SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Downloaden Sie, um offline zu lesen
Finding Balance in the Age of Open
   Data: Some Policy and Legal
         Considerations
Rishi Maharaj
Information Access and Privacy Professional
“Information is the Oxygen of democracy. If
People do not know what is happening in their
society, if the actions of those who rule them
are hidden, then they cannot take a meaningful
part in the affairs of that society”

http://www.article19.org/pdfs/standards/righttoknow.pdf




                                                          2
Open Data and Open Government

Open Data therefore enshrines the concept
that neither the government of the day nor
civil servants create data for their benefit, but
for the benefit of the public. Data is generated
with public money, as such, it cannot be
unreasonably kept from citizens.
Image credit: http://bit.ly/ux2dNb/
Access to Information


‘the right to information lays the foundation
 upon which to build good governance and
 transparency
. It is the key to moving from
 formal to consultative and responsive
 democracy’

                Commonwealth Human Rights Initiative
The Open Data Challenge




Citizenry                  Bureaucracy
What Bodies are covered by the Act?
Public Authority

a.If it exercises any function on behalf of the state
b.if it was established by virtue of the President, by a Minister of
  Government in his capacity or by another public authority
c.an organization that is supported directly or indirectly by
  Government funds and over which Government is in a position
  to exercise control



                    State owned                             Regional
  Parliament                           Ministries ,THA
                     enterprise                            Authorities
    Courts
                                                             Courts
What information can be released?
Benefits of Access to Information
                                 Legislation
                             Transparency and Accountability




                                                                     Fosters economic
Promote democratic
                                                                       development
    governance
                                  Exposes corruption




              Improves service                         Supports participatory
                  delivery                                 development
Information not accessible via Access
          to Information Legislation

 International
   Relations
                                                               Documents
                                          Trade secrets       affecting the
                                           documents          economy and
                                                            commercial affairs
                      Defense and
Law Enforcement
                   Security documents

                                        Material obtained     Where secrecy
                                         in confidence       provisions apply
  Documents
 affecting legal    Internal Working
  proceedings
Public Interest
‱ Notwithstanding any law to the contrary a public authority shall give
  access to an exempt document where there is reasonable evidence
  that significant:

    – Abuse of authority of neglect in the performance of official duty;
      or
    – Injustice to an individual; or
    – Danger to the health or safety of an individual or of the public; or
    – Unauthorised use of public funds

has or is likely to have occurred or in the circumstances giving access to
the document is justified in the public interest having regard both to
any benefit and to any damage that may arise from doing so.
Public Interest
‱ An important thing to note about this test is that it
  has a presumption in favour of disclosure.

‱ The burden is on the public authority to show that
  the public interest in withholding the information is
  greater then the public interest in disclosure.
Privacy Protection

“Personal data is the new oil of the Internet
and the new currency of the digital world.”



Meglena Kuneva, European
Consumer Commissioner,
March 2009
Information Privacy Defined


‱ Information Privacy: Data Protection
  – Freedom of choice; personal control;
    informational self-determination;
  – Control over the collection, use and disclosure of
    any recorded information about an identifiable
    individual;
  – Privacy principles as embodied in “General Privacy
    Principles”
  – Global Privacy Standard (2006).
Why is the Protection of Personal
                           Information necessary?

‱ Privacy has long been understood to have a value
  in a civil society that respects inherent rights &
  values of mankind
‱ T&T Constitution enshrines the right to privacy
‱ Universal Declaration of Human Rights states that
  privacy is a fundamental human right
‱ Privacy is an important element in the control of
  electronic activities such as unsolicited marketing
  & spam
                                                    15
Privacy Protection
‱ We are currently confronting the rise of what I refer to
  as “digital dossiers”
. As businesses and the
  government increasingly share personal information,
  digital dossiers about nearly every individual are being
  assembled. This raises serious concerns. The
  information gathered about us has become quite
  extensive, and it is being used in ways that profoundly
  affect our lives. Yet, we know little about how our
  personal information is being used, and we lack the
  power to do much about it.”

(Solove, 2010, p. 1)
Privacy Protection

Different type of Data

‱ Personal data: information that is or can be
  linked directly or indirectly to some person.

‱ Statistical data: data without any personal
  information.
Privacy Protection
Challenge
‱ The need to protect against disclosure of
  personal information in confidential data (and
  against discovery of personal information from
  statistical data by matching techniques).
                     vs.
‱ The need to provide access to microdata for
  research.
Data Sharing & Data Matching

Government is subject to specific responsibilities re data
sharing and data matching that recognizes the
importance of Government as a primary holder of info
about individuals

Where a Public Body intends to share and or match info
with other Public Body, it shall do so only pursuant to an
agreement in a manner prescribed by the Information
Commissioner


                                                        19
Access by Design

7 basic principles
1. Be Proactive not Reactive
2. Access embedded into design
3. Openness and Transparency = Accountability
4. Fosters Collaboration
5. Enhances efficient government Collaboration
6. Makes Access truly Accessibility
7. Increases Quality of Information

      Source: http://www.ipc.on.ca/images/Resources/accessbydesign_7fundamentalprinciples.pdf
Privacy by Design
7 basic principles
  1.   Be Proactive not Reactive
  2.   Privacy as the Default
  3.   Privacy Embedded into Design
  4.   Positive – Sum not Zero-Sum
  5.   End to End Security (Life Cycle Protection)
  6.   Visibility and Transparency
  7.   Respect for User Privacy
       Source: http://www.ipc.on.ca/images/Resources/7foundationalprinciples.pdf
THANK YOU

Weitere Àhnliche Inhalte

Was ist angesagt?

Privacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminarPrivacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminarLance Michalson
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management Endcode_org
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference Endcode_org
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?blogzilla
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Financial Poise
 
Mobile privacy in Zambia
Mobile privacy in ZambiaMobile privacy in Zambia
Mobile privacy in ZambiaFrancesca Kabaso
 
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...gallowayandcollens
 
Human identity inforg
Human identity   inforgHuman identity   inforg
Human identity inforgTimothy Holborn
 
ICEGOV - Tutorial 1 - Information Policy Concepts and Principles
ICEGOV - Tutorial 1 - Information Policy Concepts and PrinciplesICEGOV - Tutorial 1 - Information Policy Concepts and Principles
ICEGOV - Tutorial 1 - Information Policy Concepts and PrinciplesICEGOV
 
Information policy sunil sir
Information policy sunil sirInformation policy sunil sir
Information policy sunil sirbgshalini
 
So You Want to Protect Privacy: Now What?
So You Want to Protect Privacy: Now What?So You Want to Protect Privacy: Now What?
So You Want to Protect Privacy: Now What?Stuart Bailey
 
2012 OCT knowledge banking
2012 OCT knowledge banking2012 OCT knowledge banking
2012 OCT knowledge bankingTimothy Holborn
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk Endcode_org
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?blogzilla
 
Introduction to Information Policy
Introduction to Information PolicyIntroduction to Information Policy
Introduction to Information PolicyNiamh Headon
 
Alfredo Mendez - Mexico - personal data protection and transparency
Alfredo Mendez - Mexico - personal data protection and transparencyAlfredo Mendez - Mexico - personal data protection and transparency
Alfredo Mendez - Mexico - personal data protection and transparencyAlfredo Mendez
 
Democratizing the web
Democratizing the webDemocratizing the web
Democratizing the webTimothy Holborn
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information SecurityCharles Mok
 
State of the Internet
State of the InternetState of the Internet
State of the InternetCharles Mok
 

Was ist angesagt? (20)

Privacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminarPrivacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminar
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
 
Mobile privacy in Zambia
Mobile privacy in ZambiaMobile privacy in Zambia
Mobile privacy in Zambia
 
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
 
Human identity inforg
Human identity   inforgHuman identity   inforg
Human identity inforg
 
ICEGOV - Tutorial 1 - Information Policy Concepts and Principles
ICEGOV - Tutorial 1 - Information Policy Concepts and PrinciplesICEGOV - Tutorial 1 - Information Policy Concepts and Principles
ICEGOV - Tutorial 1 - Information Policy Concepts and Principles
 
Information policy sunil sir
Information policy sunil sirInformation policy sunil sir
Information policy sunil sir
 
So You Want to Protect Privacy: Now What?
So You Want to Protect Privacy: Now What?So You Want to Protect Privacy: Now What?
So You Want to Protect Privacy: Now What?
 
