PALANTIR & LAW ENFORCEMENT



Similar documents
PALANTIR HEALTH. Maximizing data assets to improve quality, risk, and compliance. 100 Hamilton Ave, Suite 300 Palo Alto, California 94301

ACCELUS COMPLIANCE MANAGER FOR FINANCIAL SERVICES

Integrated archiving: streamlining compliance and discovery through content and business process management

February 17, Federal Trade Commission 600 Pennsylvania Avenue, NW Washington, DC 20580

Can CA Information Governance help us protect and manage our information throughout its life cycle and reduce our risk exposure?

ADDRESSES SYSTEM LOCATION

Immigration and Customs Enforcement Forensic Analysis of Electronic Media

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture

Meeting Changing Information Management Needs with Next-Generation Archiving

Regulatory Compliance Requirements with VERITAS Enterprise Vault and Microsoft Windows Server Technologies

7Seven Things You Need to Know About Long-Term Document Storage and Compliance

Datosphere Platform Product Brief

OPTIMUS SBR. Optimizing Results with Business Intelligence Governance CHOICE TOOLS. PRECISION AIM. BOLD ATTITUDE.

Federal Trade Commission Privacy Impact Assessment

IBM Unstructured Data Identification and Management

Laserfiche for Federal Government MEET YOUR AGENCY S MISSION

Five-Year Strategic Plan

Montgomery County, Unique Aspects of the Medicaid Control System

White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA

Laserfiche for Federal Government MEET YOUR AGENCY S MISSION

Governance, Risk, and Compliance (GRC) White Paper

NETWORK AND AIS AUDIT, LOGGING, AND MONITORING POLICY OCIO TABLE OF CONTENTS

W H I T E P A P E R E X E C U T I V E S U M M AR Y S I T U AT I O N O V E R V I E W. Sponsored by: EMC Corporation. Laura DuBois May 2010

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services.

Optimizing government and insurance claims management with IBM Case Manager

THE FCA INSPECTOR GENERAL: A COMMITMENT TO PUBLIC SERVICE

Standard: Information Security Incident Management

Certified Information Professional 2016 Update Outline

Achieving Control: The Four Critical Success Factors of Change Management. Technology Concepts & Business Considerations

The Smart Archive strategy from IBM

Only 1% of that data has preservation requirements Only 5% has regulatory requirements Only 34% is active and useful

Seven Things To Consider When Evaluating Privileged Account Security Solutions

DHS Plans to Target Large Data Projects

Compliance Requirements for Healthcare Carriers

Realizing business flexibility through integrated SOA policy management.

Three Fundamental Techniques To Maximize the Value of Your Enterprise Data

Protecting Business Information With A SharePoint Data Governance Model. TITUS White Paper

COMPLIANCE MANAGEMENT SOLUTIONS THOMSON REUTERS ACCELUS COMPLIANCE MANAGEMENT SOLUTIONS

Mental Health Resources, Inc. Mental Health Resources, Inc. Corporate Compliance Plan Corporate Compliance Plan

IBM ediscovery Identification and Collection

May 2 1,2009. Re: DHS Data Privacy and Integrity Advisory Committee White Paper on DHS Information Sharing and Access Agreements

1 LAWS of MINNESOTA 2015 Ch 67, s 2. CHAPTER 67--S.F.No. 86 BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF MINNESOTA:

What we do? Our services include:

The Impact of HIPAA and HITECH

Task. DPIAC Recommendations. As Approved in Public Session September 22, 2014

Federal Bureau of Investigation s Integrity and Compliance Program

Keeping watch over your best business interests.

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES

Information Governance in the Cloud

Why enterprise data archiving is critical in a changing landscape

What Leaders Need to Know About Managing Data Risk in Student Success Systems

A Privacy Officer s Guide to Providing Enterprise De-Identification Services. Phase I

Risk-Based Approach to 21 CFR Part 11

Pharmaceutical Sales Certificate

Best Practices for. Protecting Privacy, Civil Rights & Civil Liberties. Unmanned Aircraft Systems Programs

10 Things IT Should be Doing (But Isn t)

University of California Policy

Using ISO as an Audit Tool

UTILIZING COMPOUND TERM PROCESSING TO ADDRESS RECORDS MANAGEMENT CHALLENGES

Student Administration and Scheduling System

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

9/11 Heroes Stamp Act of 2001 File System

Paxata Security Overview

Department of Homeland Security Management Directives System MD Number: Issue Date: 03/01/2003 DHS USAGE

How can Identity and Access Management help me to improve compliance and drive business performance?

Technology Advisory Committee

Automated Threat Prioritization Web Service

Implementing a Successful Digital First Strategy

Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.

CONSOLIDATED RECORDS MANAGEMENT SYSTEM (CRMS) USER AGREEMENT

Contents of This Paper

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Cyber Security Risk

DOCSVAULT WhitePaper. Concise Guide to E-discovery. Contents

A Guide Through the BPM Maze

How To Manage Security On A Networked Computer System

ARCHIVING FOR EXCHANGE 2013

C21 Introduction to User Access

BUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING SAP NetWeaver IDENTITY MANAGEMENT

From Information Management to Information Governance: The New Paradigm

10 Steps to Establishing an Effective Retention Policy

Oracle Real Time Decisions

The biggest challenges of Life Sciences companies today. Comply or Perish: Maintaining 21 CFR Part 11 Compliance

Service Definition Document

MIPRO s Business Intelligence Manifesto: Six Requirements for an Effective BI Deployment

Content-Centric Networking Applications For Medical Devices and Healthcare Management Systems

Security Information Lifecycle

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services.

650 Clark Way Palo Alto, CA

April 8, Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

Deloitte Discovery Caribbean & Bermuda Territory Guide

Privacy Impact Assessment Of the. Office of Inspector General Information Technology Infrastructure Systems

CONNECTING ACCESS GOVERNANCE AND PRIVILEGED ACCESS MANAGEMENT

# Is ediscovery eating a hole in your companies wallet?

Wyoming School Boards Association Insurance Trust ( The Plan ) HEALTH CARE PLAN PRIVACY NOTICE

THE PRESIDENT S NATIONAL SECURITY TELECOMMUNICATIONS ADVISORY COMMITTEE

Simplified Management With Hitachi Command Suite. By Hitachi Data Systems

EPA Classification No.: CIO 2155-P-3.0 CIO Approval Date: 04/04/2014 CIO Transmittal No.: Review Date: 04/04/2017

University of Michigan Medical School Data Governance Council Charter

Repave the Cloud-Data Breach Collision Course

Transcription:

100 Hamilton Avenue Palo Alto, California 94301 PALANTIR & LAW ENFORCEMENT Protecting Privacy and Civil Liberties

TABLE OF CONTENTS Introduction Solution Overview Privacy Protective Technology Enforcing Access Managing Data Retention Overseeing Use and Ensuring Accountability Privacy & Civil Liberties Engineering 2 3 4 4 5 7 8 1

INTRODUCTION As local, state, and federal level law enforcement agencies introduce cutting-edge investigative and analytical techniques to better serve and protect their communities, they must also employ equally innovative technologies to ensure that those techniques do not undermine fundamental privacy and civil liberties protections. The Palantir Platform provides law enforcement customers with a data integration and analysis software platform that builds upon existing law enforcement data stores to enable comprehensive knowledge management, collaboration, search, and investigative capabilities. A core feature of the offering is the flexibility necessary to build a rigorous data management and oversight regime without sacrificing utility. Analytical effectiveness does not need to come at the expense of privacy protections. This white paper describes key technical features of the Palantir Platform that can be configured to protect privacy and civil liberties and meet evolving regulatory standards. It also describes our approach to civil liberties engineering as a confluence of efforts working with customers, developers, advisors, and other relevant stakeholders to build and help implement solutions that effectively address the law enforcement challenges of today and tomorrow. 2

SOLUTION OVERVIEW Palantir Technologies is a software company focused on helping our customers solve some of the world s hardest problems. Our flagship software, the Palantir Platform, features a full suite of analytical tools that enable organizations and their analysts to collaboratively generate actionable insights from large and disparate data sets. The Palantir Platform has been used to tackle data-driven problems in myriad contexts, from efficiently delivering aid to victims of a natural disaster to helping law enforcement agencies (LEAs) coordinate efforts to track a dangerous fugitive or rescue an abducted child. Consistent with our core philosophy, the Palantir Platform supports both powerful analysis and protection of privacy and civil liberties through the following key architectural principles: Precision data control Our LEA customers own and control their data, and can regulate access, use, and sharing of that data with extreme granularity. Intelligence augmentation, not artificial intelligence We recognize that computers excel at certain tasks (e.g., repetitive computations), while humans are better at others (e.g., critical decision making, especially where the lives and liberties of individuals are concerned). Palantir is designed to put the analyst at the top of the analytical chain, while the machine handles the more tedious workflows, thereby freeing humans to focus on the types of data problems that cannot be solved purely algorithmically or that could affect individual liberties if mishandled. Mission-driven data analytics We understand that information is not an end in itself and that the goal of law enforcement analysis is not to indiscriminately amass or review large data sets, but rather to maximize useful and mission-focused insights that are gained from data. With this focus front-of-mind, Palantir can help customers limit the use (or misuse) and exposure of irrelevant data. The following section details the specific ways in which the Palantir Platform s capabilities are used to protect privacy and civil liberties while maximizing mission effectiveness. 3

PRIVACY PROTECTIVE TECHNOLOGY In addition to providing a powerful suite of analytical tools, the Palantir Platform is designed to be flexible and configurable to meet the legal and ethical requirements of various jurisdictions. This flexibility allows organizations to operate responsibly in nascent and ever-evolving legal regimes. This built-in flexibility allows law enforcement agencies to implement privacy- and civil liberties-protective policies in the context of data analytics, and to adapt their data analytics tools to new requirements as legislatures and courts react to the evolving technological landscape. Enforcing Access The Palantir Platform is designed with robust and granular access controls that allow LEAs to ensure users are exposed only to the information they need to do their job and are lawfully entitled to see. Access control frameworks can be configured on a data-point-by-data-point basis to precisely match the organizational and data management structure of any LEA. Source-based access restrictions Information from law enforcement data sources (e.g., Criminal History Records, Computer-Aided Dispatch Calls for Service, or Automated License Plate Reader data) can be controlled at the property or sub-property/metadata level. For example, general users may be permitted to see nonidentifying features of an offense record (e.g., type of offense, date, time), while only supervisors are granted permission to see details identifying the individuals involved as suspects, victims, or witnesses in the recorded event. Functional access restrictions Owner permissions Write permissions Read permissions Multiple levels of access can be used to restrict the mode of interaction with any given data element. Palantir users can be assigned: Allows users to read, edit, and grant access to others Allows users to read and edit Allows users only to view or read 4

Discovery permissions No permissions Allows users to search for matching results, but instead of seeing any actual details of the matching record they are only shown a message providing contact information for the appropriate data owner/controller to contact to request authorized access Does not allow users to search, discover, view or in any other way interact with or identify the existence of a piece of information Role-based access restrictions Role-based classifications allow administrators to define groups of users (or individual users) whose particular responsibilities permit them to access certain sets and levels of information. This capability enables LEAs to enforce applicable classification regimes for sensitive or restricted data types (e.g., records related to juveniles, sex offense victims, or other sensitive/vulnerable victims), individual roles and legal authorities, and changing access conditions over time (e.g., access can be terminated automatically at the close of a case, end of a grand jury term, etc.). Predicate-based access restrictions Access controls can be further configured to enforce predicate- or justification-based access restrictions for particularly sensitive information. For example, when Automatic License Plate Reader (ALPR) data is integrated in the Palantir Platform for search and analysis, Palantir users accessing this data can be required to provide mandatory, auditable search predicates such as investigation categories and/or a specific case number certifying the particular inquiry has a legitimate purpose. Additional restrictions can be further applied based on these purposes to, for example, limit the geospatial and temporal ranges of ALPR query results returned in accordance with the investigatory parameters. These access control elements can combine to enable privacy protective compartmentalization of information of different types, while providing a single point of access across many types of users, roles, and responsibilities within a LEA. Managing Data Retention LEAs are inundated with data, and they need to be able to quickly identify what is immediately useful, what needs further consideration, and what can be discarded as 5

irrelevant to an authorized investigation. Furthermore, law enforcement information that is collected and analyzed may not always be permitted to be or, as a matter of best practices, should not be held indefinitely. For example, some federal statutes and regulations (e.g., 28 CFR Part 23, pertaining to multijurisdictional agencies handling of Criminal Intelligence records) establish rules for the handling and preservation of certain classes of records. Other records types (e.g., ALPR hits or Tips and Leads reports) may be governed by state, local, or institutional policies addressing whether and how long information can be retained in data systems. The Palantir Platform enables LEAs to effectively implement differential records retention and purging standards for such records. Palantir can be configured to notify data owners when retention deadlines are approaching so that records may be reviewed and asks data owners to confirm deletion actions or (where appropriate) assert justification for continuing to retain the data. Palantir also provides flexibility by supporting different records removal measures, including: Archiving (i.e., securely locked-down and/or restricted storage of older or more sensitive information); Anonymization and de-identification of personally identifying records; Soft deletion (i.e., records deletion in such a way that records retrieval is effectively impossible through front-end user access, but still possible through back-end administrator access if properly authorized and needed, e.g., for redress purposes or investigation of allegations of mishandling); and Hard deletion (i.e., records deletion of data such that records retrieval is no longer possible via either front-end or back-end methods under any circumstances). Palantir provides a consolidated platform for records access using a pointer system to establish a single authoritative version of each record (as opposed to paper records regimes or other digital records management systems that may replicate records for different user interactions). As a result, all changes, updates, corrections, and other definitive actions are automatically propagated system-wide to all users. Maintaining a single authoritative version of each record ensures that critical records purging is efficiently propagated throughout the enterprise to mitigate the risk of digital records copies. 6

Overseeing Use and Ensuring Accountability LEAs using the Palantir Platform can rely on detailed records of system usage to provide quick and easy, empirically-backed analyses that show exactly how a system is used. Our technology is engineered to make audit analytics efficient and powerful. The Palantir Platform provides tamper-evident and effectively immutable audit logs that can be configured with extreme specificity to give authorized parties a full view of users interactions with the system and use of information to which they have access. But beyond simply generating and storing audit trails, we have worked with our law enforcement customers to provide the analytical tools and capabilities needed to make audit records truly usable. As a result, auditors or other oversight officials with the means to identify and investigate potential misuse or abuse of sensitive law enforcement information to mitigate privacy and civil liberties risks can do so easily and independently of primary users or IT Department assistance. 7

PRIVACY & CIVIL LIBERTIES ENGINEERING The continued protection of privacy and civil liberties in the context of new technologies, particularly those that facilitate data analytics on a broad scale, is one of the most important challenges of our time. This challenge raises questions of law, policy, and our shared community values, but also difficult questions about the role that technology can play in increasing accountability and buttressing sound policy. As a software company focused on solving hard engineering problems and committed to the importance of privacy and civil liberties values, we believe that we are uniquely situated to address these crucial technical questions. We have built a unique Privacy and Civil Liberties Team that works with customers to implement the above capabilities and even configure new technologies to meet specific needs. Beyond our work with our developer and field engineering teams, support customer and community engagement to truly make the above technologies actionable. For example, we work with our customers to provide technical assistance with the drafting of Privacy Impact Assessments of Palantir systems components. We also have extensive experience engaging with our customers, their legal counsel, policy experts, and privacy officers to adapt and refine policies to better align business rules and operating procedures with the realities of current and emerging technologies and to provide firmer grounding for the adoption, configuration, and implementation of the privacy protective technologies provided by Palantir especially in cases where existing regulations expressed in paper file terms do not cleanly translate to the architectures of modern information systems. To support these initiatives, we draw on the expertise of a formal team of what we call Civil Liberties Engineers (a multi-disciplinary group with backgrounds spanning law, computer science, and philosophy who share a common passion for privacy and civil liberties issues), a prominent advisory board of academic and privacy experts (the Palantir Council of Advisors on Privacy and Civil Liberties), external privacy counsel, and others. We also have a history of actively and constructively engaging with independent review organizations (e.g., the Institute for Intergovernmental Research), policymakers, advocacy groups, and privacy academics to continuously reevaluate and refine our technologies and to identify and build new privacy protective technologies. We are committed to building, deploying, and maintaining exceptional privacy protective technologies to help our law enforcement customers responsibly serve and protect. 8