privacy by design
play

Privacy by Design A technical perspective Carmela Troncoso Gradiant - PowerPoint PPT Presentation

PR eparing I ndustry to P rivacy-by-design by supporting its A pplication in RE search Privacy by Design A technical perspective Carmela Troncoso Gradiant The usual privacy scenario Protect personal data from third parties Data


  1. PR eparing I ndustry to P rivacy-by-design by supporting its A pplication in RE search Privacy by Design A technical perspective Carmela Troncoso Gradiant

  2. The usual « privacy » scenario  Protect personal data from third parties  Data controller is considered trusted  Data protection to reduce privacy risks  But privacy is lost … (Google, Facebook , …) 10/06/2015 PRIPARE 2

  3. Privacy by design approach  Protect personal data from everyone  Data controller is considered not trusted for privacy  Risk reduced by not sharing data  No need to trust! 10/06/2015 PRIPARE 3

  4. Privacy by design – data minimization  Collect only necessary data I want all data Data protection Usual compliance approach Data I can collect PbD Data I will finally collect (aux data for functionality) approach Data I need for the purpose of the system Example : ePetition case: do I need to know names, address, age ,…? Or only whether the person is allowed to sign the petition? 10/06/2015 PRIPARE 4

  5. Privacy by design – data minimization  Example ePetition All Personal data and behaviour Usual approach Some personal data PbD Some more data to be able to control double-signing approach An allowed person signed a petition Example : ePetition case: do I need to know names, address, age ,…? Or only whether the person is allowed to sign the petition? 10/06/2015 PRIPARE 5

  6. Privacy by design – what data to protect Personal data/Personally identifiable information (PII): Usual • Data related to the individual approach • Enough attributes to identify an individual (pseudo-identifiers) + Privacy-relevant data: PbD • Enables linkage of actions/attributes (can become pseudo-identifiers) approach • Enable discrimination ENISA report : “Privacy and Data Protection by Design - from policy to engineering” George Danezis, Josep Domingo- Ferrer, Marit Hansen, Jaap-Henk Hoepman, Daniel Le Métayer, Rodica Tirtea, Stefan Schiffner. 10/06/2015 PRIPARE 6

  7. Privacy by design – Use of PETs  Use of PETs to minimize disclosure while enabling functionality  PbD applications enabled by PETs  Privacy-preserving Pay as you drive/eTolling/smart metering : local computations and only billing information sent to the server + auxiliary verification information) [cryptographic commitments]  Privacy-preserving ePetition : eID proving the value of an attribute (person lives in a city) [anonymous credentials]  Privacy-preserving transportation cards : use transport without being tracked [anonymous eCash]  Privacy preserving statistics : compute global use statistics without revealing individual consumptions [secure multiparty computation] 10/06/2015 PRIPARE 7

  8. Take aways Privacy by Design protects privacy from all actors in a system  Data protection alone is not privacy by design    Should not be an excuse to not apply further protection  Consent is not a blanket solution  Application purpose must be well defined for proportionality and minimization  Anonymization is not trivial... But... Privacy by Design still needs data protection   Some applications inherently need to collect sensitive data  There are also PETs to support data protection (transparency, consent) 10/06/2015 PRIPARE 8

  9. PR eparing I ndustry to P rivacy-by-design by supporting its A pplication in RE search Thank you for your attention Questions? Website: www.pripareproject.eu Project Co-ordinator Technical Co-ordinator Antonio Kung (Trialog) Christophe Jouvray (Trialog)

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend