Confidential1 ISTPA Framework Project Combining Security and Privacy Throughout the Life Cycle of Personal Information MICHAEL WILLETT Wave Systems Chair:

Slides:



Advertisements
Similar presentations
Module N° 4 – ICAO SSP framework
Advertisements

Configuration Management
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL DATA PROTECTION AND PRIVACY COMMISSIONERS.
Directory and Trust Services (D&TS) Define an Abstract Model Purpose: Document a common terminology that the group can use between the various tracks Identify.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
On Privacy-aware Information Lifecycle Management (ILM) in Enterprises: Setting the Context Marco Casassa Mont Hewlett-Packard.
Version 6.0 Approved by HIPAA Implementation Team April 14, HIPAA Learning Module The following is an educational Powerpoint presentation on the.
Chapter 7 Database Auditing Models
Stephen S. Yau CSE , Fall Security Strategies.
Beyond HIPAA, Protecting Data Key Points from the HIPAA Security Rule.
Chapter 7 Database Auditing Models
Privacy By Design Sample Use Case Privacy Controls Insurance Application- Vehicle Data.
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 5: Security Controls.
OASIS PRIVACY MANAGEMENT REFERENCE MODEL EEMA European e-identity Management Conference Paris, June 2012 John Sabo, CA Technologies Co-Chair, OASIS.
Functional Model Workstream 1: Functional Element Development.
S New Security Developments in DICOM Lawrence Tarbox, Ph.D Chair, DICOM WG 14 (Security) Siemens Corporate Research.
© 2007 The MITRE Corporation. MITRE Privacy Practice W3C Government Linked Data Working Group Michael Aisenberg, Esq. 29 June 2011 Predicate for Privacy.
Outsourcing Louis P. Piergeti VP, IIROC March 29, 2011.
Information Systems Security Computer System Life Cycle Security.
HIPAA COMPLIANCE WITH DELL
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
Confidential1 ISTPA Framework Project Combining Security and Privacy Throughout the Life Cycle of Personal Information MICHAEL WILLETT Wave Systems Chair:
WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Identity and Privacy: the.
Introduction to ISO 9001:2000.
T. Dawson, TASC 9/11/13 Use of a Technical Reference in NASA IV&V.
PMRM TC Emergency Responder Use Case Draft: 2 Aug 2011.
UNCLASSIFIED DITSCAP Primer. UNCLASSIFIED 1/18/01DITSCAP Primer.PPT 2 DITSCAP* Authority ASD/C3I Memo, 19 Aug 92 –Develop Standardized C&A Process DODI.
Gershon Janssen 11 th October 2011 London Privacy Management Reference Model International Cloud Symposium 2011.
Session ID: Session Classification: Dr. Michael Willett OASIS and WillettWorks DSP-R35A General Interest OASIS Privacy Management Reference Model (PMRM)
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
Overview Privacy Management Reference Model and Methodology (PMRM) John Sabo Co-Chair, PMRM TC.
Software Quality Assurance
PricewaterhouseCoopers 1 Administrative Simplification: Privacy Audioconference April 14, 2003 William R. Braithwaite, MD, PhD “Doctor HIPAA” HIPAA Today.
Privacy Engineering for Digital Rights Management Systems By XiaoYu Chen.
Policies for Information Sharing April 10, 2006 Mark Frisse, MD, MBA, MSc Marcy Wilder, JD Janlori Goldman, JD Joseph Heyman, MD.
1 The ISTPA Privacy Framework John Sabo Manager, Security, Privacy and Trust Initiatives Computer Associates Workshop on the Relationship between Security.
ANKITHA CHOWDARY GARAPATI
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
Database Administration
1 Designing a Privacy Management System International Security Trust & Privacy Alliance.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
1 Copyright © International Security, Trust & Privacy Alliance -All Rights Reserved Making Privacy Operational International Security, Trust.
© Drexel University Software Engineering Research Group (SERG) 1 The OASIS SOA Reference Model Brian Mitchell.
HIT Policy Committee Meeting Nationwide Health Information Network Governance June 25, 2010 Mary Jo Deering, PhD ONC, Office of Policy and Planning NHIN.
John Weigelt, MEng, PEng, CISSP, CISM National Technology Officer Microsoft Canada November 2005 Fighting Fraud Through Data Governance.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Information Resource Stewardship A suggested approach for managing the critical information assets of the organization.
PMRM Revision Discussion Slides Illustrations/Figures 1-3 o Model, Methodology, “Scope” options Functions, Mechanisms and “Solutions” Accountability and.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
Chapter 29: Program Security Dr. Wayne Summers Department of Computer Science Columbus State University
Business Challenges in the evolution of HOME AUTOMATION (IoT)
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
Grid Deployment Technical Working Groups: Middleware selection AAA,security Resource scheduling Operations User Support GDB Grid Deployment Resource planning,
Audit Trail LIS 4776 Advanced Health Informatics Week 14
Software Configuration Management
Privacy principles Individual written policies
THE STEPS TO MANAGE THE GRID
Applied Software Implementation & Testing
Analysis of Privacy and Data Protection Laws and Directives
Drew Hunt Network Security Analyst Valley Medical Center
Chapter 29: Program Security
ISO 9001:2008 Quality Management Systems
On Parametric Obligation Policies: Enabling Privacy-aware Information Lifecycle Management in Enterprises IEEE Policy Workshop 2007 Marco Casassa Mont.
PLANNING A SECURE BASELINE INSTALLATION
Overview Activities from additional UP disciplines are needed to bring a system into being Implementation Testing Deployment Configuration and change management.
Security Mechanisms Network Security.
Presentation transcript:

Confidential1 ISTPA Framework Project Combining Security and Privacy Throughout the Life Cycle of Personal Information MICHAEL WILLETT Wave Systems Chair: ISTPA Framework Project Personal Information Privacy Wave Michael Willett: (Assume the listener is familiar with the overall ISTPA mission, projects, and objectives) The objective of the Framework Project is to develop an analytic framework for privacy services that “implement” the privacy fair information practices and privacy principles. The Framework can serve as both an operational model for evolving implementations and as a tool for assessing the completeness of solutions. Michael Willett: (Assume the listener is familiar with the overall ISTPA mission, projects, and objectives) The objective of the Framework Project is to develop an analytic framework for privacy services that “implement” the privacy fair information practices and privacy principles. The Framework can serve as both an operational model for evolving implementations and as a tool for assessing the completeness of solutions.

Confidential2 PRIVACY EU Data Protection Directive Safe Harbor/FTC HIPAA GLB Web Services Identity/Authentication/SSO Liberty Alliance Microsoft Passport the Edge e-Business COPPA

Confidential3 PRIVACY ? Privacy = Isolation Privacy = Anonymity Privacy = Confidentiality Privacy = Access Control

Confidential4 Security: locks, guards, passwords, cryptography, digital signatures, … establishment and maintenance of measures to protect a system. Privacy: proper handling and use of personal information (PI) throughout its life cycle, consistent with the preferences of the subject. Confidence/trust: freedom from worry; a feeling. Security + Privacy Confidence/Trust VALUE Definitions Michael Willett: Security deals with PROTECTION of a system, whereas privacy deals with the USE of personal information (PI). Security is an essential element of privacy, but even in a secure environment, PI can be misused (ie, inconsistent with the preferences of the PI subject). Trust is not a technology or even a process; rather, trust is a feeling. By implementing security and privacy and adding customer value, we strive to engender trust in the customer/consumer. Michael Willett: Security deals with PROTECTION of a system, whereas privacy deals with the USE of personal information (PI). Security is an essential element of privacy, but even in a secure environment, PI can be misused (ie, inconsistent with the preferences of the PI subject). Trust is not a technology or even a process; rather, trust is a feeling. By implementing security and privacy and adding customer value, we strive to engender trust in the customer/consumer.

Confidential5 PERSONAL INFORMATION PREFERENCES PROPER HANDLING CONSISTENCY USE OF PERSONAL INFORMATION PERSONAL INFORMATION LIFE CYCLE PRIVACY MANAGEMENT

Confidential6 Fair Information Practices Notice and Awareness Choice and Consent Individual Access Information Quality and Integrity Update and Correction Enforcement and Recourse Michael Willett: These fair information practices are more “operational” than the principles, but are still missing the procedural and functional “glue” to tie them together into a system. The names of the practices are self- explanatory as to the desired behavior. For example, Choice and Consent means that the subject of the requested PI can exercise choice over the types of PI collected and can consent to that collection (either opt-out or opt- in) and the subsequent use of the PI by the requestor. Michael Willett: These fair information practices are more “operational” than the principles, but are still missing the procedural and functional “glue” to tie them together into a system. The names of the practices are self- explanatory as to the desired behavior. For example, Choice and Consent means that the subject of the requested PI can exercise choice over the types of PI collected and can consent to that collection (either opt-out or opt- in) and the subsequent use of the PI by the requestor.

Confidential7 Life Cycle Management of PI Source/Subject IntermediaryRepository/Custodian Requestor/ Receiver Touch Points Michael Willett: If PI never left the immediate control of the subject, then privacy would not be a problem. Issues arise when PI leaves the immediate control of the subject and moves through/to various touch points, where others may be able to “touch” and see the PI. Privacy is a PI life cycle issue. Michael Willett: If PI never left the immediate control of the subject, then privacy would not be a problem. Issues arise when PI leaves the immediate control of the subject and moves through/to various touch points, where others may be able to “touch” and see the PI. Privacy is a PI life cycle issue.

Confidential8 “Operational” Requirements Interfacing Control Life Cycle Issues Exception Processing Security Integrity Michael Willett: To create an operational framework, various system capabilities must be identified that are not explicit at the privacy requirements level (requirements = privacy practices, principles ). For example, a Control function is essential to honoring the PI usage desires of the subject, but is not explicit in the privacy principles. Interfacing to the Framework is not explicit in the privacy principles, but is another essential operational service. Michael Willett: To create an operational framework, various system capabilities must be identified that are not explicit at the privacy requirements level (requirements = privacy practices, principles ). For example, a Control function is essential to honoring the PI usage desires of the subject, but is not explicit in the privacy principles. Interfacing to the Framework is not explicit in the privacy principles, but is another essential operational service.

Confidential9 Privacy Services/Capabilities (©)  Interaction  Agent ©  Validation  Negotiation  Enforcement  Control  Audit (Log)  Certification  Usage ©  Access © Michael Willett: After several iterative rounds, the Framework Project team has evolved the following operational Services: SERVICE DESCRIPTION Agent A software process acting on behalf of a data subject or a requestor to engage with one or more of the other Services defined in this Framework. Agent also refers to the human data subject in the case of a manual process. Interaction Handles presentation of proposed agreements from a data collection entity to a data subject; input of the subject’s personal information, preferences, and actions; and confirmation of actions. To the extent the data subject is represented by an Agent, this service comprises the interface to the Agent. Control Handles the role of “repository gatekeeper” to ensure that access to personal information stored by a data collection entity complies with the terms and policies of an agreement and any applicable regulations. Validation Handles checking for correctness of personal information at any point in its life cycle. Negotiation Handles arbitration of a proposal between a data collection entity and a data subject. Successful negotiation results in an agreement. Negotiation can be handled by humans, by agents, or any combination. Usage Handles the role of “processing monitor” to ensure that active use of personal information outside of the Control Service complies with the terms and policies of an agreement and any applicable regulations. Such uses include derivation, aggregation, anonymization, linking, and inference of data. Audit Handles the recording and maintenance of events in any Service to capture the data necessary to ensure compliance with the terms and policies of an agreement and any applicable regulations. Certification Handles validation of the credentials of any party involved in processing of a personal information transaction. Enforcement Handles redress when a data collection entity is not in conformance with the terms and policies of an agreement and any applicable regulations. Michael Willett: After several iterative rounds, the Framework Project team has evolved the following operational Services: SERVICE DESCRIPTION Agent A software process acting on behalf of a data subject or a requestor to engage with one or more of the other Services defined in this Framework. Agent also refers to the human data subject in the case of a manual process. Interaction Handles presentation of proposed agreements from a data collection entity to a data subject; input of the subject’s personal information, preferences, and actions; and confirmation of actions. To the extent the data subject is represented by an Agent, this service comprises the interface to the Agent. Control Handles the role of “repository gatekeeper” to ensure that access to personal information stored by a data collection entity complies with the terms and policies of an agreement and any applicable regulations. Validation Handles checking for correctness of personal information at any point in its life cycle. Negotiation Handles arbitration of a proposal between a data collection entity and a data subject. Successful negotiation results in an agreement. Negotiation can be handled by humans, by agents, or any combination. Usage Handles the role of “processing monitor” to ensure that active use of personal information outside of the Control Service complies with the terms and policies of an agreement and any applicable regulations. Such uses include derivation, aggregation, anonymization, linking, and inference of data. Audit Handles the recording and maintenance of events in any Service to capture the data necessary to ensure compliance with the terms and policies of an agreement and any applicable regulations. Certification Handles validation of the credentials of any party involved in processing of a personal information transaction. Enforcement Handles redress when a data collection entity is not in conformance with the terms and policies of an agreement and any applicable regulations.

Confidential10 Subject “Permission” Bound to PI BINDING PERMISSION PERSONAL INFORMATION LIFE CYCLE CONTAINER Michael Willett: In order for the PI subject to exercise vicarious control over the PI as it travels beyond the immediate control of the subject, the ‘permissions’ (allowable uses) granted by the PI subject must be bound in some way to the PI. Further, the binding mechanism must be robust enough and respected by subsequent touch points in the PI life cycle so as to faithfully support the usage desires of the subject. Depending on local or jurisdictional requirements, the binding mechanism could range from simple pointers to robust cryptography. The Framework does not mandate a particular binding, but rather treats the binding selection as a configuration parameter to the Framework. Michael Willett: In order for the PI subject to exercise vicarious control over the PI as it travels beyond the immediate control of the subject, the ‘permissions’ (allowable uses) granted by the PI subject must be bound in some way to the PI. Further, the binding mechanism must be robust enough and respected by subsequent touch points in the PI life cycle so as to faithfully support the usage desires of the subject. Depending on local or jurisdictional requirements, the binding mechanism could range from simple pointers to robust cryptography. The Framework does not mandate a particular binding, but rather treats the binding selection as a configuration parameter to the Framework.

Confidential11 PI Container (PIC) PI Contract PI Intended Use Credentials Policies Conditions Permissions Identity Credentials Signature BINDING Michael Willett: In order to transport the PI bound to the permissions throughout its life cycle, a “PI Container” is used. The binding mechanism is a configuration parameter, from simple pointers to full cryptographic binding. Included in the container are the Contract (including the negotiated Permissions) and the Credentials for the subject. Michael Willett: In order to transport the PI bound to the permissions throughout its life cycle, a “PI Container” is used. The binding mechanism is a configuration parameter, from simple pointers to full cryptographic binding. Included in the container are the Contract (including the negotiated Permissions) and the Credentials for the subject.

Confidential12 PI Touch Point Structure Requestor/Receiver (pull/push PI) Legal, Technical, Administrative Security/Privacy (technologies/practices) Personal Information Michael Willett: At each touch point, a layered structure can be provided, with the requestor/receiver of PI at the top and the PI itself at the bottom (or innermost). The intervening layers consist of the security and privacy functions (ie, the Framework), with a legal, technical, and administrative upper layer serving as the configuration or ‘parameterization’ layer for the Framework. Specific technology and policy choices are not hard-wired into the Framework, but rather are configured into the Framework at run time. It is better to have ample, selectable parameters in the overall design, so that an installed implementation can simply be configured, instead of being replaced or upgraded. Michael Willett: At each touch point, a layered structure can be provided, with the requestor/receiver of PI at the top and the PI itself at the bottom (or innermost). The intervening layers consist of the security and privacy functions (ie, the Framework), with a legal, technical, and administrative upper layer serving as the configuration or ‘parameterization’ layer for the Framework. Specific technology and policy choices are not hard-wired into the Framework, but rather are configured into the Framework at run time. It is better to have ample, selectable parameters in the overall design, so that an installed implementation can simply be configured, instead of being replaced or upgraded.

Confidential13 Legal, Regulatory, and Policy Context Security Foundation Agent Control Interaction Negotiation Data SubjectData Requestor Usage PI, Preferences & PIC Repository Agent Control Interaction Negotiation PIC Repository PI Container (PIC) EnforcementAuditCertificationValidation Privacy SERVICES/CAPABILITIES Assurance Services Access Michael Willett: Shown is a typical configuration of the privacy Services, with an Agent Service representing both the Subject and the Data Requestor. Interaction, Negotiation, and the all-important Control function provide a front-end to the secure data repository. The Assurance Services of Validation, Certification, Audit, and Enforcement support both nodes, whereas Usage supports the Data Requestor. The security services (eg, OpenGroup taxonomy) are available to all the privacy services. The Legal, Regulatory, and Policy Context provides the necessary configuration and parameterization layer. Michael Willett: Shown is a typical configuration of the privacy Services, with an Agent Service representing both the Subject and the Data Requestor. Interaction, Negotiation, and the all-important Control function provide a front-end to the secure data repository. The Assurance Services of Validation, Certification, Audit, and Enforcement support both nodes, whereas Usage supports the Data Requestor. The security services (eg, OpenGroup taxonomy) are available to all the privacy services. The Legal, Regulatory, and Policy Context provides the necessary configuration and parameterization layer.

Confidential14 Legal, Regulatory, and Policy Context Security Foundation Agent Control Interaction Negotiation Data SubjectData Requestor Usage PI, Preferences & PIC Repository Agent Control Interaction Negotiation PIC Repository PI Container (PIC) EnforcementAuditCertificationValidation Privacy Practices Assurance Services Notice Awareness Choice Consent Quality/Integrity Access Update Correction Enforcement Recourse Michael Willett: The original fair information practices are overlaid on the Privacy Framework, showing the operational “implementation” of the practices. Note that Individual Access is a “use case” application of the Framework, exploiting Negotiation. Michael Willett: The original fair information practices are overlaid on the Privacy Framework, showing the operational “implementation” of the practices. Note that Individual Access is a “use case” application of the Framework, exploiting Negotiation.

Confidential15 Summary -Privacy: consumer prejudice, legal time bomb - ISTPA: “… admin/technical/legal framework…” - Privacy = proper handling...consistent…preferences - Operational privacy principles/practices: SERVICES - Combine with Security Services (eg, OpenGroup) - Usability studies (w/Johns Hopkins Univ) - Privacy Framework version 1 document (30 May) - CMU + ISTPA Technical Partnership Michael Willett: The Privacy Framework structure is still evolving; your input and suggestions are welcome. The Framework Project is actively validating the Framework with Use Cases. Michael Willett: The Privacy Framework structure is still evolving; your input and suggestions are welcome. The Framework Project is actively validating the Framework with Use Cases.

Confidential16 ISTPA: To receive a copy of the ISTPA Privacy Framework v1.0 doc, Write to: