SlideShare una empresa de Scribd logo
1 de 22
Descargar para leer sin conexión
Finding Balance in the Age of Open
   Data: Some Policy and Legal
         Considerations
Rishi Maharaj
Information Access and Privacy Professional
“Information is the Oxygen of democracy. If
People do not know what is happening in their
society, if the actions of those who rule them
are hidden, then they cannot take a meaningful
part in the affairs of that society”

http://www.article19.org/pdfs/standards/righttoknow.pdf




                                                          2
Open Data and Open Government

Open Data therefore enshrines the concept
that neither the government of the day nor
civil servants create data for their benefit, but
for the benefit of the public. Data is generated
with public money, as such, it cannot be
unreasonably kept from citizens.
Image credit: http://bit.ly/ux2dNb/
Access to Information


‘the right to information lays the foundation
 upon which to build good governance and
 transparency…. It is the key to moving from
 formal to consultative and responsive
 democracy’

                Commonwealth Human Rights Initiative
The Open Data Challenge




Citizenry                  Bureaucracy
What Bodies are covered by the Act?
Public Authority

a.If it exercises any function on behalf of the state
b.if it was established by virtue of the President, by a Minister of
  Government in his capacity or by another public authority
c.an organization that is supported directly or indirectly by
  Government funds and over which Government is in a position
  to exercise control



                    State owned                             Regional
  Parliament                           Ministries ,THA
                     enterprise                            Authorities
    Courts
                                                             Courts
What information can be released?
Benefits of Access to Information
                                 Legislation
                             Transparency and Accountability




                                                                     Fosters economic
Promote democratic
                                                                       development
    governance
                                  Exposes corruption




              Improves service                         Supports participatory
                  delivery                                 development
Information not accessible via Access
          to Information Legislation

 International
   Relations
                                                               Documents
                                          Trade secrets       affecting the
                                           documents          economy and
                                                            commercial affairs
                      Defense and
Law Enforcement
                   Security documents

                                        Material obtained     Where secrecy
                                         in confidence       provisions apply
  Documents
 affecting legal    Internal Working
  proceedings
Public Interest
• Notwithstanding any law to the contrary a public authority shall give
  access to an exempt document where there is reasonable evidence
  that significant:

    – Abuse of authority of neglect in the performance of official duty;
      or
    – Injustice to an individual; or
    – Danger to the health or safety of an individual or of the public; or
    – Unauthorised use of public funds

has or is likely to have occurred or in the circumstances giving access to
the document is justified in the public interest having regard both to
any benefit and to any damage that may arise from doing so.
Public Interest
• An important thing to note about this test is that it
  has a presumption in favour of disclosure.

• The burden is on the public authority to show that
  the public interest in withholding the information is
  greater then the public interest in disclosure.
Privacy Protection

“Personal data is the new oil of the Internet
and the new currency of the digital world.”



Meglena Kuneva, European
Consumer Commissioner,
March 2009
Information Privacy Defined


• Information Privacy: Data Protection
  – Freedom of choice; personal control;
    informational self-determination;
  – Control over the collection, use and disclosure of
    any recorded information about an identifiable
    individual;
  – Privacy principles as embodied in “General Privacy
    Principles”
  – Global Privacy Standard (2006).
Why is the Protection of Personal
                           Information necessary?

• Privacy has long been understood to have a value
  in a civil society that respects inherent rights &
  values of mankind
• T&T Constitution enshrines the right to privacy
• Universal Declaration of Human Rights states that
  privacy is a fundamental human right
• Privacy is an important element in the control of
  electronic activities such as unsolicited marketing
  & spam
                                                    15
Privacy Protection
• We are currently confronting the rise of what I refer to
  as “digital dossiers”…. As businesses and the
  government increasingly share personal information,
  digital dossiers about nearly every individual are being
  assembled. This raises serious concerns. The
  information gathered about us has become quite
  extensive, and it is being used in ways that profoundly
  affect our lives. Yet, we know little about how our
  personal information is being used, and we lack the
  power to do much about it.”

(Solove, 2010, p. 1)
Privacy Protection

Different type of Data

• Personal data: information that is or can be
  linked directly or indirectly to some person.

• Statistical data: data without any personal
  information.
Privacy Protection
Challenge
• The need to protect against disclosure of
  personal information in confidential data (and
  against discovery of personal information from
  statistical data by matching techniques).
                     vs.
• The need to provide access to microdata for
  research.
Data Sharing & Data Matching

Government is subject to specific responsibilities re data
sharing and data matching that recognizes the
importance of Government as a primary holder of info
about individuals

Where a Public Body intends to share and or match info
with other Public Body, it shall do so only pursuant to an
agreement in a manner prescribed by the Information
Commissioner


                                                        19
Access by Design

7 basic principles
1. Be Proactive not Reactive
2. Access embedded into design
3. Openness and Transparency = Accountability
4. Fosters Collaboration
5. Enhances efficient government Collaboration
6. Makes Access truly Accessibility
7. Increases Quality of Information

      Source: http://www.ipc.on.ca/images/Resources/accessbydesign_7fundamentalprinciples.pdf
Privacy by Design
7 basic principles
  1.   Be Proactive not Reactive
  2.   Privacy as the Default
  3.   Privacy Embedded into Design
  4.   Positive – Sum not Zero-Sum
  5.   End to End Security (Life Cycle Protection)
  6.   Visibility and Transparency
  7.   Respect for User Privacy
       Source: http://www.ipc.on.ca/images/Resources/7foundationalprinciples.pdf
THANK YOU

Más contenido relacionado

La actualidad más candente

Privacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminarPrivacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminar
Lance Michalson
 
ICEGOV - Tutorial 1 - Information Policy Concepts and Principles
ICEGOV - Tutorial 1 - Information Policy Concepts and PrinciplesICEGOV - Tutorial 1 - Information Policy Concepts and Principles
ICEGOV - Tutorial 1 - Information Policy Concepts and Principles
ICEGOV
 
Information policy sunil sir
Information policy sunil sirInformation policy sunil sir
Information policy sunil sir
bgshalini
 

La actualidad más candente (20)

Privacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminarPrivacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminar
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
 
Mobile privacy in Zambia
Mobile privacy in ZambiaMobile privacy in Zambia
Mobile privacy in Zambia
 
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
 
Human identity inforg
Human identity   inforgHuman identity   inforg
Human identity inforg
 
ICEGOV - Tutorial 1 - Information Policy Concepts and Principles
ICEGOV - Tutorial 1 - Information Policy Concepts and PrinciplesICEGOV - Tutorial 1 - Information Policy Concepts and Principles
ICEGOV - Tutorial 1 - Information Policy Concepts and Principles
 
Information policy sunil sir
Information policy sunil sirInformation policy sunil sir
Information policy sunil sir
 
So You Want to Protect Privacy: Now What?
So You Want to Protect Privacy: Now What?So You Want to Protect Privacy: Now What?
So You Want to Protect Privacy: Now What?
 
2012 OCT knowledge banking
2012 OCT knowledge banking2012 OCT knowledge banking
2012 OCT knowledge banking
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
Introduction to Information Policy
Introduction to Information PolicyIntroduction to Information Policy
Introduction to Information Policy
 
Alfredo Mendez - Mexico - personal data protection and transparency
Alfredo Mendez - Mexico - personal data protection and transparencyAlfredo Mendez - Mexico - personal data protection and transparency
Alfredo Mendez - Mexico - personal data protection and transparency
 
Democratizing the web
Democratizing the webDemocratizing the web
Democratizing the web
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information Security
 
State of the Internet
State of the InternetState of the Internet
State of the Internet
 

Destacado (10)

Trinidad opensourcedeck(final)
Trinidad opensourcedeck(final)Trinidad opensourcedeck(final)
Trinidad opensourcedeck(final)
 
Opportunities for open spatial data
Opportunities for open spatial dataOpportunities for open spatial data
Opportunities for open spatial data
 
Dclement uwiopendata
Dclement uwiopendataDclement uwiopendata
Dclement uwiopendata
 
Mgmt 2010 15%
Mgmt 2010 15%Mgmt 2010 15%
Mgmt 2010 15%
 
Pendahuluan
PendahuluanPendahuluan
Pendahuluan
 
Statistics and open data
Statistics and open dataStatistics and open data
Statistics and open data
 
Statistics and open data2
Statistics and open data2Statistics and open data2
Statistics and open data2
 
"How To Lie With Statistics" Chapter 10
"How To Lie With Statistics" Chapter 10"How To Lie With Statistics" Chapter 10
"How To Lie With Statistics" Chapter 10
 
Open standards and open data
Open standards and open dataOpen standards and open data
Open standards and open data
 
Foia DP Presentation
Foia DP PresentationFoia DP Presentation
Foia DP Presentation
 

Similar a Finding balance in the age of open data

How should the government balance the tensions between privacy and national s...
How should the government balance the tensions between privacy and national s...How should the government balance the tensions between privacy and national s...
How should the government balance the tensions between privacy and national s...
intel-writers.com
 
Rti resoucebook for cs os workers & media
Rti resoucebook for cs os workers & mediaRti resoucebook for cs os workers & media
Rti resoucebook for cs os workers & media
Mohammad Ismail
 
Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaInvasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian Media
Kelly Ratkovic
 
The Promotion of Access to Information Act for South African Journalists
The Promotion of Access to Information Act for South African JournalistsThe Promotion of Access to Information Act for South African Journalists
The Promotion of Access to Information Act for South African Journalists
Gabriella Razzano
 
Role of right to information act 2005 in the human development
Role of right to information act 2005 in the human developmentRole of right to information act 2005 in the human development
Role of right to information act 2005 in the human development
Alexander Decker
 
PRJ.1578-Omidyar-Network-Digital-Identity-Issue-Analysis-Executive-Summary-v1...
PRJ.1578-Omidyar-Network-Digital-Identity-Issue-Analysis-Executive-Summary-v1...PRJ.1578-Omidyar-Network-Digital-Identity-Issue-Analysis-Executive-Summary-v1...
PRJ.1578-Omidyar-Network-Digital-Identity-Issue-Analysis-Executive-Summary-v1...
Nick Norman
 
India right to information act
India right to information actIndia right to information act
India right to information act
icgfmconference
 

Similar a Finding balance in the age of open data (20)

Future of Privacy - The Emerging View 11 06 15
Future of Privacy - The Emerging View 11 06 15 Future of Privacy - The Emerging View 11 06 15
Future of Privacy - The Emerging View 11 06 15
 
How should the government balance the tensions between privacy and national s...
How should the government balance the tensions between privacy and national s...How should the government balance the tensions between privacy and national s...
How should the government balance the tensions between privacy and national s...
 
Rti resoucebook for cs os workers & media
Rti resoucebook for cs os workers & mediaRti resoucebook for cs os workers & media
Rti resoucebook for cs os workers & media
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
 
Future of privacy - Insights from Discussions Building on an Initial Perspect...
Future of privacy - Insights from Discussions Building on an Initial Perspect...Future of privacy - Insights from Discussions Building on an Initial Perspect...
Future of privacy - Insights from Discussions Building on an Initial Perspect...
 
Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaInvasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian Media
 
20eumt047_ipr.pptx
20eumt047_ipr.pptx20eumt047_ipr.pptx
20eumt047_ipr.pptx
 
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
 
The Promotion of Access to Information Act for South African Journalists
The Promotion of Access to Information Act for South African JournalistsThe Promotion of Access to Information Act for South African Journalists
The Promotion of Access to Information Act for South African Journalists
 
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptxOVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
 
Data Protection in India
Data Protection in IndiaData Protection in India
Data Protection in India
 
Future of value of data singapore.compressed
Future of value of data   singapore.compressedFuture of value of data   singapore.compressed
Future of value of data singapore.compressed
 
11.0006www.iiste.org call for paper.[41-47]role of right to information act 2...
11.0006www.iiste.org call for paper.[41-47]role of right to information act 2...11.0006www.iiste.org call for paper.[41-47]role of right to information act 2...
11.0006www.iiste.org call for paper.[41-47]role of right to information act 2...
 
Role of right to information act 2005 in the human development
Role of right to information act 2005 in the human developmentRole of right to information act 2005 in the human development
Role of right to information act 2005 in the human development
 
The Medicare Bill
The Medicare BillThe Medicare Bill
The Medicare Bill
 
PRJ.1578-Omidyar-Network-Digital-Identity-Issue-Analysis-Executive-Summary-v1...
PRJ.1578-Omidyar-Network-Digital-Identity-Issue-Analysis-Executive-Summary-v1...PRJ.1578-Omidyar-Network-Digital-Identity-Issue-Analysis-Executive-Summary-v1...
PRJ.1578-Omidyar-Network-Digital-Identity-Issue-Analysis-Executive-Summary-v1...
 
India right to information act
India right to information actIndia right to information act
India right to information act
 
Age Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAge Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data Use
 
Introduction to the Freedom of Information and Data Protection Act Trinidad a...
Introduction to the Freedom of Information and Data Protection Act Trinidad a...Introduction to the Freedom of Information and Data Protection Act Trinidad a...
Introduction to the Freedom of Information and Data Protection Act Trinidad a...
 
