Athina Antoniou and Lilian Mitrou

Slides:



Advertisements
Similar presentations
Re-use of PSI Data Protection Issues Cécile de Terwangne Professor at the Law Faculty, Research Director at CRIDS University of Namur (Belgium) 2 nd LAPSI.
Advertisements

Public Sector Information & Data Protection: A plea for personal privacy settings for the re-use of PSI Bart van der Sloot Institute for Information Law.
PRIVACY ASPECTS OF RE-USE OF PSI: BETWEEN PRIVATE AND PUBLIC SECTOR
The data retention directive: data protection aspects Frank Robben General manager Crossroads Bank for Social Security Sint-Pieterssteenweg 375 B-1040.
Introduction to basic principles of Regulation (EC) 45/2001 Sophie Louveaux María Verónica Pérez Asinari.
Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
Signature (unit, name, etc.) Introduction to biometrics from a legal perspective Yue Liu Mar NRCCL, UIO.
Security of eGovernment, European Parliament, Brussels 2013 Max Snijder, Linda Kool, Geert Munnichs L Kool | 1 19 February 2013 Findings from the ePassport.
Respecting Privacy in Global Networks/ Guernsey, Wednesday 11 th April, Paula Ortiz López Spanish Data Protection Agency.
ILONA GAVRONSKA GROUP IL-41 INTERNATIONAL LAW DEPARTMENT KYIV NATIONAL ACADEMY OF SCIENCES OF UKRAINE KYIV UNIVERSITY OF LAW.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
Data Protection & Human Rights. Data Protection: a Human Right Part of Right to Personal Privacy Personal Privacy : necessary in a Democratic Society.
1 Ann-Charlotte Nygård, Programme Manager, FRA Roundtable: Possibilities for cooperation on consular and visa issues in the Danube Region.
National Smartcard Project Work Package 8 – Security Issues Report.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
The Eighth Asian Bioethics Conference Biotechnology, Culture, and Human Values in Asia and Beyond Confidentiality and Genetic data: Ethical and Legal Rights.
Federated or Not: Secure Identity Management Janemarie Duh Identity Management Systems Architect Chair, Security Working Group ITS, Lafayette College.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
HIT Policy Committee Privacy & Security Workgroup Update Deven McGraw Center for Democracy & Technology Rachel Block Office of Health Information Technology.
Identity Crisis: Global Challenges of Identity Protection in a Networked World Alison Knight.
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
Biometrics Authentication Technology
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Data protection as an integral part of OOP implementations: The Austrian approach Peter Kustor.
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
Data Protection and research Rachael Maguire Records Manager.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
Privacy in the Digital Age: the UN General Assembly Resolution
Mirjana Boshnjak Skopje, 20 to 22 September 2017
Big Data and Open Data What's in it for the archives?
GDPR (General Data Protection Regulation)
Issues of personal data protection in scientific research
Viewing the GDPR Through a De-Identification Lens
Presentation to GTMC on GDPR
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
Unique Identification Number Project
General Data Protection Regulation
Convention108 in a snapshot
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Data workshop WhOSE DATA IS IT ANYWAY? Alexia Christie
Research Ethics Matthew Billington
EU Directive 95/46/EC (Paragraph 2) “Whereas data-processing systems are designed to serve man; whereas they must Respect their fundamental rights.
Data Protection & Freedom of Information- An Introduction
Data Protection & Human Rights
Legal Framework in Identity Systems T Koshy
GENERAL DATA PROTECTION REGULATION (GDPR)
6 Principles of the GDPR and SQL Provision
Biometrics.
Data Protection Act.
G.D.P.R General Data Protection Regulations
FEK årskonferanse 28. februar 2018.
Bart van der Sloot Data Protection 2.0 The proposal for a General Data Protection Regulation Bart van.
ESF Monitoring & Evaluation and Data Protection in Spain
General Data Protection Regulation
Legal Framework for Civil Registration, Vital Statistics
Biometric technology.
HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Meeting with the Namibia ICT Ministry and Data Protection Stakeholders.
Bart van der Sloot Data Protection 2.0 The proposal for a General Data Protection Regulation Bart van.
GDPR Workshop MEU Symposium Prague 2018
Operational Programme and Personal Data Protection
Public Sector Information & Data Protection: A plea for personal privacy settings for the re-use of PSI Bart van der Sloot Institute for Information Law.
Welcome IITA Inbound Insider Webinar: An Introduction to GDPR
Public Privacy: juridical & ethical perspective
Hot Topic 1: GDPR and Traffic Data Systems
Dr Elizabeth Lomas The General Data Protection Regulation (GDPR): Changing the data protection landscape Dr Elizabeth Lomas
Why are we processing data
E-identities (and e-signatures)
Towards a frictionless social security
Presentation transcript:

