SlideShare a Scribd company logo
1 of 41
Malcolm Crompton Managing Director, Information Integrity Solutions
Malcolm Crompton Web 2.0 in Government: the key issue of privacy Web 2.0 in Government  Conference 2009 Sydney 24 June 2009
Malcolm Crompton Managing Director, Information Integrity Solutions
The inherent challenge for any government:  which hat? “ Government is not only a direct service provider, of course. It also discharges important roles including providing for national security, law enforcement and regulation about which individuals have little (legal) choice even if they might have consequences that are adverse to their individual interests.”  Safe to play, a trust framework for The Connected Republic A Point of View from the Global Public Sector Practice,  Internet Business Solutions Group, Cisco Systems www.iispartners.com/Publications/index.html
Where we’ve been ...
 
 
 
Case study: Australia’s failed Access Card ,[object Object],[object Object],[object Object],[object Object],[object Object],The old website: www.accesscard.gov.au
Sun-Herald, 14 Oct 2006
This isn’t lost on the individual ... The Great Trust deficit: “ You don’t trust me, so why should I trust you?” Broad consents Inadequate Accountability Lack of Control Unexpected uses Burden of Risk More  EOI Logging & Monitoring
[object Object],[object Object],[object Object],[object Object],Trust
Survey after survey shows the impact ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The trust deficit – Impact  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Trust Deficit & the great risk shift:  Cloud as next instalment? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
And now Govt 2.0
Governments are also transforming ,[object Object],[object Object],[object Object],www.theconnectedrepublic.org
 
 
 
 
 
But is it safe?
Citizen response to Govt 2.0 informed by ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],www.Australia.gov.au www.MySpace.com   ......
The internet continues to change the rules ,[object Object],[object Object],[object Object],[object Object]
Facebook ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How to make it safe
“ Layered Defence” Privacy ► Accountability Trust Risk Control ► ► ► Safety Net Governance Technology Education Law We can reduce the Trust Deficit
“ Layered Defence” We can reduce the Trust Deficit Safety Net Governance Technology Education Privacy ► Accountability Trust Risk Control ► ► ► ? Law
Layered Defence tools ,[object Object],[object Object],[object Object],[object Object],[object Object]
Culture & History also important ,[object Object],[object Object],[object Object],[object Object],“ Use Cases for Identity Management in E‑Government”  Robin McKenzie, Malcolm Crompton, Colin Wallis,  IEEE Security and Privacy , vol. 6,  no. 2,  pp. 51-57,  Mar/Apr, 2008 http://doi.ieeecomputersociety.org/10.1109/MSP.2008.51
The key: three dynamically related elements Control Accountability www.TheConnectedRepublic.org Now  www.iispartners.com/Publications/index.html   Fair   risk allocation
www.trustguide.org.uk Guidelines TG.1: Education – Enabling better informed risk decision making TG.2: Experimentation – learning through doing TG.3: Restitution Measures – provide a positive impact on personal perceived risk TG.4: Guarantees – Provide assurance and improve confidence in whether to enter into a transaction TG.5: Control – Increased transparency brings increased confidence TG.6: Openness – honesty signifies and engenders trust
 
Swire’s recommendations ,[object Object],[object Object],[object Object],[object Object]
 
Jason Ryan’s recommendations ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
Some more strategies and principles ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Questions for governments ,[object Object],[object Object],[object Object],[object Object],[object Object]
 

More Related Content

What's hot

Issue Paper Year Of The Breach Final 021706
Issue Paper Year Of The Breach Final 021706Issue Paper Year Of The Breach Final 021706
Issue Paper Year Of The Breach Final 021706
Carolyn Kopf
 
Online Privacy and Your Company
Online Privacy and Your CompanyOnline Privacy and Your Company
Online Privacy and Your Company
Zach Evans
 
Online Tracking
Online TrackingOnline Tracking
Online Tracking
skilcu01
 
Balancing Security & Authencity Final
Balancing Security & Authencity FinalBalancing Security & Authencity Final
Balancing Security & Authencity Final
Cindy Kim
 
2016-09-05-Lessons_Learned_From_The_FTC_v1c
2016-09-05-Lessons_Learned_From_The_FTC_v1c2016-09-05-Lessons_Learned_From_The_FTC_v1c
2016-09-05-Lessons_Learned_From_The_FTC_v1c
Raj Goel
 
Cyber Insurance - What you need to know
Cyber Insurance - What you need to knowCyber Insurance - What you need to know
Cyber Insurance - What you need to know
FitCEO, Inc. (FCI)
 

What's hot (19)

Issue Paper Year Of The Breach Final 021706
Issue Paper Year Of The Breach Final 021706Issue Paper Year Of The Breach Final 021706
Issue Paper Year Of The Breach Final 021706
 
20140317eyinformationsupp
20140317eyinformationsupp20140317eyinformationsupp
20140317eyinformationsupp
 
Online Privacy and Your Company
Online Privacy and Your CompanyOnline Privacy and Your Company
Online Privacy and Your Company
 
Online Tracking
Online TrackingOnline Tracking
Online Tracking
 
Presentation Yun Li
Presentation Yun LiPresentation Yun Li
Presentation Yun Li
 
Balancing Security & Authencity Final
Balancing Security & Authencity FinalBalancing Security & Authencity Final
Balancing Security & Authencity Final
 
2016-09-05-Lessons_Learned_From_The_FTC_v1c
2016-09-05-Lessons_Learned_From_The_FTC_v1c2016-09-05-Lessons_Learned_From_The_FTC_v1c
2016-09-05-Lessons_Learned_From_The_FTC_v1c
 
Components of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior AdoptionComponents of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior Adoption
 
Net Neutrality in Education
Net Neutrality in EducationNet Neutrality in Education
Net Neutrality in Education
 
Marsden #Regulatingcode MIT
Marsden #Regulatingcode MITMarsden #Regulatingcode MIT
Marsden #Regulatingcode MIT
 
FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020
 
Webinar Deck - Protect Your Users' Online Privacy
Webinar Deck - Protect Your Users' Online Privacy Webinar Deck - Protect Your Users' Online Privacy
Webinar Deck - Protect Your Users' Online Privacy
 
Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017
 
American life in the midst of crisis: How people are using technology as thei...
American life in the midst of crisis: How people are using technology as thei...American life in the midst of crisis: How people are using technology as thei...
American life in the midst of crisis: How people are using technology as thei...
 
Cyber Insurance - What you need to know
Cyber Insurance - What you need to knowCyber Insurance - What you need to know
Cyber Insurance - What you need to know
 
Todd Mctavish
Todd MctavishTodd Mctavish
Todd Mctavish
 
Virality & Network Effect
Virality & Network EffectVirality & Network Effect
Virality & Network Effect
 
Stanford GSB_Closer Look_Why Boards Should Care About Social Media
Stanford GSB_Closer Look_Why Boards Should Care About Social MediaStanford GSB_Closer Look_Why Boards Should Care About Social Media
Stanford GSB_Closer Look_Why Boards Should Care About Social Media
 
2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast
 

Viewers also liked (6)

02 Peter Williams
02 Peter Williams02 Peter Williams
02 Peter Williams
 
0900 brad argent 2011 government 2 point 0 conference - 2
0900 brad argent 2011 government 2 point 0 conference - 20900 brad argent 2011 government 2 point 0 conference - 2
0900 brad argent 2011 government 2 point 0 conference - 2
 
1140 matt frocomm2011-aerin's copy
1140 matt frocomm2011-aerin's copy1140 matt frocomm2011-aerin's copy
1140 matt frocomm2011-aerin's copy
 
Gov 2.0 public 2.0 bad guys 2.0 v3
Gov 2.0 public 2.0 bad guys 2.0 v3Gov 2.0 public 2.0 bad guys 2.0 v3
Gov 2.0 public 2.0 bad guys 2.0 v3
 
Afternoon 2a Darren Whitelaw Web 2
Afternoon 2a  Darren  Whitelaw  Web 2Afternoon 2a  Darren  Whitelaw  Web 2
Afternoon 2a Darren Whitelaw Web 2
 
Frocomm Social Media Bootcamp 2009 Ogilvy 360 DI
Frocomm Social Media Bootcamp 2009 Ogilvy 360 DIFrocomm Social Media Bootcamp 2009 Ogilvy 360 DI
Frocomm Social Media Bootcamp 2009 Ogilvy 360 DI
 

Similar to 03 Malcolm Crompton

Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
Michael Solomon
 
Contents lists available at ScienceDirectJournal of Accoun
Contents lists available at ScienceDirectJournal of AccounContents lists available at ScienceDirectJournal of Accoun
Contents lists available at ScienceDirectJournal of Accoun
AlleneMcclendon878
 
ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)
Zohra Razaq
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016
Melissa Krasnow
 

Similar to 03 Malcolm Crompton (20)

WCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
 
Age Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAge Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data Use
 
Designing Your Product Vision
Designing Your Product VisionDesigning Your Product Vision
Designing Your Product Vision
 
The top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementThe top trends changing the landscape of Information Management
The top trends changing the landscape of Information Management
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
 
[AIIM18] GDPR: whose job is it now? - Paul Lanois
[AIIM18] GDPR: whose job is it now? - Paul Lanois[AIIM18] GDPR: whose job is it now? - Paul Lanois
[AIIM18] GDPR: whose job is it now? - Paul Lanois
 
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
 
Consumer engagement principles
Consumer engagement principlesConsumer engagement principles
Consumer engagement principles
 
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, FedseMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
 
You Are the Target
You Are the TargetYou Are the Target
You Are the Target
 
Cybersecurity & Computer Fraud - The Convergence
Cybersecurity & Computer Fraud - The ConvergenceCybersecurity & Computer Fraud - The Convergence
Cybersecurity & Computer Fraud - The Convergence
 
