LAB3-R04 A Hard Privacy Impact Assessment. Post conference summary

Size: px
Start display at page:

Download "LAB3-R04 A Hard Privacy Impact Assessment. Post conference summary"

Transcription

1 LAB3-R04 A Hard Privacy Impact Assessment Post conference summary John Elliott

2 Table of Contents THANK YOU... 3 WHAT IS PRIVACY?... 3 The European Perspective... 3 The US Perspective... 4 WHAT IS PRIVACY RISK?... 4 Privacy Harms... 4 PRIVACY IMPACT ASSESSMENTS... 5 When to do a PIA... 5 PIA Process... 5 Privacy Solutions... 6 CASE STUDY AUTOMATIC RISK ANALYSIS OF ONLINE CHAT... 6 RESOURCES

3 Privacy Impact Assessments This post-session summary is a re-cap of the Learning Lab. The main aim of the Lab was to help information security professionals understand the what, when, why and how of a privacy impact assessment. Hopefully now when you have to work with a privacy professional, you will at least know what they re talking about! Thank you Before going into a recap of the session which I hope you ll find really useful as a reminder of the material we covered (because I ll be the first to acknowledge that doing this in two hours was a bit of a sprint), I wanted to say thanks for attending and participating; both Joanne and I really enjoyed running the session. What is Privacy? Hopefully you ll remember the fun discussion you had about how much you all earned! The generally accepted definition of privacy is: The ability of a person to control, edit, manage and delete information about themselves and to decide how, and to what extent, such information is communicated to others. There was a brilliant talk all about privacy at RSA Conference 2017 from IAPP President and CEO, Trevor Hughes. If you want to get a better understanding of the nuances of privacy you can watch the recording at: There are contrasting viewpoints however in Europe and the US about whether privacy is a (fundamental) right or a legal tort. The European Perspective The European view is that privacy is a right. It s enshrined in Article 8 of the European Convention on Human Rights. Everyone has the right to respect for his private and family life, his home and his correspondence. The latest pan-european legislation, the General Data Protection Regulation (GDPR) starts off by stating: The protection of natural persons in relation to the processing of personal data is a fundamental right. Article 8(1) of the Charter of Fundamental Rights of the European Union (the Charter ) and Article 16(1) of the Treaty on the Functioning of the European Union (TFEU) provide that everyone has the right to the protection of personal data concerning him or her And the first Article states: 1. This Regulation lays down rules relating to the protection of natural persons with regard to the processing of personal data and rules relating to the free movement of personal data. 3

4 2. This Regulation protects fundamental rights and freedoms of natural persons and in particular their right to the protection of personal data. So, any interpretation of a privacy matter in Europe will be rights based. And this is important even if you re a US-based company and you process the data of people resident in the EU. Because the GDPR is extra-territorial in application. The US Perspective In the US, privacy has been established as a tort since Judge Brandeis wrote his paper on the right to be let alone when the portable camera was invented (for more about this see Trevor Hughes presentation, linked above). Privacy is not an explicit general right but in the US is contained in separate bits of legislation. Some examples are GLBA, HIPAA, COPPA, and FERPA The previous administration produced a review entitled Privacy in our Digital Lives: Protecting Individuals and Promoting Innovation that described a move to a more rights-based view of privacy in the US, however where privacy sits within the new administration s priorities is yet to be seen. What is Privacy Risk? Privacy Risk is the risk of harm arising through an intrusion into privacy. Privacy Harms Privacy harms can affect both individuals and organizations. The types of events that give rise to privacy harms are: Unauthorized disclosure o Data breach o Over-sharing Keeping someone s data for too long Doing something the person wouldn t expect Drawing conclusions from multiple data points Using inaccurate data And the harms that can affect an individual are typically broken down into two areas, direct harms (which are easily measured) and indirect harms (that are harder to measure). Direct harms include loss of employment, financial loss, disruption of relationships and harm to both physical and mental health for an example think of what happened when there was a breach at the affairs website Ashley Madison where people who were included in the leaked database lost their jobs, marriages and in some cases committed suicide. Indirect harms include self-censorship (because people are afraid that their privacy will not be maintained, and in the EU this is also closely related to the right to Freedom of Expression), a loss of personal dignity and a loss of personal autonomy The harm to an organization can be reputational, which can affect both individual and institutional trust (think Yahoo!); regulatory which can result in fines or an expensive audit regime (e.g. from the FTC) and legal, as the organization can be subject to direct legal action (e.g. for damages) from data subjects. 4

5 Privacy Impact Assessments A Privacy Impact Assessment (PIA) is also called a Privacy Risk Assessment and (for some unknown reason) in the EU they are called Data Protection Impact Assessments (DPIA). And although privacy pros tend to talk about Privacy Impact they really mean Privacy Risk and as InfoSec professionals we know how to do risk assessments. So when you hear PIA think Privacy Risk Assessment or simply, what is the Impact and Probability of the Privacy Harms identified above of happening to individuals and to the corporation. Once you ve done a PIA then just as with a traditional information security risk assessment you can apply solutions to bring the privacy risk back with the organization s risk appetite. When to do a PIA The simple answer is as early as possible in any project. The earlier you do a PIA, the sooner you can influence the design to reduce privacy risks. Just as with information security, it s easier to fix risks by design early on rather than trying to apply controls afterwards. There s also some statutory requirements where a PIA (or DPIA) is required: In the US, the E-Government Act of 2002 Section 208 requires U.S. government agencies to do PIAs for electronic information systems and collection. It s also recommended as best practice for all organizations processing personal data and would be useful in defending legal privacy-related claims. The GDPR in the EU requires organizations to undertake a DPIA when an organization plans: 1. A systematic and extensive evaluation of personal aspects relating to natural persons which is based on automated processing, including profiling, and on which decisions are based that produce legal effects concerning the natural person or similarly significantly affect the natural person; 2. Processing on a large scale of special categories of data referred to in Article 9(1), or of personal data relating to criminal convictions and offences referred to in Article 10; or 3. A systematic monitoring of a publicly accessible area on a large scale. PIA Process There are six steps in a typical PIA process: 1. Document the information flows (and also volumes) which is what you ll be familiar doing when carrying out information security risk assessments. However, for a PIA it is important to also consider the nature of the data being processed, there s different levels of privacy harm attached to different sorts of personal data. 2. Identify all the entities that could be affected by a privacy harm and this could be individuals, organizations and other third parties. 3. Identify states and countries where the individuals reside this is important so that you can capture all the relevant compliance requirements. 4. Identify the privacy risks (harms/impacts and probability) and the compliance obligations. 5. Develop privacy solutions to minimize the privacy risk (or bring them within the organization s risk appetite) and meet compliance requirements. 6. Talk to stakeholders about the risks and how they will be addressed it s often very useful to talk with the data subjects (users, employees) about what you ve discovered. 5

6 Privacy Solutions There are four main ways to address privacy risks: 1. Data minimization by far the most powerful way of reducing risk is not to collect data, and if you have collected data then only collect the minimum you need and delete it as soon as you can. 2. Anonymization and pseudononymization so that data is no longer related to an individual. 3. Encryption which we know is hard to do well but good encryption of data can prevent it being used or accessed improperly. 4. Technical controls which are the same as you know about from your information security experience. Case Study Automatic Risk Analysis of Online Chat In the case study, we considered the privacy harms that could come to Alice, Bob, ANDY and the chat provider. The most interesting aspect I hope you found was that the greatest privacy risk to all of four of the entitles was the same unauthorized disclosure of the contents of Alice s (and Bob s) chat messages. All the working groups came to the same conclusion which was to just store that data in memory and as soon as chat session was finished, to forget the data and not store it. This is a great example that data minimization is often the most powerful privacy solution we have. Resources If you enjoyed this journey into privacy which I ll acknowledge was pretty high speed then you ll find lots of great resources on the International Association of Privacy Professionals (IAPP) website at They have a great qualification for IT professionals who want to demonstrate their privacy credentials which is the CIPT - Joanne would of course like to direct you to the TRUSTe website where again you ll find lots of useful privacy information And sometimes I write about privacy things as well as payments (PCI) and cyber security at John Elliott March

7 SESSION ID: LAB3-R04 A Hard Privacy Impact Assessment: Monitoring and Protecting Children Online John Elliott LLM CIPP/E Head of Payment Security Joanne B. Furtsch CIPP/US/C Director, Policy and Data Governance

8 Agenda Theory What is Privacy What is a Privacy Impact Assessment? Why do one? US View EU /GDPR View Practice - Detecting grooming online What are the privacy risks? Who do they affect? How could they be reduced / managed? 2

9 What we hope you ll take away Basic privacy principles Why do a PIA (or a DPIA) How to conduct a PIA Where next?

10 What is privacy?

11 Introduce yourselves to each other Name Where you come from What you want to get out of this session How much you earn

12 What is privacy?

13 the ability of a person to control, edit, manage and delete information about themselves and to decide how and to what extent such information is communicated to others.

14 EU Perspective European Convention on Human Rights (ECHR) Article 8: 1. Everyone has the right to respect for his private and family life, his home and his correspondence. 2. There shall be no interference by a public authority with the exercise of this right except such as in accordance with the law, and is necessary in a democratic society in the interests of national security, public safety or the economic well-being of the country, for the prevention of disorder or crime, for the protection of health and morals, or for the protection of the rights and freedoms of others. 8

15 EU Perspective Recital 1: The protection of natural persons in relation to the processing of personal data is a fundamental right. Article 8(1) of the Charter of Fundamental Rights of the European Union (the Charter ) and Article 16(1) of the Treaty on the Functioning of the European Union (TFEU) provide that everyone has the right to the protection of personal data concerning him or her General Data Protection Regulation (GDPR) 9

16 In the EU privacy is a fundamental human right European Convention on Human Rights (ECHR) General Data Protection Regulation (GDPR) GDPR Article 1 1. This Regulation lays down rules relating to the protection of natural persons with regard to the processing of personal data and rules relating to the free movement of personal data. 2. This Regulation protects fundamental rights and freedoms of natural persons and in particular their right to the protection of personal data.

17 Why is GDPR important? Extra-territorial application GDPR Article 3(2) This Regulation applies to the processing of personal data of data subjects who are in the Union by a controller or processor not established in the Union, where the processing activities are related to: (a) the offering of goods or services, irrespective of whether a payment of the data subject is required, to such data subjects in the Union; or (b) the monitoring of their behavior as far as their behavior takes place within the Union. Will you process the data of any EU citizens? 11

18 US Perspective Privacy is more than just, as Justice Brandeis famously proclaimed, the right to be let alone. It is the right to have our most personal information be kept safe by others we trust. It is the right to communicate freely and to do so without fear. It is the right to associate freely with others, regardless of the medium. In an age where so many of our thoughts, words, and movements are digitally recorded, privacy cannot simply be an abstract concept in our lives; privacy must be an embedded value. Privacy in our Digital Lives: Protecting Individuals and Promoting Innovation. White House, January 17,

19 US Perspective U.S paradigm shift viewing privacy as a right Financial crisis Evolving technology and growth Sectorial approach to privacy laws Industries or individual types where data misuse can cause a high level of harm GLBA, HIPAA, COPPA, and FERPA Self-regulation or voluntary frameworks fill the gaps Questions around where the U.S. approach is headed Recent Executive Order removing privacy protections for non-u.s. citizens Policies around government surveillance and impact on US businesses EU-U.S. Privacy Shield agreement remains intact Does not rely on protections under the Privacy Act 13

20 What is privacy risk?

21 Privacy Risk is the risk of harm arising through an intrusion into privacy.

22 What could be privacy harm?

23 What can cause harm to individuals? Unauthorized disclosure Data breach Over-sharing Keeping data for too long Doing something the person wouldn t expect Drawing conclusions from multiple data points Using inaccurate data

24 Direct harm Loss of employment Financial loss Disruption of relationships Harm to mental and physical health

25 Indirect Harm Self-censorship Loss of personal dignity Loss of personal autonomy Fear of something happening

26 It s just like any infosec risk likelihood (probability) impact 20

27 Privacy risk to corporations Adverse publicity Regulatory censure Trust / distrust Existential risk Direct action from data subjects (consumers) + Explicit compliance requirements 21

28 Privacy risk assessment Privacy Impact Assessment (PIA) Data Protection Impact Assessment (DPIA)

29 Process Document information flows (and volumes) Identify entities (inc 3 rd Parties) Identify geographies (states/countries) Identify privacy risks and compliance obligations Develop privacy solutions Consult with stakeholders 23

30 Privacy solutions Data minimization Anonymization, pseudonymization Encryption Other technical protection

31 When - generally Type of data Quantity of data Doing something new New technology And at what stage in the process? 25

32 USA when to do a PIA E-Government Act of 2002 Section 208 U.S. government agencies required to do PIAs for electronic information systems and collection Documented assurances privacy issues have been identified and addressed early in the development lifecycle Conducting PIAs is an industry best practice Government PIAs and process serve as examples

33 What GDPR says: Do DPIA when 1. A systematic and extensive evaluation of personal aspects relating to natural persons which is based on automated processing, including profiling, and on which decisions are based that produce legal effects concerning the natural person or similarly significantly affect the natural person; 2. Processing on a large scale of special categories of data referred to in Article 9(1), or of personal data relating to criminal convictions and offences referred to in Article 10; or 3. A systematic monitoring of a publicly accessible area on a large scale. 27

34 Tips Minimize data Types Length of storage Storage locations Pseudonymization, Anonymize 28

35 (D)PIAs in InfoSec work Network monitoring monitoring Endpoint monitoring 29

36 International Association of Privacy Professionals Resources for privacy pros iapp.org Certification for technologists working in privacy Certified Information Privacy Technologist (CIPT) 30

GDPR Awareness. Kevin Styles. Certified Information Privacy Professional - Europe Member of International Association of Privacy professionals

GDPR Awareness. Kevin Styles. Certified Information Privacy Professional - Europe Member of International Association of Privacy professionals GDPR Awareness Kevin Styles Certified Information Privacy Professional - Europe Member of International Association of Privacy professionals Introduction Privacy and data protection are fundamental rights

More information

Robert Bond Partner, Commercial/IP/IT

Robert Bond Partner, Commercial/IP/IT Using Privacy Impact Assessments Effectively robert.bond@bristows.com Robert Bond Partner, Commercial/IP/IT BA (Hons) Law, Wolverhampton University Qualified as a Solicitor 1979 Qualified as a Notary Public

More information

EXIN Privacy and Data Protection Foundation. Preparation Guide. Edition

EXIN Privacy and Data Protection Foundation. Preparation Guide. Edition EXIN Privacy and Data Protection Foundation Preparation Guide Edition 201701 Content 1. Overview 3 2. Exam requirements 5 3. List of Basic Concepts 9 4. Literature 15 2 1. Overview EXIN Privacy and Data

More information

Biometric Data, Deidentification. E. Kindt Cost1206 Training school 2017

Biometric Data, Deidentification. E. Kindt Cost1206 Training school 2017 Biometric Data, Deidentification and the GDPR E. Kindt Cost1206 Training school 2017 Overview Introduction 1. Definition of biometric data 2. Biometric data as a new category of sensitive data 3. De-identification

More information

The new GDPR legislative changes & solutions for online marketing

The new GDPR legislative changes & solutions for online marketing TRUSTED PRIVACY The new GDPR legislative changes & solutions for online marketing IAB Forum 2016 29/30th of November 2016, Milano Prof. Dr. Christoph Bauer, GmbH Who we are and what we do Your partner

More information

IAB Europe Guidance THE DEFINITION OF PERSONAL DATA. IAB Europe GDPR Implementation Working Group WHITE PAPER

IAB Europe Guidance THE DEFINITION OF PERSONAL DATA. IAB Europe GDPR Implementation Working Group WHITE PAPER IAB Europe Guidance WHITE PAPER THE DEFINITION OF PERSONAL DATA Five Practical Steps to help companies comply with the E-Privacy Working Directive Paper 02/2017 IAB Europe GDPR Implementation Working Group

More information

The General Data Protection Regulation and use of health data: challenges for pharmaceutical regulation

The General Data Protection Regulation and use of health data: challenges for pharmaceutical regulation The General Data Protection Regulation and use of health data: challenges for pharmaceutical regulation ENCePP Plenary Meeting- London, 22/11/2016 Alessandro Spina Data Protection Officer, EMA An agency

More information

Privacy and the EU GDPR US and UK Privacy Professionals

Privacy and the EU GDPR US and UK Privacy Professionals Privacy and the EU GDPR US and UK Privacy Professionals Independent research conducted by Dimensional Research on behalf of TrustArc US 888.878.7830 EU +44 (0)203.078.6495 www.trustarc.com 2017 TrustArc

More information

This policy sets out how Legacy Foresight and its Associates will seek to ensure compliance with the legislation.

This policy sets out how Legacy Foresight and its Associates will seek to ensure compliance with the legislation. Privacy Notice August 2018 Introduction The General Data Protection Regulation (GDPR) is European wide data protection legislation that requires organisations working with individuals based in the European

More information

Protection of Privacy Policy

Protection of Privacy Policy Protection of Privacy Policy Policy No. CIMS 006 Version No. 1.0 City Clerk's Office An Information Management Policy Subject: Protection of Privacy Policy Keywords: Information management, privacy, breach,

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Privacy framework

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Privacy framework INTERNATIONAL STANDARD ISO/IEC 29100 First edition 2011-12-15 Information technology Security techniques Privacy framework Technologies de l'information Techniques de sécurité Cadre privé Reference number

More information

PRIVACY IMPACT ASSESSMENT

PRIVACY IMPACT ASSESSMENT PRIVACY IMPACT ASSESSMENT PRIVACY IMPACT ASSESSMENT The template below is designed to assist you in carrying out a privacy impact assessment (PIA). Privacy Impact Assessment screening questions These questions

More information

Our position. ICDPPC declaration on ethics and data protection in artificial intelligence

Our position. ICDPPC declaration on ethics and data protection in artificial intelligence ICDPPC declaration on ethics and data protection in artificial intelligence AmCham EU speaks for American companies committed to Europe on trade, investment and competitiveness issues. It aims to ensure

More information

The EFPIA Perspective on the GDPR. Brendan Barnes, EFPIA 2 nd Nordic Real World Data Conference , Helsinki

The EFPIA Perspective on the GDPR. Brendan Barnes, EFPIA 2 nd Nordic Real World Data Conference , Helsinki The EFPIA Perspective on the GDPR Brendan Barnes, EFPIA 2 nd Nordic Real World Data Conference 26-27.9.2017, Helsinki 1 Key Benefits of Health Data Improved decision-making Patient self-management CPD

More information

Privacy Policy SOP-031

Privacy Policy SOP-031 SOP-031 Version: 2.0 Effective Date: 18-Nov-2013 Table of Contents 1. DOCUMENT HISTORY...3 2. APPROVAL STATEMENT...3 3. PURPOSE...4 4. SCOPE...4 5. ABBREVIATIONS...5 6. PROCEDURES...5 6.1 COLLECTION OF

More information

Executive Summary Industry s Responsibility in Promoting Responsible Development and Use:

Executive Summary Industry s Responsibility in Promoting Responsible Development and Use: Executive Summary Artificial Intelligence (AI) is a suite of technologies capable of learning, reasoning, adapting, and performing tasks in ways inspired by the human mind. With access to data and the

More information

Should privacy impact assessments be mandatory? David Wright Trilateral Research & Consulting 17 Sept 2009

Should privacy impact assessments be mandatory? David Wright Trilateral Research & Consulting 17 Sept 2009 Should privacy impact assessments be mandatory? David Wright Trilateral Research & Consulting 17 Sept 2009 1 Today s presentation Databases solving one problem & creating another What is a privacy impact

More information

Violent Intent Modeling System

Violent Intent Modeling System for the Violent Intent Modeling System April 25, 2008 Contact Point Dr. Jennifer O Connor Science Advisor, Human Factors Division Science and Technology Directorate Department of Homeland Security 202.254.6716

More information

SPONSORSHIP AND DONATION ACCEPTANCE POLICY

SPONSORSHIP AND DONATION ACCEPTANCE POLICY THE NATIONAL GALLERY SPONSORSHIP AND DONATION ACCEPTANCE POLICY Owner: Head of Development Approved by the National Gallery Board of Trustees on: September 2018 Date of next review by Board: September

More information

CCTV Policy. Policy reviewed by Academy Transformation Trust on June This policy links to: Safeguarding Policy Data Protection Policy

CCTV Policy. Policy reviewed by Academy Transformation Trust on June This policy links to: Safeguarding Policy Data Protection Policy CCTV Policy Policy reviewed by Academy Transformation Trust on June 2018 This policy links to: Located: Safeguarding Policy Data Protection Policy Review Date May 2019 Our Mission To provide the very best

More information

Ethical and social aspects of management information systems

Ethical and social aspects of management information systems Ethical and social aspects of management Marcos Sanches Commerce Électronique The challenge Why are contemporary and the Internet a challenge for the protection of privacy and intellectual property? How

More information

A Guide for Structuring and Implementing PIAs

A Guide for Structuring and Implementing PIAs WHITEPAPER A Guide for Structuring and Implementing PIAs Six steps for your next Privacy Impact Assessment TRUSTe Inc. US: 1-888-878-7830 www.truste.com EU: +44 (0) 203 078 6495 www.truste.eu 2 CONTENTS

More information

CCTV Policy. Policy reviewed by Academy Transformation Trust on June This policy links to: T:Drive. Safeguarding Policy Data Protection Policy

CCTV Policy. Policy reviewed by Academy Transformation Trust on June This policy links to: T:Drive. Safeguarding Policy Data Protection Policy CCTV Policy Policy reviewed by Academy Transformation Trust on June 2018 This policy links to: Safeguarding Policy Data Protection Policy Located: T:Drive Review Date May 2019 Our Mission To provide the

More information

Privacy Impact Assessment on use of CCTV

Privacy Impact Assessment on use of CCTV Appendix 2 Privacy Impact Assessment on use of CCTV CCTV is currently in the majority of the Council s leisure facilities, however this needs to be extended to areas not currently covered by CCTV. Background

More information

The Information Commissioner s response to the Draft AI Ethics Guidelines of the High-Level Expert Group on Artificial Intelligence

The Information Commissioner s response to the Draft AI Ethics Guidelines of the High-Level Expert Group on Artificial Intelligence Wycliffe House, Water Lane, Wilmslow, Cheshire, SK9 5AF T. 0303 123 1113 F. 01625 524510 www.ico.org.uk The Information Commissioner s response to the Draft AI Ethics Guidelines of the High-Level Expert

More information

Personal Data Protection Competency Framework for School Students. Intended to help Educators

Personal Data Protection Competency Framework for School Students. Intended to help Educators Conférence INTERNATIONAL internationale CONFERENCE des OF PRIVACY commissaires AND DATA à la protection PROTECTION des données COMMISSIONERS et à la vie privée Personal Data Protection Competency Framework

More information

Wireless Sensor Networks and Privacy

Wireless Sensor Networks and Privacy Wireless Sensor Networks and Privacy UbiSec & Sens Workshop Aachen 7.2.2008 Agenda ULD who we are and what we do Privacy and Data Protection concept and terminology Privacy and Security technologies a

More information

Analysis of Privacy and Data Protection Laws and Directives Around the World

Analysis of Privacy and Data Protection Laws and Directives Around the World Analysis of Privacy and Data Protection Laws and Directives Around the World Michael Willett (Seagate) ISTPA Board and Framework Chair Track IIB: Global Privacy Policy The Privacy Symposium: Boston, 23

More information

Efese, ethics in research

Efese, ethics in research faculty of law staatsrecht, bestuursrecht & bestuurskunde 02-06-2017 1 Efese, ethics in research Spetses, June 2017 Dr. Aline Klingenberg faculty of law staatsrecht, bestuursrecht & bestuurskunde 02-06-2017

More information

EU-GDPR The General Data Protection Regulation

EU-GDPR The General Data Protection Regulation EU-GDPR The General Data Protection Regulation Lucas Heymans, Higher Education Applications Product Strategy EMEA Safe Harbor Statement The following is intended to outline our general product direction.

More information

Toward Objective Global Privacy Standards. Ari Schwartz Senior Internet Policy Advisor

Toward Objective Global Privacy Standards. Ari Schwartz Senior Internet Policy Advisor Toward Objective Global Privacy Standards Ari Schwartz Senior Internet Policy Advisor Summary Technical standards offer a new ability to support the important public policy goal of better protecting privacy.

More information

Is Transparency a useful Paradigm for Privacy?

Is Transparency a useful Paradigm for Privacy? Is Transparency a useful Paradigm for Privacy? Shonan Seminar, August 6 th, 2013 Japan Prof. Dr. Dr. h.c. Günter Müller Institute of Computer Science and Social Studies Department of Telematics Outline

More information

Innovation and Technology Law Curriculum

Innovation and Technology Law Curriculum Innovation and Technology Law Curriculum Core Courses FOUNDATIONS OF PRIVACY LAW (FALL 2016) This course explores the principles of privacy law in relation to the affairs of government, non-government

More information

https://www.icann.org/en/system/files/files/interim-models-gdpr-compliance-12jan18-en.pdf 2

https://www.icann.org/en/system/files/files/interim-models-gdpr-compliance-12jan18-en.pdf 2 ARTICLE 29 Data Protection Working Party Brussels, 11 April 2018 Mr Göran Marby President and CEO of the Board of Directors Internet Corporation for Assigned Names and Numbers (ICANN) 12025 Waterfront

More information

Privacy engineering, privacy by design, and privacy governance

Privacy engineering, privacy by design, and privacy governance CyLab Lorrie Faith Cranor" Engineering & Public Policy acy & Secur ity Priv e l HT TP ratory bo La 8-533 / 8-733 / 19-608 / 95-818:! Privacy Policy, Law, and Technology CyLab U sab November 17, 2015 ://

More information

A/AC.105/C.1/2014/CRP.13

A/AC.105/C.1/2014/CRP.13 3 February 2014 English only Committee on the Peaceful Uses of Outer Space Scientific and Technical Subcommittee Fifty-first session Vienna, 10-21 February 2014 Long-term sustainability of outer space

More information

Internet 2020: The Next Billion Users

Internet 2020: The Next Billion Users Internet 2020: The Next Billion Users Lawrence E. Strickling I. INTRODUCTION I am honored to have the opportunity to preface this edition of CommLaw Conspectus and discuss the Internet policy priorities

More information

The Game Changer: Privacy by Design

The Game Changer: Privacy by Design WHITE PAPER Dr. Ann Cavoukian, Privacy by Design Centre of Excellence, on leading with privacy by design The Game Changer: Privacy by Design Data Security: Cost of Taking the Reactive Approach CONTENTS

More information

Ethics Review Data Sharing Bridging Legal Environments

Ethics Review Data Sharing Bridging Legal Environments The EU Framework Programme for Research and Innovation HORIZON 2020 Ethics Review Data Sharing Bridging Legal Environments Dr Joana Namorado Health Strategy Unit DG Research and Innovation European Commission

More information

International Seminar on Personal Data Protection and Privacy Câmara Dos Deputados-BRAZIL

International Seminar on Personal Data Protection and Privacy Câmara Dos Deputados-BRAZIL International Seminar on Personal Data Protection and Privacy Câmara Dos Deputados-BRAZIL Panel: Data protection in Finance, Health Services and Telecommunications Carlos López Blanco Telefónica S.A. 10.05.2017

More information

PRIVACY IMPACT ASSESSMENT CONDUCTING A PRIVACY IMPACT ASSESSMENT ON SURVEILLANCE CAMERA SYSTEMS (CCTV)

PRIVACY IMPACT ASSESSMENT CONDUCTING A PRIVACY IMPACT ASSESSMENT ON SURVEILLANCE CAMERA SYSTEMS (CCTV) PRIVACY IMPACT ASSESSMENT CONDUCTING A PRIVACY IMPACT ASSESSMENT ON SURVEILLANCE CAMERA SYSTEMS (CCTV) 1 Principle 2 of the surveillance camera code of practice states that the use of a surveillance camera

More information

Pan-Canadian Trust Framework Overview

Pan-Canadian Trust Framework Overview Pan-Canadian Trust Framework Overview A collaborative approach to developing a Pan- Canadian Trust Framework Authors: DIACC Trust Framework Expert Committee August 2016 Abstract: The purpose of this document

More information

Artificial Intelligence, Business, and the Law

Artificial Intelligence, Business, and the Law Artificial Intelligence, Business, and the Law Cory Fisher cwfisher@shb.com ar ti fi cial in tel li gence /ˌärdəˈfiSHəl inˈteləjəns/ Noun the capability of a machine to imitate intelligent human behavior

More information

Building DIGITAL TRUST People s Plan for Digital: A discussion paper

Building DIGITAL TRUST People s Plan for Digital: A discussion paper Building DIGITAL TRUST People s Plan for Digital: A discussion paper We want Britain to be the world s most advanced digital society. But that won t happen unless the digital world is a world of trust.

More information

Application pack Level 3 Certificate in Housing Practice blended learning open access

Application pack Level 3 Certificate in Housing Practice blended learning open access Application pack Level 3 Certificate in Housing Practice blended learning open access Thank you for applying to study with CIH CIH Housing Academy is the largest provider of housing qualifications in the

More information

CILIP Privacy Briefing 2017

CILIP Privacy Briefing 2017 CILIP Privacy Briefing 2017 Tuesday 28 November 2017 #CILIPPrivacy17 Privacy, surveillance and the information profession: challenges, qualifications, and dilemmas? David McMenemy, Lecturer and Course

More information

KEY ISSUES IN PRIVACY AND INFORMATION MANAGEMENT 2015

KEY ISSUES IN PRIVACY AND INFORMATION MANAGEMENT 2015 OSGOODE PROFESSIONAL DEVELOPMENT The OsgoodePD Webinar Series KEY ISSUES IN PRIVACY AND INFORMATION MANAGEMENT 2015 Eight focused lunchtime webinars that cover the fundamentals and the latest legal developments.

More information

24 May Committee Secretariat Justice Committee Parliament Buildings Wellington. Dear Justice Select Committee member,

24 May Committee Secretariat Justice Committee Parliament Buildings Wellington. Dear Justice Select Committee member, 24 May 2018 Committee Secretariat Justice Committee Parliament Buildings Wellington Dear Justice Select Committee member, Submission to the Justice Committee Review Privacy Bill Thank you for the opportunity

More information

Whatever Happened to the. Fair Information Practices?

Whatever Happened to the. Fair Information Practices? Whatever Happened to the Fair Information Practices? Beth Givens Director Privacy Rights Clearinghouse Privacy Symposium August 22, 2007 Cambridge, MA Topics Definition and origins of FIPs Overview of

More information

Paola Bailey, PsyD Licensed Clinical Psychologist PSY# 25263

Paola Bailey, PsyD Licensed Clinical Psychologist PSY# 25263 NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY. Privacy is a very

More information

TechAmerica Europe comments for DAPIX on Pseudonymous Data and Profiling as per 19/12/2013 paper on Specific Issues of Chapters I-IV

TechAmerica Europe comments for DAPIX on Pseudonymous Data and Profiling as per 19/12/2013 paper on Specific Issues of Chapters I-IV Tech EUROPE TechAmerica Europe comments for DAPIX on Pseudonymous Data and Profiling as per 19/12/2013 paper on Specific Issues of Chapters I-IV Brussels, 14 January 2014 TechAmerica Europe represents

More information

Human Rights in the era of Information and Communication Technology

Human Rights in the era of Information and Communication Technology Human Rights in the era of Information and Communication Technology May 31, 2017 Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg Outline 1 Human rights 2 Human

More information

Details of the Proposal

Details of the Proposal Details of the Proposal Draft Model to Address the GDPR submitted by Coalition for Online Accountability This document addresses how the proposed model submitted by the Coalition for Online Accountability

More information

Societal and Ethical Challenges in the Era of Big Data: Exploring the emerging issues and opportunities of big data management and analytics

Societal and Ethical Challenges in the Era of Big Data: Exploring the emerging issues and opportunities of big data management and analytics Societal and Ethical Challenges in the Era of Big Data: Exploring the emerging issues and opportunities of big data management and analytics June 28, 2017 from 11.00 to 12.45 ICE/ IEEE Conference, Madeira

More information

Data Anonymization Related Laws in the US and the EU. CS and Law Project Presentation Jaspal Singh

Data Anonymization Related Laws in the US and the EU. CS and Law Project Presentation Jaspal Singh Data Anonymization Related Laws in the US and the EU CS and Law Project Presentation Jaspal Singh The Need for Anonymization To share a database packed with sensitive information with third parties or

More information

CODE OF CONDUCT. STATUS : December 1, 2015 DES C R I P T I O N. Internal Document Date : 01/12/2015. Revision : 02

CODE OF CONDUCT. STATUS : December 1, 2015 DES C R I P T I O N. Internal Document Date : 01/12/2015. Revision : 02 STATUS : December 1, 2015 DES C R I P T I O N Type : Internal Document Date : 01/12/2015 Revision : 02 CODE OF CONDUCT. Page 2/7 MESSAGE FROM THE CHAIRMAN AND THE CEO Dear all, The world is continually

More information

GUIDELINES ON PRIVACY BY DESIGN AND PRIVACY IMPACT ASSESSMENT

GUIDELINES ON PRIVACY BY DESIGN AND PRIVACY IMPACT ASSESSMENT Document 2.1.4-7 GUIDELINES ON PRIVACY BY DESIGN AND PRIVACY IMPACT ASSESSMENT Component 2 Activity 2.1.4-4 Draft version - November 2011 The content of this report is the sole responsibility of Human

More information

Commonwealth Data Forum. Giovanni Buttarelli

Commonwealth Data Forum. Giovanni Buttarelli 21 February 2018 Commonwealth Data Forum Giovanni Buttarelli Thank you, Michael, for your kind introduction. Thank you also to the Commonwealth Telecommunications Organisation and the Government of Gibraltar

More information

ARTICLE 29 Data Protection Working Party

ARTICLE 29 Data Protection Working Party ARTICLE 29 Data Protection Working Party Brussels, 10 April 2017 Hans Graux Project editor of the draft Code of Conduct on privacy for mobile health applications By e-mail: hans.graux@timelex.eu Dear Mr

More information

Primary IVF Conditions for Registration For Assisted Reproductive Treatment Providers under the Assisted Reproductive Treatment Act 2008

Primary IVF Conditions for Registration For Assisted Reproductive Treatment Providers under the Assisted Reproductive Treatment Act 2008 Primary IVF Conditions for Registration For Assisted Reproductive Treatment Providers under the Assisted Reproductive Treatment Act 2008 Effective: 1 June 2018 Contents SECTION 1: Background... 3 SECTION

More information

Identifying and Managing Joint Inventions

Identifying and Managing Joint Inventions Page 1, is a licensing manager at the Wisconsin Alumni Research Foundation in Madison, Wisconsin. Introduction Joint inventorship is defined by patent law and occurs when the outcome of a collaborative

More information

European Union General Data Protection Regulation Effects on Research

European Union General Data Protection Regulation Effects on Research European Union General Data Protection Regulation Effects on Research Mark Barnes Partner, Ropes & Gray LLP Co-Director, Multi-Regional Clinical Trials Center of Brigham and Women s Hospital and Harvard

More information

Having regard to the Treaty establishing the European Community, and in particular its Article 286,

Having regard to the Treaty establishing the European Community, and in particular its Article 286, Opinion of the European Data Protection Supervisor on the Communication from the Commission on an Action Plan for the Deployment of Intelligent Transport Systems in Europe and the accompanying Proposal

More information

A Pattern Catalog for GDPR Compliant Data Protection

A Pattern Catalog for GDPR Compliant Data Protection A Pattern Catalog for GDPR Compliant Data Protection Dominik Huth, 22.11.2017, PoEM Doctoral Consortium Chair of Software Engineering for Business Information Systems (sebis) Faculty of Informatics Technische

More information

Interactive Workshop on Data Protection Impact Assessment

Interactive Workshop on Data Protection Impact Assessment Interactive Workshop on Data Protection Impact Assessment A Hands On Tour of the GDPR s Most Practical Tool IFIP Summer School 2017 Felix Bieker, Michael Friedewald and Marit Hansen Workshop Structure

More information

networked Youth Research for Empowerment in the Digital society MANIFESTO

networked Youth Research for Empowerment in the Digital society MANIFESTO networked Youth Research for Empowerment in the Digital society MANIFESTO Our WORLD now We, young people, have always been defined by decision makers, educational systems and our own families as future

