The document discusses data protection issues related to the Internet of Things (IoT) under EU law, outlining privacy challenges identified by the EU's Article 29 Working Party including lack of user control, quality of consent, security risks, and limitations on anonymity, and it summarizes relevant EU data protection principles governing the collection and processing of personal data from IoT devices.
rights and responsibilities
privacy by design strategies
privacy principles
privacy enhancing technologies (PETs)
big data concerns
private, shared and public - boundary transitions
data protection impact assessment (DPIA)
cross border data transfers
derogations for research
20150630_D6 1_Legal and EthicalFrameworkand Privacy and Security PrinciplesLisa Catanzaro
油
This document provides an overview of the legal and ethical framework for the WITDOM project, which involves processing personal data in untrusted cloud environments. It discusses key European data protection and cybersecurity legislation and their application to new computing environments. Specifically, it examines the 1995 EU Data Protection Directive, the proposed General Data Protection Regulation, and the 2013 Network and Information Security Directive. It also assesses ethical guidelines to support human values like privacy, security and justice. The document identifies legal issues, principles and potential requirements or barriers to managing and protecting personal data in untrusted domains.
1. The document discusses the NIST Framework for improving critical infrastructure cybersecurity that was mandated by an Executive Order from President Obama. It outlines the development process for the Framework, which included input from various industries.
2. The Framework takes a risk-based approach and includes five cybersecurity functions along with implementation levels. It references existing cybersecurity standards and guidelines.
3. Privacy concerns were addressed through a subgroup that conducted the first SmartGrid privacy impact assessment. Recommendations included transparency, privacy impact assessments, and training for workers with access to personal information.
Personal data: Legal Issues in Research Data Collection and Sharing by EUDAT ...EUDAT
油
| www.eudat.eu | v1.0, June 2014 - Protection of personal data is a major concern of many. The EU Data Protection Directive (95/46/EC) identifies it as any information relating to an identified or identifiable natural person. However, what exactly do we mean by processing of personal data? When is it lawful? Are there any special categories of personal data? What is consent? What are the obligations of the data controller? Download this presentation and find out.
Who is it for?: Researchers, Data Managers, General public.
Legal framework for digital health innvoation - Protection through patents, d...DayOne
油
Presentation by Philipp Marchand and Birgitte Bieler, Vossius & Partner at the DayOne Expert Event Legal challenges and opportunities for digital health innovation
Philipp Marchand from Vossius & Partner and co-host of the event said: Technological developments, especially in the digital space, brought up completely new issues which lack clear definition. So, as lawyers and regulatory advisers, we have to be innovative and also come up with new solutions. This is a learning curve we have to go through together with entrepreneurs, industry and regulatory bodies.
In other words, instead of being a French garden la Versaille, the legal landscape has become a rather rough terrain to navigate. The uncertainty can be seen as a threat and show killer. A more entrepreneurial attitude, however, would be to see it as an opportunity, if not an invitation, to pursue more of a greenfield approach. But in order to make this happen, it is essential to address the legal aspects early on and make them part of the solution.
Protection
Accustomaed as it is to a science and engineering-driven approach, the healthcare industry has to change its mindset when it comes to protecting its business. As it is reasonable to patent a digital solution and to protect medical devices as well as mobile app interfaces by means of design and trademark rights, the legal framework is becoming more important. So, developing a great technological solution and then having it beautified later on will not suffice. Those capabilities have to be built in from day one to ensure freedom to operate and to generate added value from the digital solutions.
The document summarizes international efforts to combat cybercrime through a 3-tier strategy of law enforcement and national security cooperation, establishing ground rules for the internet economy through policy frameworks, and encouraging private sector self-protection. It outlines initiatives by organizations like the OECD, G8, APEC, and IGF to facilitate cross-border cooperation on issues like spam, privacy, and critical infrastructure protection through legal instruments, policy guidelines, and public-private partnerships. While criminal law and enforcement are important, robust international cooperation is needed across legal, policy, and technical domains to build a secure internet that maximizes economic and social benefits.
Wsgr eu data protection briefing march 20 2013 - finalValentin Korobkov
油
1. The document outlines a presentation given in Moscow on the European Union's privacy and data protection legal framework.
2. It provides an overview of the key EU directives and regulations governing privacy, including the upcoming EU Data Protection Regulation, and discusses the regulatory approach of focusing on individuals' rights and informational self-determination.
3. The presentation also examines issues around implementing privacy compliance in practice and focuses on selected issues like secrecy of communications, user identification, and security requirements.
The document discusses Intellect's cyber security programme. It outlines Intellect's focus areas and engagement with various UK government organizations. It also provides an overview of Intellect's defence and security programme, which includes a cyber security group formed in 2009 to provide industry voice in high threat areas and help information sharing between government and industry on cyber threats.
