October 16, 2019
Demystifying the Role of AI in Privacy Management
Darren Abernethy TrustArc Maggie Gloeckle A+E Networks Hilary Lane Ravi Pather CryptoNumerics
Demystifying the Role of AI in Privacy Management Darren Abernethy - - PowerPoint PPT Presentation
October 16, 2019 Demystifying the Role of AI in Privacy Management Darren Abernethy TrustArc Maggie Gloeckle A+E Networks Hilary Lane Ravi Pather CryptoNumerics Introduction Demystifying the Role of AI in Privacy Management Agenda
October 16, 2019
Darren Abernethy TrustArc Maggie Gloeckle A+E Networks Hilary Lane Ravi Pather CryptoNumerics
Stakeholder Alignment
0100110101110101100101
2018 2016
Sep 19
201 9 201 7 2020
& Loss Prevention
getting more Complex
de-identified data grows
Privacy is damaging
identification (Demonstrate PIA)
been removed
Data Security GDPR Phase 1 HIPAA GDPR Phase 2 PIPEDA CCPA Privacy Automation
Security
Tools
Demand increasing
Compliance is hard
tools
Jan 20
Management
Forgotten
work for Privacy
Data Information Knowledge Insights Wisdom
Business, economic, healthcare, security, and political leaders and their teams rely on vast data sources and deep analytics to make rapid, critical decisions. Regulatory obligations can attach to data as rapidly as it moves or is used for a new purpose, however, most laws aren’t written to be applied quickly as companies, data, systems, business partners and the activities in which they are involved fall in and out of scope.
Term Definition
in·tel·li·gence | \ in- ˈte-lə-jən(t)s the ability to learn or understand or to deal with new or trying situations ar·ti·fi·cial in·tel·li·gence | \ ˌär- tə-ˈfi-shᵊl \ in-ˈte-lə- jən(t)s a branch of computer science dealing with the simulation of intelligent behavior in computers ma·chine learn·ing | \ mə-ˈshēn \ ˈlər-niŋ the process by which a computer is able to improve its own performance (as in analyzing image files) by continuously incorporating new data into an existing statistical model
Term Definition
al· go· rithm | \ ˈal-gə- ˌri-t͟həm a step-by-step procedure for solving a problem or accomplishing some end in a finite number of steps that frequently involves repetition of an operation au·to·mat·ed pri·va·cy in·tel·li·gence | ȯ-tə- ˌmā-təd\ ˈprī-və-sē in- ˈte-lə-jən(t)s algorithmic, data-driven contextual insights about privacy requirements that drive actionable priorities within operational workflows to streamline privacy management decisions and drive alignment across teams and stakeholders
ADM is the ability to make decisions by technological means. Solely ADM is ADM without any human involvement. ADM can be based on data collected directly, data collected from third party sources, or derived or inferred data. GDPR addresses risks related to Automated “Individual” Decision-Making, i.e., ADM about individuals ADM used for privacy intelligence leverages information about
Data integrity, accuracy, and completeness are as critical to privacy intelligence as they are to nuanced legal and regulatory advice and guidance provided by expert advisors.
Legal
Contracts Identifies Legal requirements
Compliance
Policy Tools, Spreadsheets
Privacy Compliance Access Requests Enforcement
IT Security
Encryption, Hashing, Tokenization
Data Security Protection tools
Business
Business & Customer Insights
Consumers of data
Risk
GRC Risk Tools, Spreadsheets
Manages Risk Defines Policy
Data Science
Python, R, SAS, Tableau
Analytics, AI & ML Data Insights
Manual & Fragmented Manual & Fragmented Manual & Fragmented Manual & Fragmented
Requestor Type Required?
1-California Do Not Sell Yes, under CCPA if applicable 2-Texas Access Yes, under HIPAA and TMPA if applicable 3-Nevada Do Not Sell Yes, under Nevada Law if applicable 4-Brazil Correction Yes 5-Singapore Deletion No
▪ Build an architectural point of control for policy enforcement ▪ Automated Risk Assessment for re-identification ▪ Generate fully Anonymised datasets with confidence
▪ Invest in Privacy Automation now as we invested in Data Security 5 years ago ▪ Privacy breach and non compliance is now a corporate liability & exposure ▪ Harmonize Legal, Risk & Compliance, Data Science and Business teams into a single process with Privacy Automation
▪ Make Privacy an integrated layer of Data Science Architectures
▪ Balance Privacy Compliance with Data with High Analytical value
– Build a systems based Architectural Point of control for Policy Enforcement – Use emerging and “State-of-the-Art” tools to meet and demonstrate data compliance
– De-Identify ‘direct identifiers’ and apply privacy protection to ‘indirect identifiers’ – Automate Risk Assessment to demonstrate Privacy Compliance – Move to Automated, systems based ‘Risk of re-Identification vs manual ‘two eyes’ approaches
– ‘Legitimate Interest Processing’ (LIP) is more flexible than Consent for Data Science (GDPR) – Identifiable data is in scope (CCPA & PIPEDA) – Organisational & Technical Controls are required to support de-identification of data
privacy-experts-guide-to-ai-and-machine-learning/
intelligence-and-machine-learning/
https://fpf.org/2019/09/20/warning-signs-identifying-privacy-and-security-risks-to-machine-learning-systems/
machine-learning-algorithms
Analytics https://www.ftc.gov/public-statements/2018/11/competition-consumer-protection-implications-algorithms-
artificial
Senior Counsel TrustArc 415-766-6451 darren@trustarc.com
Privacy & Compliance A+E Networks 212-551-1570 margaret.gloeckle@ aenetworks.com
Former Chief Privacy Officer
NBCUniversal 917-224-4402 hilary@hilarylane.com
Vice President CryptoNumerics
+447747024321
Ravi@CryptoNumerics.com