SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Privacy in a digital world
Rob Kitchin
NIRSA, National University of Ireland Maynooth
Introduction
• Digital footprints (data individuals leave behind)
• Data shadows (information about individuals generated by
others)
• Unique IDs for people, institutions, objects, interactions,
transactions and territories
• Increasingly being harvested, combined, analyzed, acted
upon
Fair Information Practice Principles
Principle Description
Notice Individuals are informed that data are being generated and the
purpose to which the data will be put
Choice Individuals have the choice to opt-in or opt-out as to whether and
how their data will be used or disclosed
Consent Data are only generated and disclosed with the consent of
individuals
Security Data are protected from loss, misuse, unauthorized access,
disclosure, alteration and destruction
Integrity Data are reliable, accurate, complete and current
Access Individuals can access, check and verify data about themselves
Accountability The data holder is accountable for ensuring the above principles
and has mechanisms in place to assure compliance
Data type Data collected by Uber android app (from Hein 2014)
Accounts log email log
App Activity name, package name, process number of activity, processed id
App Data Usage Cache size, code size, data size, name, package name
App Install installed at, name, package name, unknown sources enabled, version code, version
name
Battery health, level, plugged, present, scale, status, technology, temperature, voltage
Device Info board, brand, build version, cell number, device, device type, display, fingerprint, IP,
MAC address, manufacturer, model, OS platform, product, SDK code, total disk
space, unknown sources enabled
GPS accuracy, altitude, latitude, longitude, provider, speed
MMS from number, MMS at, MMS type, service number, to number
NetData bytes received, bytes sent, connection type, interface type
PhoneCall call duration, called at, from number, phone call type, to number
SMS from number, service number, SMS at, SMS type, to number
TelephonyInfo cell tower ID, cell tower latitude, cell tower longitude, IMEI, ISO country code, local
area code, MEID, mobile country code, mobile network code, network name,
network type, phone type, SIM serial number, SIM state, subscriber ID
WifiConnection BSSID, IP, linkspeed, MAC addr, network ID, RSSI, SSID
WifiNeighbors BSSID, capabilities, frequency, level, SSID
Root Check root status code, root status reason code, root version, sig file version
Malware Info algorithm confidence, app list, found malware, malware SDK version, package list,
reason code, service list, sigfile version
A Taxonomy of Privacy (compiled from Solove 2006)
Domain Privacy breach Description
Information
Collection
Surveillance Watching, listening to, or recording of an individual’s activities
Interrogation Various forms of questioning or probing for information
Information
Processing
Aggregation The combination of various pieces of data about a person
Identification Linking information to particular individuals
Insecurity Carelessness in protecting stored information from leaks and
improper access
Secondary Use Use of information collected for one purpose for a different
purpose without the data subject’s consent
Exclusion Failure to allow the data subject to know about the data that others
have about her and participate in its handling and use, including
being barred from being able to access and correct errors
Information
Dissemination
Breach of Confidentiality Breaking a promise to keep a person’s information confidential
Disclosure Revelation of information about a person that impacts the way
others judge her character
Exposure Revealing another’s nudity, grief, or bodily functions
Increased Accessibility Amplifying the accessibility of information
Blackmail Threat to disclose personal information
Appropriation The use of the data subject’s identity to serve the aims and
interests of another
Distortion Dissemination of false or misleading information about individuals
Invasion Intrusion Invasive acts that disturb one’s tranquillity or solitude
Decisional Interference Incursion into the data subject’s decisions regarding her private
Loss of privacy effects
• Extensive dataveillance/surveillance
• social sorting
• control creep
• dynamic pricing
• anticipatory governance
• data security/protection – cybercrimes
The principles of Privacy by Design
Principle Description
Proactive not reactive;
preventative not remedial
IT systems should seek to anticipate privacy concerns rather
than seeking to resolve privacy infractions once they have
incurred
Privacy as the default
setting
Privacy is automatically protected and does not require action
on behalf of an individual
Privacy embedded into
design
Privacy protections are core features of the design and
architecture of IT systems and is not and bolt-on feature
Full functionality -
positive-sum, not zero-sum
All legitimate interests and objectives are accommodated,
rather than there being trade-offs between privacy and other
considerations such as security
End-to-end security - full
lifecycle protection
Privacy is embedded into the system from ingestion to disposal
Visibility and
transparency - keep it
open
Component parts and operations are visible and transparent to
users and providers alike and are subject to independent
verification
Respect for user privacy -
keep it user-centric
A system should be built around, protect the interests, and
empower individuals
Conclusion
• Privacy is multidimensional in nature
• Notions & practices of privacy are changing rapidly
• Has all kinds of direct and indirect effects
• Technology & industry are running ahead of legislators;
as are states
• There is no teleological inevitability to the emerging
privacy landscape
• It is incumbent on states to address privacy issues and
to find a balance with respect to interests of citizens,
states and industry
Rob.Kitchin@nuim.ie
@robkitchin
http://www.nuim.ie/progcity
@progcity

