SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Data Protection Act:

Implications for Monitoring Technologies

                David Speakman
                Liam Houston
                Niall Kerrigan

                 March 2013


                      MSc. Information Systems Management, NUI Galway
Overview

  • Evolution of DPA
  • Current Implications
  • Future Trends
The Need for Data Protection Laws
   Every person has the right to privacy...

      – Technology development has given greater potential for
        gathering and processing of personal data
      – This data being processed without considering the
        risks, or worse having data taken from them without
        realising
      – Monitoring technology can track where you are, what you
        do and when you do it at anytime it wishes – “Big Brother”
        effect. Do you recall the film Enemy of the State?
      – The world envisioned by George Orwell‟s novel 1984 is
        now evident, without the correct and enforced
        legislation, it is easily a possibility.
The Need for Data Protection Laws
                                          TECHNOLOGICAL INNOVATION




                                                          The “Dot Com” boom
                                           Increasing popularity
                      First Web Browser    in Mobile phones
        First CCTV system                                                 Development of the
                                                                                                Google Glass
                                                                             Smart Phone




               1965         1973                   1992            1997        2001               2014


           1949                    1980     1988          1994                        2003                 2018




 George Orwell’s novel       OECD Guidelines
                                 to EU                                           Amendment to             Further
                                                      EU Directive on
                                                                                   the DPA             Legislation???
                                                      Data protection
                                          Irish DPA


                                     DATA PROTECTION LEGISLATION
Development of the DPA
The development of technology required data protection
legislation:

– 1981 - The Organisation for Economic Co-Ordination and
  Development provide the EU with a set of guidelines
– 1988 – The Irish Government created the Data Protection Act
  is the first legislation created to monitor data collection
– 1995 – The EU Data Protection Directive encourages all
  member states to adapt a similar approach to Data Protection
  Laws to allow for legal transborder data flow
– 2003 – The Irish Government amend the DPA to align with the
  EU Directive and increase the rights of the Data Subject
Influence of OECD Guidelines on current DPA
 OECD Guidelines              Data Protection Act
 8 key principles             Laws to ensure
                                  Lawful obtaining and
     Collection Limitation
                                   processing of data
     Purpose Specification
                                  Data is relevant to its
     Use Limitation
                                   purpose
     Security Safeguards
                                  Security
     Data quality
                                  Accuracy
     Openness
                                  Availability of data to the
     Individual
      Participation                data subject
     Accountability              Data is not kept longer than
                                   necessary
Current Implications:

CCTV and Electronic Communications
CCTV

– Monitoring 24/7, 365 days a year
– Records everything you do, where you do
  it, when you do it.
– Captures vast amount of “personal data”
– Subject to DPA
– Act states CCTV must be “adequate, relevant
  and not excessive” for its purposes
– How are CCTV systems justified?
Is CCTV justifiable?

• Proper Use of CCTV system
   – Must consider what CCTV is being used for
   – Acceptable: capturing intruders damaging/removing goods from
     premises
   – Unacceptable: monitoring employees, covert surveillance

• Suitable images being recorded
   – Acceptable: Areas where security issues have arisen prior to
     CCTV being installed
   – Unacceptable: Directly at toilet cubicles/urinals
Is CCTV justifiable?
• Transparency
   – Information must be provided to data subject prior to recording e.g.
     usually a sign at premises entrance
• Storage and retention
   – Retention period must be justifiable, usually one month
   – Recordings must be kept in restricted, monitored and secure
     environment
   – Recordings must be in either tape, still images or disk.
• Access Requests
   – Requests must be made available to data subject
   – Must identify subject, display date/time/location
E-Communications

• Now in e-communication age - part of our
  everyday lives
• Process “personal data” – companies subject
  to DPA via special rules
• Rules in the areas of data
  breaches, marketing, data retention and data
  disclosure.
• Compliance issued via Privacy Policy
• Failure to comply results in severe penalties
E-Communications


Security Issues:
  – Traffic Data
  – Cookies
  – Location Data
Traffic Data


  – Details of calls, texts, emails, Internet use
  – Should only be retained for set amount of time
    for payment and querying purposes
  – Restrictions in place for marketing this “traffic
    data”
Traffic Data
     Recall the abuse of “Traffic Data” by the News of the World that
                  forced the closure of the newspaper
Cookies

• Personal data may not be removed unless
  user:
  – 1. Informed why cookies are being used
  – 2. Has been given his/her consent
• The above not applicable where info is
  required for communication transmission or for
  info specifically required by the user e.g.
  shopping cart
• Information on cookies should be readily
  available to users
Cookies
Location Data


• Gives a user‟s geographical location
• User must be given:
  – Prior consent to location data being processed
  – Reasons and duration of processing
  – Whether data will be processed to a “third
    party”
  – Option to withdraw consent
Future Trends:

Privacy vs. New Technology
Strengthening Data Protection Laws
Future Implications
Privacy vs. New Technology

• Cutting Edge Technologies – protecting privacy
  becoming more difficult

• Era of „Big Data‟ – detailed info on our every movement

• “Personal data” on mobile devices collected and
  analysed without consent – builds detailed user profiles

• “Golden Solution” – Correct Protection of civilian privacy
  without halting new technological innovation
Strengthening Data Protection Laws

 • European Commission – to reinforce EU data
   legislation by 2014

      “to put individuals in control of their own
      personal data”
Future Technologies & Implications

• Google Glass
   – Will make personal privacy and data protection impossible
   – Recordings will be stored on Google servers

• The future of monitoring technology?
“It’s inevitable that surveillance drones will be deployed
over New York City. Get used to it”
                               -Michael Bloomberg, 2013

Weitere ähnliche Inhalte

Was ist angesagt?

Big data and information privacy 20190117
Big data and information privacy 20190117Big data and information privacy 20190117
Big data and information privacy 20190117Maria Correia
 
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010Dr David Probert
 
I Pv6 Presentation 310510 V4
I Pv6 Presentation 310510 V4I Pv6 Presentation 310510 V4
I Pv6 Presentation 310510 V4Chaesub Lee
 
Inria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directionsInria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directionsInria
 
WCIT12 myth busting presentation
WCIT12 myth busting presentationWCIT12 myth busting presentation
WCIT12 myth busting presentationITU
 
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Adam Thierer
 
Data Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and securityData Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and securityEthical Sector
 
Developing E-Government in Myanmar: What are the Building Blocks of Building ...
Developing E-Government in Myanmar: What are the Building Blocks of Building ...Developing E-Government in Myanmar: What are the Building Blocks of Building ...
Developing E-Government in Myanmar: What are the Building Blocks of Building ...Ethical Sector
 
Privacy for tech startups
Privacy for tech startups Privacy for tech startups
Privacy for tech startups Marc Gallardo
 
How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things? How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things? Mercatus Center
 
Data Security in the Insurance Industry: what you need to know about data pro...
Data Security in the Insurance Industry: what you need to know about data pro...Data Security in the Insurance Industry: what you need to know about data pro...
Data Security in the Insurance Industry: what you need to know about data pro...XeniT Solutions nv
 
Cyber Vardzia - Integrated Physical and Cyber Security Systems for Georgia
Cyber Vardzia - Integrated Physical and Cyber Security Systems for GeorgiaCyber Vardzia - Integrated Physical and Cyber Security Systems for Georgia
Cyber Vardzia - Integrated Physical and Cyber Security Systems for GeorgiaDr David Probert
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawftii
 
how we design privacy for smart city and tech
how we design privacy for smart city and techhow we design privacy for smart city and tech
how we design privacy for smart city and techMomokoImamura
 
Managing High-Volume Cyber Attacks Through Effective Strategies in Indonesia
Managing High-Volume Cyber Attacks Through Effective Strategies in IndonesiaManaging High-Volume Cyber Attacks Through Effective Strategies in Indonesia
Managing High-Volume Cyber Attacks Through Effective Strategies in IndonesiaYudhistira Nugraha
 
Cyber Security - ICCT Colleges
Cyber Security - ICCT CollegesCyber Security - ICCT Colleges
Cyber Security - ICCT CollegesPotato
 

Was ist angesagt? (18)

Big data and information privacy 20190117
Big data and information privacy 20190117Big data and information privacy 20190117
Big data and information privacy 20190117
 
Mon cirt khaltar
Mon cirt khaltarMon cirt khaltar
Mon cirt khaltar
 
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
 
I Pv6 Presentation 310510 V4
I Pv6 Presentation 310510 V4I Pv6 Presentation 310510 V4
I Pv6 Presentation 310510 V4
 
Inria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directionsInria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directions
 
WCIT12 myth busting presentation
WCIT12 myth busting presentationWCIT12 myth busting presentation
WCIT12 myth busting presentation
 
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
 
Data Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and securityData Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and security
 
Developing E-Government in Myanmar: What are the Building Blocks of Building ...
Developing E-Government in Myanmar: What are the Building Blocks of Building ...Developing E-Government in Myanmar: What are the Building Blocks of Building ...
Developing E-Government in Myanmar: What are the Building Blocks of Building ...
 
Privacy for tech startups
Privacy for tech startups Privacy for tech startups
Privacy for tech startups
 
Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy
 
How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things? How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things?
 
Data Security in the Insurance Industry: what you need to know about data pro...
Data Security in the Insurance Industry: what you need to know about data pro...Data Security in the Insurance Industry: what you need to know about data pro...
Data Security in the Insurance Industry: what you need to know about data pro...
 
Cyber Vardzia - Integrated Physical and Cyber Security Systems for Georgia
Cyber Vardzia - Integrated Physical and Cyber Security Systems for GeorgiaCyber Vardzia - Integrated Physical and Cyber Security Systems for Georgia
Cyber Vardzia - Integrated Physical and Cyber Security Systems for Georgia
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlaw
 
how we design privacy for smart city and tech
how we design privacy for smart city and techhow we design privacy for smart city and tech
how we design privacy for smart city and tech
 
Managing High-Volume Cyber Attacks Through Effective Strategies in Indonesia
Managing High-Volume Cyber Attacks Through Effective Strategies in IndonesiaManaging High-Volume Cyber Attacks Through Effective Strategies in Indonesia
Managing High-Volume Cyber Attacks Through Effective Strategies in Indonesia
 
Cyber Security - ICCT Colleges
Cyber Security - ICCT CollegesCyber Security - ICCT Colleges
Cyber Security - ICCT Colleges
 

Ähnlich wie Data Protection Act: implications for monitoring technologies

The death of data protection
The death of data protection The death of data protection
The death of data protection Lilian Edwards
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obamaLilian Edwards
 
What is GDPR?
What is GDPR?What is GDPR?
What is GDPR?Faidepro
 
All You Need To Know About Data Law Changes in 2018
All You Need To Know About Data Law Changes in 2018All You Need To Know About Data Law Changes in 2018
All You Need To Know About Data Law Changes in 2018The Drum
 
EU Data Protection Regulation 26 June 2012
EU Data Protection Regulation 26 June 2012EU Data Protection Regulation 26 June 2012
EU Data Protection Regulation 26 June 2012Chris Marsden
 
IT law : the middle kingdom between east and West
IT law : the middle kingdom between east and WestIT law : the middle kingdom between east and West
IT law : the middle kingdom between east and WestLilian Edwards
 
Privacy, the Internet of Things and Smart Cities
Privacy, the Internet of Things and Smart Cities Privacy, the Internet of Things and Smart Cities
Privacy, the Internet of Things and Smart Cities Lilian Edwards
 
Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...IISPEastMids
 
CEE CMS Data Protection webinar series - Part 2
CEE CMS Data Protection webinar series - Part 2CEE CMS Data Protection webinar series - Part 2
CEE CMS Data Protection webinar series - Part 2CMSLondon
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsIrish Future Internet Forum
 
My Privacy at Risk, is it Safe?
My Privacy at Risk, is it Safe?My Privacy at Risk, is it Safe?
My Privacy at Risk, is it Safe?Andreas Drakos
 
Data protection For CYP Organisations
Data protection For CYP OrganisationsData protection For CYP Organisations
Data protection For CYP OrganisationsCliff Ashcroft
 
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_ProvidersJon-Michael C. Brook, CISSP
 
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta   ulf mattsson - do you have a roadmap for eu gdprIsaca atlanta   ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdprUlf Mattsson
 
Crisp kaleidoscope presentation 13112015
Crisp kaleidoscope presentation 13112015Crisp kaleidoscope presentation 13112015
Crisp kaleidoscope presentation 13112015CRISP Project
 
Securing ever growing and complex business systems v1 1
Securing ever growing and complex business systems v1 1Securing ever growing and complex business systems v1 1
Securing ever growing and complex business systems v1 1Maganathin Veeraragaloo
 
Automatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy StandardsAutomatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy Standardsautomatskicorporation
 

Ähnlich wie Data Protection Act: implications for monitoring technologies (20)

The death of data protection
The death of data protection The death of data protection
The death of data protection
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obama
 
What is GDPR?
What is GDPR?What is GDPR?
What is GDPR?
 
All You Need To Know About Data Law Changes in 2018
All You Need To Know About Data Law Changes in 2018All You Need To Know About Data Law Changes in 2018
All You Need To Know About Data Law Changes in 2018
 
EU data protection issues in IoT
EU data protection issues in IoTEU data protection issues in IoT
EU data protection issues in IoT
 
EU Data Protection Regulation 26 June 2012
EU Data Protection Regulation 26 June 2012EU Data Protection Regulation 26 June 2012
EU Data Protection Regulation 26 June 2012
 
IT law : the middle kingdom between east and West
IT law : the middle kingdom between east and WestIT law : the middle kingdom between east and West
IT law : the middle kingdom between east and West
 
Privacy, the Internet of Things and Smart Cities
Privacy, the Internet of Things and Smart Cities Privacy, the Internet of Things and Smart Cities
Privacy, the Internet of Things and Smart Cities
 
The GDPR for Techies
The GDPR for TechiesThe GDPR for Techies
The GDPR for Techies
 
Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...
 
CEE CMS Data Protection webinar series - Part 2
CEE CMS Data Protection webinar series - Part 2CEE CMS Data Protection webinar series - Part 2
CEE CMS Data Protection webinar series - Part 2
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
 
Ci31560566
Ci31560566Ci31560566
Ci31560566
 
My Privacy at Risk, is it Safe?
My Privacy at Risk, is it Safe?My Privacy at Risk, is it Safe?
My Privacy at Risk, is it Safe?
 
Data protection For CYP Organisations
Data protection For CYP OrganisationsData protection For CYP Organisations
Data protection For CYP Organisations
 
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
 
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta   ulf mattsson - do you have a roadmap for eu gdprIsaca atlanta   ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
 
Crisp kaleidoscope presentation 13112015
Crisp kaleidoscope presentation 13112015Crisp kaleidoscope presentation 13112015
Crisp kaleidoscope presentation 13112015
 
Securing ever growing and complex business systems v1 1
Securing ever growing and complex business systems v1 1Securing ever growing and complex business systems v1 1
Securing ever growing and complex business systems v1 1
 
Automatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy StandardsAutomatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy Standards
 

Data Protection Act: implications for monitoring technologies

  • 1. Data Protection Act: Implications for Monitoring Technologies David Speakman Liam Houston Niall Kerrigan March 2013 MSc. Information Systems Management, NUI Galway
  • 2. Overview • Evolution of DPA • Current Implications • Future Trends
  • 3. The Need for Data Protection Laws Every person has the right to privacy... – Technology development has given greater potential for gathering and processing of personal data – This data being processed without considering the risks, or worse having data taken from them without realising – Monitoring technology can track where you are, what you do and when you do it at anytime it wishes – “Big Brother” effect. Do you recall the film Enemy of the State? – The world envisioned by George Orwell‟s novel 1984 is now evident, without the correct and enforced legislation, it is easily a possibility.
  • 4. The Need for Data Protection Laws TECHNOLOGICAL INNOVATION The “Dot Com” boom Increasing popularity First Web Browser in Mobile phones First CCTV system Development of the Google Glass Smart Phone 1965 1973 1992 1997 2001 2014 1949 1980 1988 1994 2003 2018 George Orwell’s novel OECD Guidelines to EU Amendment to Further EU Directive on the DPA Legislation??? Data protection Irish DPA DATA PROTECTION LEGISLATION
  • 5. Development of the DPA The development of technology required data protection legislation: – 1981 - The Organisation for Economic Co-Ordination and Development provide the EU with a set of guidelines – 1988 – The Irish Government created the Data Protection Act is the first legislation created to monitor data collection – 1995 – The EU Data Protection Directive encourages all member states to adapt a similar approach to Data Protection Laws to allow for legal transborder data flow – 2003 – The Irish Government amend the DPA to align with the EU Directive and increase the rights of the Data Subject
  • 6. Influence of OECD Guidelines on current DPA OECD Guidelines Data Protection Act 8 key principles Laws to ensure  Lawful obtaining and  Collection Limitation processing of data  Purpose Specification  Data is relevant to its  Use Limitation purpose  Security Safeguards  Security  Data quality  Accuracy  Openness  Availability of data to the  Individual Participation data subject  Accountability  Data is not kept longer than necessary
  • 7. Current Implications: CCTV and Electronic Communications
  • 8. CCTV – Monitoring 24/7, 365 days a year – Records everything you do, where you do it, when you do it. – Captures vast amount of “personal data” – Subject to DPA – Act states CCTV must be “adequate, relevant and not excessive” for its purposes – How are CCTV systems justified?
  • 9. Is CCTV justifiable? • Proper Use of CCTV system – Must consider what CCTV is being used for – Acceptable: capturing intruders damaging/removing goods from premises – Unacceptable: monitoring employees, covert surveillance • Suitable images being recorded – Acceptable: Areas where security issues have arisen prior to CCTV being installed – Unacceptable: Directly at toilet cubicles/urinals
  • 10. Is CCTV justifiable? • Transparency – Information must be provided to data subject prior to recording e.g. usually a sign at premises entrance • Storage and retention – Retention period must be justifiable, usually one month – Recordings must be kept in restricted, monitored and secure environment – Recordings must be in either tape, still images or disk. • Access Requests – Requests must be made available to data subject – Must identify subject, display date/time/location
  • 11. E-Communications • Now in e-communication age - part of our everyday lives • Process “personal data” – companies subject to DPA via special rules • Rules in the areas of data breaches, marketing, data retention and data disclosure. • Compliance issued via Privacy Policy • Failure to comply results in severe penalties
  • 12. E-Communications Security Issues: – Traffic Data – Cookies – Location Data
  • 13. Traffic Data – Details of calls, texts, emails, Internet use – Should only be retained for set amount of time for payment and querying purposes – Restrictions in place for marketing this “traffic data”
  • 14. Traffic Data Recall the abuse of “Traffic Data” by the News of the World that forced the closure of the newspaper
  • 15. Cookies • Personal data may not be removed unless user: – 1. Informed why cookies are being used – 2. Has been given his/her consent • The above not applicable where info is required for communication transmission or for info specifically required by the user e.g. shopping cart • Information on cookies should be readily available to users
  • 17. Location Data • Gives a user‟s geographical location • User must be given: – Prior consent to location data being processed – Reasons and duration of processing – Whether data will be processed to a “third party” – Option to withdraw consent
  • 18. Future Trends: Privacy vs. New Technology Strengthening Data Protection Laws Future Implications
  • 19. Privacy vs. New Technology • Cutting Edge Technologies – protecting privacy becoming more difficult • Era of „Big Data‟ – detailed info on our every movement • “Personal data” on mobile devices collected and analysed without consent – builds detailed user profiles • “Golden Solution” – Correct Protection of civilian privacy without halting new technological innovation
  • 20. Strengthening Data Protection Laws • European Commission – to reinforce EU data legislation by 2014 “to put individuals in control of their own personal data”
  • 21. Future Technologies & Implications • Google Glass – Will make personal privacy and data protection impossible – Recordings will be stored on Google servers • The future of monitoring technology? “It’s inevitable that surveillance drones will be deployed over New York City. Get used to it” -Michael Bloomberg, 2013