Specifying Personal Privacy Policies to Avoid Unexpected Outcomes George Yee and Larry Korba {George.Yee, PST 2005 October 12-14, 2005.

Slides:



Advertisements
Similar presentations
EXPERIENCES OF OTHER COUNTRIES IN REGULATION OF PAYMENT CARDS SYSTEM This section reviews the regulatory experiences of other countries with respect to.
Advertisements

CHAPTER 25 Checking Accounts. CHAPTER 25 Checking Accounts.
Presented by: Blue Green Systems. Inspiration Why people buy/sell online  Convenience  Better Prices  Variety  Fewer Expenses  Comparison of Prices.
1 of : Multi-Currency Payments / DA0813 Last updated: Project Walkthrough: Multi-Currency Payments Multi-Currency Payments.
 Management has become a multi-faceted complex task involving:  Storage Management  Content Management  Document Management  Quota Management.
Lock Out/Tag Out Training Lock-Out/Tag-Out OSHA Definition. Lockout/Tagout (LOTO) refers to specific practices and procedures to safeguard employees.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
2012 National APSE Conference Lisa Mills, Consultant on Employment Systems Change and Medicaid Waiver Employment Services.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Minding Your Own Business The Platform for Privacy Preferences Project and Privacy Minder Lorrie Faith Cranor AT&T Labs-Research
 Main Benefit: › The main benefit that is occurred by introducing a new system to work with or instead of the old system, is the forms of cost saving.
SANTA ROSA DISTRICT SCHOOLS , Internet, and Social Media Acceptable Use and Risk Policy 1.
1 Authentication Trustworthiness The Next Stage in Identity-Based Access and Security Tom Board, NUIT.
HIPAA Security Standards What’s happening in your office?
Analysis of privacy risks and measurement of privacy protection in Web Services complying with privacy policy Prepared by Ashif Adnan, Omair Alam, Aktar-uz-zaman.
PPA 503 – The Public Policy Making Process Lecture 7c – How to Ask for Action or Propose Policy on Behalf of a Group.
Using Digital Credentials On The World-Wide Web M. Winslett.
Implementing P3P Using Database Technology Rakesh Agrawal Jerry Kiernan Ramakrishnan Srikant Yirong Xu Presented by Yajie Zhu 03/24/2005.
1 of 6 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Chapter 10 Boundary Controls. Cryptographic Controls Cryptology is the science of secret codes Cryptography deals with systems for transforming data into.
Displaying privacy information with icons Leif-Erik Holtz Marit Hansen PrimeLife / IFIP Summer School 2010 Helsingborg, August 6th, 2010.
Negotiated Privacy and Security Policies for Web Services George Yee (Joint work with Larry Korba)
1 of 7 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
HTTP HyperText Transfer Protocol Part 3.
1 The World Wide Web. 2  Web Fundamentals  Pages are defined by the Hypertext Markup Language (HTML) and contain text, graphics, audio, video and software.
Hippocratic Databases Paper by Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, Yirong Xu CS 681 Presented by Xi Hua March 1st,Spring05.
Introducing HTML & XHTML:. Goals  Understand hyperlinking  Understand how tags are formed and used.  Understand HTML as a markup language  Understand.
Standards and Guidelines for Web Page Publishing December 9, 2009.
An OWL based schema for personal data protection policies Giles Hogben Joint Research Centre, European Commission.
© Chery F. Kendrick & Kendrick Technical Services.
Practical Information Management
ONLINE TRACKING INCIDENT SYSTEM Health Standards Section October 2010.
P3P A New Standard in Online Privacy Overview and Demos from Summer 2000.
An XPath-based Preference Language for P3P IBM Almaden Research Center Rakesh Agrawal Jerry Kiernan Ramakrishnan Srikant Yirong Xu.
Spring Semester 2009 IT Policy and Technology: Japan and Global IT Environment 世界のなかの日本としての IT 政策と技術 Jun Murai Masaaki Sato Jun Takei May 21, Privacy.
1 © Netskills Quality Internet Training, University of Newcastle Introducing XML © Netskills, Quality Internet Training University.
The Data Protection Act 1998 The Eight Principles.
Microsoft ® Office Access ® 2007 Training Datasheets II: Sum, sort, filter, and find your data ICT Staff Development presents:
How P3P Works Lorrie Faith Cranor P3P Specification Working Group Chair AT&T Labs-Research 4 February 2002
Feature Interactions in Policy-Driven Privacy Management George Yee Larry Korba Network Computing Group Institute for Information Technology National Research.
Cryptography, Authentication and Digital Signatures
HTTPA (Accountable Hyper Text Transfer Protocol) PhD Proposal Talk Oshani Seneviratne DIG, MIT CSAIL May 31, 2011.
Disclosure risk when responding to queries with deterministic guarantees Krish Muralidhar University of Kentucky Rathindra Sarathy Oklahoma State University.
1 Personalization and Trust Personalization Mass Customization One-to-One Marketing Structure content & navigation to meet the needs of individual users.
Professionalism/Customer Service in the Health Environment Communications and Professionalism This material Comp16_Unit9 was developed by The University.
From P3P to Data Licensing Cha, Shi-Cho ( 查士朝 ) and Joung, Yuh-zer ( 莊裕澤 ) Dept. of Information Management Nation Taiwan University, Taipei, Taiwan
Why Software Developers Should Support a New, Limited Patent Dr. Lee A. Hollaar Professor, School of Computing University of Utah
U.S. Department of Commerce Web Advisory Group Minding Your Own Business The Platform for Privacy Preferences Project.
By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.
Component 16- Professionalism/Customer Service in the Health Environment Unit 9- Personal Communications and Professionalism This material was developed.
Society & Computers PowerPoint
Family Connection Collaborative Webs A Tool for Creating and Managing Web sites.
De-anonymizing Genomic Databases Using Phenotypic Traits Humbert et al. Proceedings on Privacy Enhancing Technologies 2015 (2) :
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
ISO 9001:2015 Subject: Quality Management System Clause 8 - Operation
Section 3: Banking Services
Ad-hoc Lists / Opt-In Problem Definition Access rules for many applications and services cannot be derived from an authoritative source and must therefore.
CMPE 494 Service-Oriented Architectures and Web Services Platform for Privacy Preferences Project (P3P) İDRİS YILDIZ
Retail & Service 1. 2 The Retail & Service industry encompasses a wide variety of businesses. This segment includes: Businesses engaged in selling goods.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Understanding Privacy An Overview of our Responsibilities.
How P3P Works Lorrie Faith Cranor P3P Specification Working Group Chair AT&T Labs-Research 4 February
Introduction to Networking
Unit 224 (B&A 36): Principles of providing administrative services
PLAGIARISM! What is it? How do I avoid it?.
The Health Insurance Portability and Accountability Act
FUNDAMENTAL SOCIAL RIGHTS IN EU
Presentation transcript:

Specifying Personal Privacy Policies to Avoid Unexpected Outcomes George Yee and Larry Korba {George.Yee, PST 2005 October 12-14, 2005

Overview Introduction Privacy policies and e-services Unexpected outcomes Preventing unexpected outcomes Conclusions and future research

Introduction Drivers for personal privacy policies –Growth of the Internet greater consumer exposure to e-services growth of consumer awareness to lack of privacy –Privacy legislation greater consumer awareness of privacy rights Privacy policies on the Internet –Posted privacy policies –P3P privacy policies for web sites Browser plug-in allows checking of personal privacy preferences against web site’s policy “Privacy Bird”: check preferences, display policy in easy to understand language, customizable warnings

Privacy policies and e-services Consumer privacy policy Necessary content implied by privacy legislation (minimal policy) Simple so that it can be understood by the average e- service consumer Machine processable, e.g. using XML-based language such as APPEL Provider has its own policy Policy Use: E-learning Owner: Alice Consumer Proxy: No Valid: unlimited Collector: Any What: name, address, tel Purposes: identification Retention Time: unlimited Disclose-To: none Collector: Any What: Course Marks Purposes: Records Retention Time: 2 years Disclose-To: none { { { Header Privacy Rule

Privacy policies and e-services Privacy Management Model –Consumer & provider each have a privacy policy –Prior to engaging a service, privacy policies are exchanged between consumer and provider to see if they match –Provider requests private data according to it’s privacy policy –Consumer may resist any privacy reduction may only be willing to provide private data according to her preferences –A match between policies occurs if in the respective policies, Otherwise, there is a mismatch. privacy reduction allowed by consumer ≥ privacy reduction required by provider

Privacy policies and e-services Policy mechanics –A privacy policy is considered upgraded (downgraded) if the new version represents more (less) privacy than the prior version. –Where time is involved, a private item held for less time is considered more private*. *as long as it is thoroughly expunged!

Unexpected outcomes Interested in outcomes from the matching of privacy policies arising from: –How the match was obtained –Matching policy content Outcomes: How the matching was obtained: –A match may have been obtained through an upgrade/downgrade (during negotiation) Upgrade: provider required too much user privacy reduction; provider upgrades its policy (more privacy via less private data) Unexpected outcome: private data left out may lead to extra costs, e.g. leaving out credit card requirement leads to more costly means of payment

Unexpected outcomes Downgrade: mismatch due to consumer policy allowing too little privacy reduction so consumer downgrades her policy (less privacy) to give more private data to the provider More examples in paper… Unexpected outcome: extra private data leads to provider needing to put more costly data protection safeguards in place, e.g. highly sensitive health information

Preventing unexpected negative outcomes: Need “well-formed” policies Definition 1: Unexpected negative outcome The use/development of privacy policies such that a) the outcome is unexpected by both provider and consumer, and b) the outcome leads to either provider and/or consumer experiencing some loss, which could be private information, money, time, convenience, job, etc., including serious losses.

Preventing unexpected outcomes Definition 2: A well-formed (WF) privacy policy (for either consumer or provider) is one that does not lead to unexpected negative outcomes. Definition 3: A near well-formed (NWF) privacy policy is one in which the attributes valid, collector, retention time, and disclose-to have each been considered against all known misspecifications that can lead to unexpected negative outcomes. A NWF privacy policy is the best that we can achieve at this time –No guarantee unexpected negative outcomes will not occur –Reduces the probability that they will occur.

Preventing: Some Rules Rule for Valid: Time period must be >= longest retention time. (There is always a consumer privacy policy governing the consumer information.)

Preventing: Some Rules Rule for Collector: Availability of the individual to receive the information must be considered.

Preventing: Some Rules Rule for Retention Time: Consequences of the retention time expiration (provider destroys corresponding information) must be considered. –If the consequences do not lead to unexpected negative outcomes, proceed to specify the desired time. Otherwise, or if there is doubt, specify the length of time the service will be used.

Preventing: Some Rules Rule for Disclose-To: Consequences of successive propagation of your information starting with the first party mentioned in the Disclose-To must be considered. –If the consequences do not lead to unexpected negative outcomes, proceed with the specification of the Disclose-To party or parties. Otherwise, or if there is doubt, specify “none” or “name of receiving party, no further”.

Preventing unexpected outcomes: Approach Incorporate the above rules when specifying initial policy –Use an automatic or semi-automatic specification method (e.g. G. Yee and L. Korba, “Semi-Automated Derivation of Personal Privacy Policies”, Proceedings, The IRMA International Conference 2004 (IRMA 2004), New Orleans, May 23-26, 2004.) –Rules application may employ a combination of artificial intelligence and user/provider query/response techniques to appreciate consequences. –Apply rules during manual policy specification employing a tool for exploring possible consequences.

Preventing unexpected outcomes Use privacy policy negotiation where NWF policies from initial specification do not match: Avoid undoing NWF-ness from initial specification; upgrades and downgrades may inadvertently undo the NWF-ness. Take advantage of negotiation to expose a needed application of the above rules. Paper provides examples

Summary –Unexpected outcomes can arise from matching of privacy policies –Proposed an approach using near-well-formed policies to minimize unexpected negative outcomes Approach will work for other privacy policy formulations –Privacy policy formulations Must conform to privacy legislation Therefore they do not differ substantially our approach is a minimal policy that conforms.

Conclusions and future research Further research: –Explore further unexpected negative outcomes –Tools for consequences exploration –Other methods for avoiding or mitigating unexpected negative outcomes –Implement the proposed approach (extend current prototype) –Application in other areas: security risk analysis

Thank-you

Preventing unexpected outcomes Nursing Online (Provider)Alice (Consumer) OK if a nurse on our staff be told your medical condition? No, only Dr. Alexander Smith can be told my medical condition. We cannot provide you with any nursing service unless we know your medical condition. OK, I’ll see Dr. Smith instead. You are putting yourself at risk. What if you need emergency medical help for your condition and Dr. Smith is not available? You are right. Do you have any doctors on staff? Yes, we always have doctors on call. OK to allow them to know your medical condition? That is acceptable. I will modify my privacy policy to share my medical condition with your doctors on call. Example negotiation (read from left to right, top to bottom): Negotiation guides the application of the rule for collector, preventing the unexpected outcome that Alice will be left with no medical help.