Data Sharing Enabling innovation Protecting people Geof Heydon - - PowerPoint PPT Presentation

data sharing
SMART_READER_LITE
LIVE PREVIEW

Data Sharing Enabling innovation Protecting people Geof Heydon - - PowerPoint PPT Presentation

Data Sharing Enabling innovation Protecting people Geof Heydon October 2018 1 Data Driving Smarter Community Success AGENDA Smarter Community Data sharing NSW Government Data Task Force and ACS Data Sharing technical committee


slide-1
SLIDE 1

Data Sharing

➢ Enabling innovation ➢ Protecting people

Geof Heydon

October 2018

1

slide-2
SLIDE 2

2

Data Driving Smarter Community Success

  • Smarter Community Data sharing
  • NSW Government Data Task Force and

ACS Data Sharing technical committee

  • The “Five Safes” model
  • The Data Sharing Policy Challenge

AGENDA

slide-3
SLIDE 3

3

Building Data Policies

slide-4
SLIDE 4

“Problem Finding & Solving” - an Innovation Platform for People in Smart Places

Programmable infrastructure & Data gathering

ICT Infrastructure – Network connectivity, storage, processing

Procurement, Governance, Data transport & management

Operating System – secure and open/shared data

Research and problem solving Infrastructure Business and industry

Innovation

Augmented decision making

Start-ups Start-ups Start-ups Start-ups

Citizens Gov Academia Industry

IP

Industry Gov Academia Citizen

IP

Citizens Gov Academia Industry

IP

Citizens Gov Academia Industry

IP

Citizen Centric

People, Places and Things

slide-5
SLIDE 5

Phase 1

New data sources & Smart uses to improve productivity within an existing business model

Phase 2

Data from Phase 1 projects combining to learn something new

Phase 3

Recognising that a common platform to collect data from several silos enables new business

Phase 4

Leveraging data from across the business to analyse and guide future business

Innovation enabler The ‘oil’ of the digital economy

Data Sharing Policy is now Critical

Source: Geoff King – CoP and CreatorTech

Platforms selection starts now

slide-6
SLIDE 6

Cross Jurisdictional Open data Framework Governance Framework Privacy Framework Practical Data Sharing Framework

Common Lexicon

Maturity Frameworks Guidelines and Recommendations Advice to Govt and Industry

Common Framework for managing Personally Identifiable Information

NSW Government Data Taskforce

6

  • Dr. Ian Oppermann

CEO and Chief Data Scientist, NSW Data Analytics Centre ICT and Digital Government | Department of Finance, Services & Innovation ian.oppermann@finance.nsw.gov.au | www.finance.nsw.gov.au

slide-7
SLIDE 7

Cross Ju Jurisdictional Sharing

7

The technologies discussed in this taskforce – determining minimum cohort size, differential privacy, homomorphic encryption, and privacy preserving linkage – all address concerns associated with re- identification of individuals from linked data sets, and yet all are at relatively early stages of development. Maturing these technologies by encouraging pilot projects and safe trials would benefit all jurisdictions.

slide-8
SLIDE 8

Important Resources for Data and Security

NSW Government Data Task Force

Launched 28th September 2017 - https://www.acs.org.au/content/dam/acs/acs-publications/ACS_Data- Sharing-Frameworks_FINAL_FA_SINGLE_LR.pdf

NSW Government Data Task Force

Final Report due 1st November 2018

slide-9
SLIDE 9

9 INTERNET OF THINGS SMART CITY PLATFORM SELECTION GUIDELINE INTERNET OF THINGS SMART CITY PLATFORM SELECTION GUIDELINE

Some useful resources from the IoT Alliance

Internet of Things Platform Selection Guideline V1.0

INTERNET OF THINGS PLATFORM SELECTION GUIDELINE

Internet of Things Smart City Platform Selection Guideline V1.0

INTERNET OF THINGS SMART CITY PLATFORM SELECTION GUIDELINE

Internet of Things Security Guideline V1.0 Internet of Things Good Practice Guideline for IoT Services V1.0

INTERNET OF THINGS SECURITY GUIDELINE INTERNET OF THINGS GOOD PRACTICE GUIDE FOR BUSINESS TO CONSUMER IOT SERVICES

slide-10
SLIDE 10
slide-11
SLIDE 11

Principle Description 1 Open and transparent management of personal information 2 Anonymity and Pseudonymity 3 Collection of solicited personal information 4 Dealing with unsolicited personal information 5 Notification of collection of personal information 6 Use or disclosure of personal information 7 Direct marketing 8 Cross border disclosure 9 Adoption, use or disclosure of government-related identifiers 10 Quality of personal information 11 Security of personal information 12 Access to personal information 13 Correction of personal information

In 2014, a new set of Privacy Principles were enacted. These are set out in the Privacy Act 1988

The APPs are legally binding principles They set out standards, rights and obligations for handling, holding, accessing and correction of personal information. They apply to:

  • most Australian government agencies
  • private sector and not-for-profit organisations

with an annual turnover of more than $3 million

  • all private sector health service providers, and
  • some small businesses such as businesses

trading in personal information. 11

slide-12
SLIDE 12

Data Taskforce

12

Lower PIF Higher PIF

PIF = Personal Information Factor

For a Minimum Identifiable Cohort Size of:- 1: PIF is less than 1.0 2: PIF is less than 0.5 5: PIF is less than 0.2 10: PIF is less than 0.1 100: PIF is less than 0.01

slide-13
SLIDE 13

13

Most Accessible Least Accessible

PIF = Personal Information Factor

Data Taskforce

slide-14
SLIDE 14

14

Lower PIF Higher PIF

Non personal data Personal data eg: Health Lightly aggregated data Highly aggregated data Personal data Freely available data Data that can’t be shared without anonymization Data available for commercial fee Data available for a nominal fee Data available to qualified users

Most Accessible Least Accessible

Regulators view of market analysis Fraud statistics Competition analysis Social media update to “friends” Trading on real time market data feed Market segment analysis “nearmap” Ariel imaging Twitter alerts ASX company announcements Broad market analysis Live traffic congestion Travel recommendations Public transport applications ABS Socio-Economic Indexes for Areas index Google street map Telephone directory

Data Taskforce

slide-15
SLIDE 15

Data Sharing Taskforce

15

Individual Data Sets Insights and Models Personal Context Real World Context

slide-16
SLIDE 16

Safe Data – primarily the potential for identification in the data. It could also refer to the sensitivity of the data itself. Safe Setting – the practical controls on the way the data is

  • accessed. At one extreme researchers may be restricted to

using the data in a supervised physical location. At the other extreme, there are no restrictions on data downloaded from the internet. Safe Projects – the legal, moral and ethical considerations surrounding use of data. Often specified in regulations or legislation, typically allowing but limiting data use to some form of ‘valid statistical purpose’, and with appropriate ‘public benefit’. Safe People – the knowledge, skills and incentives of the users to store and use the data appropriately. In this context, ‘appropriately’ means ‘in accordance with the required standards of behaviour’, rather than level of statistical skill. Safe Outputs – the residual risk in publications from sensitive data. Safe Organisation – the systems, processes and governance employed by an organisation to ensure the Safes Framework is applied throughout the Project and with the long-term management

  • f Data and Outputs including adherence to data protection, quality

standards and cyber security standards. Safe Outcomes – the ultimate uses of the project Outputs Safe Lifecycle – the time sensitivity of a Data or Outputs. Data may be highly sensitive for a specific period and then may be not sensitive at all.

slide-17
SLIDE 17

17 Will the result lead to disclosure? Is there a disclosure risk in the data itself? Has appropriate and sufficient protection been applied to the data? Is this use of the data appropriate? Is the user authorized to access and use the data? 0% 75% 50% 100%

slide-18
SLIDE 18

Data Taskforce 18

18

slide-19
SLIDE 19

 Do you own all the data you gather and use?  How to you negotiate the use of “ecosystem data”?  Data has a value and can be traded – economic benefit  You don’t have to own everything  And unintended use

19

slide-20
SLIDE 20

Federal Government

Funding, Federal data, Standards

State Government

Funding, State data, regional data, standards

State Government

Funding, State data, regional data, standards

State Government

Funding, State data, regional data, standards

Local Government

Funding, Local data

Local Government

Funding, Local data

Local Government

Funding, Local data

Local Government

Funding, Local data

Local Government

Funding, Local data

Local Government

Funding, Local data 20 States could Mandate the need for consistent Policy

  • Provide a Policy, Process framework, Risk assessment approach
  • Provide training
  • Host the data & encourage sharing

Can we afford to have every council on a different data sharing rail gauge?

slide-21
SLIDE 21

Mobility as a service

  • Example of complex multi-mode travel management – every day is different
  • Including environmental monitoring
  • Fitness options
  • Whole-day planning
  • Weather conditions

Local 1 State Private Industry State State Local 2 Local 3 Local 1

  • Enabled with Data Sharing
  • Needs a Consistent Data Sharing Policy across all participants
slide-22
SLIDE 22

22

It might be complex but starting is easy Learn to Love Data

1. Recognise that many existing data sets (Geo) are already available 2. Recognise that some existing silos are gathering new data already 3. The most common early business cases are:-

1. LED lighting 2. Smart bins 3. Asset tracking/monitoring such as street sweepers 4. Garden watering Automation

4. Test the “share-ability” of the data already gathered 5. Now you’re starting to recognise the need for a Data Sharing Policy

You’re on the journey

slide-23
SLIDE 23

Thank You

slide-24
SLIDE 24

The new regulation, technically known as EU 2016/679, replaces the Data Protection Directive, which goes back to 1995.

General Data Protection Regulation

slide-25
SLIDE 25