Feeds

Paoga boosts your 'self-worth'

You're being traded anyway, so get a piece of the action

Build a business case: developing custom apps

It may be over a year since Vulture Central mentioned Paoga and it may only just be approaching launching an open Beta Test programme that anyone can sign up to – and you can here - but the reason for founder, Graham Sadd, starting the business remains. What has changed is pinpointing why potential users should be interested. Your personal information – or some of it at least - is already up for sale somewhere in the world, so why not grab a piece of the action yourself is now an underlying message. After all, it's you they are selling.

Who is "they?" Well, according to Sadd just about every company that has any information on you is a potential contributor to the multi-billion dollar business of buying and selling personal data for "targeted marketing campaigns" (aka junk mail) and similar perfectly legal activities. Other companies will pay big bucks for just about any information – the more accurate the better, of course, but any old tosh about you is worth more than no information at all.

And there is always the possibility that some of this information could also leak into more unsavoury databases run by those of an unscrupulous persuasion. The right information about an individual in those hands can prove very profitable – though rarely to the individual concerned.

So the Paoga premise remains the same – provide a secure repository for individuals in which they can store and update whatever personal data they consider worth keeping safe, and provide a means through which those individuals can control who has access to what bits of that information.

For anyone with a yen to ask the question: "OK, but why should I bother, I can keep my information secure anyway?" the answer is, in the end, pragmatism. The technically proficient (ie you, dear reader) can no doubt defend your personal information pretty well, but some of it will get out even if you never apply for supermarket loyalty cards or airline "executive club" memberships. So, pragmatically speaking, if your information is being traded – and it probably is right now whether you like it or not – why not get some money for it, while at the same time making sure it is at least accurate?

In effect, Paoga is setting up a permissions-based information brokerage between the companies that legitimately need the information and the individuals who have it. As an example, Sadd pointed to pharmaceuticals companies that are always seeking individuals of age X, sex Y and specific characteristic or illness Z, not just for marketing but also for surveys etc.

It is currently finalising the development of elements of the system, such as trusted methodologies for third party validation of personal information. Here, for example, an individual claiming a university degree could have that validated by the relevant authorities. The system already has the ability to provide a full audit trail of an individual's data and its use.

As a potentially important side benefit, Sadd does see this growing into a way of at least partially validating the individual as an extant, participating member of the here and now – for example moving towards providing some form of "approved" eSticker that could be put on an eBay vendor's details.

He also sees it having potential to provide individuals with evidence that can be presented to whichever authority is policing a specific type of information use, if any misuse occurs.

Though the company has consulted with a variety of Government Departments and quangos, Sadd does not, however, see Paoga pitching at becoming any form of officially-recognised repository for personal information.

While a there is bound to be a goodly coterie of individual early adopters keen to take up Paoga's offerings, the key to its success may in fact be found in the business marketplace. Sadd sees huge market potential for Paoga in intra-company compliance and governance applications. He sees it as playing a role in managing risk avoidance as well as many other areas of business management.

Human resources management is a particular case in point: "HR departments," he said, "can spend 50 per cent of their budgets on staff compliance issues, most of which can be managed by the staff themselves within a Paoga environment. Many HR departments could get rid of the big databases they are currently obliged to run." ®

Gartner critical capabilities for enterprise endpoint backup

More from The Register

next story
'Stop dissing Google or quit': OK, I quit, says Code Club co-founder
And now a message from our sponsors: 'STFU or else'
Why has the web gone to hell? Market chaos and HUMAN NATURE
Tim Berners-Lee isn't happy, but we should be
Microsoft boots 1,500 dodgy apps from the Windows Store
DEVELOPERS! DEVELOPERS! DEVELOPERS! Naughty, misleading developers!
Apple promises to lift Curse of the Drained iPhone 5 Battery
Have you tried turning it off and...? Never mind, here's a replacement
Mozilla's 'Tiles' ads debut in new Firefox nightlies
You can try turning them off and on again
Linux turns 23 and Linus Torvalds celebrates as only he can
No, not with swearing, but by controlling the release cycle
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
This is how I set about making a fortune with my own startup
Would you leave your well-paid job to chase your dream?
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.