View
4
Download
0
Category
Preview:
Citation preview
Jari Alvinen/Nokia CTO Compatibility and Industry Collaboration 2013-11-26
Privacy Awareness SFS Seminar
© Nokia 2013 Privacy_Awareness-SFS_Seminar-2013-11-07 Author FD
1
Privacy Awareness
2
1. WHY – Putting Privacy in Business Context − Real life incidents
2. WHAT – EU GDPR and ISO 29100 − Terminology − Roles within the Privacy Framework − Privacy Principles − Essence of privacy − Personally Identifiable Information and Identifiability
3. HOW – Compliance or Accountability − CIPL view on Accountability − Elements of an Accountable Privacy Program − Privacy related business processes
4. HOW - Privacy Engineering & Assurance simplified − Privacy data lifecycle − Design principles favoring privacy − Privacy impact assessment − Privacy risk management − Assessing privacy maturity
2013 Instagram case
• Facebook owned photo sharing social network site changed its Terms of Use so it could exploit members' photographs for profit - without compensating the owners
• Impact: Daily active users fell from almost 16.3 to about 7.6 million and some Brand damage caused (”To do a Zuckerberg” and ”To be Instagrammed” marketing term coined)
3
1999 Intel Pentium III • Pentium III included a unique,
retrievable, identification number, called PSN (Processor Serial Number) that could be read by software through the CPUID instruction if feature not disabled through the BIOS
• Impact: Product design decisions had far-reaching impact on consumers' online privacy. Intel's market dominance, coupled with the lack of accurate material about the privacy implications of the PSN, and the inability of individuals to control the use of the PSN, placed consumer privacy at risk.
• Regulatory response: EU Parliament action to prevent chips from computer destined to EU consumers and public acquisition. Formal inquiry averted by Intel decision to remove PSN feature on Tualatin-based Pentium IIIs, and the feature was not carried through to the Pentium 4 or Pentium M.
4
2013
HTC America Affair
• HTC was punished by the US govt for negligence in security engineering
− No security training for engineering staff − No security reviews or testing for
vulnerabilities − Not following well-known secure coding
practices − No process of receiving and addressing
vulnerability reports from third parties
• Millions of devices vulnerable in so many ways (read the fine print)
• HTC was required to fix all of these and to establish a comprehensive security program ... AND undergo independent security assessments every other year for the next 20 years
5
2012
Google tracking case • Circumvented Apple privacy
safeguards on Safari browsers • Stanford research discovers
DoubleClick over-riding cookie control
• Millions of consumer effected • FTC imposes record fine • Prompts EU investigations
6
This just in:
Google agreed on Monday Dec 18th,
2013 to pay $17 million to 37 states and
the District of Columbia in a wide-
reaching settlement. This is additional to
the previous 22.3 million FTC fine.
Average cost of unauthorized disclosure
Source: http://www.symantec.com/content/en/us/about/media/pdfs/b-ponemon-2011-cost-of-data-breach-global.en-us.pdf
7
(Bracketed number defines the benchmark sample size)
Why is privacy important? ü Authorities are doing joint-enforcement
on major companies Example: Facebook
Ø Canadian, US, Nordic, Irish regulators investigated complaints and found violations
ü Increasing public policy maker interest in mobile technologies Example: Positioning technologies
Ø More and more laws globally
Enforcement Actions:
€ Fines
€ Penalties
€ Cost of remediation
€ Forced privacy program
€ 20 year external audit
€ Deletion of unlawfully
collected data
€ Sales stops, recalls
8
Privacy Awareness
9
1. WHY – Putting Privacy in Business Context − Real life incidents
2. WHAT – EU GDPR and ISO 29100 − Terminology − Roles within the Privacy Framework − Privacy Principles − Essence of privacy − Personally Identifiable Information and Identifiability
3. HOW – Compliance or Accountability − Elements of an Accountable Privacy Program − Privacy related business processes
4. HOW - Privacy Engineering simplified − Privacy data lifecycle − Design principles favoring privacy − Privacy impact assessment − Privacy risk management − Assessing privacy maturity
EU GDPR and ISO 29100
• By 2015 EU data protection regulations will be based on the proposed General Data Protection Regulation
• Potential harmonizing DP effect across EU businesses • ISO 29100 defines a Privacy Framework that reflects many of
the proposed components of the GDPR • Contributions to the standard came from representatives from
EU, US, CA, AU and NZ based DPA organizations • Privacy Framework includes:
• Terminology • Roles and interactions • Recognizing PII • Privacy safeguarding requirements • Privacy policy • Privacy controls • Privacy principles
10
Terminology (29100 §2)
• Identifiability (tunnistettavuus) - condition which results in a PII principal being identified, directly or indirectly, on the basis of a given set of PII
• Personally Identifiable Information (henkilötieto)(PII) - any information that (a) can be used to identify the PII principal to whom such information relates, or (b) is or might be directly or indirectly linked to a PII principal
• PII Controller (henkilötiedon rekisterinpitäjä) - privacy stakeholder (or privacy stakeholders) that determines the purposes and means for processing personally identifiable information (PII) other than natural persons who use data for personal purposes
• PII Principal (rekisteröity) - natural person to whom the personally identifiable information (PII) relates
• PII Processor (henkilötiedon käsittelijä) - privacy stakeholder that processes personally identifiable information (PII) on behalf of and in accordance with the instructions of a PII controller
• privacy breach (tietosuojarikkomus) - situation where PII is processed in violation of one or more relevant privacy safeguarding requirements
• privacy safeguarding requirements (yksityisyyden suojaamisen vaatimukset) - set of requirements an organization has to take into account when processing personally identifiable information (PII) with respect to the privacy protection of PII
11
Roles within the privacy framework • DPA, Data Privacy Authority,
Information Privacy Commissioner, (tietosuoja viranomainen) etc is the independent legal authority for administering privacy rules within a country
• The consumer is the PII Principal • The PII Controller is entity that
determines purposes and means of processing consumer’s personal data and is RESPONSIBLE for data processing of data subject’s PII
• The PII Processor performs information processing on behalf of the Data Controller
Data Protection Authority (DPA)
PII Principal PII
Processor PII
Controller
Sometimes a reference is also made to a Third Party, which can be viewed as outside this privacy framework, but the responsibility
of the Data Controller.
12
Privacy Principles (29100 §5) 1. Consent and choice
(Suostumus ja valinnanvapaus) PII Principal has choice on and has Opt-In to PII processing
2. Purpose legitimacy and specification (Tarkoituksen laillisuus ja määrittely) Processing complies with laws, giving notice before processing
3. Collection limitation (Tiedonkeruun rajoittaminen) Within laws and necessary for specified purposes
4. Data minimization (Tiedonkäsittelyn rajoittaminen) Minimize the processing of PII
5. Use, retention and disclosure limitation (Käytön, säilytyksen ja luovuttamisen rajoittaminen) Also applies to limitation on cross-border transfers
6. Accuracy and quality (Oikeellisuus ja laatu) Measure to assure validity and correctness of PII processing
7. Openness, transparency and notice (Avoimuus, läpinäkyvyys ja ilmoittaminen) Clear, complete and accessible information on PII processing
8. Individual participation and access (Omien tietojen tarkistusoikeus) PII Principal access to review their PII and correct inaccuracies
9. Accountability (Vastuullisuus) Demonstrate care in duty toward PII Principal for PII stewardship
10. Information security (Tietoturvallisuus) Protecting PII under its authority with appropriate controls
11. Privacy compliance (Tietosuojavaatimusten noudattaminen) Verifying and demonstrating adherence to laws with internal or 3rd party audits
13
Essence of privacy
Privacy emerges from personally identifiable data Personal data or information
• Any information relating to an identified or identifiable natural person, an individual
+ Identifiability
• (Nymity) The measure of the degree that personal data can be associated with an individual
14
Personal data/information • Relates to information about a
natural person • When the data can be associated
with an individual, it is referred to as Personally Identifiable Information (PII)
• Criteria for linkability of data to an individual is a hot-topic within the privacy community
• Sensitive PII must be treated specially
• Generally, if PII is of a racial, religious, political, sexual orientation, medical nature, it is characterized as Sensitive; but other categories should also be consisted
• Also commonly referred to as Personal Data
Basic data (E.G. first name, last name, mobile number) Address data (E.G. postal code, email address) Restricted categories of data (E.G. racial or ethnic origin, religion, trade union membership – if allowed by applicable law) Social networking related data (E.G.. metadata of pictures uploaded, site activity information) Location data (E.G. GPS coordinates or mobile network base station ID) Identifiers (E.G. IMEI, device identifiers, IP-address) System data is information about how individual users are using the system (E.G. log files) Monetary data transactions (E.G. credit card number, account information)
These are some of the categories of personal data to consider when identifying the PII in
your particular project
15
Components of identifiability
• Identifiability (Tunnistettavuus) • A measure of degree which information is personally identifiable.
The identity measurement takes place on a continuum, from full anonymity (the state of being without name) to full verinymity (being truly named)
• Linkability (Yhdistettävyys) • A measure of degree to which data elements are linkable to true
name of the data subject, where unlinkability meant different records cannot be linked together and related to a specific personal identity. In this regard, complex interrelations have been taken into account, as it may be organized and/or made possible in different ways
• Observability (Tarkkailtavuus) • A measure of the degree to which identity or linkability are
affected by the use of a system. It considers, in fact, any other factor relative to data processing (time, location, data contents) that can potentially affect the degree of identity and/or linkability
Note: Finnish translations in this slide not official ones
16
Privacy Awareness
17
1. WHY – Putting Privacy in Business Context − Real life incidents
2. WHAT – EU GDPR and ISO 29100 − Terminology − Roles within the Privacy Framework − Privacy Principles − Essence of privacy − Personally Identifiable Information and Identifiability
3. HOW – Compliance or Accountability − Elements of an ACCOUNTABLE privacy program − Privacy related business processes
4. HOW - Privacy Engineering simplified − Privacy data lifecycle − Design principles favoring privacy − Privacy impact assessment − Privacy risk management − Assessing privacy maturity
Compliance or Accountability
• Goal of being privacy compliance may not be sufficient for avoiding regulatory actions against your company
• Data protection authorities (DPA) now expect organizations to demonstrate their good intentions
• Accountability has roots in 1980 OECD privacy guidelines • Accountability framework builds trust between DPA and
organizations for the handling of personal data • Accountability means being able to show how your
company has holistically integrated privacy best practices • Centre for Information & Policy Leadership (CIPL) has
defined a global DPA endorsed approach to Accountability
Data Protection Accountability: The Essential Elements
18
Elements of an Accountable privacy program 1. Executive Accountability and oversight
ü Internal senior executive oversight and responsibility for data privacy and data protection
2. Policies and processes to implement them ü Binding and enforceable written policies and procedures that reflect applicable laws, regulations and industry standards, including procedures to put those policies into effect
3. Staffing and delegation ü Allocation of resources to ensure that the organization's privacy program is appropriately staffed by adequately trained personnel
4. Education and awareness ü Existence of up-to-date education and awareness programs to keep employees and on-site contractors aware of data protection obligations
5. Risk assessment and mitigation ü Ongoing risk assessment and mitigation planning for new products, services, technologies and business models. ü Periodic Program risk assessment to review the totality of the accountability program
6. Event management and complaint handling ü Procedures for responding to inquiries, complaints and data protection breaches
7. Internal enforcement ü Internal enforcement of the organization's policies and discipline for non-compliance
8. Redress ü Provision of remedies for those whose privacy has been put risk
Not just compliant but accountable 19
Privacy related business processes
• Quality management process • Risk management process • Assessment process • Security engineering process • Business continuity process • Customer care process • Incident response management process • External communications process • Authority request/lawful intercept process
20
Privacy Awareness
21
1. WHY – Putting Privacy in Business Context − Real life incidents
2. WHAT – EU GDPR and ISO 29100 − Terminology − Roles within the Privacy Framework − Privacy Principles − Essence of privacy − Personally Identifiable Information and Identifiability
3. HOW – Compliance or Accountability − Elements of an ACCOUNTABLE privacy program − Privacy related business processes
4. HOW - Privacy Engineering & Assurance simplified − Privacy data lifecycle − Design principles favoring privacy − Privacy impact assessment − Privacy risk management − Assessing privacy maturity
Privacy Engineering & Assurance simplified
22
Principles, Policies,
Procedures, Requirements,
Patterns
Planning Threat Assessment and Mitigation
Requirements identification
Engineering/Implementation Consultation, addressing new topics,
cultivating requirements
Review Against requirements Can be standalone
Go-live / OK Sign-off
Evidence
Evidence
Evidence
Privacy Engineering
Privacy Assurance
Privacy data lifecycle • Also called the Consumer Data
Lifecycle , it is a fundamental component of the privacy knowledge base
• Define the actions related to personal data within the privacy framework
• When analyzing the data flow in your specifications, you should also consider the complete lifecycle for the associated PII
• Within the EU, collection, itself is considered to be an act of processing !
Deletion
Storage
Processing
Transfer
Collection
x
23
Design principles that favor privacy
• Purpose clarity for collection, use, storage, transfer • Specify a Data Management plan • Data security (confidentiality, integrity, availability) • Data minimization • Limit retention of personal data • Reduce data linkability with de-identification • Better yet, delete data when purpose fulfilled • Emphasis on the complete product lifecycle • Have consumer centric defaults • Understand your incident response plan • Identify and report security & privacy metrics regularly • Commit to continual improvement
24
Privacy impact assessment • EU GDPR Article 33 promulgates PIA for public/privacy orgs • Produces evidence of implementing Privacy by Design • Conducted by staff when when personal information is collected,
used or disclosed in a product or service • Re-conducted if material changes made to product or service • ISO 29134 (WD) will standardize methodology
25
Identify describe the project, including the aims, whether any personal information will be handled, inherent privacy principles
Analyze identify the personal information flows, classify data, identify relevant regulations, privacy requirements, privacy impact
Verify validate that only essential data is collected and processed for legitimate purposes required by the product or service
Simplify change system and processes to only collect/store/process essential data for minimum period with a data deletion plan
Secure use industry best practices for safeguarding personal data through life cycle, providing consumer control over their data
Remediate identify remaining risk, level of harm and mitigation plan to eliminate or reduce risk to acceptable level
Attest record findings, gain sponsor commitment to implement any needed changes, report results to management
Privacy risk assessment • Produces evidence of minimization of possible privacy risk • Conducted by business team with input from PIA evidence • Re-conducted if material changes made to product or service • ISO 31000 defines an applicable risk management framework
26
Context establish external, internal context for risk, risk management process and risk assessment criteria to be used
Identify identify sources of risk, areas of impact, events and causes, potential consequences
Analyze consider causes and sources of risk, positive & negative consequences, both tangible and intangible
Evaluate make decisions based on risk analysis, which risks need treatment and the priority for treatment implementation
Treat select remediation based on avoiding, taking on, removing, changing potential for, changing harm of, sharing of risk
Monitor & Review
assures controls effective, learn and improve, detect context changes, identify new risks, measure KPI
Improve commit to constant improvement of the overall risk footprint
Privacy capability assessment • Provides a method for advancement of your privacy program • Conducted to measure baseline and incremental changes • Part of a commitment to accountability, constant improvement • ISO 29190 (CD) will standardize a methodology
27
Plan agree on privacy capability assessment model (e.g., context or business process based) and assessment scale to be used
Assess rate the current capability against target capability
Review identify sub-optimal capabilities to be improved and overall improvement plan
Report communicate to management the assessment activity, results, improvement actions and next scheduled assessment
Improve implement improvement plan
Privacy triangle of trust
Source: David Hoffman/Intel
Hint
To avoid the complexities of the contextual nature of privacy, REMEMBER to account for the three main stakeholder positions when dealing with a privacy related issue, policy or business decision!
29
Recommended