SlideShare a Scribd company logo
1 of 26
PMRM Overview and Privacy
Management Analysis Tools
Development
John Sabo
John.annapolis@verizon.net
Gershon Janssen
gershon.janssen@gmail.com @gershonjanssen
“Smart” and Privacy
• Smart Grid: “A smart grid is a modernized electrical grid that uses analog or digital
information and communications technology to gather and act on information, such as
information about the behavior of suppliers and consumers , in an automated fashion, to
improve the efficiency, reliability, economics and sustainability of the production and
distribution of electricity.”
• Smart City: “A city can be defined as „smart‟ when investments in human and social
capital and traditional (transport) and modern (ICT) communication infrastructure fuel
sustainable economic development and a high quality of life…through participatory
action and engagement….. Online collaborative sensor data management platforms are
on-line database services that allow sensor owners to register and connect their devices
to feed data into an online database for storage and also allow developers to connect to
the database and build their own applications based on that data.
• Smart Phone: “A smart phone … is a mobile phone with more advanced computing
capability and connectivity than basic feature phones.”
• Internet of Things: “The Internet of Things (IoT) refers to uniquely identifiable objects and
their virtual representations in an Internet-like structure. Today …IoT… is used to denote
advanced connectivity of devices, systems and services and covers a variety of
protocols, domains and applications.”
(Definitions: Wikipedia)
Smart: Connectivity, Information and Context
• “Your phone is constantly gathering what app developers call signals.
These could be your commuting habits, which the phone can glean from
its internal GPS, often within a few feet. Your phone could also gather
your meetings, your future trips, your friends and family, your favorite
sports team, the type of news you usually read and even things like your
heart rate. Things really get interesting when the apps that gather these
signals start to be predictive. When that happens, your phone can start
anticipating your needs, interests and habits ….” Examples: Google
Now, Cortana, EverythingMe, Mynd, EasilyDo….”
• “Contextual is a whole world,” said Ami Ben David, co-founder of the
company EverythingMe. “We‟re going to start looking at computers as
being smart, as having infinite computing power and infinite access to
databases, and therefore able to talk to us and give us what we want.”
(Molly Wood, New York Times, May 7, 2014: http://www.nytimes.com/
2014/05/08/technology/personaltech/the-app-that-knows-
you.html?emc=eta1
Smart: How do We Design in Privacy?
Understanding “Smart” Applications and
Designing in Privacy
• Gaps
o Discontinuity between policies and technology
o Speed to market – innovation
o Complexity and scale
o Lack of standards
o Privacy Focus: macro or micro?
• Work Underway in OASIS
o OASIS PBD-SE Technical Specification (under development)
o OASIS PMRM Committee Specification v1.0 and use case work
o XACML Profiles
• Emerging Tools
o “Privacy by Design Use Case Template”
• Derived from PMRM and PbD technical committee collaboration
Privacy Use Case Template as Tool
Supporting Privacy by Design
• Provides all stakeholders associated with the specified software
development project within an organization a common picture and a
clearer understanding of all relevant privacy components of the project
• Can expose gaps where PbD analysis has not been carried out where
implementation has not been initiated or completed
• A tool to map privacy policies, requirements and control objectives to
technical functionality
• Facilitates the re-use of knowledge for new applications and the
extension of Privacy by Design principles more broadly throughout an
organization
• Where code must bridge to external systems and applications, a
standardized template will help ensure that Privacy by Design principles
extend to the transfer of personal information across system and
organizational boundaries.
• A standards-based use case template can reduce the time and cost of
operationalizing PbD and improve the quality and reusability of
documentation
PMRM v1.0 Methodology Designed to
Make Possible Analysis of Complex Use
Cases
PMRM-Based Template Benefits
• Provides an inventory of Privacy Use Case components and the responsible
parties that directly affect software development for the Use Case
• Segments Privacy Use Case components in a manner generally consistent
with the OASIS PMRM v1.0 Committee Specification
• Enables understanding of the relationship of the privacy responsibilities of
software developers vis-Ă -vis other relevant Privacy Use Case stakeholders
• Bring insights to the privacy aspect when moving through the different stages
of the privacy lifecycle and across interconnected applications
• May be extended to address predicates for software developers (training,
privacy management maturity, etc.)
• Does not specify an implementer‟s SDLC methodology, development
practices or in-house data collection, data analysis or modeling tools
• Valuable as a tool to increase opportunities to achieve Privacy by Design in
applications by extracting and making visible required privacy properties
• Enables Capability Maturity Model analysis for an organization
Privacy Use Case Template
Template Helps Address Challenge of Mapping Privacy Analysis
to Software Development Lifecycle Processes
SDLC Graphic Source: Wikipedia Commons
PMRM Template
Privacy Management Analysis (PMA)
Use Case Title
Use Case
Categorization
Use case
Description
Applications
associated with
Use Case
Data Subjects
PI/PII
Legal/Reg
Domains and
Owners
Data Flows and
Touch Points
Systems
Controls
Services
Functions
Baseline
Information
Applications
and Data
Subjects
Technical,
Managerial and
Boundary Data
Policies,
Controls
and
Supporting
Services/Fu
nctions
Baseline Information
Use Case Title
A short descriptive title for the use case
ACME Insurance Company Vehical Data Tracking for Reduced
Premiums
Baseline Information
Category of Use Case
e.g. Application categories such as
“Online Banking” or Model categories
such as “Two Domain”.
Mobile-Vehicular
Baseline Information
Use Case Description
High-level synopsis of the use case.
Applications and Data Subjects
Applications associated with Use Case
Relevant applications and products where
personal information is communicated, created,
processed, stored or deleted and requiring
software development
Applications and Data Subjects
Data subject(s) associated with Use Case
Include any data subjects associated with
any of the applications in the use case.
• The registered Insured person associated with the vehicle VIN
• Other drivers designated by the vehicle owner
The PI and PII collected, created, communicated,
processed, stored or deleted within privacy domains
or systems, applications or products.
• per domain, system, application or product
depending on level of use case development
• including incoming, internally generated and
outgoing PI
Technical, Managerial and Boundary Data
PI and PII covered by the Use Case
• Registered driver name, Account Number, VIN
• Registered driver contact information
• Linked vehicle operational data
• Linked vehicle time and location data
• Linked evaluation assessment and summary information
The policies and regulatory requirements governing
privacy conformance within use case domains or
systems and links to their sources.
Technical, Managerial and Boundary Data
Legal, regulatory and/or business policies
governing PI and PII in the Use Case
• Government(s) regulations
• Vehicle Manufacturer privacy policies
• Telecom Carrier privacy policies
• Insurance Company privacy policies
• Data Subject Consent preferences
• Specific policies governing apps (e.g., “Data Communications to
Manufacturer”
• Links to policies ….
• http://acmeinsurancegroupinc.biz/vehicle privacy/
• http://HudsonCarCompany.biz/privacy_vehicle….
• Domains - both physical areas (such as a customer site or home) and
logical areas (such as a wide-area network or cloud computing
environment) that are subject to the control of a particular domain owner
• Domain Owners - the stakeholders responsible for ensuring that privacy
controls and functional services are defined or managed in business
processes and technical systems within a given domain
Note: Identifying stakeholders is essential for clarifying the intersection of
privacy requirements and software development.
• Roles - the roles and responsibilities assigned to specific stakeholders and
their relationship to systems within a specific privacy domain
Technical, Managerial and Boundary Data
Domains, Domain Owners, and Roles
associated with Use Case
Technical, Managerial and Boundary Data
Domains, Domain Owners, and Roles
associated with Use Case
Domain 1: Hudson Motor Company’s Vehicle
Communications Data Center, Vehicle Owner’s Web
Portal and Backend Data Collection Application
Domain 1 Owner: VP, Vehicle Manufacturer’s Vehicle
Communication and Data Division
Role: Application design, development, content,
testing, integration testing with external systems, and
adherence to corporate security and privacy policies,
management of raw datasets of vehicle information.
• Touch points - the points of intersection of data flows with privacy
domains or systems within privacy domains
• Data flows – data exchanges carrying PI and privacy policies among
domains in the use case
Technical, Managerial and Boundary Data
Data Flows and Touch Points Linking
Domains or Systems
Hudson Motors
Communications
Division
Vehicle
Backend
Data
Operations
Vehicle
Web
Portal
Vehicle
Communications
System
Acme
Insurance
Customer
Vehicle
Programs
Customer
Profile
Dept.
Analytics
Domain
Customer
Portal
Software
Development
Group
Data
Communications
Local
Agent
portal
Technical, Managerial and Boundary Data
Systems supporting the Use Case
applications
• Control - a process designed to provide reasonable assurance regarding
the achievement of stated objectives
• per specific domain, system, or applications as required by internal
governance policies and regulations
• including inherited, internal and exported privacy controls
Policies, Controls and Supporting Services/Functions
Privacy controls required for developer
implementation
Acme
Insurance
Customer
Vehicle
Programs
Customer
Profile
Dept.
Analytics
Domain
Customer
Portal
Software
Development
Group
Data
Communications
Local
Agent
portal
Incoming PI
(Driving patterns
and assessed risk
linked to VIN)
Inherited Control
DM-1:
Minimization of
PII
Outgoing PI
(Name, account
number, driving
pattern and
assessment
summaries)
Exported Control
AR-3:
Requirements for
Contractors
• Service - a collection of related functions and
mechanisms that operate for a specified purpose
• Identify Services satisfying privacy controls
Policies, Controls and Supporting Services/Functions
Services
Inherited Control
DM-1:
Minimization of
PII
Exported Control
AR-3:
Requirements for
Contractors
• Define technical functionality and business processes
supporting selected services
Policies, Controls and Supporting Services/Functions
Functions
• Inherited Control DM-1: Minimization of PII
• Usage service
• Automated interfaces to maintain separation of data using
identifier with relatively inaccessible auxiliary info
• Security service
• Role-based access control
• Exported Control AR-3: Requirements for Contractors
• Agreement service
• Chain-of-trust contract clause
“Responsibilities” Table
Stake-
holders/Le
ad
Use
Case
Descrip-
tion
Applica
tions
Data
Subjects
PI/
PII
Domai
ns
Legal/R
egs/Poli
cies
Data
Flows/To
uch
points
Systems Privacy
Controls
Services -
Technical
Functions
CPO x x x x x x
IT Architect x x x x
Business
Analyst
x x x x x
Team Privacy
Champion
x x x x x
Senior
Developer
x x x x
Line of
Business
Owner
x x x x
Legal
Department
x x x
CIO x x x
Data Center
Director
x x x
A Work in Process
• PbD-SE TC and PMRM TC working in parallel to
develop practical standards and standards-derived
tools
• Open to broader participation from business, policy
and technical experts
• Contact today‟s workshop speakers or email:
join@oasis-open.org

More Related Content

What's hot

Data enrichment
Data enrichmentData enrichment
Data enrichmentFabMinds
 
Citrix security booklet
Citrix security bookletCitrix security booklet
Citrix security bookletBenjamin Jolivet
 
Business Intelligence Research Project
Business Intelligence  Research Project Business Intelligence  Research Project
Business Intelligence Research Project MartinaErowoOjonah
 
To get round to the heart of fortress
To get round to the heart of fortressTo get round to the heart of fortress
To get round to the heart of fortressSTO STRATEGY
 
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...Damir Delija
 
Information 2nd lesson
Information 2nd lessonInformation 2nd lesson
Information 2nd lessonAnne ndolo
 
Social, political and technological considerations for national identity mana...
Social, political and technological considerations for national identity mana...Social, political and technological considerations for national identity mana...
Social, political and technological considerations for national identity mana...Ravinder (Ravi) Singh
 
Analysis on need of Smart Card
Analysis on need of Smart CardAnalysis on need of Smart Card
Analysis on need of Smart Cardjournal ijrtem
 
Theodore Zahariadis (Synelixis Solutions): Fundamental Limitation of Current ...
Theodore Zahariadis (Synelixis Solutions): Fundamental Limitation of Current ...Theodore Zahariadis (Synelixis Solutions): Fundamental Limitation of Current ...
Theodore Zahariadis (Synelixis Solutions): Fundamental Limitation of Current ...FIA2010
 
Mediating with Technology.: Opportunities and Risks
Mediating with Technology.: Opportunities and RisksMediating with Technology.: Opportunities and Risks
Mediating with Technology.: Opportunities and RisksNicole Garton
 
Mobile banking & payment
Mobile banking & paymentMobile banking & payment
Mobile banking & paymentAnil Chaurasiya
 
Data validation using CDR (Call Detail Records) and real cell tower coverage
Data validation using CDR (Call Detail Records) and real cell tower coverageData validation using CDR (Call Detail Records) and real cell tower coverage
Data validation using CDR (Call Detail Records) and real cell tower coverageNicola Chemello
 
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...IRJET Journal
 
An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...
An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...
An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...IJERDJOURNAL
 
Privacy and security policies in supply chain
Privacy and security policies in supply chainPrivacy and security policies in supply chain
Privacy and security policies in supply chainVanya Vladeva
 
Data Use Rules in Different Business Scenarios: It's All Contextual
Data Use Rules in Different Business Scenarios:  It's All Contextual Data Use Rules in Different Business Scenarios:  It's All Contextual
Data Use Rules in Different Business Scenarios: It's All Contextual William Tanenbaum
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual William Tanenbaum
 
Paper id 25201417
Paper id 25201417Paper id 25201417
Paper id 25201417IJRAT
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All ContextualDate Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All ContextualWilliam Tanenbaum
 
Date Use Rules in Different Business Scenarios:It's All Contextual
Date Use Rules in Different Business Scenarios:It's All Contextual Date Use Rules in Different Business Scenarios:It's All Contextual
Date Use Rules in Different Business Scenarios:It's All Contextual William Tanenbaum
 

What's hot (20)

Data enrichment
Data enrichmentData enrichment
Data enrichment
 
Citrix security booklet
Citrix security bookletCitrix security booklet
Citrix security booklet
 
Business Intelligence Research Project
Business Intelligence  Research Project Business Intelligence  Research Project
Business Intelligence Research Project
 
To get round to the heart of fortress
To get round to the heart of fortressTo get round to the heart of fortress
To get round to the heart of fortress
 
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
 
Information 2nd lesson
Information 2nd lessonInformation 2nd lesson
Information 2nd lesson
 
Social, political and technological considerations for national identity mana...
Social, political and technological considerations for national identity mana...Social, political and technological considerations for national identity mana...
Social, political and technological considerations for national identity mana...
 
Analysis on need of Smart Card
Analysis on need of Smart CardAnalysis on need of Smart Card
Analysis on need of Smart Card
 
Theodore Zahariadis (Synelixis Solutions): Fundamental Limitation of Current ...
Theodore Zahariadis (Synelixis Solutions): Fundamental Limitation of Current ...Theodore Zahariadis (Synelixis Solutions): Fundamental Limitation of Current ...
Theodore Zahariadis (Synelixis Solutions): Fundamental Limitation of Current ...
 
Mediating with Technology.: Opportunities and Risks
Mediating with Technology.: Opportunities and RisksMediating with Technology.: Opportunities and Risks
Mediating with Technology.: Opportunities and Risks
 
Mobile banking & payment
Mobile banking & paymentMobile banking & payment
Mobile banking & payment
 
Data validation using CDR (Call Detail Records) and real cell tower coverage
Data validation using CDR (Call Detail Records) and real cell tower coverageData validation using CDR (Call Detail Records) and real cell tower coverage
Data validation using CDR (Call Detail Records) and real cell tower coverage
 
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
 
An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...
An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...
An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...
 
Privacy and security policies in supply chain
Privacy and security policies in supply chainPrivacy and security policies in supply chain
Privacy and security policies in supply chain
 
Data Use Rules in Different Business Scenarios: It's All Contextual
Data Use Rules in Different Business Scenarios:  It's All Contextual Data Use Rules in Different Business Scenarios:  It's All Contextual
Data Use Rules in Different Business Scenarios: It's All Contextual
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
Paper id 25201417
Paper id 25201417Paper id 25201417
Paper id 25201417
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All ContextualDate Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
Date Use Rules in Different Business Scenarios:It's All Contextual
Date Use Rules in Different Business Scenarios:It's All Contextual Date Use Rules in Different Business Scenarios:It's All Contextual
Date Use Rules in Different Business Scenarios:It's All Contextual
 

Similar to OASIS PMRM overview and tools #EIC2014: Sabo and Janssen

MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEMMIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEMShehanperamuna
 
Barga ACM DEBS 2013 Keynote
Barga ACM DEBS 2013 KeynoteBarga ACM DEBS 2013 Keynote
Barga ACM DEBS 2013 KeynoteRoger Barga
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueDeloitte United States
 
Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)Mayank Vijh
 
The M2M platform for a connected world
The M2M platform for a connected worldThe M2M platform for a connected world
The M2M platform for a connected worldThe Marketing Distillery
 
Internet of things
Internet of thingsInternet of things
Internet of thingsAmol Pawar
 
Internet of things
Internet of thingsInternet of things
Internet of thingsmmaslo
 
Transportationmobicloudwebinarv2 0englishedition-130620090944-phpapp02
Transportationmobicloudwebinarv2 0englishedition-130620090944-phpapp02Transportationmobicloudwebinarv2 0englishedition-130620090944-phpapp02
Transportationmobicloudwebinarv2 0englishedition-130620090944-phpapp02Peter Melander
 
Technology overview of_mobil_247134-1
Technology overview of_mobil_247134-1Technology overview of_mobil_247134-1
Technology overview of_mobil_247134-1lverb
 
MobiCloud Transport Webinar series June 2013 - English
MobiCloud Transport Webinar series June 2013 - English MobiCloud Transport Webinar series June 2013 - English
MobiCloud Transport Webinar series June 2013 - English Appear
 
Securing Apps & Data in the Cloud by Spyders & Netskope
Securing Apps & Data in the Cloud by Spyders & NetskopeSecuring Apps & Data in the Cloud by Spyders & Netskope
Securing Apps & Data in the Cloud by Spyders & NetskopeAhmad Abdalla
 
Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...
Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...
Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...Marie-Michelle Strah, PhD
 
M2M Application Enablement with the Everyware Cloud Platform
M2M Application Enablement with the Everyware Cloud PlatformM2M Application Enablement with the Everyware Cloud Platform
M2M Application Enablement with the Everyware Cloud PlatformEurotech
 
Not Your Father's Platform - How to Connect the Internet of Things
Not Your Father's Platform - How to Connect the Internet of ThingsNot Your Father's Platform - How to Connect the Internet of Things
Not Your Father's Platform - How to Connect the Internet of ThingsLaurie Lamberth
 
Harnessing Big Data_UCLA
Harnessing Big Data_UCLAHarnessing Big Data_UCLA
Harnessing Big Data_UCLAPaul Barsch
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNorth Texas Chapter of the ISSA
 
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...RahulJain989779
 
How to Safely Scrape Data from Social Media Platforms and News Websites.pdf
How to Safely Scrape Data from Social Media Platforms and News Websites.pdfHow to Safely Scrape Data from Social Media Platforms and News Websites.pdf
How to Safely Scrape Data from Social Media Platforms and News Websites.pdfRobertBrown631492
 
SMAC
SMACSMAC
SMACMphasis
 

Similar to OASIS PMRM overview and tools #EIC2014: Sabo and Janssen (20)

MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEMMIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
 
Barga ACM DEBS 2013 Keynote
Barga ACM DEBS 2013 KeynoteBarga ACM DEBS 2013 Keynote
Barga ACM DEBS 2013 Keynote
 
Data Domain-Driven Design
Data Domain-Driven DesignData Domain-Driven Design
Data Domain-Driven Design
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for value
 
Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)
 
The M2M platform for a connected world
The M2M platform for a connected worldThe M2M platform for a connected world
The M2M platform for a connected world
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Transportationmobicloudwebinarv2 0englishedition-130620090944-phpapp02
Transportationmobicloudwebinarv2 0englishedition-130620090944-phpapp02Transportationmobicloudwebinarv2 0englishedition-130620090944-phpapp02
Transportationmobicloudwebinarv2 0englishedition-130620090944-phpapp02
 
Technology overview of_mobil_247134-1
Technology overview of_mobil_247134-1Technology overview of_mobil_247134-1
Technology overview of_mobil_247134-1
 
MobiCloud Transport Webinar series June 2013 - English
MobiCloud Transport Webinar series June 2013 - English MobiCloud Transport Webinar series June 2013 - English
MobiCloud Transport Webinar series June 2013 - English
 
Securing Apps & Data in the Cloud by Spyders & Netskope
Securing Apps & Data in the Cloud by Spyders & NetskopeSecuring Apps & Data in the Cloud by Spyders & Netskope
Securing Apps & Data in the Cloud by Spyders & Netskope
 
Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...
Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...
Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...
 
M2M Application Enablement with the Everyware Cloud Platform
M2M Application Enablement with the Everyware Cloud PlatformM2M Application Enablement with the Everyware Cloud Platform
M2M Application Enablement with the Everyware Cloud Platform
 
Not Your Father's Platform - How to Connect the Internet of Things
Not Your Father's Platform - How to Connect the Internet of ThingsNot Your Father's Platform - How to Connect the Internet of Things
Not Your Father's Platform - How to Connect the Internet of Things
 
Harnessing Big Data_UCLA
Harnessing Big Data_UCLAHarnessing Big Data_UCLA
Harnessing Big Data_UCLA
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
 
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...
 
How to Safely Scrape Data from Social Media Platforms and News Websites.pdf
How to Safely Scrape Data from Social Media Platforms and News Websites.pdfHow to Safely Scrape Data from Social Media Platforms and News Websites.pdf
How to Safely Scrape Data from Social Media Platforms and News Websites.pdf
 
SMAC
SMACSMAC
SMAC
 

More from James Bryce Clark

NSTIC IDESG Baseline Requirements for Security, Privacy, UX and Interop
NSTIC IDESG Baseline Requirements for Security, Privacy, UX and InteropNSTIC IDESG Baseline Requirements for Security, Privacy, UX and Interop
NSTIC IDESG Baseline Requirements for Security, Privacy, UX and InteropJames Bryce Clark
 
OASIS Open Stds and FOSS Nov 2019
OASIS Open Stds and FOSS Nov 2019OASIS Open Stds and FOSS Nov 2019
OASIS Open Stds and FOSS Nov 2019James Bryce Clark
 
OASIS at ITU/NGMN: Convergence, Collaboration and Smart Shopping in Open Stan...
OASIS at ITU/NGMN: Convergence, Collaboration and Smart Shopping in Open Stan...OASIS at ITU/NGMN: Convergence, Collaboration and Smart Shopping in Open Stan...
OASIS at ITU/NGMN: Convergence, Collaboration and Smart Shopping in Open Stan...James Bryce Clark
 
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115James Bryce Clark
 
OASIS at ETSI on Open Standards and Open Source 2015
OASIS at ETSI on Open Standards and Open Source 2015OASIS at ETSI on Open Standards and Open Source 2015
OASIS at ETSI on Open Standards and Open Source 2015James Bryce Clark
 
Struse 2015 A funny thing happened on the way to OASIS: standarising STIX +...
Struse 2015   A funny thing happened on the way to OASIS: standarising STIX +...Struse 2015   A funny thing happened on the way to OASIS: standarising STIX +...
Struse 2015 A funny thing happened on the way to OASIS: standarising STIX +...James Bryce Clark
 
NSTIC IDESG Functional Requirements status report from FMO
NSTIC IDESG Functional Requirements status report from FMONSTIC IDESG Functional Requirements status report from FMO
NSTIC IDESG Functional Requirements status report from FMOJames Bryce Clark
 
OASIS: How open source and open standards work together: the Internet of Things
OASIS: How open source and open standards work together: the Internet of ThingsOASIS: How open source and open standards work together: the Internet of Things
OASIS: How open source and open standards work together: the Internet of ThingsJames Bryce Clark
 

More from James Bryce Clark (8)

NSTIC IDESG Baseline Requirements for Security, Privacy, UX and Interop
NSTIC IDESG Baseline Requirements for Security, Privacy, UX and InteropNSTIC IDESG Baseline Requirements for Security, Privacy, UX and Interop
NSTIC IDESG Baseline Requirements for Security, Privacy, UX and Interop
 
OASIS Open Stds and FOSS Nov 2019
OASIS Open Stds and FOSS Nov 2019OASIS Open Stds and FOSS Nov 2019
OASIS Open Stds and FOSS Nov 2019
 
OASIS at ITU/NGMN: Convergence, Collaboration and Smart Shopping in Open Stan...
OASIS at ITU/NGMN: Convergence, Collaboration and Smart Shopping in Open Stan...OASIS at ITU/NGMN: Convergence, Collaboration and Smart Shopping in Open Stan...
OASIS at ITU/NGMN: Convergence, Collaboration and Smart Shopping in Open Stan...
 
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
 
OASIS at ETSI on Open Standards and Open Source 2015
OASIS at ETSI on Open Standards and Open Source 2015OASIS at ETSI on Open Standards and Open Source 2015
OASIS at ETSI on Open Standards and Open Source 2015
 
Struse 2015 A funny thing happened on the way to OASIS: standarising STIX +...
Struse 2015   A funny thing happened on the way to OASIS: standarising STIX +...Struse 2015   A funny thing happened on the way to OASIS: standarising STIX +...
Struse 2015 A funny thing happened on the way to OASIS: standarising STIX +...
 
NSTIC IDESG Functional Requirements status report from FMO
NSTIC IDESG Functional Requirements status report from FMONSTIC IDESG Functional Requirements status report from FMO
NSTIC IDESG Functional Requirements status report from FMO
 
OASIS: How open source and open standards work together: the Internet of Things
OASIS: How open source and open standards work together: the Internet of ThingsOASIS: How open source and open standards work together: the Internet of Things
OASIS: How open source and open standards work together: the Internet of Things
 

Recently uploaded

Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 

Recently uploaded (20)

Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 

OASIS PMRM overview and tools #EIC2014: Sabo and Janssen

  • 1. PMRM Overview and Privacy Management Analysis Tools Development John Sabo John.annapolis@verizon.net Gershon Janssen gershon.janssen@gmail.com @gershonjanssen
  • 2. “Smart” and Privacy • Smart Grid: “A smart grid is a modernized electrical grid that uses analog or digital information and communications technology to gather and act on information, such as information about the behavior of suppliers and consumers , in an automated fashion, to improve the efficiency, reliability, economics and sustainability of the production and distribution of electricity.” • Smart City: “A city can be defined as „smart‟ when investments in human and social capital and traditional (transport) and modern (ICT) communication infrastructure fuel sustainable economic development and a high quality of life…through participatory action and engagement….. Online collaborative sensor data management platforms are on-line database services that allow sensor owners to register and connect their devices to feed data into an online database for storage and also allow developers to connect to the database and build their own applications based on that data. • Smart Phone: “A smart phone … is a mobile phone with more advanced computing capability and connectivity than basic feature phones.” • Internet of Things: “The Internet of Things (IoT) refers to uniquely identifiable objects and their virtual representations in an Internet-like structure. Today …IoT… is used to denote advanced connectivity of devices, systems and services and covers a variety of protocols, domains and applications.” (Definitions: Wikipedia)
  • 3. Smart: Connectivity, Information and Context • “Your phone is constantly gathering what app developers call signals. These could be your commuting habits, which the phone can glean from its internal GPS, often within a few feet. Your phone could also gather your meetings, your future trips, your friends and family, your favorite sports team, the type of news you usually read and even things like your heart rate. Things really get interesting when the apps that gather these signals start to be predictive. When that happens, your phone can start anticipating your needs, interests and habits ….” Examples: Google Now, Cortana, EverythingMe, Mynd, EasilyDo….” • “Contextual is a whole world,” said Ami Ben David, co-founder of the company EverythingMe. “We‟re going to start looking at computers as being smart, as having infinite computing power and infinite access to databases, and therefore able to talk to us and give us what we want.” (Molly Wood, New York Times, May 7, 2014: http://www.nytimes.com/ 2014/05/08/technology/personaltech/the-app-that-knows- you.html?emc=eta1 Smart: How do We Design in Privacy?
  • 4. Understanding “Smart” Applications and Designing in Privacy • Gaps o Discontinuity between policies and technology o Speed to market – innovation o Complexity and scale o Lack of standards o Privacy Focus: macro or micro? • Work Underway in OASIS o OASIS PBD-SE Technical Specification (under development) o OASIS PMRM Committee Specification v1.0 and use case work o XACML Profiles • Emerging Tools o “Privacy by Design Use Case Template” • Derived from PMRM and PbD technical committee collaboration
  • 5. Privacy Use Case Template as Tool Supporting Privacy by Design • Provides all stakeholders associated with the specified software development project within an organization a common picture and a clearer understanding of all relevant privacy components of the project • Can expose gaps where PbD analysis has not been carried out where implementation has not been initiated or completed • A tool to map privacy policies, requirements and control objectives to technical functionality • Facilitates the re-use of knowledge for new applications and the extension of Privacy by Design principles more broadly throughout an organization • Where code must bridge to external systems and applications, a standardized template will help ensure that Privacy by Design principles extend to the transfer of personal information across system and organizational boundaries. • A standards-based use case template can reduce the time and cost of operationalizing PbD and improve the quality and reusability of documentation
  • 6. PMRM v1.0 Methodology Designed to Make Possible Analysis of Complex Use Cases
  • 7. PMRM-Based Template Benefits • Provides an inventory of Privacy Use Case components and the responsible parties that directly affect software development for the Use Case • Segments Privacy Use Case components in a manner generally consistent with the OASIS PMRM v1.0 Committee Specification • Enables understanding of the relationship of the privacy responsibilities of software developers vis-Ă -vis other relevant Privacy Use Case stakeholders • Bring insights to the privacy aspect when moving through the different stages of the privacy lifecycle and across interconnected applications • May be extended to address predicates for software developers (training, privacy management maturity, etc.) • Does not specify an implementer‟s SDLC methodology, development practices or in-house data collection, data analysis or modeling tools • Valuable as a tool to increase opportunities to achieve Privacy by Design in applications by extracting and making visible required privacy properties • Enables Capability Maturity Model analysis for an organization
  • 8. Privacy Use Case Template
  • 9. Template Helps Address Challenge of Mapping Privacy Analysis to Software Development Lifecycle Processes SDLC Graphic Source: Wikipedia Commons
  • 10. PMRM Template Privacy Management Analysis (PMA) Use Case Title Use Case Categorization Use case Description Applications associated with Use Case Data Subjects PI/PII Legal/Reg Domains and Owners Data Flows and Touch Points Systems Controls Services Functions Baseline Information Applications and Data Subjects Technical, Managerial and Boundary Data Policies, Controls and Supporting Services/Fu nctions
  • 11. Baseline Information Use Case Title A short descriptive title for the use case ACME Insurance Company Vehical Data Tracking for Reduced Premiums
  • 12. Baseline Information Category of Use Case e.g. Application categories such as “Online Banking” or Model categories such as “Two Domain”. Mobile-Vehicular
  • 13. Baseline Information Use Case Description High-level synopsis of the use case.
  • 14. Applications and Data Subjects Applications associated with Use Case Relevant applications and products where personal information is communicated, created, processed, stored or deleted and requiring software development
  • 15. Applications and Data Subjects Data subject(s) associated with Use Case Include any data subjects associated with any of the applications in the use case. • The registered Insured person associated with the vehicle VIN • Other drivers designated by the vehicle owner
  • 16. The PI and PII collected, created, communicated, processed, stored or deleted within privacy domains or systems, applications or products. • per domain, system, application or product depending on level of use case development • including incoming, internally generated and outgoing PI Technical, Managerial and Boundary Data PI and PII covered by the Use Case • Registered driver name, Account Number, VIN • Registered driver contact information • Linked vehicle operational data • Linked vehicle time and location data • Linked evaluation assessment and summary information
  • 17. The policies and regulatory requirements governing privacy conformance within use case domains or systems and links to their sources. Technical, Managerial and Boundary Data Legal, regulatory and/or business policies governing PI and PII in the Use Case • Government(s) regulations • Vehicle Manufacturer privacy policies • Telecom Carrier privacy policies • Insurance Company privacy policies • Data Subject Consent preferences • Specific policies governing apps (e.g., “Data Communications to Manufacturer” • Links to policies …. • http://acmeinsurancegroupinc.biz/vehicle privacy/ • http://HudsonCarCompany.biz/privacy_vehicle….
  • 18. • Domains - both physical areas (such as a customer site or home) and logical areas (such as a wide-area network or cloud computing environment) that are subject to the control of a particular domain owner • Domain Owners - the stakeholders responsible for ensuring that privacy controls and functional services are defined or managed in business processes and technical systems within a given domain Note: Identifying stakeholders is essential for clarifying the intersection of privacy requirements and software development. • Roles - the roles and responsibilities assigned to specific stakeholders and their relationship to systems within a specific privacy domain Technical, Managerial and Boundary Data Domains, Domain Owners, and Roles associated with Use Case
  • 19. Technical, Managerial and Boundary Data Domains, Domain Owners, and Roles associated with Use Case Domain 1: Hudson Motor Company’s Vehicle Communications Data Center, Vehicle Owner’s Web Portal and Backend Data Collection Application Domain 1 Owner: VP, Vehicle Manufacturer’s Vehicle Communication and Data Division Role: Application design, development, content, testing, integration testing with external systems, and adherence to corporate security and privacy policies, management of raw datasets of vehicle information.
  • 20. • Touch points - the points of intersection of data flows with privacy domains or systems within privacy domains • Data flows – data exchanges carrying PI and privacy policies among domains in the use case Technical, Managerial and Boundary Data Data Flows and Touch Points Linking Domains or Systems Hudson Motors Communications Division Vehicle Backend Data Operations Vehicle Web Portal Vehicle Communications System Acme Insurance Customer Vehicle Programs Customer Profile Dept. Analytics Domain Customer Portal Software Development Group Data Communications Local Agent portal
  • 21. Technical, Managerial and Boundary Data Systems supporting the Use Case applications
  • 22. • Control - a process designed to provide reasonable assurance regarding the achievement of stated objectives • per specific domain, system, or applications as required by internal governance policies and regulations • including inherited, internal and exported privacy controls Policies, Controls and Supporting Services/Functions Privacy controls required for developer implementation Acme Insurance Customer Vehicle Programs Customer Profile Dept. Analytics Domain Customer Portal Software Development Group Data Communications Local Agent portal Incoming PI (Driving patterns and assessed risk linked to VIN) Inherited Control DM-1: Minimization of PII Outgoing PI (Name, account number, driving pattern and assessment summaries) Exported Control AR-3: Requirements for Contractors
  • 23. • Service - a collection of related functions and mechanisms that operate for a specified purpose • Identify Services satisfying privacy controls Policies, Controls and Supporting Services/Functions Services Inherited Control DM-1: Minimization of PII Exported Control AR-3: Requirements for Contractors
  • 24. • Define technical functionality and business processes supporting selected services Policies, Controls and Supporting Services/Functions Functions • Inherited Control DM-1: Minimization of PII • Usage service • Automated interfaces to maintain separation of data using identifier with relatively inaccessible auxiliary info • Security service • Role-based access control • Exported Control AR-3: Requirements for Contractors • Agreement service • Chain-of-trust contract clause
  • 25. “Responsibilities” Table Stake- holders/Le ad Use Case Descrip- tion Applica tions Data Subjects PI/ PII Domai ns Legal/R egs/Poli cies Data Flows/To uch points Systems Privacy Controls Services - Technical Functions CPO x x x x x x IT Architect x x x x Business Analyst x x x x x Team Privacy Champion x x x x x Senior Developer x x x x Line of Business Owner x x x x Legal Department x x x CIO x x x Data Center Director x x x
  • 26. A Work in Process • PbD-SE TC and PMRM TC working in parallel to develop practical standards and standards-derived tools • Open to broader participation from business, policy and technical experts • Contact today‟s workshop speakers or email: join@oasis-open.org