SlideShare a Scribd company logo
1 of 21
Big data – Big brother?

Using geolocation in a trustworthy and compliant way
More than SatNavs…

    Consumer             Automotive




    Business Solutions   Licensing




2    09/10/2012
Revolutionising navigation
In 4 steps




             4. TomTom HD Traffic       4. TomTom HD Traffic
             3. IQ Routes               3. IQ Routes
             2. Map Share               2. Map Share
             1. Base maps               1. Base maps




                4. TomTom HD Traffic   4. TomTom HD Traffic
                3. IQ Routes           3. IQ Routes
                2. Map Share           2. Map Share
                1. Base maps           1. Base maps




3
Community input – with permission
We profile roads, not people




4
TomToms trip archive
Anonymous location and speed information from the
TomTom user community




 5 billion (10E9) speed measurements per day
 5 trillion (10E12) speed measurements to date!
 by customers driving 50 billion kilometres
 and visiting every spot over 1,000 times
Creating TomTom HD Traffic: data sources
Range of high-quality real-time data sources




6
TomTom HD Traffic coverage
    It covers up to 99.9% of all roads

    LONDON




       TMC coverage                           HD Traffic coverage

       Check for yourself on tomtom.com/livetraffic or use the
7      free TomTom Places App for iPhone or Android
Intersection analysis
Obsoletes time-consuming, expensive and inaccurate methods




8
Travel times to hospital
    The reality check that can help to save lives

    LONDON




      Based on theoretical                  Based on real world
      maximum speeds                        measurements

9
Origin/Destination analysis
Example: Trips with Frankfurt Airport as destination

• Where are your
  customers coming
  from?
• What routes do they
  take?
• How may drivers are
  passing?
• Etc.


• Combine with other
  geo-based data
  sources for additional
  analysis

10
Location privacy is top of mind
With bloggers, press, regulators, enforcers, legislators and many
users
                                         •   TomTom investigated by
                                             leading European Data
                                             Protection Authority in 2011


                                         •   TomTom’s use of location
                                             data is in accordance with
                                             EU Data Protection Laws


                                         •   Processing and delivery to
                                             third parties 100% OK


                                         •   Informing users needed to
                                             be more explicit, including
                                             opt-in




11
Drivers, police & TomTom
An explosive mixture




12
Privacy, amongst others, is about the
protection of personal data

Personal data:
•    Contains (whatever) information
     relating to a natural (“real”) person
•    That person could be
     identified, directly or indirectly
•    Typically: data attached to unique
     identifiers


Anonymous only:
•    When no reasonable way exists to
     identify (“single out”) a person
•    Even when requiring correlation with
     other data sources (e.g. maps and
     phonebooks)
•    By anyone with the right resources

13
EU WP29 opinion “Geolocation services on smart mobile devices”
Beware: engineers’ “binary” interpretation of principle based law with open norms
•    Data attached to a unique identifier (e.g. serial number, email address) or reversible
     pseudonym (e.g. a hash) is to be considered personal data
•    Location data originating from any individual is to be considered sensitive personal data:
     consent is the only acceptable legal basis for processing
•    Sending location   data “off board” requires:
     • Freely given     no pressure is felt to consent
     • Prior            before processing starts
     • Informed         explain purpose, duration and who has access
     • Explicit         i.e. opt-in requiring a user action and separate from accepting T&C’s
     • Consent          permission to go ahead
•    Information is required regarding:
     • What           data is processed
     • Who            will have access
     • Why            is the data used
     • When           will it be deleted
     • Where          will the data be processed
•    Validity of consent is directly related to the quality of information towards the user
•    Consent renewal is required after prolonged period of non-use and at least every year
•    No feature creep: perfectly stick to the purpose as agreed to by the user
•    Erase location data right after use and never keep longer than 24 hours
14
Typical personal data misconceptions
very often present in technology companies

• We do not identify the user while using the data, so we have no
  issues with privacy law
• We only use the unique serial number of the users device, so
  the data is anonymous and we have no issues with privacy law
• We encrypt the data, so we are no longer
  using/receiving/sending personal data
• We use hashes to replace all serial numbers, so the data is now
  anonymous and we have no issues with privacy law
• We anonimize the data, so we are not using personal data
• We can use the users’ data for anything we want, as long as we
  keep the data to ourselves
• Look: big name companies are doing the same, so we are OK

15
TomTom & Privacy

Vision:                                Principles:
Community input (crowd                 1. Avoid unpleasant surprises:
sourcing) is strategic                   •   Customer insight is
                                             paramount
Privacy helps to realize business        •   Be open and explain –
objectives by ensuring trust                 hesitation is an omen
                                         •   Keep it simple
Privacy is integral part of business   2. The customer remains in
continuity above and beyond legal         control of his personal data: we
compliance                                have it “on a loan”




