Feeds

Paoga boosts your 'self-worth'

You're being traded anyway, so get a piece of the action

Providing a secure and efficient Helpdesk

It may be over a year since Vulture Central mentioned Paoga and it may only just be approaching launching an open Beta Test programme that anyone can sign up to – and you can here - but the reason for founder, Graham Sadd, starting the business remains. What has changed is pinpointing why potential users should be interested. Your personal information – or some of it at least - is already up for sale somewhere in the world, so why not grab a piece of the action yourself is now an underlying message. After all, it's you they are selling.

Who is "they?" Well, according to Sadd just about every company that has any information on you is a potential contributor to the multi-billion dollar business of buying and selling personal data for "targeted marketing campaigns" (aka junk mail) and similar perfectly legal activities. Other companies will pay big bucks for just about any information – the more accurate the better, of course, but any old tosh about you is worth more than no information at all.

And there is always the possibility that some of this information could also leak into more unsavoury databases run by those of an unscrupulous persuasion. The right information about an individual in those hands can prove very profitable – though rarely to the individual concerned.

So the Paoga premise remains the same – provide a secure repository for individuals in which they can store and update whatever personal data they consider worth keeping safe, and provide a means through which those individuals can control who has access to what bits of that information.

For anyone with a yen to ask the question: "OK, but why should I bother, I can keep my information secure anyway?" the answer is, in the end, pragmatism. The technically proficient (ie you, dear reader) can no doubt defend your personal information pretty well, but some of it will get out even if you never apply for supermarket loyalty cards or airline "executive club" memberships. So, pragmatically speaking, if your information is being traded – and it probably is right now whether you like it or not – why not get some money for it, while at the same time making sure it is at least accurate?

In effect, Paoga is setting up a permissions-based information brokerage between the companies that legitimately need the information and the individuals who have it. As an example, Sadd pointed to pharmaceuticals companies that are always seeking individuals of age X, sex Y and specific characteristic or illness Z, not just for marketing but also for surveys etc.

It is currently finalising the development of elements of the system, such as trusted methodologies for third party validation of personal information. Here, for example, an individual claiming a university degree could have that validated by the relevant authorities. The system already has the ability to provide a full audit trail of an individual's data and its use.

As a potentially important side benefit, Sadd does see this growing into a way of at least partially validating the individual as an extant, participating member of the here and now – for example moving towards providing some form of "approved" eSticker that could be put on an eBay vendor's details.

He also sees it having potential to provide individuals with evidence that can be presented to whichever authority is policing a specific type of information use, if any misuse occurs.

Though the company has consulted with a variety of Government Departments and quangos, Sadd does not, however, see Paoga pitching at becoming any form of officially-recognised repository for personal information.

While a there is bound to be a goodly coterie of individual early adopters keen to take up Paoga's offerings, the key to its success may in fact be found in the business marketplace. Sadd sees huge market potential for Paoga in intra-company compliance and governance applications. He sees it as playing a role in managing risk avoidance as well as many other areas of business management.

Human resources management is a particular case in point: "HR departments," he said, "can spend 50 per cent of their budgets on staff compliance issues, most of which can be managed by the staff themselves within a Paoga environment. Many HR departments could get rid of the big databases they are currently obliged to run." ®

Internet Security Threat Report 2014

More from The Register

next story
Microsoft on the Threshold of a new name for Windows next week
Rebranded OS reportedly set to be flung open by Redmond
Apple: SO sorry for the iOS 8.0.1 UPDATE BUNGLE HORROR
Apple kills 'upgrade'. Hey, Microsoft. You sure you want to be like these guys?
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
ARM gives Internet of Things a piece of its mind – the Cortex-M7
32-bit core packs some DSP for VIP IoT CPU LOL
Lotus Notes inventor Ozzie invents app to talk to people on your phone
Imagine that. Startup floats with voice collab app for Win iPhone
'Google is NOT the gatekeeper to the web, as some claim'
Plus: 'Pretty sure iOS 8.0.2 will just turn the iPhone into a fax machine'
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.