The Perception of Privacy Risk Gerald W. Gates Chief Privacy Officer U.S. Census Bureau.

Slides:



Advertisements
Similar presentations
Symantec 2004 Pulse of IT Security in Canada Volume II Survey shows Increases in Concern and Spending for IT Security Andrew Bisson Director, Planning.
Advertisements

Slide 1 Insert your own content. Slide 2 Insert your own content.
1 of 17 Information Strategy The Features of an Information Strategy © FAO 2005 IMARK Investing in Information for Development Information Strategy The.
1Role of Metadata Role of Metadata in Data Dissemination Presented at the UN Regional Seminar on Census Data Dissemination and Spatial Analysis Motale.
Integrating the NASP Practice Model Into Presentations: Resource Slides Referencing the NASP Practice Model in professional development presentations helps.
Statistical disclosure limitation: Balancing data confidentiality and data access.
The Role of Research at the PCAOB
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
0 - 0.
MULT. INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Addition Facts
[Your District's] Comprehensive Guidance Program: Linking School Success with Life Success 1 [Your District’s] Comprehensive Guidance Program Responsive.
Session 19: Individual Presentations. TimeFriday Day fives objectives Individual Presentations Individual.
EMS Checklist (ISO model)
Risk Management Awareness Presentation
Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security.
Privacy Reporting and Investment Certification TRICARE Management Activity HEALTH AFFAIRS 2009 Data Protection Seminar TMA Privacy Office.
Vaccines & Antivirals: Provincial Stockpile & Distribution Plans Pandemic Planning Education Day for Community Laboratories Joanne Rey, Vaccine and Antiviral.
Health Telematics Unit Global e-Health Research and Training Program The Alberta SuperNet – Impact on Health Services Delivery Dr. Penny Jennett – Principle.
Information Privacy and Data Protection Lexpert Seminar David YoungDecember 9, 2013 Breach Prevention – Due Diligence and Risk Reduction.
IPM THEORY CHALLENGE QUIZ NUMBER 3 Unit 3 Outcome 3.
8/25/20141 Portable/mobile devices and privacy in Local Government Dr Anthony Bendall Acting Victorian Privacy Commissioner.
Understanding NIMS IS-700.A – January 2009 Visual 2.1 Understanding NIMS Unit 2.
Copyright © eHealth Initiative, 2006 Physicians and Health Information Exchange (HIE) The Doctor-Patient Relationship Privacy and Information Sharing.
Addition 1’s to 20.
Test B, 100 Subtraction Facts
1 Protecting the Long Island Business Community A Public Safety Partnership.
1 What is Your Security IQ?. 2 Introduction: Exercise.
NUDGING FOR BETTER HEALTH: IS THERE A ROLE FOR REGULATION? Associate Professor Anne-Maree Farrell Australian Research Council Future Fellow Faculty of.
IS-700.A: National Incident Management System, An Introduction
TWG 2/27/03 # 1 A FEW THOUGHTS on MONITORING STUDIES for COLORADO RIVER in THE GRAND CANYON N. Scott Urquhart STARMAP Program Director Department of Statistics.
Screen 1 of 20 Reporting Food Security Information Reporting for Results Learning Objectives At the end of this lesson you will be able to: understand.
Abuse Prevention and Response Protocol.
S3-1 © 2001 Carnegie Mellon University OCTAVE SM Process 3 Identify Staff Knowledge Software Engineering Institute Carnegie Mellon University Pittsburgh,
National Science Foundation Division of Science Resources Statistics May The Confidential Information Protection and Statistical Efficiency Act.
1 Bernie LaSalle Biomedical Informatics Dept University of Utah CCTS.
Identity Management In A Federated Environment Identity Protection and Management Conference Presented by Samuel P. Jenkins, Director Defense Privacy and.
S2-1 © 2001 Carnegie Mellon University OCTAVE SM Process 2 Identify Operational Area Management Knowledge Software Engineering Institute Carnegie Mellon.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
Chief Information Officer Branch Gestion du dirigeant principal de l’information “We will have a world class public key infrastructure in place” Prime.
29 May 2006RNSA Workshop 1 Social Implication of National Security RNSA Workshop The risk of public data availability on critical infrastructure protection.
The Role of Computers in Surveillance ~ Katie Hatland.
Data Protection in Higher Education: Recent Experiences in Privacy and Security Institute for Computer Law and Policy Cornell University June 29, 2005.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Research Methods for the Social Sciences: Ethics Ryan J. Martin, Ph.D. Thomas N. Cummings Research Fellow March 9, 2010.
Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9.
Factors affecting contractors’ risk attitudes in construction projects: Case study from China 박병권.
United States Department of Justice The goal : Enable justice information sharing and protect privacy.
Regional Seminar on Census Data Archiving for Africa, Addis Ababa, Ethiopia, September 2011 Overview of Archiving of Microdata Session 4 United Nations.
REPUTATION MANAGEMENT FOR TARGET AUDIENCES Some Recent Attacks on the Census Bureau Prepared by Kenneth C. Meyer United States Census Bureau.
BUSINESS B1 Information Security.
The 2009 HIMSS Security Survey: Insights into the Status of Healthcare Security Implementation sponsored by Symantec Meeting of the HIT Standards Committee,
BJS The Role of Confidentiality in Collecting Statistical Information Jan M. Chaiken Bureau of Justice Statistics U.S Department of Justice May 31, 2000.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Data Challenges UNITED NATIONS SECRETARY-GENERAL’S STUDY ON VIOLENCE AGAINST CHILDREN.
Human Subjects Protections Research Ethics. Basic Assumptions about How Research Should be Conducted Subjects should be protected from harm. Subjects.
ASEF Risk Communication for Public Health Emergencies, 2015 Overview.
FORUM GUIDE TO SUPPORTING DATA ACCESS FOR RESEARCHERS A STATE EDUCATION AGENCY PERSPECTIVE Kathy Gosa, Kansas State Department of Education.
Breakaway Session 2: Data Protection and The Role of the Data Protection Supervisor Michael Mingle Director, NTSS Solutions (UK) D ATA P ROTECTION C ONFERENCE.
2 United States Department of Education, Privacy Technical Assistance Center 1 Western Suffolk BOCES Data Breach Exercise.
Protection of Personal Information Act An Analysis on the impact.
Computer Security and the “H” word Glen Klinkhart, CEO Mike Messick, CTO.
Managing Trust Professor Richard Walton CB. Exam Question The importance of Trust in Data Protection (This essay should discuss the relationship between.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Purpose Review and discuss the IT Policy and Procedure for Incident Handling and Response. Topics Incident Management Policy Incident Response Procedure.
SEC 120 Become Exceptional/ newtonhelp.com. SEC 120 Week 1 Journal Entry For more course tutorials visit Throughout this course you.
The Circle of Trust Greg Hungerford.
Introduction to Health Privacy
Presentation transcript:

The Perception of Privacy Risk Gerald W. Gates Chief Privacy Officer U.S. Census Bureau

2 Purpose Describe what we know about public perceptions of privacy Discuss the role that technology and statistics play in influencing these perceptions, and Present five issue areas that require further study

3 Assumptions Privacy, confidentiality, or security measures may be perceived to be insufficient Statistical methodology and technology play important roles in the perception of privacy Perceptions can be influenced by trust relationships and openness Managing perception has not been a priority

4 Confidentiality Privacy Security Reality Misperception

5 Major U.S. Privacy Concerns ID theft Data mining Security breaches Wireless technologies

6 What Is Influencing Privacy Attitudes? Fear Mistrust Misunderstanding Loss of control

7 How Is It Manifested in Surveys? Too sensitive questions (dont believe data will be protected) None of your business (dont understand the purpose) Cant trust them (bad previous experience or bad information) No one looking out for me (only benefits the other guy)

8 Recent Privacy Perceptions Involving Statistics Canadian record linkage incident 2000 census long form response NASA research on airline passengers Arab American tabulations for U.S. Department of Homeland Security

9 What Are the Potential Consequences? Declining response rates Increased costs Deteriorating data quality Restrictions on access

10 TechnologyPart of The Perception Problem The Webloss of control/identity theft/data availability Data mining and record linkage government surveillance Surveillance toolsRFID, national ids, DNA scans

11 StatisticsPart of the Perception Problem Methodologies facilitate bad uses of the technology (e.g. mining of voting records) Group data can be misused Methodologies are hard for public to understand

12 TechnologyPart of the Solution Security (encryption, biometrics, firewalls) limits breaches Privacy (quality control can limit false positives in data mining) Confidentiality (disclosure limitation methodologies limit risk of disclosure)

13 StatisticsPart of the Solution Measuring and monitoring attitudes and behaviors Policies to address legal and ethical issues Reducing reporting burden on respondents Messages to appeal to privacy interests Preparing for privacy scenarios

14 Issues From March 2005 Workshop in Santa Cruz 1.Do statisticians have discretion on collecting/disseminating? 2.What role do statisticians have in preventing inferential harm? 3.What role do stakeholders play in affecting perceptions?

15 Issues from March 2005 Workshop in Santa Cruz 4.Can statisticians influence the use of technologydiscourage negative uses? 5.How can we prepare for privacy events and learn from them?

16 Conclusions Privacy perceptions have statistical offices on the defensive We need to study how privacy perceptions influence response and how messages delivered though various means impact these perceptions Openness and transparency are critical