SlideShare una empresa de Scribd logo
1 de 12
Descargar para leer sin conexión
ICO Data Protection Officer Conference
                                          March 2010
                                               Salford




       A Privacy and Technology Outlook




Robin Wilton

Director, Future Identity Ltd
Director of Privacy and Public Policy, Kantara Initiative   Future identity
Do any of these strike a chord?


                    “You have zero
                   privacy anyway.               “If you have something that you
                    Get over it” (45)             don't want anyone to know,
                                                 maybe you shouldn't be doing it
          “Privacy                                   in the first place” (56)
        is no longer
     a social norm” (25)


                                                                                   “People forgive
                                                                                     and forget;
                                                                                   computers can't
                                                                                      do either”




[Voiceover: It will be a strange day indeed when the definitive
arbiter of social privacy norms is a single white 25-year-old
male billionaire college drop-out...]

                                                                                      Future identity
“Ladders, Onions, and Surfing Naked...”

   Topics for this session:

       ●   How are identity and privacy related?
       ●   What is privacy anyway, and why is it important?
       ●   Is privacy just a matter of protecting PII?
       ●   What future challenges does online privacy present?



   This presentation draws on the input of many people, including:

       ●   The Liberty Alliance Privacy Summit participants
       ●   Bob Blakley and Ian Glazer of Burton Group
       ●   Dr Mireille Hildebrandt, Vrije Universiteit Brussel

                 My sincere thanks to all of them

                                                                 Future identity
How are identity and privacy related?
(The 'Onion' Model)
                                      ● The BIS (Basic Identifier Set) is what
                                        usually suffices to provide 'proof of
                                        uniqueness'
                                      ● Credentials usually encapsulate data

                                        from multiple 'rings' of the onion
                                      ● One 'good practice' approach is for
         B.I.S
                                        credentials to 'gravitate' towards the
                                        centre – i.e. not be overloaded with
       “Other PII”                      attribute data, but provide:
                                            ● the means to link to it;

      Attributes                            ● proof of uniqueness.




Credentials are not privacy-neutral
● e.g. Using a driver's license to prove your age reveals more than your age;

● By their nature, credentials tend to make transactions 'linkable';

● Privacy-enhancing systems will (must) be better at attribute-level

disclosures, or better still, “Yes/No” answers to attribute-level questions.
     (cf. Dave Birch's paper on the "Psychic ID" metaphor)
     http://www.springerlink.com/content/hk1p8r133867x402/fulltext.pdf
                                                                 Future identity
Slicing the Onion



                    ●   A 'segment' of the onion may correspond
                        to sector-specific data (healthcare, tax,
                        employment...).
                    ●   Some sectors are 'informal' – such as the
                        separation between your Flickr and
      B.I.S             MySpace accounts.
                    ●   Others, you might prefer to keep strictly
    “Other PII”         separate – such as online banking.
    Attributes      ●   One way to look at privacy is as the
                        preservation of “contextual integrity”
                        between sectoral data sets (Helen
                        Nissenbaum, via Piotr Cofta of BT)

                    We become uneasy if our personal data
                    shows up 'out of context'...

                                                     Future identity
What risks does this model suggest?

                  ●   Privacy is not a 'state': it's a relationship,
                      often involving multiple parties. And like
                      any relationship:
                  ●   Privacy brings interests and motivations
                      into conflict:
                  ●   What we tell different people often
                      depends on context;
                  ●   There are rules – mostly implicit:
                  ●   When third parties exchange data about
                      you, is that co-operation or collusion?
      B.I.S       ●   Like any relationship, without maintenance
                      and management it may go awry.
    “Other PII”
    Attributes        Intuitively we know all these things,
                      because humans are social animals...

                         and yet ...
                                                     Future identity
Beyond the Onion: the DAO of privacy...

