Personal Data Usage Monitor

Slides:



Advertisements
Similar presentations
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Advertisements

Performed by:Gidi Getter Svetlana Klinovsky Supervised by:Viktor Kulikov 08/03/2009.
WINGNUT TECHNOLOGIES CUSTOM ENGINEERING SOLUTIONS.
Tervisepank ® e-solution for primary care Madis Tiik, MD CEO, Estonian Society of Family Doctors
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Databases & Data Warehouses Chapter 3 Database Processing.
Sage CRM Developers Course
X-Road (X-tee) A platform-independent secure standard interface between databases and information systems to connect databases and information systems.
LAYING OUT THE FOUNDATIONS. OUTLINE Analyze the project from a technical point of view Analyze and choose the architecture for your application Decide.
Jan Hatje, DESY CSS ITER March 2009: Alarm System, Authorization, Remote Management XFEL The European X-Ray Laser Project X-Ray Free-Electron.
X-Road – Estonian Interoperability Platform
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Computer Emergency Notification System (CENS)
Introducing HingX now with Capacity Development Network.
Insufficient personal data protection Personal Data protection Act.
Jan Hatje, DESY CSS GSI Feb. 2009: Alarm System, Authorization, Remote Management XFEL The European X-Ray Laser Project X-Ray Free-Electron.
Database Administration
1 Web Servers (Chapter 21 – Pages( ) Outline 21.1 Introduction 21.2 HTTP Request Types 21.3 System Architecture.
Vinay Paul. CONTENTS:- What is Event Log Service ? Types of event logs and their purpose. How and when the Event Log is useful? What is Event Viewer?
7 February 2008Dietrich Beck A LabVIEW Interface to ELOG ELOG Possible solution paths Status Integration into – CS ? – Domain Management System?
Dispatching Java agents to user for data extraction from third party web sites Alex Roque F.I.U. HPDRC.
The Registration Alert System LCA Overview. Overview The Registration Alert System (RAS) is web-based software package that allows University of Washington.
The Functions of Operating Systems Network Operating Systems (NOS)
October 2014 HYBRIS ARCHITECTURE & TECHNOLOGY 01 OVERVIEW.
Architecture Review 10/11/2004
1 DB2 Access Recording Services Auditing DB2 on z/OS with “DBARS” A product developed by Software Product Research.
Cloud service for clinical trials
Training for developers of X-Road interfaces
Session 5 – Data safety / security
Sponsored by Portakal Technologies
Internet Business Associate v2.0
TrueSight Operations Management 11.0 Architecture
OGF PGI – EDGI Security Use Case and Requirements
Jason Bury Dylan Drake Rush Corey Watt
INTERCEPTION APPLICATION
PLM, Document and Workflow Management
MANAGEMENT OF STATISTICAL PRODUCTION PROCESS METADATA IN ISIS
Web Development Web Servers.
WEB SERVICES From Chapter 19 of Distributed Systems Concepts and Design,4th Edition, By G. Coulouris, J. Dollimore and T. Kindberg Published by Addison.
REST- Representational State Transfer Enn Õunapuu
A Web Mining Platform for Enhancing Knowledge Management on the Web KOK-LEONG ONG WEE-KEONG NG EE-PENG LIM Center for Advanced Information Systems,
Database Actors Welcome : To the third learning sequence “ DB ACTORS “
12: :00     Welcome   13: :55     Terumo and Flexso will share insights on the successful implementation of SuccessFactors Compensation module.
Why BOW-TIE & HAZID monitor?
IS4550 Security Policies and Implementation
Why HAZOP-SIL monitor? Knowing what should be done for: HAZOP-SIL
Why HSEMS monitor? Knowing what should be done for:
Why PTW (SIMOP) monitor?
Why HSE Plan monitor? Knowing what should be done for: HSE Plan
Systems Design Chapter 6.
Training for developers of X-Road interfaces
Implementing Listening Producers in IBM Sterling Filegateway
Why SCE monitor? Knowing what should be done for:
Conceptual Architecture of PostgreSQL
Conceptual Architecture of PostgreSQL
Why Interface monitor? Knowing what should be done for:
Chapter 2: Operating-System Structures
How to upgrade your RSFORM!PRO forms for GDPR compliance
WEB SERVICES From Chapter 19, Distributed Systems
Robin Dale RLG OAIS Functionality Robin Dale RLG
Data Security Awareness
Why Sub-System monitor?
Why start anywhere else?
Why QRA monitor? Knowing what should be done for:
Implementing paperless management at local level
Why HAZOP-HSE monitor? Knowing what should be done for HAZOP-HSE issues (i.e. communication of responsibilities) HAZOP-HSE register HAZOP-HSE Actions Follow-Up.
Why SIMOP monitor? Knowing what should be done for SIMOP
Designing IIS Security (IIS – Internet Information Service)
Chapter 2: Operating-System Structures
An Automated Registration System
Presentation transcript:

Personal Data Usage Monitor Ivo Mehide <ivo@degeetia.ee> Degeetia OÜ 25.08.2016

Personal Data Usage Monitor – why? From the Estonian Personal Data Protection Act, §19 subsection 1: At the request of a data subject, a processor of personal data shall communicate the following to the data subject: ... 5) third persons to whom the personal data of the data subject have been transferred From the Estonian Personal Data Protection Act, §25 subsection 2: 3) prevent unauthorised recording, alteration and deleting of personal data and to ensure that it be subsequently possible to determine when, by whom and which personal data were recorded, altered or deleted or when, by whom and which data were accessed in the data processing system; Solution: Registrate this kind of information and share this through common flexible software. Procurements from Information System Authority, financed by European Regional Development Fund: Analysis and Design of Personal Data Monitor Development of Personal Data Monitor Standard Solution

Conceptual diagram

Components Extractor – examines X-road messages for personal data and send general information about the messages (service code, receiving party, personal codes etc) to the Data Recorder. Logger – stores information about the X-road messages in database and shares this to the Eesti.ee portal. Service in eesti.ee portal – user interface for data subjects.

Extractor Works as transparent proxy between infosystem and X-road security server Contains rules of determining if transferred X-road message contains personal data. Contains rules about how to extract general message information (receiver, timestamp, service name, etc) and personal code(s) from the message body. Extraction rules are going to apply for all the messages that are catched by the filter. Extracted information is going to transferred to the Logger component.

Logger Separate component for storing and retrieving personal data usage information. Provides REST services for storing and retrieving. Provides X-road service for eesti.ee portal in order to search and retrieve logged information. Provides simple web-based UI for internal use.

Eesti.ee portal Data subjects can use eesti.ee portal in order to get information from which database, when and to what third party their personal data was transferred. Currently there are agreed to present such information from: Elering Data Warehouse (electricity consumption points) Population Register Health Insurance Register Social Services Register Unemployment Insurance Registry

Different configuration options Personal Data Usage Monitor components can be used also separately. The possible configurations are as follows: Both Extractor and Logger components are in use. Only Logger component is in use. Infosystem writes personal data information directly to Logger Only Extractor component is in use. Extractor writes log information to infosystem and infosystem implements needed X-road service. There are no Extractor and Logger components in use. Infosystem implements internally both personal data logging and corresponding X-road service.

Additional information Documentation, full source code and binary packages are available on GitHub: https://github.com/e-gov/AJ/