The protection of digital identities in the context of big data analytics Harry Halpin OECD Technology Foresight Forum 23 October 2012 1.

Slides:



Advertisements
Similar presentations
Presentation to WTO/CTD Seminar on e-commerce Richard Bourassa Director, International Policy Director, International Policy Electronic Commerce Branch.
Advertisements

1 Collective Awareness Platforms "The views expressed in this presentation are those of the author and do not necessarily reflect the views of the European.
User-Managed Access UMA Work tinyurl.com/umawg | tinyurl.com/umafaq IIW 16, May
Digital Agenda Unleashing the Potential of Cloud Computing in Europe Ken Ducatel Head of Unit Software and Services, Cloud European Commission (Directorate.
Microsoft A Vision for Health. Consumerism/ Choice A Challenging World Public Health Healthcare spend increasing as % of GDP spend Increasing social cost.
The Italian Academic Community’s Electronic Voting System Pierluigi Bonetti Lisbon, May 2000.
Seven Key Factors in Competing with “Free” by Brad Hunt President, Digital Media Directions, LLC Digital Hollywood Santa Monica, California October 29,
Can Education and Training Save Low-wage Workers in the U.S.? Annette Bernhardt Brennan Center for Justice at NYU School of Law Featured Speaker The 15th.
ANEM Key dillema: how to survive in the media market and reduce the effects of the financial crisis.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Strand 1 Social and ethical significance. Reliability and Integrity Reliability ◦Refers the operation of hardware, the design of software, the accuracy.
Digital Identities for Networks and Convergence Joao Girao, Amardeo Sarma.
Privacy and Security Implications of Cloud Computing 17 November IGF Laurent Bernat - OECD.
Political and legal Barriers to Data Availability World Water Forum, Istanbul Andrew Allan Centre for Water Law, Policy and Science.
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
Given Connections Solution
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
NTIA Privacy Multistakeholder Meeting March 25, 2014 Amanda Koulousias, Attorney Division of Privacy and Identity Protection Federal Trade Commission FTC.
© Michael Lacewing Democracy Michael Lacewing
A Robust Health Data Infrastructure P. Jon White, MD Director, Health IT Agency for Healthcare Research and Quality
A national virtual reference service Gillian Hanlon, SLIC JISC Web2.0 Forum, 18 June 2010.
United States Department of Justice The goal : Enable justice information sharing and protect privacy.
Navigating the Maze How to sell to the public sector Adrian Farley Chief Deputy CIO State of California
The Federal Enterprise Architecture A Way Ahead on Information Sharing Bryan Aucoin Chief Technical Officer Enterra Solutions
© 2011 IBM Corporation Smarter Software for a Smarter Planet The Capabilities of IBM Software Borislav Borissov SWG Manager, IBM.
PRIME and MoodlePKI José Luis Villarig García Webmaster University of Zaragoza.
Delivering an Architecture for the Social Enterprise Alpesh Doshi, Fintricity Information Age Social&Mobile Business Conference Tuesday 31st January 2012.
The Role of the OECD in Shaping the Future of the Digital Economy USCIB/BIAC/OECD Conference Andrew Wyckoff Director STI 10 March 2014.
Results of audit “Quality of public services in the information society” Markko Kard Alo Lääne The 9th Annual Meeting of the Representatives of the Baltic,
Grid – Path to Pervasive Adoption Mark Linesch Chairman, Global Grid Forum Hewlett Packard Corporation.
New Global Media and the Role of the State Book review of “ The handbook of new media” Qiong Tang Course: Internet and New Media.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2011 Lecture 11 09/27/2011 Security and Privacy in Cloud Computing.
Enabling Shared Context Anne Thomas Manes Director Market Innovation W3C Web Services Workshop.
The internet in Adrian Whitchurch Manager, European Regulation BT Brussels.
Privacy Communication Privacy Confidentiality Access Policies Systems Crypto Enforced Computing on Encrypted Data Searching and Reporting Fully Homomorphic.
Fair Use By Design or By Law? Stefan Bechtold Stanford Law School / University of Tübingen, Germany April 16, 2002.
Location, Location, Location: The Emerging Crisis in Wireless Data Privacy Ari Schwartz & Alan Davidson Center for Democracy and Technology
Exposing electronic resources: the Information Environment Service Registry Amanda Hill MIMAS.
The economics of privacy and surveillance: assessing the social costs and benefits Vicki Nash Oxford Internet Institute Web Science June 2015.
Cloud Computing, Policy Management and Standardization Europe Identity Conference 2011 John Sabo, Director Global Government Relations, CA Technologies.
Middleware CAMP Day 2. Current Research Research that develops th e…
On Requirements for Mobile Commerce By Aj.Pongthep Termsnguanwong.
DIGITAL SIGNATURE.
Facilitating Access and Reuse of Research Materials: the Case of The European Library Nuno Freire The European Library RESAW Seminar December 2013.
The ERA of API in the World of IoT Jing Zhang-Lee November, 2015.
Justin Richer The MITRE Corporation October 8, 2014 Overview of OAuth 2.0 and Blue Button + REST.
Internet of Things in Industries
User-Managed Access Eve Maler, UMA Work Group | tinyurl.com/umawg 9 December
Strategic Agenda We want to be connected to the internet……… We may even want to host our own web site……… We must have a secure network! What are the.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
The Impact Of Social Media In Healthcare 3rd National Consumer Driven Healthcare Summit October 20, 2008 Fard Johnmar Founder Envision Solutions, LLC w:
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
Connect with customers ModernBiz Solution Selling Scenarios.
IoT R&I on IoT integration and platforms INTERNET OF THINGS
CMC Conference 2004 – Internet Governance
The Acceptable Use of Technology
And I think to myself What a wonderful world…
RIGHT ON PRIVACY IN THE REPUBLIC OF SERBIA
Global Data Protection and Privacy
Microsoft Word 2010 Lesson 6 – Part 2
Markus Kummer Executive Coordinator
S/MIME T ANANDHAN.
Enhancing Web Application Security with Secure Hardware Tokens
1/3/2019 1:47 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS.
Single Sign-On (SSO) Authentication
18734: Foundations of Privacy
Legal Aspects of an e-Signature
Microsoft Word 2010 Lesson 6 – Part 6
Presentation transcript:

The protection of digital identities in the context of big data analytics Harry Halpin OECD Technology Foresight Forum 23 October

2 There are real-life consequences Of data analytics and regulations

Technical Solutions do not work by themselves Technical Solutions do not work by themselves Mathematically impossible to truly anonymize large data Mathematically impossible to truly anonymize large data Signals for user-intent (Do-Not-Track) require co-operation Signals for user-intent (Do-Not-Track) require co-operation of the analytics How to even retrieve your personal data from the cloud? How to even retrieve your personal data from the cloud? Legal solutions have to be based in technology Legal solutions have to be based in technology Cost is very high to remove content from large data. Cost is very high to remove content from large data. Users often can't understand their consent to terms-of-service legal contracts, and these contracts often cannot be enforced technically. Users often can't understand their consent to terms-of-service legal contracts, and these contracts often cannot be enforced technically. We can't turn back the clock.. We can't turn back the clock.. Large data has revolutionary consequences for individual users and wider society beyond just advertisements Large data has revolutionary consequences for individual users and wider society beyond just advertisements Carbon emissions, health, scientific discovery Carbon emissions, health, scientific discovery 3 Yet currently you do not control your data Who does? Can you?

– 4 Policy must become technological Technology then becomes policy

1.The current identity standards fragmentation (OpenID Connect, Mozilla Personae, Facebook Connect) 2.The need for secure digital signatures and better cryptography for high-value data: See W3C Web Cryptography API. 3.The need to secure the Web in general: W3C Web Application Security Working Group and IETF Web Security/JOSE groups. 1. Need to co-ordinate national-level attempts (NSTIC, India) with global open standard-bodies 5 Standards are the Key!

6 The value of data is inherently collective, not individual. The Web becomes the Web of Data

7 Enabling the protection of identity while allowing value to be created Think Answers to Questions, Not Collecting Large Data