17
Caspar Bowden Senior Privacy Strategist Trustworthy Computing Group Microsoft EMEA Open problems in applying PETs to Data Protection Privacy and Security: The Next Wave – 07.11.03 12th CACR Information Security Workshop & 4th Annual Privacy and Security Workshop

Caspar Bowden Senior Privacy Strategist Trustworthy Computing Group Microsoft EMEA

  • Upload
    miya

  • View
    42

  • Download
    1

Embed Size (px)

DESCRIPTION

Open problems in applying PETs to Data Protection Privacy and Security: The Next Wave – 07.11.03 12th CACR Information Security Workshop & 4th Annual Privacy and Security Workshop. Caspar Bowden Senior Privacy Strategist Trustworthy Computing Group Microsoft EMEA. Trustworthy Computing. - PowerPoint PPT Presentation

Citation preview

Page 1: Caspar Bowden Senior Privacy Strategist Trustworthy Computing Group Microsoft EMEA

Caspar Bowden

Senior Privacy Strategist

Trustworthy Computing Group

Microsoft EMEA

Open problems in applying PETs to Data Protection

Privacy and Security: The Next Wave – 07.11.03

12th CACR Information Security Workshop &4th Annual Privacy and Security Workshop

Page 2: Caspar Bowden Senior Privacy Strategist Trustworthy Computing Group Microsoft EMEA

BusinessIntegrity

Trustworthy Computing

ReliabilityPrivacySecurity

Page 3: Caspar Bowden Senior Privacy Strategist Trustworthy Computing Group Microsoft EMEA

Missed Missed OpportunitiesOpportunities

• Windows XPWindows XP• WMP 8WMP 8

20012001First stepsFirst steps

20032003Getting religionGetting religion

20022002The awakeningThe awakening

20042004++True integrationTrue integration

Evolution Of Privacy

Privacy

Integration

Privacy

Aw

areness

• DRMDRM• Office Office 20032003

• MSN 8MSN 8

• Privacy Privacy offeringsofferings

• Privacy leadsPrivacy leads

• WS-PrivacyWS-Privacy• NGSCBNGSCB• Identity Identity ManagementManagement

• WMP 9WMP 9• ManageManaged d PapersPapers

• Privacy settingsPrivacy settings• Prominent Prominent DisclosureDisclosure

SuccessesSuccesses• Privacy Privacy statementsstatements

• P3P integration of P3P integration of IE6IE6

Page 4: Caspar Bowden Senior Privacy Strategist Trustworthy Computing Group Microsoft EMEA

Privacy Enhancing Technologies• TwC initiative : privacy means the ability of individuals to control

data about themselves, and adherence to fair information principles.– Privacy can be infringed when (without informed consent)

• records are disclosed or behaviour is profiled– Whenever individuals use computer services, logs may be kept

indicating who they are, where they are, and what they do.

• Privacy Enhancing Technologies can allow the user to control how much they can be profiled – Consumer and citizen concern increasing– “Nothing to hide, nothing to fear” ? – Is there something you would legitimately prefer someone not to

know ? • Privacy Engineering – integrating privacy by design

– identifiable data at network vs. application layer– minimisation for purpose– advanced PETs for privacy with security

Page 5: Caspar Bowden Senior Privacy Strategist Trustworthy Computing Group Microsoft EMEA

EU Data Protection principles• Personal Data

(identified/identifiable)– processed fairly and lawfully– collected and used for

declared purposes– relevant and not excessive

in relation to purpose– accurate and up to date– rectified if found incorrect– not retained longer than

necessary– protected with appropriate

security measures– transfers outside EU are

controlled

• ‘Sensitive’ data – Ethnicity, politics, religion,

sexuality, health, trade union membership

– explicit freely-given consent

• Data subjects– require controllers to

provide snapshot of all personal data

• Data controllers– register purposes– respond to ‘Subject Access

Requests’ within fixed time for nominal fee

Page 6: Caspar Bowden Senior Privacy Strategist Trustworthy Computing Group Microsoft EMEA

Types of PETs• Infrastructure: network layer

– Onion-routing, MIXes, Crowds, PIR

• Credentials : application layer– authentication without identification– control linkability of transactions – conditional anonymity

• derived from e-cash ‘double-spending’ ideas

• Privacy Rights Management Languages– towards enforceable privacy preferences?

Page 7: Caspar Bowden Senior Privacy Strategist Trustworthy Computing Group Microsoft EMEA

Privacy Risks - data controllers• Liability: Sanctions, Reputation, Damages

– Unnecessary collection– Improper use or disclosure– Excessive retention – type or time– Insufficient organisational or technical security– Incomplete or incorrect SAR fulfilment

• negligent authentication or delivery

– civil litigation

Page 8: Caspar Bowden Senior Privacy Strategist Trustworthy Computing Group Microsoft EMEA

Privacy Risks – data subjects• Incomplete access

– lack of forseeability, self-determination

• Obscure or ambiguous notices– definitions of “identifiable” vs. “anonymous”– time cost of scrutiny exceeds marginal value

• unappreciated consequences

• Declared policy not observed/enforced– unrecognised data flows – ineffective controls on data processors

casparb
Page 9: Caspar Bowden Senior Privacy Strategist Trustworthy Computing Group Microsoft EMEA

Subject Access• Transparency

– Data Protection as a Human Right

• Authentication– Who is the data subject ?– Identity Management

• Privacy risk of making scattered data easier to collate vs. benefit of making SAR easier to fulfill

• Fulfilment– Where is the data ?– Redaction of references to other persons– Secure delivery online – what will suffice ?

casparb
Page 10: Caspar Bowden Senior Privacy Strategist Trustworthy Computing Group Microsoft EMEA

Subject Access Requests• Authentication

– is the requester the data subject?• risk of improper disclosure

– Privacy threat models» User’s point-of-view that matters» Wide spectrum of user sensitivities, individual threat models

– social engineering, authorised insiders

• Where is the data?– Archives (e-mail, server, database, offline)– Scattered over different desktops, caching

casparb
Page 11: Caspar Bowden Senior Privacy Strategist Trustworthy Computing Group Microsoft EMEA

Disproportionate effort “exemption” for Subject Access?

– UK DPA 1998 – need not provide data in “permanent form” if would require disproportionate effort

• 2002 UK consultation – “It is important to note that the personal data must always be provided. The ‘disproportionate effort’ test applies only to the way in which access is given.”

– Lord Chancellor's Department Consultation Paper, Data Protection Act 1998: Subject Access, October 2002

– Permanent form = hard copy

– often data controllers interpret in practice as a general exemption

– Enterprise ID Management systems could have the effect of broadening regulator expectations of reasonable fulfilment of access requests

casparb
Page 12: Caspar Bowden Senior Privacy Strategist Trustworthy Computing Group Microsoft EMEA

Data lifecycle in the Enterprise• Conflicts between retention/deletion rules

– DP minimisation/deletion principles still apply to sectoral retention requirements

– typically context dependent and ill-defined– too complex/unclear/expensive to automate?

• When are identifiable audit trails justifiable? – Minimally intrusive for necessary effectiveness

• weigh security needs against privacy risks • deterrence of abuse needs visible policing• logs of usage data are personal data too!

casparb
Page 13: Caspar Bowden Senior Privacy Strategist Trustworthy Computing Group Microsoft EMEA

Pseudonymous Subject Access?• Data controller may only know subject

pseudonymously (are they a “controller” ?)• 1995 EU DP Directive defines “personal data” as:

• “any information relating to an identified or identifiable natural person ('data subject'); an identifiable person is one who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to his physical, physiological, mental, economic, cultural or social identity”

• Is data related to the pseudonym eligible for subject access?

• Should the data subject be required to disclose real-world identity to access?– Example: handle in a newsgroup/chatroom -

traceable via IP/cookie?

casparb
Page 14: Caspar Bowden Senior Privacy Strategist Trustworthy Computing Group Microsoft EMEA

Potential privacy platforms• Windows Server 2003 Rights Management Services

– Information Rights Management in Office 2003– APIs for policy engines based on content– http://www.microsoft.com/windowsserver2003/techinfo/overview/rmspartners.mspx

• Trusted Computing– Next Generation Secure Computing Base

• Privacy White Paper now available• http://www.microsoft.com/resources/ngscb/productinfo.mspx• Comments requested - [email protected]

– by Jan. 30, 2004 – Enforceable user privacy preferences?

• “DRM-in-reverse”• Requires

– Privacy policy enforcement engine environment remote-side– Privacy Rights Management Language– Consistent binding between personal data and authentication identifier

Page 15: Caspar Bowden Senior Privacy Strategist Trustworthy Computing Group Microsoft EMEA

Competitive Advantage

vendorinnovation

customer demand

user discriminates

demonstrablecompliance

few vendor

solutions

low customer demand

poor compliance

lowenforcement

risk

PET ‘stagflation’PET ‘stagflation’ PET virtuous circlePET virtuous circle

Page 16: Caspar Bowden Senior Privacy Strategist Trustworthy Computing Group Microsoft EMEA

Caspar Bowden - [email protected]://www.microsoft.com/twc

Senior Privacy Strategist

Trustworthy Computing Group

Microsoft EMEA HQ

Q&A

Page 17: Caspar Bowden Senior Privacy Strategist Trustworthy Computing Group Microsoft EMEA

Safe Harbor Agreement (SHA)

• all personal data regulated– private and public sector – data protection principles– minimum data for purpose– legal right of subject access

• Data Protection Authorities– independent of Executive– enforce DP principles– transfers outside EU prohibited

unless ‘adequate’ protection– exemption with consent– or…

• no general regulation – of private sector

• sectoral legislation– HIPAA (health), GLB

(financial), video, cable, telephone, credit,…

• Federal Trade Commission – Privacy Statements– unfair practice and

deceptive claims– Fair Information Principles

US Privacy EU Data Protection