NTIA Privacy Multistakeholder Meeting March 25, 2014 Amanda Koulousias, Attorney Division of Privacy and Identity Protection Federal Trade Commission FTC.

Slides:



Advertisements
Similar presentations
EU Privacy Directive. What is a directive? A piece of European legislation, passed by bureaucrats, addressed to member states Member states must ensure.
Advertisements

1 NAESB Data Privacy Task Force February 16, 2011.
Dr. Marc Valliant, VP & CTO
Mobile Payments and the FTC Manas Mohapatra Director of Mobile Policy Mobile Technology Unit Federal Trade Commission The views expressed are not necessarily.
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Big Data - Ethical Data Use Kimberlin Cranford. Ethical Use in the Era of Big Data  Landscape has Changed  Attitudes about Big Data  PII, Anonymous,
Digital Agenda Assembly 2012 Mobile Payments: The Demand Side Perspective from the FTC Stacy Feuer Assistant Director for International Consumer Protection.
BIOMETRICS, CCTV & DATA PROTECTION By Drudeisha Madhub Data Protection Commissioner Date:
Face Processing in Social Networking Services NTIA Privacy Multistakeholder Process: Commercial Facial Recognition Technology March 25, 2014 Olga Raskin.
Silicon Valley Apps for Kids Meetup Laura D. Berger October 22, 2012 The views expressed herein are those of the speaker, and do not represent the views.
Protecting Personal Information Guidance for Business.
Helping you protect your customers against fraud Division of Finance and Corporate Securities.
Children's Online Privacy Protection Act and the Video Privacy Protection Act By: Alana Rushing.
John Palatiello, MAPPS Executive Director Kevin Pomfret, Centre for Spatial Law and Policy presentation to NGAC December 7, Washington, DC.
Christian Vargas. Also known as Data Privacy or Data Protection Is the relationship between collection and spreading or exposing data and information.
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
Privacy Policy Workshop M. Ryan Calo, Center for Internet and Society, Stanford Law School Mali Friedman, Covington & Burling LLP, San Francisco Office.
Data Protection webinar: Data Protection & Volunteers 19 th June 2014 Welcome. We’re just making the last few preparations for the webinar to start at.
Domain Name Registrant Data: The Privacy Questions Alan Davidson Center for Democracy and Technology
Mark S. Hayes – Blake, Cassels & Graydon LLP Privacy and Security – Some Observations Mark S. Hayes, Blake, Cassels & Graydon LLP 7th CACR Privacy and.
The Securities and Exchange Commission: 21 st Century Disclosure Initiative September 9, 2008.
Lecture to Carleton University, Center for European Studies, December 1, 2010.
Institute of Information Systems, Humboldt University, 2006· Privacy Engineering Sarah Spiekermann & Lorrie Faith Cranor DIMACS Workshop, Rutgers University.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Taking Steps to Protect Privacy A presentation to Hamilton-area Physiotherapy Managers by Bob Spence Communications Co-ordinator Office of the Ontario.
CONSUMER PROTECTION AND LITIGATION: CONSUMER PROTECTION AND LITIGATION: Ryan Mehm Attorney Bureau of Consumer Protection Federal Trade Commission The views.
LAW SEMINARS INTERNATIONAL New Developments in Internet Marketing & Selling November 13 & 14, 2006 San Francisco, California Moderator : Maureen A. Young.
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
10 Tips for Privacy in Mobile Games Steve Augustino Kelley Drye & Warren LLP (with a little help from Tom Petty)
RISING DATA FLOW- OUT OF CONTROL? ARTHUR POBER, ED.D.
Florida Information Protection Act of 2014 (FIPA).
Mi-Gyeong Gwak, Christian Vargas, Jonathan Vinson
FTC: Anatomy of a Data Security/Privacy Investigation and the Future of Privacy John Jay College of Criminal Justice Center for Cybercrime Studies November.
Federal Trade Commission required to issue and enforce regulations concerning children’s online privacy. Initial COPPA Rule effective April 21, 2000;
Privacy Hot Topics Discussion August 18, 2011 The Corporate Privacy Forum Sharing practical solutions to today’s privacy challenges 1.
Smart Machines, Smart Privacy: Rules of the Road and Challenges Ahead The views expressed are those of the speaker and not necessarily those of the FTC.
Notice and Choice and Its Problems Robert Sloan Richard Warner.
INDUSTRY COMMITMENT TO INNOVATION IN NOTICE AND CHOICE AAAA, ANA, CBBB, DMA, IAB Convene Task-Force (April 2008) Coalition begins drafting industry principles.
Protecting privacy: Regulation and its unintended consequences for survey research Dr. Dan Nunan Henley Business School, University of Reading
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
BEHAVIORAL TARGETING IN ADVERTISING By Rita Aliperti.
Lesson Title: Privacy Overview Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This.
The Internet of Things and Consumer Protection
Malcolm Crompton APEC Information Privacy Framework: review, impact, & progress APEC Symposium on Information Privacy Protection in E Government & E Commerce.
Wil Haywood Rossana Bua Rhishi Katoch Kelvyn Araujo-Valdez Steve Kim.
1 Canadian Privacy Policy: Customizing E.U. Standards Remarks by Jennifer Stoddart Privacy Commissioner of Canada Privacy Symposium: Summer 2007 August.
Chapter 27 Your Credit and the Law pp Learning Targets 1.Explain 1.Explain how government protects credit rights. 2. Name 2. Name federal laws.
Privacy of Customer Energy Usage Data: Protecting Consumers and Giving Them the Tools with which to Protect Themselves Aryeh B. Fishman Director, Regulatory.
Targeted Behavioral Advertising Ariel Pierre Section 001.
The Protection of Personal Information Bill 13 February
28/01/20161 The Future of Online Privacy: Online advertising and behavioral targeting Kristina Irion Third Internet Governance Forum Thursday, 5/12/2008.
APEC Privacy Framework “The lack of consumer trust and confidence in the privacy and security of online transactions and information networks is one element.
Copyright, Intellectual Property, and Privacy 1 Lesson Plan: BMM A9-4.
Government Protection Consumers protected by both laws and agencies at different levels Look at table on page 30.
Consumer Information Federal Trade Commission Act grants Federal Trade Commission (FTC) responsibility regarding unfair methods of competition and unfair.
Privacy and Public Policy Implications of IoT
GDPR support January GDPR support January 2018.
Nina Barakzai November 2017
GENERAL DATA PROTECTION REGULATION (GDPR)
The General Data Protection Regulation (GDPR)
Red Flags Rule An Introduction County College of Morris
Ethical questions on the use of big data in official statistics
General Data Protection Regulation
The Issues with Technology in education
IAPP TRUSTe SYMPOSIUM 9-11 JUNE 2004
Face Detection Gender Recognition 1 1 (19) 1 (1)
GDPR what do we need to do?
Presentation transcript:

NTIA Privacy Multistakeholder Meeting March 25, 2014 Amanda Koulousias, Attorney Division of Privacy and Identity Protection Federal Trade Commission FTC Staff Report: Facing Facts - Best Practices for Common Uses of Facial Recognition Technologies The views expressed are those of the speaker and not necessarily those of the FTC.

Panelists discussed a range of technologies: pure facial detection age and gender recognition emotion recognition facial recognition Major topics included: Advances in the technology Current and potential future commercial uses Benefits & privacy concerns Face Facts: A Forum on Facial Recognition Technology December 8, 2011

Public Comment Period December January 2012 Issues for comment included: Current and future uses Benefits to consumers Privacy and security concerns Best practices for building privacy into products and when and how to provide consumers with notice and choice The FTC received 80 public comments from a variety of stakeholders

Important Points: The report contains recommendations for best practices It is not a template for law enforcement actions or regulations under laws currently enforced by the FTC The recommendations build on the workshop and the public comments The report uses 3 case studies as an example to discuss best practices FTC Staff Report: Facing Facts – Best Practices for Common Uses of Facial Recognition Technologies October 2012

FTC Staff Report: Facing Facts – Best Practices for Common Uses of Facial Recognition Technologies October 2012 The recommendations describe how companies can implement the principles contained in the FTC’s March 2012 Privacy Report: Privacy by Design Simplified Consumer Choice Transparency

Case Study: Detection or Recognition of Demographic Characteristics in Digital Signs Simplified Choice & Increased Transparency: Clear notice to consumers that these signs are in use – before the consumer comes into contact with the sign Obtain affirmative express consent before individually identifying consumers through these signs Privacy by Design: Reasonable data security protections to prevent unauthorized access to the images No signs in sensitive areas Limited data retention

Case Study: Facial Recognition in Online Social Networks Privacy by Design: Reasonable data security for the database of images & biometric data Protections in place to prevent unauthorized scraping of publicly available images in the database Appropriate retention and disposal practices

Case Study: Facial Recognition in Online Social Networks (continued) Simplified Choice and Increased Transparency: Clear notice – outside of a privacy policy – when the feature is rolled out Offer consumers an easy to find choice not to have biometric data collected and used for facial recognition Do not collect or store biometric data of non-users of the service because there is no context in which to provide such non-users with a choice about these practices

Case Study: Facial Recognition in Online Social Networks (continued) Situations in which affirmative express consent should be obtained: Before using a consumer’s image or biometric data in a materially different manner than represented when the company collected the data Identifying a user to another user who is not their “friend” Recommendation applies beyond social networks: Only identify anonymous images of consumers to someone who could not otherwise identify them if the consumer has affirmatively opted in to such a system

Questions?