Peter Swire Computing Community Consortium/CRA Workshop On Privacy By Design Berkeley February 6, 2015 Privacy by Design: More than Compliance with the.

Slides:



Advertisements
Similar presentations
The Role of the IRB An Institutional Review Board (IRB) is a review committee established to help protect the rights and welfare of human research subjects.
Advertisements

From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud Peter Swire Moritz College of Law Ohio State.
The Strategy of Using Security to Protect Privacy Peter P. Swire Ohio State University Consultant, Morrison & Foerster, LLP Data Protection Commissioner.
Licensing of Intangible Transfers of Technology
GAMBIA COMPETITION COMMISSION GAMBIA COMPETITION COMMISSION Levelling the Field for Development BY : EXECUTIVE SECRETARY 5 TH JUNE 2013.
Engineers and Lawyers in Privacy Protection Peter Swire Professor, Moritz College of Law Visiting Professor, Georgia Institute of Technology IAPP Summit.
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL DATA PROTECTION AND PRIVACY COMMISSIONERS.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Ethics in Business Society for Healthcare Strategy & Market Development - NM Chapter United Way 11 August 2006 Karen Rutledge Ethics and Compliance Specialist.
Security and Personnel
Fourth Edition Copyright ©2003 Prentice Hall, Inc. PART Understanding the Contemporary Business Environment.
PRIVACY COMPLIANCE An Introduction to Privacy Privacy Training.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
Auditor General’s Office One key audit focus area – Compliance with Laws and Regulations.
© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Privacy Management for a Global Enterprise.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
WELCOME Annual Meeting & Compliance Seminar. Code of Conduct - Impact on Corporate Culture by Andy Greenstein Knight Capital Group, Inc.
Spreadsheet Management. Field Interviews with Senior Managers by Caulkins et. al. (2007) report that Spreadsheet errors are common and have been observed.
CHAPTER 3 Ethics & Social Responsibility
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Slides prepared by Cyndi Chie and Sarah Frye (and Liam Keliher) A Gift of Fire Third edition Sara Baase Chapter 9: Professional Ethics and Responsibilities.
NSA Surveillance Justin Waller and Brian Bauer. What is NSA Surveillance? Essentially NSA surveillance is an attempt to monitor communications in order.
Information Security for the Data Management Professional Micheline Casey Chief Data Officer Federal Reserve Board.
Ethics in Information Technology, Second Edition 1 Chapter 1 An Overview of Ethics.
Corporate Ethics Compliance *
Spreadsheet Management. Sarbanes-Oxley Act (SOX, 2002) Requires “an effective system of internal control” for financial reporting in publicly- held companies.
Internal Auditing and Outsourcing
EFFECTING CULTURAL CHANGE IN RESEARCH ETHICS AND INTEGRITY Encouraging a culture of research integrity Andrew C. Rawnsley.
Topic: Information Security Risk Management Framework: China Aerospace Systems Engineering Corporation (Case Study) Supervisor: Dr. Raymond Choo Student:
The Institutionalization of Business Ethics
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Developing an Effective Ethics Program.  The responsibility of the corporation as a moral agent  The need for organizational ethics programs  An effective.
1 CREATING A LEARNING ORGANIZATION AND AN ETHICAL ORGANIZATION STRATEGIC MANAGEMENT BUAD 4980.
Marketing Ethics and Social Responsibility
The Institutionalization of Business Ethics
1 Profesional Ethics & Social Responsibility. 2 Objectives What is ethics, and why is it important to act according to a code of principles? Why is business.
Financial Services Privacy - the interaction of the privacy and financial services regulatory systems Chris Connolly Financial Services Consumer Policy.
ICS424 Computer and Professional Ethics Aj. Thoranin Intarajak.
“Social Networks, Privacy and Freedom of Association” Professor Peter Swire Ohio State University Privacy Working Group April 25, 2012.
IAPP KnowledgeNet Los Angeles “Thinking Outside the Cookie Jar” The Second Wave of Global Privacy Protection: Why This Year Is Different Peter Swire, Senior.
Good Research Practice Other Roles of the Researcher Fang Mao, Department of Chemistry-Ångström Mi Wang, Department of EBC Getachew Kebede, Department.
European Data Protection Supervisor Pharmaceutical Regulatory & Compliance Congress, Brussels, 7 June 2007 European Privacy and Data Protection Policy.
IT Professionalism Ethics Modified by Andrew Poon.
Environmental Management System Definitions
Practice Management Quality Control
G:\99Q3\9220\PD\AJD2.PPT 1 Harriet P. Pearson Chief Privacy Officer IBM February 7, 2003 IBM.
1. Our submissions focus on : The two-stage amendment process The legal entity proposed to represent communities The recognition of customary rights Need.
Tad and Terry Legal Issues in ILP. 28 CFR Part 23 The federal rule that governs or provides guidance for these issues. § 23.3 Applicability: These policy.
The Internet of Things and Consumer Protection
Morality & Rationality in Organizations
Placing Information Security within an Organization
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Ethics in Information Technology, Second Edition 1 Chapter 1 An Overview of Ethics.
Legal Jeopardy: Whose Risk Is It?. SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo.
An Overview THE AUDIT PROCESS. MAJOR PHASES IN AN AUDIT Client acceptance and retention Establish terms of the engagement Plan the audit Consider internal.
The Privacy Symposium August 22, 2007 ©2007. Goodwin Procter LLP The Ethics and Responsibilities of a Privacy Professional.
Copyright © Houghton Mifflin Company. All rights reserved.8-1 Chapter 8 Developing an Effective Ethics Program.
Business Ethics 1 كلية العلوم والدراسات الانسانية بالغاط Chapter 3: Stakeholder Relationships, Social Responsibility, and Corporate Governance.
Can We Trust the Computer? FIRE, Chapter 4. What Can Go Wrong? What are the risks and reasons for computer failures? How much risk must or should we accept?
How Technology is Prompting US/EU Tension on Mutual Legal Assistance Peter Swire Huang Professor Law and Ethics Georgia Tech Scheller College of Business.
Framework of engagement : big data for official use Roy D. Ibay AVP Regulatory PLDT – Smart.
© 2012 Cengage Learning. All Rights Reserved. Objective 2.05 Understand responsible actions for conducting business. SLIDE 1 Objective 2.00 Understand.
Judicial interventions in regulatory matters: Indian experience S Sundar Distinguished Fellow Tata Energy Research Institute August 2002 Dhaka.
Peter Swire Holder Chair of Law and Ethics
CPA Gilberto Rivera, VP Compliance and Operational Risk
The Institutionalization of Business Ethics
North Carolina Law Review Symposium
Chapter # 1 Overview of Ethics
Importance of Law and Policies in the Environmental Management System
Executive Office of the President (EOP)
Presentation transcript:

Peter Swire Computing Community Consortium/CRA Workshop On Privacy By Design Berkeley February 6, 2015 Privacy by Design: More than Compliance with the Law

Overview on PbD & Compliance with Law  Thesis: designing to comply with legal requirements is essential  (It’s what lawyers do – build an argument)  It is not the only criterion for design  Intuitive to this audience, but helpful to understand why  PbD includes need to design to meet binding legal requirements  Applies to relatively well-defined requirements  Applies to relatively vague requirements: “reasonable” or “unfair and deceptive”  Beyond law -- role of ethics and other non-legal considerations  Being ethical is good  Instrumental reasons to be (and be seen as) ethical – brand considerations, political blowback, etc.  How to communicate from the law to the engineers

PbD – First, follow the law  HIPAA/GLBA – Antón, Breaux, Massey et al.  Relatively detailed regulatory regimes  Even here, mapping the legal rules is detailed and hard  Research shows software engineers not very skilled in understanding regulatory requirements  So, will need institutional support for compliance, even for relatively well-specified rule sets

Follow the Law: Office of Compliance  The playbook (from discussion with a compliance officer)  Define a (long) series of limits  The limits prevent actions, and audit for violations of the limits  If need exception, go to SME/compliance officer for permission  Limited discretion by those subject to the compliance regime  An example: NSA compliance with Section 215 orders from the Foreign Intelligence Surveillance Court  Fourth Amendment  FISA and other laws  Court orders from judge  Department of Justice guidelines  NSA policies  NSA software implementation of the policies  Report each violation to FISC – limit discretion of the analyst

“Reasonableness” and Other Vague Legal Terms  Many legal rules not specified in detail  For engineers, how give “reasonable access” or avoid “unfair and deceptive” trade practices? (Antón & Swire IAPP 2014)  Can’t code for that – deep frustration for engineers  But, laws can’t avoid these vague terms  Laws last a long time  For huge diversity of entities  For huge diversity of facts  Therefore, law will continue to have these vague terms  Engineers and others, as a matter of legal compliance, will face vague terms

Avoiding “Unfair and Deceptive” Practices – PbD as Seen by FTC  Jessica Rich (Director, FTC Bureau of Consumer Protection) speech this week.  On “Privacy by Design”, she says it isn’t that vague:  Do “reasonable data collection and retention limits, de- identification of data where feasible and sound data security and disposal practices.”  “You should bolster sound technical strategies for de-identifying data with a strong commitment and effective polices not to reidentify it. This means that companies should publicly commit not to seek to reidentify the data and should, through contract, require the same from those with whom they share data.”  May sound good to lawyers -- how comforting to engineers about what is legally expected?

Beyond Compliance – Ethics and Other Considerations  Compliance with legal requirements is essential  It’s not the only criterion for design  Similar to law and ethics chapter I teach for business students  Corporations must comply with law  That’s not enough  2012 Dhaka fire for textiles factory  Bad lack of safe fire exits  Over 100 died, 200 injured  Buyers (legally) included WalMart and other big brands  Should WalMart consider such ethical and brand issues going forward?

In Design, Why Go Beyond Legal Compliance?  Ethics – decisions about what is right and wrong  Instrumental Goals  Brand risk for a corporation  Political blowback for an agency or corporation  If we don’t build it right, they’ll cancel the program/product  Other consequences of bad design

Beyond Defining the Requirements  Thus far:  Design for relatively well-specified laws  Design for vague laws  Design for ethical, brand, political considerations  Next:  Communicate these requirements to those designing the systems – the privacy and other engineers

PbD Includes Heuristics for Engineers  RFC 6973 – Privacy Considerations for Internet Protocols  2014 paper Rutledge, Massey, Antón, Swire on privacy and security in Internet of Things (Internet of Devices)  An example – consider an engineer designing IoT system  Develop heuristics for engineers to address security and privacy issues  Input/output:  Data flowing into a device typically security (DOS, malicious code)  Data flowing out of a device typically privacy concern  PII or not: industrial controls vs. PII surveillance  Mechanisms to reduce/eliminate PII  Magnitude and quality of risks vary with device type:  RFID to specialized object to general-purpose computer

One Institutional Research Question for PbD  How to design the Privacy by Design team?  Make the designer “bilingual” – engineer who is a privacy expert  Create a multi-functional team – when and how to bring the engineers and privacy experts together  There has been almost no work done on this challenging issue

Conclusion  A “minimalist” version of Privacy by Design:  PbD means to assure compliance with well-specified, mandatory legal requirements  Beyond minimalism:  Many legal requirements are vague or contested  Ethical, brand, political and other considerations go beyond legal mandates  PbD principles embedded in software and system design, so help the engineers (non-privacy experts)  How the engineers can build privacy aspects themselves  How the engineers should consult organizational privacy experts (and other needed perspectives)  In sum, many design issues beyond the minimalist version