Connected car, big data, big brother?

Similar documents
AlixPartners, LLP. General Data Protection Statement

ACEA PRINCIPLES OF DATA PROTECTION IN RELATION TO CONNECTED VEHICLES AND SERVICES

PRIVACY POLICY. The Policy is incorporated into Terms of Use and is subject to the terms laid down therein.

DARTFISH PRIVACY POLICY

Privacy Policy. Effective Date: November 20, 2014

tell you about products and services and provide information to our third party marketing partners, subject to this policy;

Data Protection Act Bring your own device (BYOD)

Android Developer Applications

Privacy & Big Data: Enable Big Data Analytics with Privacy by Design. Datenschutz-Vereinigung von Luxemburg Ronald Koorn DRAFT VERSION 8 March 2014

Data Protection Policy.

Big Data, Not Big Brother: Best Practices for Data Analytics Peter Leonard Gilbert + Tobin Lawyers

ONLINE PRIVACY POLICY

Quorum Privacy Policy

BRING YOUR OWN DEVICE

Article 29 Working Party Issues Opinion on Cloud Computing

POLICIES AND REGULATIONS Policy #78

Considerations for Outsourcing Records Storage to the Cloud

Using Big [Traffic] Data to help Drivers, Road Authorities and Businesses

IDT Financial Services Limited. Prime Card Privacy Policy

Insights on commercial use of data

Introduction PriorFX LTD Right to Privacy Information

Privacy Policy. PortfolioTrax, LLC v1.0. PortfolioTrax, LLC Privacy Policy 2

Merthyr Tydfil County Borough Council. Data Protection Policy

Cloud Service Contracts: An Issue of Trust

Privacy and Electronic Communications Regulations

Privacy in the Cloud Computing Era. A Microsoft Perspective

Security Considerations

How to handle data privacy issues in the car industry

WEBSITE PRIVACY POLICY. Last modified 10/20/11

PROTECTION OF PERSONAL INFORMATION

How Microsoft is taking Privacy by Design to Work. Alan Chan National Technology Officer Microsoft Hong Kong 7 May 2015

Zubi Advertising Privacy Policy

Privacy and Cloud Computing for Australian Government Agencies

Privacy Policy. Peeptrade LLC ( Company or We ) respect your privacy and are committed to protecting it through our compliance with this policy.

ESTRO PRIVACY AND DATA SECURITY NOTICE

DATA PROTECTION POLICY

Synapse Privacy Policy

ABC PRIVACY POLICY. The ABC is strongly committed to protecting your privacy when you interact with us, our content, products and services.

Maximum Global Business Online Privacy Statement

By Emily Hay and Jan Dhont, Data Privacy Department, Lorenz Brussels.

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:

GUESTBOOK REWARDS, INC. Privacy Policy

Privacy Charter. Protecting Your Privacy

We will not collect, use or disclose your personal information without your consent, except where required or permitted by law.

PRIVACY POLICY. Last updated February 2, 2009 INTRODUCTION

Privacy Policy. If you have questions or complaints regarding our Privacy Policy or practices, please see Contact Us. Introduction

(4) THAMES VALLEY POLICE of Oxford Road, Kidlington, OX5 2NX ("Police Force"),

Policy Based Encryption Z. Administrator Guide

GSA s Digital Analytics Program and FTC

PRIVACY REGULATIONS regarding the Web Health History ("W.H.H.") Service called LifepassportPRO provided by Meshpass SA

ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY

Observations on international efforts to develop frameworks to enhance privacy while realising big data s benefits

BUSINESS CHICKS, INC. Privacy Policy

Credit Union Board of Directors Introduction, Resolution and Code for the Protection of Personal Information

Declaration of Internet Rights Preamble

Best Practices for Protecting Individual Privacy in Conducting Survey Research

Office 365 Data Processing Agreement with Model Clauses

Office of the Data Protection Commissioner of The Bahamas. Data Protection (Privacy of Personal Information) Act, A Guide for Data Controllers

INFORMATION SECURITY MANAGEMENT POLICY

BBVA Wallet Application Privacy Policy

Data Privacy: What your nonprofit needs to know. Donna Balaguer and Ed Lavergne Washington, D.C. February 5, 2015

ChangeIt Privacy Policy - Canada

Protection. Code of Practice. of Personal Data RPC001147_EN_WB_L_1

If you have any questions about our privacy practices, please refer to the end of this privacy policy for information on how to contact us.

Data protection compliance checklist

Information Governance Strategy

MEMORANDUM. I. Accurate Framing of Communications Privacy Policy Should Acknowledge Full Range of Threats to Consumer Privacy

CUSTOMER INFORMATION COMMZOOM, LLC PRIVACY POLICY. For additional and updated information, please visit our website at

Protecting your privacy

Beasley Broadcast Group, Inc. Privacy Policy

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide

Data Protection Policy June 2014

Seizing Opportunity: Good Privacy Practices for Developing Mobile Apps

Identifying and Managing Third Party Data Security Risk

Report of findings. Official investigation by the CBP into the processing of geolocation data by TomTom N.V. PUBLIC VERSION

Last updated: 30 May Credit Suisse Privacy Policy

Cloud Security Trust Cisco to Protect Your Data

1. Applicant means a person or persons applying for any product or service offered by us;

M&T BANK CANADIAN PRIVACY POLICY

Transcription:

Connected car, big data, big brother? Using geolocation in a trustworthy and compliant way Simon.Hania@tomtom.com

Trends that threaten trust 2

Connected cars with downloadable apps Location services, cloud, internet-of-thing, big data 3

Privacy, security, safety How it fits together Topic Is about Key notions Privacy Data Privacy / Data Protection Information Security Safety, physical security Self determination, non-interference Proper & fair use of information about an individual Protecting/securing information Being free from effects of errors, accidents, incidents, violence etc. Freedom, Liberty, Dignity, Honor Collection & use limitation, Data quality, Purpose specification, Security safeguards, Openness, Accountability Confidentiality, Integrity, Availability Ownership, integrity, reliability, perimeter 4

Revolutionising navigation In 4 steps 4. TomTom HD Traffic 3. IQ Routes 2. Map Share 1. Base maps 4. TomTom HD Traffic 3. IQ Routes 2. Map Share 1. Base maps 4. TomTom HD Traffic 3. IQ Routes 2. Map Share 1. Base maps 4. TomTom HD Traffic 3. IQ Routes 2. Map Share 1. Base maps 5

TomToms trip archive Anonymous location and speed information from the TomTom user community 5 billion (10E9) speed measurements per day 5 trillion (10E12) speed measurements to date! by customers driving 50 billion kilometres and visiting every spot over 1,000 times

Creating TomTom HD Traffic: data sources Range of high-quality real-time data sources 7

In-car location services under scrutiny 8

Main GAO findings 10 companies were questioned Disclosure: all tell, 9 in broad terms, 5 omit purposes for sharing Consent & controls: all seek consent in some way, all offer some control, none who retain allow deletion Safeguards & retention: all take steps, but in different ways at different levels of de-identification and deletion 9 Accountability: all take steps to protect location data and have accountability policies, be it internal only

Main GAO findings: room for improvement 10 companies were questioned Disclosure: all tell, 9 in broad terms, 5 omit purposes for sharing Consent & controls: all seek consent in some way, all offer some control, none who retain allow deletion Safeguards & retention: all take steps, but in different ways at different levels of de-identification and deletion 10 Accountability: all take steps to protect location data and have accountability policies, be it internal only

Location privacy is top of mind With bloggers, press, regulators, enforcers, legislators and many users alike TomTom investigated by leading European Data Protection Authority in 2011 TomTom s use of location data is in accordance with EU Data Protection Laws Processing and delivery to third parties 100% OK Informing users needed to be more explicit, including opt-in 11

Drivers, police & TomTom An explosive mixture 12

Community input with permission We profile roads, not people 13

TomTom & Privacy Vision: Community input (crowd sourcing) is strategic Privacy helps to realize business objectives by ensuring trust Privacy is integral part of business continuity above and beyond legal compliance Principles: 1. Avoid unpleasant surprises: Customer insight is paramount Be open and explain hesitation is an omen Keep it simple 2. The customer remains in control of his personal data: we have it on a license 14

Key elements of EU data protection laws Challenging the potential of Big Data 1. Personal data broad(ening) definition 2. Pre-defined purposes only 3. Volume and time limitations 4. Understandable explanation 5. Consent, legal obligation or balance of legitimate interests must apply 6. Right to view, correct and object 7. Protect confidentiality, integrity & availability 15

Privacy, amongst others, is about the protection of personal data Personal data: Contains (whatever) information relating to a natural ( real ) person That person could be identified, directly or indirectly Typically: data attached to unique identifiers Anonymous only: When no reasonable way exists to identify ( single out ) a person Even when requiring correlation with other data sources (e.g. maps and phonebooks) By anyone with the right resources 16

But: do not forget EU cookie law Much broader scope than you may think Any data stored on or retrieved from a device connected to a public telecom network requires 1. Understandable explanation 2. Unambiguous consent Unless the data is strictly necessary for the services offered to the user or for a purely technical purpose. 17

Privacy Policies, Standards & Guidelines 7 key objectives 1. We assess our intended use of PD early to drive requirements 2. We document PD: purpose, legitimate ground, retention, access, jurisdiction(s) 3. We ensure we have obtained or will obtain informed user consent, if applicable 4. We minimize the amount of PD (volume and time) and who has access: we de-personalize or destroy PD as soon as possible 5. We keep ensuring adequate security measures based on risk assessment of confidentiality, integrity and availability 6. We do not expose PD to any third party, unless the third party contractually agrees to comply to our policies (or law forces us) 7. We enable the user to exercise his rights (information, access/download, correction, deletion) 18

The 6 privacy questions 1. What personal data are we processing? in categories, groups, examples 2. Why are we processing personal data? clear (multiple) purposes 3. When can we destroy the personal data? automatically or user triggered 4. Who will have access and will be accountable? including third parties 5. Where will we process and store the personal data? transfer outside of the EU requires agreements 6. Will we have a legitimate basis for processing? 19

Typical personal data misconceptions very often present in technology companies We do not identify the user while using the data, so we have no issues with privacy law We only use the serial number of the users device, so the data is anonymous and we have no issues with privacy law We encrypt the data, so we are no longer using/receiving/sending personal data We use hashes to replace all serial numbers, so the data is now anonymous and we have no issues with privacy law We anonimize the data, so we are not using personal data We can use the users data for anything we want, as long as we keep the data to ourselves Look: big name companies are doing the same, so we are OK 20

provide a specific location-based service, such as real-time traffic information. Companies may also choose to contract with third-parties that provide all location-based services on their behalf; among our selected companies, this is most common among the auto manufacturers. 6 (See fig. 2.) Location data in a car context In the EU to be regarded as sensitive personal data Figure 2: How Location Data Are Transmitted to Provide In-Car Location-Based Services Source: GAO Note: While companies use cellular networks to transmit location data, we excluded telecommunications companies that provide these networks from this review because they were included in our 2012 report on mobile devices. See GAO-12-903. Requires prior, informed, explicit consent separate, not in T&C s! 21 The in-car location-based services industry continues to change and evolve: new partnerships are emerging in the marketplace, existing

Can location data be anonymous? Research indicates: hardly ever 22

Avoiding re-identification is key TomTom has a strict code of conduct to adhere to privacy laws 1 month 1 day Historic trip archive only to be used for road, traffic and related purposes No access to raw data outside TomTom, ever TomTom performs processing TomTom ensures reidentification is impossible e.g. through sufficient aggregation 23

GAO on reducing risks to privacy Step by step reducing the potential to identify the user Figure 3: Examples of De-Identification Methods and Privacy Risk Source: GAO 24 Although location data that are coupled with personal information, such as a name, pose the greatest privacy risk to consumers, company representatives told us that in some cases, they need such data to provide certain services. For example, one auto manufacturer we met

Recommendations Incorporate data protection requirements from the start Take a multi-disciplinary approach: it is about your license to operate in the information society Embed privacy by design into development processes Document your data: what, why, when, who, where Appoint a privacy czar in your organization 25