ID by Law Is the EC Directive valid in 10 years? Jan Willem Broekema Open Source Onderdeel Software Strategie.

Slides:



Advertisements
Similar presentations
Re-use of PSI Data Protection Issues Cécile de Terwangne Professor at the Law Faculty, Research Director at CRIDS University of Namur (Belgium) 2 nd LAPSI.
Advertisements

Public Sector Information & Data Protection: A plea for personal privacy settings for the re-use of PSI Bart van der Sloot Institute for Information Law.
PRIVACY ASPECTS OF RE-USE OF PSI: BETWEEN PRIVATE AND PUBLIC SECTOR
Steps towards E-Government in Syria
Data Protection Billy Hawkes Data Protection Commissioner Irish Human Rights Commission 20 November 2010.
1 SANS Technology Institute - Candidate for Master of Science Degree 1 Assessing Privacy Risks of Flash Cookies Kevin Fuller and Stacy Jordan February.
Hart District Acceptable Use Policy Acceptable Use Policy.
Chapter 1 Business Driven Technology
Electronic commerce EDI (8 decade) – base of EC – “Netscape” – propose SSL (Secure Sockets Layer) 1995 – “Amazon.com” “eBay.com” 1998 – DSL (Digital.
CYBER & Product Liability & Professional Indemnity
Ethics, Privacy and Information Security
Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
Internet/Cyber Stalking AND HOW TO AVOID BEING A VICTIM.
Bruce Schneier Lanette Dowell November 25, Introduction  “It is insufficient to protect ourselves with laws; we need to protect ourselves with.
Chapter 10 Privacy and Security McGraw-Hill
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Internet Ethics Presented by: Daniel Wu Kalven Wu.
DISTRIBUTED PROCESS IMPLEMENTAION BHAVIN KANSARA.
Preparedness for cybersecurity threats domestic aspects of cyber security Jaan Priisalu.
Digital Literacy and the ‘Last Miles’ The variety of last miles Education Fast Forward November 1st, Bálint MAGYAR, Hungary.
Class 13 Internet Privacy Law European Privacy.
ITGS Networks Based on the textbook “Information Technology in a Global Society for the IB Diploma” by Stuart Gray.
How It Applies In A Virtual World
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Lawyer at the Brussels Bar Lecturer at the University of Strasbourg Assistant at the University of Brussels Data Protection & Electronic Communications.
Securing Information Systems
2002 Symantec Corporation, All Rights Reserved The dilemma European Security Policy and Privacy Ilias Chantzos Government Relations EMEA Terena Conference,
You, Me & Technology. Overview Technology –Our relationship with technology Threats –What, Who, When, Where, Why & How Protection –What we can do to protect.
INTERNET PRIVACY Marketing companies The cookie leak security hole in the HTML messages The Web Bug Can we trust the privacy.
Health Information Technology Basics January 8, 2011 by Leola McNeill adapted from Information Technology Basics by June 2009, Kayla Calhoun & Dr. Frank.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
OHT 11.1 © Marketing Insights Limited 2004 Chapter 9 Analysis and Design EC Security.
Corporate crime prevention project and Best practices manual Dr. Wybe Th. Douma T.M.C. Asser Institute, The Hague.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Forensic and Investigative Accounting Chapter 14 Digital Forensics Analysis © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Data Protection Compliance Professor Ian Walden Institute of Computer and Communications Law, Centre for Commercial Law Studies, Queen Mary, University.
Olof Nilsson.  Ex: Facebook, MySpace, LinkedIn ◦ Allows users to create web pages or profiles that provide information about themselves and are available.
Developing Policy and Procedure Management System إعداد برنامج سياسات وإجراءات العمل 8 Safar February 2007 HERA GENERAL HOSPITAL.
SURVEILLANCE The Fears of the Digital Age. Privacy –Identity –Anonymity Logging –Tracking Hacking Censorship State Security/Anti Terror Online The Discussion.
Internet Architecture and Governance
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
Introduction to Information Retrieval Example of information need in the context of the world wide web: “Find all documents containing information on computer.
E a s y S h a r e Jung Son Ky Le. Operational Concepts Recent years, huge number of growth in Internet users and broadband usage File-sharing become extremely.
Organisations and Data Management 1 Data Collection: Why organisations & individuals acquire data & supply data via websites 2Techniques used by organisations.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
E-C OMMERCE : T HE E -C ONSUMER AND THE ATTACKS AGAINST THE PERSONAL DATA Nomikou Eirini Attorney at Law, Piraeus Bar Association Master Degree in Web.
František Nonnemann Skopje, 10th October 2012 JHA Data protection and re-use of PSI as a tool for public control–CZ approach.
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
AfterOpen Source Software and Open Standards there's Open Content Jan Willem Broekema Open Source as Option in your Software Strategy e-government.
Smart Data infrastructure
Privacy and Social Media
Add video notes to lecture
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
ELECTRONIC GOVERNMENT legal aspects and applications
Secure Software Confidentiality Integrity Data Security Authentication
Threats and Challenges to Data Protection and Privacy :-
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Securing Information Systems
Modernisation of European social statistics
What is Web Browsers - What is Blogs-
Overview of Zero-Knowledge Systems Inc
The GDPR and research data
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
Unit# 5: Internet and Worldwide Web
The activity of Art. 29. Working Party György Halmos
Laur Mägi Department of Information Systems and Document Management
Presentation transcript:

ID by Law Is the EC Directive valid in 10 years? Jan Willem Broekema Open Source Onderdeel Software Strategie

European Data Protection Directive 95/46 Data Protection in the European Union based on the concept  of data regarding identified or identifiable person(s)  of (automated) processing  of a processor (person or organisation)  of a controller (controlling the processor)

Raison d’être  Early 70’s fear of Domesday Books  Full population census (know all to better policy)  1984 scenario (know all to better police)  All-powerful all-knowing government  Relational database structures NOT however  Internet / World Wide Web  Search engines  Data mining

Linked to basic human rights  The right to be left alone (privacy in 19 th C America)  Human rights charters Nine basic rules  1. Notification  2. Transparency  3. Finality  4. Grounds  5. Quality  6. Rights  7. Data security  8. Processor  9. Data transfers

Internet - the new? kid on the block based on technological & financial efficiency  re-use of processing power  re-use of code  re-use of information  more, faster  limitless

, Usenet, Talk  Person - to - person (vs computer-computer)  Indirect, store_and_forward, store_and_get  Direct, “on-line” chat and messenger  1-2-1, 1-2-N  address change from to

World Wide Web  Collection of client information  Collection of visitor information  Cookies  Trojan Horses  Bots  Zombies  Phishes  all aimed at the (unwanted) collection of personal data

New and future developments  Search engines  Waybackmachine  ID in EXIF  IP v6  Personal digital assistant  Smart phone  Data storage by and for police forces  Data storage by and for public transport  Data storage by and for medicare  Data storage by and for public sector  Data storage by and for lending & spending  Data storage by and for commerce  Data storage by and for friends & unwanted others  Data storage by and for (ex) lovers, (ex) wives, (ex) dogs  Data storage by and for schools & education  Data storage by and for terrorists, thieves, abductors  Data storage by and for anybody who wants to know  Data storage by and for your mother in law  Data storage by and for you & your neighbour

So, what left - or what’s right?  Anonymity on internet, tech helps  Only for ‘hackers’  There’s nowhere to hide  There’s no road back  Any code can be broken  Everybody leaves a trace; “Toninootje”  Closed software (=no) solutions, backdoors  Pigeons on the loose But what if?  others publish your info  publication is legal but unwanted

Coming to a close Is there Privacy in the Future?  No, for standard society issues not  No, for governmental procedures not  No, not for have-nots/know-nots However  If you really want it, yes, by technology/knowledge  If you really want it, yes, by fraud  If you really want it, yes, by social engineering and then it is very successfulllllllllllll!!!!!!!!!!!!!!

Should EC 95/46 be changed?  EU-wide general privacy protection framework  based on human rights (no business interest)  different value for private and public sectors  national data protection authorities  is a web publication a processing of personal information  should web visitors be notified of further use  should police power be controlled / curbed  should governmental collection be stopped

ID by Law or Jan Willem Broekema Open Source Onderdeel Software Strategie