IETF Plenary Monday 25 July 2011 Quebec City, Canada Privacy: A Regulator’s Perspective Fred Carter Senior Policy & Technology Advisor IPC/O.

Slides:



Advertisements
Similar presentations
Privacy by Design: Big Privacy for Big Data
Advertisements

Office of the Information and Privacy Commissioner, Ontario, Canada
4 th Meeting of the EC International Dialogue on Bioethics Copenhagen, June 19 th, 2012 Large research and medical databases in clinical and research multi-centred.
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL DATA PROTECTION AND PRIVACY COMMISSIONERS.
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY.
Introduction to basic principles of Regulation (EC) 45/2001 Sophie Louveaux María Verónica Pérez Asinari.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
The Geopolitics of Personal Data and the Governance of Privacy Colin J. Bennett Department of Political Science University of Victoria BC, Canada
Securing North America’s Power Grid Dr. Ann Cavoukian, Ontario information and privacy commissioner Mark Fabro CISSP, CISM, President and Chief Security.
Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario Ted Rogers School of Information Technology Management Ryerson University February 24,
Europol’s tailor-made data protection framework
Privacy in Ontario Brian Beamish Office of the Information and Privacy Commissioner/Ontario Presentation to Security Canada Central 2002 International.
The role of the Office of the Privacy Commissioner in telecommunications Andrew Solomon Director, Policy.
Lecture to Carleton University, Center for European Studies, December 1, 2010.
The U.S.-E.U. Safe Harbor Framework The U.S.-E.U. Safe Harbor Framework New Developments in Data Flows, Standards, & Compliance Damon Greer U.S. Department.
Data Protection: International. Data Protection: a Human Right Part of Right to Personal Privacy Personal Privacy : necessary in a Democratic Society.
Taking Steps to Protect Privacy A presentation to Hamilton-area Physiotherapy Managers by Bob Spence Communications Co-ordinator Office of the Ontario.
IT security seminar Copenhagen, April 4th 2002 M. Jean-Michel HUBERT Chairman of the French Regulation Authority IRG Chairman.
SmartPrivacy for the Smart Grid Catherine Thompson Office of the Information and Privacy Commissioner Ontario, Canada Practical Smart Grid Security (SG-11)
Exposing the Myths, Exploring the Solutions Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario Privacy & Security: Seeking the.
Privacy, Security, and trust in cloud computing BY: SIANI PEARSON PRESENTED BY: KIA MANOOCHEHRI.
Seeking Solutions to the Privacy Challenges of Emerging Technologies Blair Stewart, Assistant Privacy Commissioner Presentation to NZ Computer Society,
Privacy Codes of Conduct as a self- regulatory approach to cope with restrictions on transborder data flow Dr. Anja Miedbrodt Exemplified with the help.
Principles of good practice Jana Kunická Community Philanthropy Initiative Coordinator European Foundation Centre.
WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Identity and Privacy: the.
Roles and Responsibilities in Municipal Land Use.
2015 National BDPA Technology Conference Big Data: Cool, Creepy or Privacy Violation? Arlonda Stevens August 18-22, 2015 Washington, DC.
Transboundary Trust Space September 19, 2012 Development trends of legal acts in forming valid transboundary electronic interaction Alexander Sazonov Regional.
Data Protection Privacy in the Digital Age: the UN General Assembly Resolution Sophie Kwasny, 16 October th International Conference, Mauritius.
The European influence on privacy law and practice Nigel Waters, Pacific Privacy Consulting International Dimension of E-commerce and Cyberspace Regulation.
Compliance with IOSCO requirements AMEDA Leadership Forum Alexandria Egypt Monday 27 th April 2009 by Dr. Ashraf EL Sharkawy Senior Advisor to the CMA.
Getting to the Truth about Privacy & Security Ann Cavoukian Ph.D. Information and Privacy Commissioner/Ontario Privacy & Security: Totally Committed November.
Exposing the Myths, Exploring the Solutions Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario Privacy & Security: Seeking the.
Initial reflections of the privacy commissioner on Ontario’s draft privacy bill Ann Cavoukian, Ph.D. Information and Privacy Commissioner/Ontario Toronto.
Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario, Canada Privacy by Design: Integrating Technology into Global Privacy Practices Harvard.
Privacy Professional Practice for Computer Science Guest Lecture, 05 March 2007 Philippa Lawson Director, Canadian Internet Policy & Public Interest Clinic.
Europe's work in progress: quality of mHealth Pēteris Zilgalvis, J.D., Head of Unit, Health and Well-Being, DG CONNECT Voka Health Community 29 September.
European Data Protection Supervisor Pharmaceutical Regulatory & Compliance Congress, Brussels, 7 June 2007 European Privacy and Data Protection Policy.
1 GSC: Standardization Advancing Global Communications ISACC Opening Plenary Presentation GSC-11 SOURCE:ISACC TITLE:ISACC Opening Plenary Presentation.
BC Public Libraries November, 2008 Privacy Principles.
Cloud Computing, Policy Management and Standardization Europe Identity Conference 2011 John Sabo, Director Global Government Relations, CA Technologies.
Malcolm Crompton APEC Information Privacy Framework: review, impact, & progress APEC Symposium on Information Privacy Protection in E Government & E Commerce.
PRESENTED AT THE STAKEHOLDERS FORUM ON QUALITY OF SERVICE AND CONSUMER EXPERIENCE LAICO REGENCY HOTEL Creating Space for Consumer Rights in.
DG Information Society The EU and Data Retention Data Retention Meeting London, 14 May 2003 Philippe GERARD, DG Information Society The positions.
1 Copyright © International Security, Trust & Privacy Alliance -All Rights Reserved Making Privacy Operational International Security, Trust.
Fred Carter Senior Policy & Technology Advisor Information and Privacy Commissioner Ontario, Canada MISA Ontario Cloud Computing Transformation Workshop.
APEC Privacy Framework “The lack of consumer trust and confidence in the privacy and security of online transactions and information networks is one element.
Workshop on Privacy of Public Figures and Freedom of Information - Skopje, 9-10 October 2012.
PROTECTING THE INTERESTS OF CONSUMERS OF FINANCIAL SERVICES Role of Supervisory Authorities Keynote Address to the FinCoNet Open Meeting 22 April 2016.
Information Security tools for records managers Frank Rankin.
The Commonwealth Cybercrime Initiative David Tait, Cybercrime Policy Analyst.
Business Challenges in the evolution of HOME AUTOMATION (IoT)
-1- WORKSHOP ON DATA PROTECTION AND DATA TRANSFERS TO THIRD COUNTRIES Technical and organizational security measures Skopje, 16 May - 17 May 2011 María.
Data Protection and Enabling Psi Re-use EVPSI & LAPSI Final Meeting
Privacy in the Digital Age: the UN General Assembly Resolution
Privacy and Public Policy Implications of IoT
Principles of Good Governance
GDPR (General Data Protection Regulation)
Security Standard: “reasonable security”
THE NEW GENERAL DATA PROTECTION REGULATION: A EUROPEAN OR A GLOBAL STANDARD? Bart van der Sloot Senior Researcher Tilburg Institute for Law, Technology,
Data Protection: EU & International
STRESS TESTS and TAIWAN PEER REVIEW PROCESS
Privacy: A Regulator’s Perspective
The activity of Art. 29. Working Party György Halmos
Is Data Protection a Fundamental Right Protecting the Individual?
The Impact of Digitization on Global Alignment of Product Safety Regulations ICPHSO International Symposium November 12, 2018.
Anishinabek Nation Child Well-Being
The EDPS: competences and processing of personal data in EU funds
eHealth/mHealth Gisele Roesems
Ontario’s privacy protective Philadelphia model governance framework
Presentation transcript:

IETF Plenary Monday 25 July 2011 Quebec City, Canada Privacy: A Regulator’s Perspective Fred Carter Senior Policy & Technology Advisor IPC/O

Who We Are Commissioner Ann Cavoukian, Ph.D.: –appointed by Ontario legislature –independent from government –oversees 3 privacy & access to information laws Mandated to: investigate privacy complaints resolve appeals from refusals to provide access to information ensure organizations comply with the access and privacy provisions of the Acts educate public about Ontario's access and privacy laws conduct research on access and privacy issues, provide advice and comment on proposed government legislation & programs.

