Presentation is loading. Please wait.

Presentation is loading. Please wait.

TRUST:Team for Research in Ubiquitous Secure Technologies

Similar presentations


Presentation on theme: "TRUST:Team for Research in Ubiquitous Secure Technologies"— Presentation transcript:

1 TRUST:Team for Research in Ubiquitous Secure Technologies
Social Science Dimensions, Pamela Samuelson, Law/SIMS, UC Berkeley NSF STC Review September 6, 2004

2 PRIVACY It is desirable for persons and organizations to able to maintain privacy and confidentiality interests in their data Can’t have privacy without meaningful security Fair information practices provide a regulatory framework that address many information privacy concerns, but they are sometimes difficult to map onto new technologies (e.g., sensor networks) Traditional focus has been on data custodian but advances in technology makes widening policy inquiry (e.g., datamining) important NSF STC Review December 26, 2018

3 KEY QUESTIONS What privacy rules, practices, & technologies promote better security? What level of security is necessary to promote privacy and confidentiality? How do we achieve appropriate levels of investment in security to ensure appropriate levels of actual security? When is necessary to access private information in order to provide security? What technical tools, legal policies, practices are necessary to control or monitor such access? NSF STC Review December 26, 2018

4 COLLABORATION Technologists and the policy analysts may be able to work together to find the right mix of technology and policy solutions Culler, Hellerstein, Wagner, Samuelson & Mulligan research (3 technologists, 2 lawyers) on sensor network privacy issues High tech clinic at Boalt worked with Berkeley Public Library to assess privacy implications of deployment of RFID technology, cooperation with EECS professor & grad student as well NSF STC Review December 26, 2018

5 PRIVACY-SENSITIVE IT May be possible to design privacy-sensitive information technology Encrypt PII so can only be used for one purpose Use authentication/access control systems Store data only where security can be strong Aggregate data to anonymize, hide mapping Don’t log or flush out data when no longer needed Give users ability to turn sensors off or provide detector devices or notice of sensor presence May be necessary to develop new laws or fair information practices for sensor networks to maintain privacy (e.g., require deployers to give notice if sensing PII) NSF STC Review December 26, 2018

6 INFORMATION POLICY Need for research to explore whether rules on electronic surveillance should be updated or otherwise changed and if so, why and how Electronic Privacy Communications Act was written decades ago, long before advanced IT networks and security technologies were deployed; ambiguities in law Policies favoring free flows of information and those favoring security and secrecy should be analyzed to ensure that restrictions are not greater than necessary and are directed at the right targets E.g., communities can’t assess vulnerabilities if they can’t/don’t share information about them (multidisciplinary research may aid formation of sound policy about disclosure policies) NSF STC Review December 26, 2018

7 OUTPUTS Research publications
Conferences, workshops, other public meetings to discuss results Meetings with key industry leaders or associations about privacy-sensitive technology possibilities Possible proposed legislation or other policy recommendations NSF STC Review December 26, 2018


Download ppt "TRUST:Team for Research in Ubiquitous Secure Technologies"

Similar presentations


Ads by Google