Weitere ähnliche Inhalte

Was ist angesagt?

THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGS
Chidiogo Mbonu
 

Was ist angesagt? (20)

Smart phone and mobile phone risks
Smart phone and mobile phone risksSmart phone and mobile phone risks
Smart phone and mobile phone risks
 
Me and My Big Data Project
Me and My Big Data Project Me and My Big Data Project
Me and My Big Data Project
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and Security
 
[2011] Integrated Legislation Information Management System - Igor Andonovski
[2011] Integrated Legislation Information Management System - Igor Andonovski[2011] Integrated Legislation Information Management System - Igor Andonovski
[2011] Integrated Legislation Information Management System - Igor Andonovski
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of ThingsChristopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
 
Internet of Things - Recent developments and Trends
Internet of Things - Recent developments and TrendsInternet of Things - Recent developments and Trends
Internet of Things - Recent developments and Trends
 
Computer forensics and Investigation
Computer forensics and InvestigationComputer forensics and Investigation
Computer forensics and Investigation
 
Information system ethics
Information system ethicsInformation system ethics
Information system ethics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoT
 
Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2
 
Iot and ethics
Iot and ethicsIot and ethics
Iot and ethics
 
Internet of Things: Research Directions
Internet of Things: Research DirectionsInternet of Things: Research Directions
Internet of Things: Research Directions
 
S719a
S719aS719a
S719a
 
Iot enabled technologies
Iot enabled technologiesIot enabled technologies
Iot enabled technologies
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGS
 

Andere mochten auch

C6 deploying applications to your private cloud 7 to 10 times faster
C6   deploying applications to your private cloud 7 to 10 times fasterC6   deploying applications to your private cloud 7 to 10 times faster
C6 deploying applications to your private cloud 7 to 10 times faster
Dr. Wilfred Lin (Ph.D.)
 
A7 getting value from big data how to get there quickly and leverage your c...
A7   getting value from big data how to get there quickly and leverage your c...A7   getting value from big data how to get there quickly and leverage your c...
A7 getting value from big data how to get there quickly and leverage your c...
Dr. Wilfred Lin (Ph.D.)
 
Chapter 02 The Internet
Chapter 02 The InternetChapter 02 The Internet
Chapter 02 The Internet
xtin101
 
Chapter 06 Inside Computers and Mobile Devices
Chapter 06 Inside Computers and Mobile DevicesChapter 06 Inside Computers and Mobile Devices
Chapter 06 Inside Computers and Mobile Devices
xtin101
 

Andere mochten auch (20)

Rob Kitchin Smart Cities 08th March 2016 (Smart Dublin)
Rob Kitchin Smart Cities 08th March 2016 (Smart Dublin)Rob Kitchin Smart Cities 08th March 2016 (Smart Dublin)
Rob Kitchin Smart Cities 08th March 2016 (Smart Dublin)
 
Urban indicators, city benchmarking, and real time dashboards: Knowing and go...
Urban indicators, city benchmarking, and real time dashboards: Knowing and go...Urban indicators, city benchmarking, and real time dashboards: Knowing and go...
Urban indicators, city benchmarking, and real time dashboards: Knowing and go...
 
Code acts in code/space
Code acts in code/spaceCode acts in code/space
Code acts in code/space
 
Big Data: Implications for Marketing and Strategy
Big Data: Implications for Marketing and StrategyBig Data: Implications for Marketing and Strategy
Big Data: Implications for Marketing and Strategy
 
C6 deploying applications to your private cloud 7 to 10 times faster
C6   deploying applications to your private cloud 7 to 10 times fasterC6   deploying applications to your private cloud 7 to 10 times faster
C6 deploying applications to your private cloud 7 to 10 times faster
 
Git Internals
Git InternalsGit Internals
Git Internals
 
A7 getting value from big data how to get there quickly and leverage your c...
A7   getting value from big data how to get there quickly and leverage your c...A7   getting value from big data how to get there quickly and leverage your c...
A7 getting value from big data how to get there quickly and leverage your c...
 
Chapter 02
Chapter 02Chapter 02
Chapter 02
 
Large-scale digitisation options at the Natural History Museum, London.
Large-scale digitisation options at the Natural History Museum, London.Large-scale digitisation options at the Natural History Museum, London.
Large-scale digitisation options at the Natural History Museum, London.
 
Data-driven urbanism (Amsterdam, Jan 2017)
Data-driven urbanism (Amsterdam, Jan 2017)Data-driven urbanism (Amsterdam, Jan 2017)
Data-driven urbanism (Amsterdam, Jan 2017)
 
Methodological principles in dealing with Big Data, Reijo Sund
Methodological principles in dealing with Big Data, Reijo SundMethodological principles in dealing with Big Data, Reijo Sund
Methodological principles in dealing with Big Data, Reijo Sund
 
The Impact of the Data Revolution on Official Statistics: Opportunities, Chal...
The Impact of the Data Revolution on Official Statistics: Opportunities, Chal...The Impact of the Data Revolution on Official Statistics: Opportunities, Chal...
The Impact of the Data Revolution on Official Statistics: Opportunities, Chal...
 
Big data, new epistemologies and paradigm shifts
Big data, new epistemologies and paradigm shiftsBig data, new epistemologies and paradigm shifts
Big data, new epistemologies and paradigm shifts
 
Praxis and politics of urban data: Building the Dublin Dashboard
Praxis and politics of urban data: Building the Dublin DashboardPraxis and politics of urban data: Building the Dublin Dashboard
Praxis and politics of urban data: Building the Dublin Dashboard
 
Dublin dashboard launch
Dublin dashboard launchDublin dashboard launch
Dublin dashboard launch
 
Big data and smart cities: Key data issues
Big data and smart cities: Key data issuesBig data and smart cities: Key data issues
Big data and smart cities: Key data issues
 
Chapter 02 The Internet
Chapter 02 The InternetChapter 02 The Internet
Chapter 02 The Internet
 
Chapter 06 Inside Computers and Mobile Devices
Chapter 06 Inside Computers and Mobile DevicesChapter 06 Inside Computers and Mobile Devices
Chapter 06 Inside Computers and Mobile Devices
 
Big Search with Big Data Principles
Big Search with Big Data PrinciplesBig Search with Big Data Principles
Big Search with Big Data Principles
 
Smart cities: realising the promises while minimizing the perils
Smart cities: realising the promises while minimizing the perilsSmart cities: realising the promises while minimizing the perils
Smart cities: realising the promises while minimizing the perils
 

Ähnlich wie Privacy in a digital world

Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
Careerera
 
Identity Security.docx
Identity Security.docxIdentity Security.docx
Identity Security.docx
Mohsin Abbas
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
KnownId
 

Ähnlich wie Privacy in a digital world (20)

Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gap
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Information Security and Indian IT Act 2000
Information Security and Indian IT Act 2000Information Security and Indian IT Act 2000
Information Security and Indian IT Act 2000
 
Security and Privacy Considerations in the Open Network for Digital Commerce.pdf
Security and Privacy Considerations in the Open Network for Digital Commerce.pdfSecurity and Privacy Considerations in the Open Network for Digital Commerce.pdf
Security and Privacy Considerations in the Open Network for Digital Commerce.pdf
 
Legal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsLegal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing Informatics
 
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect id
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Cisa 2013 ch5
Cisa 2013 ch5Cisa 2013 ch5
Cisa 2013 ch5
 
Introduction to cyber security.pptx
Introduction to cyber security.pptxIntroduction to cyber security.pptx
Introduction to cyber security.pptx
 
Mobileprivacyazahir
MobileprivacyazahirMobileprivacyazahir
Mobileprivacyazahir
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
Privacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishPrivacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or Perish
 
New Developments in Cybersecurity and Technology for RDOs: Howland
New Developments in Cybersecurity and Technology for RDOs: HowlandNew Developments in Cybersecurity and Technology for RDOs: Howland
New Developments in Cybersecurity and Technology for RDOs: Howland
 
Identity Security.docx
Identity Security.docxIdentity Security.docx
Identity Security.docx
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
Data security
Data securityData security
Data security
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
 

Mehr von robkitchin

The crisis in Ireland in graphs and maps
The crisis in Ireland in graphs and mapsThe crisis in Ireland in graphs and maps
The crisis in Ireland in graphs and maps
robkitchin
 

Mehr von robkitchin (10)

The right to the smart city
The right to the smart cityThe right to the smart city
The right to the smart city
 
Adoption gap issues in smart cities
Adoption gap issues in smart citiesAdoption gap issues in smart cities
Adoption gap issues in smart cities
 
Citizenship, social justice, and the Right to the Smart City
Citizenship, social justice, and the Right to the Smart CityCitizenship, social justice, and the Right to the Smart City
Citizenship, social justice, and the Right to the Smart City
 
Being a ‘citizen’ in the smart city: Up and down the scaffold of smart citize...
Being a ‘citizen’ in the smart city: Up and down the scaffold of smart citize...Being a ‘citizen’ in the smart city: Up and down the scaffold of smart citize...
Being a ‘citizen’ in the smart city: Up and down the scaffold of smart citize...
 
Planning in an era of smart urbanism
Planning in an era of smart urbanismPlanning in an era of smart urbanism
Planning in an era of smart urbanism
 
Why the National Spatial Strategy failed and prospects for the National Plann...
Why the National Spatial Strategy failed and prospects for the National Plann...Why the National Spatial Strategy failed and prospects for the National Plann...
Why the National Spatial Strategy failed and prospects for the National Plann...
 
Funding models for open access digital repositories
Funding models for open access digital repositoriesFunding models for open access digital repositories
Funding models for open access digital repositories
 
Housing in Ireland: From Crisis to Crisis
Housing in Ireland: From Crisis to CrisisHousing in Ireland: From Crisis to Crisis
Housing in Ireland: From Crisis to Crisis
 
Smart cities, big data & their consequences
Smart cities, big data & their consequencesSmart cities, big data & their consequences
Smart cities, big data & their consequences
 
The crisis in Ireland in graphs and maps
The crisis in Ireland in graphs and mapsThe crisis in Ireland in graphs and maps
The crisis in Ireland in graphs and maps
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Privacy in a digital world

  • 1. Privacy in a digital world Rob Kitchin NIRSA, National University of Ireland Maynooth
  • 2. Introduction • Digital footprints (data individuals leave behind) • Data shadows (information about individuals generated by others) • Unique IDs for people, institutions, objects, interactions, transactions and territories • Increasingly being harvested, combined, analyzed, acted upon
  • 3. Fair Information Practice Principles Principle Description Notice Individuals are informed that data are being generated and the purpose to which the data will be put Choice Individuals have the choice to opt-in or opt-out as to whether and how their data will be used or disclosed Consent Data are only generated and disclosed with the consent of individuals Security Data are protected from loss, misuse, unauthorized access, disclosure, alteration and destruction Integrity Data are reliable, accurate, complete and current Access Individuals can access, check and verify data about themselves Accountability The data holder is accountable for ensuring the above principles and has mechanisms in place to assure compliance
  • 4. Data type Data collected by Uber android app (from Hein 2014) Accounts log email log App Activity name, package name, process number of activity, processed id App Data Usage Cache size, code size, data size, name, package name App Install installed at, name, package name, unknown sources enabled, version code, version name Battery health, level, plugged, present, scale, status, technology, temperature, voltage Device Info board, brand, build version, cell number, device, device type, display, fingerprint, IP, MAC address, manufacturer, model, OS platform, product, SDK code, total disk space, unknown sources enabled GPS accuracy, altitude, latitude, longitude, provider, speed MMS from number, MMS at, MMS type, service number, to number NetData bytes received, bytes sent, connection type, interface type PhoneCall call duration, called at, from number, phone call type, to number SMS from number, service number, SMS at, SMS type, to number TelephonyInfo cell tower ID, cell tower latitude, cell tower longitude, IMEI, ISO country code, local area code, MEID, mobile country code, mobile network code, network name, network type, phone type, SIM serial number, SIM state, subscriber ID WifiConnection BSSID, IP, linkspeed, MAC addr, network ID, RSSI, SSID WifiNeighbors BSSID, capabilities, frequency, level, SSID Root Check root status code, root status reason code, root version, sig file version Malware Info algorithm confidence, app list, found malware, malware SDK version, package list, reason code, service list, sigfile version
  • 5. A Taxonomy of Privacy (compiled from Solove 2006) Domain Privacy breach Description Information Collection Surveillance Watching, listening to, or recording of an individual’s activities Interrogation Various forms of questioning or probing for information Information Processing Aggregation The combination of various pieces of data about a person Identification Linking information to particular individuals Insecurity Carelessness in protecting stored information from leaks and improper access Secondary Use Use of information collected for one purpose for a different purpose without the data subject’s consent Exclusion Failure to allow the data subject to know about the data that others have about her and participate in its handling and use, including being barred from being able to access and correct errors Information Dissemination Breach of Confidentiality Breaking a promise to keep a person’s information confidential Disclosure Revelation of information about a person that impacts the way others judge her character Exposure Revealing another’s nudity, grief, or bodily functions Increased Accessibility Amplifying the accessibility of information Blackmail Threat to disclose personal information Appropriation The use of the data subject’s identity to serve the aims and interests of another Distortion Dissemination of false or misleading information about individuals Invasion Intrusion Invasive acts that disturb one’s tranquillity or solitude Decisional Interference Incursion into the data subject’s decisions regarding her private
  • 6. Loss of privacy effects • Extensive dataveillance/surveillance • social sorting • control creep • dynamic pricing • anticipatory governance • data security/protection – cybercrimes
  • 7. The principles of Privacy by Design Principle Description Proactive not reactive; preventative not remedial IT systems should seek to anticipate privacy concerns rather than seeking to resolve privacy infractions once they have incurred Privacy as the default setting Privacy is automatically protected and does not require action on behalf of an individual Privacy embedded into design Privacy protections are core features of the design and architecture of IT systems and is not and bolt-on feature Full functionality - positive-sum, not zero-sum All legitimate interests and objectives are accommodated, rather than there being trade-offs between privacy and other considerations such as security End-to-end security - full lifecycle protection Privacy is embedded into the system from ingestion to disposal Visibility and transparency - keep it open Component parts and operations are visible and transparent to users and providers alike and are subject to independent verification Respect for user privacy - keep it user-centric A system should be built around, protect the interests, and empower individuals
  • 8. Conclusion • Privacy is multidimensional in nature • Notions & practices of privacy are changing rapidly • Has all kinds of direct and indirect effects • Technology & industry are running ahead of legislators; as are states • There is no teleological inevitability to the emerging privacy landscape • It is incumbent on states to address privacy issues and to find a balance with respect to interests of citizens, states and industry