Week 12 - Friday.  What did we talk about last time?  Modeling cybersecurity  Block cipher modes.

Slides:



Advertisements
Similar presentations
Data Protection & Privacy in the Information Age COMNET – Legal Frameworks for ICTs Malta 2013 Dr Antonio Ghio Dr Jeanine Rizzo.
Advertisements

DATA PROTECTION and Research University Research Ethics Committee – David Cauchi David Cauchi Office of the Commissioner for Data Protection.
NAU HIPAA Awareness Training
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
The Data Protection (Jersey) Law 2005.
4.01 Foundational knowledge of promotion
Silicon Valley Apps for Kids Meetup Laura D. Berger October 22, 2012 The views expressed herein are those of the speaker, and do not represent the views.
Data Protection.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
What does the Data Protection Act do? It sets standards which must be satisfied when obtaining, recording, holding, using, disclosing or disposing of.
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
Taking Steps to Protect Privacy A presentation to Hamilton-area Physiotherapy Managers by Bob Spence Communications Co-ordinator Office of the Ontario.
Data Protection Overview
The Data Protection Act
Data Protection for Church of Scotland Congregations
CENTRAL SCOTLAND POLICE Data Protection & Information Security Stuart Macfarlane Information Governance Unit Police Service of Scotland.
Lawyer at the Brussels Bar Lecturer at the University of Strasbourg Assistant at the University of Brussels Data Protection & Electronic Communications.
Service Organization Control (SOC) Reporting Options and Information
C4- Social, Legal, and Ethical Issues in the Digital Firm
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Elma Graham. To understand what data protection is To reflect on how data protection affects you To consider how you would safeguard the data of others.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Notes for Discussion on a Privacy Practice © Joe Cleetus.
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
Investigating Rights and Responsibilities at work
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Data Protection Corporate training Data Protection Act 1998 Replaces DPA 1994 EC directive 94/46/EC The Information Commissioner The courts.
PricewaterhouseCoopers 1 Administrative Simplification: Privacy Audioconference April 14, 2003 William R. Braithwaite, MD, PhD “Doctor HIPAA” HIPAA Today.
The right item, right place, right time. DLA Privacy Act Code of Fair Information Principles.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Data, Security and Human Subjects Research Deborah Barnard, MS.
IT Applications Theory Slideshows By Mark Kelly Vceit.com Privacy Laws.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
12/12/2015 Data Protection Act /12/2015 The DP Act A law that protects personal privacy and upholds individual’s rights Anyone who handles personal.
Ethical and Legal Issues Information Systems 337 Prof. Harry Plantinga.
Approved for Public Release. Distribution Unlimited. 1 Government Privacy Rick Newbold, JD, MBA, CIPP/G Futures Branch 28.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Chap 10: Privacy in Computing.  Privacy as an aspect of security  Authentication effects on privacy  Privacy and the Internet  Privacy implications.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Week 11 - Wednesday.  What did we talk about last time?  Cloud computing.
Data protection—training materials [Name and details of speaker]
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
Clark Holt Limited (Co. No ), Hardwick House, Prospect Place, Swindon, SN1 3LJ Authorised and regulated by the Solicitors Regulation.
Understanding Privacy An Overview of our Responsibilities.
TRANSBORDER DATA FLOWS INA MEIRING. THE PROTECTION OF PERSONAL INFORMATION ACT (“POPI”) > 'personal information' means information relating to an identifiable,
Data protection act. During the second half of the 20th century, businesses, organisations and the government began using computers to store information.
Understanding Privacy An Overview of our Responsibilities.
Data Protection GCSE ICT Mrs N Steventon-2005.
Issues of personal data protection in scientific research
IT Applications Theory Slideshows
Data Protection The Current Regime
General Data Protection Regulation
GDPR Overview Gydeline – October 2017
GDPR Overview Gydeline – October 2017
Data Protection & Freedom of Information- An Introduction
GENERAL DATA PROTECTION REGULATION (GDPR)
6 Principles of the GDPR and SQL Provision
New Data Protection Legislation
G.D.P.R General Data Protection Regulations
General Data Protection Regulation
Data Protection principles
The General Data Protection Regulation: Are You Ready?
Dr Elizabeth Lomas The General Data Protection Regulation (GDPR): Changing the data protection landscape Dr Elizabeth Lomas
Presentation transcript:

Week 12 - Friday

 What did we talk about last time?  Modeling cybersecurity  Block cipher modes

 The US and China are huge trading partners  But they don't trust each other  If you distrust someone, you might not tell them things, leading to further distrust  US Defense Secretary Chuck Hagel is taking the opposite approach:  He's telling China details of our cyber warfare doctrines  Their briefing included a summary of Pentagon cyber operations and activities but no classified information

 China hasn't said anything back  In fact, the NY Times reports that cyber attacks on the US from China have increased in the last few months  Former State Department official John Tkacik criticized the briefing as a product of "the most dangerous sort of naivete"  Follow the story here:  side-the-ring-hagel-releases-cyber-warfare-plans/

 Controlled disclosure  Right to control who knows your private data  Control is always diminished by sharing data with another party  Sensitive data  Not all data is equally sensitive  Different people in different circumstances may disagree about what should be protected  Affected subject  Both people and businesses have private data  Increasing privacy (an aspect of confidentiality) often decreases availability

 Everyone has different standards of what is and isn't sensitive  Don't forget that not everyone shares the same standards as you  Potentially private data:  Identity  Financial and banking details  Legal issues  Medical conditions, drug use, DNA  Voting and political activism  Religious and sexual preferences  Biometric data  Diaries, poems, and journals  Confidential discussions with lawyers, accountants, doctors, and clergy  School or employment performance  Reading, web browsing, music listening, television and movies  Travel data and past citizenship  Mail, , SMS, and phone communication  Actions and history from the past, "youthful indiscretions"  Illegal activities, criminal records

 Data collection  Computers make it possible to collect and store vast quantities of information  No informed consent  Much data is now collected by websites or phone companies without announcement  Visiting a single website can be logged by your computer, the ISP, and the website itself  Loss of control  Sharing information = lost control  With past forms of communication, there was more time to think and reflect about your message  It was easier to destroy the evidence, too  Data on the web (including Facebook) may never truly disappear  Ownership of the data  Facebook (and others) own the data you post on their sites  They make money from your data

 Rezgui et al. came up with 8 dimensions of privacy that relate specifically to computer use 1. Information collection ▪ Data is collected only with knowledge and consent 2. Information usage ▪ Data are used only for certain specified purposes 3. Information retention ▪ Data are retained only for a set period of time 4. Information disclosure ▪ Data are disclosed only to an authorized set of people 5. Information security ▪ Appropriate mechanisms are used to ensure the protection of the data 6. Access control ▪ All modes of access to all collected data are controlled 7. Monitoring ▪ Logs are maintained showing all accesses 8. Policy changes ▪ Less restrictive policies are never applied after the fact to preexisting data

 In 1973, a committee advising the U.S. Department of Human Services proposed a set of principles for fair information practice:  Collection limitation ▪ Only get data legally  Data quality ▪ Data should be relevant, correct, and complete  Purpose specification ▪ The purpose for the data should be identified and the data destroyed if no longer needed for that purpose  Use limitation ▪ Use for other purposes only with the consent of the subject (or by authority of law)  Security safeguards ▪ Procedures to protect the data should be in place  Openness ▪ How the data systems work should be publicly available knowledge  Individual participation ▪ The data subject should normally have a right to access and change his or her data  Accountability ▪ A data controller should be accountable for making sure these principles are met

 Realizing that large quantities of data storage would represent a threat, Ware and Turn suggest four ways to protect it:  Reduce exposure by limiting the data stored ▪ Use random samples instead of complete surveys  Reduce data sensitivity by interchanging data items or adding small errors  Anonymize the data by removing or modifying identifying data  Encrypt the data

 The 1974 Privacy Act is a broad law that covers all the data collected by the government  The law is based on the principles from two slides earlier  Laws for data collected by other organizations are for specific areas and not necessarily consistent  Fair Credit Reporting Act is for consumer credit  Health Insurance Portability and Accountability Act (HIPAA) is for healthcare information  Gramm-Leach-Bliley Act (GLBA) is for financial services  Children's Online Privacy Protection Act (COPPA) is for children's web access

 In 2000 the Federal Trade Commission (FTC) mandated that government websites would have to address five privacy issues  Notice ▪ Information policies must be disclosed before collecting data  Choice ▪ Consumers must be given a choice about whether and how their information can be used  Access ▪ Consumers should be able to view and contest their data  Security ▪ Reasonable steps should be taken to protect the data  Enforcement ▪ A mechanism for punishing noncompliance should be put in place

 The e-Government Act of 2002 requires federal government agencies to post privacy policies on their websites  The polices must disclose:  The information that is to be collected  The reason the information is being collected  The intended use by the agency of the information  The entities with whom the information will be shared  The opportunities for consent that would be provided to individuals regarding what information is collected and how that information is shared  The way in which the information will be secured  The rights of the individuals under the Privacy Act and other relevant laws

 These standards do not apply to commercial websites  Specific industries are covered by the Fair Credit Reporting Act, HIPAA, GLBA, and COPPA, but most websites are not  The FTC can prosecute companies for deceptive practices  Companies have to abide by their privacy policies  If a company does not list a privacy policy, they can do anything  If the privacy policy says they can sell your data to your worst enemy, they can

 CartManager  Wrote software to manage shopping carts  Collected data from users even on commercial websites which claimed not to  Since the use of CartManager code was transparent to the user, they broke the law  Jet Blue  Said it would not disclose passenger data to third parties  It gave credit card data to Torch Concepts which gave it to the Department of Defense  The DoD analyzed the data, looking for potential terrorists  Jet Blue violated its own policy, and the DoD avoided the government's own laws by collecting from a company instead of from individuals

 The European Union adopted the European Privacy Directive that requires that data about individuals be:  Processed fairly and lawfully  Collected for specified, explicit, and legitimate purposes  Adequate, relevant, and not excessive for the purposes they were collected  Accurate and as up to date as necessary  Kept in a form that permits identification of individuals for no longer than necessary

 The EU has three more principles for privacy:  Special protection for sensitive data ▪ Including race, ethnicity, political opinions, religious beliefs, and health or sexual life  Data transfer ▪ Authorized users of data cannot transfer it to others without permission of the subject  Independent oversight ▪ Entities that process data (including the government) should be subject to independent oversight  Since these principles apply to governments and businesses, they are stronger than US laws  This causes problems since the EU laws make it illegal to share data with companies or governments (like us) with weaker privacy laws

 One way to avoid giving up private data is to conduct as much business as possible anonymously  The Internet allows people to do a lot more anonymously  Some speculate that Amazon only survived because it created a private way to buy books about sex and porn  Trusted third parties are needed to carry out business anonymously

 We all have multiple identities  Different credit card numbers, login information at millions of different websites, numerous pieces of government ID  Some of this data (e.g. your name) can be used as a database key  Names are misspelled  Some people have common names (which can also be the same as terrorists)  Names can be changed  Linking identities together correctly creates privacy risks  Linking them together incorrectly causes other problems  Pseudonymity is using disposable identities (junk addresses, etc.)  Artificially creating multiple identities  Can protect some privacy

 The government collects a lot of data  Sometimes it collects it from private companies  It also plays an important role in authentication  Issuing passports and drivers' licenses  Risks from collecting data from outside sources:  Data errors  Inaccurate linking of identities  Difference of form and content  Purposely wrong data  False positives  Mission creep  Poorly protected integrity

 The same committee that listed the risks on the previous slide suggested the following ways that the government should safeguard data:  Data minimization – Get the least data needed  Data anonymization – Replace identifying information with untraceable codes  Audit trail – Record who accesses what  Security and controlled access – Protect the data  Training  Quality – Consider the reason a particular source collected the data, how it was stored, how old it is  Restricted usage – Review if proposed uses of the data are consistent with why the data was collected  Data left in place – Leave the data with the original owner if possible  Policy – Establish a clear policy  These recommendations have not (yet) been made law

 Authentication and privacy  Data mining  Privacy on the web  Tom Gorko presents

 Keep reading Chapter 10  Keep working on Project 3 Phase 1  Due next Thursday before midnight