IBM Global Services © 2003 IBM Corporation Privacy Technology and the Public Sector CACR Conference November 6, 2003 IBM Global Services.

Slides:



Advertisements
Similar presentations
Session No. 4 Implementing the State’s Safety Programme Implementing Service Providers SMS
Advertisements

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY.
Privacy By Design Sample Use Case
© 2007 IBM Corporation Enterprise Content Management Integrating Content, Process, and Connectivity for Competitive Advantage Malcolm Holden October 2007.
© 2007 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice HP TRIM HP Information Management.
Notes: Update as of 1/13/2010. Vulnerabilities are included for SQL Server 2000, SQL Server 2005, SQL Server Oracle (8i, 9i, 9iR2, 10g, 10gR2,11g),
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
PIPA PRESENTATION PERSONAL INFORMATION PROTECTION ACT.
Agency Risk Management and Internal Control Standards Presentation to the Board of Visitors November 14, 2014.
© 2003 IBM Corporation Preparing for Privacy Society of Internet Professionals January 19, 2004 Nigel Brown Senior Privacy.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Privacy Management for a Global Enterprise.
Security Controls – What Works
On Privacy-aware Information Lifecycle Management (ILM) in Enterprises: Setting the Context Marco Casassa Mont Hewlett-Packard.
© 2003 IBM Corporation Privacy 12 th CACR Workshop Yim Y. Chan Chief Privacy Officer & CIO IBM Canada Ltd. w3.ibm.com/Privacy.
Information Resources and Communications University of California, Office of the President UCTrust Implementation Experiences David Walker, UCOP Albert.
McGraw-Hill/Irwin Copyright © 2008, The McGraw-Hill Companies, Inc. All rights reserved.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
FI-WARE – Future Internet Core Platform FI-WARE Security July 2011 High-level Description.
1 July 23, 2002 Strategic Technology Plan Briefing to LOT Committee.
Geneva, Switzerland, 14 November 2014 Data Protection for Public Cloud (International Standard ISO 27018) Stéphane Guilloteau Engineer Expert, Orange Labs.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Hippocratic Databases Paper by Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, Yirong Xu CS 681 Presented by Xi Hua March 1st,Spring05.
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
Chapter 7 Database Auditing Models
Privacy By Design Sample Use Case Privacy Controls Insurance Application- Vehicle Data.
July 25, 2005 PEP Workshop, UM A Single Sign-On Identity Management System Without a Trusted Third Party Brian Richardson and Jim Greer ARIES Lab.
What is Business Analysis Planning & Monitoring?
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
© 2012 IBM Corporation Symposium on Digital Curation 0 The Future Workforce Steven Miller IBM.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
HIPAA COMPLIANCE WITH DELL
WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Identity and Privacy: the.
Demonstration of the Software Prototypes PRIME PROJECT 17 December 2004.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Federated or Not: Secure Identity Management Janemarie Duh Identity Management Systems Architect Chair, Security Working Group ITS, Lafayette College.
Session ID: Session Classification: Dr. Michael Willett OASIS and WillettWorks DSP-R35A General Interest OASIS Privacy Management Reference Model (PMRM)
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
Overview Privacy Management Reference Model and Methodology (PMRM) John Sabo Co-Chair, PMRM TC.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
Location, Location, Location: The Emerging Crisis in Wireless Data Privacy Ari Schwartz & Alan Davidson Center for Democracy and Technology
FEA DRM Management Strategy Presented by : Mary McCaffery, US EPA.
Policies for Information Sharing April 10, 2006 Mark Frisse, MD, MBA, MSc Marcy Wilder, JD Janlori Goldman, JD Joseph Heyman, MD.
G:\99Q3\9220\PD\AJD2.PPT 1 Harriet P. Pearson Chief Privacy Officer IBM February 7, 2003 IBM.
Twelve Guiding Principles for the Regulation of Surveillance Camera Systems Presented by: Alastair Thomas Date: 23 rd October 2013.
Malcolm Crompton APEC Information Privacy Framework: review, impact, & progress APEC Symposium on Information Privacy Protection in E Government & E Commerce.
Approved for Public Release. Distribution Unlimited. 1 Government Privacy Rick Newbold, JD, MBA, CIPP/G Futures Branch 28.
1 Designing a Privacy Management System International Security Trust & Privacy Alliance.
Technical Support to SOA Governance E-Government Conference May 1-2, 2008 John Salasin, Ph.D. DARPA
1 Copyright © International Security, Trust & Privacy Alliance -All Rights Reserved Making Privacy Operational International Security, Trust.
Fred Carter Senior Policy & Technology Advisor Information and Privacy Commissioner Ontario, Canada MISA Ontario Cloud Computing Transformation Workshop.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
John Weigelt, MEng, PEng, CISSP, CISM National Technology Officer Microsoft Canada November 2005 Fighting Fraud Through Data Governance.
PMRM Revision Discussion Slides Illustrations/Figures 1-3 o Model, Methodology, “Scope” options Functions, Mechanisms and “Solutions” Accountability and.
NMI-EDIT and Rice University Federated Identity Management: Managing Access to Resources in Texas Barry Ribbeck Director System Architecture and Infrastructure.
IS3220 Information Technology Infrastructure Security
Data protection—training materials [Name and details of speaker]
Accountability & Structured Privacy Management
Microsoft 365 Get help with regulatory compliance
Deployment Planning Services
Transforming IT Management
Bob Siegel President Privacy Ref, Inc.
Dashboard eHealth services: actual mockup
What is Interesting in the CCSP certification?
The General Data Protection Regulation: Are You Ready?
Computer Science and Engineering
On Parametric Obligation Policies: Enabling Privacy-aware Information Lifecycle Management in Enterprises IEEE Policy Workshop 2007 Marco Casassa Mont.
Presentation transcript:

