IETF Plenary Monday 25 July 2011 Quebec City, Canada
Privacy: A Regulator’s Perspective Fred Carter
Senior Policy & Technology Advisor IPC/O
Privacy: A Regulators Perspective Fred Carter Senior Policy & - - PowerPoint PPT Presentation
Privacy: A Regulators Perspective Fred Carter Senior Policy & Technology Advisor IPC/O IETF Plenary Monday 25 July 2011 Quebec City, Canada Who We Are Commissioner Ann Cavoukian, Ph.D.: appointed by Ontario legislature
IETF Plenary Monday 25 July 2011 Quebec City, Canada
Senior Policy & Technology Advisor IPC/O
www.PrivacybyDesign.ca
– appointed by Ontario legislature – independent from government – oversees 3 privacy & access to information laws
information
privacy provisions of the Acts
advice and comment on proposed government legislation & programs.
www.PrivacybyDesign.ca
ability of individuals to exercise control over the collection, use and disclosure by others of their personal information
can be biographical, biological, genealogical, historical, transactional, locational, relational, computational, vocational or reputational, and is the stuff that makes up our modern identity
Personal information must be managed responsibly. When it is not, accountability is undermined and confidence in our evolving information society is eroded.
www.PrivacybyDesign.ca
www.PrivacybyDesign.ca
Minimize collection, use, sharing, and retention of PII (e.g., limiting purposes, collection, use, disclosure, and retention) Enhance data security (e.g., appropriate safeguards) Actively engage the individual in managing and controlling their PII (e.g., consent, accuracy, access, challenging compliance, etc.)
www.PrivacybyDesign.ca
Radar Networks & Nova Spivack, 2007 – www.radarnetworks.com
www.PrivacybyDesign.ca
www.PrivacybyDesign.ca
www.PrivacybyDesign.ca
Internet-scale Critical Infrastructure
Community
www.PrivacybyDesign.ca
Int’l Working Group on Data Protection in Telecommunications
– “Rome Memorandum”
and Privacy - Some issues for governments and software developers
– Main Recommendations
the example of Ipv6 Source: http://tinyurl.com/4yayg8h
www.PrivacybyDesign.ca
Int’l Conference of Data Protection and Privacy Commissioners Resolutions
2010 - Jerusalem
2009 - Madrid
2008 - Strasbourg
Meetings of International Organizations
www.PrivacybyDesign.ca
2007 - Montreal
2006 - London
2005 - Montreux
Privacy in a Globalized World: A Universal Right Respecting Diversities" 2004 - Wroclaw
2003 - Sydney
Source: http://tinyurl.com/3vgaphj
www.PrivacybyDesign.ca
– Provide expert opinion from member state level to the Commission on questions of data protection. – Promote the uniform application of the general principles of the Directives in all Member States through co-operation between data protection supervisory authorities. – Advise the Commission on any Community measures affecting the rights and freedoms of natural persons with regard to the processing of personal data and privacy. – Make recommendations to the public at large, and in particular to Community institutions on matters relating to the protection
privacy in the European Community.
www.PrivacybyDesign.ca
Documents Adopted (selected):
interception of telecommunications
improving the security of information infrastructures and combating computer-related crime“
terminal equipments: the example of IPV6
value-added services
www.PrivacybyDesign.ca
Working Group on Data Protection in Telecommunications ("Budapest - Berlin Memorandum on Privacy on the Internet")
Data on the Internet Performed by Software and Hardware
Providers for law enforcement purposes
Approach to On-line Data Protection
Whois directories
Source: http://tinyurl.com/42x4lo2
www.PrivacybyDesign.ca
www.PrivacybyDesign.ca
www.ipc.on.ca/images/Resources/7foundationalprinciples.pdf
www.PrivacybyDesign.ca
Proactive / Preventative By Default Em bedded Positive Sum Full Functionality End to End Lifecycle Protection Visibility / Transparency Respect For Users
Information Technology Accountable Business Practices Physical Design & Infrastructure
www.PrivacybyDesign.ca
www.PrivacybyDesign.ca
Safeguards
End to End Lifecycle Protection
Data Minimization
Privacy as the Default (Setting)
User Participation
Respect for User Privacy
Accountability
Openness & Transparency
Leadership & Goal-Setting
Proactive Not Reaction; Preventative Not Remedial
Verifiable Methods
Privacy Embedded into Design
Quantitative Results
Full Functionality – Positive-Sum, not Zero-Sum
www.PrivacybyDesign.ca
www.PrivacybyDesign.ca
www.PrivacybyDesign.ca
www.PrivacybyDesign.ca