More information

Lecture 7 Ethics, Privacy, and Politics in the Age of Data

Lecture 7 Ethics, Privacy, and Politics in the Age of Data Lecture 7 Ethics, Privacy, and Politics in the Age of Data Module Roadmap Representation Technologies Digital workplaces Ethics, Privacy and Politics Digital Workplaces and Capitalist Accumulation tbc

More information

Privacy Procedure SOP-031. Version: 04.01

Privacy Procedure SOP-031. Version: 04.01 SOP-031 Version: 04.01 Effective Date: 01-Mar-2017 Table of Contents 1. DOCUMENT HISTORY... 3 2. APPROVAL STATEMENT... 3 3. PURPOSE... 4 4. SCOPE... 4 5. ABBREVIATIONS... 4 6. PROCEDURES... 5 6.1 COLLECTION

More information

Contents. Executive summary 2. Responding to the fear of technology why data protection law exists 4

Contents. Executive summary 2. Responding to the fear of technology why data protection law exists 4 Contents Executive summary 2 Responding to the fear of technology why data protection law exists 4 Transition to the GDPR technology under heightened scrutiny 5 Technology failure and consequences for

More information

Gender pay gap reporting tight for time

Gender pay gap reporting tight for time People Advisory Services Gender pay gap reporting tight for time March 2018 Contents Introduction 01 Insights into emerging market practice 02 Timing of reporting 02 What do employers tell us about their

More information

Venturing into contracting?

Venturing into contracting? Venturing into contracting? We ll guide you in the right direction Join Intouch in January 2018 and pay nothing until March Quote code: INJAN18* * T&Cs apply Contracting - Taking the leap Starting up as

More information

Privacy and Security in Europe Technology development and increasing pressure on the private sphere

Privacy and Security in Europe Technology development and increasing pressure on the private sphere Interview Meeting 2 nd CIPAST Training Workshop 17 21 June 2007 Procida, Italy Support Materials by Åse Kari Haugeto, The Norwegian Board of Technology Privacy and Security in Europe Technology development

More information

12 April Fifth World Congress for Freedom of Scientific research. Speech by. Giovanni Buttarelli

12 April Fifth World Congress for Freedom of Scientific research. Speech by. Giovanni Buttarelli 12 April 2018 Fifth World Congress for Freedom of Scientific research Speech by Giovanni Buttarelli Good morning ladies and gentlemen. It is my real pleasure to contribute to such a prestigious event today.

More information

THE UNIVERSITY OF AUCKLAND INTELLECTUAL PROPERTY CREATED BY STAFF AND STUDENTS POLICY Organisation & Governance

THE UNIVERSITY OF AUCKLAND INTELLECTUAL PROPERTY CREATED BY STAFF AND STUDENTS POLICY Organisation & Governance THE UNIVERSITY OF AUCKLAND INTELLECTUAL PROPERTY CREATED BY STAFF AND STUDENTS POLICY Organisation & Governance 1. INTRODUCTION AND OBJECTIVES 1.1 This policy seeks to establish a framework for managing

More information

Hong Kong Personal Data Protection Regulatory Framework From Compliance to Accountability

Hong Kong Personal Data Protection Regulatory Framework From Compliance to Accountability Legal Week s Corporate Counsel Forum 2016 Renaissance Harbour View Hotel 23 June 2016 Hong Kong Personal Data Protection Regulatory Framework From Compliance to Accountability Stephen Kai-yi Wong Privacy

More information

Global Alliance for Genomics & Health Data Sharing Lexicon

Global Alliance for Genomics & Health Data Sharing Lexicon Version 1.0, 15 March 2016 Global Alliance for Genomics & Health Data Sharing Lexicon Preamble The Global Alliance for Genomics and Health ( GA4GH ) is an international, non-profit coalition of individuals

More information

Enforcement of Intellectual Property Rights Frequently Asked Questions

Enforcement of Intellectual Property Rights Frequently Asked Questions EUROPEAN COMMISSION MEMO Brussels/Strasbourg, 1 July 2014 Enforcement of Intellectual Property Rights Frequently Asked Questions See also IP/14/760 I. EU Action Plan on enforcement of Intellectual Property

More information

Avoiding Enemies of Trust Common Behaviors that Inadvertently Damage Trust at Work 1 and How to Avoid Them

Avoiding Enemies of Trust Common Behaviors that Inadvertently Damage Trust at Work 1 and How to Avoid Them Avoiding Enemies of Trust Common Behaviors that Inadvertently Damage Trust at Work 1 and How to Avoid Them Enemies of Trust: Sincerity 1. Failing to update. Changing your mind about a decision or direction

More information

Australian Census 2016 and Privacy Impact Assessment (PIA)

Australian Census 2016 and Privacy Impact Assessment (PIA) http://www.privacy.org.au Secretary@privacy.org.au http://www.privacy.org.au/about/contacts.html 12 February 2016 Mr David Kalisch Australian Statistician Australian Bureau of Statistics Locked Bag 10,

More information

Interest Balancing Test Assessment on the processing of the copies of data subjects driving licences for the MOL Limo service

Interest Balancing Test Assessment on the processing of the copies of data subjects driving licences for the MOL Limo service 1 Legitimate interest of the controller or a third party: General description of the processing environment Users can commence the registration required for using the MOL LIMO service in the Mobile Application

More information

The information ethics matrix. Values and rights in electronic environments

The information ethics matrix. Values and rights in electronic environments The ethics matrix Values and rights in electronic environments Rainer Kuhlen Information Engineering - Department of Computer and Information Science at the University of Constance Visualisierung und Exploration

More information

Towards a Modern Approach to Privacy-Aware Government Data Releases

Towards a Modern Approach to Privacy-Aware Government Data Releases Towards a Modern Approach to Privacy-Aware Government Data Releases Micah Altman David O Brien & Alexandra Wood MIT Libraries Berkman Center for Internet & Society Open Data: Addressing Privacy, Security,

More information

Dr Nicholas J. Gervassis University of Plymouth THE EMERGING UK DATA PROTECTION FRAMEWORK AND BEYOND

