Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    unusual trading activity
    Signal Or Noise? A Decision Tree For Evaluating Unusual Trading Activity
    3 Min Read
    software developer using ai
    How Data Analytics Helps Developers Deliver Better Tech Services
    8 Min Read
    ai for stock trading
    Can Data Analytics Help Investors Outperform Warren Buffett
    9 Min Read
    media monitoring
    Signals In The Noise: Using Media Monitoring To Manage Negative Publicity
    5 Min Read
    data analytics
    How Data Analytics Can Help You Construct A Financial Weather Map
    4 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Evernote’s Three Laws of Data Protection
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > IT > Security > Evernote’s Three Laws of Data Protection
Security

Evernote’s Three Laws of Data Protection

MIKE20
MIKE20
4 Min Read
SHARE

“It’s all about bucks, kid. The rest is conversation.”

Contents
  • Beyond Lip Service
  • Simon Says
  • Feedback

–Michael Douglass as Gordon Gekko, Wall Street (1987)

Sporting more than 60 million users, Evernote is one of the most popular productivity apps out there these days. You may in fact use the app to store audio notes, video, pics, websites, and perform a whole host of other tasks.

“It’s all about bucks, kid. The rest is conversation.”

More Read

big data in space
The State of US Cyber Security
The Hidden Dangers Of The Internet of Things [Infographic]
DFARS Cybersecurity Survey Results
CASBs Help Cloud-Based Businesses Avoid Data Breaches
Location-Based Analytics, Carrier IQ and Your Mobile Privacy

–Michael Douglass as Gordon Gekko, Wall Street (1987)

Sporting more than 60 million users, Evernote is one of the most popular productivity apps out there these days. You may in fact use the app to store audio notes, video, pics, websites, and perform a whole host of other tasks.

You may not know, however, about the company’s very progressive stance on data protection. Everything at Evernote follows these three basic rules:

  1. Your data is yours.
  2. Your data is protected.
  3. Your data is portable.

In a word, wow.

Beyond Lip Service

Many organizations only pay lip service to data protection and privacy. (I’d put Facebook squarely in that camp, as would many others.) However, Evernote is one of a handful to take these data-related issues so seriously. While the company could easily attempt to monetize its users via Big Data, it chooses not to. Its CEO, Phil Libin, told Charlie Rose as much. Instead, the company opts to build an amazing user experience and convert users to the paid version of the product.

Now, I’ve written before on this site about data portability and how organizations often take a convenient approach to it. Companies like Yahoo! want data to be portable, but not because it’s inherently the right thing to do. I’d argue that Marissa Mayer evangelizes data portability so her company can monetize users and user data for itself. Imagine the money Yahoo! would make if Google users started clicking on Yahoo!-supported keywords and searches (with Google data making those searches more relevant). It’s the classic free-rider problem. Yahoo! would benefit from all of Google’s work, investment, and (above all) data.

But let’s not demonize Yahoo! here. For the same reason, Facebook doesn’t want–or allow–its users to easily export photos, likes, comments, posts, and the like to Google Plus, Twitter, or other social networks. For many if not most organizations and executives, the quote from Gordon Gekko rings as true today as it did 26 years ago.

Simon Says

Of course there’s a middle ground between using Big Data to monetize its users as much as possible (read: Facebook) and not at all (read: Evernote). Hybrid or more moderate strategies exist. Just because you can exploit Big Data doesn’t mean that you must–or even that you should.

Finding a balance is key. The question is, Where do you draw the line?

Feedback

What say you?

Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

0622cae5 f7d7 4f74 84b5 eabd1a823dca
How Data-Driven Grocery Recommendations Help Shoppers Eat Better With Less Effort
Big Data Exclusive
business recovering from data loss
How Data-Driven Businesses Protect MySQL Databases from Shutdown
Big Data Exclusive
ai driven task management
Reducing “Work About Work” with AI Task Managers
Artificial Intelligence Exclusive
data center uptime
Why Rodent-Resistant Conduits Are Critical for Data Center Uptime
Big Data Data Management Exclusive Risk Management

Stay Connected

1.2KFollowersLike
33.7KFollowersFollow
222FollowersPin

You Might also Like

what cyber criminals can do with your metadata
Best PracticesBig DataData ManagementExclusivePrivacyRisk ManagementSecurity

What Cyber Criminals Can Do With Your Metadata

8 Min Read
Data ManagementExclusiveITPrivacyRisk ManagementSecurity

Cybersecurity Predictions for 2019

5 Min Read

Meeting the Business Technology Needs of Midsized Companies

4 Min Read
Image
Security

eBay’s Data Breach Exposes 145 Million User Records

5 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

data-driven web design
5 Great Tips for Using Data Analytics for Website UX
Big Data
AI chatbots
AI Chatbots Can Help Retailers Convert Live Broadcast Viewers into Sales!
Chatbots

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?