Copyright JNT Association 2009NorduNET, 18 th September 20091 Protecting Privacy in Global Networks Andrew Cormack Chief Regulatory Adviser, JANET(UK)

Slides:



Advertisements
Similar presentations
Directorate of Learning Resources Accessing electronic journals from off-campus This causes lots of headaches, but dont despair, heres how to do it! If.
Advertisements

Accessing electronic journals from off- campus This causes lots of headaches, but dont despair, heres how to do it! (Please note – this presentation is.
To get to the moodle site the first thing you want to do is to go to the Great falls Public Schools Web site. Once you arrive here, you will want to click.
Copyright JNT Association JANET Briefing, 20 th Jan, Digital Economy Act 2010 Andrew Cormack Chief Regulatory Adviser, JANET(UK)
INTERNET SAFETY Maureen Baron, M.A. English Montreal School Board.
This section of UPLift! is aimed at all students. It focuses on the core skills required to make effective use of the specialist databases provided by.
1 Privacy Prof. Ravi Sandhu Executive Director and Endowed Chair March 8, © Ravi Sandhu World-Leading Research.
Copyrights and Internet Piracy: SOPA and PIPA Essential Questions… What are SOPA and PIPA? Should people make money off of their creativity? How damaging.
Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
Copyright JNT Association Federated Identity and Data Protection Law Andrew Cormack, Eva Kassenaar, Mikael Linden, Walter Martin Tveter.
Privacy No matter how exemplary your life is, there are things you want to keep to yourself © 2004, Lawrence Snyder.
FDIC Money Smart for Young Adults
Identity Federation: Some Challenges and Thoughts OGF 19 Jan 30, 2007 Von Welch
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Internet Privacy Jillian Brinberg, Maggie Kowalski, Sylvia Han, Isabel Smith-Bernstein, Jillian Brinberg.
C MU U sable P rivacy and S ecurity Laboratory 1 Privacy Policy, Law and Technology Identity October 9, 2008.
Proposal For A network system Fast Eddy's Appliance Smarti Handi Team.
DATABASES FROM HCT LIBRARIES. HCT has many online databases for students to use to find information. A database is a collection of information organized.
E-Safety Quiz Keeping safe online! A guide for parents & children.
Security Warnings TROPE: Teachers’ Resources for Online Privacy Education 1.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Intellectual Property
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
The Information Commissioner’s Office David Evans.
James Bear. * Information * Assignments? * Entertainment? * Create Rapport? * More?
 Much of the information needed by an organisation comes from within the organisation, and the organisation’s IT systems can be used to extract this.
Web Site Security Andrew Cormack JANET-CERT ©The JNT Association, 1999.
Intellectual Property Level 7. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned.
 Most people would say yes, while others disagree. If downloading from the internet is a quick and easy way to do things, why not?  Everybody likes.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor 1 Identity and biometrics.
Copyright JNT Association TNC2010, 1 st June Attribute Harmonisation: Is it Possible? Andrew Cormack Chief Regulatory Adviser, JANET(UK)
Unit 1 – Improving Productivity Instructions ~ 100 words per box.
By William Cook.  How the internet works  How companies pay their bills  How to privately browse the internet.
Tools  Subject- a title to your to give an idea what the will be about before the receiver opens it.  Attachment- a file or document.
Monitoring Employees on Networks: Unethical or Good Business?
Protecting Your Kids! Presented by: Glen Becker. Privacy for kids Common Excuses My kids have rights! I can not spy on them! Chat rooms are fine, why.
Collecting Data Types, coding, accuracy, file formats and the effect of data loss.
Identity Crisis: Global Challenges of Identity Protection in a Networked World Alison Knight.
To create an Endnote Online account Step 1 : From Library home page, click on Databases tab.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
TERENA Networking Conference 2005©The JNT Association, 2005 Network Performance Measurement: Privacy and Legal Issues Andrew Cormack, UKERNA
What’s in the box? Getting to know your research resources Robin Harris LIS 740 Social Sciences/Information Literacy 11/11/14.
Information Security General Awareness Training Module 1 – Introduction For The UF HSC Workforce.
FOOD BANK APPEAL. Food Bank Facts  Started in 2004  Help the poorest people with giving them food.  There are many food banks in Scotland, but NOT.
Healthy Living Learning Outcomes By hayden broderick.
Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away.
Copyright JNT Association 2009GN3, 8 th September Inter-Federation Agreements eduGAIN and beyond? Andrew Cormack Chief Regulatory Adviser, JANET(UK)
Julie Latham Digital Citizenship: An Informational Guide.
Strawman operating environment proposal Presented to P2600 Meeting #16, Las Vegas NV January 16-17, 2006 Brian Smithson.
Society & Computers PowerPoint
Family Connection Collaborative Webs A Tool for Creating and Managing Web sites.
Research Finding good information. How do you search for information? Internet Wikipedia Print resources (books, magazines, encyclopedias, etc.) Databases.
TERENA Networking Conference, 2003©The JNT Association, 2003 Designing Manageable Protocols Andrew Cormack Chief Security Adviser UKERNA.
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
Online Banking. Learning Objectives To learn how society has been affected by online banking.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Opening up a Checking Account Eliseo Lugo III. 2 To choose the one that’s right for you when the time comes To take the right steps to open a bank account.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Ideal in addition to fast VPN Service Provider using Secure VPN Access.
A Complete Guide to Registering for an ICN Course.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Netiquette internet manners, online etiquette, and digital etiquette The social code of network communication The social and moral code of the internet.
Bank On It FDIC Money Smart for Young Adults Building: Knowledge, Security, Confidence.
Is The Internet Goood OR Badd By Brier, Natasha and Misty.
Chief Regulatory Adviser, JANET(UK)
Attribute Harmonisation
Notifiable data breaches Roundtable
Overview of Zero-Knowledge Systems Inc
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Presentation transcript:

Copyright JNT Association 2009NorduNET, 18 th September Protecting Privacy in Global Networks Andrew Cormack Chief Regulatory Adviser, JANET(UK)

Copyright JNT Association 2009NorduNET, 18 th September Privacy or Secrecy “On the Internet no one knows you’re a dog” – Right? Secrecy = no use of information Privacy = person-controlled use of information But sometimes we want people to know stuff

Copyright JNT Association 2009NorduNET, 18 th September Controlled disclosure “Animal” “Dog” – so I get the right food in a bar – attribute “Same dog” – so I get into the apartment – recognition “Fido” – so I get fed at home – identification

Copyright JNT Association 2009NorduNET, 18 th September ? What is Privacy, anyway?

Copyright JNT Association 2009NorduNET, 18 th September ?

Copyright JNT Association 2009NorduNET, 18 th September Real-world privacy leaks! “Dog” + “Alsatian”

Copyright JNT Association 2009NorduNET, 18 th September Real-world privacy leaks! “Can pay” + Name + Affiliation

Copyright JNT Association 2009NorduNET, 18 th September Real-world privacy leaks! “Can drive” + Name + Date of Birth + Where born + Where living + Signature = Theft kit = Identity theft kit

Copyright JNT Association 2009NorduNET, 18 th September On-line: can do better Give me access Save stuff for my next visit Find me in other systems Bill me? Punish me? js56 cfa1 2e0b

Copyright JNT Association 2009NorduNET, 18 th September How to use privacy tools? Real world experience is a poor guide –Don’t import “leak and label” Law may say how to use technology –“how fast can I drive in Denmark?” –“which side of the road?”

Copyright JNT Association 2009NorduNET, 18 th September Lots of Privacy Law, but... Is amount of tax paid private data? YES!NO!

Copyright JNT Association 2009NorduNET, 18 th September YES!NO! Lots of Privacy Law, but... Is a web server log private data?

Copyright JNT Association 2009NorduNET, 18 th September Lots of Privacy Law, but... Who owns your private data? ME!YOU!

Copyright JNT Association 2009NorduNET, 18 th September Doing Privacy Right Privacy = “subject-controlled use” So, from that definition –Don’t cause of loss of control Either deliberately or accidentally Data/use minimisation => risk minimisation –Tell subject what you will do What uses they control and what they don’t –Build privacy into systems Identification as last (exceptional) resort

Copyright JNT Association 2009NorduNET, 18 th September Separation of Roles Separating identification is good Maybe separate credential issue too? –First get a (generic) on-line credential –Then use it to enrol with a particular service –As in PGP, sort of Result: SSO with better privacy –No “central database” of attributes or links –Services choose own enrolment standard Up to limit set by credential issue/use

Copyright JNT Association 2009NorduNET, 18 th September