Public Acceptance of V2V/V2I It’s a Matter of Trust Claire W. Barrett July 16, 2015 1.

Slides:



Advertisements
Similar presentations
Privacy By Design Sample Use Case
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Hart District Acceptable Use Policy Acceptable Use Policy.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
1 IntelliDrive SM IntelliDrive SM for Transit 101 ITS America Annual Meeting May 4, 2010 Jeffrey L. Spencer FTA.
4.01 Foundational knowledge of promotion
Silicon Valley Apps for Kids Meetup Laura D. Berger October 22, 2012 The views expressed herein are those of the speaker, and do not represent the views.
John Palatiello, MAPPS Executive Director Kevin Pomfret, Centre for Spatial Law and Policy presentation to NGAC December 7, Washington, DC.
The AMA Code of Ethics Could Egyptian Marketing Professionals Agree on a List of Rules, Perhaps Similar to This? The IMI Journal. Members of the AMA are.
P3P: Platform for Privacy Preferences Charlin Lu Sensitive Information in a Wired World November 11, 2003.
Privacy in Ontario Brian Beamish Office of the Information and Privacy Commissioner/Ontario Presentation to Security Canada Central 2002 International.
The role of the Office of the Privacy Commissioner in telecommunications Andrew Solomon Director, Policy.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
NTIA Privacy Multistakeholder Meeting March 25, 2014 Amanda Koulousias, Attorney Division of Privacy and Identity Protection Federal Trade Commission FTC.
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
Per Anders Eriksson
Copyright © 2015 Pearson Education, Inc. Confidentiality and Privacy Controls Chapter
Taking Steps to Protect Privacy A presentation to Hamilton-area Physiotherapy Managers by Bob Spence Communications Co-ordinator Office of the Ontario.
Class 7 Internet Privacy Law Your Digital Afterlife.
Information Asset Classification
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
31 March CMU Sustainable Computing Consortium, Tempe, Arizona Trust in Mobile & Context-Aware Computing: Legal Perspectives W. Scott Blackmer, Esq.
The Use of Health Information Technology in Physician Practices
Service Organization Control (SOC) Reporting Options and Information
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
IntelliDrive Policy and Institutional Issues Research Valerie Briggs Team Lead, Knowledge Transfer and Policy, ITS Joint Program Office, RITA May 4, 2010.
HIPAA PRIVACY AND SECURITY AWARENESS.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
Nationwide Health Information Network: Conditions for Trusted Exchange Request For Information (RFI) Steven Posnack, MHS, MS, CISSP Director, Federal Policy.
Smart Machines, Smart Privacy: Rules of the Road and Challenges Ahead The views expressed are those of the speaker and not necessarily those of the FTC.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
V ehicle I nfrastructure I ntegration Jeffrey F. Paniati Associate Administrator for Operations and Acting Program Manager for ITS Joint Program Office.
© 2011 Underwriters Laboratories Inc. All rights reserved. This document may not be reproduced or distributed without authorization. ASSET Safety Management.
Crosswalk of Public Health Accreditation and the Public Health Code of Ethics Highlighted items relate to the Water Supply case studied discussed in the.
Mike Schagrin US Department of Transportation ITS Joint Program Office IntelliDrive Safety Program Overview.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
HIT Policy Committee Information Exchange Workgroup NwHIN Conditions for Trusted Exchange Request For Information (RFI) May 18,
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
Malcolm Crompton APEC Information Privacy Framework: review, impact, & progress APEC Symposium on Information Privacy Protection in E Government & E Commerce.
McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 11 Employment Regulation and Labor Law.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
U.S. Department of Education Safeguarding Student Privacy Melanie Muenzer U.S. Department of Education Chief of Staff Office of Planning, Evaluation, and.
INTRODUCTION TO DATA PROTECTION An overview of the Irish Data Protection legislation.
1 National Highway Traffic Safety Administration An Overview of NHTSAs Vehicle Safety Research Priorities Nathaniel Beuse Associate Administrator, Vehicle.
CHAPTER 5 ETHICS & PRIVACY.
APEC Privacy Framework “The lack of consumer trust and confidence in the privacy and security of online transactions and information networks is one element.
Functioning as a Business Associate Under HIPAA William F. Tulloch Director, PCBA March 9, 2004.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
1 Chapter 1 You Are the Driver. 2 Chapter 1 Overview Chapter 1 introduces you to the highway transportation system and the driving task. The chapter also.
Data protection—training materials [Name and details of speaker]
The US Vehicle Safety Regulatory Process Martin Koubek Office of International Policy and Harmonization National Highway Traffic Safety Administration.
You Are The Driver Drive Right Text – Chapter You Are Part of the System 1.2 Your Driving Task 1.3 Your Driving Responsibilities 1.4 Your Driver’s.
Department of Transportation. About the DOT – Founded: The Department of Transportation was established by an act of Congress on October 15, The.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
ITS: The Next Generation Shelley Row Director Intelligent Transportation Systems Joint Program Office Research and Innovative Technology Administration,
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
Consumer Information Federal Trade Commission Act grants Federal Trade Commission (FTC) responsibility regarding unfair methods of competition and unfair.
Director, Internet, Science, and Technology Research
Privacy and Public Policy Implications of IoT
Two New NHTSA Data Efforts: EDT and vPIC
Bernard C. Soriano, Ph.D. Deputy Director
E&O Risk Management: Meeting the Challenge of Change
Bob Siegel President Privacy Ref, Inc.
Investor protection and MIFID
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
IAPP TRUSTe SYMPOSIUM 9-11 JUNE 2004
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Presentation transcript:

Public Acceptance of V2V/V2I It’s a Matter of Trust Claire W. Barrett July 16,

Transportation Challenges Safety 33,561 highway deaths in ,615,000 crashes in 2012 Leading cause of death for ages 4, Safety 33,561 highway deaths in ,615,000 crashes in 2012 Leading cause of death for ages 4, Mobility 5.5 billion hours of travel delay $121 billion cost of urban congestion Mobility 5.5 billion hours of travel delay $121 billion cost of urban congestion Environment 2.9 billion gallons of wasted fuel 56 billion lbs. of additional CO 2 Environment 2.9 billion gallons of wasted fuel 56 billion lbs. of additional CO 2

3

The Challenge Characteristics Data exchange between vehicles without pre- existing relationship No impact on vehicle design New entrants Dynamically changing technology Predicates Data confidentiality Data integrity Authentication Non-repudiation Authorization 4

ITS Privacy Considerations ITS operations contingent up “vehicles” broadcasting signals indicating location, signals which are intended to be received and understood by a range of other devices. If entities are able to locate and track specific vehicles. Is ITS location information “personal information”? – Link location data to unique vehicle identifier (or series of identifiers) – Link ITS signal to registered vehicle and subsequently registered owner What is at stake? – Present location – Historical location – Behavior patterns Likelihood of Risk & Harm? – Degree of annonymization – Business operations controls Collection Retention Linking – “System” roles Certificate holders Opt-in / Informed Consent – Consumer chooses to engage/deploy ITS technology – Consumer affirms acceptance of privacy risk prior to any information collection/use Opt-out / Implied Consent – ITS capabilities are installed and operational in vehicle by default – Consumer must make active decision to disengage ITS functionality Consumer may not be as aware of their available choices and the resultant privacy implications – Sufficient when the government's interests in preventing injury, property damage, and loss of life on roadways are served by the practice – Usually must allow for individuals to opt-out of such programs and requires that members of the public be made reasonably aware of to what they are tacitly consenting. Mandatory model – Sufficient when the government's interests in preventing injury, property damage, and loss of life on roadways are served by the practice 5

ITS Privacy Law No federal laws that specifically protect an individual's locational information – Driver's Privacy Protection Act of 1994, Protects personal information collected by departments of motor vehicles Proposed laws – Geolocational Privacy and Surveillance Act Require law enforcement to get a warrant before using locational technology to track an individual's location – Location Privacy Protection Act of 2011 Presumptively illegal for non-government entities to collect an individual's locational information absent consent. States with statutes that require disclosure of data tracking devices that are included in cars by auto manufactures – Maine, Colorado, California, and New Hampshire – Virginia (Va. Code § (C)(s), § ,§ ,§ )Va. Code § (C)(s) § § § requires an owner's consent for any device that collects electronic information from a car, not just from those devices installed by an auto- manufacturer, except in selected circumstances generally prohibits insurers from treating consumers differently, if they refuse to provide the insurer ITS generated data. Current law typically places much greater restrictions on the collection and use of personally identifiable data by the public sector, than by the private sector. – Who is collecting and/or using the information gathered by an ITS application often dictates the level of privacy protections triggered. 6

Consumer Privacy Bill of Rights Individual Control – Consumers have a right to exercise control over what personal data companies collect from them and how they use it. Transparency – Consumers have a right to easily understandable and accessible information about privacy and security practices. Respect for Context – Consumers have a right to expect that companies will collect, use, and disclose personal data in ways that are consistent with the context in which consumers provide the data. Security – Consumers have a right to secure and responsible handling of personal data. Access and Accuracy – Consumers have a right to access and correct personal data in usable formats, in a manner that is appropriate to the sensitivity of the data and the risk of adverse consequences to consumers if the data is inaccurate. Focused Collection – Consumers have a right to reasonable limits on the personal data that companies collect and retain. Accountability – Consumers have a right to have personal data handled by companies with appropriate measures in place to assure they adhere to the Consumer Privacy Bill of Rights. 7 Applies to personal data, which means any data, including aggregations of data, which is linkable to a specific individual. Personal data may include data that is linked to a specific computer or other device. Consumer Data Privacy in a Networked World

Federal Trade Commission Section 5 of the Federal Trade Commission Act, 15 U.S.C. § 45(a)(1) (2011), prohibits – “unfair or deceptive acts or practices‘ and most states have analogous consumer laws. Active in regulating companies' privacy notices to consumers about how they collect and use consumer data, including locational data. "Protecting Consumer Privacy in an Era of Rapid Change: Recommendations For Businesses and Policymakers,“ Privacy by Design - companies should build in consumers' privacy protections at every stage in developing their products. These include reasonable security for consumer data, limited collection and retention of such data, and reasonable procedures to promote data accuracy; Simplified Choice for Businesses and Consumers - companies should give consumers the option to decide what information is shared about them, and with whom. This should include a Do-Not-Track mechanism that would provide a simple, easy way for consumers to control the tracking of their online activities. Greater Transparency - companies should disclose details about their collection and use of consumers' information, and provide consumers access to the data collected about them 8

Responding to the Challenge The system will NOT – collect or store any data on individuals or individual vehicles – Include data in safety messages or security system that could be used by law enforcement to identify speeding or erratic driver – Permit tracking though space or time vehicles linked to specific owners/drivers/persons – Collect financial information, personal communications, or other information linked to individuals. – Require collection any information identifying specific vehicles or owners for automatic enrollment – Provide a “pipe” into the vehicle for extracting data. Will enable NHTSA and motor vehicle manufacturers to find lots or production runs of potentially defective V2V equipment without use of VIN numbers or other information that could identify specific drivers or vehicles. There is space for VIN in the proposed SAE standard – but DOT will likely proposed that the mandated message not include it, and furthermore is considering proposing to prohibit manufacturers from including VIN or and data personally identifying the driver or owner in V2V messages broadcast via mandated DSRC – Emergency and commercial/fleet vehicle exception – Rulemaking Research/Public Engagement – Location tracking and re-identification – Privacy risk – Privacy Impact Assessment 9

Contact Info Claire W. Barrett DOT Chief Privacy & Information Asset Officer Office of the Chief Information Officer Office of the Secretary US Department of Transportation