Some Definitions… Information privacy refers to the right or ability of individuals to exercise control over the collection, use and disclosure by others of their personal information Personally-identifiable information (“PII”) can be biographical, biological, genealogical, historical, transactional, locational, relational, computational, vocational or reputational, and is the stuff that makes up our modern identity Personal information must be managed responsibly. When it is not, accountability is undermined and confidence in our evolving information society is eroded.

Safeguards Purpose Specification Collection Limitation Use, Retention and Disclosure Limitation Data Minimization Consent Accuracy Access Redress User Participation Accountability Openness Compliance Accountability (beyond data subject) Principles of Fair Information Practices:  Meta Principles

Applying privacy to information technologies and systems Minimize collection, use, sharing, and retention of PII (e.g., limiting purposes, collection, use, disclosure, and retention) Enhance data security (e.g., appropriate safeguards) Actively engage the individual in managing and controlling their PII (e.g., consent, accuracy, access, challenging compliance, etc.)

From PC to Web 4.0 Radar Networks & Nova Spivack, 2007 –

Challenges to Privacy Jurisdiction Technological sophistication Network and process complexity Accountability and compliance Preventing privacy harms

DPA Responses Develop independent technology evaluation capacity (e.g. IPC, Schleswig-Holstein et alia) Join Clubs (IWGDPT, ICDPPC, Art 29 WP, GPEN, etc.) Liaison and Standardization work (APEC, OECD, ISO, IETF, etc.) Advocacy (int’l Resolutions, Opinions, submissions)

Datenschutz Schleswig-Holstein Projects: EuroPriSe – European Privacy Seal PrimeLife – Privacy & Identity Management for Europe TClouds – Trustworthy Clouds Privacy and Resilience for Internet-scale Critical Infrastructure ABC4Trust – Attribute-based Credentials for Trust SSEDIC – Scoping the Single European Digital Identity Community BEST Network - Biometric European Stakeholder Network

IWGDPT Int’l Working Group on Data Protection in Telecommunications Mobile processing of Personal Data and Security Use of Deep Packet Inspection for Marketing Purposes Report and Guidance on Privacy in Social Network Services – “Rome Memorandum” Trusted Computing, Associated Digital Rights Management Technologies, and Privacy - Some issues for governments and software developers Privacy and Security in Internet Telephony (VoIP) Means and Procedures to Combat Cyber-Fraud in a Privacy-Friendly Way Potential privacy risks associated with wireless networks – Main Recommendations on a future ISO privacy standard on Telecommunications Surveillance Use of unique identifiers in telecommunication terminal equipments: the example of Ipv6 Source:

ICDPPC Int’l Conference of Data Protection and Privacy Commissioners Resolutions Jerusalem Resolution on Privacy by Design Madrid International Standards to Protect Personal Data and Privacy Observer representation before the IGF and ICANN Strasbourg Resolution on a Joint Proposal for Setting International Standards on Privacy and Personal Data Protection Resolution to Establish a Steering Group on Representation at Meetings of International Organizations

ICDPPC Montreal Resolution on International Cooperation Resolution on Development of International Standards London London Declaration Montreux Declaration of Montreux: "The Protection of Personal Data and Privacy in a Globalized World: A Universal Right Respecting Diversities" Wroclaw Resolution on a Draft ISO Privacy Framework Standard Sydney Resolution on Data Protection and International Organizations Source:

Article 29 Data Protection Working Party Established by Article 29 of Directive 95/46/EC Independent EU Advisory Body on Data Protection/Privacy Primary Objectives: –Provide expert opinion from member state level to the Commission on questions of data protection. –Promote the uniform application of the general principles of the Directives in all Member States through co-operation between data protection supervisory authorities. –Advise the Commission on any Community measures affecting the rights and freedoms of natural persons with regard to the processing of personal data and privacy. –Make recommendations to the public at large, and in particular to Community institutions on matters relating to the protection of persons with regard to the processing of personal data and privacy in the European Community.

Article 29 Data Protection Working Party Documents Adopted (selected): Recommendation on the respect of privacy in the context of interception of telecommunications Opinion on "Creating a safer information society by improving the security of information infrastructures and combating computer-related crime“ Opinion on the use of unique identifiers in telecoms terminal equipments: the example of IPV6 Opinion on the storage of traffic data for billing purposes Opinion on the use of location data with a view to providing value-added services Opinion on Geolocation services on smart mobile devices

Article 29 Data Protection Working Party Recommendation: Report and Guidance by the International Working Group on Data Protection in Telecommunications ("Budapest - Berlin Memorandum on Privacy on the Internet") Recommendation: Anonymity on the Internet Recommendation: Invisible and Automatic Processing of Personal Data on the Internet Performed by Software and Hardware Recommendation: preservation of traffic data by Internet Service Providers for law enforcement purposes Working document "Privacy on the Internet" - An integrated EU Approach to On-line Data Protection Working Document on on-line authentication services Opinion on the application of the data protection principles to the Whois directories Source:

Adoption of “Privacy by Design” Resolution October 29, 2010 – regulators from around the world gathered at the annual assembly of International Data Protection and Privacy Commissioners in Jerusalem, Israel, and unanimously passed a landmark resolution recognizing Privacy by Design as an essential component of fundamental privacy protection: Encourage the adoption of the principles of PbD as part of an organization’s default mode of operation; Invite Data Protection and Privacy Commissioners to promote PbD, foster the incorporation if its 7 Foundational Principles in privacy policy and legislation in their respective jurisdictions, and encourage research into PbD.

Privacy by Design: The 7 Foundational Principles 1.Proactive not Reactive; 2.Privacy as the Default setting; 3.Privacy Embedded into Design; 4.Full Functionality: Positive-Sum, not Zero-Sum; 5.End-to-End Security: Full Lifecycle Protection; 6.Visibility and Transparency: Keep it Open; 7.Respect for User Privacy: Keep it User- Centric.

Privacy by Design Foundations Proactive / Preventative By Default Embedded Positive Sum Full Functionality End to End Lifecycle Protection Visibility / Transparency Respect For Users Information Technology Accountable Business Practices Physical Design & Infrastructure

Message from Commissioner Ann Cavoukian, Ph.D.

Safeguards End to End Lifecycle Protection Data Minimization Privacy as the Default (Setting) User Participation Respect for User Privacy Accountability Openness & Transparency Leadership & Goal-Setting Proactive Not Reaction; Preventative Not Remedial Verifiable Methods Privacy Embedded into Design Quantitative Results Full Functionality – Positive-Sum, not Zero-Sum Meta-FIPs  PbD

Privacy by Design Broad, universal framework Applies to technologies, operations/processes, and networks/architectures/eco-systems. Beyond FIPs {+ Leadership + Methodology + Results) Closest Proxies: PIA and Risk Management methods

Privacy by Design: Recognition US DoC paper, FTC Staff report, Kerry-McCain bill, Buzz Consent Decree, et alia EU Reform of Privacy Directive; implementation of e-Privacy directive; RFID PIA and Smart Grid initiatives

Conclusions DPAs are attentive and engaged, but are only part of the solution International coordination and high-level standardization are underway Much collaboration and learning required among all stakeholders Privacy by Design is gaining ground as a high level normative framework / approach Work needed now to “operationalize” PbD and apply to information infrastructures, networked eco-systems and related engineering standards and protocols.

Questions? ???

How to Contact Us Fred Carter Senior Policy & Technology Advisor Information & Privacy Commissioner of Ontario 2 Bloor Street East, Suite 1400 Toronto, Ontario, CANADA M4W 1A8 Phone: (416) / Web: