1 Privacy by Design: Don’t Make Privacy An Afterthought – Build It In Convergence Expo 2005 Calgary, Alberta May 17, 2005 Ann Cavoukian, Ph.D. Information.

Slides:



Advertisements
Similar presentations
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY.
Advertisements

National Security in a Post-9/11 World: The Rise of Surveillance, … the Demise of Privacy? Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario.
PIPA PRESENTATION PERSONAL INFORMATION PROTECTION ACT.
Protecting Personal Information Guidance for Business.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Red Flags Rule & Municipal Utilities
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
1 PRIVACY ISSUES IN THE U.S. – CANADA CROSS BORDER BUSINESS CONTEXT Presented by: Anneli LeGault ACC Greater New York Chapter Compliance Seminar May 19,
© Chery F. Kendrick & Kendrick Technical Services.
The Privacy Imperative: Go Beyond Compliance to Competitive Advantage Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario Bell.
Harvard Privacy Lecture June 3, 2005 Ann Cavoukian, Ph.D. Information and Privacy Commissioner/Ontario The Economics of Privacy: Go Beyond Compliance to.
1 Ann Cavoukian, Ph.D. Information and Privacy Commissioner/Ontario Go Beyond Compliance to Competitive Advantage: Good Privacy is Good Business DaimlerChrysler.
Seamless Customer Experience: What Will It Take? Offering Security and Privacy Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario The Access.
Information and Privacy Commissioner/Ontario, © 2005 Go Beyond Compliance to Competitive Advantage Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario.
How Privacy Could Affect the Future Roll-Out of RFIDs: Take Note Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario Symposium.
Preserving Privacy in a Security-Centric World Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario Canadian Information Processing.
Privacy in Ontario Brian Beamish Office of the Information and Privacy Commissioner/Ontario Presentation to Security Canada Central 2002 International.
Biometrics & the Privacy Paradigm: Separating Fact from Fiction Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario Security.
The role of the Office of the Privacy Commissioner in telecommunications Andrew Solomon Director, Policy.
Lecture to Carleton University, Center for European Studies, December 1, 2010.
Personal Data Privacy and The Internet by Stephen Lau Privacy Commissioner for Personal Data, Hong Kong SAR at the Joint Conference of the OECD, HCOPIL,
Taking Steps to Protect Privacy A presentation to Hamilton-area Physiotherapy Managers by Bob Spence Communications Co-ordinator Office of the Ontario.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
By: Dr. Mohammed Alojail College of Computer Sciences & Information Technology 1.
Exposing the Myths, Exploring the Solutions Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario Privacy & Security: Seeking the.
2015 ANNUAL TRAINING By: Denise Goff
6th CACR Information Security Workshop 1st Annual Privacy and Security Workshop (November 10, 2000) Incorporating Privacy into the Security Domain: Issues.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
HROFFICE USER CONFERENCE 2005 Creating an Effective Ethics and Compliance Program Ascentis User Group September, 2005.
CAPPS II: A Case Study of Homeland Security Computer Applications Marcia Hofmann Staff Counsel Electronic Privacy Information Center Computer Freedom &
Privacy by Design: Building Trust into Technology Ann Cavoukian, Ph.D. Information and Privacy Commissioner/Ontario 1 st Annual Privacy & Security Conference.
Privacy: Do We Need It? Mike Gurski Senior Policy & Technology Advisor Information & Privacy Commission, Ontario Canada JetNet September 25, 2001 Ottawa.
The ChoicePoint Attack – Case Study
The Privacy Imperative: Go Beyond Compliance to Competitive Advantage Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario Cambridge.
The Privacy Payoff: Build Your Business By Building Customer Trust Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario Coast.
The Privacy Imperative: Go Beyond Compliance to Competitive Advantage Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario Transcend.
An Investigation into E-Commerce Frauds and their Security Implications By Kevin Boardman Supervisor: John Ebden 29 July 2004.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Getting to the Truth about Privacy & Security Ann Cavoukian Ph.D. Information and Privacy Commissioner/Ontario Privacy & Security: Totally Committed November.
Managing Risks Associated With Privacy Alison Baker- Senior Associate Hall & Wilcox 24 November
Exposing the Myths, Exploring the Solutions Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario Privacy & Security: Seeking the.
Initial reflections of the privacy commissioner on Ontario’s draft privacy bill Ann Cavoukian, Ph.D. Information and Privacy Commissioner/Ontario Toronto.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
The Privacy Imperative: Go Beyond Compliance to Competitive Advantage Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario IABC.
PIPEDA and Receivables Management Robin Gould-Soil Receivables Management Association of Canada November 16, 2011.
Privacy and Free Speech: It's Good for Business Nicole A. Ozer, Esq. Technology and Civil Liberties Policy Director ACLU of Northern California Online.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
Go Beyond Compliance to Competitive Advantage: Make Privacy Pay Off Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario IFB Toronto.
Privacy & Confidentiality in Internet Research Jeffrey M. Cohen, Ph.D. Associate Dean, Responsible Conduct of Research Weill Medical College of Cornell.
Privacy Advisory Services … … A Best Practices, Integrated Approach Insert Firm Name Here.
Fred Carter Senior Policy & Technology Advisor Information and Privacy Commissioner Ontario, Canada MISA Ontario Cloud Computing Transformation Workshop.
Organizing a Privacy Program: Administrative Infrastructure and Reporting Relationships Presented by: Samuel P. Jenkins, Director Defense Privacy Office.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
1 Privacy Lessons from Other Industries Chris Zoladz, CIPP, Vice President, Information Protection Marriott International, President, International Association.
Privacy Information for Advisors. Agenda PIPEDA Advisor Required Privacy Program Our MGA Privacy Program Recommendations for Advisors.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
WHAT IS IDENTITY THEFT?  Identity thieves take your personal information and use it to harm you in various ways, including these:  User names, passwords,
Information Security and Privacy in HRIS
Privacy principles Individual written policies
Privacy principles Individual written policies
GDPR Overview Gydeline – October 2017
GDPR Overview Gydeline – October 2017
PRIVACY PRESENTATION TO THE SPRING 2013 CONFERENCE BY HANK MOORLAG
Managing Privacy Risk in Your Commercial Practices
Presentation transcript:

1 Privacy by Design: Don’t Make Privacy An Afterthought – Build It In Convergence Expo 2005 Calgary, Alberta May 17, 2005 Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario

2 Impetus for Change Growth of Privacy as a Global Issue (EU Directive on Data Protection) Exponential growth of personal data collected, transmitted and exploited Convergence of growth in bandwidth, sensors, data storage and computing power Consumer Backlash; heightened consumer expectations

3 And then came 9/11 U.S. Patriot Act and series of anti- terrorism laws introduced; Served to expand powers of surveillance on the part of the state, and reduce judicial oversight

4 The Aftermath It’s business as usual: –Clear distinction between public safety and business issues – make no mistake: business expectations remain high –NO reduction in consumer expectations –Increased value of trusted relationships

5 Consumer Attitudes Business is not a beneficiary of the post- 9/11 “Trust Mood” Increased trust in government has not been paralleled by increased trust in business handling of personal information Privacy On and Off the Internet: What Consumers Want Harris Interactive, November 2001 Dr. Alan Westin

6 Importance of Consumer Trust In the post-9/11 world: –Consumers either as concerned or more concerned about online privacy –Concerns focused on the business use of personal information, not new government surveillance powers If consumers have confidence in a company’s privacy practices, consumers are more likely to: –Increase volume of business with company……....91% –Increase frequency of business……………….…...90% –Stop doing business with company if PI misused…83% Harris/Westin Poll, Nov & Feb. 2002

7 Information Privacy Defined Information Privacy: Data Protection –Freedom of choice; control; informational self-determination –Personal control over the collection, use and disclosure of any recorded information about an identifiable individual

8 What Privacy is Not Security  Privacy

9 Authentication Data Integrity Confidentiality Non-repudiation Privacy; Data Protection Fair Information Practices Privacy and Security: The Difference Security: Organizational control of information through information systems

10 Change the Paradigm Old Paradigm: Zero Sum Game New Paradigm: STEPs (Security Technologies Enabling Privacy) Expand the discourse: Privacy and Security are not polar opposites — both are essential

11 Fair Information Practices: A Brief History OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data EU Directive on Data Protection CSA Model Code for the Protection of Personal Information Canada Personal Information Protection and Electronic Documents Act (PIPEDA)

12 Summary of Fair Information Practices Accountability Identifying Purposes Consent Limiting Collection Limiting Use, Disclosure, Retention Accuracy Safeguards Openness Individual Access Challenging Compliance

13 The Ten Commandments 1.Accountability for personal information designate an individual(s) accountable for compliance 2.Identifying Purposes purpose of collection must be clear at or before time of collection 3.Consent individual has to give consent to collection, use, disclosure of personal information

14 The Ten Commandments 4.Limiting Collection collect only information required for the identified purpose; information shall be collected by fair and lawful means 5.Limiting Use, Disclosure, Retention consent of individual required for all other purposes 6.Accuracy keep information as accurate and up-to-date as necessary for identified purpose 7.Safeguards protection and security required, appropriate to the sensitivity of the information

15 The Ten Commandments 8.Openness policies and other information about the management of personal information should be readily available 9.Individual Access upon request, an individual shall be informed of the existence, use and disclosure of his or her personal information and be given access to that information, be able to challenge its accuracy and completeness and have it amended as appropriate 10.Challenging Compliance ability to challenge all practices in accord with the above principles to the accountable body in the organization

16 Extension of PIPEDA As of January 1, 2004, the Personal Information Protection and Electronic Documents Act has extended to:  all personal information collected, used or disclosed in the course of commercial activities by provincially regulated organizations  unless a substantially similar provincial privacy law is in force

17 Provincial Private-Sector Privacy Laws Québec: Act respecting the protection of personal information in the private sector B.C.: Personal Information Protection Act Alberta: Personal Information Protection Act Ontario: Personal Health Information Protection Act

18 The Bottom Line Privacy should be viewed as a business issue, not a compliance issue

19 The Promise  Electronic Commerce projected to reach $220 billion by 2001 — WTO, 1998  Electronic Commerce projected to reach $133 billion by 2004 — Wharton Forum on E-Commerce, 1999 Estimates revised downward to reflect lower expectations

20 The Reality United States: e-commerce sales were only 1.9% of total sales -- $69.2 billion in U.S. Dept. of Commerce Census Bureau, February 2005 Canada: Online sales were 0.8% of total revenues -- $28.3 billion in Statistics Canada, April 2005

21 Clicks vs. Bricks “e-tailers are not even coming close to replacing traditional stores, as some suggested they would a few years ago amid all the dot-com hype.” — Bob Keefe, The Arizona Republic, January 3, 2005

22 Lack of Privacy = Lack of Sales “Consumer privacy apprehensions continue to plague the Web. These fears will hold back roughly $15 billion in e-commerce revenue.” — Forrester Research, September 2001 “Privacy and security concerns could cost online sellers almost $25 billion by 2006.” — Jupiter Research, May 2002

23 The Business Case “Our research shows that 80% of our customers would walk away if we mishandled their personal information.” — CPO, Royal Bank of Canada, 2003 Nearly 90% of online consumers want the right to control how their personal information is used after it is collected.

24 ISF Highlights Damage Done by Privacy Breaches The Information Security Forum reported that a company’s privacy breaches can cause major damage to brand and reputation: –25% of companies surveyed experienced some adverse publicity due to privacy –1 in 10 had experienced civil litigation, lost business or broken contracts –Robust privacy policies and staff training were viewed as keys to avoiding privacy problems - The Information Security Forum, July 7, 2004

25 It’s All About Trust “Trust is more important than ever online … Price does not rule the Web … Trust does.” — Frederick F. Reichheld, Loyalty Rules: How Today’s Leaders Build Lasting Relationships

26 Distrust and Profitability Distrust can have a potentially devastating impact on profitability 45% of respondents said there is at least one retail business that they trusted at one time, but no longer trust 94% said they spent less money with that company, resulting in an average 87% decrease in spending by that group — Yankelovich Study, June 2004

27 The High Road “When customers DO trust an online vendor, they are much more likely to share personal information. This information then enables the company to form a more intimate relationship with its customers.” — Frederick F. Reichheld, Loyalty Rules: How Today’s Leaders Build Lasting Relationships

28 Lack of Trust on the Web “In 70% of instances where Internet users were asked to provide information in order to access an online informational resource, those users did not pursue the resource because they thought their privacy would be compromised.” — Narrowline Study, 1997

29 Falsifying Information on the Web “42.1% have falsified information at one time or another when asked to register at a Web site.” — 10 th WWW User Survey, October 1998

30 Trust and Privacy Policies “Fully 50% of online users said they would leave a Web site if they were unhappy with a company’s privacy policy.” — Customer Respect Group Survey, February 2004

31 Identity Theft The fastest growing form of consumer fraud in North America Identity theft is the most frequently cited complaint received by the F.T.C 10 million victims of ID theft each year, costing businesses $50 billion, and $5 billion in out-of- pocket expenses from individuals. — Federal Trade Commission, 2003

32 ChoicePoint A data aggregation and clearinghouse company that maintains databases of background information on virtually every U.S. citizen 19 billion public records in its database: motor vehicle registrations, license and deed transfers, military records, names, addresses and Social Security numbers ChoicePoint routinely sells dossiers to police, lawyers, reporters and private investigators

33 ChoicePoint: Gateway for Identity Thieves In a plot twist taken from a Hollywood movie, criminals were creating false identities to establish accounts with ChoicePoint and then using those accounts to commit identity theft In response, ChoicePoint: –Notified 35,000 Californians as required by California law, SB1386 –Will notify an additional 145,000 persons that “unauthorized third parties” had obtained their personal information Los Angeles police believe that the actual number of persons affected could be 500,000 or more

34 ChoicePoint: Fallout and Cost Since February 2005, ChoicePoint’s stock value has fallen from $48 to $38 ChoicePoint will pay to re-screen, and re-credential, 17,000 customers to verify that they are legitimate businesses Suspension of contract with New York State — other states pending March 2005, suspension of sales to small businesses — loss of 5% of annual revenue or, $900 million Three separate lawsuits have been filed: –Victim of I.D. theft –Class action by individuals –Class action by shareholders

35 Recent Outbreak of Major Privacy Breaches November 2004 ChoicePoint — Identity theft involving 145,000 persons December 2004 Bank of America — 1.2 million records misplaced January 2005 T-Mobile — Illegal access to 16.3 million records HSBC — 180,000 MasterCard records stolen February 2005 Ameritrade — 200,000 customer files lost March 2005 LexisNexis — Identity theft involving 32,000 records DSW Inc — Hacker theft of 103 credit card numbers Boston College — Theft of 120,000 alumni donor records April 2005 TimeWarner — Lost files on 600,000 current and former employees

36 Technology Can Help “The most effective means to counter technology’s erosion of privacy is technology itself.” — Alan Greenspan, Federal Reserve Chairman “A technology should reveal no more information than is necessary…it should be built to be the least revealing system possible.” — Dr. Lawrence Lessig, Harvard, September, 1999

37 Threats to Privacy “In creating large databases, whether for government or corporations, we are opening ourselves to the possibility that the databases will be subverted by attackers.” — Bruce Schneier, Beyond Fear, 2003 "In the vast majority of cases we investigate, the culprits are current or former employees. They are not hacking into systems using flaws in software. Instead they are using flaws in the security procedures of the company to carry out their attack.“ — Detective Inspector Chris Simpson, London Police, Euro-InfoSec Conference, 2005 Approximately 80% of all computer and Internet related crimes are committed by insiders. — CSI/FBI 2003 Computer Crime and Security Survey

38 Privacy By Design: Build It In Build in privacy – up front, right in the design specifications Minimize the collection and routine use of personally identifiable information – use aggregate or coded information if possible: data minimization is the goal Wherever possible, encrypt personal information Use privacy enhancing technologies (PETs): think about anonymity and pseudonymity Assess the risks to privacy: conduct a privacy impact assessment; follow up with privacy audits

39 RFIDs: Privacy Fears Loom Consumers perceive that RFIDs may facilitate tracking: The ability to track consumers who have purchased a product The establishment of a widespread surveillance infrastructure The linking of product information and personal information without consent

40 Make Privacy a Corporate Priority An effective privacy program needs to be integrated into the corporate culture It is essential that privacy protection become a corporate priority throughout all levels of the organization Senior Management and Board of Directors’ commitment is critical

41 Good Governance and Privacy “Privacy and Boards of Directors: What You Don’t Know Can Hurt You” –Guidance to corporate directors faced with increasing responsibilities and expectation of openness and transparency –Privacy among the key issues that Boards of Directors must address –Potential risks if Directors ignore privacy –Great benefits to be reaped if privacy included in a company’s business plan

42 Final Thought “Anyone today who thinks the privacy issue has peaked is greatly mistaken…we are in the early stages of a sweeping change in attitudes that will fuel political battles and put once-routine business practices under the microscope.” - Forrester Research, March 5, 2001

43 How to Contact Us Commissioner Ann Cavoukian Information & Privacy Commissioner/Ontario 2 Bloor Street East, Suite 1400 Toronto, Ontario M4W 1A8 Phone: (416) Web: