Teaching PbD at legal ManaMa students Dr. E. J. Kindt IPEN 2015.

Slides:



Advertisements
Similar presentations
Introduction to computing and the Internet Part-B.
Advertisements

1 The Data Protection Officer at work Experience, good practices and lessons learnt Pierre Vernhes – former DPO at the Council of the EU Workshop on Data.
Net Neutrality, What Else? Wim Nauwelaerts Partner Hunton & Williams.
Dr Jim Briggs Masterliness Not got an MSc myself; BA DPhil; been teaching masters students for 18 years.
Improving Cybersecurity Through Research & Innovation Dr. Steve Purser Head of Technical Competence Department European Network and Information Security.
ICT Ethics 2 ICT 139.
What do tutors look for in written assignments? Effective Learning Service.
Steve Kenny Presented by: Larry Korba Design Embedded Privacy Risk Management Institute for Information Technology 14 th CACR, November 7,8, 2002.
1 A new training course for Engineers in Lyon : « Prevention and management of risk in the territory » A way forward ‘’excellence’’ ?
1 Human resources management in NSOs Training workshop for SADC member states. Luanda, 2-6 Dec 2006 Olav Ljones, Deputy Director General, Statistics Norway.
Introduction to Business Courses The proposed Introduction to Business Courses consist of three one-credit courses. – BUS 100: Functional Areas of Business.
Computers and Legal Education at the Nicolaus Copernicus University in Toruń Methodology and Experiences Karol Dobrzeniecki, LLM.
 The Data Protection Act 1998 is an Act of Parliament which defines UK law on the processing of data on identifiable living people and it is the main.
The principles used by AUTEC in granting ethical approval for research.
1. 1. OLD Italian SYSTEM 2 INDIRIZZO ECONOMICO-AZIENDALE Economics Maths History Italian language and literature Science Subject x 4e - 5e Project area,
Course descriptions TEMPUS EcoBRU PROJECT. Environmental education as a basic component of the technosphere employees’ biospherically compatible activity.
) Linked2Safety Project (FP7-ICT – 5.3 ) A NEXT-GENERATION, SECURE LINKED DATA MEDICAL INFORMATION SPACE FOR SEMANTICALLY-INTERCONNECTING ELECTRONIC.
Opinion about the draft privacy regulation of the EC Frank Robben General manager eHealth-platform Willebroekkaai 38 B-1000 Brussels
Company Confidential How to implement privacy and security requirements in practice? Tobias Bräutigam, OTT Senior Legal Counsel, Nokia 8 October
Experiences in Undergraduate Studies in the University of Zaragoza LEFIS Undergraduate studies Oslo, 19 th -20 th May 2006.
LEFIS W2 Posgraduate Workshop 1 LEFIS, WG 2 Postgraduate studies Meeting, Rotterdam.
Applying creativity in CS high school education - criteria, teaching example and evaluation Romeike, R. (2007). Applying creativity in CS high school education.
Designing and implementing of the NQF Tempus Project N° TEMPUS-2008-SE-SMHES ( )
M. ANGELA JIMENEZ 1 UNIT 5. REGULATION OF EXTERNAL AUDIT IFAC AND E.C.
BUSINESS INFORMATICS descriptors presentation Vladimir Radevski, PhD Associated Professor Faculty of Contemporary Sciences and Technologies (CST) Linkoping.
Learning outcomes for BUSINESS INFORMATCIS Vladimir Radevski, PhD Associated Professor Faculty of Contemporary Sciences and Technologies (CST)
The Eighth Asian Bioethics Conference Biotechnology, Culture, and Human Values in Asia and Beyond Confidentiality and Genetic data: Ethical and Legal Rights.
European Data Protection Supervisor Pharmaceutical Regulatory & Compliance Congress, Brussels, 7 June 2007 European Privacy and Data Protection Policy.
UNIT 12 P3 – SECURITY PROTECTION MECHANISMS Cambridge Technicals.
Facing Risks and Building Trust: Grid and Cloud Adopters and Providers from a Legal Perspective Davide M. Parrilli ICRI – K.U. Leuven – IBBT time.lex Brussels.
1 Validation of non-formal and informal learning in Europe The challenging move from policy to practise Jens Bjornavold Rotterdam, 10 April 2014.
Training & Development is a continuous process in an organization to achieve its organizational goals by improving the skills and knowledge of the employees.
Manuel David Masseno Vaasa, 24 April 2009 The LEFIS Law & ICT Virtual Campus: Sharing the experience of the Polytechnic of Beja.
MITM743 Advanced Project Management Introduction To The Class.
The use of Formal Standards to Boost Creativity for Computing Students Gill Whitney Principal Lecturer, Middlesex University, School of Engineering and.
Slide 1 Recognition of Professional Qualifications in the European Single Market for Services Henri Olivier FEE Secretary General FEE (Fédération des Experts.
MITM743 Advanced Project Management Dr. Abdul Rahim Ahmad Assoc. Professor College of IT, UNITEN Introduction to the Course.
Data protection and compliance in context 19 November 2007 Stewart Room Partner.
Data Protection Principles as Basic Foundation for Data Protection in EU/EEA Introduction to Data Protection Theory Seminar - AFIN Stephen.
INFOMGP Student names and numbers Papers’ references Title.
European Data Protection Supervisor CRIM, EP, 17 September 12 Cybercrime and Data protection Hielke HIJMANS Head of Unit Policy & Consultations.
ICT CAPABILITY APPLYING SOCIAL AND ETHICAL PROTOCOLS AND PRACTICES WHEN USING ICT Typically by the end of Prep, students Typically by the end of Year 2,
Proposal Template Project Based Learning Exercise Mehr 1386 Edmond Zahedi.
true potential An Introduction to the Middle Manager Programme’s CMI Qualifications.
The Development of Environmental Protection in Information Age: Using Information as a Regulatory Tool and Its Perspective -- the Overview of US Experience.
Digital Security Focus Area & Critical Infrastructure Protection in H2020 SC7 WP Aristotelis Tzafalias Trust and Security Unit DG Communications.
František Nonnemann Skopje, 10th October 2012 JHA Data protection and re-use of PSI as a tool for public control–CZ approach.
true potential An Introduction to the First Line Manager Programme’s CMI Qualifications.
Data Protection and Enabling Psi Re-use EVPSI & LAPSI Final Meeting
1 Dr David Coles Ethics and Science European Commission ACTIVITIES on ETHICS in The Science and Society Programme.
Brussels Privacy Symposium on Identifiability
Technical Business Consultancy Project
Brussels Privacy Symposium on Identifiability
GDPR (General Data Protection Regulation)
There is no excellence without research integrity
Viewing the GDPR Through a De-Identification Lens
Example Help Explain Support Demonstrate Guide Standard Model Sample
Vibration Measurement, Analysis, Control and Condition Based Maintenance 14 Predictive maintenance Dr. Michiel Heyns Pr.Eng. T: C: +27.
Introduction to GDPR 09/11/2018.
The GDPR and research data
Information Technology (IT)
General Data Protection Regulation
DIGITALIZATION: HOW DOES IT AFFECT THE LAWYERS Alex TALLON
Data protection by design, Art.25.1 of the GDPR
General Data Protection regulation (GDPR)
Single Window – The European Commission’s Perspective
LO1 - Know about aspects of cyber security
Mainstreaming and social and gender equity as ‘cross cutting issues’
Data Security and Protection Toolkit Assurance 2018/19
Presentation transcript:

Teaching PbD at legal ManaMa students Dr. E. J. Kindt IPEN 2015

Teaching Privacy by Design- IPEN Leuven - (c) E.J. Kindt 2 Overview Introduction PbD teaching at the ManaMa IP/ICT law KU Leuven o Background of the students o Theoretic principles o Use of two cases Future case ? Difficulties of implementing PbD and PETs Some conclusions

Teaching Privacy by Design- IPEN Leuven - (c) E.J. Kindt 3 1. PbD teaching at the ManaMa IP/ICT law KU Leuven ManaMa - International scene : 144 students registered - Course on European Privacy and Data Protection : + 70 students - PbD in proposed Regulation

Teaching Privacy by Design- IPEN Leuven - (c) E.J. Kindt 4 1. PbD teaching at the ManaMa IP/ICT law KU Leuven ManaMa - Legal principles of privacy and data protection - With topical debates and application to actual issues (eg data mining) - Limited time - PbD in class 4 (Rights) – slides prepared in Pripare project : some examples:

In Europe: Privacy Enhancing Technologies …it also became clear that PbD can play an important role for enhancing the rights of the data subject (a priori safeguard). ”...a more positive solution is to design and develop ICT in a way that respects privacy and data protection..” EDPS,2010) PbD empowers the user by.. “eliminating/reducing personal data, preventing unnecessary and/or undesired processing or offering tools to enhance individuals' control over their personal data” (EDPS, 2010) Widespread risks and failures [ … ] particularly when they entail the misuse or breaches of personal data exposing the privacy of individuals, are likely to endanger user trust in the information society (EDPS, 2010) ‘Users of ICT services are not in a position to take relevant security measures by themselves in order to protect their own or other persons’ personal data.’ (Art. 29 WP, 2009 ) 168 European Privacy and Data Protection Law (c) E. Kindt

In Canada: PbD The concept of Privacy by Design could be represented as a trilogy of elements: Information Technology Accountable Physical Design Business Practices 169 European Privacy and Data Protection Law (c) E. Kindt

4.1. What does PbD mean for the design process? System developer System specifications End users Idea design End product/ service A generic design process could be described as follows: 162 European Privacy and Data Protection Law (c) E. Kindt

4.2. PbD: The development of a concept: In Europe: Privacy Enhancing Technologies From Directive 95/46/EC… Data minimisation principle (Article 6.1 (b) & c): Obligation to security (Article 17 & Recital 61) To protect the fundamental right to privacy, the EC introduced obligations of data controllers on the basis of privacy principles. 164 European Privacy and Data Protection Law (c) E. Kindt

Teaching Privacy by Design- IPEN Leuven - (c) E.J. Kindt 9 1. PbD teaching at the ManaMa IP/ICT law KU Leuven ManaMa - Theory - two practical cases cloud computing use of biometrics

Teaching Privacy by Design- IPEN Leuven - (c) E.J. Kindt PbD teaching at the ManaMa IP/ICT law KU Leuven ManaMa - Evaluation - Limited discussion - Lack of interdisciplinary group - Not sure if they can understand the impact/need - Not sure if they will influence in direction of PbD

Teaching Privacy by Design- IPEN Leuven - (c) E.J. Kindt Future case on PbD in ManaMa IP/ICT law KU Leuven ? ManaMa Future: new case to solve ?

Teaching Privacy by Design- IPEN Leuven - (c) E.J. Kindt Future case on PbD in ManaMa IP/ICT law KU Leuven ? ManaMa Future: new case to solve ?

Teaching Privacy by Design- IPEN Leuven - (c) E.J. Kindt Difficulties of implementing PbD and PETs More generally : Needs: (Future) legal professionals - Need to understand the principles and risks - Need also to understand how PbD works (some technicalities) - Want to know who develops/sells… - Want to know where to find ‘the tools’ needs for being able to make useful suggestions

Teaching Privacy by Design- IPEN Leuven - (c) E.J. Kindt Difficulties of implementing PbD and PETs More generally : (Future) legal professionals : two pillars Education remains essential Platform ? Inventory of techniques and protocols - results - bottum up Meeting of the needs: who needs ? Who develops ?

Teaching Privacy by Design- IPEN Leuven - (c) E.J. Kindt 15 Conclusions Education is essential Multidisciplinary aspect important but difficult to achieve Practical overviews of existing tools, developing companies, …. to be further developed