SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Professor Lilian Edwards –
University of Strathclyde
FSR April 2016
Lilian.edwards@strath.ac.uk
@lilianedwards
Privacy, the
Internet of
Things and
Smart Cities
1. What is the Internet of Things?
Ubiquitous, pervasive computing
(ubicomp)
 Smart meters
 Domestic and care robots
 Driverless or connected cars
(legalised Nevada, soon UK)
 Apps/wearables measuring not
just location but physical activity
– FitBits, Jawbones, Apple watch
etc
 Smart CCTV – image, sound and
behaviour, gait, face recognition
 Chips in human body – health
monitoring, data flow eg from
pacemaker
IoT fail
Barcelona clubbers get chipped
(2004)
BBC Science producer Simon Morton
goes clubbing in Barcelona with a
microchip implanted in his arm to
pay for drinks.
Imagine having a glass capsule
measuring 1.3mm by 1mm, about the size
of a large grain of rice injected under
your skin.
Last week I headed for the bright lights of
the Catalan city of Barcelona to enter the
exclusive VIP Baja Beach Club.
The night club offers its VIP clients the
opportunity to have a syringe-injected
microchip implanted in their upper arms
that not only gives them special access to
VIP lounges, but also acts as a debit
account from which they can pay for
drinks.
Epicenter Sweden 2015
RFID: enables IoT
 What is RFID? Radio Frequency Identification
chips. Current main uses: inventory tags, retail
chain barcoding, bag tracing, pets, transport
smart cards, tagged passports
 Identifies things not people.Early part of ”The
Internet of Things” or “ubiquitous computing”
(ubicomp).
 Essentially collects the location of an object.
 How great a threat to user privacy is it in reality?
Passports, smart cards, transport cards, internal
passes, library books, pupils, patients, prisoners?
 Currently mainly cheap, passive, low range.
 Primary worries originally about retail chain use.
2. “Ambient environments” and problems
for privacy
• Ubiquity = “invisible and seamlessly adaptive”
(Spiekerman and Pallas) . Adaptive – learn from ambient
total data collection, data not forgotten while useful
• Weiser – weaving themselves “into the fabric of
everyday life until they are indistinguishable from it”
• The more useful, the less obvious and the less
controlled by individual notice and choice.
• How can this match DP idea of privacy as individual right
to prior informed control of collection of data?
• Problem expands when IoT installed in
• public environments where no choice about sharing data except
to entirely reject service– smart roads, smart transport
• Public/private environments eg smart malls where footfall
measured from mobiles and possibly correlated with IDs via CCTV
or credit card billing
• What choice eg when smart meters mandated by EU to promote
environmental goals?
Sharing IoT data
 Like all PD, IoT derived data can be
reused
 “In 2006, the Guardian reported that police
had requested access to the personal
information of Oyster customers 243 times,
and that access had been granted 229 times.
Then in 2008, London's Evening Standard
reported that over 3,000 requests had been
made in under a year. Since then, 22,000
requests have been made by the
Metropolitan Police, according to figures
released by London’s transport authority in
February 2012, with 264 requests made in
the first two months of 2012 alone.”
.. Can be embarrassing..
IoT as 24/7 surveillance?
Guardian, 2015
 “We may find ourselves interacting with thousands of
little objects around us on a daily basis, each
collecting seemingly innocuous bits of data 24/7,
information these things will report to the cloud,
where it will be processed, correlated, and reviewed.
 Your smart watch will reveal your lack of exercise to
your health insurance company, your car will tell your
insurer of your frequent speeding, and your dustbin
will tell your local council that you are not following
local recycling regulations. This is the ‘internet of
stool pigeons’, and though it may sound far-fetched,
it’s already happening”
From the “Internet of Things” to smart cities
Smart meters
Smart cities – features/gains/problems
 Based around
 Networks of sensors attached to real world features (smart
homes, roads, meters, telehealth etc) often processing in real
time potentially personal data
 Acquisition and exploitation of “big data” acquired via these
sources and/or merged with other public and private datasets
 Massive cloud infrastructure for such collection, processing,
storage – often involving extra EU servers
 Often financed by public private partnership -> outsourcing of
“public” services – surveillance, health, waste? – to private cos
along with the [big]data
 Yet – heavily promoted to achieve energy efficiency;
sustainability; joined up transport; replacement of private by
shared vehicles; waste management; govt, welfare and
health savings; etc etc
3. Analysing DP law, consent and
the IoT
 Do IoT systems collect “personal data”? If so DPD/GDPR applies.
But in original conception (RFID chip) collected location of
thing, not person? Do more complex systems change this?
 DPD art 2 ( c) : “personal data' shall mean any information
relating to an identified or identifiable natural person ('data
subject'); an identifiable person is one who can be
identified, directly or indirectly, in particular by reference to
an identification number or to one or more factors specific
to his physical, physiological, mental, economic, cultural or
social identity;
 Many systems will claim either to collect non personal data
or to anonymise eg most mobile tracking systems where
location etc reused.
 Increasing ease of reidentification however?
If (a) personal data is
collected via IoT?
3 options for lawful processing (art 7 DPD)
 Consent of user (freely given, specific, informed, unambiguous and
signified) – v difficult?
 A29 WP IoT Opinion – data may be gathered and shared with little
or no transparency
 Consent very difficult to give, IoT systems may not have human
user interfaces
 Quality of consent eg via apps may be poor (and what if no
contractual nexus?)
 Often no real poss to refuse sharing data in IoT system without
refusing whole service cf new GDPR requirement
 “Legitimate interests” of data controller where not overridden by
fundamental interests of data controller
 Necc for entering contract/ necc to carry out task in public interest
But – (b) special rules for
location data
 Why?
 Beginning of ubiquity of collection of location data from
cellphones then GPS chips in smartphones and other
mobile gadgets eg tablets, smart cars etc
 Art 29 WP “movement patterns of owners.. provide a
very intimate insight into the private lives of owners”
 US FTC 2013: “mobile devices typically personal to
individual, almost always on, and with the user” ->
highly sensitive data
 Cf Public reaction against Google “Glassholes” –
essentially automated sousveillance – very strongly
negative
 Many or most IoT systems do collect “location data”
(LD) -> e-Privacy Directive 2002/2009 (PECD) applies
 See PECD, Art 2(c) reg 2 for definition LD:
“data processed in an electronic communications network
or by an electronic communications service indicating
the geographic position of the terminal equipment of a
user of a publicly available electronic communications
service”
 Much early concern if that definition matched
RFID systems, implying requirements over and
above basic DP
 Are RFID tags the “terminal equipment” of user? (Not
altered in main text in 2009 – however recital 56 after
2009 explicitly apply location and DP regime to RFID
chips “and similar”)
 PECD now applies since 2009 reforms to publicly
available networks or where use is made of “electronic
communications services as a basic infrastructure” –
most IoT systems now fit this
Location data : art 9 PECD
(not revised)
 For the purpose of marketing electronic communications
services or for the provision of “value added services “
 ..the provider of a publicly available electronic communications
service may process location data to the extent and for the
duration necessary for such services or marketing,
 if the subscriber or user to whom the data relate has given his
or /her consent.. And
 “prior to obtaining their consent”, informed re type of location
data other than traffic data which will be processed, purposes
and duration of the processing and whether the data will be
transmitted to a third party for the purpose of providing the
value added service
 Users or subscribers shall be given the possibility to
withdraw their consent for the processing of traffic data at
any time.
(c ) Confidentiality and art
5(3), PECD
 Requires consent informed by prior “clear and
comprehensive information” where (again) information is
stored on “terminal equipment of a user”
 Intended to catch cookies or spyware placed on users
hard disc or phone
 But how far applicable to IoT sensors collecting data
connected to person or household eg smart thermostats,
energy meters, connected car component monitors?
 A29WP argue a Fitbit (eg)is “terminal equipt” where info
stored (even tho probably quickly transferred to cloud)
 But is a smart car engine part? A household smart meter
or Nest thermostat?
In summary : re IoT and consent
 Basic DP law would probably accept non-consent grounds
for processing lawfully eg legitimate interests of data
controller
 Some data flows involving movements eg from smart
meters in homes, may be deemed "anonymised" and so
exempt from DP or PECD controls.
 Pseudonymised data in GDPR may also play a part
 Location data regime in PECD may apply but only when
collected by telco via the “terminal equipment of a user”
(see RFID above) and on sufficiently "public" network
 If so , prior informed consent needed plus ability to opt out
afterwards (art 9 PECD) and no substitute grounds
 Can such prior consent be sensibly given and collected in
modern pervasive IoT eg smart homes, smart cities?
 More issues – rights to object to automated processing, to
delete, RTBF?!
Solutions from Privacy by Design (PbD)
and Human Computer Interaction
(HCI)?
 Privacy impact assessments for smart cities as organic
wholes? 2009-2012 – negotiation of voluntary EU PIA
framework for RFID (Spiekkerman). Extended to a PIA for
Smart Meters since. Anecdotal low industry take up. But
DPIAs will be mandated by GDPR..
 New semi automated ways of giving consent eg home
dashboards; “pre” or “sticky” consent ( consent by
autonomous agent)
 Codes of practice disallowing or modifying certain consents
eg in smart meter apps
 Greater algorithmic transparency inc extension of right now in
GDPR (ex DPD art 12(a))
For more information --
 Edwards “Privacy, Security and Data
Protection in Smart Cities: A Critical EU
Law Perspective” (2016) European Data
Protection Law Review 28-58
 Edwards ed Law, Policy and the
Internet (Hart Publishing, forthcoming
2017)

Weitere ähnliche Inhalte

Was ist angesagt?

Introduction to IoT by Sachin Pukale
Introduction to IoT by Sachin PukaleIntroduction to IoT by Sachin Pukale
Introduction to IoT by Sachin PukaleTechXpla
 
Internet of things enabling tech - challenges - opportunities (2016)
Internet of things   enabling tech - challenges - opportunities (2016)Internet of things   enabling tech - challenges - opportunities (2016)
Internet of things enabling tech - challenges - opportunities (2016)Davor Dokonal
 
Covid-19 and IoT: Some Perspectives on the Use of IoT Technologies in Prevent...
Covid-19 and IoT: Some Perspectives on the Use of IoT Technologies in Prevent...Covid-19 and IoT: Some Perspectives on the Use of IoT Technologies in Prevent...
Covid-19 and IoT: Some Perspectives on the Use of IoT Technologies in Prevent...eraser Juan José Calderón
 
Supelec M2M IoT course 1 - introduction - Part 1/2 - 2012
Supelec  M2M IoT course 1 - introduction - Part 1/2 - 2012Supelec  M2M IoT course 1 - introduction - Part 1/2 - 2012
Supelec M2M IoT course 1 - introduction - Part 1/2 - 2012Thierry Lestable
 
Internet of things New Version 2017 Document
Internet of things New Version 2017 DocumentInternet of things New Version 2017 Document
Internet of things New Version 2017 DocumentAjith Kumar Ravi
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVEScsandit
 
IoT Training, Learn IoT From Scratch With Tonex Training
IoT Training, Learn IoT From Scratch With Tonex TrainingIoT Training, Learn IoT From Scratch With Tonex Training
IoT Training, Learn IoT From Scratch With Tonex TrainingBryan Len
 
8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world editedAhmed Banafa
 
The Internet of Things - Industry Trends and Key Players
The Internet of Things - Industry Trends and Key PlayersThe Internet of Things - Industry Trends and Key Players
The Internet of Things - Industry Trends and Key PlayersCM Research
 
M2M communications and internet of things for smart cities
M2M communications and internet of things for smart citiesM2M communications and internet of things for smart cities
M2M communications and internet of things for smart citiesSoumya Kanti Datta
 
IEEE SusTech IoT Keynote Presentation 10/10/16
IEEE SusTech IoT Keynote Presentation 10/10/16IEEE SusTech IoT Keynote Presentation 10/10/16
IEEE SusTech IoT Keynote Presentation 10/10/16Mark Goldstein
 
TheInternetofThings
TheInternetofThingsTheInternetofThings
TheInternetofThingsKimmiegrif
 
Next Decade of Internet of Things and its
Next Decade of Internet of Things and itsNext Decade of Internet of Things and its
Next Decade of Internet of Things and itsRuma Shukla
 
Iot trends and technologies development in terms of Machine Learning
Iot trends and technologies development in terms of Machine LearningIot trends and technologies development in terms of Machine Learning
Iot trends and technologies development in terms of Machine LearningDr.R. Gunavathi Ramasamy
 
Internet of things executive overview
Internet of things executive overviewInternet of things executive overview
Internet of things executive overviewProsun Roy
 
Strategic Patent Management & Monetization 2Q 2015
Strategic Patent Management & Monetization 2Q 2015Strategic Patent Management & Monetization 2Q 2015
Strategic Patent Management & Monetization 2Q 2015Alex G. Lee, Ph.D. Esq. CLP
 
Trust Modelling for Security of IoT Devices
Trust Modelling for Security of IoT DevicesTrust Modelling for Security of IoT Devices
Trust Modelling for Security of IoT Devicesijtsrd
 
Internet of Things- Applications
Internet of Things- ApplicationsInternet of Things- Applications
Internet of Things- ApplicationsRavindra Dastikop
 

Was ist angesagt? (20)

Introduction to IoT by Sachin Pukale
Introduction to IoT by Sachin PukaleIntroduction to IoT by Sachin Pukale
Introduction to IoT by Sachin Pukale
 
Internet of things enabling tech - challenges - opportunities (2016)
Internet of things   enabling tech - challenges - opportunities (2016)Internet of things   enabling tech - challenges - opportunities (2016)
Internet of things enabling tech - challenges - opportunities (2016)
 
Understanding big data using IoT
Understanding big data using IoTUnderstanding big data using IoT
Understanding big data using IoT
 
Covid-19 and IoT: Some Perspectives on the Use of IoT Technologies in Prevent...
Covid-19 and IoT: Some Perspectives on the Use of IoT Technologies in Prevent...Covid-19 and IoT: Some Perspectives on the Use of IoT Technologies in Prevent...
Covid-19 and IoT: Some Perspectives on the Use of IoT Technologies in Prevent...
 
Supelec M2M IoT course 1 - introduction - Part 1/2 - 2012
Supelec  M2M IoT course 1 - introduction - Part 1/2 - 2012Supelec  M2M IoT course 1 - introduction - Part 1/2 - 2012
Supelec M2M IoT course 1 - introduction - Part 1/2 - 2012
 
The internet of things
The internet of thingsThe internet of things
The internet of things
 
Internet of things New Version 2017 Document
Internet of things New Version 2017 DocumentInternet of things New Version 2017 Document
Internet of things New Version 2017 Document
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
 
IoT Training, Learn IoT From Scratch With Tonex Training
IoT Training, Learn IoT From Scratch With Tonex TrainingIoT Training, Learn IoT From Scratch With Tonex Training
IoT Training, Learn IoT From Scratch With Tonex Training
 
8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited
 
The Internet of Things - Industry Trends and Key Players
The Internet of Things - Industry Trends and Key PlayersThe Internet of Things - Industry Trends and Key Players
The Internet of Things - Industry Trends and Key Players
 
M2M communications and internet of things for smart cities
M2M communications and internet of things for smart citiesM2M communications and internet of things for smart cities
M2M communications and internet of things for smart cities
 
IEEE SusTech IoT Keynote Presentation 10/10/16
IEEE SusTech IoT Keynote Presentation 10/10/16IEEE SusTech IoT Keynote Presentation 10/10/16
IEEE SusTech IoT Keynote Presentation 10/10/16
 
TheInternetofThings
TheInternetofThingsTheInternetofThings
TheInternetofThings
 
Next Decade of Internet of Things and its
Next Decade of Internet of Things and itsNext Decade of Internet of Things and its
Next Decade of Internet of Things and its
 
Iot trends and technologies development in terms of Machine Learning
Iot trends and technologies development in terms of Machine LearningIot trends and technologies development in terms of Machine Learning
Iot trends and technologies development in terms of Machine Learning
 
Internet of things executive overview
Internet of things executive overviewInternet of things executive overview
Internet of things executive overview
 
Strategic Patent Management & Monetization 2Q 2015
Strategic Patent Management & Monetization 2Q 2015Strategic Patent Management & Monetization 2Q 2015
Strategic Patent Management & Monetization 2Q 2015
 
Trust Modelling for Security of IoT Devices
Trust Modelling for Security of IoT DevicesTrust Modelling for Security of IoT Devices
Trust Modelling for Security of IoT Devices
 
Internet of Things- Applications
Internet of Things- ApplicationsInternet of Things- Applications
Internet of Things- Applications
 

Ähnlich wie Privacy, the Internet of Things and Smart Cities

IoT with 5G-Network
IoT with 5G-NetworkIoT with 5G-Network
IoT with 5G-NetworkBelal Ashraf
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Thingsblogzilla
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptxssuserc5ee4c
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptxJanasudhan1
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptxSourajitMaity1
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptxChandravadhanaNaraya
 
Gilbert + Tobin Innovation Insights
Gilbert + Tobin Innovation InsightsGilbert + Tobin Innovation Insights
Gilbert + Tobin Innovation InsightsSue-Ann Wilson
 
Keeping Your Cloud Infrastructure Healthy with the Internet of Things
Keeping Your Cloud Infrastructure Healthy with the Internet of ThingsKeeping Your Cloud Infrastructure Healthy with the Internet of Things
Keeping Your Cloud Infrastructure Healthy with the Internet of ThingsJennifer Stern
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)GOPAL BASAK
 
02_Internet-of-things-Final PPT.pdf
02_Internet-of-things-Final PPT.pdf02_Internet-of-things-Final PPT.pdf
02_Internet-of-things-Final PPT.pdfPunamSurwase
 
Location, Location, Location? Legal and Privacy Issues around Processing of P...
Location, Location, Location? Legal and Privacy Issues around Processing of P...Location, Location, Location? Legal and Privacy Issues around Processing of P...
Location, Location, Location? Legal and Privacy Issues around Processing of P...lilianedwards
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obamaLilian Edwards
 
The death of data protection
The death of data protection The death of data protection
The death of data protection Lilian Edwards
 

Ähnlich wie Privacy, the Internet of Things and Smart Cities (20)

Iot report
Iot reportIot report
Iot report
 
IoT with 5G-Network
IoT with 5G-NetworkIoT with 5G-Network
IoT with 5G-Network
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
 
1. IoT.pptx
1. IoT.pptx1. IoT.pptx
1. IoT.pptx
 
IoT White Paper
IoT White PaperIoT White Paper
IoT White Paper
 
KPN and Connectivity
KPN and ConnectivityKPN and Connectivity
KPN and Connectivity
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
 
