This document outlines Marie-José Bonthuis' upcoming presentation on privacy and the blockchain. The presentation will include an introduction, discussions of privacy theory, blockchain theory including the "fallacy of the wrong level", privacy considerations in blockchain applications, and recommendations for a "privacy by design" approach. The agenda lists these topics and their scheduled times. Key concepts to be addressed include the contextual nature of privacy, how current privacy frameworks apply to blockchain technologies, and how privacy principles can be applied at different system scales.
6. 13:30 Introduction
13:45 Theory Privacy
14.00 Theory chains: fallacy of the wrong level
14:15 Privacy in chains (misunderstandings)
14:30 Recommendations ’Privacy by design’
14:45 Questions and round up
Agenda:
13:30 Introduction
13:45 Theory Privacy
14.00 Theory chains: fallacy of the wrong level
14:15 Privacy in chains (misunderstandings)
14:30 Recommendations ’Privacy by design’
14:45 Questions and round up
Agenda:
16. Fallacy of the wrong level
• Large scale systems work
differentially than small scale
systems!
• Examples: General practice center, electronic
health records, biometric visa, EU-exchange
of criminal judgments, municipalities and
youth healthcare
18. 1. A problem that can be felt everywhere in the
chain, and that none of the parties can solve on
their own.
2. Only good cooperation can prevent systematic
failure to discredit the chain as a whole.
• A coordinated approach and a dominant chain
problem should be the main trigger.
1818
Dominant Chain Problem
19. ‘Privacy by design’ and
blockchain(s)
• Classic method of computarization: Klassieke (push
and pull) en de privacyrisks:
• Actors decide; law prescribes: purpose limitation
• Broad consent versus accountability
• No overarching authority
• Privacy by design = get the right on the right
moment
20. Privacyconcepts in (block-)chains
• Dominant chain problem instead of controller (joint controller)?
• Processing personal data (purpose limitation, legitimate aim) versus
fallacy of the wrong level?
• Purpose limitation versus re/ de-contextualisation
• Legitimate aim/ consent 1:1; dcp?
• From push to pull (decentralisation); bold infrastructuur (get the right
on the right moment-> transactions versus content?)
• Data subject rights; erasure?