernardino phone John Macfee (from Mcafee anti virus) told he would break the phone for free and would last long. Well, you known how the story ended, the FBI handed over the device to an Israeli company that broke it.

This poses the challenge which is privacy by design. Is this new digital world how do you balance the trade off between learn from what your customers do and how do you protect their privacy. Do we own your data? Our we will give up our privacy and become transparent?

Machines are taking over me – II – cybersecurity

During last week I’ve been working in Nigeria with an Oil & Gas Company on defining an IT Strategy program to move to the cloud. One of the key topics of designing the IT strategy is related with the countries societal impact, that needs to fight with terror, insurgency, wash away corruption and institutionalized informal economy. For those that are not familiar with the country environment, it is commonly accepted under such an inequality standard, you can take loot or steal other’s assets, because the others, cannot live so large and leave so little to the rest of population. Hence, I am helping the organization I am working with to either establish or reengineer security command centres to consolidate their security programs, detect insurgency, theft, improve their risk management and loss of primary containment. Accomplishing these goals requires that the security command centre perform these key IT functions: have access to massive information sources, ingesting and processing such data in real time making sense of it; summarizing and presenting key data in a meaningful way that supports quick and effective responses to events as they happen in real time. To implement these functions, the organization must not only have subject matter expertise in security and a deep partnership with security forces (local law does not allow a company to have private security), but it must also have a technology foundation to support decision management, workflow orchestration, communication and collaboration, and data management and protection―all anchored on a secured hybrid cloud architecture.

The field threat environment continues to grow more dangerous like for example attacking pipelines, stealing crude oil or refined products, creating a twofold challenge for Oil & Gas companies and the Nigerian government. Not only must these organizations continually strengthen their protection of the data and systems they manage, but they also do not face stricter requirements to demonstrate that they have done so in accordance with the appropriate laws, regulations because simply they do not exist or are not properly designed, once the new government that took power on May 2015 is “putting the house in order” dealing with more important matters for the population, like end the fuel scarcity – currently in Nigeria, you need to wait on average 2 to 3 hours to fill up your car’s tank in what is the biggest African oil producer.
Anyway, from an architecture design perspective you need to define the particulars and complements the about data protection and security, among others, setting-up specific rules concerning the processing of personal data in the electronic communication sector – in the context of spotting insurgency, one of the data sources is text messages that the population can send, informing the oil & gas company and the military that there are signals that indicate a possible or the perpetration of an attack, as other approaches like live video surveillance feed is not available. As a result, by default, listening, tapping, storage or other kinds of interception or surveillance of communications and the related traffic data by persons other than users without the consent of the citizen concerned, except when legally authorized, is prohibited. The requirement for prior consent is extended to cover the information stored in users’ terminal, given that users have very sensitive information in their computers, smartphones and similar devices. Nevertheless,

How do you deal with the trade-off of enforcing data privacy and putting the population to abdicate from it for the benefit of the Oil & Gas company?

And from a change management perspective,

How do you convince the population to help you fight asset attacks, in a country where everyone is desperate to make its cut on a non-structured economy?

This is because, contrary of designing an advanced IoT business model, in let’s assume, a supply chain, in which truck drivers are rewarded – with airlines miles or discounts in retail shops- by contributing to fuel consumption decrease and safe driving, such kind of gamification strategy must be adapted to social programs to eradicate poverty, providing social services like education and health car of building basic infrastructures. Such gamification strategy, should part of the illusionary, misguided and wrong doing social responsibility corporate programs, meaning that in the end, it is the Oil & Gas company that must share a part of the profits for the IT Strategy work and be effective.

Enter into cybersecurity

This leads to the development and implementation a new IT capability, context-awareness, by the realization of a Context Awareness System, a sophisticated surveillance technology solution that aggregates and analyses public safety data in real time, providing security investigators and analysts with a comprehensive view of potential threats and criminal activity. Such a system protects population sensitive information by designing a series of internal security recommended practices and proprietary and advanced security tooling and technologies for monitoring and detecting advanced asset attacks and related intelligence.
This leaves me as an architect with a challenge in my consciousness, and as such, I would like to invoke one of the most magnificent quote from William Shakespeare’s – Macbeth

“Oh, full of scorpions is my mind, dear wife!”

For that explanation I need to borrow this quote from Frances Stonor Saunders at a London Review of Books talk.

“On the evening of 3rd of October of 2013 a boat carrying more than 500 Eritreans and Somalis founded out the tiny island of Lampedusa, in the darkness, locals mistook the desperate cries for help from the sounds of seagulls, the boat sunk within minutes, survivors were in the water for five hours, some of them close the bodies of the dead companions at float. Many of 368 people who drowned never made off the capsizing boat and were drowned to the sea floor still on board. Among of the 108 people trapped inside the bow was an Eritrean woman thought to have 20 years old were, as she given birth as she drowned, her waters have been broken in the water, rescue drivers found the dead infant still attached by the umbilical cord.”

We are facing a dilemma on how cybersecurity should be used for. On one hand these systems are used to fight and eliminate terror, protecting innocent lives to be taken, to protect company assets from being atacked and looted by contemporary pirates, but one the other hand, like in play, when Macbeth is explaining to his wife about the need to taking life to Banquo, and his son, Fleance, we cannot make a so selfish decision about abandon and condemning thousands of refugees to death, because the same kind of Context Awareness System cannot be used in preventing people to die. The political discussion about where the refugees should be steered to Europe of send back to their failed state countries, it not an argument about the responsibility of protecting human life only in the case where terror is being perpetrated, except when people are escaping and running away from the same terror source.
This something worth thinking about.

Machines are taking over me – I

In the past weekend, I watched one of the last screenings of the Steve Jobs movie picture. The picture starts with footage of Arthur C. Clark, at a (probably) 60’s datacenter explaining to the reporter that in a near future, humans will have in their hands a miniaturised computer which they will have access to information. By the effect of the minicomputer intrusion, Arthur also points that future society will become dependent and blended with technology. This kind of assumptions are the ones that mark the character of a futurist, that can predict and envision years ahead what we are becoming to be, not the other way around, as we, part of a jittery, mouth-full instant communication global community, started to assume that futurists are the ones that can predict what it is going to happen in the next 6 months, or next year.

During the last couple of months I been in contact with at least two hands full of financial institutions. In most of them, the business initiatives around social business, ranked on top of their transformation programs, once they realised that letting customers blow to the horn when they are angry, damages the reputation of institution, as well as, social media should be used to serve the customer. With this in mind, banks wish to have an upgrade of the brand new 360 degree view of the customer. Hence, in the CRM system, apart of the account statements, the financial products the customer subscribed, it will integrate his social media feed, with social listening and sentiment analysis features. There is nothing new on this, the novelty is the customer profile built around the what we know about him, taking into consideration the spending partners, the investments done, the risk profile, combined how he expresses in social media, builds who the customer is. Or not.

Technological advances have open the door in the emergence of services that perform financial advisory services. Despite there are some regulation barriers to comply, the financial personal assistance is here to stay. The financial assistant, leveraged among others by machine learning, high performance computing and natural language processing are able determine the best investment needs, your tolerance to risk and what are your goals to be achieved. However there is some room for improvement on adjusting to investment portfolio or your debt stack taking into consideration portfolio diversification or futures in economy growth or income fluctuations. One of the biggest barriers to break is the fact that customers operate with multiple banks and such kind of intelligent advisory services stumble in the lack of open interoperability. Last, there is an emotional factor, which is, the human lifecycle phase that dictates our inherent needs and wants. Someone that is heading retirement have very different needs from the ones that are starting their professional life. And some humans do not want to retire at all, despite there are in a certain age.

Luciano Fiordi, in his book called the fourth revolution, quickly points one of the foundational philosophical well-know distinction between who we are – let us call this our personal identities – and who we think we are – call this our self-conception. The two selves-our personal identities and our self-conceptions – flourish only if they support each other in a mutually healthy relationship. Things get more complicated because our self-conceptions, in turn, are sufficiently flexible to be shaped by whom we are told to be, and how we wish to be perceived. Hence, the dream that bankers have about understanding who are you and how they can serve you better, it is still far for reality. This should not only be a reflection point in the banking industry, as well as across the mass market verticals. For those industry sectors like retail that are in the forefront of understanding customer behaviour it could be interesting for banks to carry a join design experience on who the customer really is. There is still a very long road ahead how to better serve bank’s customers.

BPM a year in review 2015

When I look back to the year that it is coming to an end, this was the year which privacy played an important role when designing processes, interactions or customer experiences.

Many can tend to think that this was the year of the things – Internet of Things (IoT) – but I could not disagree more. IoT it is still on its infancy. There is an volume illusion due to the fact that the things are enabled by smart watches, fitness bands or smart phones, in order words, driven by the consumer and retail industry. The real value from IoT is going to grow from industries like, defense, oil and gas, utilities and manufacturing. These industries rely on assets full of sensors hat are spread across kilometers and kilometers around the world,  that were not yet connected or are connected in closed systems. Today, Oil and Gas companies are unveiling new possibilities on real time asset control and emergency response [1] that to become a reality it is necessary in some cases, to replace a myriad of outdated sensors and assure communication reliability. Other forthcoming enabling waves are related with the German government vision on Industry 4.0. In this approach, data is gathered from suppliers, customers and the manufacturing company and linked up in real time, where every part, every belt, every machine, every truck, every product is inherently connected. Hence, we are still at the beginning of reaching the full potential. Total connectivity by default takes time and money to implement.

In the beginning of this year, I wrote about my concerns of enforcing one of the key principles on privacy by design. In the social world we live in, does not requires explicit, informed user consent for any transaction using personal data. Well, it does, but works on the contrary, we are allowing by default that all personal data can be used by the companies we interact with to identify, track, correlate our activity, even the ones the user does not wanting, knowing or expecting it. In the referred post, I pointed the intention of the UK Government to:

Enforce a policy that blocks citizens access to encrypted software applications, in order the government can listen, read and extract what it considers to be relevant information to avoid security risks.

This proposition grew very quickly to an updated bill that will allow existing bulk-collection powers of the security and intelligence services. Such kind of new regulations made Apple to come to public assuming a position against such kind of overstepping by the watchdog.

We believe it would be wrong to weaken security for hundreds of millions of law-abiding customers so that it will also be weaker for the very few who pose a threat […] In this rapidly evolving cyber-threat environment, companies should remain free to implement strong encryption to protect customers.

On the other hand the European Parliament wants to enforce new regulation related with protection of individuals with regard to the processing of personal data and on the free movement of such data – which Google is so adverse to it. It can be read in the European Parliament document.

 The way in which consent is to be given by data subjects remains “unambiguous” for all processing of personal data, with the clarification that this requires a “clear affirmative action”, and that consent has to be “explicit” for sensitive data.

In this crossroads, I am not stating that we need to become dissidents or guerrilla fighters, but privacy lines are blurred and it is not a matter of having time to understand how to use technology wisely, when it enters and breaks our inner circle in a way we do not control it anymore a guiding principle that is eroding fast.

2014 entry and backward years can be found here.

[1] Disclaimer: At the time of this writing I am a Microsoft Employee and I was involved in the team that created this solution.