Presentation is loading. Please wait.

Presentation is loading. Please wait.

Copyright, 2000-02 1 E-Consent A Critical Element of Trust in e-Business Roger Clarke, Xamax Consultancy Pty Ltd

Similar presentations


Presentation on theme: "Copyright, 2000-02 1 E-Consent A Critical Element of Trust in e-Business Roger Clarke, Xamax Consultancy Pty Ltd"— Presentation transcript:

1 Copyright, 2000-02 1 E-Consent A Critical Element of Trust in e-Business Roger Clarke, Xamax Consultancy Pty Ltd http://www.anu.edu.au/people/Roger.Clarke/....../EC/eConsent.html, eConsent02.ppt 15th Bled Electronic Commerce Conference, Bled, Slovenia, 17-19 June 2002

2 Copyright, 2000-02 2 E-Consent A Critical Element of Trust in e-Business Agenda Trust in e-Business Consent Definition Contexts Characteristics e-Consent Process Object Implementations Implementability

3 Copyright, 2000-02 3 Fundamental Risks in All Markets That Are Perceived to Be Greater in Marketspaces Seller Default Buyer Default Market Operator Default Intermediary Default Service-Provider Default Tradable Item Quality Fulfilment Quality

4 Copyright, 2000-02 4 Trust as an e-Business Enabler Cyberspace adds to Uncertainties, Risk Lack of Information Jurisdictional Issues What are you doing with my money? Will you really deliver the goods? What are you going to do with my data?

5 Copyright, 2000-02 5 Trust confident reliance by one party about the behaviour of the other parties Origins in kinship groups Extensible to cultural affinity (i.e. friends) Not directly extensible to business relationships In business, its merely what a party has to depend on when no other form of risk amelioration strategy is available

6 Copyright, 2000-02 6 Sources of Trust Direct Relationship kinship, mateship, principal-agent, contract, multiple prior transactions Direct Experience prior exposure, a prior transaction or trial Referred Trust 'word-of-mouth', reputation, accreditation Symbols of Trust or Images of Trust brands, meta-brands

7 Copyright, 2000-02 7 Latest in a Long Line of Marketer Manoeuvres Dynamic Consumer Profiling Self-Identifying Data, consensually provided the click-trail Self-Identifying Data, acquired by trickery e.g. pseudo-surveys, cookies, web-bugs,... Server-Driven Client-Side Processing JavaScript, Java Applets, CaptiveX, spy-ware,... Self-Identifying Personal Profile Data aka 'Identity Management' esp. MS Passport / wallets, but also Liberty Alliance

8 Copyright, 2000-02 8 Trust Through Buyer Protection Service Longevity and Reliability Transparency of Data About the Seller Fairness of Marketspace Processes Security of Tradable Items and Funds Risk Allocation / Clarity of Risk Exposure Safeguards such as Warranties, Recourse, Insurance, a Credible Insurer of Last Resort Protections for the Buyers Data

9 Copyright, 2000-02 9 Consent concurrence by a party with an action to be taken by another party

10 Copyright, 2000-02 10 Consent Context: The Human Body medical procedures drug prescription, innoculation, surgery acquisition and use of body fluids/tissue/organs donations of blood, semen, bone marrow, kidneys organ donations from the dead acquisition and testing of body tissue/fluids health care diagnostics substance abuse testing suspect identification and suspect elimination

11 Copyright, 2000-02 11 Consent Contexts: e-Business Promotion and Marketing Price, and Terms of Contract (Invitation to Treat) Offer Acceptance Payments Handling of Purchaser Data Commercial Confidence Privacy

12 Copyright, 2000-02 12 Consent and Consumer Marketing Practices on the street via mass media at an exhibition site the telephone physical mail-box email-box

13 Copyright, 2000-02 13 Contracting and Payments Declaration of Offer Signification of Acceptance Consumer Choice Evidence of Offer and Acceptance Consent to Use Credit-Card Details: Once and Destroy? Once and Retain? Once and Retain, and Re-Use?

14 Copyright, 2000-02 14 Consent and Personal Data Consumer Expectations privacy is a 'fundamental human right' excited (and/or numbed) by abuses excited by advocates and the media Particularly Serious Concerns anti-discrimination categories taxation and financial data health data household data location data for persons-at-risk

15 Copyright, 2000-02 15 Consent, Personal Data and the Law General Privacy Laws: OECD Guidelines as a framework, 1980 EU Directive on Data Protection, 1995/98 US – a scatter of laws, but intransigence re a general law, hence 'safe harbor'/FCC Specific Laws, e.g. Spam EU Directive on Cookies? Standards, e.g. Cookies RFCs 2964, 2965

16 Copyright, 2000-02 16 Consent, Personal Data and Australian Law Under the Privacy Act 1988 as amended by the Privacy Amendment (Private Sector) Act 2000, wef 21 Dec 01: collection, use and disclosure of personal data are all subject to controls based on consent direct marketing is subject to some specific provisions (much less than the EU demands) what it all means in particular contexts is far from clear; but a level of expectation has been created

17 Copyright, 2000-02 17 Characteristics of Consent – 1 of 2 {express in writing OR express unrecorded OR implied OR inferred} {declared by 'opt-in' OR presumed with 'opt-out', but subject to the absence of express denial}

18 Copyright, 2000-02 18 Characteristics of Consent - 2 of 2 legal capacity physical and intellectual capacity informed what scope of actions who may take such action for what purpose may it be taken over what time-period does it apply freely-given revocable and variable delegable

19 Copyright, 2000-02 19 e-Consent signification by recorded electronic means of concurrence or otherwise with an action to be taken by another party To achieve trust in the e-business context, recording is essential, in order to enable authentication Recording by electronic means is highly desirable, so as to use the same facilities as the e-business transaction, and to enable automated processing of the consent

20 Copyright, 2000-02 20 The e-Consent Process

21 Copyright, 2000-02 21 (1)Initiation two parties enter into some form of information interchange, resulting in an intention by one party to provide consent to an action by another possibilities include: email-interchange an exchange between browser and web-server telephone conversation personal contact

22 Copyright, 2000-02 22 (2)Declaration of the Consent could be performed on the consent-givers own computing facility, or through interactions between the facilities of the two parties possibly an email-interchange, or an exchange between a browser plug-in and web-server script possibly on the site of the marketer or an agent (accountant, solicitor, financial adviser, health care professional), with a signature on an office-copy of the printed document, or a keystroke on a computer

23 Copyright, 2000-02 23 (3)Expression of an e-Consent Object (e.g. for the Specific Purpose of Data Access) Access to by for in is [consented to | denied] by

24 Copyright, 2000-02 24 (4)Transmission of the e-Consent Object Transmission Security: virtual private networks (VPNs) channel-encryption measures e.g. SSL/TLS message-encryption tools such as PGP

25 Copyright, 2000-02 25 (5)Authentication of the e-Consent Authentication of Individual Identity possibly digital signature, perhaps using a secure token and even biometrics more easily password / PIN / passphrase Alternatives: Anonymity Pseudonymity Authentication of Attributes / Credentials Authentication of Value

26 Copyright, 2000-02 26 Conventional X.509-Based PKI the maths makes lots of unjustifed assumptions private key generation is insecure private key storage is insecure (and unsecureable) X.509 certificates are privacy-hostile acquiring a certificate is utterly privacy-hostile fine print in CAs' contracts denies all liability key revocation is largely unsupported the industry is built on mythology no effective open, public schemes exist if they ever did, they'd be highly privacy-invasive

27 Copyright, 2000-02 27 What Conventional PKI Does It provides to the recipient of a message zero assurance about the identity of the sender It provides assurance only that the device that signed the message had access to a particular private key

28 Copyright, 2000-02 28 (6)Application of the e-Consent Display-Only; but with logging, log-analysis, exception-reporting, powers, action against abuses Authorisation / Access Control: permission to access a resource (data, a process) based on consent (or legal authority, or power) absence of permission results in denial of access ('gatekeeper'); or qualified access (with controls as above)

29 Copyright, 2000-02 29 Subtleties in an e-Consent Object specific, operational definitions of domains on which data-items are defined, e.g. which data, which other party or which category of parties, which purpose supplementary data (e.g. re power of attorney) general consent with specific denial (all except...) general denial with specific consent (none except...) a hierarchy of such qualifications reliable date-time stamps, to support authentication

30 Copyright, 2000-02 30 Existing Implementations? 'I accept' buttons (which deny consumer choice) Info-mediaries as agents (are there any?) MS Open Profiling Standard (OPS) (RIP?) So-called Identity Management schemes: MS XP,.NET, Passport, wallet, web-services AOL Screen Name, and Quick Checkout Liberty Alliance - http://www.projectliberty.org/ W3C Platform for Privacy Preferences (P3P) - or just Platform for Publishing Privacy Policies (P4P)

31 Copyright, 2000-02 31 Implementability Marketer uses P3P-like syntax to declare terms, in XML format, in a document on the web-site Consumer uses a browser to access it, and a plug-in to analyse the content and display it Consumer uses a browser plug-in and templates to express a consent in XML format Consumer transmits the consent using SSL Marketer uses a CGI script to analyse it, and either accept, reject, or enter into negotiations

32 Copyright, 2000-02 32 e-Consent CONCLUSIONS a critical element of trust in e-business requires maturation beyond old-fashioned 'consumer as prey' marketing philosophies requires inversion of current thinking about 'identity management' and marketer- controlled storage of personal data implementable using existing technologies a research opportunity a business opportunity


Download ppt "Copyright, 2000-02 1 E-Consent A Critical Element of Trust in e-Business Roger Clarke, Xamax Consultancy Pty Ltd"

Similar presentations


Ads by Google