Privacy by Design: What s Been Happening? Ken Anderson



Similar documents
Maximize the Value of Your Data and the Ability to Protect Privacy, by Design

Ann Cavoukian, Ph.D.

The 7 Foundational Principles. Implementation and Mapping of Fair Information Practices. Ann Cavoukian, Ph.D.

Privacy by Design The 7 Foundational Principles Implementation and Mapping of Fair Information Practices

Brave New World or Old Problems? Privacy, Security and Big Data: Beware of Unintended Consequences

Ann Cavoukian, Ph.D.

A Q&A with the Commissioner: Big Data and Privacy Health Research: Big Data, Health Research Yes! Personal Data No!

Ann Cavoukian, Ph.D.

Article 29 Working Party Issues Opinion on Cloud Computing

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013

The potential legal consequences of a personal data breach

Cloud Computing: Legal Risks and Best Practices

Ann Cavoukian, Ph.D.

Privacy by Design Setting a new standard for privacy certification

Privacy Guidelines for RFID Information Systems (RFID Privacy Guidelines)

White Paper on Financial Institution Vendor Management

Policy Brief: Protecting Privacy in Cloud-Based Genomic Research

Privacy Law Basics and Best Practices

What to do When Faced With a Privacy Breach: Guidelines for the Health Sector ANN CAVOUKIAN, PH.D. COMMISSIONER

TABLE OF CONTENTS. Maintaining the Quality and Integrity of Information. Notification of an Information Security Incident

How To Ensure Health Information Is Protected

Security Issues in Cloud Computing

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:

Privacy & Big Data: Enable Big Data Analytics with Privacy by Design. Datenschutz-Vereinigung von Luxemburg Ronald Koorn DRAFT VERSION 8 March 2014

The Ontario Health Study s Assessment Centres: A Case Study for Privacy by Design

Privacy by Design. Ian Brown, Prof. of Information Security and Privacy Oxford Internet Institute, University of

How To Build Privacy Into Information Technology

Cloud Computing and Privacy Toolkit. Protecting Privacy Online. May 2016 CLOUD COMPUTING AND PRIVACY TOOLKIT 1

Acquia Comments on EU Recommendations for Data Processing in the Cloud

Privacy Breach Protocol

CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS. White Paper

PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES

National Cyber Security Policy -2013

Privacy by Design: Effective Privacy Management in the Victorian Public Sector

Cloud Computing: Privacy and Other Risks

Cloud Computing: Contracting and Compliance Issues for In-House Counsel

Procedure for Managing a Privacy Breach

MICROSOFT OFFICE 365 PRIVACY IMPACT ASSESSMENT. Western Student E-Communications Outsourcing

Smart Grid and Privacy An International View

What s New in Access, Privacy and Health Care. Brian Beamish Commissioner. Ontario Connections May 21, 2015

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry

GUIDANCE FOR MANAGING THIRD-PARTY RISK

Cloud Computing Contracts. October 11, 2012

EMBEDDING PRIVACY INTO ELECTRONIC HEALTH RECORDS. Manuela Di Re Associate Director of Legal Services Information and Privacy Commissioner of Ontario

Cloud Security Standardisation & Certification. Arjan de Jong Policy Advisor Information Security

Secure Enterprise Mobility Management. Cloud-Based Enterprise Mobility Management. White Paper: soti.net

Personal data and cloud computing, the cloud now has a standard. by Luca Bolognini

Data Protection Act Guidance on the use of cloud computing

Managing General Agents (MGAs) Guideline

Office 365 Data Processing Agreement with Model Clauses

Practical and ethical considerations on the use of cloud computing in accounting

Overview. What are operational policies? Development, adoption, implementation

Securing the Cloud Infrastructure

Global Privacy and Data Security in the Cloud September 14, 2011 Miriam Wugmeister

Privacy and Security Framework, February 2010

Ten steps to develop a multilayered privacy notice

This procedure is associated with BCIT policy 6700, Freedom of Information and Protection of Privacy.

A Best Practice Guide

Information Security Program Management Standard

How To Respond To The Nti'S Request For Comment On Big Data And Privacy

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

Data Protection Policy

Overview of the HIPAA Security Rule

Privacy Recommendations for the Use of Cloud Computing by Federal Departments and Agencies. Privacy Committee Web 2.0/Cloud Computing Subcommittee

THE MOBILE MAJORITY: BUILDING PRIVACY BY DESIGN INTO MOBILE APPS

Securing the Microsoft Cloud

Cisco Unified Presence Server 1.0

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE

FINAL May Guideline on Security Systems for Safeguarding Customer Information

Cloud Security Trust Cisco to Protect Your Data

Unofficial Consolidation January 1, 2015

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT)

Design of Database Security Policy In Enterprise Systems

Privacy Impact Assessment Guidelines for the Ontario Personal Health Information Protection Act. Ann Cavoukian, Ph.D. Commissioner October 2005

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT

Securing the Microsoft Cloud

Transcription:

Privacy by Design: What s Been Happening? Ken Anderson Assistant Commissioner (Privacy) Ontario Hong Kong June 13, 2012 Key Definitions Information privacy refers to the right or ability of individuals to exercise control over the collection, use and disclosure by others of their personal information Personally-identifiable information ( PII ) can be biographical, biological, genealogical, historical, transactional, locational, relational, computational, vocational or reputational, and is the stuff that makes up our modern identity Personal information must be managed responsibly. When it is not, accountability is undermined and confidence in our evolving information society is eroded. 1

What Privacy is Not Privacy Security Security = Privacy and Security: The Difference Authentication Data Integrity Confidentiality Non-repudiation Organizational control of information through information systems Information Privacy = personal control 2

The Future of Privacy We Need a Paradigm Shift 3

The Future of Privacy Change the Paradigm to Positive-Sum, NOT Zero-Sum Positive-Sum Paradigm A Zero-Sum Paradigm describes a concept or situation in which one party s gains are balanced by another party s losses win/lose; either/or; enhancing security often comes at the expense of privacy the more you have of one, the less you can have of the other; A Positive-Sum Paradigm, in contrast, describes a situation in which all participants may mutually gain together (win-win); To achieve a positive-sum model, privacy must be proactively built into the system so that privacy protections are engineered directly into the technology, right from the outset; As a result, the unnecessary collection and use of personal data is minimized while increasing data security and allowing greater individual control; By applying the positive-sum paradigm to new privacy-invasive technologies, we can achieve both security and privacy resulting in a win-win scenario. 4

Positive-Sum Model Change the paradigm from a zero-sum to a positive-sum model: Create a win-win scenario, not an either/or (vs.) involving unnecessary trade-offs and false dichotomies replace the vs. with and Privacy by Design: The Trilogy of Applications Information Technology Accountable Business Practices Physical Design & Networked Infrastructure 5

Privacy by Design: The 7 Foundational Principles 1. Proactive not Reactive; 2. Privacy as the Default setting; 3. Privacy Embedded into Design; 4. Full Functionality: Positive-Sum, not Zero-Sum; 5. End-to-End Security: Full Lifecycle Protection; 6. Visibility and Transparency: Keep it Open; 7. Respect for User Privacy: Keep it User- Centric. www.ipc.on.ca/images/resources/7foundationalprinciples.pdf www.privacybydesign.ca 6

Adoption of Privacy by Design as an International Standard Landmark Resolution Passed to Preserve the Future of Privacy By Anna Ohlden October 29th 2010 - http://www.science20.com/newswire/landmark_resolution_passed_preserve_future_privacy JERUSALEM, October 29, 2010 A landmark Resolution by Ontario's Information and Privacy Commissioner, Dr. Ann Cavoukian, was approved by international Data Protection and Privacy Commissioners in Jerusalem today at their annual conference. The resolution recognizes Commissioner Cavoukian's concept of Privacy by Design - which ensures that privacy is embedded into new technologies and business practices, right from the outset - as an essential component of fundamental privacy protection. Full Article: http://www.science20.com/newswire/landmark_resolution_passed_preserve_future_privacy Privacy by Design: Proactive in 25 Languages! 1.English 2.French 3.German 4.Spanish 5.Italian 6.Czech 7.Dutch 8.Estonian 9.Hebrew 10. Hindi 11.Chinese 12.Japanese 13.Arabic 14.Armenian 15.Ukrainian 16.Korean 17.Russian 18.Romanian 19. Greek 20.Portuguese 21.Maltese 22.Macedonian 23.Bulgarian 24.Polish 25.Croatian 7

Privacy by Design Highlights: 2010/2012 Autumn 2010 October Regulators from around the world gathered in Jerusalem, unanimously passing a Resolution recognizing Privacy by Design as an essential component of privacy protection; November European Commission released its report: Comprehensive Approach on Personal Data Protection in the European Union, pointing out the important role that Privacy by Design will play in ensuring data controllers meet their responsibilities; December The U.S. Federal Trade Commission issued, Protecting Consumer Privacy in an Era of Rapid Change, citing Privacy by Design as one of three recommendations. 8

