Privacy and Data Protection Issues for UCLA Christine Borgman, Professor Information Studies.

Slides:



Advertisements
Similar presentations
DATA PROTECTION and Research University Research Ethics Committee – David Cauchi David Cauchi Office of the Commissioner for Data Protection.
Advertisements

Information Privacy and Data Protection Lexpert Seminar David YoungDecember 9, 2013 Breach Prevention – Due Diligence and Risk Reduction.
PIPA PRESENTATION PERSONAL INFORMATION PROTECTION ACT.
Auditing Concepts.
Data Protection.
Identity Management In A Federated Environment Identity Protection and Management Conference Presented by Samuel P. Jenkins, Director Defense Privacy and.
 Main Benefit: › The main benefit that is occurred by introducing a new system to work with or instead of the old system, is the forms of cost saving.
DATA PROTECTION and Research University Research Ethics Committee – David Cauchi Office of the Data Protection Commissioner.
Information Security Policies and Standards
2/16/2010 The Family Educational Records and Privacy Act.
Duncan Woodhouse – Assistant Registrar for Information Security, Risk Management and Business Continuity Helen Wollerton – Administrative Officer (Legal.
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Data Protection Overview
The Data Protection Act
 The Data Protection Act 1998 is an Act of Parliament which defines UK law on the processing of data on identifiable living people and it is the main.
General Purpose Packages
Privacy: Understanding the Needs, Policy, and Approach Owen Greenspan Director Law and Policy Program.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
HIPAA PRIVACY AND SECURITY AWARENESS.
Data Protection and You Your Rights & The Law Registration Basics Other Activities Disclaimer: This presentation only provides an introductory info. Please.
Spring Semester 2009 IT Policy and Technology: Japan and Global IT Environment 世界のなかの日本としての IT 政策と技術 Jun Murai Masaaki Sato Jun Takei May 21, Privacy.
The Data Protection Act 1998 The Eight Principles.
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
1 International Symposium on National Databank Systems Auckland, May 2004 DNA DATABANKS: SOME PRIVACY CONSIDERATIONS Blair Stewart Assistant Privacy Commissioner.
FERPA: What you Need to Know The Family Educational Rights and Privacy Act & SEI.
Data Protection Act AS Module Heathcote Ch. 12.
Data Protection Corporate training Data Protection Act 1998 Replaces DPA 1994 EC directive 94/46/EC The Information Commissioner The courts.
The right item, right place, right time. DLA Privacy Act Code of Fair Information Principles.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
Addressing Unauthorized Release of Personal Information at UC Davis August 12, 2003.
Legal issues The Data Protection Act Legal issues What the Act covers The misuse of personal data By organizations and businesses.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
Malcolm Crompton APEC Information Privacy Framework: review, impact, & progress APEC Symposium on Information Privacy Protection in E Government & E Commerce.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
Information Systems Unit 3.
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
Prepared by The Office of the Registrar Youngstown State University February, 2009.
Personal data protection in research projects
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
Privacy Compliance in Schools Darrebin A/P’s Network 7 May 2009.
APEC Privacy Framework “The lack of consumer trust and confidence in the privacy and security of online transactions and information networks is one element.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
DON Code of Privacy Act Fair Information Principles DON has devised a list of principles to be applied when handling Protected Personal Information (PPI).
© University of Reading Lee Shailer 06 June 2016 Data Protection the basics.
Data protection—training materials [Name and details of speaker]
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Presented by Ms. Teki Akuetteh LLM (IT and Telecom Law) 16/07/2013Data Protection Act, 2012: A call for Action1.
Understanding Privacy An Overview of our Responsibilities.
Data Protection Laws in the European Union John Armstrong CMS Cameron McKenna.
The Data Protection Act 1998
Auditing Concepts.
Privacy principles Individual written policies
Issues of personal data protection in scientific research
General Data Protection Regulation
The Data Protection Act 1998
Data Protection Legislation
EU Directive 95/46/EC (Paragraph 2) “Whereas data-processing systems are designed to serve man; whereas they must Respect their fundamental rights.
Data Protection & Freedom of Information- An Introduction
6 Principles of the GDPR and SQL Provision
G.D.P.R General Data Protection Regulations
Other Assurance Services
Data Protection principles
OECD Guidelines Collection Limitation: should be limited to personal data, obtained by lawful and fair means, and (where appropriate) with knowledge and.
General Data Protection Regulations 2018
IAPP TRUSTe SYMPOSIUM 9-11 JUNE 2004
PRIVACY PRESENTATION TO THE SPRING 2013 CONFERENCE BY HANK MOORLAG
Presentation transcript:

Privacy and Data Protection Issues for UCLA Christine Borgman, Professor Information Studies

ITPB, June 10, 2003 Privacy & data protection issues Privacy is fundamental to democracy freedom of speech, freedom to read academic freedom Privacy requires data protection organizational responsibility for student records (e.g., FERPA), faculty& staff records risks of data misuse (e.g., identity theft) chilling effect on communication if speech is not protected, if people think that what they are saying and reading is being tracked

ITPB, June 10, 2003 Privacy practices are evolutionary print records: physical controls: locks, keys, signing authority records held by controlling agency (e.g., registrar, library) record-specific laws and policies (e.g. FERPA, state laws on access to library circ data) electronic records: electronic controls: encryption, passwords, firewalls records of multiple types may be held by central agency institutional policies and practices required

ITPB, June 10, 2003 Privacy principles-OECD BASIC PRINCIPLES OF NATIONAL APPLICATION. Collection Limitation Principle 7. There should be limits to the collection of personal data and any such data should be obtained by lawful and fair means and, where appropriate, with the knowledge or consent of the data subject. Data Quality Principle 8. Personal data should be relevant to the purposes for which they are to be used, and, to the extent necessary for those purposes, should be accurate, complete and kept up-to-date.

ITPB, June 10, 2003 Privacy principles-OECD Purpose Specification Principle 9. The purposes for which personal data are collected should be specified not later than at the time of data collection and the subsequent use limited to the fulfilment of those purposes or such others as are not incompatible with those purposes and as are specified on each occasion of change of purpose. Use Limitation Principle 10. Personal data should not be disclosed, made available or otherwise used for purposes other than those specified in accordance with Paragraph 9 except: a) with the consent of the data subject; or b) by the authority of law.

ITPB, June 10, 2003 Privacy principles-OECD Security Safeguards Principle 11. Personal data should be protected by reasonable security safeguards against such risks as loss or unauthorised access, destruction, use, modification or disclosure of data. Openness Principle 12. There should be a general policy of openness about developments, practices and policies with respect to personal data. Means should be readily available of establishing the existence and nature of personal data, and the main purposes of their use, as well as the identity and usual residence of the data controller.

ITPB, June 10, 2003 Privacy principles-OECD Individual Participation Principle 13. An individual should have the right: a) to obtain from a data controller, or otherwise, confirmation of whether or not the data controller has data relating to him; b) to have communicated to him, data relating to him 1.within a reasonable time; *at a charge, if any, that is not excessive; *in a reasonable manner; and *in a form that is readily intelligible to him; 2.c) to be given reasons if a request made under subparagraphs(a) and (b) is denied, and to be able to challenge such denial; and d) to challenge data relating to him and, if the challenge is successful to have the data erased, rectified, completed or amended.

ITPB, June 10, 2003 Privacy principles-OECD Accountability Principle 14. A data controller should be accountable for complying with measures which give effect to the principles stated above.

ITPB, June 10, 2003 UCLA- where are we now? A wide array of personal data are being collected via BruinCard and other means Basic OECD privacy principles are not in place Individuals on whom data are being collected lack basic knowledge of what is being collected, by whom, for what purposes, for whose access, and the retention and destruction cycles for these data Individuals do not have rights (or do not know about them) to access or correct these data Many individuals are reluctant to obtain a BruinCard or participate in other university electronic records systems (e.g., electronic voting,academic personnel systems) w/o privacy and data protection principles in place

ITPB, June 10, 2003 UCLA - further concerns Identity fraud (#1 white collar crime in the U.S.) occurs mainly through insider access to personal data The more data aggregated in one ID card, the more valuable it becomes The risk for abuse, and the liability incurred, increase with the amount of data collected and aggregated System administrators (some of whom are student workers) may have access to transaction records, content, and other unencrypted records

ITPB, June 10, 2003 Sample Issues to be addressed by system designers and review panels What data are being collected? What are the specific uses and justifications for each data element? How long is each data element and each transaction retained? when are data destroyed? How is destruction assured? What are the criteria to determine when data should be aggregated in one system or ID card and when data should be isolated? What audit trails need to be in place? Who has access to the audit trails? What rights do individuals have to their audit trails? How can the privacy of the data in the audit trails be assured? What is an acceptable level of risk and liability for each data element collected, and each type of transaction? What are the criteria for encrypting data within databases/ What are the criteria to determine “need to know”? What data, what purposes, what audit trails to determine abuse?

ITPB, June 10, 2003 Proposal to ITPB / UCLA Establish university privacy and data protection policies based on OECD guidelines Establish privacy and data protection board to oversee implementation of policies and to review all new data collection plans Membership of the board to include Representatives from agencies that do major data collection Finance, registrar, library, other Representatives from constituencies on whom data are being collected Students, faculty, staff, public Additional members external privacy / data protection expert? at large members?

ITPB, June 10, 2003 Further contributions today Susan Abeles, Financial Services, on BruinCard privacy and data protection Janice Koyama, Interim University Librarian, on library practices

ITPB, June 10, 2003 Appendix: Examples of best practices OECD template provides a framework for institutional practices Practices vary by organization; no single “best practices” model exists List that follows was assembled by Ruchika Agrawal of the Electronic Privacy Information Center, paraphrased from Peter Wayner's "Translucent Databases"

ITPB, June 10, 2003 examples from Wayner -1 (1) Encryption: keep data secure with one-way functions and encryption (2) Ignorance: data is scrambled (or encrypted) by the user's computer before it travels over the network (3) Minimization: collect/keep the minimum amount of data necessary (4) Misdirection: add fake data into the mix (only the legitimate user can spot the real data)

ITPB, June 10, 2003 examples from Wayner -2 (5) Stunt data: replace data with encrypted items that can protect the real data while still looking like the real information (6) Equivalence: obscure sensitive information by replacing it with a similar value that is functionally equivalent (e.g. instead of date-of-birth, why not just yes/no for is of legal voting age?) (7) Quantization: reduce the precision of numbers of values

ITPB, June 10, 2003 examples from Wayner -3 (8) Security: even if invaders find all the passwords to all of the access levels, the raw data should be encrypted or scrambled so even if you gain access to the system, you won't gain access to the data. (9) OS Independence: "All of the major operating systems are insecure." Hence the raw data should be encrypted or scrambled so even if you gain access to the system, you won't gain access to the data.