J0372053055
J0372053055J0372053055
J0372053055
 

Último

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 

Finding balance in the age of open data

  • 1. Finding Balance in the Age of Open Data: Some Policy and Legal Considerations Rishi Maharaj Information Access and Privacy Professional
  • 2. “Information is the Oxygen of democracy. If People do not know what is happening in their society, if the actions of those who rule them are hidden, then they cannot take a meaningful part in the affairs of that society” http://www.article19.org/pdfs/standards/righttoknow.pdf 2
  • 3. Open Data and Open Government Open Data therefore enshrines the concept that neither the government of the day nor civil servants create data for their benefit, but for the benefit of the public. Data is generated with public money, as such, it cannot be unreasonably kept from citizens.
  • 5. Access to Information ‘the right to information lays the foundation upon which to build good governance and transparency…. It is the key to moving from formal to consultative and responsive democracy’ Commonwealth Human Rights Initiative
  • 6. The Open Data Challenge Citizenry Bureaucracy
  • 7. What Bodies are covered by the Act? Public Authority a.If it exercises any function on behalf of the state b.if it was established by virtue of the President, by a Minister of Government in his capacity or by another public authority c.an organization that is supported directly or indirectly by Government funds and over which Government is in a position to exercise control State owned Regional Parliament Ministries ,THA enterprise Authorities Courts Courts
  • 8. What information can be released?
  • 9. Benefits of Access to Information Legislation Transparency and Accountability Fosters economic Promote democratic development governance Exposes corruption Improves service Supports participatory delivery development
  • 10. Information not accessible via Access to Information Legislation International Relations Documents Trade secrets affecting the documents economy and commercial affairs Defense and Law Enforcement Security documents Material obtained Where secrecy in confidence provisions apply Documents affecting legal Internal Working proceedings
  • 11. Public Interest • Notwithstanding any law to the contrary a public authority shall give access to an exempt document where there is reasonable evidence that significant: – Abuse of authority of neglect in the performance of official duty; or – Injustice to an individual; or – Danger to the health or safety of an individual or of the public; or – Unauthorised use of public funds has or is likely to have occurred or in the circumstances giving access to the document is justified in the public interest having regard both to any benefit and to any damage that may arise from doing so.
  • 12. Public Interest • An important thing to note about this test is that it has a presumption in favour of disclosure. • The burden is on the public authority to show that the public interest in withholding the information is greater then the public interest in disclosure.
  • 13. Privacy Protection “Personal data is the new oil of the Internet and the new currency of the digital world.” Meglena Kuneva, European Consumer Commissioner, March 2009
  • 14. Information Privacy Defined • Information Privacy: Data Protection – Freedom of choice; personal control; informational self-determination; – Control over the collection, use and disclosure of any recorded information about an identifiable individual; – Privacy principles as embodied in “General Privacy Principles” – Global Privacy Standard (2006).
  • 15. Why is the Protection of Personal Information necessary? • Privacy has long been understood to have a value in a civil society that respects inherent rights & values of mankind • T&T Constitution enshrines the right to privacy • Universal Declaration of Human Rights states that privacy is a fundamental human right • Privacy is an important element in the control of electronic activities such as unsolicited marketing & spam 15
  • 16. Privacy Protection • We are currently confronting the rise of what I refer to as “digital dossiers”…. As businesses and the government increasingly share personal information, digital dossiers about nearly every individual are being assembled. This raises serious concerns. The information gathered about us has become quite extensive, and it is being used in ways that profoundly affect our lives. Yet, we know little about how our personal information is being used, and we lack the power to do much about it.” (Solove, 2010, p. 1)
  • 17. Privacy Protection Different type of Data • Personal data: information that is or can be linked directly or indirectly to some person. • Statistical data: data without any personal information.
  • 18. Privacy Protection Challenge • The need to protect against disclosure of personal information in confidential data (and against discovery of personal information from statistical data by matching techniques). vs. • The need to provide access to microdata for research.
  • 19. Data Sharing & Data Matching Government is subject to specific responsibilities re data sharing and data matching that recognizes the importance of Government as a primary holder of info about individuals Where a Public Body intends to share and or match info with other Public Body, it shall do so only pursuant to an agreement in a manner prescribed by the Information Commissioner 19
  • 20. Access by Design 7 basic principles 1. Be Proactive not Reactive 2. Access embedded into design 3. Openness and Transparency = Accountability 4. Fosters Collaboration 5. Enhances efficient government Collaboration 6. Makes Access truly Accessibility 7. Increases Quality of Information Source: http://www.ipc.on.ca/images/Resources/accessbydesign_7fundamentalprinciples.pdf
  • 21. Privacy by Design 7 basic principles 1. Be Proactive not Reactive 2. Privacy as the Default 3. Privacy Embedded into Design 4. Positive – Sum not Zero-Sum 5. End to End Security (Life Cycle Protection) 6. Visibility and Transparency 7. Respect for User Privacy Source: http://www.ipc.on.ca/images/Resources/7foundationalprinciples.pdf