SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
3. ULUSLARARASI KATILIMLI                      3rd INFORMATION SECURITY &
                                     BÝLGÝ GÜVENLÝÐÝ VE                     CRYPTOLOGY CONFERENCE
                                KRÝPTOLOJÝ KONFERANSI                       WITH INTERNATIONAL PARTICIPATION




    Privacy Impact Assessment Methodologies for
             Protection of Personal Data
                                                  Okyar TAHAOĞLU, Yalçın ÇEBİ




                                                                                --Bodily privacy, which concerns the protection of
   Abstract—This paper presents a brief summary of the Privacy            people's physical selves against invasive procedures such as
Impact Assessment (PIA) methodologies proposed for the                    genetic tests, drug testing and cavity searches;
protection of personal data against misuse, collection and process              --Privacy of communications, which covers the security
risks. The methodologies presented in this paper shed light on the
                                                                          and privacy of mail, telephones, e-mail and other forms of
professional community’s effort and government’s governance
responsibilities to assess and control these inherent risks. Clearly,     communication; and
as Information and Communication Technologies become                            --Territorial privacy, which concerns the setting of limits
increasingly more complex, individual knowledge, judgment, and            on intrusion into domestic and other environments such as the
expertise will not suffice and systemic methodologies for risk            workplace or public space.
management such as those presented in this paper become                      In this paper we will use privacy as “information privacy of
imperative. Our observation, which is based on the workforce
                                                                          personal data” and we will investigate on how personal
spent by the government institutions to protect personal data and
the benchmark of our country’s draft Data Protection Act                  information can be protected by organizations under an
regulation with the developed countries, is further amplified by          assumption that privacy legislations exist in Turkey. On the
the fact that privacy risk is among the least measured or                 other hand in several papers it is criticized that “information
managed in a system today.                                                systems security” is not discussed sufficiently in Turkey [3].
                                                                          Accordingly we hope this paper may initiate a discussion in
   Keywords
   Index Terms—Personal data protection, Privacy impact                   security of personally identifiable information.
assessment


                         I. INTRODUCTION                                                        II. LEGISLATIONS
                                                                            A. Data Protection Legislations
P    ERSONALLY identifiable information is defined as any
     information relating to an identified or identifiable
individual. Such information includes, but is not limited to, the
                                                                             The genesis of modern legislation in this area can be traced
                                                                          to the first data protection law in the world enacted in the
customer's name, address, telephone number, social                        Land of Hesse in Germany in 1970 [4]. The Council of
security/insurance or other government identification                     Europe's “Convention for the Protection of Individuals with
numbers, employer, credit card numbers, personal or family                regard to the Automatic Processing of Personal Data 1981
financial information, personal or family medical information,            (Directive 108)” is a reference for today’s data protection
employment history, history of purchases or other                         legislation [5].
transactions, credit records and similar information [1].                    Other current directives force the member states of the
Personal data can be defined as all of the information that can           European Union (EU) to prepare and deploy their own data
express any opinion about an individual or corporate.                     protection laws. These legislations aim to keep the security
   On the other hand protection of confidentiality and secrecy            level of data used and shared among the states for commercial,
of personally identifiable information is basically called as             legislative and social objects [6]. The baseline of the security
privacy. Privacy has several more meanings and privacy in the             level is set by the Directive 108. Each country must look for a
context of personal data can be divided into the following                data protection act from the other member while sharing
separate but related concepts: [2]                                        personal data.
   --Information privacy, which involves the establishment of
                                                                            B. Turkish Draft Data Protection Act
rules governing the collection and handling of personal data
such as credit information, and medical and government                      Every Turkish citizen has rights protected by the organic
records. It is also known as “data protection”;                           law about protection of private and family life [7].
                                                                          Additionally, Turkey has signed the Directive 108 in the same
                                                                          year it has been approved by the EU. Therefore a privacy and
   Manuscript received November 10, 2008.                                 data protection act is expected from Turkey since then. A draft
   Okyar TAHAOĞLU is with the Computer Engineering Department,Dokuz
Eylül University, İzmir, 35160 Turkey (okyar.tahaoglu@turkcell.com.tr).   “Personal Data Protection Act” is currently being prepared but
   Yalçın ÇEBİ is with the Computer Engineering Department, Dokuz Eylül   has not been enacted yet. The draft act is a regulation that
University, İzmir, 35160 Turkey (yalcin@cs.deu.edu.tr).                   draws the boundaries of usage and processing practices of data


Bildiriler Kitabý                                                                      25•26•27 Aralýk December 2008 • Ankara / TÜRKİYE
         Proceedings                                                             249
3. ULUSLARARASI KATILIMLI                  3rd INFORMATION SECURITY &
                                  BÝLGÝ GÜVENLÝÐÝ VE                 CRYPTOLOGY CONFERENCE
                             KRÝPTOLOJÝ KONFERANSI                   WITH INTERNATIONAL PARTICIPATION




[8]. It is expected that this draft act will be in action in the                                   TABLE I
                                                                                            TEN PRINCIPLES OF PIAS
following years. Compliance with the privacy laws always
took long time for the private and government organizations.              Principle                Code for Protection of Personal Data
Therefore authorities who are responsible for the governance
                                                                     Accountability         Each government organization is responsible for
of privacy protection usually give a considerable time for the                              personal information under its control and shall
organizations to ready. When this period is considered                                      designate an individual who is accountable for the
organizations must begin using privacy protection                                           organization’s compliance with privacy
                                                                                            regulations.
methodologies without waiting for the legislation. Some acts         Identifying purposes   Individuals must be informed during the collection
especially related to specific sectors (telecommunication,                                  of personal information.
finance, health etc.) also force protection of private               Consent                Knowledge and consent is required for the
                                                                                            collection, use, or disclosure of personal
information. On the other hand, we see that socially developed                              information.
nations which have high human development indexes and                Limiting collection    Minimum required information shall be collected
freedom of information levels like Canada prepare                                           by fair and lawful means.
                                                                     Limiting use,          Personal information shall not be used or disclosed
methodologies which include best practices and management            disclosure and         for purposes other than those for which it was
guidelines for organizations to help them assure compliance          retention              collected, except with the consent of the individual
with data protection legislations. This enables the legal bodies                            or as required by law. Personal information should
                                                                                            only be kept as long as necessary.
to act as corrective, detective and preventive controls rather       Accuracy               Personal information shall be as accurate,
than penalty authorities. Management of personal data in safe                               complete, and up-to-date.
harbors requires fully implementation                                                         formation shall be protected against unauthorized d
and organizational controls. Thus selec                                                        cess, copying, disclosure, use or modification.
                                                                                               rsonal information management policies and
done in a systematic way.                                                                     actices must be available to the public.
                                                                                              n individual shall be able to ask the status of
                                                                                                /her own information and have access for any
                                                                                               date.
             III. PRIVACY IMPACT AS                                                           n individual shall be able to address a challenge
   In this section we examine gener                                                           ncerning compliance with the above principles.
Protection Framework and we will us
as a guide to make conclusions for a su                                                     s are included in the Personal
practice in Turkey. Office of the Pri                                                      n and Electronic Documents Act,
Canada has a privacy framework inclu                                                         or privacy law [11]. Therefore
for individuals and businesses, e-learn                                                     sider these principles and should assure
privacy and personal data processing                                                         which collect, use, store and transfer
procedures and guidelines for Privac                                                        nformation are assessed accordingly.
We believe investigating the Canadian                                                       ations must perform a PIA in order to
clues about the facts we will face in the                                                  n new programs, acquisition of new
   Privacy Impact Assessments (PIAs                                                           integration of distributed systems in
help determine whether technologies, i                                                      agencies. Major changes to existing
processes of a project meet privacy reg                                                        technology architecture, additional
measures technical compliance with                                                            channel release for a governmental
defines the gaps between the practices                                                     n change, a new plan to collect citizens’
are used to identify privacy vulnerabilities and risks of new or   personal data and outsourced operations are some examples
redesigned programs, products or services. Canadian                where PIAs must be initiated.
government uses PIA as a tool to assess government projects           Usually two kinds of PIAs are used; preliminary PIA and
against privacy risks. PIAs take a close look at how               full-cycle PIA. Preliminary PIA is used at the initial phase of a
government departments protect personal information as it is       project to determine whether a full-cycle PIA is needed. If
collected, stored, used, disclosed and ultimately destroyed.       personal data is not used or processed or transferred in the
These assessments help create a privacy-sensitive culture in       corresponding system preliminary assessment may find there
government departments [9]. All federal departments,               are no or minimal privacy risks. This approach saves resources
agencies and institutions conduct PIAs for new or redesigned       and time for the project.
programs and services that raise privacy issues. The                  Another way to save resources is using self-assessment
governmental institutions which must implement PIA as a tool       where individual government departments conduct their own
in new system designs are listed in the Canadian Privacy Act       PIAs. Therefore each governmental agency must have
of 1985 in detail [10].                                            educated professionals from various departments (Information
                                                                   Technology, legal, business analysis, project management
  A. Fundamental Principles of PIA
                                                                   etc.) of the organization.
   In order to have a standard privacy baseline for PIAs ten
fundamental principles are defined. The fundamental
principles of Canadian PIAs are shown in Table I. These fair




Bildiriler Kitabý                                                                25•26•27 Aralýk December 2008 • Ankara / TÜRKİYE
         Proceedings                                                       250
3. ULUSLARARASI KATILIMLI                         3rd INFORMATION SECURITY &
                                       BÝLGÝ GÜVENLÝÐÝ VE                        CRYPTOLOGY CONFERENCE
                                  KRÝPTOLOJÝ KONFERANSI                          WITH INTERNATIONAL PARTICIPATION




                                                                               privacy issues of a number of government programs. A PIA is
                                                                               a tool that helps ensure privacy protection is a core
                                                                               consideration when a project is planned and implemented. The
                                                                               whole process aims to force organizations to conduct PIA in
             Organizations       Authority             Individuals             case of new system development, integration and acquisition.
                                                                                  Guidelines prepared by the Authorities intend to provide
                                                                               instructions for completion of PIA. It includes checklists to
                PrivacyImpact Assesment Framework                              determine whether a full PIA is required, measurement tools
                                                                               to identify required set of skills and expertise (security, legal,
  Policy                     Risk Assessment             Audit
  • Application                                          • Observations        operational, and technology), and questionnaires assuring that
  • Accountability                Identify               •R ecommendations     PIA seeks for the entire Privacy Act principles.
  • Monitoring                                           • Maturity Levels        Risk management process must include at least these key
                                                                               steps: [12]
  Guidelines            Report               Analyse     Awareness
                                                                               1) Scope of the PIA must be determined. It must not be too
  • Resources                                            • E-learning
  • Data Flow                                            • Privacy Assistant
                                                                                    wide thus it will be impractical to assess the entire system
                                   Data
  •R eport                         Flow                                             but also must not be too narrow where personal data may
                                                                                    be out of scope. As a result of this Preliminary Privacy
Fig. 1. Privacy Impact Assessment Framework components.                             Impact Assessment process organizations decide
                                                                                                         PIA. This step can be repeated if a
  B. Role of the Authority                                                                              s place in the project.
                                                                                                        analyzed. A detailed data flow diagram
   As previously defined an inde                                                                         covering the business processes and
responsible for the governance of data
                                                                                                         . The purpose of this step is to depict
each country. The authorities are re                                                                     ation flows.
infrastructures to make the acts pos                                                                       must be conducted from a risk
supporting regulations, registry sy                                                                     ective. The privacy analysis examines
mechanisms. Each European Union m                                                                       e context of applicable privacy policies
names for this authority like, reg
                                                                                                         hecklists are used in this stage to
supervisor or commissioner. For examp                                                                   acy risks and or vulnerabilities.
name their central authorities as Eur                                                                     published. A document including the
Supervisor, Information Commissione                                                                     rivacy risks, implications and possible
Authority respectively.                                                                                  cing countermeasures is published as a
   The role of the authority in P
framework to assess the impacts effe                                                                  signed as an effective communications
that privacy issues are clearly cover                                                                   of stakeholders. If PIA system is a
Authority acts a consultant and prog
                                                                                                       duals would be the customers of this
organizations. During the annual risk                                                                  t reports of PIAs must be available to
each organization is expected to subm                                                                 ther hand, a national wide privacy
authority. The authority may pro                                                                      can only be achieved by raising the
recommendations        to     these       p                                    awareness of individuals of the citizenry. Online leaning can
recommendations help the organizations to decide the scope of
                                                                               be the most effective and economic way of an awareness
their privacy assessment plans and to appoint necessary                        program. Individuals must be able to ask to the Authority for
resources for PIAs.                                                            assistance.
   Authorities are also responsible for auditing whether
                                                                                  Periodic audits must be performed periodically to review
government organizations and agencies are giving importance                    that privacy directives are applied by organizations. Audits
to personal data privacy and assures that PIAs are conducted
                                                                               must assess; PIAs are done for necessary projects, risks are
as planned. It may not always be possible to make on site                      reported to the organizations’ managers, recommended
audits in organizations but authorizes use self assessment and                 countermeasures are implemented, result reports are accurate,
reporting techniques to audit such organizations.
                                                                               available and understandable for public. The Authority must
  C. PIA Life Cycle                                                            be able to conduct on-site and off-site audits specific for each
   Several system and methodologies are integrated to form                     sectors (finance, communication, health, government,
PIA framework. The building blocks of a PIA framework as                       education etc.).
shown in Fig. 1 are policy and guideline documentation, a risk
assessment life cycle, audit system and awareness program for
the related parties.
   The PIA policy helps to improve the awareness of privacy
within government institutions. It has focuses on the potential




Bildiriler Kitabý                                                                           25•26•27 Aralýk December 2008 • Ankara / TÜRKİYE
         Proceedings                                                                  251
3. ULUSLARARASI KATILIMLI                              3rd INFORMATION SECURITY &
                                        BÝLGÝ GÜVENLÝÐÝ VE                             CRYPTOLOGY CONFERENCE
                                   KRÝPTOLOJÝ KONFERANSI                               WITH INTERNATIONAL PARTICIPATION




                           IV. CONCLUSION                                        [9]    Fact Sheet, Officer of the Privacy Commissioner of Canada, Feb. 2,
                                                                                        2007, Available: http://www.privcom.gc.ca/fs-fi/02_05_d_33_e.asp
   Even though the government institutions are advised to                        [10]   Canadian Privacy Act, Department of Justice Canada, R.S., 1985, p-21.
implement PIAs, all organizations which are in the scope of                      [11]   Canadian Personal Information Protection and Electronic Documents
                                                                                        Act, (2000, c. 5), Department of Justice Canada, schedule.1, sec. 5.
the draft Turkish Data Protection Act must implement PIA                         [12]   Privacy Impact Assessment Guidelines: A Framework to Manage
methodologies in their organizations. E-Government                                      Privacy Risks, Treasury Board of Canada Secretariat, 2002.
infrastructure must also include PIA tools since it consists of                  [13]   UN e-Government Survey 2008, United Nations, New York, 2008.
multiple distributed systems and it interconnects these systems
under single architecture. E-Government activities are also in
planning phase in Turkey and it is expected to be in action
soon. It is known that e-Government transition has an access
point for the citizens called “e-gate”. It includes identification,
authentication and authorization functionalities and these
controls enable protection of personal data. This is an
international problem, thus the relationship between
information security, individual privacy and service delivery is
complex and dependent to a significant degree on the level of
trust accorded to the public sector by the citizenry. Turkey,
like all governments must address both the perceptions and
realities of privacy within a broader spectrum of information
and identity management that is at the core of both better
client centric responsiveness externally and the corresponding
need for new forms of coordination internally. There are two
interrelated components in doing so: putting in place an
infrastructure of reliable interoperability and ensuring
mechanisms for accurate identity authentication [13].
   Today, organizations are faced with many different and
changing types of risk. Changes in new technologies (like
Radio Frequency Identification, social networking sites, new
online payment systems, etc.) must be followed very closely
and new privacy risks must be added to PIA policies,
guidelines and checklists by the Authority.
   Personal data of public must be assessed as a valuable asset
and be protected necessarily. Government agencies,
universities, public bodies, financial institutions, telecom
operators, hospitals, insurance companies and other private
companies must implement and continue maintaining practical
PIA tools and methods without waiting privacy legislations.
This will increase valuation of the entire information systems
in Turkey by raising confidence among individuals.


                               REFERENCES
[1]   T. Karol, “Cross-Border Privacy Impact Assessments: An Introduction”,
      Information Systems Control J., vol. 3, 2001.
[2]   Overview of Privacy, Privacy International, London, UK, 2005.
[3]   G. Canbek, Ş. Sağıroğlu, “A Review on Information, Information
      Security and Security Processes”, J. of Polytechnic, vol. 9, no. 3, pp.
      165-174, 2006.
[4]    C. J. Bennett, Regulating Privacy: Data Protection and Public Policy in
      Europe and the United States. Cornell University Press, 1992, pp. 48.
[5]   Convention for the Protection of Individuals with Regards to Automatic
      Processing of Personal Data, Council of Europe, European Treaty
      Series, 1981, no. 108.
[6]   Y. Çebi, O. Tahaoğlu, “Personal Data Protection in Turkey: Technical
      and Managerial Controls”, in Proc. First International Conference on
      Security of Information and Networks, Gazimagusa, pp 220-227.
[7]   Organic Law of Turkish Republic, Grand National Assembly of Turkey,
      Nov. 7, 1982, Available: http://www.tbmm.gov.tr/Anayasa.htm
[8]   Current Draft Acts in the Commission, Ministry of Justice Official Web
      Page, Nov. 2, 2005, Available:
      http://www.kgm.adalet.gov.tr/tbmmtas.htm




Bildiriler Kitabý                                                                                25•26•27 Aralýk December 2008 • Ankara / TÜRKİYE
         Proceedings                                                                       252

Weitere ähnliche Inhalte

Was ist angesagt?

Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theftAmber Gupta
 
Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issuesSagar Rahurkar
 
Ubicomp challenges for privacy law
Ubicomp challenges for privacy lawUbicomp challenges for privacy law
Ubicomp challenges for privacy lawblogzilla
 
Regulatory Compliance under the Information Technology Act, 2000
Regulatory Compliance under the Information Technology Act, 2000Regulatory Compliance under the Information Technology Act, 2000
Regulatory Compliance under the Information Technology Act, 2000n|u - The Open Security Community
 
Ensuring Effective Information Security Management Information Classification...
Ensuring Effective Information Security Management Information Classification...Ensuring Effective Information Security Management Information Classification...
Ensuring Effective Information Security Management Information Classification...ijtsrd
 
Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000Sagar Rahurkar
 
Lex mundi 2011 confidentiality and knowledge collaboration presentation - f...
Lex mundi 2011   confidentiality and knowledge collaboration presentation - f...Lex mundi 2011   confidentiality and knowledge collaboration presentation - f...
Lex mundi 2011 confidentiality and knowledge collaboration presentation - f...David Cunningham
 
Company responsibility: Digital Evidence
Company responsibility: Digital EvidenceCompany responsibility: Digital Evidence
Company responsibility: Digital Evidenceyourlegalconsultants
 
Law firm data privacy by dave cunningham
Law firm data privacy by dave cunninghamLaw firm data privacy by dave cunningham
Law firm data privacy by dave cunninghamDavid Cunningham
 
Personal data protection bill
Personal data protection bill Personal data protection bill
Personal data protection bill Mathew Chacko
 
10 Things You Need To Know About Privacy
10 Things You Need To Know About Privacy10 Things You Need To Know About Privacy
10 Things You Need To Know About PrivacyNow Dentons
 
Pubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David MinkPubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David MinkMatt Siltala
 
Startups - data protection
Startups  - data protectionStartups  - data protection
Startups - data protectionMathew Chacko
 
An ethical approach to data privacy protection
An ethical approach to data privacy protectionAn ethical approach to data privacy protection
An ethical approach to data privacy protectionNicha Tatsaneeyapan
 

Was ist angesagt? (20)

Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theft
 
Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issues
 
Ubicomp challenges for privacy law
Ubicomp challenges for privacy lawUbicomp challenges for privacy law
Ubicomp challenges for privacy law
 
Regulatory Compliance under the Information Technology Act, 2000
Regulatory Compliance under the Information Technology Act, 2000Regulatory Compliance under the Information Technology Act, 2000
Regulatory Compliance under the Information Technology Act, 2000
 
Privacy and Data Protection
Privacy and Data ProtectionPrivacy and Data Protection
Privacy and Data Protection
 
1307 Privacy Act
1307 Privacy Act1307 Privacy Act
1307 Privacy Act
 
Ensuring Effective Information Security Management Information Classification...
Ensuring Effective Information Security Management Information Classification...Ensuring Effective Information Security Management Information Classification...
Ensuring Effective Information Security Management Information Classification...
 
Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000
 
Lex mundi 2011 confidentiality and knowledge collaboration presentation - f...
Lex mundi 2011   confidentiality and knowledge collaboration presentation - f...Lex mundi 2011   confidentiality and knowledge collaboration presentation - f...
Lex mundi 2011 confidentiality and knowledge collaboration presentation - f...
 
Company responsibility: Digital Evidence
Company responsibility: Digital EvidenceCompany responsibility: Digital Evidence
Company responsibility: Digital Evidence
 
Cloud and Data Privacy
Cloud and Data PrivacyCloud and Data Privacy
Cloud and Data Privacy
 
Law firm data privacy by dave cunningham
Law firm data privacy by dave cunninghamLaw firm data privacy by dave cunningham
Law firm data privacy by dave cunningham
 
Personal data protection bill
Personal data protection bill Personal data protection bill
Personal data protection bill
 
Data Protection Presentation
Data Protection PresentationData Protection Presentation
Data Protection Presentation
 
10 Things You Need To Know About Privacy
10 Things You Need To Know About Privacy10 Things You Need To Know About Privacy
10 Things You Need To Know About Privacy
 
Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
 
Pubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David MinkPubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David Mink
 
Startups - data protection
Startups  - data protectionStartups  - data protection
Startups - data protection
 
An ethical approach to data privacy protection
An ethical approach to data privacy protectionAn ethical approach to data privacy protection
An ethical approach to data privacy protection
 
Research Proposal K.M.Sangeetha
Research Proposal K.M.SangeethaResearch Proposal K.M.Sangeetha
Research Proposal K.M.Sangeetha
 

Andere mochten auch

Robert beggs incident response teams - atlseccon2011
Robert beggs   incident response teams - atlseccon2011Robert beggs   incident response teams - atlseccon2011
Robert beggs incident response teams - atlseccon2011Atlantic Security Conference
 
Integrated Privacy Impact Assessment
Integrated Privacy Impact AssessmentIntegrated Privacy Impact Assessment
Integrated Privacy Impact AssessmentJeremy Hilton
 
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...Lilian Edwards
 
Trackment
TrackmentTrackment
Trackmentmeaannn
 
Lean Thinking in IT by Marie-Pia Ignace, Lean IT Summit 2014
Lean Thinking in IT by Marie-Pia Ignace, Lean IT Summit 2014Lean Thinking in IT by Marie-Pia Ignace, Lean IT Summit 2014
Lean Thinking in IT by Marie-Pia Ignace, Lean IT Summit 2014Institut Lean France
 
Privacy Impact Assessment Management System (PIAMS)
Privacy Impact Assessment Management System (PIAMS) Privacy Impact Assessment Management System (PIAMS)
Privacy Impact Assessment Management System (PIAMS) The Canton Group
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...IBM Security
 
Impact Assessment for social enterprises and nonprofits
Impact Assessment for social enterprises and nonprofitsImpact Assessment for social enterprises and nonprofits
Impact Assessment for social enterprises and nonprofitsNiketa Malhotra
 
Privacy in Computing - Impact on emerging technologies
Privacy in Computing - Impact on emerging technologiesPrivacy in Computing - Impact on emerging technologies
Privacy in Computing - Impact on emerging technologiesMensah Sitti
 
Brussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACKBrussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACKTrilateral Research
 
StuartMillar_13616005_PIA
StuartMillar_13616005_PIAStuartMillar_13616005_PIA
StuartMillar_13616005_PIAStuart Millar
 
Impact of CCTV on 'Right to Privacy'
Impact of CCTV on 'Right to Privacy'Impact of CCTV on 'Right to Privacy'
Impact of CCTV on 'Right to Privacy'SSoujanya
 
Impact of ict on privacy and personal data
Impact of ict on privacy and personal dataImpact of ict on privacy and personal data
Impact of ict on privacy and personal datamohd kamal
 
The Impact of Cloud: Cloud Computing Security and Privacy
The Impact of Cloud: Cloud Computing Security and PrivacyThe Impact of Cloud: Cloud Computing Security and Privacy
The Impact of Cloud: Cloud Computing Security and PrivacyCharles Mok
 
Housing sector forum pia slides - 20170131
Housing sector forum   pia slides - 20170131Housing sector forum   pia slides - 20170131
Housing sector forum pia slides - 20170131Stephanie Vasey
 

Andere mochten auch (20)

Robert beggs incident response teams - atlseccon2011
Robert beggs   incident response teams - atlseccon2011Robert beggs   incident response teams - atlseccon2011
Robert beggs incident response teams - atlseccon2011
 
Integrated Privacy Impact Assessment
Integrated Privacy Impact AssessmentIntegrated Privacy Impact Assessment
Integrated Privacy Impact Assessment
 
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
 
opncc_certificate
opncc_certificateopncc_certificate
opncc_certificate
 
Trackment
TrackmentTrackment
Trackment
 
iTrack WP3 workshop
iTrack WP3 workshopiTrack WP3 workshop
iTrack WP3 workshop
 
Lean Thinking in IT by Marie-Pia Ignace, Lean IT Summit 2014
Lean Thinking in IT by Marie-Pia Ignace, Lean IT Summit 2014Lean Thinking in IT by Marie-Pia Ignace, Lean IT Summit 2014
Lean Thinking in IT by Marie-Pia Ignace, Lean IT Summit 2014
 
Privacy Impact Assessment Management System (PIAMS)
Privacy Impact Assessment Management System (PIAMS) Privacy Impact Assessment Management System (PIAMS)
Privacy Impact Assessment Management System (PIAMS)
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
 
Impact Assessment for social enterprises and nonprofits
Impact Assessment for social enterprises and nonprofitsImpact Assessment for social enterprises and nonprofits
Impact Assessment for social enterprises and nonprofits
 
Adam w. mosher - geo tagging - atlseccon2011
Adam w. mosher - geo tagging - atlseccon2011Adam w. mosher - geo tagging - atlseccon2011
Adam w. mosher - geo tagging - atlseccon2011
 
Privacy in Computing - Impact on emerging technologies
Privacy in Computing - Impact on emerging technologiesPrivacy in Computing - Impact on emerging technologies
Privacy in Computing - Impact on emerging technologies
 
Dean carey - data loss-prevention - atlseccon2011
Dean carey - data loss-prevention - atlseccon2011Dean carey - data loss-prevention - atlseccon2011
Dean carey - data loss-prevention - atlseccon2011
 
Brussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACKBrussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACK
 
StuartMillar_13616005_PIA
StuartMillar_13616005_PIAStuartMillar_13616005_PIA
StuartMillar_13616005_PIA
 
Impact of CCTV on 'Right to Privacy'
Impact of CCTV on 'Right to Privacy'Impact of CCTV on 'Right to Privacy'
Impact of CCTV on 'Right to Privacy'
 
Impact of ict on privacy and personal data
Impact of ict on privacy and personal dataImpact of ict on privacy and personal data
Impact of ict on privacy and personal data
 
WRC Newsletter Feb 2013
WRC Newsletter Feb 2013WRC Newsletter Feb 2013
WRC Newsletter Feb 2013
 
The Impact of Cloud: Cloud Computing Security and Privacy
The Impact of Cloud: Cloud Computing Security and PrivacyThe Impact of Cloud: Cloud Computing Security and Privacy
The Impact of Cloud: Cloud Computing Security and Privacy
 
Housing sector forum pia slides - 20170131
Housing sector forum   pia slides - 20170131Housing sector forum   pia slides - 20170131
Housing sector forum pia slides - 20170131
 

Ähnlich wie Privacy Impact Assessment Methodologies for Protection of Personal Data

Data Protection in India
Data Protection in IndiaData Protection in India
Data Protection in IndiaHome
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
Lesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxLesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxadnis1
 
Legal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityLegal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityGamentortc
 
Information Security and the Protection of Personal Data in Universities
Information Security and the Protection of Personal Data in UniversitiesInformation Security and the Protection of Personal Data in Universities
Information Security and the Protection of Personal Data in Universitiesinventionjournals
 
Solutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionSolutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionTrend Micro
 
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptxOVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptxUsmanMAmeer
 
Www.ico.org.uk ~ media_documents_library_data_protection_practical_applicatio...
Www.ico.org.uk ~ media_documents_library_data_protection_practical_applicatio...Www.ico.org.uk ~ media_documents_library_data_protection_practical_applicatio...
Www.ico.org.uk ~ media_documents_library_data_protection_practical_applicatio...Victor Gridnev
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulationblogzilla
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy IntroductionG Prachi
 
Philippine Data Privacy Act of 2012 (RA 10173)
Philippine Data Privacy Act of 2012 (RA 10173)Philippine Data Privacy Act of 2012 (RA 10173)
Philippine Data Privacy Act of 2012 (RA 10173)Kirk Go
 
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015ICT Watch
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...Symantec
 
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)ProductNation/iSPIRT
 
An Indian Outline on Database Protection
An Indian Outline on Database ProtectionAn Indian Outline on Database Protection
An Indian Outline on Database ProtectionSinghania2015
 
Christopher Millard Legally Compliant Use Of Personal Data In E Social Science
Christopher Millard   Legally Compliant Use Of Personal Data In E Social ScienceChristopher Millard   Legally Compliant Use Of Personal Data In E Social Science
Christopher Millard Legally Compliant Use Of Personal Data In E Social ScienceChristopher Millard
 
GDPR - The new era of data protection
GDPR - The new era of data protectionGDPR - The new era of data protection
GDPR - The new era of data protectionInterlogica
 

Ähnlich wie Privacy Impact Assessment Methodologies for Protection of Personal Data (20)

Data Protection in India
Data Protection in IndiaData Protection in India
Data Protection in India
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Lesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxLesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptx
 
Cie 2 cyber law
Cie 2  cyber lawCie 2  cyber law
Cie 2 cyber law
 
Legal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityLegal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information Security
 
Information Security and the Protection of Personal Data in Universities
Information Security and the Protection of Personal Data in UniversitiesInformation Security and the Protection of Personal Data in Universities
Information Security and the Protection of Personal Data in Universities
 
Solutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionSolutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryption
 
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptxOVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
 
Www.ico.org.uk ~ media_documents_library_data_protection_practical_applicatio...
Www.ico.org.uk ~ media_documents_library_data_protection_practical_applicatio...Www.ico.org.uk ~ media_documents_library_data_protection_practical_applicatio...
Www.ico.org.uk ~ media_documents_library_data_protection_practical_applicatio...
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulation
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Philippine Data Privacy Act of 2012 (RA 10173)
Philippine Data Privacy Act of 2012 (RA 10173)Philippine Data Privacy Act of 2012 (RA 10173)
Philippine Data Privacy Act of 2012 (RA 10173)
 
Privacy_Trends
Privacy_TrendsPrivacy_Trends
Privacy_Trends
 
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
 
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
 
Lecture 8.pdf
Lecture 8.pdfLecture 8.pdf
Lecture 8.pdf
 
An Indian Outline on Database Protection
An Indian Outline on Database ProtectionAn Indian Outline on Database Protection
An Indian Outline on Database Protection
 
Christopher Millard Legally Compliant Use Of Personal Data In E Social Science
Christopher Millard   Legally Compliant Use Of Personal Data In E Social ScienceChristopher Millard   Legally Compliant Use Of Personal Data In E Social Science
Christopher Millard Legally Compliant Use Of Personal Data In E Social Science
 
GDPR - The new era of data protection
GDPR - The new era of data protectionGDPR - The new era of data protection
GDPR - The new era of data protection
 

Kürzlich hochgeladen

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Kürzlich hochgeladen (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

Privacy Impact Assessment Methodologies for Protection of Personal Data

  • 1. 3. ULUSLARARASI KATILIMLI 3rd INFORMATION SECURITY & BÝLGÝ GÜVENLÝÐÝ VE CRYPTOLOGY CONFERENCE KRÝPTOLOJÝ KONFERANSI WITH INTERNATIONAL PARTICIPATION Privacy Impact Assessment Methodologies for Protection of Personal Data Okyar TAHAOĞLU, Yalçın ÇEBİ --Bodily privacy, which concerns the protection of Abstract—This paper presents a brief summary of the Privacy people's physical selves against invasive procedures such as Impact Assessment (PIA) methodologies proposed for the genetic tests, drug testing and cavity searches; protection of personal data against misuse, collection and process --Privacy of communications, which covers the security risks. The methodologies presented in this paper shed light on the and privacy of mail, telephones, e-mail and other forms of professional community’s effort and government’s governance responsibilities to assess and control these inherent risks. Clearly, communication; and as Information and Communication Technologies become --Territorial privacy, which concerns the setting of limits increasingly more complex, individual knowledge, judgment, and on intrusion into domestic and other environments such as the expertise will not suffice and systemic methodologies for risk workplace or public space. management such as those presented in this paper become In this paper we will use privacy as “information privacy of imperative. Our observation, which is based on the workforce personal data” and we will investigate on how personal spent by the government institutions to protect personal data and the benchmark of our country’s draft Data Protection Act information can be protected by organizations under an regulation with the developed countries, is further amplified by assumption that privacy legislations exist in Turkey. On the the fact that privacy risk is among the least measured or other hand in several papers it is criticized that “information managed in a system today. systems security” is not discussed sufficiently in Turkey [3]. Accordingly we hope this paper may initiate a discussion in Keywords Index Terms—Personal data protection, Privacy impact security of personally identifiable information. assessment I. INTRODUCTION II. LEGISLATIONS A. Data Protection Legislations P ERSONALLY identifiable information is defined as any information relating to an identified or identifiable individual. Such information includes, but is not limited to, the The genesis of modern legislation in this area can be traced to the first data protection law in the world enacted in the customer's name, address, telephone number, social Land of Hesse in Germany in 1970 [4]. The Council of security/insurance or other government identification Europe's “Convention for the Protection of Individuals with numbers, employer, credit card numbers, personal or family regard to the Automatic Processing of Personal Data 1981 financial information, personal or family medical information, (Directive 108)” is a reference for today’s data protection employment history, history of purchases or other legislation [5]. transactions, credit records and similar information [1]. Other current directives force the member states of the Personal data can be defined as all of the information that can European Union (EU) to prepare and deploy their own data express any opinion about an individual or corporate. protection laws. These legislations aim to keep the security On the other hand protection of confidentiality and secrecy level of data used and shared among the states for commercial, of personally identifiable information is basically called as legislative and social objects [6]. The baseline of the security privacy. Privacy has several more meanings and privacy in the level is set by the Directive 108. Each country must look for a context of personal data can be divided into the following data protection act from the other member while sharing separate but related concepts: [2] personal data. --Information privacy, which involves the establishment of B. Turkish Draft Data Protection Act rules governing the collection and handling of personal data such as credit information, and medical and government Every Turkish citizen has rights protected by the organic records. It is also known as “data protection”; law about protection of private and family life [7]. Additionally, Turkey has signed the Directive 108 in the same year it has been approved by the EU. Therefore a privacy and Manuscript received November 10, 2008. data protection act is expected from Turkey since then. A draft Okyar TAHAOĞLU is with the Computer Engineering Department,Dokuz Eylül University, İzmir, 35160 Turkey (okyar.tahaoglu@turkcell.com.tr). “Personal Data Protection Act” is currently being prepared but Yalçın ÇEBİ is with the Computer Engineering Department, Dokuz Eylül has not been enacted yet. The draft act is a regulation that University, İzmir, 35160 Turkey (yalcin@cs.deu.edu.tr). draws the boundaries of usage and processing practices of data Bildiriler Kitabý 25•26•27 Aralýk December 2008 • Ankara / TÜRKİYE Proceedings 249
  • 2. 3. ULUSLARARASI KATILIMLI 3rd INFORMATION SECURITY & BÝLGÝ GÜVENLÝÐÝ VE CRYPTOLOGY CONFERENCE KRÝPTOLOJÝ KONFERANSI WITH INTERNATIONAL PARTICIPATION [8]. It is expected that this draft act will be in action in the TABLE I TEN PRINCIPLES OF PIAS following years. Compliance with the privacy laws always took long time for the private and government organizations. Principle Code for Protection of Personal Data Therefore authorities who are responsible for the governance Accountability Each government organization is responsible for of privacy protection usually give a considerable time for the personal information under its control and shall organizations to ready. When this period is considered designate an individual who is accountable for the organizations must begin using privacy protection organization’s compliance with privacy regulations. methodologies without waiting for the legislation. Some acts Identifying purposes Individuals must be informed during the collection especially related to specific sectors (telecommunication, of personal information. finance, health etc.) also force protection of private Consent Knowledge and consent is required for the collection, use, or disclosure of personal information. On the other hand, we see that socially developed information. nations which have high human development indexes and Limiting collection Minimum required information shall be collected freedom of information levels like Canada prepare by fair and lawful means. Limiting use, Personal information shall not be used or disclosed methodologies which include best practices and management disclosure and for purposes other than those for which it was guidelines for organizations to help them assure compliance retention collected, except with the consent of the individual with data protection legislations. This enables the legal bodies or as required by law. Personal information should only be kept as long as necessary. to act as corrective, detective and preventive controls rather Accuracy Personal information shall be as accurate, than penalty authorities. Management of personal data in safe complete, and up-to-date. harbors requires fully implementation formation shall be protected against unauthorized d and organizational controls. Thus selec cess, copying, disclosure, use or modification. rsonal information management policies and done in a systematic way. actices must be available to the public. n individual shall be able to ask the status of /her own information and have access for any date. III. PRIVACY IMPACT AS n individual shall be able to address a challenge In this section we examine gener ncerning compliance with the above principles. Protection Framework and we will us as a guide to make conclusions for a su s are included in the Personal practice in Turkey. Office of the Pri n and Electronic Documents Act, Canada has a privacy framework inclu or privacy law [11]. Therefore for individuals and businesses, e-learn sider these principles and should assure privacy and personal data processing which collect, use, store and transfer procedures and guidelines for Privac nformation are assessed accordingly. We believe investigating the Canadian ations must perform a PIA in order to clues about the facts we will face in the n new programs, acquisition of new Privacy Impact Assessments (PIAs integration of distributed systems in help determine whether technologies, i agencies. Major changes to existing processes of a project meet privacy reg technology architecture, additional measures technical compliance with channel release for a governmental defines the gaps between the practices n change, a new plan to collect citizens’ are used to identify privacy vulnerabilities and risks of new or personal data and outsourced operations are some examples redesigned programs, products or services. Canadian where PIAs must be initiated. government uses PIA as a tool to assess government projects Usually two kinds of PIAs are used; preliminary PIA and against privacy risks. PIAs take a close look at how full-cycle PIA. Preliminary PIA is used at the initial phase of a government departments protect personal information as it is project to determine whether a full-cycle PIA is needed. If collected, stored, used, disclosed and ultimately destroyed. personal data is not used or processed or transferred in the These assessments help create a privacy-sensitive culture in corresponding system preliminary assessment may find there government departments [9]. All federal departments, are no or minimal privacy risks. This approach saves resources agencies and institutions conduct PIAs for new or redesigned and time for the project. programs and services that raise privacy issues. The Another way to save resources is using self-assessment governmental institutions which must implement PIA as a tool where individual government departments conduct their own in new system designs are listed in the Canadian Privacy Act PIAs. Therefore each governmental agency must have of 1985 in detail [10]. educated professionals from various departments (Information Technology, legal, business analysis, project management A. Fundamental Principles of PIA etc.) of the organization. In order to have a standard privacy baseline for PIAs ten fundamental principles are defined. The fundamental principles of Canadian PIAs are shown in Table I. These fair Bildiriler Kitabý 25•26•27 Aralýk December 2008 • Ankara / TÜRKİYE Proceedings 250
  • 3. 3. ULUSLARARASI KATILIMLI 3rd INFORMATION SECURITY & BÝLGÝ GÜVENLÝÐÝ VE CRYPTOLOGY CONFERENCE KRÝPTOLOJÝ KONFERANSI WITH INTERNATIONAL PARTICIPATION privacy issues of a number of government programs. A PIA is a tool that helps ensure privacy protection is a core consideration when a project is planned and implemented. The whole process aims to force organizations to conduct PIA in Organizations Authority Individuals case of new system development, integration and acquisition. Guidelines prepared by the Authorities intend to provide instructions for completion of PIA. It includes checklists to PrivacyImpact Assesment Framework determine whether a full PIA is required, measurement tools to identify required set of skills and expertise (security, legal, Policy Risk Assessment Audit • Application • Observations operational, and technology), and questionnaires assuring that • Accountability Identify •R ecommendations PIA seeks for the entire Privacy Act principles. • Monitoring • Maturity Levels Risk management process must include at least these key steps: [12] Guidelines Report Analyse Awareness 1) Scope of the PIA must be determined. It must not be too • Resources • E-learning • Data Flow • Privacy Assistant wide thus it will be impractical to assess the entire system Data •R eport Flow but also must not be too narrow where personal data may be out of scope. As a result of this Preliminary Privacy Fig. 1. Privacy Impact Assessment Framework components. Impact Assessment process organizations decide PIA. This step can be repeated if a B. Role of the Authority s place in the project. analyzed. A detailed data flow diagram As previously defined an inde covering the business processes and responsible for the governance of data . The purpose of this step is to depict each country. The authorities are re ation flows. infrastructures to make the acts pos must be conducted from a risk supporting regulations, registry sy ective. The privacy analysis examines mechanisms. Each European Union m e context of applicable privacy policies names for this authority like, reg hecklists are used in this stage to supervisor or commissioner. For examp acy risks and or vulnerabilities. name their central authorities as Eur published. A document including the Supervisor, Information Commissione rivacy risks, implications and possible Authority respectively. cing countermeasures is published as a The role of the authority in P framework to assess the impacts effe signed as an effective communications that privacy issues are clearly cover of stakeholders. If PIA system is a Authority acts a consultant and prog duals would be the customers of this organizations. During the annual risk t reports of PIAs must be available to each organization is expected to subm ther hand, a national wide privacy authority. The authority may pro can only be achieved by raising the recommendations to these p awareness of individuals of the citizenry. Online leaning can recommendations help the organizations to decide the scope of be the most effective and economic way of an awareness their privacy assessment plans and to appoint necessary program. Individuals must be able to ask to the Authority for resources for PIAs. assistance. Authorities are also responsible for auditing whether Periodic audits must be performed periodically to review government organizations and agencies are giving importance that privacy directives are applied by organizations. Audits to personal data privacy and assures that PIAs are conducted must assess; PIAs are done for necessary projects, risks are as planned. It may not always be possible to make on site reported to the organizations’ managers, recommended audits in organizations but authorizes use self assessment and countermeasures are implemented, result reports are accurate, reporting techniques to audit such organizations. available and understandable for public. The Authority must C. PIA Life Cycle be able to conduct on-site and off-site audits specific for each Several system and methodologies are integrated to form sectors (finance, communication, health, government, PIA framework. The building blocks of a PIA framework as education etc.). shown in Fig. 1 are policy and guideline documentation, a risk assessment life cycle, audit system and awareness program for the related parties. The PIA policy helps to improve the awareness of privacy within government institutions. It has focuses on the potential Bildiriler Kitabý 25•26•27 Aralýk December 2008 • Ankara / TÜRKİYE Proceedings 251
  • 4. 3. ULUSLARARASI KATILIMLI 3rd INFORMATION SECURITY & BÝLGÝ GÜVENLÝÐÝ VE CRYPTOLOGY CONFERENCE KRÝPTOLOJÝ KONFERANSI WITH INTERNATIONAL PARTICIPATION IV. CONCLUSION [9] Fact Sheet, Officer of the Privacy Commissioner of Canada, Feb. 2, 2007, Available: http://www.privcom.gc.ca/fs-fi/02_05_d_33_e.asp Even though the government institutions are advised to [10] Canadian Privacy Act, Department of Justice Canada, R.S., 1985, p-21. implement PIAs, all organizations which are in the scope of [11] Canadian Personal Information Protection and Electronic Documents Act, (2000, c. 5), Department of Justice Canada, schedule.1, sec. 5. the draft Turkish Data Protection Act must implement PIA [12] Privacy Impact Assessment Guidelines: A Framework to Manage methodologies in their organizations. E-Government Privacy Risks, Treasury Board of Canada Secretariat, 2002. infrastructure must also include PIA tools since it consists of [13] UN e-Government Survey 2008, United Nations, New York, 2008. multiple distributed systems and it interconnects these systems under single architecture. E-Government activities are also in planning phase in Turkey and it is expected to be in action soon. It is known that e-Government transition has an access point for the citizens called “e-gate”. It includes identification, authentication and authorization functionalities and these controls enable protection of personal data. This is an international problem, thus the relationship between information security, individual privacy and service delivery is complex and dependent to a significant degree on the level of trust accorded to the public sector by the citizenry. Turkey, like all governments must address both the perceptions and realities of privacy within a broader spectrum of information and identity management that is at the core of both better client centric responsiveness externally and the corresponding need for new forms of coordination internally. There are two interrelated components in doing so: putting in place an infrastructure of reliable interoperability and ensuring mechanisms for accurate identity authentication [13]. Today, organizations are faced with many different and changing types of risk. Changes in new technologies (like Radio Frequency Identification, social networking sites, new online payment systems, etc.) must be followed very closely and new privacy risks must be added to PIA policies, guidelines and checklists by the Authority. Personal data of public must be assessed as a valuable asset and be protected necessarily. Government agencies, universities, public bodies, financial institutions, telecom operators, hospitals, insurance companies and other private companies must implement and continue maintaining practical PIA tools and methods without waiting privacy legislations. This will increase valuation of the entire information systems in Turkey by raising confidence among individuals. REFERENCES [1] T. Karol, “Cross-Border Privacy Impact Assessments: An Introduction”, Information Systems Control J., vol. 3, 2001. [2] Overview of Privacy, Privacy International, London, UK, 2005. [3] G. Canbek, Ş. Sağıroğlu, “A Review on Information, Information Security and Security Processes”, J. of Polytechnic, vol. 9, no. 3, pp. 165-174, 2006. [4] C. J. Bennett, Regulating Privacy: Data Protection and Public Policy in Europe and the United States. Cornell University Press, 1992, pp. 48. [5] Convention for the Protection of Individuals with Regards to Automatic Processing of Personal Data, Council of Europe, European Treaty Series, 1981, no. 108. [6] Y. Çebi, O. Tahaoğlu, “Personal Data Protection in Turkey: Technical and Managerial Controls”, in Proc. First International Conference on Security of Information and Networks, Gazimagusa, pp 220-227. [7] Organic Law of Turkish Republic, Grand National Assembly of Turkey, Nov. 7, 1982, Available: http://www.tbmm.gov.tr/Anayasa.htm [8] Current Draft Acts in the Commission, Ministry of Justice Official Web Page, Nov. 2, 2005, Available: http://www.kgm.adalet.gov.tr/tbmmtas.htm Bildiriler Kitabý 25•26•27 Aralýk December 2008 • Ankara / TÜRKİYE Proceedings 252