Dr Nicholas J. Gervassis University of Plymouth THE EMERGING UK DATA PROTECTION FRAMEWORK AND BEYOND Dr Nicholas J. Gervassis University of Plymouth THE EMERGING UK DATA PROTECTION FRAMEWORK AND BEYOND PRIVACY DATA PROTECTION Organisation for Economic Cooperation and Development (OECD) Guidelines on the

More information

Ethics Guideline for the Intelligent Information Society

Ethics Guideline for the Intelligent Information Society Ethics Guideline for the Intelligent Information Society April 2018 Digital Culture Forum CONTENTS 1. Background and Rationale 2. Purpose and Strategies 3. Definition of Terms 4. Common Principles 5. Guidelines

More information

COMMUNICATIONS POLICY

COMMUNICATIONS POLICY COMMUNICATIONS POLICY This policy was approved by the Board of Trustees on June 14, 2016 TABLE OF CONTENTS 1. INTRODUCTION 1 2. PURPOSE 1 3. APPLICATION 1 4. POLICY STATEMENT 1 5. ROLES AND RESPONSIBILITIES

More information

The Information Commissioner s role

The Information Commissioner s role Information Commissioner s response to the House of Commons Science and Technology Committee inquiry on The big data dilemma The Information Commissioner s role 1. The Information Commissioner has responsibility

More information

Legislative and Regulatory Update. Diane Bowers, CASRO President CASRO Data Collection Conference November 19, 2009

Legislative and Regulatory Update. Diane Bowers, CASRO President CASRO Data Collection Conference November 19, 2009 Legislative and Regulatory Update Diane Bowers, CASRO President CASRO Data Collection Conference November 19, 2009 2009 Pharma market research state and Federal Massachusetts Vermont Minnesota Proposed

More information

CAMD Transition Sub Group FAQ IVDR Transitional provisions

CAMD Transition Sub Group FAQ IVDR Transitional provisions Disclaimer: CAMD Transition Sub Group FAQ IVDR Transitional provisions The information presented in this document is for the purpose of general information only and is not intended to represent legal advice

More information

ICO submission to the inquiry of the House of Lords Select Committee on Communications - The Internet : To Regulate or not to Regulate?

ICO submission to the inquiry of the House of Lords Select Committee on Communications - The Internet : To Regulate or not to Regulate? Information Commissioner s Office ICO submission to the inquiry of the House of Lords Select Committee on Communications - The Internet : To Regulate or not to Regulate? 16 May 2018 V. 1.0 Final 1 Contents

More information

BOSS PUTS YOU IN CHARGE!

BOSS PUTS YOU IN CHARGE! BOSS PUTS YOU IN CHARGE! Here s some good news if you are doing any of these courses the NHS may be able to PAY your tuition fees AND, if your course started after September 2012, you also get a thousand

More information

HL7 Standards and Components to Support Implementation of the European General Data Protection Regulation (GDPR)

HL7 Standards and Components to Support Implementation of the European General Data Protection Regulation (GDPR) HL7 Standards and Components to Support Implementation of the European General Data Protection Regulation (GDPR) Alexander Mense - University of Applied Sciences Vienna Bernd Blobel - Medical Faculty,

More information

GDPR Implications for ediscovery from a legal and technical point of view

GDPR Implications for ediscovery from a legal and technical point of view GDPR Implications for ediscovery from a legal and technical point of view Friday Paul Lavery, Partner, McCann FitzGerald Ireland Meribeth Banaschik, Partner, Ernst & Young Germany mccannfitzgerald.com

More information

Children s rights in the digital environment: Challenges, tensions and opportunities

Children s rights in the digital environment: Challenges, tensions and opportunities Children s rights in the digital environment: Challenges, tensions and opportunities Presentation to the Conference on the Council of Europe Strategy for the Rights of the Child (2016-2021) Sofia, 6 April

More information

Privacy by Design Assessment and Certification. For discussion purposes only

Privacy by Design Assessment and Certification. For discussion purposes only Privacy by Design Assessment and Certification For discussion purposes only Privacy by Design The Framework Privacy by Design 2 Adoption of Privacy by Design as an International Standard Landmark Resolution

More information

Committee on the Internal Market and Consumer Protection. of the Committee on the Internal Market and Consumer Protection

Committee on the Internal Market and Consumer Protection. of the Committee on the Internal Market and Consumer Protection European Parliament 2014-2019 Committee on the Internal Market and Consumer Protection 2018/2088(INI) 7.12.2018 OPINION of the Committee on the Internal Market and Consumer Protection for the Committee

More information

Comments of the ELECTRONIC PRIVACY INFORMATION CENTER

Comments of the ELECTRONIC PRIVACY INFORMATION CENTER Comments of the ELECTRONIC PRIVACY INFORMATION CENTER INFORMATION COMMISSIONER S OFFICE Consultation on Data Protection Impact Assessments (DPIAs) Guidance April 12, 2018 By notice published on March 22,

More information

DEVON & CORNWALL C O N S T A B U L A R Y

DEVON & CORNWALL C O N S T A B U L A R Y DEVON & CORNWALL C O N S T A B U L A R Y Force Policy & Procedure Guideline EVIDENTIAL DIGITAL IMAGING Reference Number D296 Policy Version Date 17 November 2010 Review Date 01 April 2015 Policy Ownership

More information

First Components Ltd, Savigny Oddie Ltd, & Datum Engineering Ltd. is pleased to provide the following

First Components Ltd, Savigny Oddie Ltd, & Datum Engineering Ltd. is pleased to provide the following Privacy Notice Introduction This document refers to personal data, which is defined as information concerning any living person (a natural person who hereafter will be called the Data Subject) that is

More information

LAW ON TECHNOLOGY TRANSFER 1998

LAW ON TECHNOLOGY TRANSFER 1998 LAW ON TECHNOLOGY TRANSFER 1998 LAW ON TECHNOLOGY TRANSFER May 7, 1998 Ulaanbaatar city CHAPTER ONE COMMON PROVISIONS Article 1. Purpose of the law The purpose of this law is to regulate relationships

More information

How did it come about? What was the motivation to actually put GDPR itself... for that to be the vehicle to do that?

How did it come about? What was the motivation to actually put GDPR itself... for that to be the vehicle to do that? So what is GDPR? Thanks Phil. So that's a great question. GDPR stands for the General Data Protection Regulation, which is a data protection regulation that's established to protect the personal data of

More information