Have it all Protecting privacy in the age of analytics



Similar documents
Privacy by Design Protecting privacy in the age of analytics

Privacy by Design Setting a new standard for privacy certification

Using Privacy by Design to Achieve Big Data Innovation Without Compromising Privacy

The 7 Foundational Principles. Implementation and Mapping of Fair Information Practices. Ann Cavoukian, Ph.D.

Privacy by Design The 7 Foundational Principles Implementation and Mapping of Fair Information Practices

A Q&A with the Commissioner: Big Data and Privacy Health Research: Big Data, Health Research Yes! Personal Data No!

Managing the message. Businesses brace for new digital marketing compliance requirements

How To Respond To The Nti'S Request For Comment On Big Data And Privacy

A NEW APPROACH TO CYBER SECURITY

Maximize the Value of Your Data and the Ability to Protect Privacy, by Design

Cyberprivacy and Cybersecurity for Health Data

1. Understanding Big Data

Adding insight to audit Transforming internal audit through data analytics

Ann Cavoukian, Ph.D.

Learning to drive your Ferrari

Application Security in the Software Development Lifecycle

The Directors Cut. The power of data: What directors need to know about Big Data, analytics and the evolution of information.

The Ontario Health Study s Assessment Centres: A Case Study for Privacy by Design

Understanding the impact of the connected revolution. Vodafone Power to you

Privacy by Design: Effective Privacy Management in the Victorian Public Sector

Consumer products analytics The three-minute guide

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

Balancing Access to Information While Preserving Privacy, Security and Governance in the Era of Big Data

Strategies for optimizing your inventory management

The Future-ready Enterprise Simplicity, flexibility, and the art of delivering business outcomes.

Privacy Guidelines for RFID Information Systems (RFID Privacy Guidelines)

Ann Cavoukian, Ph.D.

THE STATE OF DATA SHARING FOR HEALTHCARE ANALYTICS : CHANGE, CHALLENGES AND CHOICE

The dawn of mobile influence. Discovering the value of mobile in retail

Strategies for optimizing your cash management

New Channels Create New Growth Opportunities for Insurers. North American Insurance Distribution Survey Findings

Big Data, Big Risk, Big Rewards. Hussein Syed

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

Cyber security Building confidence in your digital future

A Pragmatic Guide to Big Data & Meaningful Privacy. kpmg.be

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry

WHITE PAPER. Balancing Access to Information While Preserving Privacy, Security and Governance in the Era of Big Data.

Part of the Deloitte working capital series. Make your working capital work for you. Strategies for optimizing your accounts payable

Are You Big Data Ready?

White paper. Ensuring Big Data Security with Identity and Access Management

For healthcare, change is in the air and in the cloud

Do you know your privacy risks? How new technologies, changing business models, and emerging regulations are changing the data-protection landscape

Data analytics Delivering intelligence in the moment

Test Data Management for Security and Compliance

Introduction to Big Data

Privacy & Big Data: Enable Big Data Analytics with Privacy by Design. Datenschutz-Vereinigung von Luxemburg Ronald Koorn DRAFT VERSION 8 March 2014

Loss Prevention Data Mining Using big data, predictive and prescriptive analytics to enpower loss prevention

Managing the Shadow Cloud

Washington State s Use of the IBM Data Governance Unified Process Best Practices

data driven government

Cyber Security Evolved

Access is power. Access management may be an untapped element in a hospital s cybersecurity plan. January kpmg.com

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES

Compliance in motion A closer look at the Corporate Sector. Deloitte Risk Services March 2015

Big data The three-minute guide

Risk Considerations for Internal Audit

At a recent industry conference, global

Digital Asset Management. Delivering greater value from your assets by using better asset information to improve investment decisions

Capitalizing on the promise of Big Data How a buzzword morphed into a lasting trend that will transform the way you do business

Risk and responsibility in a hyperconnected world: Implications for enterprises

How To Transform Insurance Through Digital Transformation

Next presentation starting soon Business Analytics using Big Data to gain competitive advantage

M&A analytics The three-minute guide

Cyber Security - What Would a Breach Really Mean for your Business?

White Paper Big Data Without Big Headaches

CYBER SECURITY, A GROWING CIO PRIORITY

Advisory services. Services beyond the audit

ADVISORY SERVICES. Risk management in an evolving world. Making the case for social media governance. kpmg.com

Managing IT Security with Penetration Testing

NETWORK SECURITY FOR SMALL AND MID-SIZE BUSINESSES

How To Protect Your Data From Theft

Big Impacts from Big Data UNION SQUARE ADVISORS LLC

What s Trending in Analytics for the Consumer Packaged Goods Industry?