IBM Global Services © 2003 IBM Corporation Privacy Technology and the Public Sector CACR Conference November 6, 2003 IBM Global Services

CACR © 2003 IBM Corporation 52% 20% 13% 11% Public Sector Privacy Issues - Architecture and Technology Drivers  Reactive vs. Proactive  PIA’s well established and useful but essentially a reactive tool  Privacy architecture helps move to a proactive stance  Governed by Public Legislation but held to highest standard  Expectation that PIPEDA is a minimum  Arguably must also offer the privacy functionality of the private sector  Contention between e-government initiatives and privacy  Provide convenience and efficiency without sharing or consolidating data  The Public expects both – but limited concept of choice and individual customization in existing services (act by legislative authority vs. consent)  Privacy architecture can provide guidance/solutions  Privacy technology can help manage the complexity and reduce risk

IBM Global Services CACR © 2003 IBM Corporation Transaction Service Enterprise+ OTR Customized Personalized Increased growth & profitability Trust, compliance & assurance challenge Trust  Increased Emphasis on Consent  Increased secondary use of data means increased focus on purpose and consent  Individual Comfort Levels  Privacy is individual, dynamic, context sensitive and culturally influenced  Implications for Enterprise Processes and IT Infrastructure  Superior data management, data ownership, educated employees  Universal opt-in/out, Individual access and update of data  Mistakes can Damage or Destroy Brand  The more sensitive the data, the higher the potential damage to the individual  Mistake by a business partner still affects your brand Business Strategy can change the Privacy Dynamic

IBM Global Services CACR © 2003 IBM Corporation DataObjects Technical Architecture Rules Strategy Controls Practices IBM Copyright EPA Components  Management Infrastructure:  Strategy: embedding business rules/best practices into policy  Controls: supporting and ensuring general policy compliance  Practices: privacy specific enterprise enablers  Business Activities:  Business process analysis (PIA) and optimization  Mapping key players, rules and data  Embedding policy into process and applications  Minimizing risk, leveraging opportunities  Supporting Technology:  Identifying where technology is appropriate  Providing the parameters for technical implementations

IBM Global Services CACR © 2003 IBM Corporation EPA - Management Infrastructure

IBM Global Services CACR © 2003 IBM Corporation Management Infrastructure - mapping to PIPEDA

IBM Global Services CACR © 2003 IBM Corporation 3. De-Identified use Subject or Guardian or Authority 4. Anonymized use give consent update access withdraw consent anonymiz e release 2. Personalized use disclos e utiliz e delete de-identify re-identify form = data + rules Law, regulations, privacy agreements, preferences, consent Data Subject notify Rule s authorizatio n, obligation request... 1a. Collection 1b. Control Data User The Process Model Optimizes PI Handling Processes for Privacy DataObjectsRules Process Model  Process Mapping:  Data Collection, Storage  Data Types  Uses, Disclosures, Retention  Risk Analysis:  Threats  Vulnerabilities  Adherence to Policy  Optimization and Risk Mitigation:  Data Transformation Opportunities  Limiting collection, use, disclosure  Security controls  Contractual, Audit measures  Sticky Policy Paradigm  Data Classification  Data Transformation  Dynamic Rules, Obligations  Privacy Relevant Actions

IBM Global Services CACR © 2003 IBM Corporation PIA Tool Reports

IBM Global Services CACR © 2003 IBM Corporation Passive vs. Active Privacy Technology  Passive Privacy Technology  Design and implementation decisions that support privacy objectives  Examples:  User Interface Design  PII storage and transmission decisions  EPA Technical Architecture:  Design and Implementation Guidance  ==>Design Privacy "in" Now  Active Privacy Technology  Specialized components or functions that dynamically react to ensure transactions are compliant with privacy policy  Examples:  Privacy policy display and interpretation (ex: P3P)  Audit tools such as privacy-tuned web scanners (ex: Watchfire)  Privacy enhanced access control (ex: Tivoli Privacy Manager)  EPA Technical Architecture:  Component Model for Active Privacy  ==> Prepare for Privacy Enhancing Technology Now