e-ID card and data protection: A field of controversy or the path for good governance? Athina Antoniou and Lilian Mitrou 4th International Conference on Informational Law Thessaloniki, May 20-21, 2011

Issues e-ID cards as a tool for e-government The qualitative differentiation of using biometrics as identifiers The legal concerns : e-ID cards and the holder’s right to privacy The applicable legal framework The Greek case Conclusions

e-ID cards as a tool for e-government Secure e-government transactions Enhanced security and public safety Supporting innovative forms of citizens’ participation: e- voting The potential of using unique identifiers for efficient e- government services

“I am identified via what I am” Biometrics The requirements Universality Uniqueness Permanency The permanent link Biometric features cannot be forgotten or lost The differentiation The person’s identification and authentication is based on physiology features “I am identified via what I am” The methods Fingerprints Digital face recognition Iris scan Hand geometry

e-ID cards and the holder’s right to privacy Do e-ID cards represent per se an actual interference in the holder’s rights? Linkability via unique identifiers Function creep Profiling and social sorting Collection of data beyond the necessary Central storage – deposits of data Biometrics vs. Privacy? The contravention with the principle against self – incrimination and the principle of proportionality The trust “gap” Do biometrics lie?

The applicable legal framework The principle of finality : requirement for specified, explicit and legitimate purposes The principle of proportionality : balancing the public interest and the person’s right to privacy The establishment on legal basis : the determination of the purposes

e-ID cards : the legal approach The principle of proportionality Collecting and storing only the adequate, relevant and necessary data No raw biometrics storage Template encryption Non- central storage Balancing for the less privacy – pervasive biometric in additional use with other identifiers Accurate and up- dated data for no longer than necessary The principle of finality No merging databases No vague purposes e.g. public interest in general Ex ante known purposes No proactive data collection and storage How? The use of domain - specific identifiers : different identifiers for different public sector aspects, The benchmark of the Austrian framework

e-ID cards : the legal approach The legal basis The legal basis of the individual’s consent: Is the consent necessary? The determination of the persons / institutions with access rights via the determination of the purposes Who : the persons / institutions with access rights Where : to which data Why : for which purposes

The Greek case Greece’s legal framework The approach The Constitutional right to data protection (Art. 9A) The Constitutional additional legal basis for data protection : - the respect for human dignity (Art.2 par.2) - the persons’ right to develop freely their personality (Art. 5 par. 1) - the persons’ right to protect private and family life (Art. 9) The use of domain – specific identifiers The framework with regard to the interconnection of files : the requirement for “interconnection permit” for using a single code number under the Article 8 of the Greek Data Protection Law (2472/97) The approach The issuance of e-ID card with domain – specific identifiers in compliance with the relevant framework

Is the framework adequate ? E-ID card and data protection: A field of controversy or the path for good governance? Non of the above, it depends on the framework! A adequate level of privacy protection : How ? Domain specific identifiers Collect and process only the necessary data Establishment on a legal basis Strong privacy policy and re-evaluation of technical and privacy standards Enhance trust by informing citizens

Thank you for your attention!