890 likes | 1.33k Views
Privacy in Software Development. Secure software made easier . Agenda. Privacy Basics Privacy Guidelines for Developing Software and Services Section I: Definitions and Concepts Section II: Development Scenarios and Guidelines Driving Privacy Compliance Additional Resources.
E N D
Privacy in Software Development Secure software made easier
Agenda • Privacy Basics • Privacy Guidelines for Developing Software and Services • Section I: Definitions and Concepts • Section II: Development Scenarios and Guidelines • Driving Privacy Compliance • Additional Resources
Purpose & Scope Purpose: • Provide an introduction to privacy guidelines for developing software and services. Scope: • Product • Services • Website privacy guidelines
Learning Objectives Upon completion of this course, you should be able to: • Describe principles and impacts of privacy compliance. • Define best practices for collecting, storing and using personal data.
Privacy and Security • Privacy: Empowering users to control collection, use, and distribution of their personal information. • Security: Establishing protective measures that defend against hostile acts or influences and provides assurance of defense. • Privacy AND Security are key factors for trust.
Data Types • Anonymous Data Pseudonymous Data Personally Identifiable Information (PII) Sensitive PII
Note: Information associated with PII must be treated as PII Data Types: Anonymous • Anonymous Data • Is not unique or tied to a specific person. • Includes: Hair color, system configuration, method of purchase, statistics distilled from many users. Pseudonymous Data Personally Identifiable Information (PII) Sensitive PII
Data Types: Pseudonymous • Unique identifier does not identify a specific person, but could be associated with an individual. • Includes: Unique identifiers, biometric information, usage profiles not tied to a known individual. • Until associated with an individual, data can be treated as anonymous. • Anonymous Data Pseudonymous Data Personally Identifiable Information (PII) Sensitive PII
Data Types: PII • Anonymous Data • Data that identifies (or can be used to contact or locate) a specific individual. • Includes: Name, address, phone number, fax number, email address, or any information associated with PII. Pseudonymous Data Personally Identifiable Information (PII) Sensitive PII
Data Types: Sensitive PII • Anonymous Data • A subset of PII that has special requirements due to higher risk associated with the data. • Includes: Medical and/or financial data, national ID numbers (e.g., SSN), and credit card information. • Also includes data that could be used to discriminate (i.e. race/ethnicity; political, religious or philosophical beliefs; union membership). Pseudonymous Data Personally Identifiable Information (PII) Sensitive PII
AOL Search Data: Aug. 2006 A Face Is Exposed for AOL Searcher No. 4417749
Notice and Consent Fundamentals • Please send me the latest information on special offers of Xbox® games.
Notice and Consent Continuum Privacy Risk Notice DiscoverableProminent Consent Implicit Opt-Out Explicit Opt-In Explicit Behaviors Redirecting the user’s Internet searches Transfer of PII and Sensitive PII Local Storage of Hidden PII Use of PII for Secondary Purposes Local Storage of Sensitive PII Installation of Software Adding a toolbar to the user’s web browser One-time Transfer of Anonymous Data Enabling Automatic Update Displaying web site when a user clicks a link Ongoing Transfer of Anonymous Data Modifying the user’s browser settings
Data Minimization Collect personal information from individuals only for the purposes identified in the provided privacy notice, and only to provide the product or service the individual has requested or authorized.
Other Concepts • Privacy controls • Shared computers • Children’s privacy • Software installation practices • Server products • Pre-release products • Essential transfers and updates
Scenarios Transferring PII to and from the user’s system Storing PII on the user’s system Transferring anonymous/pseudonymous data from user systems Installing software on a user’s system Deploying a web site • Storing and processing user data at the company • Transferring user data outside the company • Interacting with children • Server Deployment • 1 • 2 • 3 • 5 • 6 • 4 • 7 • 8 • 9
Scenario 1 Transferring PII To and From the User’s System
Examples • 1 • Sending product registration to the company. • Transferring a file containing hidden PII. • Submitting data entered by the user in a Web form. • Transferring financial information to a web service. • Displaying profile information stored at the company to the user.
Notice and Consent • 1 Value Proposition Privacy Impact Discoverable Notice Explicit Opt-in Consent
Notice and Consent (cont.) • 1 Should clearly distinguish in user interface (UI)between optional and required items. Mandatory
Notice and Consent (cont.) • 1 Must provide prominent notice and get explicit consent if PII being transferred will be used for secondary purposes (e.g., marketing).
Security and Data Integrity • 1 Must transfer Sensitive PII using a secure method that prevents unauthorized access. Should transfer PII using a secure method that prevents unauthorized access.
Security and Data Integrity (cont.) • 1 Run controls on server for assurance.
Customer controls • 1 The user must be able to control automatic collection and transfer of PII.
Facebook Beacon: Dec. 2007 • 1 • Meant to provide “trusted referrals”on the Facebook profile. • Broadcasted off-Facebook activities (e.g., purchases at online retailers, reviews at other sites, auction bids) in the user’s profile without consent. • Many Facebook users closed their accounts in response.
Facebook Beacon: Outcome • 1 • Users are asked to approve broadcast of each off-network behavior before they become visible in the user’s profile. • Privacy advocates filed complaint with the FTC. • Users can now opt-out completely.
Manage My Home: Jan. 2008 • 1 • Sears.com allowed users to view purchases going back 10+ years. • Using only name, phone number and street address, you could view purchases of any user. • Feature was quickly removed. • $5 million class action suit was filed shortly thereafter.
Scenario 2 Storing PII On the User’s System
Examples • 2 • Storing the user’s contacts. • Caching Web pages that contain PII. • Storing PII in cookie.
Notice and Consent • 2 • Must provide user with notice and get consent prior to storage of Sensitive PII, or when storing PII in a persistent cookie. • Should provide Discoverable Notice describing what data is stored and how to control prior to storing Hidden PII (e.g., metadata).
Customer Controls • 2 Users should be able to: • Control whether PII is stored. • Delete any PII stored on the user’s system,including Hidden PII. Users mustbe able to view and edit stored PII they entered.
Scenario 3 Transferring Anonymous/ Pseudonymous Data From User Systems
Examples • 3 • Anonymous monitoring by an ISP to assess the quality of an Internet connection. • Sending anonymous error reports to the company.
Notice and Consent • 3 Ongoing : Must provide user with Prominent Notice, and get Explicit Consent prior to collection.
Notice and Consent (cont.) • 3 One-time: Must get consent from the user prior to transfer, and provide Discoverable Notice.
User and Administrator Controls • 3 Ongoing: User must be able to stop subsequent collection and transfer.
Scenario 4 Installing Software Ona User’s System