260 likes | 424 Views
Privacy Impact Assessments PHIPA Summit 2005. Peter Hope-Tindall Chief Privacy Architect dataPrivacy Partners Ltd. pht@dataprivacy.com. November 3, 2005. My view of Privacy PIAs What? Why? How?. Security and Privacy – a technical view. data protection - FIPs (not FIPS).
E N D
Privacy Impact AssessmentsPHIPA Summit 2005 Peter Hope-Tindall Chief Privacy Architect dataPrivacy Partners Ltd. pht@dataprivacy.com November 3, 2005
My view of Privacy • PIAs • What? • Why? • How? PIA - PHIPA Summit 2005
Security and Privacy – a technical view • data protection - FIPs (not FIPS) • authentication • data-integrity • confidentiality • access controls • non-repudiation Privacy Security n.b. FIPs: Fair Information Practices FIPS: Federal Information Processing Standards PIA - PHIPA Summit 2005
Present day Problems • Traditional IT dogma and practices have encouraged the collection of information. • Opportunistic database design • Driven by hardware/software limitations of the past • Creates Other Problems (If you collect it; you need to protect it!) • Privacy Aware IT and records management will discourage the collection of information. • Minimalist database and system design • Justification PIA - PHIPA Summit 2005
Security vs. Privacy • Accountable to President/CEO Board of Directors. • Risk based assessment. (how likely is it?) • Access and use controls defined by the system owner. • Has been focused on protecting against outsiders. • Accountable to the data subject/customer/patient. • Capabilities based assessment.(is it possible?) • Access and use controls defined by use limitation and consent of data subject and legislation. • Protecting against outsiders, insiders and system owner. PIA - PHIPA Summit 2005
The Complex nature of Privacy • Identity • Measures the degree to which information is personally identifiable. • Linkability • Measures the degree to which data tuples or transactions are linked to each other. • Observability • Measures the degree to which identity or linkability may be impacted from the use of a system. Which other data elements are visible; implicitly or explicitly. With thanks and apologies to the Common Criteria PIA - PHIPA Summit 2005
Identity (nymity) Measures the degree to which information is personally identifiable. Anonymity Non-ReversiblePseudonymity ReversiblePseudonymity Verinymity The quality or state of being unknown. without name from Greek pseudonumon, neuter of pseudonumos, falsely named from Latin verus, true, truly named PIA - PHIPA Summit 2005
Linkability This metric requires n data elements. Where n > 1. Measures the degree to which data elements are linked to each other. (Identity measurement can be thought of as the degree to which data elements are linkable to the verinym or true name of the data subject). Unlinkability Full Linkability It cannot be determined which set of transactions belong which each other. It may be fully determined which set of transactions belong with each other. Example: Transactions belonging to the same individual. PIA - PHIPA Summit 2005
Observability Measures the degree to which identity or linkability may be impacted from the use of a system. Non Observability Full Observability Nothing can be inferred from the record of the use of a system. No record is made of the use of resources, location or transactions. Identity or Linkability can be inferred from the record of the use of a system. Full audit record is made of the use of resources, location or transactions. PIA - PHIPA Summit 2005
Identity Observability Linkability PIA - PHIPA Summit 2005
Example: Public Spaces • Most commentators would suggest we have “No reasonable expectation of Privacy” • Justification for CCTV or other tracking. Not that simple: • In a public place, • Observable – Expectation that I will be observed • Anonymous/Pseudonymous - Expectation • May/may not be Linkable PIA - PHIPA Summit 2005
Privacy: Why do we even bother? • It’s the law • It’s good government/business • It’s good informational stewardship • It’s the professional thing to do PIA - PHIPA Summit 2005
Approaches to Privacy: Implementation Modalities to Protect Privacy • Statutory • Policy • Privacy Impact Assessment • Threat Risk Assessment • Common Criteria Scheme • Standards • Technology • STEPs • Privacy Architecture PIA - PHIPA Summit 2005
Different Approaches to PrivacyBuild in elements of personal Consent and Control • Central Repository/Decision Model – a rule based or heuristic Privacy Model; EPM • Divide and Conquer – strategic pseudonymisation/anonymisation (SIGINT) • Smart Hardware • Privacy Rules Embedded in Hardware • Smart Data • Encapsulate Methods inside the data PIA - PHIPA Summit 2005
PIA: What? • Diagnostic Tool • Identifies Risks & Issues • Can help to measure statutory compliance • May address issues with non-technical solutions • May address Issues with technical solutions (Section 12(1), 13(1) “reasonable steps to ensure … protected” • Active and Passive: Introduce elements of individual consent and control PIA - PHIPA Summit 2005
PIA: Why? • Limit risk • Save money • Internal Communications Tool • IT • Bridge the Legal-Policy Divide • External Communications Tool • Set expectations with partners • Communicate with the IPC • Communicate with the Public • RFP: Privacy Chapter • Demonstrate Good Faith PIA - PHIPA Summit 2005
PIA: How? • Synthesize Framework • Iterate • Collect Information • Perform Analysis • Identify Risks • Mitigate Risks PIA - PHIPA Summit 2005
Privacy Framework • Summary of Legislation, Practices, Directives, Policies, High Level Overview of Proposed System. • Customized to specific project • Best Practices • Document can be used as an early demonstration of good faith and approach PIA - PHIPA Summit 2005
Problems with the Traditional PIA • Often encourages ‘compliance mentality’ • Point of pain may become point of no solution • Risk that issues may be reported and forgotten • Emphasizes Policy and Legislative solutions not technical solutions • Integration with IT Architecture group problems PIA - PHIPA Summit 2005
PIA Output Examples • Date tracking (adding fields to records) • Encryption • Report labeling and classification • Education • Confidentiality Agreements • Nothing we can do: Accept more risk. PIA - PHIPA Summit 2005
Other Thoughts: Hard Copy Reports • Another type of output interface! • Need a list of all reports • Extend accountability with the use of contractual protection • Ensure appropriate distribution and storage protocol PIA - PHIPA Summit 2005
Other Thoughts: Data Records • Bind Consent into the data • Create ‘date of death’ at time of birth • Record the policies • Purging • Timestamp PIA - PHIPA Summit 2005
Epilogue • Objectivity of privacy • Question the appropriateness of ‘Public Acceptance’ as a measurement of anything. • Useful at telling us what is wrong. • Not so useful at telling us what is right. • How about we RAISE the expectations? PIA - PHIPA Summit 2005
Resources • Roger Clarke • http://www.anu.edu.au/people/Roger.Clarke/ • PIA Paper • Contact me at: pht@dataprivacy.com • Privacy Architecture Paper (The PIA and your IT Department) • Contact me at: pht@dataprivacy.com PIA - PHIPA Summit 2005
Contact Information Peter Hope-Tindall dataPrivacy Partners Ltd. 6505 Mississauga Road Unit ‘D’ Mississauga, ON L5N 1A6 +1 (416) 410-0240 pht@dataprivacy.com PIA - PHIPA Summit 2005
pht@dataprivacy.com http://www.dataprivacy.com PIA - PHIPA Summit 2005