Gilbert + Tobin Innovation Insights
Gilbert + Tobin Innovation InsightsGilbert + Tobin Innovation Insights
Gilbert + Tobin Innovation Insights
 
The Internet Of Things UOP
The Internet Of Things UOPThe Internet Of Things UOP
The Internet Of Things UOP
 
Keeping Your Cloud Infrastructure Healthy with the Internet of Things
Keeping Your Cloud Infrastructure Healthy with the Internet of ThingsKeeping Your Cloud Infrastructure Healthy with the Internet of Things
Keeping Your Cloud Infrastructure Healthy with the Internet of Things
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
02_Internet-of-things-Final PPT.pdf
02_Internet-of-things-Final PPT.pdf02_Internet-of-things-Final PPT.pdf
02_Internet-of-things-Final PPT.pdf
 
123456.pptx
123456.pptx123456.pptx
123456.pptx
 
Location, Location, Location? Legal and Privacy Issues around Processing of P...
Location, Location, Location? Legal and Privacy Issues around Processing of P...Location, Location, Location? Legal and Privacy Issues around Processing of P...
Location, Location, Location? Legal and Privacy Issues around Processing of P...
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obama
 
The death of data protection
The death of data protection The death of data protection
The death of data protection
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 

Mehr von Lilian Edwards

Global Governance of Generative AI: The Right Way Forward
Global Governance of Generative AI: The Right Way ForwardGlobal Governance of Generative AI: The Right Way Forward
Global Governance of Generative AI: The Right Way ForwardLilian Edwards
 
How to regulate foundation models: can we do better than the EU AI Act?
How to regulate foundation models: can we do better than the EU AI Act?How to regulate foundation models: can we do better than the EU AI Act?
How to regulate foundation models: can we do better than the EU AI Act?Lilian Edwards
 
Can ChatGPT be compatible with the GDPR? Discuss.
Can ChatGPT be compatible with the GDPR? Discuss.Can ChatGPT be compatible with the GDPR? Discuss.
Can ChatGPT be compatible with the GDPR? Discuss.Lilian Edwards
 
What Do You Do with a Problem Like AI?
What Do You Do with a Problem Like AI?What Do You Do with a Problem Like AI?
What Do You Do with a Problem Like AI?Lilian Edwards
 
The GDPR, Brexit, the UK and adequacy
The GDPR, Brexit, the UK and adequacyThe GDPR, Brexit, the UK and adequacy
The GDPR, Brexit, the UK and adequacyLilian Edwards
 
Slave to the Algorithm 2016
Slave to the Algorithm  2016 Slave to the Algorithm  2016
Slave to the Algorithm 2016 Lilian Edwards
 
Cloud computing : legal , privacy and contract issues
Cloud computing : legal , privacy and contract issuesCloud computing : legal , privacy and contract issues
Cloud computing : legal , privacy and contract issuesLilian Edwards
 
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...Lilian Edwards
 
UK copyright, online intermediaries and enforcement
UK copyright, online intermediaries and enforcementUK copyright, online intermediaries and enforcement
UK copyright, online intermediaries and enforcementLilian Edwards
 
the Death of Privacy in Three Acts
the Death of Privacy in Three Actsthe Death of Privacy in Three Acts
the Death of Privacy in Three ActsLilian Edwards
 
Revenge porn: punish, remove, forget, forgive?
Revenge porn: punish, remove, forget, forgive? Revenge porn: punish, remove, forget, forgive?
Revenge porn: punish, remove, forget, forgive? Lilian Edwards
 
From piracy to “The Producers?
From piracy to “The Producers?From piracy to “The Producers?
From piracy to “The Producers?Lilian Edwards
 
The Death of Privacy in Three Acts
The Death of Privacy in Three ActsThe Death of Privacy in Three Acts
The Death of Privacy in Three ActsLilian Edwards
 
Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...Lilian Edwards
 
IT law : the middle kingdom between east and West
IT law : the middle kingdom between east and WestIT law : the middle kingdom between east and West
IT law : the middle kingdom between east and WestLilian Edwards
 
What do we do with aproblem like revenge porn ?
What do we do with  aproblem like  revenge porn ?What do we do with  aproblem like  revenge porn ?
What do we do with aproblem like revenge porn ?Lilian Edwards
 
Slave to the Algo-Rhythms?
Slave to the Algo-Rhythms?Slave to the Algo-Rhythms?
Slave to the Algo-Rhythms?Lilian Edwards
 
Cdas 2012, lilian edwards and edina harbinja
Cdas 2012, lilian edwards and edina harbinjaCdas 2012, lilian edwards and edina harbinja
Cdas 2012, lilian edwards and edina harbinjaLilian Edwards
 

Mehr von Lilian Edwards (20)

Global Governance of Generative AI: The Right Way Forward
Global Governance of Generative AI: The Right Way ForwardGlobal Governance of Generative AI: The Right Way Forward
Global Governance of Generative AI: The Right Way Forward
 
How to regulate foundation models: can we do better than the EU AI Act?
How to regulate foundation models: can we do better than the EU AI Act?How to regulate foundation models: can we do better than the EU AI Act?
How to regulate foundation models: can we do better than the EU AI Act?
 