                    Increasingly, third parties interact with
                    you based on data at the edge of the
                    Onion and beyond...
    D.A.O.               −    Data About You: with enough of
                             your attributes, and/or linkability,
                             you can be identified even if
                             you're not asked for credentials;
   D.A.P.L.Y.            −    Data About People Like You: if
                             you can be categorised, third
                             parties will apply inferences from
    D.A.Y.                   other 'group' characteristics;
                         −    Data About Others: mass data
                             mining makes third party
                             intervention viable without you
                             disclosing any PII.


                    “You don't have to be in the statistics to
                    be affected by the statistics”
                      (Jason Pridmore)
                                                Future identity
Flawed Perceptions
 ●   The online world neither works nor behaves like the real world;
           despite occasional appearances to the contrary...
 ●   The online world often presents us with metaphors, but not ones
     which would help us overcome these differences.
 ●   We therefore frequently – and willingly - base our behaviour on a
     flawed perception of risks and the reality which gives rise to
     them.




  In other words, we could be surfing naked and not even know it. Brrr.
                                                              Future identity
Getting the Privacy 'Big Picture'
 ●   “Privacy management” implies being aware of relationships and
     contexts, and acting accordingly;
 ●   It means taking diverse, legitimate stakeholder perspectives into
     account;
 ●   It needs a new set of metaphors, which help build a privacy-
     enhancing culture: 'protocol rules' are not the same as 'social rules';
 ●   It will involve privacy-enhancing technologies, but those are doomed
     without a privacy-enhancing ecosystem of governance, adoption and
     behaviours which, largely, remain to be developed;
 ●   So: what are some of the challenges, if online privacy is to have a
     future?




              Privacy is not about secrecy: it's about disclosure...
                    but disclosure with consent and control
                           appropriate to the context.                 Future identity
Challenges
  Managing meta-data:
   −   Implied by most governance regimes - strongly indicated for
       good practice;
   −   Sticky policy: preserving privacy preferences “beyond first
       disclosure”
   −   Managing revocation as well as disclosure.

  Finding workable metaphors for online privacy concepts:
   −   Personas, contextual integrity;
   −   Informed consent in social networks.

  Managing attribute-level assertions:
      If credentials are “minimalist”, attribute management becomes
       critical;
      “Yes/No” answers need to be built in from early on;
      How to address the “DAO” problem:
      “You don't have to be in the statistics to be affected by the
       statistics” (Pridmore).
                                                             Future identity
Practical next steps

  Talk to the stakeholders, and reflect their perspectives and their
  needs in the 'ecosystem':
      There are tried and tested models for productive multi-
      stakeholder conversations.

  Several relevant projects taking principles to practicalities:
      PrimeLife (EU): whole-life privacy/identity management;
      VOME and EnCoRe (UK): privacy perception, consent,
      revocation;
      The Kantara Initiative (w/w) has work-groups on:
        ●  User-managed access to personal data
         ● Information-sharing and user preferences

         ● Privacy and public policy

         ● Identity assurance


   ... and would welcome your projects and participation

                     http://kantarainitiative.org

                                                              Future identity
ICO Data Protection Officer Conference
                                            March 2010
                                                 Salford




              Thank you...
                                         ... any questions?



Robin Wilton
Director, Future Identity Ltd
Director of Privacy and Public Policy, Kantara Initiative


mail@futureidentity.eu
+44 (0)705 005 2931

http://futureidentity.eu
http://futureidentity.blogspot.com                          Future identity

Más contenido relacionado

La actualidad más candente

Extreme Information - 8 Charts That Tell You Everything You Need to Know
Extreme Information - 8 Charts That Tell You Everything You Need to KnowExtreme Information - 8 Charts That Tell You Everything You Need to Know
Extreme Information - 8 Charts That Tell You Everything You Need to KnowJohn Mancini
 
Engineering Authority
Engineering AuthorityEngineering Authority
Engineering AuthoritySteve Waldman
 
Newrulesforlivinginadigitalage 101101063746-phpapp01
Newrulesforlivinginadigitalage 101101063746-phpapp01Newrulesforlivinginadigitalage 101101063746-phpapp01
Newrulesforlivinginadigitalage 101101063746-phpapp01Lokinos
 
Who and how am I online
Who and how am I onlineWho and how am I online
Who and how am I onlineJISC SSBR
 
Cookies and Data Protection - a Practitioner's perspective
Cookies and Data Protection - a Practitioner's perspectiveCookies and Data Protection - a Practitioner's perspective
Cookies and Data Protection - a Practitioner's perspectiveCastlebridge Associates
 
MindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no coverMindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no coverPJStarr
 
Trust Factory Slides (2015)
Trust Factory Slides (2015)Trust Factory Slides (2015)
Trust Factory Slides (2015)Timothy Holborn
 
Feb 2020 - Senate Submission Financial Technology and Regulatory Technology
Feb 2020 - Senate Submission Financial Technology and Regulatory TechnologyFeb 2020 - Senate Submission Financial Technology and Regulatory Technology
Feb 2020 - Senate Submission Financial Technology and Regulatory TechnologyTimothy Holborn
 
SSI Meetup – interpersonal data, identity and collective minds
SSI Meetup – interpersonal data, identity and collective mindsSSI Meetup – interpersonal data, identity and collective minds
SSI Meetup – interpersonal data, identity and collective mindsPhilip Sheldrake
 
Personal identity Management
Personal identity ManagementPersonal identity Management
Personal identity ManagementGeorge Roberts
 

La actualidad más candente (10)

Extreme Information - 8 Charts That Tell You Everything You Need to Know
Extreme Information - 8 Charts That Tell You Everything You Need to KnowExtreme Information - 8 Charts That Tell You Everything You Need to Know
Extreme Information - 8 Charts That Tell You Everything You Need to Know
 
Engineering Authority
Engineering AuthorityEngineering Authority
Engineering Authority
 
Newrulesforlivinginadigitalage 101101063746-phpapp01
Newrulesforlivinginadigitalage 101101063746-phpapp01Newrulesforlivinginadigitalage 101101063746-phpapp01
Newrulesforlivinginadigitalage 101101063746-phpapp01
 
Who and how am I online
Who and how am I onlineWho and how am I online
Who and how am I online
 
Cookies and Data Protection - a Practitioner's perspective
Cookies and Data Protection - a Practitioner's perspectiveCookies and Data Protection - a Practitioner's perspective
Cookies and Data Protection - a Practitioner's perspective
 
MindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no coverMindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no cover
 
Trust Factory Slides (2015)
Trust Factory Slides (2015)Trust Factory Slides (2015)
Trust Factory Slides (2015)
 
Feb 2020 - Senate Submission Financial Technology and Regulatory Technology
Feb 2020 - Senate Submission Financial Technology and Regulatory TechnologyFeb 2020 - Senate Submission Financial Technology and Regulatory Technology
Feb 2020 - Senate Submission Financial Technology and Regulatory Technology
 
SSI Meetup – interpersonal data, identity and collective minds
SSI Meetup – interpersonal data, identity and collective mindsSSI Meetup – interpersonal data, identity and collective minds
SSI Meetup – interpersonal data, identity and collective minds
 
Personal identity Management
Personal identity ManagementPersonal identity Management
Personal identity Management
 

Destacado

Security & Privacy of Information Technology
Security & Privacy of Information TechnologySecurity & Privacy of Information Technology
Security & Privacy of Information TechnologyAshish Mathew
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Jordan Peacock
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 

Destacado (6)

Security & Privacy of Information Technology
Security & Privacy of Information TechnologySecurity & Privacy of Information Technology
Security & Privacy of Information Technology
 
Privacy, Emerging Technology, and Information Professionals
Privacy, Emerging Technology, and Information ProfessionalsPrivacy, Emerging Technology, and Information Professionals
Privacy, Emerging Technology, and Information Professionals
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Information privacy
Information privacyInformation privacy
Information privacy
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 

Similar a ICO Data Protection Officer Conference Privacy Technology Outlook

Piecing Together Your Personal Privacy Profile (CPV 2021)
Piecing Together Your Personal Privacy Profile (CPV 2021)Piecing Together Your Personal Privacy Profile (CPV 2021)
Piecing Together Your Personal Privacy Profile (CPV 2021)Margaret Fero
 
Business considerations for privacy and open data: how not to get caught out
Business considerations for privacy and open data: how not to get caught outBusiness considerations for privacy and open data: how not to get caught out
Business considerations for privacy and open data: how not to get caught outtheODI
 
Digital Privacy Revisited
Digital Privacy RevisitedDigital Privacy Revisited
Digital Privacy RevisitedFing
 
How fluently do you speak data
How fluently do you speak dataHow fluently do you speak data
How fluently do you speak dataMary Aviles
 
Itri icl 0116_distribute
Itri icl 0116_distributeItri icl 0116_distribute
Itri icl 0116_distributeFuming Shih
 
01 Introduction atala prism.pdf
01 Introduction atala prism.pdf01 Introduction atala prism.pdf
01 Introduction atala prism.pdfDuongNguyenNgoc10
 
Module 5 - Legislation - Online
Module 5 - Legislation - OnlineModule 5 - Legislation - Online
Module 5 - Legislation - Onlinecaniceconsulting
 
Employee Monitoring DiscussionKindly discuss in 100 words wh
Employee Monitoring DiscussionKindly discuss in 100 words whEmployee Monitoring DiscussionKindly discuss in 100 words wh
Employee Monitoring DiscussionKindly discuss in 100 words whTanaMaeskm
 
Joanna Drake, Global SVP, Technology Services Group - Wood Mackenzie
Joanna Drake, Global SVP, Technology Services Group - Wood MackenzieJoanna Drake, Global SVP, Technology Services Group - Wood Mackenzie
Joanna Drake, Global SVP, Technology Services Group - Wood MackenzieGlobal Business Intelligence
 
Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021andygustafson
 
Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)
Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)
Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)Davide Ceolin
 
Epistemic Responsibility in the IT Society
Epistemic Responsibility in the IT SocietyEpistemic Responsibility in the IT Society
Epistemic Responsibility in the IT SocietyPeerEvaluation
 
The other world of it
The other world of itThe other world of it
The other world of itFing
 
IAC21: Shedding Light on Dark Patterns.pdf
IAC21: Shedding Light on Dark Patterns.pdfIAC21: Shedding Light on Dark Patterns.pdf
IAC21: Shedding Light on Dark Patterns.pdfNoreen Whysel
 
Privacy and data protection primer - City of Portland
Privacy and data protection primer - City of PortlandPrivacy and data protection primer - City of Portland
Privacy and data protection primer - City of PortlandHector Dominguez
 
The future of digital identity 2019 future agenda
The future of digital identity 2019   future agendaThe future of digital identity 2019   future agenda
The future of digital identity 2019 future agendaFuture Agenda
 

Similar a ICO Data Protection Officer Conference Privacy Technology Outlook (20)

Piecing Together Your Personal Privacy Profile (CPV 2021)
Piecing Together Your Personal Privacy Profile (CPV 2021)Piecing Together Your Personal Privacy Profile (CPV 2021)
Piecing Together Your Personal Privacy Profile (CPV 2021)
 
Business considerations for privacy and open data: how not to get caught out
Business considerations for privacy and open data: how not to get caught outBusiness considerations for privacy and open data: how not to get caught out
Business considerations for privacy and open data: how not to get caught out
 
Digital Privacy Revisited
Digital Privacy RevisitedDigital Privacy Revisited
Digital Privacy Revisited
 
How fluently do you speak data
How fluently do you speak dataHow fluently do you speak data
How fluently do you speak data
 
Algorithms and Fundamental Rights - Jeroen van den Hoven
Algorithms and Fundamental Rights - Jeroen van den HovenAlgorithms and Fundamental Rights - Jeroen van den Hoven
Algorithms and Fundamental Rights - Jeroen van den Hoven
 
Itri icl 0116_distribute
Itri icl 0116_distributeItri icl 0116_distribute
Itri icl 0116_distribute
 
01 Introduction atala prism.pdf
01 Introduction atala prism.pdf01 Introduction atala prism.pdf
01 Introduction atala prism.pdf
 
Module 5 - Legislation - Online
Module 5 - Legislation - OnlineModule 5 - Legislation - Online
Module 5 - Legislation - Online
 
Employee Monitoring DiscussionKindly discuss in 100 words wh
Employee Monitoring DiscussionKindly discuss in 100 words whEmployee Monitoring DiscussionKindly discuss in 100 words wh
Employee Monitoring DiscussionKindly discuss in 100 words wh
 
Hope x talk
Hope x talkHope x talk
Hope x talk
 
Joanna Drake, Global SVP, Technology Services Group - Wood Mackenzie
Joanna Drake, Global SVP, Technology Services Group - Wood MackenzieJoanna Drake, Global SVP, Technology Services Group - Wood Mackenzie
Joanna Drake, Global SVP, Technology Services Group - Wood Mackenzie
 
Out of Control? Managing our digital reputations
Out of Control? Managing our digital reputationsOut of Control? Managing our digital reputations
Out of Control? Managing our digital reputations
 
Ethics and Data
Ethics and DataEthics and Data
Ethics and Data
 
Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021
 
Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)
Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)
Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)
 
Epistemic Responsibility in the IT Society
Epistemic Responsibility in the IT SocietyEpistemic Responsibility in the IT Society
Epistemic Responsibility in the IT Society
 
The other world of it
The other world of itThe other world of it
The other world of it
 
IAC21: Shedding Light on Dark Patterns.pdf
IAC21: Shedding Light on Dark Patterns.pdfIAC21: Shedding Light on Dark Patterns.pdf
IAC21: Shedding Light on Dark Patterns.pdf
 
Privacy and data protection primer - City of Portland
Privacy and data protection primer - City of PortlandPrivacy and data protection primer - City of Portland
Privacy and data protection primer - City of Portland
 
The future of digital identity 2019 future agenda
The future of digital identity 2019   future agendaThe future of digital identity 2019   future agenda
The future of digital identity 2019 future agenda
 

Último

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 

Último (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 

ICO Data Protection Officer Conference Privacy Technology Outlook

  • 1. ICO Data Protection Officer Conference March 2010 Salford A Privacy and Technology Outlook Robin Wilton Director, Future Identity Ltd Director of Privacy and Public Policy, Kantara Initiative Future identity
  • 2. Do any of these strike a chord? “You have zero privacy anyway. “If you have something that you Get over it” (45) don't want anyone to know, maybe you shouldn't be doing it “Privacy in the first place” (56) is no longer a social norm” (25) “People forgive and forget; computers can't do either” [Voiceover: It will be a strange day indeed when the definitive arbiter of social privacy norms is a single white 25-year-old male billionaire college drop-out...] Future identity
  • 3. “Ladders, Onions, and Surfing Naked...” Topics for this session: ● How are identity and privacy related? ● What is privacy anyway, and why is it important? ● Is privacy just a matter of protecting PII? ● What future challenges does online privacy present? This presentation draws on the input of many people, including: ● The Liberty Alliance Privacy Summit participants ● Bob Blakley and Ian Glazer of Burton Group ● Dr Mireille Hildebrandt, Vrije Universiteit Brussel My sincere thanks to all of them Future identity
  • 4. How are identity and privacy related? (The 'Onion' Model) ● The BIS (Basic Identifier Set) is what usually suffices to provide 'proof of uniqueness' ● Credentials usually encapsulate data from multiple 'rings' of the onion ● One 'good practice' approach is for B.I.S credentials to 'gravitate' towards the centre – i.e. not be overloaded with “Other PII” attribute data, but provide: ● the means to link to it; Attributes ● proof of uniqueness. Credentials are not privacy-neutral ● e.g. Using a driver's license to prove your age reveals more than your age; ● By their nature, credentials tend to make transactions 'linkable'; ● Privacy-enhancing systems will (must) be better at attribute-level disclosures, or better still, “Yes/No” answers to attribute-level questions. (cf. Dave Birch's paper on the "Psychic ID" metaphor) http://www.springerlink.com/content/hk1p8r133867x402/fulltext.pdf Future identity
  • 5. Slicing the Onion ● A 'segment' of the onion may correspond to sector-specific data (healthcare, tax, employment...). ● Some sectors are 'informal' – such as the separation between your Flickr and B.I.S MySpace accounts. ● Others, you might prefer to keep strictly “Other PII” separate – such as online banking. Attributes ● One way to look at privacy is as the preservation of “contextual integrity” between sectoral data sets (Helen Nissenbaum, via Piotr Cofta of BT) We become uneasy if our personal data shows up 'out of context'... Future identity
  • 6. What risks does this model suggest? ● Privacy is not a 'state': it's a relationship, often involving multiple parties. And like any relationship: ● Privacy brings interests and motivations into conflict: ● What we tell different people often depends on context; ● There are rules – mostly implicit: ● When third parties exchange data about you, is that co-operation or collusion? B.I.S ● Like any relationship, without maintenance and management it may go awry. “Other PII” Attributes Intuitively we know all these things, because humans are social animals... and yet ... Future identity
  • 7. Beyond the Onion: the DAO of privacy... Increasingly, third parties interact with you based on data at the edge of the Onion and beyond... D.A.O. − Data About You: with enough of your attributes, and/or linkability, you can be identified even if you're not asked for credentials; D.A.P.L.Y. − Data About People Like You: if you can be categorised, third parties will apply inferences from D.A.Y. other 'group' characteristics; − Data About Others: mass data mining makes third party intervention viable without you disclosing any PII. “You don't have to be in the statistics to be affected by the statistics” (Jason Pridmore) Future identity
  • 8. Flawed Perceptions ● The online world neither works nor behaves like the real world; despite occasional appearances to the contrary... ● The online world often presents us with metaphors, but not ones which would help us overcome these differences. ● We therefore frequently – and willingly - base our behaviour on a flawed perception of risks and the reality which gives rise to them. In other words, we could be surfing naked and not even know it. Brrr. Future identity
  • 9. Getting the Privacy 'Big Picture' ● “Privacy management” implies being aware of relationships and contexts, and acting accordingly; ● It means taking diverse, legitimate stakeholder perspectives into account; ● It needs a new set of metaphors, which help build a privacy- enhancing culture: 'protocol rules' are not the same as 'social rules'; ● It will involve privacy-enhancing technologies, but those are doomed without a privacy-enhancing ecosystem of governance, adoption and behaviours which, largely, remain to be developed; ● So: what are some of the challenges, if online privacy is to have a future? Privacy is not about secrecy: it's about disclosure... but disclosure with consent and control appropriate to the context. Future identity
  • 10. Challenges Managing meta-data: − Implied by most governance regimes - strongly indicated for good practice; − Sticky policy: preserving privacy preferences “beyond first disclosure” − Managing revocation as well as disclosure. Finding workable metaphors for online privacy concepts: − Personas, contextual integrity; − Informed consent in social networks. Managing attribute-level assertions:  If credentials are “minimalist”, attribute management becomes critical;  “Yes/No” answers need to be built in from early on;  How to address the “DAO” problem:  “You don't have to be in the statistics to be affected by the statistics” (Pridmore). Future identity
  • 11. Practical next steps Talk to the stakeholders, and reflect their perspectives and their needs in the 'ecosystem': There are tried and tested models for productive multi- stakeholder conversations. Several relevant projects taking principles to practicalities: PrimeLife (EU): whole-life privacy/identity management; VOME and EnCoRe (UK): privacy perception, consent, revocation; The Kantara Initiative (w/w) has work-groups on: ● User-managed access to personal data ● Information-sharing and user preferences ● Privacy and public policy ● Identity assurance ... and would welcome your projects and participation http://kantarainitiative.org Future identity
  • 12. ICO Data Protection Officer Conference March 2010 Salford Thank you... ... any questions? Robin Wilton Director, Future Identity Ltd Director of Privacy and Public Policy, Kantara Initiative mail@futureidentity.eu +44 (0)705 005 2931 http://futureidentity.eu http://futureidentity.blogspot.com Future identity