SlideShare a Scribd company logo
1 of 18
Privacy and Data Protection:
a primer
September, 2018
Privacy Paradox
How we fear threats on one hand and yet voluntarily give away data
elsewhere. Researchers call this conundrum the
"privacy paradox".
"In a marketplace, there's cooperation and there's definitely an effort
to compete by giving people what they want. But there's also the
prospect of extracting as much rent as you can." But ultimately,...
users' primary concern comes down to this:
"People are worried about getting taken advantage of."
Privacy: a primer
US: “right to privacy” cobbled together via case
law (Supreme Court)
“The right to privacy refers to the concept that
one's personal information is protected from
public scrutiny.”
…so what could be personal information?
…does this apply equally across all forms of
information?
What is Personal Identifiable Information (PII)?
Any representation of information that permits the identity of an individual to
whom the information applies to be reasonably inferred by either direct or
indirect means. Further, PII is defined as information: (i) that directly identifies
an individual (e.g., name, address, social security number or other identifying
number or code, telephone number, email address, etc.) or (ii) by which an
agency intends to identify specific individuals in conjunction with other data
elements, i.e., indirect identification. (These data elements may include a
combination of gender, race, birth date, geographic indicator, and other
descriptors). Additionally, information permitting the physical or online
contacting of a specific individual is the same as personally identifiable
information. This information can be maintained in either paper, electronic or
other media.
PII Legally recognized ‘protected classes’ in US
Race (Civil Rights Act of 1964)
Color (Civil Rights Act of 1964)
Sex (Equal Pay Act of 1963;Civil Rights Act of 1964)
Religion (Civil Rights Act of 1964)
National origin (Civil Rights Act of 1964)
Citizenship (Immigration Reform and Control Act)
Age (Age Discrimination in Employment Act of 1967)
Pregnancy (Pregnancy Discrimination Act)
Familial status (Civil Rights Act of 1968)
Disability status (Rehabilitation Act of 1973; Americans with Disabilities Act of 1990)
Veteran status (Vietnam Era Veterans' Readjustment Assistance Act of 1974;
Uniformed Services Employment and Reemployment Rights Act)
Genetic information (Genetic Information Nondiscrimination Act)
Data Protection
The Management of Personal Information. Data protection is about securing
data against unauthorized access. Data privacy is about authorized access —
who has it and who defines it. Another way to look at it is this: Data protection
is essentially a technical issue, whereas data privacy is a legal one.
In Storage, data protection is the assurance that data is not corrupted, is
accessible for authorized purposes only, and is in compliance with applicable
requirements.
In Security, data protection is the implementation of appropriate administrative,
technical or physical means to guard against unauthorized intentional or
accidental disclosure, modification , or destruction.
General Data Protection Regulation (GDPR)
Personal data (GDPR) is any information
that relates to an identified or identifiable
living individual.
Different pieces of information, which
collected together can lead to the
identification of a particular person, also
constitute personal data.
- European Commission
https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/
GDPR Data Subject Rights
● Breach Notification
● Right to Access
● Right to Be Forgotten
● Data Portability
● Privacy by Design
● Data Minimization
● Data Protection Officers
Two key words on Privacy
TRUST - INFORMED CONSENT
The generation of Trust
Trust is defined as the confidence in something, or to believe
in someone based on fairness, truth and reliability.
Within the context of Privacy and Data Protection, the following are
principles for building Trust:
Privacy by design - transparency - data minimization - robust
cybersecurity - Accountability - Fairness - Utility - Empathy and
Respect : Human Centric design
The power of informed consent
Consent is an outcome, resulting from a mechanism which strives to obtain it.
Merely having an individual check a box or sign a piece of paper is not enough.
You must demonstrate that you gave the individual, in a clear and easy to
understand fashion, the information necessary to understand the scope and
impact of the data processing.
Informed consent cannot happen without a clear
description of how data is going to be used, by who
and under which context.
Privacy by Design - Implementation in practice
Principle 1: Proactive not reactive: preventative not remedial
Principle 2: Privacy as the default setting
Principle 3: Privacy embedded into design
Principle 4: Full functionality: positive-sum, not zero-sum
Principle 5: End-to-end security: full lifecycle protection
Principle 6: Visibility and transparency: keep it open
Principle 7: Respect for user privacy: keep it user-centric
Privacy and Data Protection Assessment
● Who/Recipients - People, organizations and
technologies who are the senders, recipients, and
subjects of information.
● What/Information - Information type, data fields
being used, transmitted or processed
● How/Transformation principles - Constraints and
processing through the flow of information.
● Why - Purpose of the use of information
● Where - foreseen effects due to the use or processing
of this information
Privacy and Data Protection Risks
Security. Protect Personal Identifiable Information (PII)
Potential discrimination. Big data tools can multiply internal bias effects and
become a tool for exclusion.
Non compliance. Small data stakeholders are usually in risk of data breachers
or exposing information that may lead to de-anonymization of information.
Accuracy. If inaccuracies exist in data sets, it can lead to negative effects to
individuals or communities.
Transparency. Lack of accountability may lead to distrust of any further
analysis.
Education. Lack of training and use of tools may create false conclusions, as well
as expose private data or data that may allow de-anonymization of datasets.
Final remarks
“Privacy is not something that one has, but something that one seeks to
achieve. It requires constant negotiation as information flows and contexts
shift.
To achieve privacy in a networked world, people must actively try to
manage the various social situations in which information is accessed,
consumed, interpreted, and shared.
They cannot simply focus on restricting the flow of information; they
must also account for the ways in which information is inferred and
used.”
-
Reframing Privacy, Data & Society
Contacts
Judith Mowry - Office of Equity and Human Rights
Judith.Mowry@portlandoregon.gov
Hector Dominguez - SmartCityPDX - Bureau of Planning and Sustainability
Hector.Dominguez@portlandoregon.gov
Elisabeth Perez - Mayor’s office
Elisabeth.Perez@portlandoregon.gov
Further readings
http://fortune.com/2018/04/10/facebook-cambridge-analytica-what-happened/
https://www.ftc.gov/equifax-data-breach
https://www.washingtonpost.com/news/the-switch/wp/2018/03/01/equifax-keeps-finding-
millions-more-people-who-were-affected-by-its-massive-data-breach/
https://www.forbes.com/sites/bernardmarr/2018/05/21/how-much-data-do-we-create-
every-day-the-mind-blowing-stats-everyone-should-read/
https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-
gdpr/individual-rights/
https://ico.org.uk/for-organisations/guide-to-data-protection/data-protection-principles/
https://ico.org.uk/for-organisations/guide-to-data-protection/conditions-for-processing/
https://en.wikipedia.org/wiki/Privacy_by_design
https://media.nesta.org.uk/documents/DECODE-2018_report-smart-cities.pdf

More Related Content

What's hot

“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation tomasztopa
 
Presentation3
Presentation3Presentation3
Presentation3ITNet
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacyimehreenx
 
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...VALLOYD
 
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015ICT Watch
 
Pubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David MinkPubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David MinkMatt Siltala
 
Big Data and Big Law at Walmart - StampedeCon 2013
Big Data and Big Law at Walmart - StampedeCon 2013Big Data and Big Law at Walmart - StampedeCon 2013
Big Data and Big Law at Walmart - StampedeCon 2013StampedeCon
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challengemsdee3362
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal informationUc Man
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentationmlw32785
 
E governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalfE governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalfE-Journal ICT4D
 
Privacy by design for startups: legal and technology
Privacy by design for startups: legal and technologyPrivacy by design for startups: legal and technology
Privacy by design for startups: legal and technologyIshay Tentser
 
4. florence dupre new usagesprivacy legal framework fd
4. florence dupre new usagesprivacy legal framework fd4. florence dupre new usagesprivacy legal framework fd
4. florence dupre new usagesprivacy legal framework fdGlobalForum
 
Privacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable ClaimsPrivacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable ClaimsDavid Wood
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protectionsp_krishna
 
Solutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionSolutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionTrend Micro
 
661 lead discussion
661   lead discussion661   lead discussion
661 lead discussionguest62b6b81
 

What's hot (20)

“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
Presentation3
Presentation3Presentation3
Presentation3
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
 
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
 
Pubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David MinkPubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David Mink
 
Big Data and Big Law at Walmart - StampedeCon 2013
Big Data and Big Law at Walmart - StampedeCon 2013Big Data and Big Law at Walmart - StampedeCon 2013
Big Data and Big Law at Walmart - StampedeCon 2013
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
 
Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
E governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalfE governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalf
 
Privacy by design for startups: legal and technology
Privacy by design for startups: legal and technologyPrivacy by design for startups: legal and technology
Privacy by design for startups: legal and technology
 
4. florence dupre new usagesprivacy legal framework fd
4. florence dupre new usagesprivacy legal framework fd4. florence dupre new usagesprivacy legal framework fd
4. florence dupre new usagesprivacy legal framework fd
 
Privacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable ClaimsPrivacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable Claims
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
 
Solutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionSolutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryption
 
Trust and inclusion
Trust and inclusionTrust and inclusion
Trust and inclusion
 
661 lead discussion
661   lead discussion661   lead discussion
661 lead discussion
 

Similar to Privacy and data protection primer - City of Portland

Privacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishPrivacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishRSIS International
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
Lesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxLesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxadnis1
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsAT Internet
 
Links Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docxLinks Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docxsmile790243
 
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Ted Myerson
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Fullgloriakt
 
Mantelero collective privacy in3_def
Mantelero collective privacy in3_defMantelero collective privacy in3_def
Mantelero collective privacy in3_defAlessandro Mantelero
 
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptxETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptxurvashipundir04
 

Similar to Privacy and data protection primer - City of Portland (13)

Privacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishPrivacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or Perish
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Lesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxLesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptx
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
Privacy and Surveillance
Privacy and SurveillancePrivacy and Surveillance
Privacy and Surveillance
 
Links Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docxLinks Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docx
 
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
 
Finding balance in the age of open data
Finding balance in the age of open dataFinding balance in the age of open data
Finding balance in the age of open data
 
G0953643
G0953643G0953643
G0953643
 
Marden - Privacy in the 21st Century Why It Matters Now More Than Ever
Marden - Privacy in the 21st Century Why It Matters Now More Than EverMarden - Privacy in the 21st Century Why It Matters Now More Than Ever
Marden - Privacy in the 21st Century Why It Matters Now More Than Ever
 
Mantelero collective privacy in3_def
Mantelero collective privacy in3_defMantelero collective privacy in3_def
Mantelero collective privacy in3_def
 
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptxETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
 

More from Hector Dominguez

Surveillance technologies a primer
Surveillance technologies  a primerSurveillance technologies  a primer
Surveillance technologies a primerHector Dominguez
 
Optimizing water use in agriculture - SmartVinayerds
Optimizing water use in agriculture - SmartVinayerdsOptimizing water use in agriculture - SmartVinayerds
Optimizing water use in agriculture - SmartVinayerdsHector Dominguez
 
Water innovation and IoT technology
Water innovation and IoT technologyWater innovation and IoT technology
Water innovation and IoT technologyHector Dominguez
 
¿Ya superaste la cacofobia?
¿Ya superaste la cacofobia?¿Ya superaste la cacofobia?
¿Ya superaste la cacofobia?Hector Dominguez
 
Presentacion economia solidaria 2013
Presentacion economia solidaria   2013Presentacion economia solidaria   2013
Presentacion economia solidaria 2013Hector Dominguez
 
Presentacion social responsibility
Presentacion social responsibilityPresentacion social responsibility
Presentacion social responsibilityHector Dominguez
 
Sustainable Manufacturing South-South PSU Vietnam forum
Sustainable Manufacturing South-South PSU Vietnam forumSustainable Manufacturing South-South PSU Vietnam forum
Sustainable Manufacturing South-South PSU Vietnam forumHector Dominguez
 
Sesion 8 regulaciones ambientales
Sesion 8   regulaciones ambientalesSesion 8   regulaciones ambientales
Sesion 8 regulaciones ambientalesHector Dominguez
 
Sesion 7 deseño de productos sustentables
Sesion 7   deseño de productos sustentablesSesion 7   deseño de productos sustentables
Sesion 7 deseño de productos sustentablesHector Dominguez
 
Bici maquinas presentación
Bici maquinas presentaciónBici maquinas presentación
Bici maquinas presentaciónHector Dominguez
 
Manufactura sustentable: Realidades, Retos y Estrategias
Manufactura sustentable: Realidades, Retos y EstrategiasManufactura sustentable: Realidades, Retos y Estrategias
Manufactura sustentable: Realidades, Retos y EstrategiasHector Dominguez
 
Sesion 6 herramientas hacia la manufactura sustentable
Sesion 6   herramientas hacia la manufactura sustentableSesion 6   herramientas hacia la manufactura sustentable
Sesion 6 herramientas hacia la manufactura sustentableHector Dominguez
 
Sesion 5 metrica manufactura limpia
Sesion 5   metrica manufactura limpiaSesion 5   metrica manufactura limpia
Sesion 5 metrica manufactura limpiaHector Dominguez
 
Sesion 4 manufactura sustentable 2011
Sesion 4 manufactura sustentable 2011Sesion 4 manufactura sustentable 2011
Sesion 4 manufactura sustentable 2011Hector Dominguez
 
Sesion 3 Manufactura Verde 2011
Sesion 3   Manufactura Verde 2011Sesion 3   Manufactura Verde 2011
Sesion 3 Manufactura Verde 2011Hector Dominguez
 
Sesion 2 Economía Ecológica
Sesion 2   Economía Ecológica Sesion 2   Economía Ecológica
Sesion 2 Economía Ecológica Hector Dominguez
 
Sesion 1 introduccion sustentabilidad
Sesion 1   introduccion sustentabilidadSesion 1   introduccion sustentabilidad
Sesion 1 introduccion sustentabilidadHector Dominguez
 

More from Hector Dominguez (20)

Surveillance technologies a primer
Surveillance technologies  a primerSurveillance technologies  a primer
Surveillance technologies a primer
 
Optimizing water use in agriculture - SmartVinayerds
Optimizing water use in agriculture - SmartVinayerdsOptimizing water use in agriculture - SmartVinayerds
Optimizing water use in agriculture - SmartVinayerds
 
Water innovation and IoT technology
Water innovation and IoT technologyWater innovation and IoT technology
Water innovation and IoT technology
 
¿Ya superaste la cacofobia?
¿Ya superaste la cacofobia?¿Ya superaste la cacofobia?
¿Ya superaste la cacofobia?
 
Presentacion economia solidaria 2013
Presentacion economia solidaria   2013Presentacion economia solidaria   2013
Presentacion economia solidaria 2013
 
Presentacion social responsibility
Presentacion social responsibilityPresentacion social responsibility
Presentacion social responsibility
 
Presentacion real people
Presentacion real peoplePresentacion real people
Presentacion real people
 
Sustainable Manufacturing South-South PSU Vietnam forum
Sustainable Manufacturing South-South PSU Vietnam forumSustainable Manufacturing South-South PSU Vietnam forum
Sustainable Manufacturing South-South PSU Vietnam forum
 
Sesion 9 fábricas verdes
Sesion 9   fábricas verdesSesion 9   fábricas verdes
Sesion 9 fábricas verdes
 
Sesion 8 regulaciones ambientales
Sesion 8   regulaciones ambientalesSesion 8   regulaciones ambientales
Sesion 8 regulaciones ambientales
 
Sesion 7 deseño de productos sustentables
Sesion 7   deseño de productos sustentablesSesion 7   deseño de productos sustentables
Sesion 7 deseño de productos sustentables
 
Familia del magueyal
Familia del magueyalFamilia del magueyal
Familia del magueyal
 
Bici maquinas presentación
Bici maquinas presentaciónBici maquinas presentación
Bici maquinas presentación
 
Manufactura sustentable: Realidades, Retos y Estrategias
Manufactura sustentable: Realidades, Retos y EstrategiasManufactura sustentable: Realidades, Retos y Estrategias
Manufactura sustentable: Realidades, Retos y Estrategias
 
Sesion 6 herramientas hacia la manufactura sustentable
Sesion 6   herramientas hacia la manufactura sustentableSesion 6   herramientas hacia la manufactura sustentable
Sesion 6 herramientas hacia la manufactura sustentable
 
Sesion 5 metrica manufactura limpia
Sesion 5   metrica manufactura limpiaSesion 5   metrica manufactura limpia
Sesion 5 metrica manufactura limpia
 
Sesion 4 manufactura sustentable 2011
Sesion 4 manufactura sustentable 2011Sesion 4 manufactura sustentable 2011
Sesion 4 manufactura sustentable 2011
 
Sesion 3 Manufactura Verde 2011
Sesion 3   Manufactura Verde 2011Sesion 3   Manufactura Verde 2011
Sesion 3 Manufactura Verde 2011
 
Sesion 2 Economía Ecológica
Sesion 2   Economía Ecológica Sesion 2   Economía Ecológica
Sesion 2 Economía Ecológica
 
Sesion 1 introduccion sustentabilidad
Sesion 1   introduccion sustentabilidadSesion 1   introduccion sustentabilidad
Sesion 1 introduccion sustentabilidad
 

Recently uploaded

Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAroojKhan71
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFxolyaivanovalion
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceBDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceDelhi Call girls
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz1
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...amitlee9823
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxolyaivanovalion
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% SecurePooja Nehwal
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...amitlee9823
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxolyaivanovalion
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Valters Lauzums
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...amitlee9823
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightDelhi Call girls
 
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxBPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxMohammedJunaid861692
 
Data-Analysis for Chicago Crime Data 2023
Data-Analysis for Chicago Crime Data  2023Data-Analysis for Chicago Crime Data  2023
Data-Analysis for Chicago Crime Data 2023ymrp368
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxolyaivanovalion
 

Recently uploaded (20)

Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts ServiceCall Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
 
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFx
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceBDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptx
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
 
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxBPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
 
Data-Analysis for Chicago Crime Data 2023
Data-Analysis for Chicago Crime Data  2023Data-Analysis for Chicago Crime Data  2023
Data-Analysis for Chicago Crime Data 2023
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFx
 

