Privacy by Design 2014-04-24.

Slides:



Advertisements
Similar presentations
Identifying Data Protection Issues Developing Lifelong Learner Record Systems and ePortfolios in FE and HE: Planning for, and Coping with, Legal Issues.
Advertisements

The data retention directive: data protection aspects Frank Robben General manager Crossroads Bank for Social Security Sint-Pieterssteenweg 375 B-1040.
Introduction to basic principles of Regulation (EC) 45/2001 Sophie Louveaux María Verónica Pérez Asinari.
TEAM 4 Case Study Mauritius: Mrs Nandini Kissoon-Luckputtya
The Data Protection (Jersey) Law 2005.
Getting data sharing right for every child
Data Protection & Freedom of Information The Practical Implications of Data Protection and Freedom of Information Caroline Dominey Data Protection Officer.
1 Pertemuan 7 Points of Exposure Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
University of Sunderland Professionalism and Personal Skills Unit 11 Professionalism and Personal Skills Computer Legislation.
Duncan Woodhouse – Assistant Registrar for Information Security, Risk Management and Business Continuity Helen Wollerton – Administrative Officer (Legal.
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Attorney at the Bars of Paris and Brussels Database exploitation & Data protection Thibault Verbiest Amsterdam 1 April 2005
Data Protection Overview
 The Data Protection Act 1998 is an Act of Parliament which defines UK law on the processing of data on identifiable living people and it is the main.
Data Protection for Church of Scotland Congregations
The Information Commissioner’s Office David Evans.
EHRs and the European Union – current legislation and future directions. Dr Richard Fitton.
Research Paper Presentation Software Engineering in agent systems.
Computers, the law and ethics  Lesson Objective: Understand some of the legal & ethical issues in developing computer systems  Learning Outcome: Know.
The Data Protection Act 1998 The Eight Principles.
Data Protection: An enabler? David Freeland, Senior Policy Officer 23 October 2014.
GEOG3025 Confidentiality and social implications.
Data Protection Corporate training Data Protection Act 1998 Replaces DPA 1994 EC directive 94/46/EC The Information Commissioner The courts.
Processing personal health data: the regulator’s perspective Ken Macdonald Assistant Commissioner Information Commissioner’s Office.
Information Commissioner’s Office Sheila Logan Operations and Policy Manager Information Commissioner’s Office Business Matters 20 May 2008.
The Data Protection Act - Confidentiality and Associated Problems.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
Local Government Reform and Compliance with the DPA Ken Macdonald Assistant Commissioner (Scotland & Northern Ireland) Information Commissioner’s Office.
Legal issues The Data Protection Act Legal issues What the Act covers The misuse of personal data By organizations and businesses.
Data Protection Property Management Conference. What’s it got to do with me ? As a member of a management committee responsible for Guiding property you.
The Data Protection Act What the Act covers The misuse of personal data by organisations and businesses.
Twelve Guiding Principles for the Regulation of Surveillance Camera Systems Presented by: Alastair Thomas Date: 23 rd October 2013.
Data Protection - Rights & Responsibilities Information Commissioner’s Office Orkney Practice Forum 4 th July 2007.
Data Protection Act The Data Protection Act (DPA) is a balance between rights of the DATA SUBJECT and obligations of the DATA CONTROLLER DATA CONTROLLER.
Fred Carter Senior Policy & Technology Advisor Information and Privacy Commissioner Ontario, Canada MISA Ontario Cloud Computing Transformation Workshop.
Computing, Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
Data Protection and research Rachael Maguire Records Manager.
DATA PROTECTION ACT INTRODUCTION The Data Protection Act 1998 came into force on the 1 st March It is more far reaching than its predecessor,
DATA PROTECTION ACT DATA PROTECTION ACT  Gives rights to data subjects (i.e. people who have data stored about them on a computer)  Information.
Session 11 Data protection. 1 Contents Part 1: Introduction Part 2: Applicability and responsibility Part 3: Our procedures on data protection Part 4:
© University of Reading Lee Shailer 06 June 2016 Data Protection the basics.
The EU General Data Protection Regulation Frank Rankin.
Security of, privacy of and access to personal/confidential information/data.
Getting data sharing right for every child Maureen H Falconer Senior Policy Officer Information Commissioner’s Office.
Workshop Understanding your responsibilities under the Data Protection Act 1998 and the Freedom of Information Act 2000 Adele Rhodes Girling.
Data protection—training materials [Name and details of speaker]
Uses of brain imaging data: privacy and governance implications Dr. Hester Ward Medical Director, Information Services Division, (ISD) Consultant in Public.
Presented by Ms. Teki Akuetteh LLM (IT and Telecom Law) 16/07/2013Data Protection Act, 2012: A call for Action1.
Clark Holt Limited (Co. No ), Hardwick House, Prospect Place, Swindon, SN1 3LJ Authorised and regulated by the Solicitors Regulation.
The Data Protection Act 1998
The Data Protection Act 1998
Making the Connection ISO Master Class An Overview.
CISI – Financial Products, Markets & Services
Trevor Ellis Trainee Programmer (1981 – 28 years ago)
Level 2 Diploma in Customer Service
Privacy Impact Assessments (PIAs)
General Data Protection Regulation
Data Protection Act.
The Data Protection Act 1998
Data Protection Update – GDPR or bust
Data Protection & Freedom of Information- An Introduction
6 Principles of the GDPR and SQL Provision
G.D.P.R General Data Protection Regulations
General Data Protection Regulation
Data Protection principles
General Data Protection Regulations 2018
Welcome IITA Inbound Insider Webinar: An Introduction to GDPR
Dr Elizabeth Lomas The General Data Protection Regulation (GDPR): Changing the data protection landscape Dr Elizabeth Lomas
Presentation transcript:

Privacy by Design 2014-04-24

Jan Wellergård Personal Data Representative (sv. Personuppgiftsombud / Data Protection Officer for TeliaSonera’s Swedish entities (2005) Security Director for IT Support System in Group Technology Board Member of Forum för Dataskydd Security Consultant (97-00) Telia.se Jan Wellergård

Agenda Putting Privacy by Design into context Walk-through of the 7 principles of Privacy by Design Relate to law/regulation Some lessons learned Q&A Jan Wellergård

Impact of failing to protect Personal Data Survey done by Askus and Handelshögskolan looking at the reaction from shareholders, customers and the public to certain practises seen as ethical or unethical. They also measured the effect of mitigating actions 10.000 answers Result was a risk index from -100 to +100 showing the potential effect for reputation Child labour gave a risk index of: Positive communication (PR) increase of 17 Concrete action (on site), increase of 29 Resell or transfer of customer data gave a risk index of: Positive communication (PR), no increase Concrete actions, no increase Consent, increase of 28 -70 Jan Wellergård Showed a significant difference of views between senior management and public -68 http://www.aftonbladet.se/debatt/article17642749.ab http://www.crossnet.se/iva/20131119NR_1500/index.html

What does this mean? Reduce the risk and impact of failing to protect data Minimize the volume of data don’t process data not needed remove unneeded data Make processing secure Implementing “adequate” security measures Don’t forget manual processes Put the user in the drivers seat Let user feel that he/she is in control of its personal data Inform the user This needs to be considered throughout the system lifecycle, starting from the business case, via acquisition / development, go-live (start collection of data), change management and decommission. => Privacy By Design Jan Wellergård

Current laws Data Protection Directive 95/46/EC Personuppgiftslagen (PuL) (SFS 1998:204) Lov om behandling av personopplysninger Personuppgiftslag (22.4.1999/523) Etc. Directive on Privacy and Electronic Communication (2002/58/EC) Data Retention Directive (2006/24/EC) Telecoms Package and Cookie directive 2009/136/EC Freedom of Information (“Offentlighetsprincipen”) Specific laws on certain registers or processing In order to comply, one needs a systematic approach throughout the system lifecycle. => Privacy By Design Jan Wellergård

Some terms used in Data Protection Processing (of personal data) – All actions made on data (collecting, updating, disclosing, deletion) Subject – A registered person Controller - The legal entity responsible for the processing Processor – The legal entity processing data on behalf of the Controller (outsourcing partner) Jan Wellergård

8 Principles (UK–act) Personal data shall be processed fairly and lawfully and, in particular, shall not be processed unless have legitimate grounds have no adverse effects being transparent of what you are to do with the data Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes. Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed. Personal data shall be accurate and, where necessary, kept up to date. Personal data processed for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes. Personal data shall be processed in accordance with the rights of data subjects under this Act. Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data. Personal data shall not be transferred to a country or territory outside the European Economic Area unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data. Jan Wellergård

7 Foundational Principles PbD Ann Cavoukian, Ph.D - Information & Privacy Commissioner Ontario, Canada http://www.privacybydesign.ca 1. Proactive not Reactive; Preventative not Remedial. 2. Privacy as the Default Setting 3. Privacy Embedded into Design 4. Full Functionality — Positive-Sum, not Zero-Sum 5. End-to-End Security — Full Lifecycle Protection 6. Visibility and Transparency — Keep it Open 7. Respect for User Privacy — Keep it User-Centric Jan Wellergård

1. Proactive not Reactive; Preventative not Remedial Clear boundaries Privacy Policy (what is our view of Privacy?) Legal/Regulatory requirements Best practices (look at other EU/EES countries) Privacy Impact Assessment (PIA) GDPR (Data protection impact assessment) on PIAs Regulation from PTS Jan Wellergård More on PIAs Putting the risk of the subject in focus not the risks of the company Detailed information mapping What data is to be processed, How will data be collected, How will it be processed? Flow of data? Disclosures? Security and quality measures in place? Relevant legislation (legal requirements) and internal policies Assess risks, decide, monitor Integrate PIA with “normal” Risk Management in projects / maintenance

2. Privacy as the Default Setting Users get the maximum privacy at start, no configuration needed Default rules! (People are lazy ; Complicated to set the correct parameters) Users ”opt-in” to share data or to allow processing of data Conflict of the business benefit of processing data and privacy (marketing etc) Jan Wellergård

3. Privacy Embedded into Design Minimize the personal data used Use other, less sensitive data (if possible), aggregate-delete Avoid sensitive data such as personal number/SSN Cater for Subject Access Requests Metadata (browser fingerprints) Can be more sensitive than content Loss of metadata (when can we delete, obsolete data) User customization how personal data is used Use defined values instead of free-text fields (avoiding less appropriate data to be entered, and quality issues). How do we inform the customer and how do we get consent? Jan Wellergård

4. Full Functionality — Positive-Sum, not Zero-Sum By being more creative, one can find measures to reduce the privacy risks Functional/system domains Go strictly for the objective Automated License Plate Recognition Examples of risks Metadata like Audit logs (dual use) Systems are by default very capable (risk of misuse) Jan Wellergård We don’t choose between functionality or Privacy ; Security or Privacy Metadata like Audit logs (dual use) + Prohibits misuse of data of the subject, monitoring of the system - Tracks the employees (performance measurement)

5. End-to-End Security — Full Lifecycle Protection Strong access management procedures Only grant access to those who need – review Tailor Access Control profiles to the tasks of the user Encryption in transit and at rest Purge/Culling/Deletion of personal data Clear understanding of the purpose of the system Removal/Deletion/Archiving Deletion vs. Anonymization Using PII as keys (like customer ID) in the DB How much data do we need to remove? Having control over changes (scope creep) Jan Wellergård Always base the security on a risk assessment and/or PIA Look at local guidance of your Data Protection Authority

6. Visibility and Transparency — Keep it Open Publish (or be open) with PIAs Openness on what we do with the data (Privacy Policy, www.telia.se/sakerhet - Plain English What data to we have, what do we do with it, etc? Legal requirement! Independent Audits & Certifications Jan Wellergård

7. Respect for User Privacy — Keep it User-Centric Connect with usability. The system is usable when the user gets control over its personal data. User friendly options Good oversight Google Dashboard https://www.google.com/settings/datatools Yahoo! Privacy Centre Automate Subject Request Access Facebook Archive Dump Google Federated user management (sharing data with other application) Facebook Apps Risk of “Consent fatigue” Jan Wellergård

Questions? Jan Wellergård

More reading http://www.privacybydesign.ca/content/uploads/2013/01/operationalizing-pbd-guide.pdf http://www.datainspektionen.se/lagar-och-regler/personuppgiftslagen/inbyggd-integritet-privacy-by-design/ Jan Wellergård

Links if you have a lot of time on your hands http://ico.org.uk/for_organisations/data_protection/topic_guides/privacy_by_design http://www.iva.se/press/Aktuellt/Hog-moral-kan-bli-svensk-konkurrensfordel/ http://www.slideshare.net/IVA1919/reputational-risks# http://cyberlaw.stanford.edu/wiki/index.php/PET Jan Wellergård

Contact Visit us on www.dpforum.se or e-mail info@dpforum.se Forum för dataskydd is also present on; DPForumSwe Forum för Dataskydd jan_wellergard http://www.linkedin.com/in/jankw Jan Wellergård