55
Introduction to Privacy and Privacy Engineering Dr. Ian Oliver EIT Summer School, August 2014, Finland

Introduction to Privacy and Privacy Engineering

Embed Size (px)

Citation preview

Page 1: Introduction to Privacy and Privacy Engineering

Introduction  to  Privacy    and  Privacy  Engineering    Dr.  Ian  Oliver  EIT  Summer  School,  August  2014,  Finland  

Page 2: Introduction to Privacy and Privacy Engineering

Contents  

� WHY  learn  about  privacy?  

�  PHILOSOPHY  of  privacy  

�  LEGAL  aspects  of  privacy  �  ENGINEERING  aspects  of  privacy  

�  FOUNDATIONAL  aspects  of  privacy  

�  Supporting  Material  

Page 3: Introduction to Privacy and Privacy Engineering

WHY  learn  about  privacy  

�  The  dominating  issue  regarding  information  systems  at  the  moment  

�  Increased  public  awareness  of  surveillance  

�  Business  and  economic  reasons  

�  Trust  

Page 4: Introduction to Privacy and Privacy Engineering

WHY  learn  about  privacy  

�  The  dominating  issue  regarding  information  systems  at  the  moment  

�  Increased  public  awareness  of  surveillance  

�  Business  and  economic  reasons  

�  Trust  

Page 5: Introduction to Privacy and Privacy Engineering

WHY  learn  about  privacy  

�  The  dominating  issue  regarding  information  systems  at  the  moment  

�  Increased  public  awareness  of  surveillance  

�  Business  and  economic  reasons  

�  Trust  

Page 6: Introduction to Privacy and Privacy Engineering

WHY  learn  about  privacy  

�  The  dominating  issue  regarding  information  systems  at  the  moment  

�  Increased  public  awareness  of  surveillance  

�  Business  and  economic  reasons  

�  Trust  

Page 7: Introduction to Privacy and Privacy Engineering

PHILOSOPHY  

Page 8: Introduction to Privacy and Privacy Engineering

PHILOSOPHY  �  The  Right  To  Be  Let  Alone  �  “The  Right  to  Privacy”  (Warren  and  Brandeis,  1890)  

Page 9: Introduction to Privacy and Privacy Engineering

PHILOSOPHY    

�  From  where  comes  privacy?  

Page 10: Introduction to Privacy and Privacy Engineering

PHILOSOPHY  

�  "a  person  may  be  identified  directly  by  name  or  indirectly  by  a  telephone  number,  a  car  registration  number,  a  social  security  number,  a  passport  number  or  by  a  combination  of  significant  criteria  which  allows  him  to  be  recognized  by  narrowing  down  the  group  to  which  he  belongs  (age,  occupation,  place  of  residence,  etc.)”  

� WP29:  Opinion  4/2007  on  the  concept  of  personal  data  

Page 11: Introduction to Privacy and Privacy Engineering

PHILOSOPHY    

�  Does  ”privacy”  exist?  

�  If  so,  what  does  it  mean?  

�  If  not,  what  does  that  mean?  

Page 12: Introduction to Privacy and Privacy Engineering

PHILOSOPHY    

�  Does  ”privacy”  exist?  

�  If  so,  what  does  it  mean?  

�  If  not,  what  does  that  mean?  

Page 13: Introduction to Privacy and Privacy Engineering

PHILOSOPHY    

�  Does  ”privacy”  exist?  

�  If  so,  what  does  it  mean?  

�  If  not,  what  does  that  mean?  

Page 14: Introduction to Privacy and Privacy Engineering

PHILOSOPHY    

Wisdom  

Knowledge  

Information  

Data  

Noise  

Page 15: Introduction to Privacy and Privacy Engineering

PHILOSOPHY    

�  Discuss:  �  Personal  privacy  �  Information  privacy  �  Expectation  of  privacy  within  technology  �  Social  media,  sharing,  surveillance  �  ”Nothing  to  Fear,  Nothing  to  Hide”  �  Limits  of  privacy  and  the  acceptable  loss  of  privacy  �  Privacy  as  an  innovator  

Page 16: Introduction to Privacy and Privacy Engineering

PHILOSOPHY    

�  Privacy  as:  

�  A  Principle  �  A  Legal  Discipline  �  An  Engineering  Discpline  �  An  Economic  Aspect  

Page 17: Introduction to Privacy and Privacy Engineering

PHILOSOPHY    

�  Privacy  by  Design  (PbD)  Principles  1.  Proactive  not  Reactive;  Preventative  not  Remedial  2.  Privacy  as  the  Default  Setting  3.  Privacy  Embedded  into  Design  4.  Full  Functionality  —  Positive-­‐Sum,  not  Zero-­‐Sum  5.  End-­‐to-­‐End  Security  —  Full  Lifecycle  Protection  6.  Visibility  and  Transparency  —  Keep  it  Open  7.  Respect  for  User  Privacy  —  Keep  it  User-­‐Centric  

�  Semantic  Gap  Between  PbD  and  Engineering  

We  concentrate  here  

Page 18: Introduction to Privacy and Privacy Engineering

LEGAL  

Page 19: Introduction to Privacy and Privacy Engineering

LEGAL    

 

�  Terminology  

�  Personal  Data  /  Personally  Identifiable  Data  (PII)  �  Sensitive  Data  �  Traffic  Data  

Page 20: Introduction to Privacy and Privacy Engineering

LEGAL    

 

�  Compliance  and  Laws  

�  EU  Data  Protection  /  WP29  �  US  Data  Protection  

�  COPPA,  HIPPA,  SOX,  Safe  Harbor  

�  Usage  and  Purpose  versus  Collection    

Page 21: Introduction to Privacy and Privacy Engineering

LEGAL    

 

�  Specific  Examples  

�  Privacy  Policies  �  Secondary  Data  Collection  

�  Opt-­‐in  &  Opt-­‐out  �  Defaults  �  Necessity  

�  Tracking  �  Browser  Cookies  �  Data  Transfers  �  Data  Retention  

�  Conflicts  �  EU-­‐US  Data  Transfers  �  Encryption  or  not?  �  Trade  Compliance  �  Business  need  versus  Personal  need  �  Information  Assymetry    

Page 22: Introduction to Privacy and Privacy Engineering

ENGINEERING    

 

�  Case  Study  �  Data  Flow  Modelling  

� Ontologies  and  Defintions  

�  Requirements  

�  Notice  and  Consent  

�  Risk  �  PETS  � Maxims  

Page 23: Introduction to Privacy and Privacy Engineering

ENGINEERING  case  study    

Motivating  Example  High-­‐Level  View  Detailed  View  

Page 24: Introduction to Privacy and Privacy Engineering

Motivating  Example  High-­‐Level  View  Detailed  View  

ENGINEERING  case  study    

Page 25: Introduction to Privacy and Privacy Engineering

Information  systems  

…for  some  definition  of  information  

ENGINEERING  an  analogy    

Information  is  a  material  

Page 26: Introduction to Privacy and Privacy Engineering

ENGINEERING  data  flow    

Data  Flow  Modelling  Basic  Syntax  Annotations:  protocols,  content  

Page 27: Introduction to Privacy and Privacy Engineering

ENGINEERING  data  flow    

Data  Flow  Modelling  Basic  Syntax  Annotations:  protocols,  content  

Page 28: Introduction to Privacy and Privacy Engineering

 ENGINEERING  data  flow  example    

Page 29: Introduction to Privacy and Privacy Engineering

ENGINEERING  data  flow  example  

Page 30: Introduction to Privacy and Privacy Engineering

ENGINEERING  data  flow  example  

Page 31: Introduction to Privacy and Privacy Engineering

ENGINEERING  data  flow  example  

Page 32: Introduction to Privacy and Privacy Engineering

ENGINEERING  ontologies    

Ontology  and  Terminology  

 The  mechanisms  by  which  languages  are  agreed  upon    Lawyer  –  Engineer  communication    Terminological  Defintions  

Page 33: Introduction to Privacy and Privacy Engineering

ENGINEERING  ontologies    

What  do  the  following  statements  actually  mean?  

 Personal  Data    Personally  Identifiable  Data    Location  Data    Field    Data  set  

Page 34: Introduction to Privacy and Privacy Engineering

ENGINEERING  ontologies    

Semantics  

Page 35: Introduction to Privacy and Privacy Engineering

ENGINEERING  ontologies  -­‐  modelling  

Page 36: Introduction to Privacy and Privacy Engineering

ENGINEERING  ontologies  -­‐  security  

(  Unclassified  )   Secret   Confidential   Internal   Public  

Page 37: Introduction to Privacy and Privacy Engineering

ENGINEERING  ontologies  -­‐  information  

�  Type  Theory  

�  Information  type  vs  Machine  type/Programming  language  type  

�  Structures  

�  Example,  is  {  lat:float,  long:float  }  a  �  Location  �  A  struct  of  two  reals?  �  Neither  

�  Context  

Page 38: Introduction to Privacy and Privacy Engineering

ENGINEERING  ontologies  -­‐  identifiers  

Page 39: Introduction to Privacy and Privacy Engineering

ENGINEERING  ontologies  -­‐  further…  

Page 40: Introduction to Privacy and Privacy Engineering

ENGINEERING  ontologies  -­‐  identification  

Unauthenticated  

Observed  

Authenticated  (*)  

Proven  

Page 41: Introduction to Privacy and Privacy Engineering

ENGINEERING  identifiability  

Page 42: Introduction to Privacy and Privacy Engineering

ENGINEERING  requirements  

Page 43: Introduction to Privacy and Privacy Engineering

ENGINEERING  notice  &  consent  

Page 44: Introduction to Privacy and Privacy Engineering

ENGINEERING  notice  &  consent  

Page 45: Introduction to Privacy and Privacy Engineering

ENGINEERING  notice  &  consent  

Page 46: Introduction to Privacy and Privacy Engineering

ENGINEERING  notice  &  consent  

�  Calculation  of  the  Agreement  from  the  DFD  

Page 47: Introduction to Privacy and Privacy Engineering

ENGINEERING  -­‐  risk  

Page 48: Introduction to Privacy and Privacy Engineering

ENGINEERING  -­‐  evaluating  risk  

�  Failure  Mode  and  Effect  Analysis  

�  Root  Cause  Analysis  �  STRIDE:  Threat  Assessment  

Page 49: Introduction to Privacy and Privacy Engineering

ENGINEERING  -­‐  PETS  

�  Hashing  �  Encryption  �  Dataset  Partitioing  �  Tokenisation  �  k-­‐anonymity  

�  l-­‐diversity,  t-­‐closeness,  differential  privacy  

�  BASIC  GOOD  OLD  FASHIONED  SECURITY  

Page 50: Introduction to Privacy and Privacy Engineering

ENGINEERING  maxims    

�  Don't  collect  what  you  don't  use  

�  If  it  looks  like  PII,  it  probably  is  PII,  so  treat  it  as  PII  �  Don't  shock  the  user  �  Location  data  isn't  just  GPS  co-­‐ordinates  �  Good  security  does  not  mean  good  privacy,  but  good  privacy  doesn't  come  without  good  security  

�  All  information  can  be  transformed  and  cross-­‐referenced  into  whatever  you  need  

�  Security  through  Obscurity,  Privacy  through  PowerPoint  and  Policies...        

Page 51: Introduction to Privacy and Privacy Engineering

FOUNDATIONAL    

 

�  Information  Theory  

�  Syntax,  Semantics  

�  Entopy  

Page 52: Introduction to Privacy and Privacy Engineering

PROJECT  EVALUATION  

 

Demonstrate:  

 �  Understanding  of  who  the  data  subject  is  �  Where  the  data  is  flowing  for  various  use  cases  through  data  flow  modelling  �  What:  

�  is  the  level  of  identification  of  the  data  subject  �  are  the  usages  and  purposes  of  �  are  the  information  types  being  carried  �  is  the  logical  architecture  or  structure  of  the  system  

�  A  risk  analysis  based  on  the  given  taxonomy  of  risks  

Page 53: Introduction to Privacy and Privacy Engineering

SUPPORTING  MATERIAL    

�  The  Privacy  Engineer's  Manifesto,  Dennedy,  Fox  &  Finneran    

�  Understanding  Privacy,  Solove    

�  Privacy  in  Context,  Nissenbaum    

�  Applied  Cryptograpy,  Schneier  

Page 54: Introduction to Privacy and Privacy Engineering

SUPPORTING  MATERIAL    

Ian  Oliver  (2014)    

Privacy  Engineering:  A  Dataflow  and  Ontological  Approach    

ISBN:9781497569713  

Twitter:  @i_j_oliver  

Blog:  http://ijosblog.blogspot.fi  

Page 55: Introduction to Privacy and Privacy Engineering

DISCUSSION    

<<crossreferencing>>Thinking

Local Knowledge

References

Lecturer<<data subject>>Audience

<<speech, email, etc>>

<<weird brain processes>>

<<reading, listening>>

<<neurons>> <<neurons>>

<<speech, email, etc>>

security class: Publicinformation type:Content, Identity, Location, TemporalIdentity: authenticated (1)Provenance: UserPurpose: PrimaryUsage: Product Improvement, Future Human Lecturer

YOU  

ME