Introduction to Privacy and Privacy Engineering

55
Introduction to Privacy and Privacy Engineering Dr. Ian Oliver EIT Summer School, August 2014, Finland

Transcript of Introduction to Privacy and Privacy Engineering

Page 1: Introduction to Privacy and Privacy Engineering

Introduction  to  Privacy    and  Privacy  Engineering    Dr.  Ian  Oliver  EIT  Summer  School,  August  2014,  Finland  

Page 2: Introduction to Privacy and Privacy Engineering

Contents  

� WHY  learn  about  privacy?  

�  PHILOSOPHY  of  privacy  

�  LEGAL  aspects  of  privacy  �  ENGINEERING  aspects  of  privacy  

�  FOUNDATIONAL  aspects  of  privacy  

�  Supporting  Material  

Page 3: Introduction to Privacy and Privacy Engineering

WHY  learn  about  privacy  

�  The  dominating  issue  regarding  information  systems  at  the  moment  

�  Increased  public  awareness  of  surveillance  

�  Business  and  economic  reasons  

�  Trust  

Page 4: Introduction to Privacy and Privacy Engineering

WHY  learn  about  privacy  

�  The  dominating  issue  regarding  information  systems  at  the  moment  

�  Increased  public  awareness  of  surveillance  

�  Business  and  economic  reasons  

�  Trust  

Page 5: Introduction to Privacy and Privacy Engineering

WHY  learn  about  privacy  

�  The  dominating  issue  regarding  information  systems  at  the  moment  

�  Increased  public  awareness  of  surveillance  

�  Business  and  economic  reasons  

�  Trust  

Page 6: Introduction to Privacy and Privacy Engineering

WHY  learn  about  privacy  

�  The  dominating  issue  regarding  information  systems  at  the  moment  

�  Increased  public  awareness  of  surveillance  

�  Business  and  economic  reasons  

�  Trust  

Page 7: Introduction to Privacy and Privacy Engineering

PHILOSOPHY  

Page 8: Introduction to Privacy and Privacy Engineering

PHILOSOPHY  �  The  Right  To  Be  Let  Alone  �  “The  Right  to  Privacy”  (Warren  and  Brandeis,  1890)  

Page 9: Introduction to Privacy and Privacy Engineering

PHILOSOPHY    

�  From  where  comes  privacy?  

Page 10: Introduction to Privacy and Privacy Engineering

PHILOSOPHY  

�  "a  person  may  be  identified  directly  by  name  or  indirectly  by  a  telephone  number,  a  car  registration  number,  a  social  security  number,  a  passport  number  or  by  a  combination  of  significant  criteria  which  allows  him  to  be  recognized  by  narrowing  down  the  group  to  which  he  belongs  (age,  occupation,  place  of  residence,  etc.)”  

� WP29:  Opinion  4/2007  on  the  concept  of  personal  data  

Page 11: Introduction to Privacy and Privacy Engineering

PHILOSOPHY    

�  Does  ”privacy”  exist?  

�  If  so,  what  does  it  mean?  

�  If  not,  what  does  that  mean?  

Page 12: Introduction to Privacy and Privacy Engineering

PHILOSOPHY    

�  Does  ”privacy”  exist?  

�  If  so,  what  does  it  mean?  

�  If  not,  what  does  that  mean?  

Page 13: Introduction to Privacy and Privacy Engineering

PHILOSOPHY    

�  Does  ”privacy”  exist?  

�  If  so,  what  does  it  mean?  

�  If  not,  what  does  that  mean?  

Page 14: Introduction to Privacy and Privacy Engineering

PHILOSOPHY    

Wisdom  

Knowledge  

Information  

Data  

Noise  

Page 15: Introduction to Privacy and Privacy Engineering

PHILOSOPHY    

�  Discuss:  �  Personal  privacy  �  Information  privacy  �  Expectation  of  privacy  within  technology  �  Social  media,  sharing,  surveillance  �  ”Nothing  to  Fear,  Nothing  to  Hide”  �  Limits  of  privacy  and  the  acceptable  loss  of  privacy  �  Privacy  as  an  innovator  

Page 16: Introduction to Privacy and Privacy Engineering

PHILOSOPHY    

�  Privacy  as:  

�  A  Principle  �  A  Legal  Discipline  �  An  Engineering  Discpline  �  An  Economic  Aspect  

Page 17: Introduction to Privacy and Privacy Engineering

PHILOSOPHY    

�  Privacy  by  Design  (PbD)  Principles  1.  Proactive  not  Reactive;  Preventative  not  Remedial  2.  Privacy  as  the  Default  Setting  3.  Privacy  Embedded  into  Design  4.  Full  Functionality  —  Positive-­‐Sum,  not  Zero-­‐Sum  5.  End-­‐to-­‐End  Security  —  Full  Lifecycle  Protection  6.  Visibility  and  Transparency  —  Keep  it  Open  7.  Respect  for  User  Privacy  —  Keep  it  User-­‐Centric  

�  Semantic  Gap  Between  PbD  and  Engineering  

We  concentrate  here  

Page 18: Introduction to Privacy and Privacy Engineering

LEGAL  

Page 19: Introduction to Privacy and Privacy Engineering

LEGAL    

 

�  Terminology  

�  Personal  Data  /  Personally  Identifiable  Data  (PII)  �  Sensitive  Data  �  Traffic  Data  

Page 20: Introduction to Privacy and Privacy Engineering

LEGAL    

 

�  Compliance  and  Laws  

�  EU  Data  Protection  /  WP29  �  US  Data  Protection  

�  COPPA,  HIPPA,  SOX,  Safe  Harbor  

�  Usage  and  Purpose  versus  Collection    

Page 21: Introduction to Privacy and Privacy Engineering

LEGAL    

 

�  Specific  Examples  

�  Privacy  Policies  �  Secondary  Data  Collection  

�  Opt-­‐in  &  Opt-­‐out  �  Defaults  �  Necessity  

�  Tracking  �  Browser  Cookies  �  Data  Transfers  �  Data  Retention  

�  Conflicts  �  EU-­‐US  Data  Transfers  �  Encryption  or  not?  �  Trade  Compliance  �  Business  need  versus  Personal  need  �  Information  Assymetry    

Page 22: Introduction to Privacy and Privacy Engineering

ENGINEERING    

 

�  Case  Study  �  Data  Flow  Modelling  

� Ontologies  and  Defintions  

�  Requirements  

�  Notice  and  Consent  

�  Risk  �  PETS  � Maxims  

Page 23: Introduction to Privacy and Privacy Engineering

ENGINEERING  case  study    

Motivating  Example  High-­‐Level  View  Detailed  View  

Page 24: Introduction to Privacy and Privacy Engineering

Motivating  Example  High-­‐Level  View  Detailed  View  

ENGINEERING  case  study    

Page 25: Introduction to Privacy and Privacy Engineering

Information  systems  

…for  some  definition  of  information  

ENGINEERING  an  analogy    

Information  is  a  material  

Page 26: Introduction to Privacy and Privacy Engineering

ENGINEERING  data  flow    

Data  Flow  Modelling  Basic  Syntax  Annotations:  protocols,  content  

Page 27: Introduction to Privacy and Privacy Engineering

ENGINEERING  data  flow    

Data  Flow  Modelling  Basic  Syntax  Annotations:  protocols,  content  

Page 28: Introduction to Privacy and Privacy Engineering

 ENGINEERING  data  flow  example    

Page 29: Introduction to Privacy and Privacy Engineering

ENGINEERING  data  flow  example  

Page 30: Introduction to Privacy and Privacy Engineering

ENGINEERING  data  flow  example  

Page 31: Introduction to Privacy and Privacy Engineering

ENGINEERING  data  flow  example  

Page 32: Introduction to Privacy and Privacy Engineering

ENGINEERING  ontologies    

Ontology  and  Terminology  

 The  mechanisms  by  which  languages  are  agreed  upon    Lawyer  –  Engineer  communication    Terminological  Defintions  

Page 33: Introduction to Privacy and Privacy Engineering

ENGINEERING  ontologies    

What  do  the  following  statements  actually  mean?  

 Personal  Data    Personally  Identifiable  Data    Location  Data    Field    Data  set  

Page 34: Introduction to Privacy and Privacy Engineering

ENGINEERING  ontologies    

Semantics  

Page 35: Introduction to Privacy and Privacy Engineering

ENGINEERING  ontologies  -­‐  modelling  

Page 36: Introduction to Privacy and Privacy Engineering

ENGINEERING  ontologies  -­‐  security  

(  Unclassified  )   Secret   Confidential   Internal   Public  

Page 37: Introduction to Privacy and Privacy Engineering

ENGINEERING  ontologies  -­‐  information  

�  Type  Theory  

�  Information  type  vs  Machine  type/Programming  language  type  

�  Structures  

�  Example,  is  {  lat:float,  long:float  }  a  �  Location  �  A  struct  of  two  reals?  �  Neither  

�  Context  

Page 38: Introduction to Privacy and Privacy Engineering

ENGINEERING  ontologies  -­‐  identifiers  

Page 39: Introduction to Privacy and Privacy Engineering

ENGINEERING  ontologies  -­‐  further…  

Page 40: Introduction to Privacy and Privacy Engineering

ENGINEERING  ontologies  -­‐  identification  

Unauthenticated  

Observed  

Authenticated  (*)  

Proven  

Page 41: Introduction to Privacy and Privacy Engineering

ENGINEERING  identifiability  

Page 42: Introduction to Privacy and Privacy Engineering

ENGINEERING  requirements  

Page 43: Introduction to Privacy and Privacy Engineering

ENGINEERING  notice  &  consent  

Page 44: Introduction to Privacy and Privacy Engineering

ENGINEERING  notice  &  consent  

Page 45: Introduction to Privacy and Privacy Engineering

ENGINEERING  notice  &  consent  

Page 46: Introduction to Privacy and Privacy Engineering

ENGINEERING  notice  &  consent  

�  Calculation  of  the  Agreement  from  the  DFD  

Page 47: Introduction to Privacy and Privacy Engineering

ENGINEERING  -­‐  risk  

Page 48: Introduction to Privacy and Privacy Engineering

ENGINEERING  -­‐  evaluating  risk  

�  Failure  Mode  and  Effect  Analysis  

�  Root  Cause  Analysis  �  STRIDE:  Threat  Assessment  

Page 49: Introduction to Privacy and Privacy Engineering

ENGINEERING  -­‐  PETS  

�  Hashing  �  Encryption  �  Dataset  Partitioing  �  Tokenisation  �  k-­‐anonymity  

�  l-­‐diversity,  t-­‐closeness,  differential  privacy  

�  BASIC  GOOD  OLD  FASHIONED  SECURITY  

Page 50: Introduction to Privacy and Privacy Engineering

ENGINEERING  maxims    

�  Don't  collect  what  you  don't  use  

�  If  it  looks  like  PII,  it  probably  is  PII,  so  treat  it  as  PII  �  Don't  shock  the  user  �  Location  data  isn't  just  GPS  co-­‐ordinates  �  Good  security  does  not  mean  good  privacy,  but  good  privacy  doesn't  come  without  good  security  

�  All  information  can  be  transformed  and  cross-­‐referenced  into  whatever  you  need  

�  Security  through  Obscurity,  Privacy  through  PowerPoint  and  Policies...        

Page 51: Introduction to Privacy and Privacy Engineering

FOUNDATIONAL    

 

�  Information  Theory  

�  Syntax,  Semantics  

�  Entopy  

Page 52: Introduction to Privacy and Privacy Engineering

PROJECT  EVALUATION  

 

Demonstrate:  

 �  Understanding  of  who  the  data  subject  is  �  Where  the  data  is  flowing  for  various  use  cases  through  data  flow  modelling  �  What:  

�  is  the  level  of  identification  of  the  data  subject  �  are  the  usages  and  purposes  of  �  are  the  information  types  being  carried  �  is  the  logical  architecture  or  structure  of  the  system  

�  A  risk  analysis  based  on  the  given  taxonomy  of  risks  

Page 53: Introduction to Privacy and Privacy Engineering

SUPPORTING  MATERIAL    

�  The  Privacy  Engineer's  Manifesto,  Dennedy,  Fox  &  Finneran    

�  Understanding  Privacy,  Solove    

�  Privacy  in  Context,  Nissenbaum    

�  Applied  Cryptograpy,  Schneier  

Page 54: Introduction to Privacy and Privacy Engineering

SUPPORTING  MATERIAL    

Ian  Oliver  (2014)    

Privacy  Engineering:  A  Dataflow  and  Ontological  Approach    

ISBN:9781497569713  

Twitter:  @i_j_oliver  

Blog:  http://ijosblog.blogspot.fi  

Page 55: Introduction to Privacy and Privacy Engineering

DISCUSSION    

<<crossreferencing>>Thinking

Local Knowledge

References

Lecturer<<data subject>>Audience

<<speech, email, etc>>

<<weird brain processes>>

<<reading, listening>>

<<neurons>> <<neurons>>

<<speech, email, etc>>

security class: Publicinformation type:Content, Identity, Location, TemporalIdentity: authenticated (1)Provenance: UserPurpose: PrimaryUsage: Product Improvement, Future Human Lecturer

YOU  

ME