Reconciling Public Policy with New Theories of Privacy

Slides:



Advertisements
Similar presentations
Introduction to Earth Science Section 2 Section 2: Science as a Process Preview Key Ideas Behavior of Natural Systems Scientific Methods Scientific Measurements.
Advertisements

Professional Ethics and Responsibilities
The purposes of nursing theory?
BIOETHICS.  Often used interchangeably but NOT the same:  Values  What’s important/worthwhile  Basis for moral codes and ethical reflections  Individuals.
University of Bahrain College of Business Administration Management & Marketing Department Chapter Five: Decision Making, Learning, Creativity and Entrepreneurship.
Database Principles: Fundamentals of Design, Implementation, and Management Chapter 1 The Database Approach.
Requirement Elicitation Nisa’ul Hafidhoh Teknik Informatika
AP CSP: Sending Binary Messages
Understanding Populations & Samples
Features of science revision
Part 4 Reading Critically
Elementary Science Professional Development: Lessons Learned

What is Science Ch 1 Vocabulary words.
Microgrid Concepts and Distributed Generation Technologies
In-Class Exercises to Engage Students in Writing
Helping Students Learn
How learners learn in my teaching world…
Emerging Diseases Lecture 2: The Scientific Method 2.1: Overview
Critical Thinking David Lieberman Professional Development Series
Chapter 16 Participating in Groups and Teams.
AF1: Thinking Scientifically
國立臺灣師範大學英語系陳秋蘭 英語閱讀與會考命題趨勢 國立臺灣師範大學英語系陳秋蘭
Programme Board 6th Meeting May 2017 Craig Larlee
Database Systems: Design, Implementation, and Management Tenth Edition
PowerPoint® Slides to Accompany
Section 2: Science as a Process
Chapter Three Ethics and Professional Responsibility
Statistical Data Analysis
Critically Reviewing the Literature
Research Methods Lesson 1 choosing a research method types of data
Anonymisation: Theory and Practice
THE SCIENTIFIC METHOD.
Session II: Reserve Ranges Who Does What
Research Methods AS Sociology Unit 2.
Facilitated by KEYS Academy and Options HS with the ARISE Foundation
Helpful Tips and Tricks for Reading in World History
Starter Look at the photograph, As a sociologist, you want to study a particular group in school. In pairs think about the following questions… Which group.
The Exam 40% of your grade Marked out of 80
ECE 4450:427/527 - Computer Networks Spring 2017
Learning to Program in Python
Learning Link Scotland
Emerging Diseases Lecture 2: The Scientific Method 2.1: Overview
Strategies Achieving our Goals
Jaime Teevan - Available Microsoft Research Busy
uPortal 3 User Experience
D3 Confidentiality.
SECOND LANGUAGE LISTENING Comprehension: Process and Pedagogy
Moving Arrays -- 1 Completion of ideas needed for a general and complete program Final concepts needed for Final Review for Final – Loop efficiency.
GODFREY HODGSON HOLMES TARCA
Why Study Ethics and computing?
Knowledge Questions.
College of NURSING SCIENCE
Do Now I. Use inalienable in a sentence II. Define tolerance
How do you start a collaborative response?
What do we know (page 1)? Define the word "Taxonomy." (Knowledge)
Statistical Data Analysis
Code of Engineering Ethics
Chapter 4 Dental Ethics.
Scaffolding.
United States Department of Justice Office of Information Policy
Applying Use Cases (Chapters 25,26)
Chapter 15 © Routledge/Taylor & Francis 2014
Zimbabwe 2008 Critical Thinking.
Ethics: Doing the Right Thing
What Are Ethics? What are the objectives?
X-Road application guide
AS Psychology Research Methods
Differential Privacy (1)
Teaching Behaviour To All Children To Prevent Problems Occurring
Presentation transcript:

Reconciling Public Policy with New Theories of Privacy Ed Felten Princeton University

Four Theses Laws and public policies on data privacy are mostly based on a theory of privacy. There is a huge gap between that policy community theory and more modern theories. This gap results in poorly designed laws and policies. The gap will be difficult to close, but we need to start closing it.

PII theory of data privacy Key concept is Personally Identifiable Information (PII) Data carries risk if it contains PII If no PII, then risk is minimal, because sensitive information in the data cannot be associated with any specific individual. Render data safe by scrubbing PII out of it

Underlying model of data and computing What computers do: store data for later retrieval Meaning of data is evident on its face No processing of data, other than simple joins ID data ID more data ID data more data

How parties interact ID data

How parties interact ID data a data anonymize

FIPPs Fair Information Practice Principles are part of the orthodox privacy religion. Arguably, they should be re-examined. Perhaps they’re off target. Or perhaps they’re orthogonal to the problem in some ways. Example: data must be correct – but nowadays we often rely on deliberate errors (“noise”) as part of a privacy strategy.

How our current theories differ Interact with data via queries, rather than data-shipping focus on interactive protocols Meaning of data more than what is evident on its face assume probabilistic inference from data depends how data was generated Harm is (additional) inference about an individual, rather than linking of records Presumption that interaction is disclosive, absent evidence to the contrary

Why policymaking is like engineering Have to “ship code” under time/cost constraints Can’t wait for theory to answer your questions – have to work with what is known Serve multiple masters Huge installed base, hard to re-architect

Why so little adoption of our theories? Our theories are hard to understand, especially for non-techies. rely on intuition about computation, probability, etc. Our theories are more pessimistic—perhaps an “inconvenient truth.” Theories are very different—need a true paradigm shift. … and no easy way to evolve old policies into new ones.

What should we do?

Evangelize within the professional community Courts try not to make scientific judgments themselves. Instead, they rely on established consensus of the expert community. So we need to change the views of rank-and-file developers and statisticians. Establish accepted best practices. Influence what is viewed as “reasonable.”

Provide useful tools Fight idea that “The differential privacy stuff is only theoretical.” Need (more) usable tools and cookbooks for developers. Even if no legal requirement: forward-leaning orgs can use to set a good example other orgs can be named-and-shamed for not adopting best practices

Figure out how to teach our theories Can we simplify our theories, at least for explanatory purposes? Can we abstract them, and ask for policies that rely on government experts like NIST to fill in the details? What specifically would you want a law or regulation to say?

Policy pro-tip: Litigate the definitions To de-identify, “must achieve a reasonable level of justified confidence that the data cannot reasonably be used to infer information about, or otherwise be linked to, a particular consumer, computer, or other device.”

Policy engagement Important to keep participating in public policy process: submit comments, testify, talk to policymakers Continue to point out failures in current models Consider how groups like National Academies can help Join the trend toward computer scientists participating in policy directly, and educating our students to do so

Reconciling Public Policy with New Theories of Privacy Ed Felten Princeton University