What is Quantified Self (QS)?
|
|
|
- Allen Bishop
- 9 years ago
- Views:
Transcription
1 Subtitle Title
2 Content Quantified Self (QS) (Sensitive) Personal data Security risks QS Privacy risks QS Art. 29 Working Party (WP29) on QS WP29 on ehealth WP29 on Internet of Things (IoT) QS data at risk in the IoT WP29 recommendation on the IoT
3 What is Quantified Self (QS)? WP29 => Wearable Computing, Quantified Self and Domotics: Wearable Computing: objects and clothes with sensors. Quantified Self: objects carried by individual to record data on lifestyle. Domotics: sensors that record when a user is at home, patterns of movement... and may transmit data. Reference: WP29 opinion on the Internet of Things
4 (Sensitive) Personal Data Ethnic origin health. qualify as sensitive data. Art. 8 of Dir. 95/46/EC explicit user consent. QS devices mostly register not health data, yet may provide information about the individual s health as the data is registered in time.
5 Security risks of QS devices Example:US ICS-CERT now checks everything (pacemakers, defibrillators...) Some findings: a heart pump and some cardiac implants have security flaws that make them vulnerable to hacking. Link: can-hackpacemakers-like-shown- homeland-tv-series.html
6 Privacy risks of Quantified Self Example: Google Glass raised many privacy concerns led to being banned in certain public locations. Link: Technology/glassholes-privacyissues- troubled-run-edition-google-glass/story (Jan 16, 2015)
7 Working Party 29 on QS Independent body on data protection Art. 30 of 95/46/EC, Art. 15 of 2002/58/EC. Addressed QS in 8/2014 "Opinion on Recent Developments on the Internet of Things" and in Data protection for ehealth applications (February 2015).
8 WP29 on Quantified Self A pedometer storing step data for a few days does not process 'health data'. But an application combining several years' of records of an individual is processing health data.
9 WP29 on Quantified Self If the data controller provides a remote platform to collect and process data, the domestic exception only applies to the actual usage by the user and does not exempt the data controller from the data protection law ( WP163, WP223).
10 WP29 on Quantified Self The combination of location data with other information read from the device would still make it necessary for the data controller to obtain the consent of the data subject. (Art. 7(a) & Art. 5(3) of the eprivacy Directive)
11 WP29 on the Internet of Things IoT can develop unlawful form of surveillance and raise security concerns (WP29 Opinion 8/2014) The interaction between objects will result in hardly manageable data flows challenging the protection of the data subjects rights.
12 Quantified Self and the IoT IoT stakeholders qualifying as data controllers must comply with 95/46/EC and 2002/58/EC. Art. 5(3) of 2002/58/EC applies if an IoT stakeholder can access information stored on an IoT terminal equipment and demands that the subscriber/user consents. This is important because it can give others access to privacy-sensitive information stored on such devices.
13 WP29 recommendations on IoT PIA required for IoT applications. IoT Stakeholders must delete raw data as soon as they extracted the aggregated data required for their data processing. Principles of Privacy by Design and Privacy by Default apply. Data subjects must be able to exercise their rights and in control of the data at any time.
14 WP29 requirements for OS and Device manufactures inform stakeholders if data subject withdraws consent provide granular access choices and a do not collect option prevent location tracking
15 WP29 requirements for OS and Device manufactures provide tools to locally read, edit and modify the data before they are transferred to any data controller. inform everyone impacted by a discovered device vulnerability
16 WP29 requirements for OS and Device manufactures apply Security by Design and Cryptography limit data leaving devices and aggregate protect data of different individuals using same device
17 A note on the new Data Protection Legislation Data Protection Regulation will replace Dir. 95/46/EC New Data Protection Regulation currently discussed in Council Italian presidency report on proposal (December 2014) is > 200 pages
18 References Dir. 95/46/EC on Privacy and Data Protection Dir. 2002/58/EC on e-privacy Art. 29 Working Party Opinion 8/2014 on Recent Developments on the Internet of Things Art. 29 Working Party Opinion 5/2010 on online social networking Privacy and Data Protection Impact Assessment Framework adopted on 12 January 2011 for RFID Applications by the Art. 29 Working Party
Opinion 8/2014 on the on Recent Developments on the Internet of Things
ARTICLE 29 DATA PROTECTION WORKING PARTY 14/EN WP 223 Opinion 8/2014 on the on Recent Developments on the Internet of Things Adopted on 16 September 2014 This Working Party was set up under Article 29
ANNEX - health data in apps and devices
ANNEX - health data in apps and devices Concept of health data in Directive 95/46/EC Article 8 of the Data Protection Directive (95/46/EC) qualifies health data as a special category of data to which a
The Internet of Things Risks and Challenges
The Internet of Things Risks and Challenges Providing the insight that enables our customers to make informed business decisions. Antony Price 03rd March 2015 Contents Internet of Things - The next threat
Trusted Personal Data Management A User-Centric Approach
GRUPPO TELECOM ITALIA Future Cloud Seminar Oulu, August 13th 2014 A User-Centric Approach SKIL Lab, Trento - Italy Why are we talking about #privacy and #personaldata today? 3 Our data footprint Every
ESOMAR PRACTICAL GUIDE ON COOKIES JULY 2012
ESOMAR PRACTICAL GUIDE ON COOKIES JULY 2012 Copyright ESOMAR 2012 TABLE OF CONTENTS 2 Objectives 2 Introduction 3 Definitions 4 SECTION 1: APPLICABLE LAW 4 SECTION 2: WHAT YOU NEED TO KNOW SOME FAQs 5
Working Document 02/2013 providing guidance on obtaining consent for cookies
ARTICLE 29 DATA PROTECTION WORKING PARTY 1676/13/EN WP 208 Working Document 02/2013 providing guidance on obtaining consent for cookies Adopted on 2 October 2013 This Working Party was set up under Article
Medical Technologies and Data Protection Issues - QUESTIONNAIRE
Medical Technologies and Data Protection Issues - QUESTIONNAIRE The questionnaire should ideally be completed by data protection authorities, health policy authorities, as well as healthcare providers.
Study of Wireless Sensor Networks and their application for Personal Health Monitoring. Abstract
Study of Wireless Sensor Networks and their application for Personal Health Monitoring. Author 1 Mr. Parag Jawarkar, Author 2 Mrs. Shweta Lambat Abstract Our paper studied Wireless Sensor Network Application
Data protection compliance checklist
Data protection compliance checklist What is this checklist for? This checklist is drawn up on the basis of analysis of the relevant provisions of European law. Although European law aims at harmonizing
1. Introduction. 2. Sectoral Areas Affected. 3. Data Security. 4. Data Breach Requirements. 5. Traffic Data
1. Introduction Special data protection rules apply to the protection of Personal Data by Data Controllers in the electronic communications sector. These are in addition to the general obligations that
UNILEVER PRIVACY PRINCIPLES UNILEVER PRIVACY POLICY
UNILEVER PRIVACY PRINCIPLES Unilever takes privacy seriously. The following five principles underpin our approach to respecting your privacy: 1. We value the trust that you place in us by giving us your
The Internet of Things (IoT) Opportunities and Risks
Session No. 744 The Internet of Things (IoT) Opportunities and Risks David Loomis, CSP Risk Specialist Chubb Group of Insurance Companies Brian Wohnsiedler, CSP Risk Specialist Chubb Group of Insurance
dma How to guide Email and cookies legislation Published by The DMA Email Marketing Council and the IAB Email Marketing Council we are the
dma we are the How to guide Email and cookies legislation Published by The DMA Email Marketing Council and the IAB Email Marketing Council First edition, April 2012 Contents Acknowledgements...2 Introduction...3
National Nursing Informatics Deep Dive Program
National Nursing Informatics Deep Dive Program Patient Engagement, Communication Technologies, and Information Security Dorcas Kunkel, DNP, MS, BSN, APHN-BC University of Minnesota School of Nursing November
The RFID agenda of the European Commission. Florent Frederix European Commission Directorate General Information Society and Media
The RFID agenda of the European Commission RFID i Danmark 2011 May 3, 2011, IT-University in Copenhagen Florent Frederix European Commission Directorate General Information Society and Media This document
I. Personal data and its use in the business to business environment.
RESPONSE FROM THE DIRECT MARKETING ASSOCIATION (UK) LTD. TO THE EUROPEAN COMMISSION'S CONSULTATION ON THE IMPLEMENTATION OF DIRECTIVE 95/46 EC ON THE PROTECTION OF INDIVIDUALS WITH REGARD TO THE PROCESSING
Data privacy guidelines for using Wellnomics Risk Management. Wellnomics White Paper
Data privacy guidelines for using Wellnomics Risk Management Wellnomics White Paper Wellnomics Limited www.wellnomics.com 2008-2010 Wellnomics Limited Ref 062010 Data Privacy Guidelines using Wellnomics
EU Policy on RFID & Privacy
EU Policy on RFID & Privacy Developments 2007, Outlook 2008 Andreas Krisch http://www.edri.org/ http://www.unwatched.org/ 24C3, 30.12.2007 European Digital Rights (EDRi) Umbrella
COMMISSION STAFF WORKING DOCUMENT. on the existing EU legal framework applicable to lifestyle and wellbeing apps. Accompanying the document
EUROPEAN COMMISSION Brussels, 10.4.2014 SWD(2014) 135 final COMMISSION STAFF WORKING DOCUMENT on the existing EU legal framework applicable to lifestyle and wellbeing apps Accompanying the document GREEN
2010 CPT Codes for Cardiac Device Monitoring
2010 CPT Codes for Cardiac Device Monitoring CPT copyright 2009. American Medical Association. All rights reserved. CPT is a registered trademark of the American Medical Association. CPT Code IMPLANTABLE
INERTIA ETHICS MANUAL
SEVENTH FRAMEWORK PROGRAMME Smart Energy Grids Project Title: Integrating Active, Flexible and Responsive Tertiary INERTIA Grant Agreement No: 318216 Collaborative Project INERTIA ETHICS MANUAL Responsible
2.1 It is an offence under UK law to transmit, receive or store certain types of files.
Website Hosting Acceptable Use Policy 1. Introduction 1.1 Jarrett & Lam Consulting s Acceptable Use Policy for hosting customers to protect our resources, the resources of our customers and to ensure that
New CPT Codes for Cardiac Device Monitoring SIDE-BY-SIDE COMPARISON 2008-2009
New CPT Codes for Cardiac Device Monitoring SIDE-BY-SIDE COMPARISON 2008-2009 Effective January 1, 2009 NEW CPT 1 CODES FOR CARDIAC DEVICE MONITORING Twenty-three new CPT codes for Cardiac Device Monitoring
European Commission initiatives on e- and mhealth
European Commission initiatives on e- and mhealth Fundamental Rights Forum, 22 June 2016 WG 24: E-health: improving rights fulfilment through innovation Claudia Prettner, Unit for Health and Well-Being,
Follow the trainer s instructions and explanations to complete the planned tasks.
CERT Exercises Toolset 171 20. Exercise: CERT participation in incident handling related to Article 4 obligations 20.1 What will you learn? During this exercise you will learn about the rules, procedures
Guidelines on Executive Order on Information and Consent Required in Case of Storing and Accessing Information in End-User Terminal Equipment
Guidelines on Executive Order on Information and Consent Required in Case of Storing and Accessing Information in End-User Terminal Equipment ("Cookie Order") 2nd version, April 2013 Preface...3 1. Introduction...5
2015 CPT Codes for Cardiac Device Monitoring
2015 CPT Codes for Cardiac Device Monitoring CPT 1 copyright 2014. American Medical Association. All rights reserved. CPT is a registered trademark of the American Medical Association. CPT Code IMPLANTABLE
Matthias Hauss- SRC Security Research & Consulting GmbH October 2011. PCI DSS Requirements in the Context of European Data Protection Law
Matthias Hauss- SRC Security Research & Consulting GmbH October 2011 PCI DSS Requirements in the Context of European Data Protection Law About SRC Two pillars: Card-based Payment Systems and IT security
HERON (No: 649690): Deliverable D.2.6 DATA MANAGEMENT PLAN AUGUST 2015. Partners: Oxford Brookes University and Università Commerciale Luigi Bocconi
HERON (No: 649690): Deliverable D.2.6 DATA MANAGEMENT PLAN AUGUST 2015 Partners: Oxford Brookes University and Università Commerciale Luigi Bocconi Institutions: Low Carbon Building Group, Oxford Brookes
Electronic Communication In Your Practice. How To Use Email & Mobile Devices While Maintaining Compliance & Security
Electronic Communication In Your Practice How To Use Email & Mobile Devices While Maintaining Compliance & Security Agenda 1 HIPAA and Electronic Communication 2 3 4 Using Email In Your Practice Mobile
Automotive Suppliers and Cybersecurity
Automotive Suppliers and Cybersecurity OEMs sometimes specify their security requirements in an incomplete or vague way, but that certainly doesn t mean that Tier 1 automotive suppliers (Tier 1s) should
Alternative Biometric as Method of Information Security of Healthcare Systems
Alternative Biometric as Method of Information Security of Healthcare Systems Ekaterina Andreeva Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia [email protected]
RFID. Radio Frequency IDentification: Concepts, Application Domains and Implementation LOGO SPEAKER S COMPANY
RFID Radio Frequency IDentification: Concepts, Application Domains and Implementation Dominique Guinard, Patrik Fuhrer and Olivier Liechti University of Fribourg, Switzerland Submission ID: 863 2 Agenda
Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) 2014: 245 incidents reported
Protecting What Matters Most Christian Fahlke, Regional Sales Manager ALPS March 2015 Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) 2014: 245 incidents reported (Source: https://ics-cert.us-cert.gov/sites/default/files/monitors/ics-cert_monitor_sep2014-feb2015.pdf)
CSIS Security Research and Intelligence Research paper: Threats when using Online Social Networks Date: 16/05-2007
CSIS Security Research and Intelligence Research paper: Threats when using Online Social Networks Date: 16/05-2007 Written by Dennis Rand [email protected] http://www.csis.dk Table of contents Table of contents...
Big Data Big Security Problems? Ivan Damgård, Aarhus University
Big Data Big Security Problems? Ivan Damgård, Aarhus University Content A survey of some security and privacy issues related to big data. Will organize according to who is collecting/storing data! Intelligence
SECURITY MEASURES IN THE PERSONAL DATA PROTECTION RULES: TECHNOLOGICAL SOLUTIONS AND LEGAL ADAPTATION
SECURITY MEASURES IN THE PERSONAL DATA PROTECTION RULES: TECHNOLOGICAL SOLUTIONS AND LEGAL ADAPTATION Antonia Paniza-Fullana Civil Law University of Balearic Islands Abstract. Several practical issues
Buckinghamshire County Council Transport for Buckinghamshire ANPR Code of Practice
Buckinghamshire County Council Transport for Buckinghamshire ANPR Code of Practice 1 Introduction 1.1 Buckinghamshire County Council (BCC) Transportation Service has Automatic Number Plate Recognition
Terms and Conditions. Acceptable Use Policy Introduction. Compliance with UK Law. Compliance with foreign law
Terms and Conditions Acceptable Use Policy Introduction (hereafter called Hosted Developments) has created this Acceptable Use Policy (AUP) for hosting customers to protect our resources, and the resources
SAP Splash Privacy Statement
SAP Splash Privacy Statement The SAP Splash Privacy Statement (this Privacy Statement ) applies to the use of this website, http://www.experiencesplash.com (the Website ) and any other subdomains or webpages
PRIVACY STATEMENT OF THE WEBSITE http://www.viscontipalace.com Page 1 of 7
PRIVACY STATEMENT OF THE WEBSITE http://www.viscontipalace.com Page 1 of 7 LEARN MORE ABOUT OUR PRIVACY STATEMENT In this privacy statement, Visconti Cesi S.r.l., with registered office at Via Vittoria
Disclosures HOW WEARABLE TECHNOLOGY AND TELEMEDICINE WILL CHANGE YOUR PRACTICE. Learning Objectives. Are you prepared. Why the growth?
Disclosures HOW WEARABLE TECHNOLOGY AND TELEMEDICINE WILL CHANGE YOUR PRACTICE I wish I had some! Renee P. McLeod PhD, APRN, CPNP, FAANP Dean, College of Nursing United States University [email protected]
Council of the European Union Brussels, 27 April 2015 (OR. en)
Council of the European Union Brussels, 27 April 2015 (OR. en) Interinstitutional File: 2013/0309 (COD) 8337/15 LIMITE TELECOM 97 COMPET 169 MI 268 CONSOM 68 CODEC 603 NOTE From: Presidency To: Delegations
White Paper: RFID s Role in Tracking Medical Assets
White Paper: RFID s Role in Tracking Medical Assets Introduction RFID technology is used successfully around the world in thousands of applications. Long removed from its days as a high-priced science
Transforming healthcare through Internet of Things. Vijayakannan Sermakani Robert Bosch Engineering and Business Ltd
Transforming healthcare through Internet of Things Vijayakannan Sermakani Robert Bosch Engineering and Business Ltd Contents Abstract... 3 1. Introduction... 4 2. Vision and Architecture... 6 3. Health
Great ideas, big data and little privacy? Bart Preneel iminds and COSIC KU Leuven
Great ideas, big data and little privacy? Bart Preneel iminds and COSIC KU Leuven 2 3 NSA calls the iphone users public 'zombies' who pay for their own surveillance 4 Snowden revelations NSA: Collect it
ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY
ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY Originated by: Data Protection Working Group: November 2008 Impact Assessment: (to be confirmed) Recommended by Senate: 28 January 2009 Approved by Council:
Prof. Udo Helmbrecht
Prof. Udo Helmbrecht Guiding EU Cybersecurity from Policy to Implementation Udo Helmbrecht Executive Director Information Security for the Public Sector 2015 Stockholm 02/09/15 European Union Agency for
Stakeholder Engagement Initiative: Customer Relationship Management
for the Stakeholder Engagement Initiative: December 10, 2009 Contact Point Christine Campigotto Private Sector Office Policy 202-612-1623 Reviewing Official Mary Ellen Callahan Chief Privacy Officer Department
Quantified Self: Analyzing the Big Data of our Daily Life. Andreas Schreiber <[email protected]> PyData Berlin 2014
DLR.de Chart 1 Quantified Self: Analyzing the Big Data of our Daily Life Andreas Schreiber PyData Berlin 2014 DLR.de Chart 2 Introduction Scientist, Head of department Co-Founder,
COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS
EUROPEAN COMMISSION Brussels, XXX [ ](2011) XXX draft COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS
Draft Code of Conduct on privacy for mobile health applications
Draft Code of Conduct on privacy for mobile health applications I. About this Code 1) Introduction To be drafted as a last step, when the rest of the Code is more or less stable Ed. 2) Purpose The purpose
CONNECTing to the Future
CONNECTing to the Future IoT Week Venice, 18 June 2012 Bernard Barani European Commission - DG INFSO Deputy Head of Unit, Networked Enterprise and RFID "The views expressed in this presentation are those
Opinion 02/2013 on apps on smart devices
ARTICLE 29 DATA PROTECTION WORKING PARTY 00461/13/EN WP 202 Opinion 02/2013 on apps on smart devices Adopted on 27 February 2013 This Working Party was set up under Article 29 of Directive 95/46/EC. It
AMENDMENTS TO THE DRAFT DATA PROTECTION REGULATION PROPOSED BY BITS OF FREEDOM
AMENDMENTS TO THE DRAFT DATA PROTECTION REGULATION PROPOSED BY BITS OF FREEDOM On 25 January 2012, the European Commission published a proposal to reform the European data protection legal regime. One
Opinion 02/2013 on apps on smart devices
ARTICLE 29 DATA PROTECTION WORKING PARTY 00461/13/EN WP 202 Opinion 02/2013 on apps on smart devices Adopted on 27 February 2013 This Working Party was set up under Article 29 of Directive 95/46/EC. It
Privacy Policy on the Responsibilities of Third Party Service Providers
Privacy Policy on the Responsibilities of Third Party Service Providers Privacy Office Document ID: 2489 Version: 3.1 Owner: Chief Privacy Officer Sensitivity Level: Low Copyright Notice Copyright 2014,
Opinion of the European Data Protection Supervisor
Opinion of the European Data Protection Supervisor on the Commission Proposal for a Regulation of the European Parliament and of the Council on a European network of Employment Services, workers' access
5439/15 PT/ek 1 DG E
Council of the European Union Brussels, 20 January 2015 5439/15 Interinstitutional File: 2013/0309 (COD) TELECOM 17 COMPET 12 MI 28 CONSOM 13 CODEC 70 NOTE from: Presidency to: Delegations No. Cion prop.:
Monitoring Employee Communications: Data Protection and Privacy Issues
Monitoring Employee Communications: Data Protection and Privacy Issues By Anthony Sakrouge, Kate Minett, Daniel Preiskel and Jose Saras Reprinted from Computer and Telecommunications Law Review Issue 8,
Best Practices at Research Level
PReparing Industry to Privacy-by-design by supporting its Application in REsearch Best Practices at Research Level Hisain Elshaafi Telecommunications Software and Systems Group (TSSG) Waterford Institute
1. What information do we collect?
CHURNSPOTTER.IO PRIVACY POLICY Last updated: February 03, 2015 Welcome to the http://churnspotter.io Web site (the Site ) owned by PREDICSIS S.A.S, a corporation organized and existing under the laws of
INTERNET OF THINGS FOCUS AREA
HORIZON 2020 WP 2016-17 INTERNET OF THINGS Ana Cuadrado Galván European Commission DG Agriculture and Rural Development Unit H5. Research and Innovation IoT Focus Area Calls IoT Direct Focus Area Calls
How we keep harmful apps out of Google Play and keep your Android device safe
How we keep harmful apps out of Google Play and keep your Android device safe February 2016 Bad apps create bad experiences, so we work hard to keep them off your device and out of Google Play. In 2015,
INCREASING PRODUCTIVITY. By Implementing A Non-Invasive Employee Surveillance Solution
INCREASING PRODUCTIVITY By Implementing A Non-Invasive Employee Surveillance Solution Introduction 3 Employee Monitoring 3 How It Works 4 Employee Activity 5 Internet Activity 5 Applications Used 5 Overtime
ACA is committed to protecting your privacy. ACA ( we, us or our ) safeguards your personal information to maintain member trust.
Privacy Policy Introduction Your access to the ACA site is subject to the privacy policy as well as all applicable laws. By accessing and using the ACA site, you accept and agree to this Privacy Policy
The HYDRA project. Personal health monitoring
The HYDRA project A middleware platform for personal health monitoring Peter Rosengren, Technical Coordinator [email protected] IST-2005-034891 Personal health monitoring Patient has some medical