Spring 2011 February Debate in the Dutch Senate on data protection and privacy, consistently referred to the need for Privacy by Design. February GSMA published, Mobile Privacy Principles, with a framework for a Privacy by Design approach to mobile devices; April European Union announced the Privacy and Data Protection Impact Assessment Framework for RFID Applications a milestone agreement to put consumers privacy at the centre of smart tag technology (using a Privacy by Design solution) and to make sure privacy concerns are addressed before products go on the market; April U.S. Senators John Kerry and John McCain cited Privacy by Design in their Commercial Privacy Bill of Rights; Summer 2011 July Government of Qatar asked for comments regarding the inclusion of Privacy by Design as a key legislative principle; July California Public Utility Commission recognized that, the Privacy by Design methodology offers a promising approach to ensuring that data practices promote privacy, not just in the FIP of data minimization, but in all aspects of privacy planning.; August The Czech Data Protection Authority endorsed EU privacy reforms, which will be characterized by Privacy by Design, responsibility and accountability; August The New Zealand Law Commissioner, John Burrows, recommended that Privacy Commissioner, Marie Shroff, establish several expert panels which would advise on technical matters, including Privacy by Design; August The Israeli Law, Information and Technology Authority (ILITA) made Privacy by Design one of its principal conditions for Google s operation of its Street View cars in Israel. 9

Autumn 2011 September Ontario IPC joint paper with Berlin DPA on Privacy by Design and Smart Metering: Minimize Personal Information to Maintain Privacy Data Minimization at its Best; October San Diego Gas & Electric partnered with Ontario IPC to embed Privacy by Design into their Smart Meter Dynamic Pricing system. January 2012 European Union Directive Privacy by Design and Privacy as the Default are specifically mentioned - Data controllers/processors must implement technical and organizational measures having regard to PbD; Independent Supervisory Authorities with investigative/order making powers may impose sanctions of up to 2% of a company s annual revenue; Data Breach Notification- data controllers must notify Supervisory Authority within 24 hours of a data breach (where feasible) and individuals (without undue delay) where data is not encrypted. 10

The Year of the Engineer Engaging Engineers Technische Universitä t Berlin 11

Privacy by Design and the Internet Engineering Task Force (IETF) The concept of Privacy by Design has gotten a lot of attention over the past few years and within the IETF we have tried to investigate how we can consider privacy in the design of protocols and architectures in a more systematic way in protocols and architectural designs. We have started to shed more light on privacy in the IETF by organizing a privacy workshop to solicit input from the technically minded privacy community, to create an IETF privacy directorate, and to start the work on a number of documents to offer more guidance to engineers. Privacy Considerations for Internet Protocols, Internet Engineering Task Force (IETF), www.ietf.org Embedding Privacy at the Design Stage: The Obvious Route Cost-effective Proactive User-centric It s all about control preserving personal control and freedom of choice over one s data flows 12

Privacy by ReDesign PbRD 1. Rethink: review existing risk mitigation strategies and systems, considering alternatives that will be more privacy protective; 2. ReDesign: develop and enable improvements in the system that will deliver original function and privacy in a doubly-enabling, positive-sum manner; 3. Revive: re-launch the newly improved, more privacy protective system. http://privacybydesign.ca/content/uploads/2011/05/pbrd.pdf 13

Identifying potential targets for Privacy by ReDesign; Practical framework for implementing Privacy by ReDesign; Laying the foundations for success; A road map towards proactive data protection. http://privacybydesign.ca/content/uploads/2011/11/pbrd-framework.pdf Rise of the Privacy Economy A wave of startups are creating a new business model for the use personal data; Rather than cookies tracking consumers' movements online, their alternative model would allow individuals to control their own data, and perhaps even profit by selling access to it; Some advocates predict the rise of a privacy economy, where Internet companies would provide services that allow people to discover what information exists about them online, to counter false information, and even allow people to control and share their personal information when it benefits them. Reputation.com Personal Data Ecosystem Consortium Consider Personal Singly 14

Respect Network The World's First Personal Cloud Network Drummond Reed Co-Founder & Chairman Respect Network Corporation 2010-04-04 Respect Network Corporation Executive Summary This presentation will explain how Respect Network Corporation is creating the world's first personal cloud network based on the award-winning Respect Trust Framework, and how this ethical business model for personal data will enable the leap from CRM to VRM (Vendor Relationship Management) Respect Network Corporation 30 15

CRM (Customer Relationship Management) systems are used by vendors to manage their relationships with customers CRM Vendor Cloud All logos depicted are hypothetical Respect Network Corporation 31 Social CRM tries to make CRM smarter by listening to what customers are sharing with their social networks All logos depicted are hypothetical Respect Network Corporation 32 16

VRM (Vendor Relationship Management) is the inverse of CRM : the idea that customers can have their own relationship management system that is a peer of the vendor s Respect Network Corporation 33 Although VRM is still an emerging segment, over 20 companies and open source projects already produce VRM software, services, and standards Respect Network Corporation 34 17

Such a trust framework already exists: the Respect Trust Framework was listed with OIX (Open Identity Exchange) and won the Privacy Award at the European Identity Conference in May 2011 Respect Network Corporation 35 18

At a Crossroads: Personhood and Digital Identity in the Information Society 1. Data Protection in the IDM-Enabled Ubiquitous Information Environment 2. Data Protection and User Control 3. Market Demand for User Control 4. The Properties of Identity 5. The Properties of Identity and Data Protection 6. The Properties of Identity for Policy Makers and Software Developers 7. Current Conceptions of IDM 8. Decisions and Constraints Identity and Privacy Crisis Growing ID requirements pose privacy problems: Fraud and security concerns are inhibiting confidence, trust, and the growth of e-commerce, e-government Fears of surveillance and excessive collection, use and disclosure of identity information by others are also diminishing confidence and use Lack of individual user empowerment and control over one s own personal data is diminishing confidence and use Function creep, power asymmetries, discrimination, harm Needed: improved user control, data minimization techniques, architectures of privacy, stronger security, trusted devices and credible assurances. 19

Privacy-Embedded Laws of Identity Building User-Centric Privacy into an Identity Metasystem Emergence of Identity Metasystem a profound development strategic time to ensure that privacy interests are built into the new global architecture of identity Supporters of 7 Laws of Identity and Identity Metasystem call this the Identity Big Bang to enable ubiquitous intelligent services and a true marketplace for portable identities Since we noticed many parallels between the 7 Laws of Identity and Fair Information Practices, the two sets of principles being fundamentally complementary, we decided to embed privacy directly into them 20

Privacy-Embedded 7 Laws of Identity 1. Personal Control and Consent: Technical identity systems must only reveal information identifying a user with the user s consent 2. Minimal Disclosure For Limited Use: Data Minimization The Identity Metasystem must disclose the least identifying information possible. This is the most stable, long-term solution. It is also the most privacy protective solution 3. Justifiable Parties: Need To Know Access Identity systems must be designed so the disclosure of identifying information is limited to parties having a necessary and justifiable place in a given identity relationship Privacy-Embedded 7 Laws of Identity 4. Directed Identity: Protection and Accountability A universal Identity Metasystem must be capable of supporting a range of identifiers with varying degrees of observability and privacy 5. Pluralism of Operators and Technologies: Minimizing Surveillance The interoperability of different identity technologies and their providers must be enabled by a universal Identity Metasystem 6. The Human Face: Understanding Is Key Users must figure prominently in any system, integrated through clear human-machine communications, offering strong protection against identity attacks 7. Consistent Experience Across Contexts: Enhanced User Control The unifying Identity Metasystem must guarantee its users a simple, consistent experience while enabling separation of contexts through multiple operators and technologies 21

Implications for Users The 7 Privacy-Embedded Laws of Identity offer: Easier and more direct control over one s personal information when online Embedded ability to minimize the amount of identifying data revealed online Embedded ability to minimize the linkage between different identities and online activities Embedded ability to detect fraudulent email messages and web sites (less spam, phishing, pharming, online fraud). 22

Privacy in the Clouds The 21 st Century Privacy Challenge Creating a User-Centric Identity Management Infrastructure Technology Building Blocks Call to Action www.ipc.on.ca/images/resources%5cprivacyintheclouds.pdf 23

Creating A User-Centric Identity Management Infrastructure Adequate tools to manage personal information on all devices Infrastructure allowing unified user experience with all devices System with a clear framework of agreed upon rules Sticky policies that travel with the information and ensure proper use in accordance with policy Infrastructure that supports cross-system interaction as well as interoperation and delegation Open standards and community-driven interoperability Policies, mechanisms, and technologies that use only the amount of personal information necessary Diversity in identity management systems Cloud Technology Building Blocks Open source and proprietary identity software based on open standards Federated identity Multiple and partial identities Data-centred policies Audit tools 24

Through the Clouds Transforming Web 2.0 Technologies of Identity: What you need to do Preserve and promote user privacy through: Enhanced user controls; Data minimization; Improved safeguards. Develop user-centric identity technologies that are: Interoperable and easy to use; Based upon free and open standards; Trustworthy and accountable. There is a need and opportunity to engineer privacy, security and trust into new emergent Internet and web architectures: Privacy by Design Meets the Cloud Interoperable identity metasystems; Cloud-based services, platforms and infrastructures; http://www.ipc.on.ca/images/resources/pbd-nec-cloud.pdf The "Internet of Things; The programmable web, or "WebOS." 25

Cloud Computing Architecture and Privacy Cloud Delivery Models Deployment Models Cloud Stack Data in the Cloud Blurred Security Perimeter PbD Cloud Computing Protecting Privacy and Maintaining Access Protecting Privacy and Data Integrity www.ipc.on.ca/images/resources/pbd-nec-cloud.pdf 26

More Resources: Federated PIA Develop and codify a Federation s privacy policies; Demonstrate that defined privacy policies will be met; Demonstrate that an appropriate technological architecture is in place to prevent, to the extent possible, accidental or malicious violations of privacy policies. www.ipc.on.ca/images/resources/f-pia_2.pdf Cloud Security Checklist 1.Discover How many projects you already have in the cloud; 2.Establish a cloud IT team and limit their administrative rights; 3.Don t skip the evaluation stage; 4.Do a thorough risk assessment; 5.Begin classifying data and identifying what can be moved to the cloud and what shouuld reside on-premise behind security layers; 6.Find a cloud-appropriate system for user authentication and access; 7.Scrutinize SLAs and ask: What are the data privacy and retention policies? Where is information stored? If you terminate your service, how long will it take to get your data back and in what form will you get it? Jeff Vance, How Checklists Can Improve Cloud Security, Forbes, April 4, 2011. www.forbes.com/sites/microsoft/2011/04/04/how-checklists-can-improve-cloud-security/ What is the disaster recovery plan? 27

Privacy by Design Meets the Cloud: Outsourcing Cloud computing services present similar privacy challenges to outsourcing: Where is the personal data? Which jurisdiction and laws apply? Who is accountable for the data and its uses? Is there effective oversight? Some things to consider: Conduct a Privacy Impact Assessment; Only use identifying information when necessary; Identify and minimize privacy and security risks; Use privacy enhancing technological tools; Exercise due diligence; Ensure transparency, notice, education & awareness; Develop a privacy breach management plan; Create and enforce contractual clauses. 28

Contractual Provisions to Consider when Outsourcing to Other Jurisdictions Require the service provider to agree not to use personal information to which it has access except as necessary in the course of providing services; Require the service provider to agree not to disclose personal information to which it has access in the course of providing services; Set out the administrative, technical and physical safeguards that must be employed by the service provider to ensure that records of personal information are retained, transferred and disposed of in a secure manner; Require the service provider to notify the organization, at the first reasonable opportunity, of any summons, order or similar requirement to compel production of the information issued outside Canada; Require the service provider to notify the organization, at the first reasonable opportunity, if the personal information is stolen, lost or accessed by unauthorized persons; Require the establishment of an oversight and monitoring program, including audits of the service provider s compliance with the terms of the agreement; and Prohibit the service provider from permitting its employees or any person acting on its behalf from having access to the personal information unless the employee or person acting on its behalf agrees to comply with the restrictions set out in the agreement. 29

You can outsource services but you can t outsource accountability. You always remain accountable. Announcing: Privacy by Design in the Age of Big Data The Big Difference with Big Data; Sensemaking Systems; Privacy by Design in the Age of Big Data; The Creation of a Big Data Sensemaking System through PbD. www.privacybydesign.ca 30

Questions? Comments???? How to Contact Us Ken Anderson Office of the Information & Privacy Commissioner of Ontario Toronto, Ontario, Canada M4W 1A8 Phone: (416) 326-3333 / 1-800-387-0073 Web: www.ipc.on.ca E-mail: ken.anderson@ipc.on.ca 31