IBM Global Services CACR © 2003 IBM Corporation Passive Privacy Design and Implementation Guidance  EPA Technical Architecture Provides Guidance on:  Application Design  User Interface Design  Database Design  Logging, Retention and Audit  Authentication, Authorization and Identity Management  Classification Schemes  Architectural Concepts  Specific technology issues, ex: Biometrics, Smartcards  Value  Can be built into IT development cycle checkpoints  Can be built into IT procurement/acquisition criteria  Can be used in audit procedures

IBM Global Services CACR © 2003 IBM Corporation Active Privacy Requirements  Privacy rules for data access:  Purpose  Consent  Obligations  "Sticky Policy Paradigm" - policy sticks to data not resources  Communication, Interpretation, Negotiation of Privacy Policy  Personal access to information and tracking use, disclosure etc.  Real-time transformation of data to less identified forms  Managing fulfillment of obligations  Pseudonymous and anonymous interactions  Anonymous assertions

IBM Global Services CACR © 2003 IBM Corporation IBM Enterprise Privacy Architecture (EPA) These components interact with users to present policies, gain consent, accept requests etc. These components map identity, facilitate pseudonymous interaction and use of assertions etc. These components enforce privacy policy for PI access, check consent and transform PI. These components manage policy, audit logs and obligations These support tools indirectly support the active privacy components

IBM Global Services CACR © 2003 IBM Corporation Transformed Data PPNS:Policy Presentation/ Negotiation Service UPCM: User Privacy Contact Manager UPAM : User Privacy Action Manager Access/update to stored PII Data Subject PTE: Privacy Data Trans- formation Engine Data Users Results Request/Prove Assertion Register/ Issue Assertion Present/ negotiate policy POES: Privacy Obligation Event Service Generate obligation event Log privacy decisions PII Submit and Access Requests Get policy Obligation event notification Policy EPD Consent EPD PPM : Privacy Policy Manager Log EPD PAAM : Privacy Action Audit Manager Notice or consent request Replicate policies + deploymen t + consent Other Enterprises Vulnerability Checker Log privacy actions PII Discovery Log Analyzer Policy Editor Request Consent, Post Notice Legacy Data EPD Web Data EPD PERM : Privacy Enabling Resource Manager Store Identifier s Get PII ask for additonal data Enterprise Applications generalized request information data decision Deployment Engine Policy EPD Consent EPD PDM: Privacy Decision Manager Request/Prove Assertion Mappings EPD Credential EPD PAE: Privacy-Enabled Authentication AAE: Attribute Exchange Engine PECS: Privacy Enabled Credential Service Exchange PII Attributes Support Tools Sub-System User Interaction Sub-System Directory and Security Sub- System Privacy Services Sub-System Privacy Data Handling Sub-System Purpose Specification Security Safeguards IP : Identity Protection Collection Limitation Openness Access Data Quality Use Limitation Accountability Consent Disclosure Limitation Compliance Retention Limitation Relationship to Privacy Principles

IBM Global Services CACR © 2003 IBM Corporation Transformed Data PPNS:Policy Presentation/ Negotiation Service UPCM: User Privacy Contact Manager UPAM : User Privacy Action Manager Access/update to stored PII Data Subject PTE: Privacy Data Trans- formation Engine Data Users Result s Request/Prove Assertion Register/ Issue Assertion Present/ negotiate policy POES: Privacy Obligation Event Service Generate obligation event Log privacy decisions PII Submit and Access Requests Get policy Obligation event notification Policy EPD Consent EPD PPM : Privacy Policy Manager Log EPD PAAM : Privacy Action Audit Manager Notice or consent request Replicate policies + deploymen t + consent Other Enterprises Vulnerability Checker Log privacy actions PII Discovery Log Analyzer Policy Editor Request Consent, Post Notice Legacy Data EPD Web Data EPD PERM : Privacy Enabling Resource Manager Store Identifier s Get PII ask for additonal data Enterprise Applications generalized request information data decision Deployment Engine Policy EPD Consent EPD PDM: Privacy Decision Manager Request/Prove Assertion Mappings EPD Credential EPD PAE: Privacy-Enabled Authentication AAE: Attribute Exchange Engine PECS: Privacy Enabled Credential Service Exchange PII Attributes Support Tools Sub-System User Interaction Sub-System Directory and Security Sub- System Privacy Services Sub-System Privacy Data Handling Sub-System Tivoli Privacy Manager Policy Wizard Monitor Tivoli Privacy Manager Publish P3P Policy IP : Identity Protection Relationship to Tivoli Privacy Manager

IBM Global Services CACR © 2003 IBM Corporation  Description  A review of an enterprise's website privacy management practices to create trust among website users to ensure that appropriate privacy and security measures are taken and are visible to the user  Use of best-of-breed automated platform to test for privacy compliance  Deliverable  A comprehensive, web-based report identifying: Website Privacy Compliance

IBM Global Services CACR © 2003 IBM Corporation 20% 13% 11%.... please Questions???