The document discusses the key topics around big data and data protection that were covered at a legal update event, including:
1) How the principles of data protection (such as fair processing, data minimization, and security) apply to big data, which can involve large and varied datasets.
2) Issues around obtaining valid consent for big data uses or relying on legitimate interests, as well as complying with the data retention principle.
3) How the research exemption may apply to some big data activities for commercial purposes like market research.
4) Potential impacts of the proposed EU Data Protection Regulation on big data, such as strengthened individual rights and compliance obligations for organizations.
Paperless Lab Academy 'legal aspects of big data analytics' Axon Lawyers
油
This document provides an overview of legal aspects related to big data analytics. It defines big data and discusses legal perspectives on data protection and privacy in the context of big data. The document outlines how the collection and analysis of large datasets can constitute processing of personal data, raising issues of consent, data minimization, anonymization, and security. It also discusses how regulations like the EU's General Data Protection Regulation aim to address privacy challenges from big data while balancing opportunities for innovation.
Legal Framework for Digital Health Innovation - Data Protection and SecurityDayOne
油
This document summarizes key aspects of data protection and security regulations for digital health innovation in Europe. It discusses the territorial scope of the GDPR and Swiss Data Protection Act and how they apply. It also covers how personal and non-personal data are defined, anonymization, and risks of re-identification. Big data analytics and artificial intelligence are discussed in relation to patient consent. Technical and organizational security measures required by the GDPR, NIS Directive, and medical device regulations are outlined. The principles of data protection by design and by default and data protection impact assessments are summarized. Data portability rights and issues around data ownership and access are also briefly discussed.
The document discusses strengthening international cooperation to address evolving cyber threats. It introduces IMPACT, an international cybersecurity alliance, and its role in operationalizing initiatives through the ITU's Global Cybersecurity Agenda. IMPACT brings together governments, industry, and academia to facilitate capacity building, technical assistance, training, research, and policy development efforts across 191 countries.
Hacking Health Camp Strasbourg health data & data protection in the Netherlands Axon Lawyers
油
This document summarizes key points about data protection and privacy in the Netherlands. It discusses the legal framework for data protection in the EU and Netherlands, including the Data Protection Directive, upcoming General Data Protection Regulation, and the Dutch Data Protection Authority. It covers definitions of personal data, parties involved in processing, rules around health data, data security, and recent developments around data breaches. The document also flags other legal issues that may be relevant for digital health technologies, like software qualifying as a medical device.
2014 Update EU Cyber Law & Authentication LegislationMartenLinkedin
油
This document summarizes the latest developments in European Union cyber law and regulation of national authentication systems. It discusses the new EU data protection legislation and electronic identification regulation that will replace the 1999 electronic signatures directive. The regulation establishes assurance levels for electronic identification schemes and requires EU countries to recognize each other's identification schemes that meet the substantial or high levels. It also defines requirements for trust service providers that issue electronic signatures, seals, time stamps and registered delivery services.
Good Practices and Recommendations on the Security and Resilience of Big Data...Eftychia Chalvatzi
油
This document summarizes a report by the European Union Agency for Network and Information Security (ENISA) regarding security challenges and recommendations related to big data systems. The report identifies key security challenges such as access control and authentication, secure data management, and source validation and filtering. It provides recommendations for various stakeholders, including that policy makers provide guidance for secure big data use, standardization bodies adapt standards to include big data security, and companies invest in big data security skills and compliance with standards.
Social business software is all about sharing content and data in a collaborative way to identify internal or external experts. Most of these data must be considered as personal data which is related to an individual person.
Implementing social business technologies in enterprises often leads to discussion with data protection supervisors how to be compliant with EU data protection law. This discussion gets even more challenging if you consider using social business applications in the cloud which might the only choice in the near future due IBMs Cloud First or Microsofts Cloud only delivery model.
This session will give you an overview
- about EU data protection regulations
- its implications for using social business systems
- special considerations for using cloud based social business systems
The document summarizes the key points of the proposed European Union Data Protection Package. It discusses the reform of the 1995 EU Data Protection Directive and the proposed Regulation and Directive. The Regulation would apply broadly to any processing of personal data and introduce the "right to be forgotten". It would require consent for data processing and transparency about data collection and use. The Regulation establishes the authority of national data protection agencies and penalties for noncompliance.
The document summarizes key aspects of the EU's General Data Protection Regulation (GDPR) that takes effect in May 2018, including:
- It expands the territorial scope of EU data protection law and sets a higher standard for consent.
- It establishes principles of accountability, data protection by design/default, and data protection impact assessments to demonstrate compliance.
- It strengthens individual rights around access, rectification, erasure, data portability, and objection to processing.
- It imposes new rules around international data transfers and increases maximum fines for noncompliance.
- Organizations should review their governance, policies, procedures and consent mechanisms to prepare for the GDPR's requirements.
The document summarizes Sri Lanka's cybercrime legislation and policies from the perspective of a developing country. It provides an overview of Sri Lanka's key cybercrime laws, including the Computer Crimes Act of 2007, and discusses some of the challenges in enforcing cybercrime laws and addressing them through awareness programs, improved digital forensics capabilities, and the creation of computer emergency response teams.
Are blockchain and EU-GDPR compatible? This presentation from 2020, from Dennis Hillemann (Podcast: The Blockchain lawyer), explains the most important legal challenges. The presentation explains:
- What are basic principles of GDPR?
- What are basic functionalities of the blockchain technology?
- What main issues are there between GDPR and blockchain technology?
- What is personal data in a blockchain scenario?
- Personal data & encryption and & hashing
- Salting and Peppering
- Data processor and controller in a blockchain scneario
- Right to rectification and right to erasure
- Transfer to third countries
- National and internatinal activities to bring Blockchain and GDPR together.
'Connected healthcare - connected to legality?'Lucy Woods
油
In January 2016, we held a Legal SIG (special interest group) at the London HQ of Olswang. Speakers included Juma El-Awaisi of Braci, Ross McKean of Olswang and Ken Munro of Pen Test Partners. Ken's presentation was interactive so slides are coming soon!
Presentation of the USEMP and Privacy Flag projects during INFO-COM 2015, Athens, Greece, discussing about privacy and risks in today's electronic world
EU General Data Protection: Implications for Smart Meteringnuances
油
This presentation provides the reader with an insight into the politics of EU Data protection as well as an overview of the key stakeholders. We focus on the implication for the smart metering industry.
IT law : the middle kingdom between east and WestLilian Edwards
油
This document discusses balancing privacy, security, business interests, and other values. It notes that recent Western experience shows promoting security over privacy can hurt industry by reducing consumer confidence, and that lack of privacy protection can impact business profits from data usage. The document suggests China could learn lessons from this experience, and that global trends show strengthening, not weakening, privacy is important to maintain trust and enable digital innovation.
The document discusses incentive mechanisms for privacy-preserving Internet of Things (IoT). It addresses common misconceptions about privacy in IoT and discusses how incentive mechanisms can encourage user participation while balancing privacy and accuracy. Specifically, it notes that incentive mechanisms, like reverse auctions, are needed to attract crowdsensing users to contribute data. However, these mechanisms must also consider users' varying privacy levels and how coalitions can impact privacy. The document examines how user contributions, payoffs, and coalitions should be handled to optimize this accuracy-privacy tradeoff.
Accountability under the GDPR: What does it mean for Boards & Senior Management?IT Governance Ltd
油
The document discusses accountability under the GDPR and what it means for boards and senior management. It explains that the GDPR introduces the principle of accountability which requires organizations to demonstrate compliance with GDPR requirements. It also discusses specific GDPR requirements including data protection audits, impact assessments, policies and procedures, training, and appointing a data protection officer. The accountability principle means organizations need to implement comprehensive governance measures and have a culture of privacy.
Glyndwr University is establishing a sister college in the USA. This poses legal implications under the UK Data Protection Act 1998, as the USA does not have equivalent data protection legislation. The Act prohibits transferring personal data to countries without adequate protections. To legally share data with the USA, Glyndwr must comply with the "Safe Harbour" principles agreed between the EU and USA, which aim to ensure adequate privacy protections. Key requirements include obtaining consent for data use and processing, keeping data secure, accurate and up-to-date, and providing access for individuals to correct errors. Complying with Safe Harbour allows Glyndwr to legally pursue its plans for the sister college while protecting privacy under UK law.
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...Konstantinos Demertzis
油
The document describes an Intelligent Policies Analysis Mechanism (IPAM) that is part of the ADVOCATE framework. IPAM uses machine learning methods like Fuzzy Cognitive Maps and Extreme Learning Machines to identify potentially conflicting rules or consents from a user that could lead to personal data collection and profiling without consent. The framework aims to help users maintain control over their personal data as required by GDPR regulations. IPAM simulates how smart devices collect personal data and identifies rules that may enable profiling, training on example data to learn how to detect such instances.
The document discusses Intellect's cyber security programme. It outlines Intellect's focus areas and engagement with various UK government organizations. It also provides an overview of Intellect's defence and security programme, which includes a cyber security group formed in 2009 to provide industry voice in high threat areas and help information sharing between government and industry on cyber threats.
The document discusses the key topics around big data and data protection that were covered at a legal update event, including:
1) How the principles of data protection (such as fair processing, data minimization, and security) apply to big data, which can involve large and varied datasets.
2) Issues around obtaining valid consent for big data uses or relying on legitimate interests, as well as complying with the data retention principle.
3) How the research exemption may apply to some big data activities for commercial purposes like market research.
4) Potential impacts of the proposed EU Data Protection Regulation on big data, such as strengthened individual rights and compliance obligations for organizations.
Paperless Lab Academy 'legal aspects of big data analytics' Axon Lawyers
油
This document provides an overview of legal aspects related to big data analytics. It defines big data and discusses legal perspectives on data protection and privacy in the context of big data. The document outlines how the collection and analysis of large datasets can constitute processing of personal data, raising issues of consent, data minimization, anonymization, and security. It also discusses how regulations like the EU's General Data Protection Regulation aim to address privacy challenges from big data while balancing opportunities for innovation.
Legal Framework for Digital Health Innovation - Data Protection and SecurityDayOne
油
This document summarizes key aspects of data protection and security regulations for digital health innovation in Europe. It discusses the territorial scope of the GDPR and Swiss Data Protection Act and how they apply. It also covers how personal and non-personal data are defined, anonymization, and risks of re-identification. Big data analytics and artificial intelligence are discussed in relation to patient consent. Technical and organizational security measures required by the GDPR, NIS Directive, and medical device regulations are outlined. The principles of data protection by design and by default and data protection impact assessments are summarized. Data portability rights and issues around data ownership and access are also briefly discussed.
The document discusses strengthening international cooperation to address evolving cyber threats. It introduces IMPACT, an international cybersecurity alliance, and its role in operationalizing initiatives through the ITU's Global Cybersecurity Agenda. IMPACT brings together governments, industry, and academia to facilitate capacity building, technical assistance, training, research, and policy development efforts across 191 countries.
Hacking Health Camp Strasbourg health data & data protection in the Netherlands Axon Lawyers
油
This document summarizes key points about data protection and privacy in the Netherlands. It discusses the legal framework for data protection in the EU and Netherlands, including the Data Protection Directive, upcoming General Data Protection Regulation, and the Dutch Data Protection Authority. It covers definitions of personal data, parties involved in processing, rules around health data, data security, and recent developments around data breaches. The document also flags other legal issues that may be relevant for digital health technologies, like software qualifying as a medical device.
2014 Update EU Cyber Law & Authentication LegislationMartenLinkedin
油
This document summarizes the latest developments in European Union cyber law and regulation of national authentication systems. It discusses the new EU data protection legislation and electronic identification regulation that will replace the 1999 electronic signatures directive. The regulation establishes assurance levels for electronic identification schemes and requires EU countries to recognize each other's identification schemes that meet the substantial or high levels. It also defines requirements for trust service providers that issue electronic signatures, seals, time stamps and registered delivery services.
Good Practices and Recommendations on the Security and Resilience of Big Data...Eftychia Chalvatzi
油
This document summarizes a report by the European Union Agency for Network and Information Security (ENISA) regarding security challenges and recommendations related to big data systems. The report identifies key security challenges such as access control and authentication, secure data management, and source validation and filtering. It provides recommendations for various stakeholders, including that policy makers provide guidance for secure big data use, standardization bodies adapt standards to include big data security, and companies invest in big data security skills and compliance with standards.
Social business software is all about sharing content and data in a collaborative way to identify internal or external experts. Most of these data must be considered as personal data which is related to an individual person.
Implementing social business technologies in enterprises often leads to discussion with data protection supervisors how to be compliant with EU data protection law. This discussion gets even more challenging if you consider using social business applications in the cloud which might the only choice in the near future due IBMs Cloud First or Microsofts Cloud only delivery model.
This session will give you an overview
- about EU data protection regulations
- its implications for using social business systems
- special considerations for using cloud based social business systems
The document summarizes the key points of the proposed European Union Data Protection Package. It discusses the reform of the 1995 EU Data Protection Directive and the proposed Regulation and Directive. The Regulation would apply broadly to any processing of personal data and introduce the "right to be forgotten". It would require consent for data processing and transparency about data collection and use. The Regulation establishes the authority of national data protection agencies and penalties for noncompliance.
The document summarizes key aspects of the EU's General Data Protection Regulation (GDPR) that takes effect in May 2018, including:
- It expands the territorial scope of EU data protection law and sets a higher standard for consent.
- It establishes principles of accountability, data protection by design/default, and data protection impact assessments to demonstrate compliance.
- It strengthens individual rights around access, rectification, erasure, data portability, and objection to processing.
- It imposes new rules around international data transfers and increases maximum fines for noncompliance.
- Organizations should review their governance, policies, procedures and consent mechanisms to prepare for the GDPR's requirements.
The document summarizes Sri Lanka's cybercrime legislation and policies from the perspective of a developing country. It provides an overview of Sri Lanka's key cybercrime laws, including the Computer Crimes Act of 2007, and discusses some of the challenges in enforcing cybercrime laws and addressing them through awareness programs, improved digital forensics capabilities, and the creation of computer emergency response teams.
Are blockchain and EU-GDPR compatible? This presentation from 2020, from Dennis Hillemann (Podcast: The Blockchain lawyer), explains the most important legal challenges. The presentation explains:
- What are basic principles of GDPR?
- What are basic functionalities of the blockchain technology?
- What main issues are there between GDPR and blockchain technology?
- What is personal data in a blockchain scenario?
- Personal data & encryption and & hashing
- Salting and Peppering
- Data processor and controller in a blockchain scneario
- Right to rectification and right to erasure
- Transfer to third countries
- National and internatinal activities to bring Blockchain and GDPR together.
'Connected healthcare - connected to legality?'Lucy Woods
油
In January 2016, we held a Legal SIG (special interest group) at the London HQ of Olswang. Speakers included Juma El-Awaisi of Braci, Ross McKean of Olswang and Ken Munro of Pen Test Partners. Ken's presentation was interactive so slides are coming soon!
Presentation of the USEMP and Privacy Flag projects during INFO-COM 2015, Athens, Greece, discussing about privacy and risks in today's electronic world
EU General Data Protection: Implications for Smart Meteringnuances
油
This presentation provides the reader with an insight into the politics of EU Data protection as well as an overview of the key stakeholders. We focus on the implication for the smart metering industry.
IT law : the middle kingdom between east and WestLilian Edwards
油
This document discusses balancing privacy, security, business interests, and other values. It notes that recent Western experience shows promoting security over privacy can hurt industry by reducing consumer confidence, and that lack of privacy protection can impact business profits from data usage. The document suggests China could learn lessons from this experience, and that global trends show strengthening, not weakening, privacy is important to maintain trust and enable digital innovation.
The document discusses incentive mechanisms for privacy-preserving Internet of Things (IoT). It addresses common misconceptions about privacy in IoT and discusses how incentive mechanisms can encourage user participation while balancing privacy and accuracy. Specifically, it notes that incentive mechanisms, like reverse auctions, are needed to attract crowdsensing users to contribute data. However, these mechanisms must also consider users' varying privacy levels and how coalitions can impact privacy. The document examines how user contributions, payoffs, and coalitions should be handled to optimize this accuracy-privacy tradeoff.
Accountability under the GDPR: What does it mean for Boards & Senior Management?IT Governance Ltd
油
The document discusses accountability under the GDPR and what it means for boards and senior management. It explains that the GDPR introduces the principle of accountability which requires organizations to demonstrate compliance with GDPR requirements. It also discusses specific GDPR requirements including data protection audits, impact assessments, policies and procedures, training, and appointing a data protection officer. The accountability principle means organizations need to implement comprehensive governance measures and have a culture of privacy.
Glyndwr University is establishing a sister college in the USA. This poses legal implications under the UK Data Protection Act 1998, as the USA does not have equivalent data protection legislation. The Act prohibits transferring personal data to countries without adequate protections. To legally share data with the USA, Glyndwr must comply with the "Safe Harbour" principles agreed between the EU and USA, which aim to ensure adequate privacy protections. Key requirements include obtaining consent for data use and processing, keeping data secure, accurate and up-to-date, and providing access for individuals to correct errors. Complying with Safe Harbour allows Glyndwr to legally pursue its plans for the sister college while protecting privacy under UK law.
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...Konstantinos Demertzis
油
The document describes an Intelligent Policies Analysis Mechanism (IPAM) that is part of the ADVOCATE framework. IPAM uses machine learning methods like Fuzzy Cognitive Maps and Extreme Learning Machines to identify potentially conflicting rules or consents from a user that could lead to personal data collection and profiling without consent. The framework aims to help users maintain control over their personal data as required by GDPR regulations. IPAM simulates how smart devices collect personal data and identifies rules that may enable profiling, training on example data to learn how to detect such instances.
20131009 aon security breach legislationJos Dumortier
油
The document discusses recent EU legislation around security breach notification duties. It summarizes that the 2009 EU ePrivacy Directive first introduced security breach notification requirements for telecom providers and ISPs. Recent EU proposals aim to expand these duties to other sectors by 1) extending notification to data protection authorities and individuals under the 2012 General Data Protection Regulation and 2) requiring notifications for public administrations and critical infrastructure operators under the 2013 Network and Information Security Directive. The proposals seek to increase harmonization of security breach response across EU member states but questions remain around practical implementation details.
This document discusses collaborating on regulation for machine-to-machine (M2M) and internet of things (IoT) technologies in the Middle East region. It notes that key stakeholders are bringing together issues like big data, cloud computing, privacy, and cybersecurity to devise a regulatory framework. It suggests establishing a regional M2M/IoT working group through DLA Piper to develop whitepapers on relevant topics. While some see no need yet for specific regulation, others argue regulators can facilitate joining supply and demand. Examples of regional collaboration discussed include initiatives by the UAE's TRA and smart city projects in Dubai.
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...IDC4EU
油
This is the slide-deck of the community event held on November 14, 2019 in Brussels, titled "Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019". It includes the presentations given by the speakers.
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...e-SIDES.eu
油
This is the slide-deck of the community event held on November 14, 2019 in Brussels, titled "Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019". It includes the presentations given by the speakers.
EU cybersecurity requirements under current and future medical devices regula...Erik Vollebregt
油
Presentation delivered at Q1 MEDICAL DEVICE CYBERSECURITY RISK MITIGATION conference in Washington on 25 July 2016 concerning EU cybersecurity requirements under current and future medical devices regulation
The document discusses privacy concerns regarding mobile health apps and solutions. It summarizes the key privacy standards and regulations that apply, including the EU Data Protection Directive and ePrivacy Directive. It also summarizes opinions from the Article 29 Working Party that provide guidance on applying the legal standards to health data processing and apps.
This webinar gives an overview of:
- The regulation landscape
- Territorial scope
- Remedies, liabilities and penalties
- Privacy notices
- The right of data subject
- Consent
- Data processing
- Profiling or "automated individual decision-making"
- International marketing and data transfers
A recording of this webinar is available here:
https://www.youtube.com/watch?v=Vr_CT24v2iI
The document discusses challenges to privacy protections posed by emerging technologies and uses of data. It summarizes that consent is becoming less meaningful online as privacy policies are complex and terms frequently change. Ubiquitous computing through devices and sensors raises issues as data is collected by default without notice or choice. Big data analysis makes it difficult to provide notice of future uses of data or obtain meaningful consent, while re-identification risks undermine anonymization as a solution. Overall, existing legal frameworks centered around notice and consent are struggling to address these new privacy realities.
This document discusses declining privacy norms and the challenges posed by new technologies. It summarizes:
1) Consent for data collection and use has become less meaningful online as privacy policies are complex and users prioritize immediate benefits over long-term privacy risks.
2) Ubiquitous computing through technologies like RFID, smart meters, and sensors threaten to collect personal data without notice or choice as collection becomes invisible and ambient.
3) Reform efforts have failed to adequately address these issues, and notice and consent may no longer be viable frameworks as technologies learn from total and constant data collection in ways that are adaptive and useful but threaten privacy.
IoT security and privacy: main challenges and how ISOC-OTA address themRadouane Mrabet
油
Internet Society (ISOC) aims are:
make security an integrated function of connected objects and encourages IoT device and service providers for consumers to adopt the Online Trust Alliance (OTA) security and privacy principles ;
increase the consumer demand for security and privacy in the IoT devices they purchase;
create government policies and regulations that promote better security and privacy features in IoT devices.
Cross border - off-shoring and outsourcing privacy sensitive dataUlf Mattsson
油
Ulf Mattsson is the CTO of Protegrity, with over 20 years of experience in research and development and global services at IBM. He has been involved in developing encryption, tokenization, and intrusion prevention technologies. The document discusses cross-border offshoring and outsourcing of privacy sensitive data in the cloud. It notes that cloud services are often provided by third parties and can involve data being stored in multiple locations. Regulations like PCI DSS and national privacy laws apply when data crosses borders or is outsourced. Sensitive data needs to be protected to comply with regulations and address threats while also enabling useful insights from the data. Methods like de-identification through tokenization and encryption can protect identifiable data
Emerging Global Trends in Internet of Things.pptxRoshni814224
油
EU data protection issues in IoT
1. EU data protection issues in the
Internet-of-Things (IoT) (or Internet
of Everything)
2. IoT is subject to the general data
protection law
Currently: Directive 95/46/EC (Directive), available at http://eur-
lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:en:HTML
Soon: General Data Protection Regulation (GDPR), expected entry into
force Spring 2018, available at
http://data.consilium.europa.eu/doc/document/ST-5455-2016-
INIT/en/pdf
3. EU Authorities on IoT
WP29s Opinion 8/2014 on the Recent
Developments on the Internet of Things,
available at http://ec.europa.eu/justice/data-
protection/article-29/documentation/opinion-
recommendation/files/2014/wp223_en.pdf
4. Privacy challenges in the IoT (as
identified by the WP29)
1. Lack of control and information asymmetry
IoT, with its pervasive and unobtrusive presence, might
cause data subjects to lose control under several
perspectives and result basically in a third-party
monitoring.
5. Privacy challenges in the IoT (as
identified by the WP29)
2. Quality of the users consent
EU law requires consent for the legitimate processing of
personal data (save exceptions). Consent is a major
problem with the IoT because often (i) often users are not
aware that a specific object is collecting data (ii) the
possibility to decline certain services or features of an IoT
device is more theoretical than real.
6. Privacy challenges in the IoT (as
identified by the WP29)
3. Inferences derived from data and
repurposing of original processing
The problem is that data collected by a specific device
might be insignificant (e.g. accelerometers and gyroscope
of smartphones), but this raw information might allow the
controller to infer much more significant information (for
example, driving habits)
7. Privacy challenges in the IoT (as
identified by the WP29)
4. Intrusive bringing out of behavior patterns
and profiling
Due to the proliferation of sensors, a vast amount of
separate (maybe insignificant) pieces of information will be
collected and continuously cross-matched with one
another, which reveal specific aspects of individuals
habits, behaviours and preferences. IoT stakeholders will
be able to create general profiles of users.
8. Privacy challenges in the IoT (as
identified by the WP29)
5. Limitations on the possibility to remain
anonymous when using services.
With the IoT everyone is traceable
Why? Think of wearable devices (e.g., smart watches),
used in close proximity to data subjects so that they are
able to collect identifiers (e.g., MAC addresses of other
devices) that can track the location of users.
10. Privacy challenges in the IoT (as
identified by the WP29)
6. Why cybersecurity risk is higher in IoT
environment?
Manufacturers prefer battery efficiency over security;
the number of security targets will dramatically increase;
Need of multilevel cybersecurity multilevel, which involve
securing devices, communication links, storage
infrastructure and the entire IoT ecosystem
Since more IoT stakeholders involved to provide a service,
need to provide cybersecurity coordination among them.
11. Privacy challenges in the IoT (as
identified by the WP29)
Above IoT challenges are not uniquely European.
12. Relevant EU data protection principles
Data from things is often personal data
(therefore subject to the general data protection)
pursuant to Article 2(a) of Directive 95/46/EC
because individuals are likely to be identified from
that data.
Also in case of pseudonymisation or
anonymisation because the large amount of data
processed automatically in the context of IoT
entails risks of re-identification. Opinion on IoT at
10.
13. Relevant EU data protection principles
Data subjects are not only the subscribers of an
IoT service or the users of a device but also
individuals that are neither subscribers nor users,
such as people whose data is collected by
wearables (such as smart glasses), sometimes
without being aware of.
14. Relevant EU data protection principles
At least the following provisions of Directive
95/46/EC are relevant:
- Article 7 (legitimate data processing). Opinion on IoT at 14-
16. Note that Lawfulness of processing is in Article 6 of the
new GDPR.
The main avenue for a legitimate data processing is data subject
consent. Article 7(a). Consent must have the characteristics specified
by WP29s Opinion 15/2011.
Alternatives to consent possible.
15. Relevant EU data protection principles
Article 6 (fair and lawful data collection and
processing).
minimization principle
Article 8 (processing of sensitive data).
- personal data revealing racial or ethnic origin, political
opinions, religious or philosophical beliefs, trade-union
membership, and concerning health or sex life. Consent
required (very limited exceptions).
- Under GDPR wider definition - now includes genetic and
biometric data.
16. Relevant EU data protection principles
Articles 10 and 11 (transparency requirements).
Data controllers must provide users with a privacy policy in a clear
and comprehensible manner.
Challenging with the IoT and might require new methods of delivery. Opinion on
IoT at 18. E.g., on the object itself using the wireless connectivity to broadcast the
information.
See Article 14 and 14(a) GDPR. The characteristics of the
information are listed in Article 12 GDPR.
17. Relevant EU data protection principles
Article 17 (security requirements).
- Any data controller remains fully responsible for security
of the data processing even when more than one IoT
stakeholder intervenes in the delivery of service.
- New security principles from GDPR (Article 30)
- (i) security breach: data controller responsible if breach results
from poor design or maintenance of device;
- (ii) security assessments: of system as a whole, including at
components level. Opinion on IoT at 18.
- Data breach notification duty to the supervisory authority within
72 hours (Article 31).
18. Relevant EU data protection principles
Cybersecurity recommendations from WP29:
- Data controllers must supervise subcontractors that design
and manufacture devices which are not processors (not
bound by Article 17) and must seek high security
standards with regard to privacy.
- Use of principle of data minimization;
- Network restrictions, disabling by default noncritical
functionalities, preventing use of un-trusted software
update sources ;
- adherence to a privacy by design principle.
19. Relevant EU data protection principles
Cybersecurity recommendations from WP29 (contd)
- automatic updates to patch vulnerabilities always available
to users OR alternatives offered (e.g., open-source) AND
and notification to users of vulnerability.
- Security of IoT devices tracking health values must be
particularly protected.
- Data breach notification policies useful to contain the
consequences of vulnerabilities in software and design.
20. Relevant EU data protection principles
Rights of data subjects: the same they have in non-IoT
environment (e.g., Articles 12 and 14), particularly the right of
access, the right to withdraw consent, and the right to oppose
the processing.
Access to raw data should be granted to users. Opinion on
IoT at 20. Access to data is to switch to another provider
(avoiding the lock-in).
GDPR provides a right to portability. Article 18 GDPR:
The data subject shall have the right to receive the personal data concerning
him or her, which he or she has provided to a controller, in a structured and
commonly used and machine readable format and have the right to transmit
those data to another controller without hindrance from the controller to
which the data have been provided.
21. Relevant EU data protection principles
IoT stakeholders must also comply with Article
5(3) of Directive 2002/58/EC (consent to
storage in E-Privacy Directive).
Unless storage or access (by IoT stakeholder) is
strictly necessary in order to provide a service
explicitly requested by the subscriber or user,
consent is necessary.
22. Mauritius Declaration and other
important authorities
Mauritius Declaration on the Internet of Things. adopted
on October 14, 2014 inside the 36th International
Conference of Data Protection and Privacy Commissioners
(Mauritius Declaration),
http://www.privacyconference2014.org/media/16596/Ma
uritius-Declaration.pdf.
23. Mauritius Declaration and other
important authorities
Mauritius Declaration highlights:
individuals right to self-determination;
drawing of broader and more sensitive inferences form the
huge quantity of data;
Identifiability;
ubiquitous connectivity which requires trust in a
connected world. To maintain trust, transparency is key.
24. Mauritius Declaration and other
important authorities
Concerns of Commissioners:
Lack of clarity of information (which data is collected, for
which purpose and retention policy);
informed consent;
privacy by design and by default still not use
Lack of encryption. End-to-end encryption necessary.
25. Mauritius Declaration and other
important authorities
- ENISA, Privacy and Data Protection by Design from policy
to engineering December 2014, available at
https://www.enisa.europa.eu/activities/identity-and-
trust/library/deliverables/privacy-and-data-protection-by-
design.
- privacy needs to be considered from the very beginning of system
development. For this reason, [Dr. Ann] Cavoukian [former
Information and Privacy Commissioner of Ontario, Canada] coined
the term Privacy by Design, that is, privacy should be taken into
account throughout the entire engineering process from the
earliest design stages to the operation of the productive system.
26. Mauritius Declaration and other
important authorities
Report discusses also
privacy/data protection by default, meaning that in
the default setting the user is already protected
against privacy risks.
privacy design strategies
several privacy techniques including authentication,
attribute based credentials, secure private
communications like encryption, and communications
anonymity and pseudonymity.
27. Mauritius Declaration and other
important authorities
DPAs positions on IoT:
Italian DPA (Garante per la Protezione dei Dati Personali), Avvio della
Consultazione Pubblica su Internet delle Cose (Internet of Things) -
Deliberazione del 26 marzo 2015, doc. web n. 3898704, available in
Italian at http://www.garanteprivacy.it/web/guest/home/docweb/-
/docweb-display/docweb/3898704
UK DPA (ICO), The Information Commissioners Office response to the
Competition & Markets Authoritys call for information on the
commercial use of consumer data, https://ico.org.uk/media/about-
the-ico/consultation-responses/2015/1043461/ico-response-to-cma-
call-for-evidence-on-consumer-data-20150306.pdf.
28. Mauritius Declaration and other
important authorities
DPAs positions on IoT (contd):
Spanish DPA, Resoluci坦n de 20 de noviembre de 2015, de la Agencia
Espa単ola de Protecci坦n de Datos, por la que se aprueba el Plan
Estrat辿gico 2015-2019, available in Spanish at
http://www.agpd.es/portalwebAGPD/LaAgencia/common/Resolucion
_Plan_Estrategico.pdf.
French DPA (Commission Nationale de Linformatique et des Libertes
CNIL), Rapport dActivite 2014, in French at
https://www.cnil.fr/sites/default/files/typo/document/CNIL-
35e_rapport_annuel_2014.pdf.pdf, discussing smart cars and smart
cities.
29. More information
Francesca Giannoni-Crystal & Allyson Haynes Stuart, The
Internet-of-Things (#IoT) (or Internet of Everything)
privacy and data protection issues in the EU and the US,
Information Law Journal, Spring 2016, volume 7 issue 2,
available
at http://apps.americanbar.org/dch/committee.cfm?com=
ST230002
www.technethics.com (TAG IoT:
http://www.technethics.com/tag/iot/)
30. Contacts
Francesca Giannoni-Crystal (NY, DC, Italy, and SC foreign
legal consultant- not a member of SC Bar)
Crystal & Giannoni-Crystal, LLC
(www.cgcfirm.com)
fgiannoni-crystal@cgcfirm.com