Can ChatGPT be compatible with the GDPR? Discuss.
Can ChatGPT be compatible with the GDPR? Discuss.Can ChatGPT be compatible with the GDPR? Discuss.
Can ChatGPT be compatible with the GDPR? Discuss.
 
What Do You Do with a Problem Like AI?
What Do You Do with a Problem Like AI?What Do You Do with a Problem Like AI?
What Do You Do with a Problem Like AI?
 
The GDPR, Brexit, the UK and adequacy
The GDPR, Brexit, the UK and adequacyThe GDPR, Brexit, the UK and adequacy
The GDPR, Brexit, the UK and adequacy
 
Slave to the Algorithm 2016
Slave to the Algorithm  2016 Slave to the Algorithm  2016
Slave to the Algorithm 2016
 
Cloud computing : legal , privacy and contract issues
Cloud computing : legal , privacy and contract issuesCloud computing : legal , privacy and contract issues
Cloud computing : legal , privacy and contract issues
 
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
 
UK copyright, online intermediaries and enforcement
UK copyright, online intermediaries and enforcementUK copyright, online intermediaries and enforcement
UK copyright, online intermediaries and enforcement
 
The GDPR for Techies
The GDPR for TechiesThe GDPR for Techies
The GDPR for Techies
 
the Death of Privacy in Three Acts
the Death of Privacy in Three Actsthe Death of Privacy in Three Acts
the Death of Privacy in Three Acts
 
Revenge porn: punish, remove, forget, forgive?
Revenge porn: punish, remove, forget, forgive? Revenge porn: punish, remove, forget, forgive?
Revenge porn: punish, remove, forget, forgive?
 
From piracy to “The Producers?
From piracy to “The Producers?From piracy to “The Producers?
From piracy to “The Producers?
 
The Death of Privacy in Three Acts
The Death of Privacy in Three ActsThe Death of Privacy in Three Acts
The Death of Privacy in Three Acts
 
Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...
 
IT law : the middle kingdom between east and West
IT law : the middle kingdom between east and WestIT law : the middle kingdom between east and West
IT law : the middle kingdom between east and West
 
What do we do with aproblem like revenge porn ?
What do we do with  aproblem like  revenge porn ?What do we do with  aproblem like  revenge porn ?
What do we do with aproblem like revenge porn ?
 
Slave to the Algo-Rhythms?
Slave to the Algo-Rhythms?Slave to the Algo-Rhythms?
Slave to the Algo-Rhythms?
 
9worlds robots
9worlds robots9worlds robots
9worlds robots
 
Cdas 2012, lilian edwards and edina harbinja
Cdas 2012, lilian edwards and edina harbinjaCdas 2012, lilian edwards and edina harbinja
Cdas 2012, lilian edwards and edina harbinja
 

Kürzlich hochgeladen

Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee
 
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理F La
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYJulian Scutts
 
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理e9733fc35af6
 
一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理ss
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.pptseri bangash
 
ARTICLE 370 PDF about the indian constitution.
ARTICLE 370 PDF about the  indian constitution.ARTICLE 370 PDF about the  indian constitution.
ARTICLE 370 PDF about the indian constitution.tanughoshal0
 
judicial remedies against administrative actions.pptx
judicial remedies against administrative actions.pptxjudicial remedies against administrative actions.pptx
judicial remedies against administrative actions.pptxIshikaChauhan30
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubham Wadhonkar
 
Elective Course on Forensic Science in Law
Elective Course on Forensic Science  in LawElective Course on Forensic Science  in Law
Elective Course on Forensic Science in LawNilendra Kumar
 
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理A AA
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理Airst S
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理Airst S
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理ss
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentationKhushdeep Kaur
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxelysemiller87
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理e9733fc35af6
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersJillianAsdala
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理Airst S
 

Kürzlich hochgeladen (20)

Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
 
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
 
一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt
 
Chambers Global Practice Guide - Canada M&A
Chambers Global Practice Guide - Canada M&AChambers Global Practice Guide - Canada M&A
Chambers Global Practice Guide - Canada M&A
 
ARTICLE 370 PDF about the indian constitution.
ARTICLE 370 PDF about the  indian constitution.ARTICLE 370 PDF about the  indian constitution.
ARTICLE 370 PDF about the indian constitution.
 
judicial remedies against administrative actions.pptx
judicial remedies against administrative actions.pptxjudicial remedies against administrative actions.pptx
judicial remedies against administrative actions.pptx
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 
Elective Course on Forensic Science in Law
Elective Course on Forensic Science  in LawElective Course on Forensic Science  in Law
Elective Course on Forensic Science in Law
 
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptx
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
 

Privacy, the Internet of Things and Smart Cities

  • 1. Professor Lilian Edwards – University of Strathclyde FSR April 2016 Lilian.edwards@strath.ac.uk @lilianedwards Privacy, the Internet of Things and Smart Cities
  • 2. 1. What is the Internet of Things? Ubiquitous, pervasive computing (ubicomp)  Smart meters  Domestic and care robots  Driverless or connected cars (legalised Nevada, soon UK)  Apps/wearables measuring not just location but physical activity – FitBits, Jawbones, Apple watch etc  Smart CCTV – image, sound and behaviour, gait, face recognition  Chips in human body – health monitoring, data flow eg from pacemaker
  • 3.
  • 4.
  • 5.
  • 7. Barcelona clubbers get chipped (2004) BBC Science producer Simon Morton goes clubbing in Barcelona with a microchip implanted in his arm to pay for drinks. Imagine having a glass capsule measuring 1.3mm by 1mm, about the size of a large grain of rice injected under your skin. Last week I headed for the bright lights of the Catalan city of Barcelona to enter the exclusive VIP Baja Beach Club. The night club offers its VIP clients the opportunity to have a syringe-injected microchip implanted in their upper arms that not only gives them special access to VIP lounges, but also acts as a debit account from which they can pay for drinks.
  • 9. RFID: enables IoT  What is RFID? Radio Frequency Identification chips. Current main uses: inventory tags, retail chain barcoding, bag tracing, pets, transport smart cards, tagged passports  Identifies things not people.Early part of ”The Internet of Things” or “ubiquitous computing” (ubicomp).  Essentially collects the location of an object.  How great a threat to user privacy is it in reality? Passports, smart cards, transport cards, internal passes, library books, pupils, patients, prisoners?  Currently mainly cheap, passive, low range.  Primary worries originally about retail chain use.
  • 10.
  • 11. 2. “Ambient environments” and problems for privacy • Ubiquity = “invisible and seamlessly adaptive” (Spiekerman and Pallas) . Adaptive – learn from ambient total data collection, data not forgotten while useful • Weiser – weaving themselves “into the fabric of everyday life until they are indistinguishable from it” • The more useful, the less obvious and the less controlled by individual notice and choice. • How can this match DP idea of privacy as individual right to prior informed control of collection of data? • Problem expands when IoT installed in • public environments where no choice about sharing data except to entirely reject service– smart roads, smart transport • Public/private environments eg smart malls where footfall measured from mobiles and possibly correlated with IDs via CCTV or credit card billing • What choice eg when smart meters mandated by EU to promote environmental goals?
  • 12. Sharing IoT data  Like all PD, IoT derived data can be reused  “In 2006, the Guardian reported that police had requested access to the personal information of Oyster customers 243 times, and that access had been granted 229 times. Then in 2008, London's Evening Standard reported that over 3,000 requests had been made in under a year. Since then, 22,000 requests have been made by the Metropolitan Police, according to figures released by London’s transport authority in February 2012, with 264 requests made in the first two months of 2012 alone.”
  • 13. .. Can be embarrassing..
  • 14. IoT as 24/7 surveillance? Guardian, 2015  “We may find ourselves interacting with thousands of little objects around us on a daily basis, each collecting seemingly innocuous bits of data 24/7, information these things will report to the cloud, where it will be processed, correlated, and reviewed.  Your smart watch will reveal your lack of exercise to your health insurance company, your car will tell your insurer of your frequent speeding, and your dustbin will tell your local council that you are not following local recycling regulations. This is the ‘internet of stool pigeons’, and though it may sound far-fetched, it’s already happening”
  • 15.
  • 16. From the “Internet of Things” to smart cities Smart meters
  • 17. Smart cities – features/gains/problems  Based around  Networks of sensors attached to real world features (smart homes, roads, meters, telehealth etc) often processing in real time potentially personal data  Acquisition and exploitation of “big data” acquired via these sources and/or merged with other public and private datasets  Massive cloud infrastructure for such collection, processing, storage – often involving extra EU servers  Often financed by public private partnership -> outsourcing of “public” services – surveillance, health, waste? – to private cos along with the [big]data  Yet – heavily promoted to achieve energy efficiency; sustainability; joined up transport; replacement of private by shared vehicles; waste management; govt, welfare and health savings; etc etc
  • 18. 3. Analysing DP law, consent and the IoT  Do IoT systems collect “personal data”? If so DPD/GDPR applies. But in original conception (RFID chip) collected location of thing, not person? Do more complex systems change this?  DPD art 2 ( c) : “personal data' shall mean any information relating to an identified or identifiable natural person ('data subject'); an identifiable person is one who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to his physical, physiological, mental, economic, cultural or social identity;  Many systems will claim either to collect non personal data or to anonymise eg most mobile tracking systems where location etc reused.  Increasing ease of reidentification however?
  • 19. If (a) personal data is collected via IoT? 3 options for lawful processing (art 7 DPD)  Consent of user (freely given, specific, informed, unambiguous and signified) – v difficult?  A29 WP IoT Opinion – data may be gathered and shared with little or no transparency  Consent very difficult to give, IoT systems may not have human user interfaces  Quality of consent eg via apps may be poor (and what if no contractual nexus?)  Often no real poss to refuse sharing data in IoT system without refusing whole service cf new GDPR requirement  “Legitimate interests” of data controller where not overridden by fundamental interests of data controller  Necc for entering contract/ necc to carry out task in public interest
  • 20. But – (b) special rules for location data  Why?  Beginning of ubiquity of collection of location data from cellphones then GPS chips in smartphones and other mobile gadgets eg tablets, smart cars etc  Art 29 WP “movement patterns of owners.. provide a very intimate insight into the private lives of owners”  US FTC 2013: “mobile devices typically personal to individual, almost always on, and with the user” -> highly sensitive data  Cf Public reaction against Google “Glassholes” – essentially automated sousveillance – very strongly negative
  • 21.  Many or most IoT systems do collect “location data” (LD) -> e-Privacy Directive 2002/2009 (PECD) applies  See PECD, Art 2(c) reg 2 for definition LD: “data processed in an electronic communications network or by an electronic communications service indicating the geographic position of the terminal equipment of a user of a publicly available electronic communications service”  Much early concern if that definition matched RFID systems, implying requirements over and above basic DP  Are RFID tags the “terminal equipment” of user? (Not altered in main text in 2009 – however recital 56 after 2009 explicitly apply location and DP regime to RFID chips “and similar”)  PECD now applies since 2009 reforms to publicly available networks or where use is made of “electronic communications services as a basic infrastructure” – most IoT systems now fit this
  • 22. Location data : art 9 PECD (not revised)  For the purpose of marketing electronic communications services or for the provision of “value added services “  ..the provider of a publicly available electronic communications service may process location data to the extent and for the duration necessary for such services or marketing,  if the subscriber or user to whom the data relate has given his or /her consent.. And  “prior to obtaining their consent”, informed re type of location data other than traffic data which will be processed, purposes and duration of the processing and whether the data will be transmitted to a third party for the purpose of providing the value added service  Users or subscribers shall be given the possibility to withdraw their consent for the processing of traffic data at any time.
  • 23. (c ) Confidentiality and art 5(3), PECD  Requires consent informed by prior “clear and comprehensive information” where (again) information is stored on “terminal equipment of a user”  Intended to catch cookies or spyware placed on users hard disc or phone  But how far applicable to IoT sensors collecting data connected to person or household eg smart thermostats, energy meters, connected car component monitors?  A29WP argue a Fitbit (eg)is “terminal equipt” where info stored (even tho probably quickly transferred to cloud)  But is a smart car engine part? A household smart meter or Nest thermostat?
  • 24. In summary : re IoT and consent  Basic DP law would probably accept non-consent grounds for processing lawfully eg legitimate interests of data controller  Some data flows involving movements eg from smart meters in homes, may be deemed "anonymised" and so exempt from DP or PECD controls.  Pseudonymised data in GDPR may also play a part  Location data regime in PECD may apply but only when collected by telco via the “terminal equipment of a user” (see RFID above) and on sufficiently "public" network  If so , prior informed consent needed plus ability to opt out afterwards (art 9 PECD) and no substitute grounds  Can such prior consent be sensibly given and collected in modern pervasive IoT eg smart homes, smart cities?  More issues – rights to object to automated processing, to delete, RTBF?!
  • 25. Solutions from Privacy by Design (PbD) and Human Computer Interaction (HCI)?  Privacy impact assessments for smart cities as organic wholes? 2009-2012 – negotiation of voluntary EU PIA framework for RFID (Spiekkerman). Extended to a PIA for Smart Meters since. Anecdotal low industry take up. But DPIAs will be mandated by GDPR..  New semi automated ways of giving consent eg home dashboards; “pre” or “sticky” consent ( consent by autonomous agent)  Codes of practice disallowing or modifying certain consents eg in smart meter apps  Greater algorithmic transparency inc extension of right now in GDPR (ex DPD art 12(a))
  • 26. For more information --  Edwards “Privacy, Security and Data Protection in Smart Cities: A Critical EU Law Perspective” (2016) European Data Protection Law Review 28-58  Edwards ed Law, Policy and the Internet (Hart Publishing, forthcoming 2017)