2012 OCT knowledge banking
2012 OCT knowledge banking2012 OCT knowledge banking
2012 OCT knowledge banking
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
Introduction to Information Policy
Introduction to Information PolicyIntroduction to Information Policy
Introduction to Information Policy
 
Alfredo Mendez - Mexico - personal data protection and transparency
Alfredo Mendez - Mexico - personal data protection and transparencyAlfredo Mendez - Mexico - personal data protection and transparency
Alfredo Mendez - Mexico - personal data protection and transparency
 
Democratizing the web
Democratizing the webDemocratizing the web
Democratizing the web
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information Security
 
State of the Internet
State of the InternetState of the Internet
State of the Internet
 

Andere mochten auch (10)

Trinidad opensourcedeck(final)
Trinidad opensourcedeck(final)Trinidad opensourcedeck(final)
Trinidad opensourcedeck(final)
 
Opportunities for open spatial data
Opportunities for open spatial dataOpportunities for open spatial data
Opportunities for open spatial data
 
Dclement uwiopendata
Dclement uwiopendataDclement uwiopendata
Dclement uwiopendata
 
Mgmt 2010 15%
Mgmt 2010 15%Mgmt 2010 15%
Mgmt 2010 15%
 
Pendahuluan
PendahuluanPendahuluan
Pendahuluan
 
Statistics and open data
Statistics and open dataStatistics and open data
Statistics and open data
 
Statistics and open data2
Statistics and open data2Statistics and open data2
Statistics and open data2
 
"How To Lie With Statistics" Chapter 10
"How To Lie With Statistics" Chapter 10"How To Lie With Statistics" Chapter 10
"How To Lie With Statistics" Chapter 10
 
Open standards and open data
Open standards and open dataOpen standards and open data
Open standards and open data
 
Foia DP Presentation
Foia DP PresentationFoia DP Presentation
Foia DP Presentation
 

Ähnlich wie Finding balance in the age of open data

Future of Privacy - The Emerging View 11 06 15
Future of Privacy - The Emerging View 11 06 15 Future of Privacy - The Emerging View 11 06 15
Future of Privacy - The Emerging View 11 06 15 Future Agenda
 
How should the government balance the tensions between privacy and national s...
How should the government balance the tensions between privacy and national s...How should the government balance the tensions between privacy and national s...
How should the government balance the tensions between privacy and national s...intel-writers.com
 
Rti resoucebook for cs os workers & media
Rti resoucebook for cs os workers & mediaRti resoucebook for cs os workers & media
Rti resoucebook for cs os workers & mediaMohammad Ismail
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdflinda gichohi
 
Future of privacy - Insights from Discussions Building on an Initial Perspect...
Future of privacy - Insights from Discussions Building on an Initial Perspect...Future of privacy - Insights from Discussions Building on an Initial Perspect...
Future of privacy - Insights from Discussions Building on an Initial Perspect...Future Agenda
 
Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaInvasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaKelly Ratkovic
 
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)ProductNation/iSPIRT
 
The Promotion of Access to Information Act for South African Journalists
The Promotion of Access to Information Act for South African JournalistsThe Promotion of Access to Information Act for South African Journalists
The Promotion of Access to Information Act for South African JournalistsGabriella Razzano
 
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptxOVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptxUsmanMAmeer
 
Data Protection in India
Data Protection in IndiaData Protection in India
Data Protection in IndiaHome
 
Future of value of data singapore.compressed
Future of value of data   singapore.compressedFuture of value of data   singapore.compressed
Future of value of data singapore.compressedFuture Agenda
 
Role of right to information act 2005 in the human development
Role of right to information act 2005 in the human developmentRole of right to information act 2005 in the human development
Role of right to information act 2005 in the human developmentAlexander Decker
 
11.0006www.iiste.org call for paper.[41-47]role of right to information act 2...
11.0006www.iiste.org call for paper.[41-47]role of right to information act 2...11.0006www.iiste.org call for paper.[41-47]role of right to information act 2...
11.0006www.iiste.org call for paper.[41-47]role of right to information act 2...Alexander Decker
 
The Medicare Bill
The Medicare BillThe Medicare Bill
The Medicare BillTammy Moncrief
 
PRJ.1578-Omidyar-Network-Digital-Identity-Issue-Analysis-Executive-Summary-v1...
PRJ.1578-Omidyar-Network-Digital-Identity-Issue-Analysis-Executive-Summary-v1...PRJ.1578-Omidyar-Network-Digital-Identity-Issue-Analysis-Executive-Summary-v1...
PRJ.1578-Omidyar-Network-Digital-Identity-Issue-Analysis-Executive-Summary-v1...Nick Norman
 
India right to information act
India right to information actIndia right to information act
India right to information acticgfmconference
 
Age Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAge Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAgeFriendlyEconomy
 
Introduction to the Freedom of Information and Data Protection Act Trinidad a...
Introduction to the Freedom of Information and Data Protection Act Trinidad a...Introduction to the Freedom of Information and Data Protection Act Trinidad a...
Introduction to the Freedom of Information and Data Protection Act Trinidad a...EquiGov Institute
 

Ähnlich wie Finding balance in the age of open data (20)

Future of Privacy - The Emerging View 11 06 15
Future of Privacy - The Emerging View 11 06 15 Future of Privacy - The Emerging View 11 06 15
Future of Privacy - The Emerging View 11 06 15
 
How should the government balance the tensions between privacy and national s...
How should the government balance the tensions between privacy and national s...How should the government balance the tensions between privacy and national s...
How should the government balance the tensions between privacy and national s...
 
Rti resoucebook for cs os workers & media
Rti resoucebook for cs os workers & mediaRti resoucebook for cs os workers & media
Rti resoucebook for cs os workers & media
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
 
Future of privacy - Insights from Discussions Building on an Initial Perspect...
Future of privacy - Insights from Discussions Building on an Initial Perspect...Future of privacy - Insights from Discussions Building on an Initial Perspect...
Future of privacy - Insights from Discussions Building on an Initial Perspect...
 
Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaInvasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian Media
 
20eumt047_ipr.pptx
20eumt047_ipr.pptx20eumt047_ipr.pptx
20eumt047_ipr.pptx
 
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
 
The Promotion of Access to Information Act for South African Journalists
The Promotion of Access to Information Act for South African JournalistsThe Promotion of Access to Information Act for South African Journalists
The Promotion of Access to Information Act for South African Journalists
 
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptxOVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
 
Data Protection in India
Data Protection in IndiaData Protection in India
Data Protection in India
 
Future of value of data singapore.compressed
Future of value of data   singapore.compressedFuture of value of data   singapore.compressed
Future of value of data singapore.compressed
 
Role of right to information act 2005 in the human development
Role of right to information act 2005 in the human developmentRole of right to information act 2005 in the human development
Role of right to information act 2005 in the human development
 
11.0006www.iiste.org call for paper.[41-47]role of right to information act 2...
11.0006www.iiste.org call for paper.[41-47]role of right to information act 2...11.0006www.iiste.org call for paper.[41-47]role of right to information act 2...
11.0006www.iiste.org call for paper.[41-47]role of right to information act 2...
 
The Medicare Bill
The Medicare BillThe Medicare Bill
The Medicare Bill
 
PRJ.1578-Omidyar-Network-Digital-Identity-Issue-Analysis-Executive-Summary-v1...
PRJ.1578-Omidyar-Network-Digital-Identity-Issue-Analysis-Executive-Summary-v1...PRJ.1578-Omidyar-Network-Digital-Identity-Issue-Analysis-Executive-Summary-v1...
PRJ.1578-Omidyar-Network-Digital-Identity-Issue-Analysis-Executive-Summary-v1...
 
India right to information act
India right to information actIndia right to information act
India right to information act
 
Age Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAge Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data Use
 
Introduction to the Freedom of Information and Data Protection Act Trinidad a...
Introduction to the Freedom of Information and Data Protection Act Trinidad a...Introduction to the Freedom of Information and Data Protection Act Trinidad a...
Introduction to the Freedom of Information and Data Protection Act Trinidad a...
 
J0372053055
J0372053055J0372053055
J0372053055
 

KĂŒrzlich hochgeladen

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...gurkirankumar98700
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

KĂŒrzlich hochgeladen (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

Finding balance in the age of open data

  • 1. Finding Balance in the Age of Open Data: Some Policy and Legal Considerations Rishi Maharaj Information Access and Privacy Professional
  • 2. “Information is the Oxygen of democracy. If People do not know what is happening in their society, if the actions of those who rule them are hidden, then they cannot take a meaningful part in the affairs of that society” http://www.article19.org/pdfs/standards/righttoknow.pdf 2
  • 3. Open Data and Open Government Open Data therefore enshrines the concept that neither the government of the day nor civil servants create data for their benefit, but for the benefit of the public. Data is generated with public money, as such, it cannot be unreasonably kept from citizens.
  • 5. Access to Information ‘the right to information lays the foundation upon which to build good governance and transparency
. It is the key to moving from formal to consultative and responsive democracy’ Commonwealth Human Rights Initiative
  • 6. The Open Data Challenge Citizenry Bureaucracy
  • 7. What Bodies are covered by the Act? Public Authority a.If it exercises any function on behalf of the state b.if it was established by virtue of the President, by a Minister of Government in his capacity or by another public authority c.an organization that is supported directly or indirectly by Government funds and over which Government is in a position to exercise control State owned Regional Parliament Ministries ,THA enterprise Authorities Courts Courts
  • 8. What information can be released?
  • 9. Benefits of Access to Information Legislation Transparency and Accountability Fosters economic Promote democratic development governance Exposes corruption Improves service Supports participatory delivery development
  • 10. Information not accessible via Access to Information Legislation International Relations Documents Trade secrets affecting the documents economy and commercial affairs Defense and Law Enforcement Security documents Material obtained Where secrecy in confidence provisions apply Documents affecting legal Internal Working proceedings
  • 11. Public Interest ‱ Notwithstanding any law to the contrary a public authority shall give access to an exempt document where there is reasonable evidence that significant: – Abuse of authority of neglect in the performance of official duty; or – Injustice to an individual; or – Danger to the health or safety of an individual or of the public; or – Unauthorised use of public funds has or is likely to have occurred or in the circumstances giving access to the document is justified in the public interest having regard both to any benefit and to any damage that may arise from doing so.
  • 12. Public Interest ‱ An important thing to note about this test is that it has a presumption in favour of disclosure. ‱ The burden is on the public authority to show that the public interest in withholding the information is greater then the public interest in disclosure.
  • 13. Privacy Protection “Personal data is the new oil of the Internet and the new currency of the digital world.” Meglena Kuneva, European Consumer Commissioner, March 2009
  • 14. Information Privacy Defined ‱ Information Privacy: Data Protection – Freedom of choice; personal control; informational self-determination; – Control over the collection, use and disclosure of any recorded information about an identifiable individual; – Privacy principles as embodied in “General Privacy Principles” – Global Privacy Standard (2006).
  • 15. Why is the Protection of Personal Information necessary? ‱ Privacy has long been understood to have a value in a civil society that respects inherent rights & values of mankind ‱ T&T Constitution enshrines the right to privacy ‱ Universal Declaration of Human Rights states that privacy is a fundamental human right ‱ Privacy is an important element in the control of electronic activities such as unsolicited marketing & spam 15
  • 16. Privacy Protection ‱ We are currently confronting the rise of what I refer to as “digital dossiers”
. As businesses and the government increasingly share personal information, digital dossiers about nearly every individual are being assembled. This raises serious concerns. The information gathered about us has become quite extensive, and it is being used in ways that profoundly affect our lives. Yet, we know little about how our personal information is being used, and we lack the power to do much about it.” (Solove, 2010, p. 1)
  • 17. Privacy Protection Different type of Data ‱ Personal data: information that is or can be linked directly or indirectly to some person. ‱ Statistical data: data without any personal information.
  • 18. Privacy Protection Challenge ‱ The need to protect against disclosure of personal information in confidential data (and against discovery of personal information from statistical data by matching techniques). vs. ‱ The need to provide access to microdata for research.
  • 19. Data Sharing & Data Matching Government is subject to specific responsibilities re data sharing and data matching that recognizes the importance of Government as a primary holder of info about individuals Where a Public Body intends to share and or match info with other Public Body, it shall do so only pursuant to an agreement in a manner prescribed by the Information Commissioner 19
  • 20. Access by Design 7 basic principles 1. Be Proactive not Reactive 2. Access embedded into design 3. Openness and Transparency = Accountability 4. Fosters Collaboration 5. Enhances efficient government Collaboration 6. Makes Access truly Accessibility 7. Increases Quality of Information Source: http://www.ipc.on.ca/images/Resources/accessbydesign_7fundamentalprinciples.pdf
  • 21. Privacy by Design 7 basic principles 1. Be Proactive not Reactive 2. Privacy as the Default 3. Privacy Embedded into Design 4. Positive – Sum not Zero-Sum 5. End to End Security (Life Cycle Protection) 6. Visibility and Transparency 7. Respect for User Privacy Source: http://www.ipc.on.ca/images/Resources/7foundationalprinciples.pdf