Privacy Engineering Objectives and Risk Model Objective-Based - - PowerPoint PPT Presentation

privacy engineering objectives and risk model
SMART_READER_LITE
LIVE PREVIEW

Privacy Engineering Objectives and Risk Model Objective-Based - - PowerPoint PPT Presentation

Privacy Engineering Objectives and Risk Model Objective-Based Design for Improving Privacy in Information Systems 1 NIST research has a broad impact shutterstock.com shutterstocom G. Hooijer/ D. Stork/ Facilitates trade and fair Improves


slide-1
SLIDE 1

Privacy Engineering Objectives and Risk Model

Objective-Based Design for Improving Privacy in Information Systems

1

slide-2
SLIDE 2

NIST research has a broad impact

  • G. Hooijer/
shutterstocom
  • D. Stork/
shutterstock.com 06photo
  • B. Gardner

Facilitates trade and fair commerce Improves public safety and security Advances manufacturing and services Improves quality, ensures uniformity

slide-3
SLIDE 3

NIST Partnerships

Universities Nonprofits Industry Government

3

slide-4
SLIDE 4

First Privacy Engineering Workshop

Purpose:

  • Consider analogous models
  • Focus on objectives
  • Identify distinctions

Key Outcomes:

  • Communication gap
  • Positive interest in a risk management model

4

slide-5
SLIDE 5

5

Risk Model

(Personal Information + Data Actions + Context = System Privacy Risk)

Controls

(Derived from FIPPs, etc.)

Objectives

(Predictability, Manageability, Confidentiality)

Metrics

Model Privacy Risk Management Framework

Privacy Engineering Components

Policy

(Law, Regulation, FIPPs, etc.)

Risk Assessment

Requirements System Evaluation

September Workshop

slide-6
SLIDE 6

Scope

6

Security Privacy

slide-7
SLIDE 7

Key Terms

7

Privacy Engineering Privacy Engineering Objectives Data Lifecycle Data Actions Problematic Data Actions Context Privacy Harms

slide-8
SLIDE 8

Privacy Engineering Objectives

Outcome-based objectives that guide design requirements to achieve privacy-preserving information systems.

8

slide-9
SLIDE 9

Objec&ves ¡

Requirements ¡ Design ¡ Evalua&on ¡Criteria ¡

System ¡

Risk ¡Analysis ¡ Tes&ng ¡

9

slide-10
SLIDE 10

The Privacy Triad

  • The objectives are

characteristics of the system, not role-based.

  • The objectives support

policy

  • Aligning the privacy and

security overlap

10

Predictability

Enabling reliable assumptions about the rationale for the collection of personal information and the data actions to be taken with that personal information.

Manageability

Providing the capability for authorized modification of personal information, including alteration, deletion, or selective disclosure of personal information.

Confidentiality

Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. (NIST SP 800-53, rev 4)

slide-11
SLIDE 11

System Privacy Risk Model

11

slide-12
SLIDE 12

Security Risk Equation

12

Security Risk = Vulnerability * Threat * Impact

slide-13
SLIDE 13

System Privacy Risk Equation

System privacy risk is the risk of problematic data actions occurring Personal Information Collected or Generated * Data Actions Performed

  • n that Information * Context = System Privacy Risk

13

slide-14
SLIDE 14

Context

“Context” means the circumstances surrounding a system’s collection, generation, processing, disclosure and retention of personal information.

14

slide-15
SLIDE 15

Problematic Data Actions and Privacy Harms

15

Distinguish data actions that give rise to harms and actual harms

Problematic Data Actions

Validation of the

  • bjectives and the

risk model

Privacy Harms

slide-16
SLIDE 16

Privacy Engineering Definition

Privacy engineering is a collection of methods to support the mitigation of risks to individuals of loss of self- determination, loss of trust, discrimination and economic loss by providing predictability, manageability, and confidentiality of personal information within information systems.

16

Information Security: The protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability. [44 U.S.C., SEC. 3542]

slide-17
SLIDE 17

Illustrative Mapping of Privacy Engineering Objectives to Problematic Data Actions

Data ¡Lifecycle ¡Phase ¡ Normal ¡Data ¡Ac&on ¡ Problema&c ¡Data ¡Ac&on ¡ Poten&al ¡Harms ¡

Predictability ¡

Collec&on ¡ Service ¡Ini&a&on ¡ Induced ¡Disclosure ¡ Power ¡Imbalance, ¡Loss ¡of ¡Autonomy ¡ Processing ¡ Aggrega&on ¡ Unan&cipated ¡Revela&on ¡ S&gma&za&on, ¡Power ¡Imbalance, ¡Loss ¡of ¡Trust, ¡ ¡ Loss ¡of ¡Autonomy ¡ Processing ¡ System ¡monitoring ¡ Surveillance ¡ Power ¡Imbalance, ¡Loss ¡of ¡Trust, ¡Loss ¡of ¡Autonomy, ¡ ¡ Loss ¡of ¡Liberty ¡

Manageability ¡

Disclosure ¡ Authorized ¡ADribute ¡ Sharing ¡ Distor&on ¡ S&gma&za&on, ¡Power ¡Imbalance, ¡Loss ¡of ¡Liberty ¡ Disposal ¡ Normal ¡Account ¡ Dele&on ¡ Unwarranted ¡Restric&on ¡ Exclusion, ¡Economic ¡Loss, ¡ ¡ Loss ¡of ¡Trust ¡

Confiden&ality ¡

Use ¡ Authorized ¡Use ¡ Appropria&on ¡ Loss ¡of ¡Trust, ¡Economic ¡Loss, ¡Power ¡Imbalance ¡ Reten&on ¡ Secure ¡Storage ¡ Insecurity ¡ Economic ¡Loss, ¡S&gma&za&on ¡

17

slide-18
SLIDE 18

What's Next?

Webcast: 2:00pm, ET, October 2, 2014 Publish a NIST Interagency Report

  • Public comment period between draft and final

versions Comments may be sent to privacyeng@nist.gov until October 15, 2014.

18