Report of the Information & Privacy Commissioner/Ontario. Review of the Canadian Institute for Health Information:

Comments of the World Privacy Forum To: Office of Science and Technology Policy Re: Big Data Request for Information. Via to

Cyber security: everybody s imperative. A guide for the C-suite and boards on guarding against cyber risks

How To Manage Social Media Risk

Cost recovery analytics The three-minute guide

case study Core Security Technologies Summary Introductory Overview ORGANIZATION: PROJECT NAME:

Cybersecurity and internal audit. August 15, 2014

Predicting the future of predictive analytics. December 2013

Transcription:

Have it all Protecting privacy in the age of analytics

Acknowledgements: The authors wish to acknowledge Megan Brister, National Privacy Leader, Deloitte and Michelle Chibba, Director, Policy & Special Projects, IPC. Our thanks also go to Catherine Thompson, Regulatory and Policy Advisor and David Weinkauf, Policy & Information Technology Officer at IPC and Michelle Gordon, Daniel Horovitz and Sylvia Kingsmill at Deloitte for their contributions to this paper. 2

executive summary Big Data is about innovation Data is undergoing a dramatic evolution. Businesses, governments and other organizations are unlocking value by turning everyday information into actionable insights. Two key trends are driving this shift: There s a lot more data. Every two days, the world creates as much new data as in all the years to 2003. Every two days. Hence the term Big Data. With advances in data analytics, vast sets of both structured and unstructured data can be processed at very high speeds. Our ability to connect information, identify patterns and personalize interactions for maximum result has reached a level of sophistication once only dreamed about. Therein lies the problem. Privacy is about personal information Data analytics is so powerful it can combine data sets to infer someone s lifestyle, consumer habits, social networks and more even if no one data set actually reveals this personal information. Not surprisingly, concerns are being raised over Big Data s impact on privacy. There are fears that fundamental protections, once taken for granted, are now challenged by the sheer velocity, veracity and volume of data and how it can be manipulated. Some argue our very notion of privacy must change, that the imperative to innovate and unlock value from data must trump traditional concepts. But this idea of trade-off between privacy and innovation is unhelpful and, frankly, outdated. We believe it is entirely possible to protect personal privacy while using data analytics to reveal new insights and innovation to advance progress. Indeed, just as technology gave rise to data analytics, it can also be used to solve the resultant privacy issues. We can have it all Privacy by Design (PbD) is designed to reconcile the need for robust data protection with the desire for data-driven innovation. Developed in the late 1990s by Dr. Ann Cavoukian, Information and Privacy Commissioner of Ontario, PbD embeds privacy directly into the design specifications of technology, business practices and networked infrastructure. Building on the PbD framework, several technology-based options for advancing privacy while pursuing data analytics are available to organizations, including: Data minimization: No personally identifiable information is collected unless a specific and compelling purpose is defined, all but eliminating privacy risk at the earliest stage. De-identification: Datasets are stripped of all information that could identify an individual, either directly or through linkages to other datasets. User access controls: A set of processes that grant or deny specific requests to obtain information; generally combined with other security policies. The Big Data era is here to stay. But that doesn t mean we must sacrifice privacy or shackle innovation. Through careful planning and application of privacy techniques and principles, such as those embodied in Privacy by Design, organizations can use data for its business needs while at the same time protecting the personal information contained in the data. Have it all: Protecting privacy in the age of analytics 1

Big Data is big disruption The amount of data Internet search queries, social media, GPS location information, stock transactions, etc. generated by individuals, Internet-connected devices and businesses is growing at an exponential rate. There are currently 9.6 billion Internet-connected devices 1 and 1.3 billion mobile broadband connections 2 in the world. Every two days, these devices create roughly five exabytes (10 18 ) of data. That s as much as all the data created by humans from the dawn of civilization to 2003. 3 The result is that, in this era of Big Data, data is now among any organization s most valuable assets. And analyzing it properly can provide essential insights to help organizations develop strategy, manage risk and deliver growth and operational performance. Organizations are understandably keen to unlock the business value of the data they ve been collecting. They want to use this data to make smarter decisions that improve customer service, process efficiencies and outcomes. And they can. Recent and rapid advances make it possible to process large amounts of structured and unstructured data at very high speeds. Data analytics are accelerating the pace of innovation and disrupting traditional business models. For example: Retailers are tailoring their marketing to customers preferences and purchasing behaviours. Financial services firms are delivering advice and product recommendations before clients know they want them. Healthcare organizations are improving diagnoses, treatments and public health management. Governments are making their data available to the public to increase transparency and encourage public engagement. In some industries, competitors are sharing data to address common concerns such as fraud, cyber security, and health and safety performance. Put simply, today s data analytics enables organizations to make connections, identify patterns, predict behaviour and personalize interactions to an extent that could scarcely be imagined just a decade ago. And therein lies the problem. 1 IMS Research, Internet connected devices approaching 10 billion, to exceed 28 billion by 2020, October 2012, http://imsresearch.com/ press-release/internet_connected_devices_approaching_10_billion_to_exceed_28_billion_by_2020&cat_id=113&type=latestresearch. 2 GSMA, http://www.gsma.com/newsroom/gsma-research-demonstrates-that-mobile-industry-is-creating-a-connected-economy. 3 M.G. Siegler, Eric Schmidt: Every 2 Days We Create As Much Information As We Did Up to 2003, TechCrunch, August 4, 2010, http:// techcrunch.com/2010/08/04/schmidt-data. 2

Big disruption equals big risks In particular, organizations must be alert to threats of unauthorized access to data, especially personal data. More broadly, these risks can include reputational harm, legal action, regulatory sanctions, disruption of internal operation and weakened customer loyalty all of which can result in revenue and profit losses. But the biggest risk that Big Data poses is the creation of automatic data linkages between seemingly non-identifiable data that can result in a broad portrait of an individual. Powerful analytics solutions can link data sets to reveal someone s lifestyle, consumer habits, social networks and more even if no single data set reveals this personal information. A telephone number or postal code, for example, can be combined with other data to identify the location of a person s home and work. An IPor email address can be used to identify consumer habits and social networks. Other examples of risk include: Unauthorized disclosure, loss or data theft is clearly a threat to privacy, and is of course more serious when the Big Data set contains centralized, identifiable information. In extreme cases, unauthorized disclosure of personal information can put public safety at risk. Nudging is the use of identifiable data to profile individuals in order to analyze, predict and influence their behaviour. For example, someone with a bias against scarcity will be automatically served an ad which states while supplies last, while a person with a bias for following others will get an ad labelled bestselling. While it s gaining popularity, nudging may be perceived as invasive. Outsourcing data analytics can make managing accountability more difficult. Secondary use of data also raises concerns. In general, organizations can only use individuals personal information for the purpose(s) identified at the time they collected the information with the person s consent. Using that information in analytics may be considered a secondary use and unless the individual gave express consent, that can be seen as a breach. The overriding issue here is privacy. Have it all: Protecting privacy in the age of analytics 3

Privacy is personal Information privacy refers to the right or ability of individuals to exercise control over the collection, use and disclosure by others of their personal information. Almost any information, if linked to an identifiable individual, can become personal. And individuals are growing concerned: 93% worry about their privacy online 45% do not trust companies with their personal information 89% avoid doing business with companies that they believe do not protect their privacy But not all data is personally identifiable, and not all non-personal data is the same. De-identified information refers to records that have had personal information removed or obscured such that there is no reasonable basis to believe that the information can be used to identify an individual. Aggregated information is information whose values have been generated by performing a calculation across all individual units as a whole. For example, while uncovering new treatment strategies, medical researchers might look for patterns in aggregated patient data but have no way to identify specific individuals. Non-personal, confidential information is information that often holds tremendous value and importance for organizations, such as business plans and proprietary research or other intellectual property. The disclosure or loss of such confidential information can be of grave concern for organizations, but it does not constitute a privacy breach because it does not involve the handling of personal information. Some kinds of information are not so easily characterized. One example is metadata information about other information, such as call lengths and other data about functional usage generated by mobile phones. As it happens, the detailed pattern of associations revealed through metadata can be far more invasive of privacy than merely accessing the actual content of one s communications. 4

Big data and privacy are not mutually exclusive Predictably, there are differing views. Some say big data analytics challenges fundamental privacy protections while others argue that our privacy requirements are a barrier to the fruits of advanced analytics. But neither argument resolves anything. A new solution is needed, one in which the interests and objectives of both innovation and privacy can be met. The view held in some quarters that privacy stifles innovation is as dated and flawed as the notion that privacy must be sacrificed for innovation. In fact, the opposite is true: privacy drives innovation because it forces innovators to think creatively to find solutions that can serve multiple functionalities. We believe it is entirely possible to achieve privacy in the Big Data era while using data analytics to unlock new insights and innovations to move organizations forward. In our view, compliance-based approaches to privacy protection tend to focus on addressing privacy breaches after the fact. Instead, we recommend that organizations build privacy protections into their technology, business strategies and operational processes to prevent breaches before they happen. Fortunately, there s already a framework for doing just that. Have it all: Protecting privacy in the age of analytics 5

