SlideShare una empresa de Scribd logo
1 de 7
INCORPORATING ETHICAL, LEGAL AND SOCIAL CONSIDERATIONS IN THE ITRACK
PROJECT: CONSIDERATIONS GOING FORWARD
Workshop on Ethical, Legal, Social Issues
in
Networked Information Exchange for PPDR
May 2017
www.trilateralresearch.com
TRILATERAL RESEARCH LTD.
• Impact assessments
• Policy & regulatory advice
• Research services
• Technology assessment
• Data Services
• Training
•Government
•Intergovermental organisations
•Humanitarian agencies
•Critical infrastructure
• Social science
• Science & Technology
• Economics
• Legal
• Data analytics
• Privacy & data protection
• Security & surveillance
• Data science
• Crisis & disaster management
Deep
Expertise
Multiple
Disciplines
Core
Services
Key
Sectors
 Trilateral Research Ltd is a leading
London-based research services
company.
 We provide research, risk analysis,
advisory services and technology
solutions related to privacy, data
protection, new and emerging
technologies and policy.
 Trilateral Research’s Crisis
Management Team leads and
contributes to European and
International projects on crisis and
disaster management, across all
phases of the disaster management
cycle.
 Small enterprise (SME) ≈25 staff
members representing 16 different
countries
 Almost all research and technical staff
have postdoctoral experience (≈90%
have PhDs)
 Extensive publication list and excellent
EU funded:
Horizon
2020
12 Partners
from 8 EU
states and
UNWFP
Aim: next
generation
intelligent
tracking
platform
3 years
ITRACK
• In 2000 41 significant attacks on aid workers were recorded
across the globe. By 2014, that number had risen to 190. In
this 15-year period, over 3,000 aid workers have been killed,
injured or kidnapped.
• A novel and innovative approach to tracking and decision-
making is needed. iTRACK will achieve this through an
interdisciplinary, socio-technical approach, which will draw
on the latest advances in sensor development, GIS, security
& privacy, artificial intelligence, information management,
risk analysis, and humanitarian logistics.
• The iTRACK system will be deployed, implemented and
tested in simulations with humanitarian practitioners. Pilot
applications with the World Food Programme and iMMAP in
the on-going conflict disasters in the Middle East.
CASE STUDY
It was 10 am in the morning, when the first iTRACK alert came about new attacks to a small town in the Middle
East. The alert was sent from staff working in a hospital in town. Immediately, other civilian responders
working in
the regions received the report, and were advised to take protective measures. At the same time, a
humanitarian
convoy en route to the hospital was automatically informed and re-routed to the next warehouse with free
capacity.
Using the iTRACK devices, control centres could monitor their exact positioning and movements. The iTRACK
intelligent threat prediction provided real-time updates on safe shelter locations, accessible areas and roads.
Using
the iTRACK navigation feature, the responders were safely directed to those places. Meanwhile, the activated
iTRACK sensing devices on the assets and vehicles in town, combined with satellite imagery allowed for
continuous
updates of the threats and risks. Rather than having to rely on reports from different, and unreliable sources,
unfiltered
social media feeds and updates by the armed actors, the iTRACK system provided trusted and direct data
from the ground. An analysis of threat patterns and the damages occurred were used for a rapid assessment of
APPROACH
 We will carry out an ethical and privacy impact assessment:
 Interviews with technology partners
 Map information flows on the system architecture
 Map out the risk criteria based on a set of ethical/privacy principles
 Hold a stakeholder workshop (understand risks – identify solutions/safeguards – consideration of
viewpoints – dialogue)
 A review and audit of ethical and privacy assessments by an independent third-party will confer
considerable credibility on any reviews undertaken by individual projects.
 Publish findings
KEY QUESTIONS: ETHICS AND DATA PROTECTION & PRIVACY
 Dignity
 Consent
 Avoiding harm
 Safety
 Social solidarity, inclusion and exclusion
 Discrimination and profiling
 Beneficence
 Accessibility
 Sustainability
 Collection limitation
 Data quality
 Use limitation
 Transparency
 Individual participation and access to data
 Anonymity
 Privacy of the person
 Privacy of personal behaviours
CONTACT US
 julia.muraszkiewicz@trilateralresearch.com
 Website: www.trilateralresearch.com
 Twitter: @Trilateral_UK
 E-mail: info@trilateralresearch.com
 Phone: +44 (0)207 559 3550
 Address: Crown House
72 Hammersmith Road
London
United Kingdom

Más contenido relacionado

La actualidad más candente

Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...
Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...
Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...SOCIAM Project
 
Presentation on EU Directives Impacting Cyber Security for Information Securi...
Presentation on EU Directives Impacting Cyber Security for Information Securi...Presentation on EU Directives Impacting Cyber Security for Information Securi...
Presentation on EU Directives Impacting Cyber Security for Information Securi...Brian Honan
 
2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapter2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapterisc2-hellenic
 
Lizette Lancaster - Institute for Security Studies
Lizette Lancaster - Institute for Security StudiesLizette Lancaster - Institute for Security Studies
Lizette Lancaster - Institute for Security StudiesGeneva Declaration
 
2016 02-14 - tlp-white ce2016 presentation
2016 02-14 - tlp-white ce2016 presentation2016 02-14 - tlp-white ce2016 presentation
2016 02-14 - tlp-white ce2016 presentationisc2-hellenic
 

La actualidad más candente (6)

Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...
Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...
Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...
 
In Stedd May2009
In Stedd May2009In Stedd May2009
In Stedd May2009
 
Presentation on EU Directives Impacting Cyber Security for Information Securi...
Presentation on EU Directives Impacting Cyber Security for Information Securi...Presentation on EU Directives Impacting Cyber Security for Information Securi...
Presentation on EU Directives Impacting Cyber Security for Information Securi...
 
2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapter2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapter
 
Lizette Lancaster - Institute for Security Studies
Lizette Lancaster - Institute for Security StudiesLizette Lancaster - Institute for Security Studies
Lizette Lancaster - Institute for Security Studies
 
2016 02-14 - tlp-white ce2016 presentation
2016 02-14 - tlp-white ce2016 presentation2016 02-14 - tlp-white ce2016 presentation
2016 02-14 - tlp-white ce2016 presentation
 

Similar a Workshop on Ethical, Legal, social Issues in Networked Information Exchange for PPDR

Brussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACKBrussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACKTrilateral Research
 
Outline D
Outline DOutline D
Outline Dbutest
 
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...sabrangsabrang
 
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital LandscapeUnveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscapegreendigital
 
Berlin Intl Sec Conf2 Paper
Berlin Intl Sec Conf2 PaperBerlin Intl Sec Conf2 Paper
Berlin Intl Sec Conf2 Papermartindudziak
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationApril Dillard
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyShiva Bissessar
 
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and...
The Malicious Use   of Artificial Intelligence: Forecasting, Prevention,  and...The Malicious Use   of Artificial Intelligence: Forecasting, Prevention,  and...
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and...Willy Marroquin (WillyDevNET)
 
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvExAvoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvExEADTU
 
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...Anna Gomez
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...REVULN
 
Assets protection and The Need for Timely Information
Assets protection and The Need for Timely Information Assets protection and The Need for Timely Information
Assets protection and The Need for Timely Information David Santiago
 
Critical Infrastructure and Cyber Sec in Transportation Sector
Critical Infrastructure and Cyber Sec in Transportation SectorCritical Infrastructure and Cyber Sec in Transportation Sector
Critical Infrastructure and Cyber Sec in Transportation SectorEuropean Services Institute
 
Laypeople's and Experts' Risk Perception of Cloud Computing Services
Laypeople's and Experts' Risk Perception of Cloud Computing Services Laypeople's and Experts' Risk Perception of Cloud Computing Services
Laypeople's and Experts' Risk Perception of Cloud Computing Services neirew J
 
Laypeople’s and experts’ risk perception of
Laypeople’s and experts’ risk perception ofLaypeople’s and experts’ risk perception of
Laypeople’s and experts’ risk perception ofijccsa
 

Similar a Workshop on Ethical, Legal, social Issues in Networked Information Exchange for PPDR (20)

Brussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACKBrussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACK
 
Outline D
Outline DOutline D
Outline D
 
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
 
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUPCYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
 
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital LandscapeUnveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscape
 
Berlin Intl Sec Conf2 Paper
Berlin Intl Sec Conf2 PaperBerlin Intl Sec Conf2 Paper
Berlin Intl Sec Conf2 Paper
 
Uddin
UddinUddin
Uddin
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every Organization
 
Identity Management Policy Seminar
Identity Management Policy SeminarIdentity Management Policy Seminar
Identity Management Policy Seminar
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and...
The Malicious Use   of Artificial Intelligence: Forecasting, Prevention,  and...The Malicious Use   of Artificial Intelligence: Forecasting, Prevention,  and...
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and...
 
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvExAvoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
 
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
 
E2112733
E2112733E2112733
E2112733
 
Research highlights in safety and security
Research highlights in safety and securityResearch highlights in safety and security
Research highlights in safety and security
 
Assets protection and The Need for Timely Information
Assets protection and The Need for Timely Information Assets protection and The Need for Timely Information
Assets protection and The Need for Timely Information
 
Critical Infrastructure and Cyber Sec in Transportation Sector
Critical Infrastructure and Cyber Sec in Transportation SectorCritical Infrastructure and Cyber Sec in Transportation Sector
Critical Infrastructure and Cyber Sec in Transportation Sector
 
Laypeople's and Experts' Risk Perception of Cloud Computing Services
Laypeople's and Experts' Risk Perception of Cloud Computing Services Laypeople's and Experts' Risk Perception of Cloud Computing Services
Laypeople's and Experts' Risk Perception of Cloud Computing Services
 
Laypeople’s and experts’ risk perception of
Laypeople’s and experts’ risk perception ofLaypeople’s and experts’ risk perception of
Laypeople’s and experts’ risk perception of
 

Más de Trilateral Research

Designing Security Across Boundaries: mapping disperse data to collaborative...
Designing Security Across Boundaries:  mapping disperse data to collaborative...Designing Security Across Boundaries:  mapping disperse data to collaborative...
Designing Security Across Boundaries: mapping disperse data to collaborative...Trilateral Research
 
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...Trilateral Research
 
Risky Borders: Designing togetherness using information technology for intero...
Risky Borders: Designing togetherness using information technology for intero...Risky Borders: Designing togetherness using information technology for intero...
Risky Borders: Designing togetherness using information technology for intero...Trilateral Research
 
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...Trilateral Research
 
Privacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES ProjectPrivacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES ProjectTrilateral Research
 
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...Trilateral Research
 
CRISP project: overview of findings and lessons learned.
CRISP project: overview of findings and lessons learned.CRISP project: overview of findings and lessons learned.
CRISP project: overview of findings and lessons learned.Trilateral Research
 
Legal and ethical issues in social capital analysis
Legal and ethical issues in social capital analysis Legal and ethical issues in social capital analysis
Legal and ethical issues in social capital analysis Trilateral Research
 
Examining End-User Standardisation Needs for Disaster Resilience
Examining End-User Standardisation Needs for Disaster ResilienceExamining End-User Standardisation Needs for Disaster Resilience
Examining End-User Standardisation Needs for Disaster ResilienceTrilateral Research
 
A stakeholder based approach to standardisation for disaster resilience
A stakeholder based approach to standardisation for disaster resilienceA stakeholder based approach to standardisation for disaster resilience
A stakeholder based approach to standardisation for disaster resilienceTrilateral Research
 
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforce
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforceEvolving Technology - Delivering Neighbourhood Policing with a smaller workforce
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforceTrilateral Research
 
Social Media and ICT in Neighbourhood Policing - Opportunities and Challanges
Social Media and ICT in Neighbourhood Policing - Opportunities and ChallangesSocial Media and ICT in Neighbourhood Policing - Opportunities and Challanges
Social Media and ICT in Neighbourhood Policing - Opportunities and ChallangesTrilateral Research
 
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction Trilateral Research
 
ENERGIC-OD @ GEO Business 2017 presentation
ENERGIC-OD @ GEO Business 2017 presentationENERGIC-OD @ GEO Business 2017 presentation
ENERGIC-OD @ GEO Business 2017 presentationTrilateral Research
 
Esports in the UK - privacy risks
Esports in the UK - privacy risksEsports in the UK - privacy risks
Esports in the UK - privacy risksTrilateral Research
 
Enhancing ethics assessment in R&I at the national level
Enhancing ethics assessment in R&I at the national levelEnhancing ethics assessment in R&I at the national level
Enhancing ethics assessment in R&I at the national levelTrilateral Research
 
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...Trilateral Research
 
Key Outputs of the E-CRIME project
Key Outputs of the E-CRIME projectKey Outputs of the E-CRIME project
Key Outputs of the E-CRIME projectTrilateral Research
 

Más de Trilateral Research (20)

Star II sme hotline 21.01.20
Star II sme hotline 21.01.20Star II sme hotline 21.01.20
Star II sme hotline 21.01.20
 
Designing Security Across Boundaries: mapping disperse data to collaborative...
Designing Security Across Boundaries:  mapping disperse data to collaborative...Designing Security Across Boundaries:  mapping disperse data to collaborative...
Designing Security Across Boundaries: mapping disperse data to collaborative...
 
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
 
Risky Borders: Designing togetherness using information technology for intero...
Risky Borders: Designing togetherness using information technology for intero...Risky Borders: Designing togetherness using information technology for intero...
Risky Borders: Designing togetherness using information technology for intero...
 
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
 
Privacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES ProjectPrivacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES Project
 
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
 
Overview of CLARITY project
Overview of CLARITY projectOverview of CLARITY project
Overview of CLARITY project
 
CRISP project: overview of findings and lessons learned.
CRISP project: overview of findings and lessons learned.CRISP project: overview of findings and lessons learned.
CRISP project: overview of findings and lessons learned.
 
Legal and ethical issues in social capital analysis
Legal and ethical issues in social capital analysis Legal and ethical issues in social capital analysis
Legal and ethical issues in social capital analysis
 
Examining End-User Standardisation Needs for Disaster Resilience
Examining End-User Standardisation Needs for Disaster ResilienceExamining End-User Standardisation Needs for Disaster Resilience
Examining End-User Standardisation Needs for Disaster Resilience
 
A stakeholder based approach to standardisation for disaster resilience
A stakeholder based approach to standardisation for disaster resilienceA stakeholder based approach to standardisation for disaster resilience
A stakeholder based approach to standardisation for disaster resilience
 
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforce
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforceEvolving Technology - Delivering Neighbourhood Policing with a smaller workforce
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforce
 
Social Media and ICT in Neighbourhood Policing - Opportunities and Challanges
Social Media and ICT in Neighbourhood Policing - Opportunities and ChallangesSocial Media and ICT in Neighbourhood Policing - Opportunities and Challanges
Social Media and ICT in Neighbourhood Policing - Opportunities and Challanges
 
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
 
ENERGIC-OD @ GEO Business 2017 presentation
ENERGIC-OD @ GEO Business 2017 presentationENERGIC-OD @ GEO Business 2017 presentation
ENERGIC-OD @ GEO Business 2017 presentation
 
Esports in the UK - privacy risks
Esports in the UK - privacy risksEsports in the UK - privacy risks
Esports in the UK - privacy risks
 
Enhancing ethics assessment in R&I at the national level
Enhancing ethics assessment in R&I at the national levelEnhancing ethics assessment in R&I at the national level
Enhancing ethics assessment in R&I at the national level
 
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...
 
Key Outputs of the E-CRIME project
Key Outputs of the E-CRIME projectKey Outputs of the E-CRIME project
Key Outputs of the E-CRIME project
 

Último

一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书SS A
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labourBhavikaGholap1
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm2020000445musaib
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书Fs Las
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx2020000445musaib
 
如何办理(Michigan文凭证书)密歇根大学毕业证学位证书
 如何办理(Michigan文凭证书)密歇根大学毕业证学位证书 如何办理(Michigan文凭证书)密歇根大学毕业证学位证书
如何办理(Michigan文凭证书)密歇根大学毕业证学位证书Sir Lt
 
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书Fir L
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptzainabbkhaleeq123
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书Fir L
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionAnuragMishra811030
 
Ricky French: Championing Truth and Change in Midlothian
Ricky French: Championing Truth and Change in MidlothianRicky French: Championing Truth and Change in Midlothian
Ricky French: Championing Truth and Change in MidlothianRicky French
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaNafiaNazim
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书E LSS
 
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in IndiaLegal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in IndiaFinlaw Consultancy Pvt Ltd
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书Fir L
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书Fir L
 
The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...James Watkins, III JD CFP®
 

Último (20)

一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labour
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx
 
如何办理(Michigan文凭证书)密歇根大学毕业证学位证书
 如何办理(Michigan文凭证书)密歇根大学毕业证学位证书 如何办理(Michigan文凭证书)密歇根大学毕业证学位证书
如何办理(Michigan文凭证书)密歇根大学毕业证学位证书
 
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .ppt
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusion
 
Ricky French: Championing Truth and Change in Midlothian
Ricky French: Championing Truth and Change in MidlothianRicky French: Championing Truth and Change in Midlothian
Ricky French: Championing Truth and Change in Midlothian
 
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in India
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书
 
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in IndiaLegal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
 
The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...
 

Workshop on Ethical, Legal, social Issues in Networked Information Exchange for PPDR

  • 1. INCORPORATING ETHICAL, LEGAL AND SOCIAL CONSIDERATIONS IN THE ITRACK PROJECT: CONSIDERATIONS GOING FORWARD Workshop on Ethical, Legal, Social Issues in Networked Information Exchange for PPDR May 2017 www.trilateralresearch.com
  • 2. TRILATERAL RESEARCH LTD. • Impact assessments • Policy & regulatory advice • Research services • Technology assessment • Data Services • Training •Government •Intergovermental organisations •Humanitarian agencies •Critical infrastructure • Social science • Science & Technology • Economics • Legal • Data analytics • Privacy & data protection • Security & surveillance • Data science • Crisis & disaster management Deep Expertise Multiple Disciplines Core Services Key Sectors  Trilateral Research Ltd is a leading London-based research services company.  We provide research, risk analysis, advisory services and technology solutions related to privacy, data protection, new and emerging technologies and policy.  Trilateral Research’s Crisis Management Team leads and contributes to European and International projects on crisis and disaster management, across all phases of the disaster management cycle.  Small enterprise (SME) ≈25 staff members representing 16 different countries  Almost all research and technical staff have postdoctoral experience (≈90% have PhDs)  Extensive publication list and excellent
  • 3. EU funded: Horizon 2020 12 Partners from 8 EU states and UNWFP Aim: next generation intelligent tracking platform 3 years ITRACK • In 2000 41 significant attacks on aid workers were recorded across the globe. By 2014, that number had risen to 190. In this 15-year period, over 3,000 aid workers have been killed, injured or kidnapped. • A novel and innovative approach to tracking and decision- making is needed. iTRACK will achieve this through an interdisciplinary, socio-technical approach, which will draw on the latest advances in sensor development, GIS, security & privacy, artificial intelligence, information management, risk analysis, and humanitarian logistics. • The iTRACK system will be deployed, implemented and tested in simulations with humanitarian practitioners. Pilot applications with the World Food Programme and iMMAP in the on-going conflict disasters in the Middle East.
  • 4. CASE STUDY It was 10 am in the morning, when the first iTRACK alert came about new attacks to a small town in the Middle East. The alert was sent from staff working in a hospital in town. Immediately, other civilian responders working in the regions received the report, and were advised to take protective measures. At the same time, a humanitarian convoy en route to the hospital was automatically informed and re-routed to the next warehouse with free capacity. Using the iTRACK devices, control centres could monitor their exact positioning and movements. The iTRACK intelligent threat prediction provided real-time updates on safe shelter locations, accessible areas and roads. Using the iTRACK navigation feature, the responders were safely directed to those places. Meanwhile, the activated iTRACK sensing devices on the assets and vehicles in town, combined with satellite imagery allowed for continuous updates of the threats and risks. Rather than having to rely on reports from different, and unreliable sources, unfiltered social media feeds and updates by the armed actors, the iTRACK system provided trusted and direct data from the ground. An analysis of threat patterns and the damages occurred were used for a rapid assessment of
  • 5. APPROACH  We will carry out an ethical and privacy impact assessment:  Interviews with technology partners  Map information flows on the system architecture  Map out the risk criteria based on a set of ethical/privacy principles  Hold a stakeholder workshop (understand risks – identify solutions/safeguards – consideration of viewpoints – dialogue)  A review and audit of ethical and privacy assessments by an independent third-party will confer considerable credibility on any reviews undertaken by individual projects.  Publish findings
  • 6. KEY QUESTIONS: ETHICS AND DATA PROTECTION & PRIVACY  Dignity  Consent  Avoiding harm  Safety  Social solidarity, inclusion and exclusion  Discrimination and profiling  Beneficence  Accessibility  Sustainability  Collection limitation  Data quality  Use limitation  Transparency  Individual participation and access to data  Anonymity  Privacy of the person  Privacy of personal behaviours
  • 7. CONTACT US  julia.muraszkiewicz@trilateralresearch.com  Website: www.trilateralresearch.com  Twitter: @Trilateral_UK  E-mail: info@trilateralresearch.com  Phone: +44 (0)207 559 3550  Address: Crown House 72 Hammersmith Road London United Kingdom

Notas del editor

  1. Impact Assessment (IA) is a field of analytical activity aiming to identify the future consequences of current or proposed actions through impact prediction or forecasting and to assess the environmental and societal significance of those impacts. What is the technology doing? will look to standards such as ISO 29100:2011 (as we deem them to be best practice in a global context), In workshop we will go back to the information flows (see if the technology has progressed / changed) and with stakeholders carry out a risk assessment to understand what risks may eminate from technology and what solutions and safeguards we can put in place…...we will have a variety of stakeholders : In a project like iTrack there is an array of stakeholders (data subjects, technology companies, humanitarian organisations, EU, political actors, EU, etc.)
  2. 1. E.g., Does the technology compromise or violate human dignity (Dignity means that citizens should be enabled to live in dignity and security and be free of exploitation and physical or mental abuse)? For example, in the instance of person tracking devices, can aid workers decline to wear it or, if not, what measures can be put in place to minimise or avoid comprising their dignity? 2. E.g., is consent given freely and recorded, after that person is informed of the nature, significance, implications and risks of using the technology 3. E.g. Isolation and substitution of human contact: If we are gating all information from sensors: Is there a risk that a technology or service may lead to greater social isolation of individuals? If so, what measures could be adopted to avoid that? 4. E.g., Does the new technology or service or application expect a certain level of knowledge of computers and the Internet that some people may not have 5. E.g., Is the project, technology or service economically or socially sustainable? AND Should a service provided by means of a research project continue once the research funding comes to an end? 1. How will the project determine what constitutes the minimum amount of personal data to be collected? and Who will determine what constitutes the minimum amount of personal data to be collected? 2. Is the personal information used for the purposes given for its collection, and do the data stay with the original collector, or do they migrate elsewhere? 3. Has the project taken steps to ensure that persons cannot be identified from the data to be collected? 4. iTRACK can interfere with bodily privacy thus we will need to consider less privacy-instrusive measures, informing data subjects, etc. 5. Relates to sensitive matters, such as sexual preferences and habits, political activities and religious practices - iTRACK again will be able to collect data on that so we will need to ask questions suich as What measures will be put in place to avoid abuses