Privacy and data protection primer - City of Portland

  • 1. Privacy and Data Protection: a primer September, 2018
  • 2.
  • 3. Privacy Paradox How we fear threats on one hand and yet voluntarily give away data elsewhere. Researchers call this conundrum the "privacy paradox". "In a marketplace, there's cooperation and there's definitely an effort to compete by giving people what they want. But there's also the prospect of extracting as much rent as you can." But ultimately,... users' primary concern comes down to this: "People are worried about getting taken advantage of."
  • 4. Privacy: a primer US: “right to privacy” cobbled together via case law (Supreme Court) “The right to privacy refers to the concept that one's personal information is protected from public scrutiny.” …so what could be personal information? …does this apply equally across all forms of information?
  • 5. What is Personal Identifiable Information (PII)? Any representation of information that permits the identity of an individual to whom the information applies to be reasonably inferred by either direct or indirect means. Further, PII is defined as information: (i) that directly identifies an individual (e.g., name, address, social security number or other identifying number or code, telephone number, email address, etc.) or (ii) by which an agency intends to identify specific individuals in conjunction with other data elements, i.e., indirect identification. (These data elements may include a combination of gender, race, birth date, geographic indicator, and other descriptors). Additionally, information permitting the physical or online contacting of a specific individual is the same as personally identifiable information. This information can be maintained in either paper, electronic or other media.
  • 6. PII Legally recognized ‘protected classes’ in US Race (Civil Rights Act of 1964) Color (Civil Rights Act of 1964) Sex (Equal Pay Act of 1963;Civil Rights Act of 1964) Religion (Civil Rights Act of 1964) National origin (Civil Rights Act of 1964) Citizenship (Immigration Reform and Control Act) Age (Age Discrimination in Employment Act of 1967) Pregnancy (Pregnancy Discrimination Act) Familial status (Civil Rights Act of 1968) Disability status (Rehabilitation Act of 1973; Americans with Disabilities Act of 1990) Veteran status (Vietnam Era Veterans' Readjustment Assistance Act of 1974; Uniformed Services Employment and Reemployment Rights Act) Genetic information (Genetic Information Nondiscrimination Act)
  • 7. Data Protection The Management of Personal Information. Data protection is about securing data against unauthorized access. Data privacy is about authorized access — who has it and who defines it. Another way to look at it is this: Data protection is essentially a technical issue, whereas data privacy is a legal one. In Storage, data protection is the assurance that data is not corrupted, is accessible for authorized purposes only, and is in compliance with applicable requirements. In Security, data protection is the implementation of appropriate administrative, technical or physical means to guard against unauthorized intentional or accidental disclosure, modification , or destruction.
  • 8. General Data Protection Regulation (GDPR) Personal data (GDPR) is any information that relates to an identified or identifiable living individual. Different pieces of information, which collected together can lead to the identification of a particular person, also constitute personal data. - European Commission https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/
  • 9. GDPR Data Subject Rights ● Breach Notification ● Right to Access ● Right to Be Forgotten ● Data Portability ● Privacy by Design ● Data Minimization ● Data Protection Officers
  • 10. Two key words on Privacy TRUST - INFORMED CONSENT
  • 11. The generation of Trust Trust is defined as the confidence in something, or to believe in someone based on fairness, truth and reliability. Within the context of Privacy and Data Protection, the following are principles for building Trust: Privacy by design - transparency - data minimization - robust cybersecurity - Accountability - Fairness - Utility - Empathy and Respect : Human Centric design
  • 12. The power of informed consent Consent is an outcome, resulting from a mechanism which strives to obtain it. Merely having an individual check a box or sign a piece of paper is not enough. You must demonstrate that you gave the individual, in a clear and easy to understand fashion, the information necessary to understand the scope and impact of the data processing. Informed consent cannot happen without a clear description of how data is going to be used, by who and under which context.
  • 13. Privacy by Design - Implementation in practice Principle 1: Proactive not reactive: preventative not remedial Principle 2: Privacy as the default setting Principle 3: Privacy embedded into design Principle 4: Full functionality: positive-sum, not zero-sum Principle 5: End-to-end security: full lifecycle protection Principle 6: Visibility and transparency: keep it open Principle 7: Respect for user privacy: keep it user-centric
  • 14. Privacy and Data Protection Assessment ● Who/Recipients - People, organizations and technologies who are the senders, recipients, and subjects of information. ● What/Information - Information type, data fields being used, transmitted or processed ● How/Transformation principles - Constraints and processing through the flow of information. ● Why - Purpose of the use of information ● Where - foreseen effects due to the use or processing of this information
  • 15. Privacy and Data Protection Risks Security. Protect Personal Identifiable Information (PII) Potential discrimination. Big data tools can multiply internal bias effects and become a tool for exclusion. Non compliance. Small data stakeholders are usually in risk of data breachers or exposing information that may lead to de-anonymization of information. Accuracy. If inaccuracies exist in data sets, it can lead to negative effects to individuals or communities. Transparency. Lack of accountability may lead to distrust of any further analysis. Education. Lack of training and use of tools may create false conclusions, as well as expose private data or data that may allow de-anonymization of datasets.
  • 16. Final remarks “Privacy is not something that one has, but something that one seeks to achieve. It requires constant negotiation as information flows and contexts shift. To achieve privacy in a networked world, people must actively try to manage the various social situations in which information is accessed, consumed, interpreted, and shared. They cannot simply focus on restricting the flow of information; they must also account for the ways in which information is inferred and used.” - Reframing Privacy, Data & Society
  • 17. Contacts Judith Mowry - Office of Equity and Human Rights Judith.Mowry@portlandoregon.gov Hector Dominguez - SmartCityPDX - Bureau of Planning and Sustainability Hector.Dominguez@portlandoregon.gov Elisabeth Perez - Mayor’s office Elisabeth.Perez@portlandoregon.gov
  • 18. Further readings http://fortune.com/2018/04/10/facebook-cambridge-analytica-what-happened/ https://www.ftc.gov/equifax-data-breach https://www.washingtonpost.com/news/the-switch/wp/2018/03/01/equifax-keeps-finding- millions-more-people-who-were-affected-by-its-massive-data-breach/ https://www.forbes.com/sites/bernardmarr/2018/05/21/how-much-data-do-we-create- every-day-the-mind-blowing-stats-everyone-should-read/ https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation- gdpr/individual-rights/ https://ico.org.uk/for-organisations/guide-to-data-protection/data-protection-principles/ https://ico.org.uk/for-organisations/guide-to-data-protection/conditions-for-processing/ https://en.wikipedia.org/wiki/Privacy_by_design https://media.nesta.org.uk/documents/DECODE-2018_report-smart-cities.pdf