Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario Ted Rogers School of Information Technology Management Ryerson University February 24,

Slides:



Advertisements
Similar presentations
Privacy by Design: Big Privacy for Big Data
Advertisements

Office of the Information and Privacy Commissioner, Ontario, Canada
1 NAESB Data Privacy Task Force February 16, 2011.
A strategy for a Secure Information Society –
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY.
Innovation and the Privacy Advantage Jennifer Stoddart, Privacy Commissioner of Canada August 25, 2010 Institute of Public Administration of Canada 62.
Cyber Security and Data Protection Presented by Mrs Drudeisha Madhub (Data Protection Commissioner ) Tel: Helpdesk:+230.
In Harmony, In the Cloud: Harmonizing Data Protection Rules In a Cross-Border World Steve Mutkoski Worldwide Director Policy Microsoft Corporation.
Ann Cavoukian, Ph.D. Executive Director Privacy and Big Data Institute Ryerson University Embed Privacy, By Design into IT and Engineering … Welcome to.
Improving Cybersecurity Through Research & Innovation Dr. Steve Purser Head of Technical Competence Department European Network and Information Security.
Securing North America’s Power Grid Dr. Ann Cavoukian, Ontario information and privacy commissioner Mark Fabro CISSP, CISM, President and Chief Security.
© 2003 IBM Corporation Preparing for Privacy Society of Internet Professionals January 19, 2004 Nigel Brown Senior Privacy.
© 2005 Mobile VCE Securing the Future: Device & Service Security Stephen Hope, FT R&D UK Ltd on behalf of Nigel Jefferies, Vodafone Chair.
This project is partially funded by the European Union’s Seventh Framework Programme: FP7-ICT and Grant agreement no: REPUBLIC OF SLOVENIA.
WHY CHOOSE CEO-PE?  We employ International Association of Privacy Professionals (IAPP) Certified and Health Insurance Portability & Accountability Act.
P3P: Platform for Privacy Preferences Charlin Lu Sensitive Information in a Wired World November 11, 2003.
Privacy in Ontario Brian Beamish Office of the Information and Privacy Commissioner/Ontario Presentation to Security Canada Central 2002 International.
IETF Plenary Monday 25 July 2011 Quebec City, Canada Privacy: A Regulator’s Perspective Fred Carter Senior Policy & Technology Advisor IPC/O.
Taking Steps to Protect Privacy A presentation to Hamilton-area Physiotherapy Managers by Bob Spence Communications Co-ordinator Office of the Ontario.
SmartPrivacy for the Smart Grid Catherine Thompson Office of the Information and Privacy Commissioner Ontario, Canada Practical Smart Grid Security (SG-11)
Challenges of a Harmonized Global Safety Regime Jacques Repussard Director General IRSN IAEA 2007 Scientific Forum.
Exposing the Myths, Exploring the Solutions Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario Privacy & Security: Seeking the.
Ann Cavoukian, Ph.D. Ann Cavoukian, Ph.D. Executive Director Privacy and Big Data Institute Ryerson University Information Technology Law Spring Forum.
Final Exam Part 1. Internet Regulation Internet regulation according to internet society states that it is about restricting or controlling certain pieces.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Giandonato CAGGIANO ENISA MANAGEMENT BOARD REPRESENTATIVE LEGAL ADVISER ON EUROPEAN AFFAIRS OF THE MINISTRY OF COMMUNICATIONS U. OF ROMA TRE LAW FACULTY.
Privacy, Security, and trust in cloud computing BY: SIANI PEARSON PRESENTED BY: KIA MANOOCHEHRI.
Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario Harvard Executive Privacy Symposium Harvard University August 20, 2008 The Future of.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
East Asia and the Pacific Region
2015 National BDPA Technology Conference Big Data: Cool, Creepy or Privacy Violation? Arlonda Stevens August 18-22, 2015 Washington, DC.
Session Chair: Peter Doorn Director, Data Archiving and Networked Services (DANS), The Netherlands.
Towards a European network for digital preservation Ideas for a proposal Mariella Guercio, University of Urbino.
© 2013 Federal Reserve System. Materials are not to be used without consent. Federal Reserve Financial Services Strategic Direction: Payment.
Exposing the Myths, Exploring the Solutions Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario Privacy & Security: Seeking the.
Initial reflections of the privacy commissioner on Ontario’s draft privacy bill Ann Cavoukian, Ph.D. Information and Privacy Commissioner/Ontario Toronto.
Communication Paper on Smart Regulation COM(2010) 543, 8 October 2010 Presentation by Savia Orphanidou 3 rd November 2010.
Location, Location, Location: The Emerging Crisis in Wireless Data Privacy Ari Schwartz & Alan Davidson Center for Democracy and Technology
Paulo Lopes Counsellor for Information Society and Media European Union Delegation in Brazil The European Union Approach to the Interoperability of e-Government.
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
Higher Education PKI Summit Meeting August 8, 2001 The ABA PAG Rodney J. Petersen, J.D. Director, Policy and Planning Office of Information Technology.
DOCUMENT #:GSC15-PLEN-62 FOR:Presentation SOURCE:ISACC AGENDA ITEM:Opening Plenary (6.14) CONTACT(S):Jim MacFie Cloud Computing Jim MacFie Chairman, ISACC.
1 GSC: Standardization Advancing Global Communications ISACC Opening Plenary Presentation GSC-11 SOURCE:ISACC TITLE:ISACC Opening Plenary Presentation.
Federal Trade Commission U.S. Rules on Privacy and Data Security Organization for International Investment General Counsel Conference October 16, 2009.
Catawba County Board of Commissioners Retreat June 11, 2007 It is a great time to be an innovator 2007 Technology Strategic Plan *
Privacy and Security Solutions For Interoperable Health Information Exchange Presented by Linda Dimitropoulos, PhD RTI International Presented at AHRQ.
The Internet of Things and Consumer Protection
Malcolm Crompton APEC Information Privacy Framework: review, impact, & progress APEC Symposium on Information Privacy Protection in E Government & E Commerce.
Privacy: An International Perspective Marty Abrams August 18, 2008.
Forum on Internet of Things: Empowering the New Urban Agenda Geneva, Switzerland, 19 October 2015 Cooperation and Opportunities for Standards in the New.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
Jacques Bus Head of Unit, DG INFSO-F5 “Security” European Commission FP7 launch in the New Member States Regional on-line conference 22 January 2007 Objective.
IoT Trust Framework leading to self regulation code of conduct and certification models Craig Spiezle Executive Director & President Online.
Fred Carter Senior Policy & Technology Advisor Information and Privacy Commissioner Ontario, Canada MISA Ontario Cloud Computing Transformation Workshop.
Teaching PbD at legal ManaMa students Dr. E. J. Kindt IPEN 2015.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
19-20 October 2010 IT Directors’ Group meeting 1 Item 6 of the agenda ISA programme Pascal JACQUES Unit B2 - Methodology/Research Local Informatics Security.
WATER INTEGRITY GLOBAL OUTLOOK 2016 Clean water needs clean governance.
© ASTM International Sino-U.S. Cooperation and the Internationalization of Standardization: Priorities and Opportunities Washington, D.C.
The Future Digital Identity Landscape in Europe Timothée Mangenot, chairman 14th of December, 2015 ACSIEL partners day.
A policy framework for an open and trusted Internet
Supervision of Insurance Market Conduct in Canada
What Is ISO ISO 27001, titled "Information Security Management - Specification With Guidance for Use", is the replacement for BS It is intended.
92% of the world’s data was created in the past 2 years
LEGAL & ETHICAL ISSUES InsurTech & Health Insurance Providers
Summit 2017 Breakout Group 1: Advanced Research Computing (ARC)
Privacy: A Regulator’s Perspective
Embed Privacy, By Design into IT and Engineering …
Embed Privacy, By Design into IT and Engineering …
Jeremy Grant Coordinator Better Identity Coalition
Presentation transcript:

Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario Ted Rogers School of Information Technology Management Ryerson University February 24, 2011 Will There Be Privacy in the Cloud? … Only if it’s Embedded – by Design: Implications for the Future of Privacy

Presentation Outline 1.We Need to Change the Paradigm 2.The Future of Privacy: My Prediction 3.Privacy by Design: The Gold Standard 4.Web 2.0 : Privacy in the Clouds 6.SmartData 7.Conclusions

Setting the Stage: We Need to Change the Paradigm

If Privacy is to Survive, Things Have to Change

The Future of Privacy Change the Paradigm to Positive-Sum, NOT Zero-Sum

Positive-Sum Model Change the paradigm from zero-sum to a “positive-sum” model: Create a win-win scenario, not an either/or involving unnecessary trade-offs and false dichotomies

The Future of Privacy: My Prediction

“The world has less than a decade to make the protection of personal information and online privacy a priority before the concepts are lost forever … online privacy problems will only worsen if governments don’t take a hard stance.” — Commissioner Cavoukian, Ottawa Citizen, August 18, 2010

Actual Prediction: Only One Decade Remains “Unless we act now, I predict that privacy, as we know it, will be gone – lost, beyond our grasp, by the year 2020.” — Commissioner Cavoukian, International Conference of Data Protection and Privacy Commissioners, Jerusalem, October 28, 2010.

A Decade of Privacy by Design

Privacy by Design: The Trilogy of Applications Information Technology Accountable Business Practices Physical Design & Infrastructure

Privacy by Design: The 7 Foundational Principles 1.Proactive not Reactive: Preventative, not Remedial; 2.Privacy as the Default setting; 3.Privacy Embedded into Design; 4.Full Functionality: Positive-Sum, not Zero-Sum; 5.End-to-End Security: Full Lifecycle Protection; 6.Visibility and Transparency: Keep it Open; 7.Respect for User Privacy: Keep it User- Centric.

Embedding Privacy at the Design Stage: The Obvious Route Cost-effective Proactive User-centric It’s all about control – preserving personal control and freedom of choice over one’s data flows

Why We Need Privacy by Design Most privacy breaches remain undetected – as regulators, we only see the tip of the iceberg The majority of privacy breaches remain unchallenged, unregulated... unknown Regulatory compliance alone, is unsustainable as the sole model for ensuring the future of privacy

Landmark Resolution Passed to Preserve the Future of Privacy By Anna Ohlden – October 29th JERUSALEM, October 29, 2010 – A landmark resolution by Ontario's Information and Privacy Commissioner, Dr. Ann Cavoukian, was approved by international Data Protection and Privacy Commissioners in Jerusalem today at their annual conference. The resolution recognizes Commissioner Cavoukian's concept of Privacy by Design - which ensures that privacy is embedded into new technologies and business practices, right from the outset - as an essential component of fundamental privacy protection. Full Article: Adoption of “Privacy by Design” Resolution

October 29, 2010 – regulators from around the world gathered at the annual assembly of International Data Protection and Privacy Commissioners in Jerusalem, Israel, and unanimously passed a landmark resolution recognizing Privacy by Design as an essential component of fundamental privacy protection: Encourage the adoption of the principles of PbD as part of an organization’s default mode of operation; Invite Data Protection and Privacy Commissioners to promote PbD, foster the incorporation if its 7 Foundational Principles in privacy policy and legislation in their respective jurisdictions, and encourage research into PbD.

Privacy by Design in 2010: Gathering Momentum May – As part of the European Commission’s new European Digital Agenda, Peter Hustinx, the European Data Protection Supervisor, recommended that Privacy by Design be included as a binding principle into data protection legal framework; 19_Trust_Information_Society_EN.pdf October – Regulators from around the world gathered at the annual assembly of International Data Protection and Privacy Commissioners in Jerusalem, Israel, and unanimously passed a landmark Resolution recognizing Privacy by Design as an essential component of fundamental privacy protection; December – The U.S. Federal Trade Commission released a major report on protecting consumer privacy in which it recommended that companies adopt a Privacy by Design approach by building privacy protections into their everyday business practices.

Privacy by Design in 2011 … We’re Just Getting Started January – Washington D.C. think tank, Future of Privacy Forum included Privacy by Design as being “In” – Annual List of Privacy In and Outs – PbD one of the new top positive trends of 2011; January –World-renown cyber-guru, Don Tapscott, wrote an op-ed stating that, “Cavoukian's Privacy by Design playbook explains how to build privacy protections into everyday business practices. Every business needs to design privacy principles and practices into their operations;” medias-unexpected-threat/article / February – Dutch Senate consistently refers to the concept of Privacy by Design while in debate with a panel of experts deliberating on collection, sharing and data protection and privacy; February – Japan’s Ministry of Economy, Trade and Industry translated the Privacy by Design Foundational Principles (on the heels of a Chinese translation), and is now replicating our PbD Ambassador Program in Japan.

Web 2.0: Privacy by Design in the Clouds

From PC to Web 4.0 Radar Networks & Nova Spivack, 2007 –

The 21 st Century Privacy Challenge The Power and Promise of Cloud Computing: Limitless flexibility; Better reliability and security; Enhanced collaboration; Portability; Simpler devices.

Is There a Dark Lining in the Cloud? “Is there a dark lining to the cloud?” “Consumers who store data in the cloud risk losing control over their photos, contacts and s. Data is whirling around the world …” “The EU's data protection rules have stood the test of time, but now they need to be modernized to reflect the new technological landscape.” — Viviane Reding, European Commissioner for Justice, Fundamental Rights and Citizenship Is There a Dark Lining in the Cloud?, Wall Street Journal, January 25, 2011.

Privacy by Design Meets the Cloud There is both the need and opportunity to engineer privacy, security and trust into new emergent Internet and web architectures: Interoperable identity metasystems; Cloud-based services, platforms and infrastructures; The “Internet of Things;” The programmable web, or “WebOS.”

Identity and Privacy Crisis Growing ID requirements pose privacy problems: Fraud and security concerns are inhibiting confidence, trust, and the growth of e-commerce, e-government; Fears of surveillance and excessive collection, use and disclosure of identity information by others are also diminishing confidence and use; Lack of individual user empowerment and control over one’s own personal data is diminishing confidence and use; Function creep, power asymmetries, discrimination, harm. Needed: improved user control, data minimization techniques, architectures of privacy, stronger security, trusted devices and credible assurances.

Cloud Technology Building Blocks Open source and proprietary identity software based on open standards; Federated identity; Multiple and partial identities; Data-centred policies; Audit tools.

Privacy in the Clouds The 21 st Century Privacy Challenge; Creating a User-Centric Identity Management Infrastructure; Using Technology Building Blocks; A Call to Action.

Privacy by Design Meets the Cloud: Current and Future Privacy Challenges Collaborating together to build innovative win-win privacy solutions; The goal is to establish trust in: Data (that travels through the cloud); Personal devices (that interact with cloud-based services); Intelligent software agents; Intermediary service providers.

Privacy by Design Meets the Cloud: Outsourcing Cloud computing services present similar privacy challenges to outsourcing: Where is the personal data? Which jurisdiction and laws apply? Who is accountable for the data and its uses? Is there effective oversight? Some things to consider: Minimize personal data and risks wherever possible; Use technological tools; Exercise due diligence; Create and enforce contractual clauses; Develop a crisis management plan; Ensure transparency, notice, education & awareness.

Privacy by Design Meets the Cloud: Collaboration PbD solutions for the Cloud require a holistic, interdisciplinary, inclusive and systems engineering approach; IPC is playing a role in bringing together key interests and stakeholders in a consensus-building exercise at all stages of the innovation cycle; IPC has been working with: Leading technology developers and technologists; Industry consortia; Research labs and academics across many disciplines; Privacy and public interest advocates; Standards development bodies; Public policymakers and regulators.

IPC Think-Pieces on Various Aspects of Cloud Computing The 7 Privacy-Embedded Laws of Identity (2006); Privacy in the Clouds (2007); F-PIA (2008); Privacy and Government 2.0 (2009); Secure your Gmail! (2009); Modeling the Cloud (joint paper with NEC) (2010).

Federated Privacy Impact Assessment (F-PIA) Goals of an F-PIA: Provide an opportunity for members to develop and codify a Federation’s privacy policies; Demonstrate that privacy policies, as defined by members of the Federation, will be met; Demonstrate that an appropriate technological architecture is in place to prevent, to the extent possible, accidental or malicious violations of privacy policies.

A Call to Action Corporate and individual users can explore evolving identity systems and insist that privacy be built in; Seek to implement open standards so that different systems will become truly interoperable; Standards bodies can continue to develop the fundamental standards needed for identity systems, data-centered policies, and privacy-enhancing technologies; Software vendors and website developers can embrace privacy-enhancing technologies, open standards, open identity management systems, and true interoperability.

SmartData

Identity, Privacy and Security Institute University of Toronto IPSI is dedicated to developing new approaches to security that maintain the privacy, freedom and safety of the individual and the broader community Engineering – Mathematics – Computer Sciences – Information Studies

The Next Evolution in Data Protection: “SmartData” Developed at IPSI, SmartData represents the future of privacy and greater control of personal information online Intelligent “smart agents” introduced into IT systems virtually – thereby creating “SmartData,” – a new approach to Artificial Intelligence that will revolutionize the field.

Intelligent Agents Intelligent agents will be evolved to: Protect and secure your personal information; Disclose your information only when your personal criteria have been met.

Methods of Creating Agents Top-down, rule-based design; Bottom-up “evolutionary design;” The combination of top-down and bottom-up will yield the most dynamic results.

Top-Down Design We presently possess insufficient knowledge; In principle, sufficient knowledge may not be possible; Traditional artificial Intelligence (AI) is rule-based – dependent on the intelligence of the programmer; Difficult to program “meaning” into a system; It is unlikely that narrow AI will scale up to AGI – combinatorial explosion.

Bottom-up Evolution: The Upside Artificial evolutionary algorithms well established; Uncanny knack of producing powerful solutions to adaptive problems; Solutions may not be understood by humans, nor need to be understood; Evolutionary function akin to the abilities of a “blind watchmaker.”

Conclusions Lead with Privacy by Design; Change the paradigm from the dated “zero-sum” to the doubly-enabling “positive-sum;” Deliver both privacy AND security or any other functionality, in an empowering “win-win” paradigm; Build PbD into the Cloud infrastructure; Embed privacy as a core functionality: the future of privacy may depend on it.

How to Contact Us Ann Cavoukian, Ph.D. Information & Privacy Commissioner of Ontario 2 Bloor Street East, Suite 1400 Toronto, Ontario, Canada M4W 1A8 Phone: (416) / Web: For more information on Privacy by Design, please visit: