SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Protecting Privacy by using data labels ,[object Object]
No Labels = Grim Surprises
Strictest handling procedure must be applied for all jars
But I know what ’ s on  that  shelf
But what happens when we give a sample to another lab? ,[object Object],[object Object],[object Object]
Unlabeled jar Cabinet
We ’ ve got 16kB of PHI right here
Changing Context, Losing Knowledge
Authorization as proxy for explicit knowledge ,[object Object],[object Object],[object Object]
Privacy Professional Security Professional
What happens next?
Feed the social layer
 
 
Relationship Context Metadata
Beads and Strings
What ’ s in a bead? Parties & their relationships Consented Uses & Disclosures Obligations What do to if you aren ’ t one of the parties
What to do if you find data in the wild
Privacy is a Social Construct ,[object Object],[object Object],[object Object]
Making the Implicit Explicit ,[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Ähnlich wie Protecting Privacy by Using Data Labels

Testing or Hacking: Real Advice on Effective Security Testing Stratagies
Testing or Hacking: Real Advice on Effective Security Testing StratagiesTesting or Hacking: Real Advice on Effective Security Testing Stratagies
Testing or Hacking: Real Advice on Effective Security Testing StratagiesDaniel Billing
 
Business considerations for privacy and open data: how not to get caught out
Business considerations for privacy and open data: how not to get caught outBusiness considerations for privacy and open data: how not to get caught out
Business considerations for privacy and open data: how not to get caught outtheODI
 
Protecting young-children-online-power point-presentation-security
Protecting young-children-online-power point-presentation-securityProtecting young-children-online-power point-presentation-security
Protecting young-children-online-power point-presentation-securityMohamed ElGabry
 
Transcript FAIR webinar #2: A for Accessable-06-06-2017
Transcript FAIR webinar #2: A for Accessable-06-06-2017Transcript FAIR webinar #2: A for Accessable-06-06-2017
Transcript FAIR webinar #2: A for Accessable-06-06-2017ARDC
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Programsecratic
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetysmartinson
 
Data management workshop 101113
Data management workshop 101113Data management workshop 101113
Data management workshop 101113Jackie Wirz, PhD
 
DIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School StudentsDIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School StudentsLeon Letkeman
 
20161109_Mahan_Brighttalk_Webinar_Final
20161109_Mahan_Brighttalk_Webinar_Final20161109_Mahan_Brighttalk_Webinar_Final
20161109_Mahan_Brighttalk_Webinar_FinalPhillip Mahan
 
10 questions for LAFOIP in the classroom
10 questions for LAFOIP in the classroom10 questions for LAFOIP in the classroom
10 questions for LAFOIP in the classroomkmuench
 
A Little Privacy, Please… Diving into Data Privacy for Nonprofits
A Little Privacy, Please… Diving into Data Privacy for NonprofitsA Little Privacy, Please… Diving into Data Privacy for Nonprofits
A Little Privacy, Please… Diving into Data Privacy for NonprofitsTechSoup
 
TIES 2013 Education Technology Conference
TIES 2013 Education Technology ConferenceTIES 2013 Education Technology Conference
TIES 2013 Education Technology ConferenceEvan Francen
 
Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?
Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?
Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?Jim Adler
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social NetworksOuriel Ohayon
 
Student privacy and technology
Student privacy and technologyStudent privacy and technology
Student privacy and technologykmuench
 
Salesforce & GDPR: What happens next?
Salesforce & GDPR: What happens next? Salesforce & GDPR: What happens next?
Salesforce & GDPR: What happens next? Desynit
 
Ethics and Privacy in Learning Analytics
Ethics and Privacy in Learning AnalyticsEthics and Privacy in Learning Analytics
Ethics and Privacy in Learning AnalyticsAbelardo Pardo
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...Frances Coronel
 
Rsqrd AI: A Survey of The Current Ecosystem of Explainability Techniques
Rsqrd AI: A Survey of The Current Ecosystem of Explainability TechniquesRsqrd AI: A Survey of The Current Ecosystem of Explainability Techniques
Rsqrd AI: A Survey of The Current Ecosystem of Explainability TechniquesSanjana Chowdhury
 

Ähnlich wie Protecting Privacy by Using Data Labels (20)

Testing or Hacking: Real Advice on Effective Security Testing Stratagies
Testing or Hacking: Real Advice on Effective Security Testing StratagiesTesting or Hacking: Real Advice on Effective Security Testing Stratagies
Testing or Hacking: Real Advice on Effective Security Testing Stratagies
 
Business considerations for privacy and open data: how not to get caught out
Business considerations for privacy and open data: how not to get caught outBusiness considerations for privacy and open data: how not to get caught out
Business considerations for privacy and open data: how not to get caught out
 
Protecting young-children-online-power point-presentation-security
Protecting young-children-online-power point-presentation-securityProtecting young-children-online-power point-presentation-security
Protecting young-children-online-power point-presentation-security
 
Transcript FAIR webinar #2: A for Accessable-06-06-2017
Transcript FAIR webinar #2: A for Accessable-06-06-2017Transcript FAIR webinar #2: A for Accessable-06-06-2017
Transcript FAIR webinar #2: A for Accessable-06-06-2017
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Program
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Data management workshop 101113
Data management workshop 101113Data management workshop 101113
Data management workshop 101113
 
DIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School StudentsDIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School Students
 
20161109_Mahan_Brighttalk_Webinar_Final
20161109_Mahan_Brighttalk_Webinar_Final20161109_Mahan_Brighttalk_Webinar_Final
20161109_Mahan_Brighttalk_Webinar_Final
 
10 questions for LAFOIP in the classroom
10 questions for LAFOIP in the classroom10 questions for LAFOIP in the classroom
10 questions for LAFOIP in the classroom
 
A Little Privacy, Please… Diving into Data Privacy for Nonprofits
A Little Privacy, Please… Diving into Data Privacy for NonprofitsA Little Privacy, Please… Diving into Data Privacy for Nonprofits
A Little Privacy, Please… Diving into Data Privacy for Nonprofits
 
TIES 2013 Education Technology Conference
TIES 2013 Education Technology ConferenceTIES 2013 Education Technology Conference
TIES 2013 Education Technology Conference
 
Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?
Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?
Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social Networks
 
Student privacy and technology
Student privacy and technologyStudent privacy and technology
Student privacy and technology
 
Salesforce & GDPR: What happens next?
Salesforce & GDPR: What happens next? Salesforce & GDPR: What happens next?
Salesforce & GDPR: What happens next?
 
Ethics and Privacy in Learning Analytics
Ethics and Privacy in Learning AnalyticsEthics and Privacy in Learning Analytics
Ethics and Privacy in Learning Analytics
 
Cap 233 intro
Cap 233 introCap 233 intro
Cap 233 intro
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
 
Rsqrd AI: A Survey of The Current Ecosystem of Explainability Techniques
Rsqrd AI: A Survey of The Current Ecosystem of Explainability TechniquesRsqrd AI: A Survey of The Current Ecosystem of Explainability Techniques
Rsqrd AI: A Survey of The Current Ecosystem of Explainability Techniques
 

Kürzlich hochgeladen

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Kürzlich hochgeladen (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

Protecting Privacy by Using Data Labels

Hinweis der Redaktion

  1. Picture a chemistry lab Picture a cabinet in that lab All of the jars in that cabinet are unlabeled Image courtesy of UF Digital Collections - http://www.flickr.com/photos/ufdc/3333277041/
  2. Each jar contains a potentially grim surprise * Caustic * Toxic * Harmless * Volatile Image courtesty of bhikku - http://www.flickr.com/photos/bhikku/4608657906/
  3. Because the jars are unlabeled The strictest handling procedures must be applied for all jars * Even though some don ’ t require such strictness This increases the handling costs. Requires spot audit programs Make everything more difficult Image courtesy of
  4. But I know what is on that shelf Implicit knowledge might be generated * Items on this shelf are caustic * Items on this shelf are volatile * Items on this shelf are harmless Image courtesy of Shobhit Agrawal - http://www.flickr.com/photos/shobhitagrawal/400862418/sizes/z/
  5. Image courtesy of code poet - http://www.flickr.com/photos/alphageek/5094405942/
  6. This is how enterprises handle data Our systems and databases are the cabinets and the unlabeled jars We do not tailor handling procedures to the data well We do not inform handlers about the data well Image courtesy of carrierdetect - http://www.flickr.com/photos/carrierdetect/3316432467/
  7. We have implicit knowledge We have implicit knowledge of the data based on the system it comes from * “ If it came from that system, it must be this kind of data ” * This implicit knowledge informs our data handling procedures Image courtesy of scriptingnews - http://www.flickr.com/photos/scriptingnews/2627291590/
  8. Transferring data moves that data from one context to anotherWhen data changes context, implicit knowledge is lostBad enough when the sharing is within the enterpriseFar worse when we share beyond our walls Image courtesy of dan4th - http://www.flickr.com/photos/dan4th/2402329882/
  9. The authorization event is the end of the story to a security professional. But the authorization event is merely the beginning of the story to a privacy professional. What happens after authorization is the interesting bit from a privacy perspective. Image courtesy of davedugdale - http://www.flickr.com/photos/davedugdale/5099718716/
  10. How should we handle the data?Are our obligations to the data met?What uses and disclosures were consented to?Answering these questions require context Image courtesy of Paul Bratcher Photography: http://www.flickr.com/photos/pdbratcher/4748616980/
  11. Determining how to handle data requires the social layer of the enterprise to be informedPeople know how to evaluate context Image courtesy of tjdewey - http://www.flickr.com/photos/22416200@N05/5197320220/
  12. Need to keep the social layer informed We don ’ t label our data.Any context information we have is stripped when data changes hands. This makes handling transferred data expensive and fraught with danger
  13. Use data labels to protect privacy Make the implicit explicitDescribe context in human readable termsHelp the social layer make better data handling decisions http://www.flickr.com/photos/31818948@N07/3488770096/sizes/z/
  14. Use data labels to protect privacy Richer context information for technical controls to useAssign accountability more accurately and fairlyWe call these data labels relationship context metadata
  15. RCM is created when data is transferred * Intra-company transfers * Inter-company transfers * Individual to organizations transfers Each piece of RCM is called a bead and beads are attached to strings. A string adorns a set of data.
  16. What to do if you find data in the wild The use of data labels can help companies track where their data flows. It can also be used when data flows out of the control of the originating organization. One could image instructions such as the following embedded in the RCM: “ Call Hemisphere Medical ’ s Data Protection office. Tell them you ’ ve discovered RCM number 8541-BOS-123001 ”“ Call the Massachusetts State Attorney General ’ s office at (617) 727-8400. Tell them you have found MA 201 CMR 17 information. ” Image courtesy of bill barber: http://www.flickr.com/photos/wdwbarber/4373658475/