Organizational Impact of Big Data on Privacy & Security



Similar documents
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America

A Study on Security and Privacy in Big Data Processing

Cloud Data Security. Sol Cates

Privacy Law Basics and Best Practices

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

Moderator: Panelists: Panel #2 Big Data: Application Security and Privacy. Keith Swenson, VP of Research and Development, Fujitsu America, Inc.

Online Lead Generation: Data Security Best Practices

Top Ten Big Data Security and Privacy Challenges

NIST Big Data Public Working Group

1. Understanding Big Data

McZeely Coterie, LLC Privacy Notice. Effective Date of this Privacy Notice: February 11, 2015.

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:

TOY INDUSTRY CHECKLIST FOR MOBILE APPS AND PROMOTIONS

Health Sciences Compliance Plan

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT)

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing

PRIVACY POLICY (Update 1) FOR ONLINE GIVING FOR THE UNITED METHODIST CHURCH

Big Data in marketing campaigns

California State University, Sacramento INFORMATION SECURITY PROGRAM

Privacy and Electronic Communications Regulations

Big Data Trust and Reputation, Privacy Cyber Threat Intelligence

Iowa Student Loan Online Privacy Statement

Standards of. Conduct. Important Phone Number for Reporting Violations

Privacy & Big Data: Enable Big Data Analytics with Privacy by Design. Datenschutz-Vereinigung von Luxemburg Ronald Koorn DRAFT VERSION 8 March 2014

OVERVIEW. stakeholder engagement mechanisms and WP29 consultation mechanisms respectively.

The HR Skinny: Effectively managing international employee data flows

Taxonomy of Anti-Computer Forensics Threats

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

Information Security Law: Control of Digital Assets.

<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129

Information Security in Big Data using Encryption and Decryption

Protecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00)

Privacy and Data Protection

Data Privacy and Gramm- Leach-Bliley Act Section 501(b)

Data, Privacy, Cookies and the FTC in Kevin Stark - ExactTarget Maltie Maraj - ExactTarget Nicholas Merker - Ice Miller

The problem of cloud data governance

Delivering Customer Value Faster With Big Data Analytics

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER

Data protection compliance checklist

Transparency. Privacy. Compliance. Security. What does privacy at Microsoft mean? Are you using my data to build advertising products?

Big Data, Big Risk, Big Rewards. Hussein Syed

NorthStar Alarm Services. Website Privacy Policy

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Ford & Thomas Insurance Agency

APPLICATION COMPLIANCE AUDIT & ENFORCEMENT

2016 OCR AUDIT E-BOOK

Enterprise Security Solutions

Information Security Policy

The Impact of HIPAA and HITECH

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services.

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Preemptive security solutions for healthcare

HIPAA and HITECH Compliance for Cloud Applications

Index All entries in the index reference page numbers.

At Cambrian, Your Privacy is Our Priority. Regardless of how you deal with us on the phone, online, or in person we have strict security measures

How To Ensure Health Information Is Protected

Assessing Risks in the Cloud

Fraud Policy FEBRUARY 2014

Israeli Law Information and Technology Authority. Privacy and Data Security in the Cloud - The Israeli Perspective

Introduction to HIPAA Compliance Checklist:

Privacy Impact Assessment for TRUFONE Inmate Telephone System

Richard Gadsden Information Security Office Office of the CIO Information Services

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Regulation P Privacy of Consumer Financial Information

Privacy Policy. PortfolioTrax, LLC v1.0. PortfolioTrax, LLC Privacy Policy 2

Thank you for visiting this website, which is owned by Essendant Co.

Three significant risks of FTP use and how to overcome them

HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations

Selecting a Secure and Compliant Prepaid Reloadable Card Program

Electronic Communication In Your Practice. How To Use & Mobile Devices While Maintaining Compliance & Security

Metropolitan Living, LLC 151 W. Burnsville Parkway, Suite 101 Burnsville, MN Ph: (952) Fax: (651)

Transcription:

Organizational Impact of Big Data on Privacy & Security Marijn Janssen, Agung Wahyudi Delft University of Technology EdCon Puerto Rico, 12 August 2015

OUTLINE 01 Privacy & Security in Organization 02 Big Data Era 03 Big Data Impact on Risks of Privacy & Security 04 Big Data Impact on Benefit of Privacy & Security 05 Balancing benefit and risk Why do we need privacy & security in organization? What big data makes different from just data? Increasing value of big data to any organization Does big data increase the impact of current risk of privacy & security in organization? Does big data create new risks of privacy & security? What benefit of big data in improving privacy and security? How can we balance the benefit and risk of big data on privacy and security? Compliance with Digital Privacy Regulation Privacy-by-design

01 Privacy & Security in Organization

Major concern on Privacy Source: http://www.dutchnews.nl/news/archives/2014/03/big_bank_is_watching_you_ing_t/

Impact of privacy & security breach/violation MONEY year #records stolen by year 2015 2014 2013 2012 LEGAL IMPLICATION PRIVACY & SECURITY BRAND/VALUE TRUST 2011 2010 2009 2008 2007 2006 CUSTOMER BASE 2005-500 Millions Source: http://www.informationisbeau tiful.net/visualizations/worldsbiggest-data-breaches-hacks/

02 Big Data Era

Value of big data to organization HOW WHAT Creating transparency Supporting experimental analysis Assisting in defining market segmentation Supporting real-time analysis and decisions Facilitation computerassisted in products Innovation Acceleration Collaboration New Business Models New Revenue Growth Opportunities

03 Big data impact on risks of privacy & security

Does big data increase the impact of current risk of privacy & security in organization? Security & privacy issues are magnified by velocity, volume, and variety of big data. VELOCITY Streaming data demands ultra-fast response times from security and privacy solutions VARIETY Various variety of data (structured, semistructured, unstructured) increases many possibilities of threat

Risks of big data to privacy & security Violating Privacy Data Security Decision-making based on incomplete data BIG DATA Adverse effect identification of big data to privacy & security

Does big data create new risks to privacy & security? New high-priority security & privacy risks that arise in big data era: Secure computations in distributed programming frameworks Scalable and composable privacypreserving data mining and analytics Security best practices for nonrelational data stores Cryptographically enforced access control and secure communication Secure data storage and transaction logs End-point input validation/filtering Granular access control Granular audits Real-time security/compliance monitoring Data provenance Source: CSA Top 10 Big Data Security and Privacy Challenge, 2012

04 Big data impact on benefit to privacy & security

What benefit of big data in improving privacy & security? Improved Security Enable Personalization & Dialogue with Consumers Preventing Crime; Fraud Detection Better Customer Service Higher Efficiency

05 Balancing benefit and risk

Balancing benefit(s) & risk(s) Improved security, preventing of crime, better customer service, and higher efficiency Violating privacy, data security, decision-making based on incomplete data

Privacy Regulatory Models Comprehensive Laws (or Regulatory Model) General laws govern the collection and use of personal information by public and private sectors and these laws are typically accompanied by an oversight body to ensure compliance (e.g. EU Privacy Regulation) Sectoral laws (targeted model) Countries favor specific sectoral laws that govern specific items, like video rental records or financial privacy, where enforcement is achieved through a range of mechanisms (like regulatory agencies, federal and state statutes, and self-policing) Self-regulation Various forms of self-regulation are employed (e.g. Verisign, TRUSTe, etc.) Consumer regulation Privacy protection is employed by the consumer through the use of commercial digital privacy protection tools (e.g. cookies blockers, encryptions, etc.) Source: Craig, et.al, Privacy and Big Data, O Really Media, 2011 (pp. 27-28)

Compliance with Digital Privacy Regulation Health Information & Portability Accountability Act (HIPAA): consumer rights over their health information and sets rules on who can access and receive health information Gramm-Leach-Bliley (GLB) Act: financial institutions to explain how it collects, shares, and protects customers data via a privacy notice that is annually updated Children s Online Privacy Protection Act (COPPA): all websites that collect information from children under the age of 13 to have an explicit privacy policy, delineates the website owner s responsibilities to protect children s online privacy and safety, as well as the conditions under which the owner must receive verifiable consent from a parent Fail Credit Reporting Act, Telemarketing Sales Rule, Per-Pay-Call Rule, Equal Opportunity Credit Acc European Convention on Human Rights (ECHR) EU Data Protection Directive: 8 principles of personal data protection (Collection Limitation, Data Quality, Purpose Specification, Use Limitation, Security Safeguards, Openness, Individual Participation, Accountability) EU Privacy & Communication Directive: regulate new digital technologies in the treatment of private information as it relates to traffic data, spam, and cookies APEC Privacy Framework (2014) APEC Cross Border Privacy Enforcement Arrangement (CPEA): facilitate information sharing and cooperation between authorities responsible for data and consumer protection in the APEC region Source: Craig, et.al, Privacy and Big Data, O Really Media, 2011 (pp. 29-35)

Privacy-by-Design [1/2] PbD prescribes that privacy be built directly into the design and operation, not only of technology, but also how a system is operationalized (e.g., work processes, management structures, physical spaces and networked infrastructure.). 7 principles of PbD: 1 FULL ATTRIBUTION: Every observation (record) needs to know from where it came and when. There cannot be merge/purge data survivorship processing whereby some observations or fields are discarded. 2 3 4 DATA TETHERING: Adds, changes and deletes occurring in systems of record must be accounted for, in real time, in sub-seconds. ANALYTICS ON ANONYMIZED DATA: The ability to perform advanced analytics (including some fuzzy matching) over cryptographically altered data means organizations can anonymize more data before information sharing. TAMPER-RESISTANT AUDIT LOGS: Every user search should be logged in a tamper-resistant manner even the database administrator should not be able to alter the evidence contained in this audit log. Source: Cavaoukian, et.al, Privacy by Design in the Age of Big Data, 2012 (pp. 10-13)

Privacy-by-Design [2/2] PbD prescribes that privacy be built directly into the design and operation, not only of technology, but also how a system is operationalized (e.g., work processes, management structures, physical spaces and networked infrastructure.). 7 principles of PbD: 5 FALSE NEGATIVE FAVORING METHODS: The capability to more strongly favor false negatives is of critical importance in systems that could be used to affect someone s civil liberties. 6 SELF-CORRECTING FALSE POSITIVES: With every new data point presented, prior assertions are reevaluated to ensure they are still correct, and if no longer correct, these earlier assertions can often be repaired in real time. 7 INFORMATION TRANSFER ACCOUNTING: Every secondary transfer of data, whether to human eyeball or a tertiary system, can be recorded to allow stakeholders (e.g., data custodians or the consumers themselves) to understand how their data is flowing. Source: Cavaoukian, et.al, Privacy by Design in the Age of Big Data, 2012 (pp. 10-13)

THANK YOU FOR YOUR ATTENTION