1 Privacy and Accountability: Introduction to Workshop Themes JOAN FEIGENBAUM June 28, 2006; Cambridge MA.

Slides:



Advertisements
Similar presentations
The Internet and the Web
Advertisements

A Guide to Compliant Data Management
Safeguarding Data to Ensure Effective Data Use Paige Kowalski |Director| State Policy & Advocacy July 2014.
1 Education and Outreach in the PORTIA Project Joan Feigenbaum PORTIA Project Site Visit Stanford CA, May 12-13, 2005.
1 Privacy Prof. Ravi Sandhu Executive Director and Endowed Chair March 8, © Ravi Sandhu World-Leading Research.
PIPA PRESENTATION PERSONAL INFORMATION PROTECTION ACT.
Confidentiality and Privacy Controls
Privacy and Contextual Integrity: Framework and Applications Adam Barth, Anupam Datta, John C. Mitchell (Stanford), and Helen Nissenbaum (NYU) TRUST Winter.
Introduction to the APPs and the OAIC’s regulatory approach Presented by: Este Darin-Cooper Director, Regulation and Strategy May 2015.
1 WRAP UP Joan Feigenbaum PORTIA Project Site Visit Stanford CA, May 12-13, 2005.
Do You Trust Your Recommender? An Exploration of Privacy and Trust in Recommender Systems Dan Frankowski, Dan Cosley, Shilad Sen, Tony Lam, Loren Terveen,
QATAR STATISTICS AUTHORITY DATA AND METADATA STRATEGY Pinar UCAR Statistical Specialist.
1 The PORTIA Project: Research Overview Dan Boneh PORTIA Project Site Visit Stanford CA, May 12-13, 2005
Sensitive Information in a Wired World Supported by the National Science Foundation under the ITR Program JOAN FEIGENBAUM
1 Progress on the PORTIA Project JOAN FEIGENBAUM March 21, 2005; Rutgers.
Ethics and Responsibility
1 Approximate Privacy: Foundations and Quantification Joan Feigenbaum DIMACS; November 20, 2009 Joint work with A. D. Jaggard.
Privacy-Aware Computing Introduction. Outline  Brief introduction Motivating applications Major research issues  Tentative schedule  Reading assignments.
1 Approximate Privacy: Foundations and Quantification Joan Feigenbaum Northwest Univ.; May 20, 2009 Joint work with A.
Contextual Integrity in PORTIA PI: Helen Nissenbaum Students: Timothy Weber & Michael Zimmer New York University In collaboration with: Sam Hawala (U.S.
Privacy By Design Sample Use Case Privacy Controls Insurance Application- Vehicle Data.
Protecting information rights –­ advancing information policy Privacy law reform for APP entities (organisations)
Chapter 19 Security Transparencies. 2 Chapter 19 - Objectives Scope of database security. Why database security is a serious concern for an organization.
“Creating Data Repositories..” Sanjay Rao ECE Dept, Purdue University.
In the Framework of: Financed by: Developed by: DANUBE WATER PROGRAM GRANT NO. 46 DEVELOP A TRAINING COURSE FOR THE PREPARATION OF A STRATEGIC BUSINESS.
An Educational Computer Based Training Program CBTCBT.
The Office Procedures and Technology
Intelligent Systems Lecture 23 Introduction to Intelligent Data Analysis (IDA). Example of system for Data Analyzing based on neural networks.
1 Progress on the PORTIA Project JOAN FEIGENBAUM June 5, 2006; Google; New York NY.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
By: Dr Alireza Kazemi.  Computer science, the study of complex systems, information and computation using applied mathematics, electrical engineering.
HIT Standards Committee Privacy and Security Workgroup: Initial Reactions Dixie Baker, SAIC Steven Findlay, Consumers Union June 23, 2009.
Protecting information rights –­ advancing information policy The Australian Privacy Principles.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
How to use the VSS to design a National Strategy for the Development of Statistics (NSDS) 1.
ITU Workshop on "Future Trust and Knowledge Infrastructure", Phase 1 Geneva, Switzerland, 24 April 2015 Tussles for Edge Network Caching Patrick Poullie.
Module 3 – Security and Privacy SOCIAL MEDIA IN BUSINESS.
Overview Privacy Management Reference Model and Methodology (PMRM) John Sabo Co-Chair, PMRM TC.
CSE 303 Concepts and Tools for Software Development Richard C. Davis UW CSE – 10/30/2006 Social Implications Discussion 2 – Privacy.
IT Applications Theory Slideshows By Mark Kelly Vceit.com Privacy Laws.
Stakeholders How to engage them ? How to ensure success ? David Padua University of Illinois at Urbana-Champaign.
Privacy by Design – Principles of Privacy-Aware Ubiquitous Systems Marc Langheinrich - Swiss Federal Institute of Technology, Zurich Whitney Hess.
1 CPSC156: The Internet Co-Evolution of Technology and Society Lecture 15: March 8, 2007 Identity, Anonymity, and Accountability in Information Systems.
HPC Centres and Strategies for Advancing Computational Science in Academic Institutions Organisers: Dan Katz – University of Chicago Gabrielle Allen –
Most of contents are provided by the website Introduction TJTSD66: Advanced Topics in Social Media Dr.
1 IMPLEMENTATION STRATEGY for the 2008 SNA OECD National Accounts Working Party Paris, France 4 to 6 November 2009 Herman Smith UNSD.
The Internet of Things and Consumer Protection
Csci5233 Computer Security & Integrity 1 Overview of Security & Java (based on GS: Ch. 1)
Genres and Generations of Internet Research Ethics Maria Bakardjieva University of Calgary.
Anonymity and Privacy Issues --- re-identification
Privacy and Contextual Integrity: Framework and Applications Adam Barth, Anupam Datta, John C. Mitchell (Stanford) Helen Nissenbaum (NYU)
TOP 10 TECHNOLOGY INITIATIVES Robert G Parker July 12, 2013.
PMRM Revision Discussion Slides Illustrations/Figures 1-3 o Model, Methodology, “Scope” options Functions, Mechanisms and “Solutions” Accountability and.
High Risk 1. Ensure productive use of GRID computing through participation of biologists to shape the development of the GRID. 2. Develop user-friendly.
Introduction to the Australian Privacy Principles & the OAIC’s regulatory approach Privacy Awareness Week 2016.
Building a 'Digital Futures' Community Broadband Portal Dr. Rob McMahonDigital Futures Symposium on Dr. Michael B. McNallyRural Broadband Enablement Oct.
Understanding Privacy An Overview of our Responsibilities.
EDUCATION & OUTREACH NSF site visit October 19, 2015 Salil Vadhan and Urs Gasser Supported by the NSF Secure & Trustworthy Cyberspace (SaTC) program, the.
Unlinking Private Data
Understanding Privacy An Overview of our Responsibilities.
Stéphane Levesque, DG of Operations, PCO 13 June 2017
Privacy principles Individual written policies
Privacy of Client Data.
IT Applications Theory Slideshows
Columbus State University
Oregon CIS Career and Education Resources for Students & Adults
Cyber Issues Facing Medical Practice Managers
Move this to online module slides 11-56
Mrs. Amy Wright Web Page Design Mrs. Amy Wright
Student Privacy in the age of big data
Presentation transcript:

1 Privacy and Accountability: Introduction to Workshop Themes JOAN FEIGENBAUM June 28, 2006; Cambridge MA

2 PORTIA: Privacy, Obligations, and Rights in Technologies of Information Assessment Large-ITR, five-year, multi- institutional, multi-disciplinary, multi-modal research project on sensitive information in a networked world

3 Motivation Sensitive Information: Info that can harm data subjects, data owners, or data users if it is mishandled. Not all of it is strictly “private.” There’s a lot more of it than there used to be! –Increased use of computers and networks –Increased processing power and algorithmic knowledge  Decreased storage costs “Mishandling” can be very harmful. −ID theft −Loss of employment or insurance −“You already have zero privacy. Get over it.” (Scott McNealy, 1999)

4 PORTIA Goals Produce a next generation of technology for handling sensitive information that is qualitatively better than the current generation’s. Enable handling of sensitive information over the course of its lifetime. Formulate an effective conceptual framework for policy making and philosophical inquiry into the rights and responsibilities of data subjects, data owners, and data users.

5 Academic–CS Participants Stanford Dan Boneh Hector Garcia-Molina John Mitchell Rajeev Motwani Yale Joan Feigenbaum Ravi Kannan Avi Silberschatz Univ. of NM Stevens NYU Stephanie Forrest Rebecca Wright Helen Nissenbaum (“computational immunology”) (“value-sensitive design”)

6 Research Partners J. Balkin (Yale Law School) C. Dwork (Microsoft) S. Hawala (Census Bureau) B. LaMacchia (Microsoft) K. McCurley (Google) P. Miller (Yale Medical School) J. Morris (CDT) T. Pageler (Secret Service) B. Pinkas (Hewlett Packard) M. Rotenberg (EPIC) A. Schäffer (NIH) D. Schutzer (CitiGroup) Note participation by the software industry, key user communities, advocacy organizations, and non-CS academics.

7 See PORTIA Website for: Papers, talks, and software Educational activities –Courses –Grad students and postdocs Media coverage Programs and slides from workshops Related links [ Google “PORTIA project” ]

8 “Policies” for the Handling of Sensitive Data Collection Retention, destruction Use, mining Sharing, selling Updating, cleaning, correcting De-identifying, scrubbing, re-identifying...

9 Basic Questions (1) What are the best tools for expressing and analyzing policies? How can an organization ensure that it is following its own data-management policies? How can those who transmit data to an organization ensure themselves that the organization is following its data- management policies?

10 Basic Questions (2) What recourse does one have when an organization that handles one’s data violates a policy? Are there “implicit policies” or, more generally, when should one be held accountable for actions not clearly governed by a specific policy?

11 Who is Accountable to Whom? Individuals Organizations Governments Technology vendors Network operators...

12 When is it ok NOT to be Accountable? Anonymous activity? Unobservable activity? “Pseudonymous” = Unidentifiable but accountable? Offline analogs...

13 Workshop Goals Learn more about the state of the art Formulate research-agenda items, both short- and long- term