16
Avoiding re-identification is key
TomTom has a strict code of conduct to adhere to privacy laws

     1 month                            • Historic trip archive only
                                          to be used for road,
                                          traffic and related
                                          purposes
                                        • No access to raw data
                                          outside TomTom, ever
                                        • TomTom performs
     1 day                                processing
                                        • TomTom ensures re-
                                          identification is
                                          impossible e.g. through
                                          sufficient aggregation




17
Community input – with permission
We profile roads, not people




18
Multi-disciplinary approach
Don’t just leave it to the lawyers




          explanation & permission



          engineering & operations



               Expectation & law



19
Recommendations

• Incorporate data protection requirements from the start


• Take a multi-disciplinary approach: it is about your
  “license to operate in the information society”


• Embed “privacy by design” into development processes


• Document your data: “what, why, when, who, where”


• Appoint a “privacy czar” in your organization



20
20
References

•    The EU Data Protection Directive (Directive 95/46/EC):
     http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:en:HTML


•    Working Party Article 29 opinion 13/2011 on "Geolocation services on smart mobile devices”
     http://ec.europa.eu/justice/policies/privacy/docs/wpdocs/2011/wp185_en.pdf


•    Working Party Article 29 opinion 15/2011 on "Consent”
     http://ec.europa.eu/justice/policies/privacy/docs/wpdocs/2011/wp187_en.pdf


•    The report on the Dutch Data Protection Authority investigation on TomTom's use of location
     data (in English):
     http://www.dutchdpa.nl/Pages/en_pb_20120112_investigation-tomtom.aspx


•    “How we use your data”: TomTom’s explanation on its use of location data
      http://www.tomtom.com/yourdata
     video: http://www.youtube.com/watch?v=ZfRkAQl2wWQ



21
21

More Related Content

Viewers also liked

Using gis to enhance customer experience
Using gis to enhance customer experienceUsing gis to enhance customer experience
Using gis to enhance customer experienceGary Allemann
 
Chek mate geolocation analyzer
Chek mate geolocation analyzerChek mate geolocation analyzer
Chek mate geolocation analyzerpriyal mistry
 
Tran Minh: big data platform in high performance computing at NISCI
Tran Minh: big data platform in high performance computing at NISCITran Minh: big data platform in high performance computing at NISCI
Tran Minh: big data platform in high performance computing at NISCIVu Hung Nguyen
 
Smart Services for Smart City by Mr. Mosaed Al Asoosy
Smart Services for Smart City by Mr. Mosaed Al AsoosySmart Services for Smart City by Mr. Mosaed Al Asoosy
Smart Services for Smart City by Mr. Mosaed Al AsoosyInternational Turneky Systems
 
Catch up on the best quotes from RBF Singapore
Catch up on the best quotes from RBF SingaporeCatch up on the best quotes from RBF Singapore
Catch up on the best quotes from RBF SingaporeGlobal Initiatives
 
SingTel | Catching The Love Boat
SingTel | Catching The Love BoatSingTel | Catching The Love Boat
SingTel | Catching The Love BoatTerence Chan
 
Pak Lum Mock - Reinforcing Digital Communications, CSWGlobal14
Pak Lum Mock - Reinforcing Digital Communications, CSWGlobal14Pak Lum Mock - Reinforcing Digital Communications, CSWGlobal14
Pak Lum Mock - Reinforcing Digital Communications, CSWGlobal14Crowdsourcing Week
 
Giải pháp hoàn thiện quản trị nhân lực tại công ty cổ phần bưu chính viettel
Giải pháp hoàn thiện quản trị nhân lực tại công ty cổ phần bưu chính viettelGiải pháp hoàn thiện quản trị nhân lực tại công ty cổ phần bưu chính viettel
Giải pháp hoàn thiện quản trị nhân lực tại công ty cổ phần bưu chính viettelhttps://www.facebook.com/garmentspace
 
From Geographic Location to Network Location: The Potential of Big Social Data
From Geographic Location to Network Location: The Potential of Big Social DataFrom Geographic Location to Network Location: The Potential of Big Social Data
From Geographic Location to Network Location: The Potential of Big Social DataAxel Bruns
 
What makes great Social? A presentation for Social Media Week
What makes great Social? A presentation for Social Media WeekWhat makes great Social? A presentation for Social Media Week
What makes great Social? A presentation for Social Media WeekMiguel Bernas
 