Contents lists available at ScienceDirectJournal of Accoun
Contents lists available at ScienceDirectJournal of AccounContents lists available at ScienceDirectJournal of Accoun
Contents lists available at ScienceDirectJournal of Accoun
 
ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016
 
The Business Value of Trust
The Business Value of TrustThe Business Value of Trust
The Business Value of Trust
 
The Business Value of Trust
The Business Value of TrustThe Business Value of Trust
The Business Value of Trust
 

More from Frocomm Australia

Gov 2.0 public 2.0 bad guys 2.0 v3
Gov 2.0 public 2.0 bad guys 2.0 v3Gov 2.0 public 2.0 bad guys 2.0 v3
Gov 2.0 public 2.0 bad guys 2.0 v3
Frocomm Australia
 

More from Frocomm Australia (10)

The pr report top 20 trends for 2012 high res
The pr report top 20 trends for 2012 high resThe pr report top 20 trends for 2012 high res
The pr report top 20 trends for 2012 high res
 
Welcome slide day 1
Welcome slide day 1Welcome slide day 1
Welcome slide day 1
 
Gov 2.0 public 2.0 bad guys 2.0 v3
Gov 2.0 public 2.0 bad guys 2.0 v3Gov 2.0 public 2.0 bad guys 2.0 v3
Gov 2.0 public 2.0 bad guys 2.0 v3
 
1150 tom acmasocmediaroadmap2011
1150 tom acmasocmediaroadmap20111150 tom acmasocmediaroadmap2011
1150 tom acmasocmediaroadmap2011
 
1120+emma web 2.0 presentation
1120+emma web 2.0 presentation1120+emma web 2.0 presentation
1120+emma web 2.0 presentation
 
Sydney conf presentation
Sydney conf presentationSydney conf presentation
Sydney conf presentation
 
Web2 0 Holding Slide
Web2 0 Holding SlideWeb2 0 Holding Slide
Web2 0 Holding Slide
 
10 Nick Baker Pr And Media Pres June 09
10 Nick Baker Pr And Media Pres June 0910 Nick Baker Pr And Media Pres June 09
10 Nick Baker Pr And Media Pres June 09
 
04 Brian Giesen Pandemic Flu Case
04 Brian Giesen Pandemic Flu Case04 Brian Giesen Pandemic Flu Case
04 Brian Giesen Pandemic Flu Case
 
01 Pia Waugh Gov2 Syd
01 Pia Waugh Gov2 Syd01 Pia Waugh Gov2 Syd
01 Pia Waugh Gov2 Syd
 

Recently uploaded

Recently uploaded (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

03 Malcolm Crompton

  • 1. Malcolm Crompton Managing Director, Information Integrity Solutions
  • 2. Malcolm Crompton Web 2.0 in Government: the key issue of privacy Web 2.0 in Government Conference 2009 Sydney 24 June 2009
  • 3. Malcolm Crompton Managing Director, Information Integrity Solutions
  • 4. The inherent challenge for any government: which hat? “ Government is not only a direct service provider, of course. It also discharges important roles including providing for national security, law enforcement and regulation about which individuals have little (legal) choice even if they might have consequences that are adverse to their individual interests.” Safe to play, a trust framework for The Connected Republic A Point of View from the Global Public Sector Practice, Internet Business Solutions Group, Cisco Systems www.iispartners.com/Publications/index.html
  • 6.  
  • 7.  
  • 8.  
  • 9.
  • 11. This isn’t lost on the individual ... The Great Trust deficit: “ You don’t trust me, so why should I trust you?” Broad consents Inadequate Accountability Lack of Control Unexpected uses Burden of Risk More EOI Logging & Monitoring
  • 12.
  • 13.
  • 14.
  • 15.
  • 17.
  • 18.  
  • 19.  
  • 20.  
  • 21.  
  • 22.  
  • 23. But is it safe?
  • 24.
  • 25.
  • 26.
  • 27. How to make it safe
  • 28. “ Layered Defence” Privacy ► Accountability Trust Risk Control ► ► ► Safety Net Governance Technology Education Law We can reduce the Trust Deficit
  • 29. “ Layered Defence” We can reduce the Trust Deficit Safety Net Governance Technology Education Privacy ► Accountability Trust Risk Control ► ► ► ? Law
  • 30.
  • 31.
  • 32. The key: three dynamically related elements Control Accountability www.TheConnectedRepublic.org Now www.iispartners.com/Publications/index.html Fair risk allocation
  • 33. www.trustguide.org.uk Guidelines TG.1: Education – Enabling better informed risk decision making TG.2: Experimentation – learning through doing TG.3: Restitution Measures – provide a positive impact on personal perceived risk TG.4: Guarantees – Provide assurance and improve confidence in whether to enter into a transaction TG.5: Control – Increased transparency brings increased confidence TG.6: Openness – honesty signifies and engenders trust
  • 34.  
  • 35.
  • 36.  
  • 37.
  • 38.  
  • 39.
  • 40.
  • 41.