Privacy by Design One of the most widely recognized approaches to proactive privacy is Privacy by Design (PbD). This framework was developed in the late 1990s by Dr. Ann Cavoukian, Information and Privacy Commissioner of Ontario, in response to the ever-growing impact of information and communications technologies and large-scale networked data systems. The PbD concept is to embed privacy measures directly into IT systems, business practices and networked infrastructure, providing a middle way by which organizations can balance the need to innovate and maintain competitive advantage with the need to preserve privacy. (See sidebar.) Implementing this framework can result in changes to governance structures, operational and strategic objectives, roles and accountabilities, policies, information systems and data flows, decision-making processes, relationships with stakeholders and even an organization s culture. It s no flash-in-the-pan theory, either: PbD has been endorsed by many publicand private sector authorities in the United States, the European Union and elsewhere. These include the U.S. White House, Federal Trade Commission, Department of Homeland Security, Government Accountability Office, European Commission, European Parliament and the Article 29 Working Party, among other public bodies around the world who have passed new privacy laws. Additionally, international privacy and data protection authorities unanimously endorsed Privacy by Design as an international standard for privacy. Adopting PbD is a powerful and effective way to embed privacy into the DNA of an organization. It establishes a solid foundation for data analytics activities that support innovation without compromising personal information. The seven principles of Privacy by Design 1. Use proactive rather than reactive measures; anticipate and prevent privacy invasive events before they happen. 2. Personal data must be automatically protected in any given IT system or business practice. If an individual does nothing, their privacy still remains intact. 3. Privacy must be embedded into the design and architecture of IT systems and business practices. It is not bolted on, after the fact. 4. All legitimate interests and objectives are accommodated in a positive-sum manner. 5. Security is applied throughout the entire lifecycle of the data involved. 6. All stakeholders are assured that whatever the business practice or technology involved, it is operating according to the stated promises and is subject to independent verification. 7. Architects and operators must keep the interests of the individual uppermost by offering such measures as strong privacy defaults, appropriate notice and empowering user-friendly options. 6

Strategies and tools to safeguard personal information Building on the PbD framework, organizations have several technology-based options for advancing privacy while also using data analytics: Several emerging technologies hold much promise for enabling privacy and utility to co-exist. These researchlevel examples include: Data minimization reduce the data collected According to this strategy, no personally identifiable information is collected unless a specific and compelling purpose is defined effectively eliminating privacy risk at the earliest stage. Differential privacy Random noise is injected into the results of dataset queries to provide a mathematical guarantee that the presence of any one individual in the dataset will be masked. Software evaluates the privacy risks of a query and determines the level of noise to introduce into the result before releasing it. De-identification make individuals less identifiable With this strategy, datasets are stripped of all information that could identify an individual, either directly or though linkages to other datasets. Synthetic data As long as the number of individuals in the dataset is large enough, it is possible to generate a dataset composed entirely of fictional individuals or altered identities that retain the statistical properties of the original dataset while delivering differential privacy s mathematical noise guarantee. User access controls restrict access This is a set of processes that grant or deny specific requests to obtain information, and is generally combined with other security policies to safeguard personal information. Have it all: Protecting privacy in the age of analytics 7

Innovation plus privacy The era of Big Data era is here and it isn t going away. The ability to use data to connect information, identify patterns and personalize interactions for maximum business result has reached an extraordinary level of sophistication. Organizations will continue to use data analytics to advance their strategic goals, but the smart ones will embrace privacy as a driver of creativity and innovation and embed it into their systems to ensure quality results. Through careful planning and application of privacy techniques and principles, organizations can use data to move business ahead and protect the personal information contained within them. We can, in other words, have it all. 8

This page has been intentionally left blank.

For more information, please contact: Dr. Ann Cavoukian, Ph.D. Information and Privacy Commissioner +1 416-326-3333 info@ipc.on.ca David Stewart National Advanced Analytics Leader Deloitte +1 416-775-7484 davstewart@deloitte.ca Beth Dewitt Manager and Privacy Specialist Deloitte +1 416-643-8223 bdewitt@deloitte.ca www.deloitte.ca Deloitte, one of Canada s leading professional services firms, provides audit, tax, consulting, and financial advisory services. Deloitte LLP, an Ontario limited liability partnership, is the Canadian member firm of Deloitte Touche Tohmatsu Limited. Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee, and its network of member firms, each of which is a legally separate and independent entity. Please see www.deloitte.com/about for a detailed description of the legal structure of Deloitte Touche Tohmatsu Limited and its member firms. Deloitte LLP and affiliated entities. Designed and produced by the Deloitte Design Studio, Canada. 14-2185T