SingTel: Finding fans and keeping them loyal
SingTel: Finding fans and keeping them loyalSingTel: Finding fans and keeping them loyal
SingTel: Finding fans and keeping them loyalMiguel Bernas
 
Presentation1
Presentation1Presentation1
Presentation1yopirates
 
Big Data in Action
Big Data in ActionBig Data in Action
Big Data in Actionngonpham
 
Mobile 360: eerste NL bereiksonderzoek voor mobile devices
Mobile 360: eerste NL bereiksonderzoek voor mobile devicesMobile 360: eerste NL bereiksonderzoek voor mobile devices
Mobile 360: eerste NL bereiksonderzoek voor mobile devicesKantar TNS
 
Government cloud computing-2015
Government cloud computing-2015Government cloud computing-2015
Government cloud computing-2015TRPC Pte Ltd
 
Capstone project - Luân văn tốt nghiệp - Trương Trung Nghĩa
Capstone project - Luân văn tốt nghiệp - Trương Trung NghĩaCapstone project - Luân văn tốt nghiệp - Trương Trung Nghĩa
Capstone project - Luân văn tốt nghiệp - Trương Trung NghĩaNghĩa Trương Trung
 
ANTS and BIG DATA - The it outsourcing trend - ICTCom 2016
ANTS and BIG DATA - The it outsourcing trend - ICTCom 2016ANTS and BIG DATA - The it outsourcing trend - ICTCom 2016
ANTS and BIG DATA - The it outsourcing trend - ICTCom 2016Dinh Le Dat (Kevin D.)
 

Viewers also liked (20)

Using gis to enhance customer experience
Using gis to enhance customer experienceUsing gis to enhance customer experience
Using gis to enhance customer experience
 
Chek mate geolocation analyzer
Chek mate geolocation analyzerChek mate geolocation analyzer
Chek mate geolocation analyzer
 
Tran Minh: big data platform in high performance computing at NISCI
Tran Minh: big data platform in high performance computing at NISCITran Minh: big data platform in high performance computing at NISCI
Tran Minh: big data platform in high performance computing at NISCI
 
Smart Services for Smart City by Mr. Mosaed Al Asoosy
Smart Services for Smart City by Mr. Mosaed Al AsoosySmart Services for Smart City by Mr. Mosaed Al Asoosy
Smart Services for Smart City by Mr. Mosaed Al Asoosy
 
Catch up on the best quotes from RBF Singapore
Catch up on the best quotes from RBF SingaporeCatch up on the best quotes from RBF Singapore
Catch up on the best quotes from RBF Singapore
 
EPC Recruit
EPC RecruitEPC Recruit
EPC Recruit
 
StarHub Community & Digital Strategy
StarHub Community & Digital Strategy StarHub Community & Digital Strategy
StarHub Community & Digital Strategy
 
SingTel | Catching The Love Boat
SingTel | Catching The Love BoatSingTel | Catching The Love Boat
SingTel | Catching The Love Boat
 
Pak Lum Mock - Reinforcing Digital Communications, CSWGlobal14
Pak Lum Mock - Reinforcing Digital Communications, CSWGlobal14Pak Lum Mock - Reinforcing Digital Communications, CSWGlobal14
Pak Lum Mock - Reinforcing Digital Communications, CSWGlobal14
 
Shopper insights StarHub
Shopper insights StarHubShopper insights StarHub
Shopper insights StarHub
 
Giải pháp hoàn thiện quản trị nhân lực tại công ty cổ phần bưu chính viettel
Giải pháp hoàn thiện quản trị nhân lực tại công ty cổ phần bưu chính viettelGiải pháp hoàn thiện quản trị nhân lực tại công ty cổ phần bưu chính viettel
Giải pháp hoàn thiện quản trị nhân lực tại công ty cổ phần bưu chính viettel
 
From Geographic Location to Network Location: The Potential of Big Social Data
From Geographic Location to Network Location: The Potential of Big Social DataFrom Geographic Location to Network Location: The Potential of Big Social Data
From Geographic Location to Network Location: The Potential of Big Social Data
 
What makes great Social? A presentation for Social Media Week
What makes great Social? A presentation for Social Media WeekWhat makes great Social? A presentation for Social Media Week
What makes great Social? A presentation for Social Media Week
 
SingTel: Finding fans and keeping them loyal
SingTel: Finding fans and keeping them loyalSingTel: Finding fans and keeping them loyal
SingTel: Finding fans and keeping them loyal
 
Presentation1
Presentation1Presentation1
Presentation1
 
Big Data in Action
Big Data in ActionBig Data in Action
Big Data in Action
 
Mobile 360: eerste NL bereiksonderzoek voor mobile devices
Mobile 360: eerste NL bereiksonderzoek voor mobile devicesMobile 360: eerste NL bereiksonderzoek voor mobile devices
Mobile 360: eerste NL bereiksonderzoek voor mobile devices
 
Government cloud computing-2015
Government cloud computing-2015Government cloud computing-2015
Government cloud computing-2015
 
Capstone project - Luân văn tốt nghiệp - Trương Trung Nghĩa
Capstone project - Luân văn tốt nghiệp - Trương Trung NghĩaCapstone project - Luân văn tốt nghiệp - Trương Trung Nghĩa
Capstone project - Luân văn tốt nghiệp - Trương Trung Nghĩa
 
ANTS and BIG DATA - The it outsourcing trend - ICTCom 2016
ANTS and BIG DATA - The it outsourcing trend - ICTCom 2016ANTS and BIG DATA - The it outsourcing trend - ICTCom 2016
ANTS and BIG DATA - The it outsourcing trend - ICTCom 2016
 

Similar to Workshop 'Big data' Simon Hania

Tom tom - Location services and privacy | Simon Hania @ VINT symposium THINGS...
Tom tom - Location services and privacy | Simon Hania @ VINT symposium THINGS...Tom tom - Location services and privacy | Simon Hania @ VINT symposium THINGS...
Tom tom - Location services and privacy | Simon Hania @ VINT symposium THINGS...VINTlabs | The Sogeti Trendlab
 
Service goes accessible_2013_sh
Service goes accessible_2013_shService goes accessible_2013_sh
Service goes accessible_2013_shTomppa Järvinen
 
12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotatedwdsnead
 
Kawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the CloudKawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the CloudGurbir Singh
 
Are Your Data Ready for GDPR? (with MAPR and Talend)
Are Your Data Ready for GDPR? (with MAPR and Talend)Are Your Data Ready for GDPR? (with MAPR and Talend)
Are Your Data Ready for GDPR? (with MAPR and Talend)Jean-Michel Franco
 
Mobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxMobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxgouriuplenchwar63
 
Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504 Prashant Rana
 
TomTom UseCase Identity Management Whitehallmedia 2015
TomTom UseCase Identity Management Whitehallmedia 2015TomTom UseCase Identity Management Whitehallmedia 2015
TomTom UseCase Identity Management Whitehallmedia 2015Edwin van der Wal
 
Data protection within development
Data protection within developmentData protection within development
Data protection within developmentowaspsuffolk
 
Analytics in Action - Data Protection
Analytics in Action - Data ProtectionAnalytics in Action - Data Protection
Analytics in Action - Data ProtectionLee Schlenker
 
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...Brian Miller, Solicitor
 
GDPR and Blockchain
GDPR and BlockchainGDPR and Blockchain
GDPR and BlockchainSalman Baset
 
Privacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingPrivacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingIT Governance Ltd
 
Recent developments and future challenges in privacy
Recent developments and future challenges in privacyRecent developments and future challenges in privacy
Recent developments and future challenges in privacyPECB
 
The Future of Roaming
The Future of RoamingThe Future of Roaming
The Future of RoamingMark Phillips
 
The Future of Roaming
The Future of RoamingThe Future of Roaming
The Future of RoamingMark Phillips
 
The Future of Roaming
The Future of RoamingThe Future of Roaming
The Future of RoamingOpenet
 
Data in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathonData in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathonCisco DevNet
 

Similar to Workshop 'Big data' Simon Hania (20)

Tom tom - Location services and privacy | Simon Hania @ VINT symposium THINGS...
Tom tom - Location services and privacy | Simon Hania @ VINT symposium THINGS...Tom tom - Location services and privacy | Simon Hania @ VINT symposium THINGS...
Tom tom - Location services and privacy | Simon Hania @ VINT symposium THINGS...
 
Service goes accessible_2013_sh
Service goes accessible_2013_shService goes accessible_2013_sh
Service goes accessible_2013_sh
 
12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated
 
Kawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the CloudKawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the Cloud
 
GDPR Part 1: Quick Facts
GDPR Part 1: Quick FactsGDPR Part 1: Quick Facts
GDPR Part 1: Quick Facts
 
Are Your Data Ready for GDPR? (with MAPR and Talend)
Are Your Data Ready for GDPR? (with MAPR and Talend)Are Your Data Ready for GDPR? (with MAPR and Talend)
Are Your Data Ready for GDPR? (with MAPR and Talend)
 
Mobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxMobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptx
 
Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504
 
TomTom UseCase Identity Management Whitehallmedia 2015
TomTom UseCase Identity Management Whitehallmedia 2015TomTom UseCase Identity Management Whitehallmedia 2015
TomTom UseCase Identity Management Whitehallmedia 2015
 
Data protection within development
Data protection within developmentData protection within development
Data protection within development
 
Using Social Business Software and being compliant with EU data protection la...
Using Social Business Software and being compliant with EU data protection la...Using Social Business Software and being compliant with EU data protection la...
Using Social Business Software and being compliant with EU data protection la...
 
