The Art of Intervenability for Privacy Engineering



Similar documents
Privacy and Data Protection (and more) for Big Data

Binding Corporate Rules ( BCR ) Summary of Third Party Rights

OVERVIEW. stakeholder engagement mechanisms and WP29 consultation mechanisms respectively.

Data Processing Agreement for Oracle Cloud Services

Corporate Guidelines for Subsidiaries (in Third Countries ) *) for the Protection of Personal Data

BCS, The Chartered Institute for IT Consultation Response to:

Article 29 Working Party Issues Opinion on Cloud Computing

Data Protection. Processing and Transfer of Personal Data in Kvaerner. Binding Corporate Rules Public Document

Declaration of Internet Rights Preamble

AIRBUS GROUP BINDING CORPORATE RULES

Proposal of regulation Com /4 Directive 95/46/EC Conclusion

Data protection compliance checklist

Scotland s Commissioner for Children and Young People Records Management Policy

Data protection legislation influence on cloud computing from local as well as EU perspective

EUROPEAN PARLIAMENT Committee on Industry, Research and Energy. of the Committee on Industry, Research and Energy

Office 365 Data Processing Agreement with Model Clauses

COUNCIL OF THE EUROPEAN UNION. Brussels, 22 November /06 DATAPROTECT 45 EDPS 3

Factsheet on the Right to be

The reform of the EU Data Protection framework - Building trust in a digital and global world. 9/10 October 2012

Data Protection A Guide for Users

Overview. Data protection in a swirl of change Cloud computing. Software as a service. Infrastructure as a service. Platform as a service

PRESIDENT S DECISION No. 40. of 27 August Regarding Data Protection at the European University Institute. (EUI Data Protection Policy)

Privacy Level Agreement Outline for the Sale of Cloud Services in the European Union

Privacy and Data Protection by Design from policy to engineering

"Direct marketing" is not limited to advertising goods or services for sale. It also includes promoting an organisation s aims and ideals.

Align Technology. Data Protection Binding Corporate Rules Controller Policy Align Technology, Inc. All rights reserved.

1 Data Protection Principles

ACT on Payment Services 1 ) 2 ) of 19 August Part 1 General Provisions

ARTICLE 29 DATA PROTECTION WORKING PARTY

Data Protection Working Group. Final Report on the Draft Data Protection Bill

Processor Binding Corporate Rules (BCRs), for intra-group transfers of personal data to non EEA countries

The problem of cloud data governance

Data Protection Standard

This Amendment consists of two parts. This is part 1 of 2 and must be accompanied by and signed with part 2 of 2 (Annex 1) to be valid.

Comments and proposals on the Chapter III of the General Data Protection Regulation

Legal Aspects of the MonIKA-Project - Privacy meets Cybersecurity

Guidelines on Data Protection. Draft. Version 3.1. Published by

ECSA EuroCloud Star Audit Data Privacy Audit Guide

<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129

OSRAM BCR Binding Corporate Rules ( BCR ) for OSRAM Group Companies and Adopting Companies for the protection of personal data

5419/16 ADD 1 VH/np 1 DGD 2C

Comments and proposals on the Chapter IV of the General Data Protection Regulation

Australia s unique approach to trans-border privacy and cloud computing

***I DRAFT REPORT. EN United in diversity EN 2012/0011(COD)

The Role and Function of a Data Protection Officer in the European Commission s Proposed General Data Protection Regulation. Initial Discussion Paper

AMENDMENTS TO THE DRAFT DATA PROTECTION REGULATION PROPOSED BY BITS OF FREEDOM

PRIVACY AND DATA SECURITY MODULE

Align Technology. Data Protection Binding Corporate Rules Processor Policy Align Technology, Inc. All rights reserved.

Binding Corporate Rules Privacy (BCRP) personal Telekom Group rights in the handling of personal data within the Deutsche Telekom Group

Response of the German Medical Association

How To Protect Your Data In European Law

Privacy Rules for Customer, Supplier and Business Partner Data

Do you have a private life at your workplace?

Personal data and cloud computing, the cloud now has a standard. by Luca Bolognini

Summary of replies to the public consultation on crossborder inheritance tax obstacles within the EU and possible solutions

OPINION MAY 2012 ON CLOUD COMPUTING Article 29 Data Protection Working Party (July 1, 2012)

7 August I. Introduction

Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES

Internet Engineering Task Force Internet-Draft Intended status: Best Current Practice July 15, 2013 Expires: January 16, 2014

GUIDE ON DATA PROTECTION REQUIREMENTS IN THE CONTEXT OF CLOUD COMPUTING SERVICES

Personal information, for purposes of this Policy, includes any information which relates to an identified or an identifiable person.

Principles Concerning the Protection of Personal Data in the Workplace: Guidelines for Employee Monitoring *

Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10

How To Understand The Rules Of The European Union

The Data Protection Landscape. Before and after GDPR: General Data Protection Regulation

CLOUD COMPUTING FOR ehealth DATA PROTECTION ISSUES

AN INSIDE VIEW FROM THE EU EXPERT GROUP ON CLOUD COMPUTING

Brainloop Cloud Security

Cloud Computing and Privacy Laws! Prof. Dr. Thomas Fetzer, LL.M. Technische Universität Dresden Law School

(a) the kind of data and the harm that could result if any of those things should occur;

COUNCIL OF EUROPE COMMITTEE OF MINISTERS. RECOMMENDATION No. R (95) 4 OF THE COMMITTEE OF MINISTERS TO MEMBER STATES

Act on the Protection of Privacy in Working Life (759/2004)

Adopted on 26 November 2014

Draft GDPR and health-related scientific research: Where do we stand with the EU Council?

The Impact of EU Data Protection Legislation. Thomas Rivera Hitachi Data Systems

The potential legal consequences of a personal data breach

12 January Register of Interest Representatives Identification number in the register:

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 3 February /12 LIMITE JAI 53 USA 2 DATAPROTECT 13 RELEX 76

Securing the Healthcare Enterprise for Compliance with Cloud-based Identity Management

COMMISSION STAFF WORKING DOCUMENT. on the existing EU legal framework applicable to lifestyle and wellbeing apps. Accompanying the document

Privacy Challenges in the Internet of Things (IoT) a European Perspective

New EU Data Protection legislation comes into force today. What does this mean for your business?

Microsoft Online Services - Data Processing Agreement

Working Document 02/2013 providing guidance on obtaining consent for cookies

RESTREINT UE/EU RESTRICTED

Privacy & Data Security: The Future of the US-EU Safe Harbor

The Romanian Parliament adopts the present law. Chapter I: General Provisions

By Emily Hay and Jan Dhont, Data Privacy Department, Lorenz Brussels.

EU- US NGO Letter on 1 To Secretary Pritzker

POLICY. on the Protection of Personal Data of Persons of Concern to UNHCR DATA PROTECTION POLICY

15656/1/14 REV 1 GS/np 1 DG D 2C

Option Table - Directive on Statutory Audits of Annual and Consolidated Accounts

Video surveillance at EFSA Implementing rules and technical specifications

Guidance on political campaigning

INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER

Jan Philipp Albrecht Rapporteur, Committee on Civil Liberties, Justice and Home Affairs European Parliament

Corporate ICT & Data Management. Data Protection Policy

on the transfer of personal data from the European Union

Privacy Guidelines For Landlords and Tenants

Privacy Rules for Customer, Supplier and Business Partner Data. Directive 7.08 Protection of Personal Data

Transcription:

The Art of Intervenability for Privacy Engineering Marit Hansen Deputy Privacy and Information Commissioner Schleswig-Holstein, Germany marit.hansen@datenschutzzentrum.de Workshop Data Protection, Privacy, and Transparency (DPPT 15) Hamburg, 26 May, 2015 Setting of ULD Data Protection Authority (DPA) for both the public and private sector Also responsible for freedom of information Source: en.wikipedia.org/ wiki/schleswig-holstein Source: www.maps-for-free.com

Motivation for this talk From the workshop description: Data Protection, Privacy, and Transparency Accountability Going hand in hand: Intervenability Overview of this talk Defining intervenability as one protection goal for privacy engineering The roots of intervenability Related concepts How to implement intervenability Conclusion

DEFINING INTERVENABILITY Defining intervenability (I) Intervenability: the possibility to intervene Who? Where? When? How? One of the six protection goals for privacy engineering

Six protection goals for privacy engineering Confidentiality Unlinkability classical IT security protection goals Integrity Intervenability Transparency Availability Protection goal unlinkability The protection goal of Unlinkability is defined as the property that privacy-relevant data cannot be linked across domains that are constituted by a common purpose and context. Reference: Hansen/Jensen/Rost: Protection Goals for Privacy Engineering, Proc. 1st International Workshop on Privacy Engineering, IEEE, 2015

Protection goal transparency The protection goal of Transparency is defined as the property that all privacy-relevant data processing including the legal, technical, and organisational setting can be understood and reconstructed at any time. Reference: Hansen/Jensen/Rost: Protection Goals for Privacy Engineering, Proc. 1st International Workshop on Privacy Engineering, IEEE, 2015 Protection goal intervenability The protection goal of Intervenability is defined as the property that intervention is possible concerning all ongoing or planned privacy-relevant data processing. Reference: Hansen/Jensen/Rost: Protection Goals for Privacy Engineering, Proc. 1st International Workshop on Privacy Engineering, IEEE, 2015

Defining intervenability (II) Intervenability: the possibility to intervene Who? Where? When? How? concerning all ongoing or planned privacy-relevant data processing Data subject Data controller Supervisory authority? Always? How quickly? THE ROOTS OF INTERVENABILITY

Intervenability as a requirement of democratic societies Precondition for a free & democratic communication order: the self-determined development of the individual Rechtsstaat (related to Rule of Law): In a Rechtsstaa the citizens share legally based civil liberties and can use the courts. A country cannot be a liberal democracy without being a Rechtsstaat. https://en.wikipedia.org/wiki/rechtsstaat The democratic constitutional state relies on the participation of all citizens; its legitimacy is based on respecting each person s individual liberty. Right to informational self-determination Principle derived from the German Constitution by the German Federal Constitutional Court, 1983 Capacity of the individual to determine in principle the disclosure and use of his/her personal data The data subject is to maintain control of his/her own data

Rights of EU citizens Voting: Right of EU citizens to participate in municipal elections Right of EU citizens to participate in European elections The right to petition the European Parliament The right to complain to the European Ombudsman Linguistic rights: the right to apply to the EU institutions in one of the official languages and to receive a reply in that same language European Data Protection Principles For personal data: Lawfulness, e.g. statutory provision or consent Purpose limitation Necessity Transparency Data subject rights Data security Accountability Intervenability for data subjects + data controllers

*) EU Data Protection Directive 95/46/EC Intervenability: data subject rights Right of access (Art. 12 EU DPD*): The right to obtain from the controller: Personal data undergoing processing As appropriate: Rectification Erasure Blocking The data subject s right to object (Art. 14 EU DPD): Intervenability: right to object If the data controller bases the processing on legitimate interests (e.g. Art. 7 (f)) Among others: direct marketing

Automated individual decisions (Art. 15 EU DPD): Intervenability: automated individual decisions Not allowed; exception possible if there are suitable measures to safeguard his legitimate interests, such as arrangements allowing him to put his point of view Intervenability: giving and withdrawing consent 'the data subject's consent' shall mean any freely given specific and informed indication of his wishes by which the data subject signifies his agreement to personal data relating to him being processed (Art. 2 (h) EU DPD) Clarification by Art. 29 WP: The notion of control is also linked to the fact that the data subject should be able to withdraw his consent. Withdrawal is not retroactive, but it should, as a principle, prevent any further processing of the individual s data by the controller. Reference: Art. 29 WP: Opinion 15/2011 on the definition of consent, WP 187

Intervenability: lodge claims Art. 28 EU DPD: any person can lodge claims to the supervisory authority Intervenability: supervisory authority rights

Data controllers obligations Security of processing (Art. 17 EU DPD): Appropriate technical and organizational measures choose a processor providing sufficient guarantees the processor shall act only on instructions from the controller Data controllers obligations: cloud computing The cloud client must verify that the cloud provider does not impose technical and organisational obstacles to data subjects rights Contract between client and provider (including any subcontractor) The cloud client should check whether and how the provider guarantees the portability of data and services prior to ordering a cloud service. Reference: Art. 29 WP: Opinion 05/2012 on Cloud Computing, WP 196

Intervenability in the General Data Protection Regulation Far more elaborated E.g. withdrawal of consent, effectiveness for exercising one s rights Idea of data portability (for data subjects): probably gone RELATED CONCEPTS

Related concept: (Notice &) Choice Based on Fair Information Practice Principles (FIPPs) Sind the mid-1990s encouraged by the Federal Trade Commission (FTC) Simplified Choice for Businesses and Consumers - companies should give consumers the option to decide what information is shared about them, and with whom. This should include a Do-Not-Track mechanism that would provide a simple, easy way for consumers to control the tracking of their online activities. FTC Report Protecting Consumers Privacy in an Era of Rapid Change, 2012 Related concept: (Notice &) Choice Hasn t worked well in reality: Lack of transparency Choices are usually very limited (and at the same time maybe too complex) A take it or leave it choice is usually no appropriate intervention Not sufficient

Side remark: intervenability transparency At best, intervenability bases on sufficient transparency But: lack of transparency may be a reason to intervene At least transparency about possibilities to intervene required Potentially outside the IT system If not provided by the data controller: legal options Proof of point at issue required Intervenability and Multilateral Security Concept for taking into account the interests of all stakeholders: All parties involved specify and express their individual interests and security goals Potential conflicts are recognised and negotiated Results are enforced Objectives: Minimising necessary trust (instead: trustworthiness) Empowering users (who are usually in a weak position)

Intervenability and Privacy by Design http://privacybydesign.ca/ Intervenability and Privacy Engineering Research Intervenability is not prominent in privacy engineering literature Reasons for that: Hard to formalise and to measure Compared with data minimisation research far less proposed techniques and technologies Can often not be solved within the IT system alone Needs a running system with clear responsibilities (operator, users) not on prototype level Not one fixed solution, but process-oriented, taking into account the full lifecycle of system evolution

HOW TO IMPLEMENT INTERVENABILITY Preparation for intervenability For individuals: Control own disclosure of data if possible For data controllers: Control own processing of data, in particular when being dependent on others Take technical, organisational and legal measures Plan for interventions: Incident management, change management E.g.: establish processes for data subject s rights

Intervenability technique: support for exercising data subject rights On the basis of the Data Track (user-side history function) users can more easily get Access and request Rectification Erasure Reference: PrimeLife project (D4.2.2, D2.2, PrimeLife Book) Data flow model: enriching information Difficult problem: data collection At each step, different parties (with different responsibilities) can be involved. Possible consequences: Personalised ads Better/worse credit conditions Lower/higher prices Getting an insurance (or not) Be under suspicion (or not) How can individuals intervene? Reference: Marit Hansen: Linkage Control Integrating the Essence of Privacy Protection into IMS, Proc. echallenges 2008, 1585-1592

Intervenability technique: help desk Helpful: single point of contact Even in complex settings with many stakeholders involved Important: accessibility But avoid: single point of data collection Source: tsaiproject Authentication: Authentication of individual needed? How? Authentication of help desk: necessary Source: Mark Hillary Intervenability technique: stop processes Source: Jeffrey

Scenario: Ambient Assisted Living Homes equipped with sensors and video cameras (even bed sensors) Monitoring service will react in case of an emergency, e.g. if a person tumbles and doesn t get up again Implementation does not allow deactivation of sensors and cameras because of liability reasons Privacy of the inhabitant? Privacy of guests or care takers? Intervenability would require possibility to temporarily deactivate sensors/cameras but this would mean a shift of liability Intervenability technique: choice of (de-)activation Source: Playing Futures: Applied Nomadology

Intervenability technique: permanent deactivation Source: Antonio Campos Domínguez Intervenability technique: self-defence against face recognition http://www.bbc.com/news/ technology-21143017 Project Privacy Visor : http://research.nii.ac.jp/ ~iechizen/official/ research-e.html#research2c 42

Intervenability technique: one-time activation with break glass Break-glass procedures known in healthcare: facilitation of a privileged access in emergency cases Logging of privileged access This is the exception, not the rule! Related: manual override of automated decisions Source: Axel Schwenke Intervenability: employ the legal system Lodge a claim Submit a dispute for arbitration Go to court Helpful: proof concerning the point at issue engineering task to provide all parties involved with evidence or the fourth estate: press & media Source: www.stockmonkeys.com Publish in blogs or in open letters Involve journalists

Intervenability: implementation techniques for controllers Process definitions: change management etc. (including changing components, subcontractors, ) Configuration menu: activation / deactivation Support for exercising rights to access, rectification, erasure, object, Help desks Stop button for processes Break-glass / alert procedures Manual override of automated decisions The more planning and support, the less need for the data subject s self-defence Internal and external control bodies that request changes (employee associations, supervisory authorities, ) Challenge: intervenability and usability Source: free photos Source: TeppoTK

Conclusion Intervenability: important protection goal for system design Political systems Legal systems IT systems Different kinds of intervenability, depending on perspective: data subject, data controller, supervisory authority, Intervenability techniques go beyond IT solutions; however, IT design influences possibilities for intervention Thank you for your attention! Marit Hansen marit.hansen@datenschutzzentrum.de