Sense Networks has built its systems from scratch to support a paradigm of data ownership and privacy.
Since the company’s inception, Sense Networks has integrated data ownership and privacy principles into its technology and business approach.
Co-Founder and Chief Privacy Advocate, Professor Alex (Sandy) Pentland, is a global thought leader on the topics of data and privacy as well as Director of the Human Dynamics Research at MIT. He is also among the most-cited computational scientists in the world.
People should have full control of their own data
People should be able to fully control the use of any data that they generate. All data collection should be “opt-in,” and users should be able to easily remove themselves and their data from the system without questions or hassle.
People should receive a meaningful benefit in exchange for sharing data
Meaningful benefits include compelling applications to help manage life better, or personalized services based on anonymous learning from “users like me.” People should be able to enjoy the benefits of these services simply in exchange for their data.
People have a right to privacy
Sense Networks respects the privacy and anonymity of its users and captures no personally identifiable information. We never share specific user data with anyone, we use best practices to ensure the safekeeping of the data we receive and we delete all raw data.
Sense Networks partners with TRUSTe, the leading global privacy management solutions provider to enable privacy-safe ads with their TRUSTed Mobile Ads. This will ensure, by giving consumers clarity and confidence, that their privacy is protected. The TRUSTed Mobile Ads privacy management solution provides consumers with notice and choice, and supports compliance with emerging best practices regarding the collection and usage of customer data. TRUSTe offers privacy-safe behavioral advertising in alignment with the DAA, EDAA, and other governing bodies.
|GSMA Privacy Principle||Sense Networks Actions|
|Openness, Transparency and Notice||
|Purpose and Use||
|User Choice and Control||
|Data Minimization and Retention||
|Respect User Rights||
|Accountability and Enforcement||
|Children and Adolescents||