Presentation is loading. Please wait.

Presentation is loading. Please wait.

WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Identity and Privacy: the.

Similar presentations


Presentation on theme: "WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Identity and Privacy: the."— Presentation transcript:

1 WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Identity and Privacy: the New OASIS Privacy Management Reference Model Technical Committee John Sabo, Director Global Government Relations, CA Technologies

2 Fair Information Principles/Practices — Accountability — Notice — Consent — Collection Limitation — Use Limitation — Disclosure — Access & Correction — Security/Safeguards — Data Quality — Enforcement — Openness − Anonymity − Data Flow − Sensitivity 2

3 Global Privacy Principles/Practices - similarities…but no standardization CSA Model Code for Protection of Personal Information – 1996 − Accountability − Identifying Purposes − Consent − Limiting Collection − Limiting Use, Disclosure and Retention − Accuracy − Safeguards − Openness − Individual Access − Challenging Compliance APEC Privacy Framework – 2005 n Preventing Harm n Notice n Collection Limitation n Uses of Personal Information n Choice n Integrity of Personal Information n Security Safeguard n Access and Correction n Accountability Analysis of Privacy Principles: An Operational Study” - 2007 International Security Trust and Privacy Alliance (ISTPA) OECD Guidelines – 1980 l Collection Limitation l Data Quality l Purpose Specification l Use Limitation l Security Safeguards l Openness l Individual Participation l Accountability Used with Permission, International Security Trust and Privacy Alliance (ISTPA) 3

4 Many Identity-Related Security Mechanisms Support Privacy… — Identity Lifecycle Management and Compliance − critical to privacy – authorized people and systems should have policy-based access to the correct information in a well defined identity system — Web access management, federation, SOA security − Trust among multiple entities to facilitate controlled sharing of information – strengthens security in complex infrastructures — Resource Protection − Privileged users are high risk and must be controlled and monitored — Data Protection − Data (at rest, in motion) must be monitored for access policy compliance — Log management − provides the ability to watch what is happening -monitoring is key to maintaining privacy 4

5 IdentityLifecycleManagementAccess Managemen t Information Protection & ControlAuditing/Reporting Help Desk HR System Information Content Repositories Files Data in transit Platform Application s Common roles, policies, reporting, workflow Enterprise Infrastructure Event Logs Directory Systems System Services Mainframes System files Web ERP CRM Custom PrivilegedUserManagement …with Support from Compliance Infrastructure Models Multiple and distinct resources controlled and managed, providing common model of roles and policies 5

6 Privacy Management Challenges: Networked Health IT 6

7 Health Information Exchange Functional and Roles Diagram Business Intelligence 7

8 Emerging, Complex Privacy Management Challenges: Smart Grid 8

9 9 Source: 27 NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 1.0 NIST Smart Grid Conceptual Model

10 Volumes 2 -3 – NISTIR 7628 — NIST Smart Grid Report – Smart Grid Interoperability Panel – Cybersecurity Working Group — Volume 2 – Privacy and the Smart Grid Chapter 5 – Privacy and the Smart Grid includes a privacy impact assessment for the Smart Grid with a discussion of mitigating factors. potential privacy issues that may occur as new capabilities are included in the Smart Grid. − Appendix C – State Laws – Smart Grid and Electricity Delivery − Appendix D – Privacy Use Cases − Appendix E – Privacy Related Definitions

11 30. Elias Leake Quinn, Smart Metering & Privacy: Existing Law and Competing Policies, Spring 2009, at page 3 Novel Smart Grid Risk Exposures

12 Smart Grid Privacy Risk Areas

13 A Reference Model Is Needed Copyright © 1999-2010 International Security Trust and Privacy Alliance (ISTPA) 13

14 Copyright © 1999-2010 International Security Trust and Privacy Alliance (ISTPA) 14

15 Privacy Management Reference Model Services — Core Policy Services − Agreement- agreements, options, permissions − Control- policy instantiation, data management — Presentation and Lifecycle Services − Interaction- manages data/preferences/notice − Agent- software that carries out processes − Usage- lifecycle data use, aggregation, anonymity − Access- individual review/updates to PI — Privacy Assurance Services − Certification- credentials, trusted processes − Audit- verifiable lifecycle accountability − Validation- quality and suitability of PI − Enforcement- including redress for violations Copyright © 1999-2010 International Security Trust and Privacy Alliance (ISTPA)

16 — OASIS PMRM TC formally announced June 27 – first meeting September 8 – Face to Face Informal Meeting September 29 — Open to OASIS members — ISTPA contributed its PMRM v2.0 to the TC — Deliverables include − the Reference Model − one or more use cases utilizing the PMRM − one or more formal methodologies for expressing use cases − profiles of the PMRM applied to selected specific environments (such as Cloud Computing, Health IT, e-Gov, and/or the Smart Grid) — Actively seeking more participation by current and new OASIS members New OASIS PMRM Technical Committee 16

17 John Sabo, Co-Chair, OASIS PMRM Technical Committee Contact: John.t.sabo@ca.com 17


Download ppt "WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Identity and Privacy: the."

Similar presentations


Ads by Google