Analytics in Action - Data Protection
Analytics in Action - Data ProtectionAnalytics in Action - Data Protection
Analytics in Action - Data Protection
 
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
 
GDPR and Blockchain
GDPR and BlockchainGDPR and Blockchain
GDPR and Blockchain
 
Privacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingPrivacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failing
 
Recent developments and future challenges in privacy
Recent developments and future challenges in privacyRecent developments and future challenges in privacy
Recent developments and future challenges in privacy
 
The Future of Roaming
The Future of RoamingThe Future of Roaming
The Future of Roaming
 
The Future of Roaming
The Future of RoamingThe Future of Roaming
The Future of Roaming
 
The Future of Roaming
The Future of RoamingThe Future of Roaming
The Future of Roaming
 
Data in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathonData in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathon
 

More from SURFnet

7-minute-speeches. Deel 3.
7-minute-speeches. Deel 3.7-minute-speeches. Deel 3.
7-minute-speeches. Deel 3.SURFnet
 
The mobile evolution of the employee and student pass
The mobile evolution of the employee and student passThe mobile evolution of the employee and student pass
The mobile evolution of the employee and student passSURFnet
 
Location-based services: van theorie naar praktijk. Deel 2
Location-based services: van theorie naar praktijk. Deel 2Location-based services: van theorie naar praktijk. Deel 2
Location-based services: van theorie naar praktijk. Deel 2SURFnet
 
Automatisering en orkestratie: update en toekomstplannen
Automatisering en orkestratie: update en toekomstplannenAutomatisering en orkestratie: update en toekomstplannen
Automatisering en orkestratie: update en toekomstplannenSURFnet
 
Welke nieuwe mogelijkheden biedt het SURFnet8-netwerk? Deel 2
Welke nieuwe mogelijkheden biedt het SURFnet8-netwerk? Deel 2Welke nieuwe mogelijkheden biedt het SURFnet8-netwerk? Deel 2
Welke nieuwe mogelijkheden biedt het SURFnet8-netwerk? Deel 2SURFnet
 
Welke nieuwe mogelijkheden biedt het SURFnet8-netwerk? Deel 1
Welke nieuwe mogelijkheden biedt het SURFnet8-netwerk? Deel 1Welke nieuwe mogelijkheden biedt het SURFnet8-netwerk? Deel 1
Welke nieuwe mogelijkheden biedt het SURFnet8-netwerk? Deel 1SURFnet
 
RUGnet, een service oriented internationaal netwerk van Fryslân tot China
RUGnet, een service oriented internationaal netwerk van Fryslân tot ChinaRUGnet, een service oriented internationaal netwerk van Fryslân tot China
RUGnet, een service oriented internationaal netwerk van Fryslân tot ChinaSURFnet
 
Opening en netwerkvisie SURF
Opening en netwerkvisie SURFOpening en netwerkvisie SURF
Opening en netwerkvisie SURFSURFnet
 
Trends in unwired communications
Trends in unwired communicationsTrends in unwired communications
Trends in unwired communicationsSURFnet
 
Netwerkfunctievirtualisatie: proof-of-concept en demo
Netwerkfunctievirtualisatie: proof-of-concept en demoNetwerkfunctievirtualisatie: proof-of-concept en demo
Netwerkfunctievirtualisatie: proof-of-concept en demoSURFnet
 
SURF-dienstenportfolio: draadvrije netwerk. Deel 4
SURF-dienstenportfolio: draadvrije netwerk. Deel 4SURF-dienstenportfolio: draadvrije netwerk. Deel 4
SURF-dienstenportfolio: draadvrije netwerk. Deel 4SURFnet
 
SURF-dienstenportfolio: draadvrije netwerk. Deel 3
SURF-dienstenportfolio: draadvrije netwerk. Deel 3SURF-dienstenportfolio: draadvrije netwerk. Deel 3
SURF-dienstenportfolio: draadvrije netwerk. Deel 3SURFnet
 
SURF-dienstenportfolio: draadvrije netwerk. Deel 2
SURF-dienstenportfolio: draadvrije netwerk. Deel 2SURF-dienstenportfolio: draadvrije netwerk. Deel 2
SURF-dienstenportfolio: draadvrije netwerk. Deel 2SURFnet
 
SURF-dienstenportfolio: draadvrije netwerk. Deel 1
SURF-dienstenportfolio: draadvrije netwerk. Deel 1SURF-dienstenportfolio: draadvrije netwerk. Deel 1
SURF-dienstenportfolio: draadvrije netwerk. Deel 1SURFnet
 
De toekomst van netwerkinfrastructuur op de campus: in gesprek!
De toekomst van netwerkinfrastructuur op de campus: in gesprek!De toekomst van netwerkinfrastructuur op de campus: in gesprek!
De toekomst van netwerkinfrastructuur op de campus: in gesprek!SURFnet
 
Research data zone: veilige en geoptimaliseerde netwerkomgeving voor onderzoe...
Research data zone: veilige en geoptimaliseerde netwerkomgeving voor onderzoe...Research data zone: veilige en geoptimaliseerde netwerkomgeving voor onderzoe...
Research data zone: veilige en geoptimaliseerde netwerkomgeving voor onderzoe...SURFnet
 
7-minute-speeches. Deel 2
7-minute-speeches. Deel 27-minute-speeches. Deel 2
7-minute-speeches. Deel 2SURFnet
 
Nieuwe mogelijkheden van het SURFnet-netwerk Dashboard
Nieuwe mogelijkheden van het SURFnet-netwerk DashboardNieuwe mogelijkheden van het SURFnet-netwerk Dashboard
Nieuwe mogelijkheden van het SURFnet-netwerk DashboardSURFnet
 
7-minute-speeches
7-minute-speeches7-minute-speeches
7-minute-speechesSURFnet
 
Winnende voorstellen location-based services - deel 2
Winnende voorstellen location-based services - deel 2Winnende voorstellen location-based services - deel 2
Winnende voorstellen location-based services - deel 2SURFnet
 

More from SURFnet (20)

7-minute-speeches. Deel 3.
7-minute-speeches. Deel 3.7-minute-speeches. Deel 3.
7-minute-speeches. Deel 3.
 
The mobile evolution of the employee and student pass
The mobile evolution of the employee and student passThe mobile evolution of the employee and student pass
The mobile evolution of the employee and student pass
 
Location-based services: van theorie naar praktijk. Deel 2
Location-based services: van theorie naar praktijk. Deel 2Location-based services: van theorie naar praktijk. Deel 2
Location-based services: van theorie naar praktijk. Deel 2
 
Automatisering en orkestratie: update en toekomstplannen
Automatisering en orkestratie: update en toekomstplannenAutomatisering en orkestratie: update en toekomstplannen
Automatisering en orkestratie: update en toekomstplannen
 
Welke nieuwe mogelijkheden biedt het SURFnet8-netwerk? Deel 2
Welke nieuwe mogelijkheden biedt het SURFnet8-netwerk? Deel 2Welke nieuwe mogelijkheden biedt het SURFnet8-netwerk? Deel 2
Welke nieuwe mogelijkheden biedt het SURFnet8-netwerk? Deel 2
 
Welke nieuwe mogelijkheden biedt het SURFnet8-netwerk? Deel 1
Welke nieuwe mogelijkheden biedt het SURFnet8-netwerk? Deel 1Welke nieuwe mogelijkheden biedt het SURFnet8-netwerk? Deel 1
Welke nieuwe mogelijkheden biedt het SURFnet8-netwerk? Deel 1
 
RUGnet, een service oriented internationaal netwerk van Fryslân tot China
RUGnet, een service oriented internationaal netwerk van Fryslân tot ChinaRUGnet, een service oriented internationaal netwerk van Fryslân tot China
RUGnet, een service oriented internationaal netwerk van Fryslân tot China
 
Opening en netwerkvisie SURF
Opening en netwerkvisie SURFOpening en netwerkvisie SURF
Opening en netwerkvisie SURF
 
Trends in unwired communications
Trends in unwired communicationsTrends in unwired communications
Trends in unwired communications
 
Netwerkfunctievirtualisatie: proof-of-concept en demo
Netwerkfunctievirtualisatie: proof-of-concept en demoNetwerkfunctievirtualisatie: proof-of-concept en demo
Netwerkfunctievirtualisatie: proof-of-concept en demo
 
SURF-dienstenportfolio: draadvrije netwerk. Deel 4
SURF-dienstenportfolio: draadvrije netwerk. Deel 4SURF-dienstenportfolio: draadvrije netwerk. Deel 4
SURF-dienstenportfolio: draadvrije netwerk. Deel 4
 
SURF-dienstenportfolio: draadvrije netwerk. Deel 3
SURF-dienstenportfolio: draadvrije netwerk. Deel 3SURF-dienstenportfolio: draadvrije netwerk. Deel 3
SURF-dienstenportfolio: draadvrije netwerk. Deel 3
 
SURF-dienstenportfolio: draadvrije netwerk. Deel 2
SURF-dienstenportfolio: draadvrije netwerk. Deel 2SURF-dienstenportfolio: draadvrije netwerk. Deel 2
SURF-dienstenportfolio: draadvrije netwerk. Deel 2
 
SURF-dienstenportfolio: draadvrije netwerk. Deel 1
SURF-dienstenportfolio: draadvrije netwerk. Deel 1SURF-dienstenportfolio: draadvrije netwerk. Deel 1
SURF-dienstenportfolio: draadvrije netwerk. Deel 1
 
De toekomst van netwerkinfrastructuur op de campus: in gesprek!
De toekomst van netwerkinfrastructuur op de campus: in gesprek!De toekomst van netwerkinfrastructuur op de campus: in gesprek!
De toekomst van netwerkinfrastructuur op de campus: in gesprek!
 
Research data zone: veilige en geoptimaliseerde netwerkomgeving voor onderzoe...
Research data zone: veilige en geoptimaliseerde netwerkomgeving voor onderzoe...Research data zone: veilige en geoptimaliseerde netwerkomgeving voor onderzoe...
Research data zone: veilige en geoptimaliseerde netwerkomgeving voor onderzoe...
 
7-minute-speeches. Deel 2
7-minute-speeches. Deel 27-minute-speeches. Deel 2
7-minute-speeches. Deel 2
 
Nieuwe mogelijkheden van het SURFnet-netwerk Dashboard
Nieuwe mogelijkheden van het SURFnet-netwerk DashboardNieuwe mogelijkheden van het SURFnet-netwerk Dashboard
Nieuwe mogelijkheden van het SURFnet-netwerk Dashboard
 
7-minute-speeches
7-minute-speeches7-minute-speeches
7-minute-speeches
 
Winnende voorstellen location-based services - deel 2
Winnende voorstellen location-based services - deel 2Winnende voorstellen location-based services - deel 2
Winnende voorstellen location-based services - deel 2
 

Recently uploaded

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

Workshop 'Big data' Simon Hania

  • 1. Big data – Big brother? Using geolocation in a trustworthy and compliant way
  • 2. More than SatNavs… Consumer Automotive Business Solutions Licensing 2 09/10/2012
  • 3. Revolutionising navigation In 4 steps 4. TomTom HD Traffic 4. TomTom HD Traffic 3. IQ Routes 3. IQ Routes 2. Map Share 2. Map Share 1. Base maps 1. Base maps 4. TomTom HD Traffic 4. TomTom HD Traffic 3. IQ Routes 3. IQ Routes 2. Map Share 2. Map Share 1. Base maps 1. Base maps 3
  • 4. Community input – with permission We profile roads, not people 4
  • 5. TomToms trip archive Anonymous location and speed information from the TomTom user community 5 billion (10E9) speed measurements per day 5 trillion (10E12) speed measurements to date! by customers driving 50 billion kilometres and visiting every spot over 1,000 times
  • 6. Creating TomTom HD Traffic: data sources Range of high-quality real-time data sources 6
  • 7. TomTom HD Traffic coverage It covers up to 99.9% of all roads LONDON TMC coverage HD Traffic coverage Check for yourself on tomtom.com/livetraffic or use the 7 free TomTom Places App for iPhone or Android
  • 8. Intersection analysis Obsoletes time-consuming, expensive and inaccurate methods 8
  • 9. Travel times to hospital The reality check that can help to save lives LONDON Based on theoretical Based on real world maximum speeds measurements 9
  • 10. Origin/Destination analysis Example: Trips with Frankfurt Airport as destination • Where are your customers coming from? • What routes do they take? • How may drivers are passing? • Etc. • Combine with other geo-based data sources for additional analysis 10
  • 11. Location privacy is top of mind With bloggers, press, regulators, enforcers, legislators and many users • TomTom investigated by leading European Data Protection Authority in 2011 • TomTom’s use of location data is in accordance with EU Data Protection Laws • Processing and delivery to third parties 100% OK • Informing users needed to be more explicit, including opt-in 11
  • 12. Drivers, police & TomTom An explosive mixture 12
  • 13. Privacy, amongst others, is about the protection of personal data Personal data: • Contains (whatever) information relating to a natural (“real”) person • That person could be identified, directly or indirectly • Typically: data attached to unique identifiers Anonymous only: • When no reasonable way exists to identify (“single out”) a person • Even when requiring correlation with other data sources (e.g. maps and phonebooks) • By anyone with the right resources 13
  • 14. EU WP29 opinion “Geolocation services on smart mobile devices” Beware: engineers’ “binary” interpretation of principle based law with open norms • Data attached to a unique identifier (e.g. serial number, email address) or reversible pseudonym (e.g. a hash) is to be considered personal data • Location data originating from any individual is to be considered sensitive personal data: consent is the only acceptable legal basis for processing • Sending location data “off board” requires: • Freely given no pressure is felt to consent • Prior before processing starts • Informed explain purpose, duration and who has access • Explicit i.e. opt-in requiring a user action and separate from accepting T&C’s • Consent permission to go ahead • Information is required regarding: • What data is processed • Who will have access • Why is the data used • When will it be deleted • Where will the data be processed • Validity of consent is directly related to the quality of information towards the user • Consent renewal is required after prolonged period of non-use and at least every year • No feature creep: perfectly stick to the purpose as agreed to by the user • Erase location data right after use and never keep longer than 24 hours 14
  • 15. Typical personal data misconceptions very often present in technology companies • We do not identify the user while using the data, so we have no issues with privacy law • We only use the unique serial number of the users device, so the data is anonymous and we have no issues with privacy law • We encrypt the data, so we are no longer using/receiving/sending personal data • We use hashes to replace all serial numbers, so the data is now anonymous and we have no issues with privacy law • We anonimize the data, so we are not using personal data • We can use the users’ data for anything we want, as long as we keep the data to ourselves • Look: big name companies are doing the same, so we are OK 15
  • 16. TomTom & Privacy Vision: Principles: Community input (crowd 1. Avoid unpleasant surprises: sourcing) is strategic • Customer insight is paramount Privacy helps to realize business • Be open and explain – objectives by ensuring trust hesitation is an omen • Keep it simple Privacy is integral part of business 2. The customer remains in continuity above and beyond legal control of his personal data: we compliance have it “on a loan” 16
  • 17. Avoiding re-identification is key TomTom has a strict code of conduct to adhere to privacy laws 1 month • Historic trip archive only to be used for road, traffic and related purposes • No access to raw data outside TomTom, ever • TomTom performs 1 day processing • TomTom ensures re- identification is impossible e.g. through sufficient aggregation 17
  • 18. Community input – with permission We profile roads, not people 18
  • 19. Multi-disciplinary approach Don’t just leave it to the lawyers explanation & permission engineering & operations Expectation & law 19
  • 20. Recommendations • Incorporate data protection requirements from the start • Take a multi-disciplinary approach: it is about your “license to operate in the information society” • Embed “privacy by design” into development processes • Document your data: “what, why, when, who, where” • Appoint a “privacy czar” in your organization 20 20
  • 21. References • The EU Data Protection Directive (Directive 95/46/EC): http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:en:HTML • Working Party Article 29 opinion 13/2011 on "Geolocation services on smart mobile devices” http://ec.europa.eu/justice/policies/privacy/docs/wpdocs/2011/wp185_en.pdf • Working Party Article 29 opinion 15/2011 on "Consent” http://ec.europa.eu/justice/policies/privacy/docs/wpdocs/2011/wp187_en.pdf • The report on the Dutch Data Protection Authority investigation on TomTom's use of location data (in English): http://www.dutchdpa.nl/Pages/en_pb_20120112_investigation-tomtom.aspx • “How we use your data”: TomTom’s explanation on its use of location data http://www.tomtom.com/yourdata video: http://www.youtube.com/watch?v=ZfRkAQl2wWQ 21 21

Editor's Notes

  1. Animated, updated GSM, supersized imageRange of different sources, to enable reliable traffic detection on all roads in all situationsQuality of each source is important: precision of location (GPS better than GSM) and update frequency (logged every 2-5s, uploaded ~every 2 minutes)LIVE PND are connected TomTom GPS navigation devicesIn dash navigation currently limited to Europe (Renault, Fiat, Mazda)iPhone data is only from users of TomTom navigation application on the device – and GPS trace data only passed to TomTom if the user subscribes to LIVE services and the device is docked in the TomTom holderBusiness solutions is the TomTom unit focused on connected products for fleet owners (delivery vans, maintenance cars, etc)3rd party GPS data only used in selected countries (USA, South Africa & New Zealand)GSM probes only active in 8 countries (notably not in USA)Incident data = journalistic data describing the cause of the congestion / delay e.g. accident