SlideShare a Scribd company logo
1 of 20
Ann Cavoukian, Ph.D.Ann Cavoukian, Ph.D.
Executive Director
Privacy and Big Data Institute
Ryerson University
Let’s Get Real:
We Need Privacy AND Smart Data Analytics
De-identification Symposium
Ryerson University
October 21, 2014
Let’s Dispel Some Myths
Zero Risk Doesn’t Exist
Privacy ≠ Secrecy
Privacy is not about having
something to hide
Privacy = Personal Control
•User control is critical
•Freedom of choice
•Informational self-determination
Context is key!
Privacy is Essential to Freedom:
A Necessary Condition for Societal Prosperity
and Well-Being
• Innovation, creativity, and the resultant prosperity of a
society requires freedom;
• Privacy is the essence of freedom: Without privacy, individual
human rights, property rights and civil liberties – the conceptual
engines of innovation and creativity, could not exist in a meaningful
manner;
• Surveillance is the antithesis of privacy: A negative
consequence of surveillance is the usurpation of a person’s limited
cognitive bandwidth, away from innovation and creativity.
Landmark Resolution Passed to Preserve
the Future of Privacy
By Anna Ohlden – October 29th 2010 - http://www.science20.com/newswire/landmark_resolution_passed_preserve_future_privacy
JERUSALEM, October 29, 2010 – A landmark Resolution by Ontario's
Information and Privacy Commissioner, Dr. Ann Cavoukian, was approved by
international Data Protection and Privacy Commissioners in Jerusalem today at their
annual conference. The resolution recognizes Commissioner Cavoukian's concept of
Privacy by Design - which ensures that privacy is embedded into new technologies
and business practices, right from the outset - as an essential component of
fundamental privacy protection.
Full Article:
http://www.science20.com/newswire/landmark_resolution_passed_preserve_future_privacy
Adoption of “Privacy by Design”
as an International Standard
1. English
2. French
3. German
4. Spanish
5. Italian
6. Czech
7. Dutch
8. Estonian
9. Hebrew
10.Hindi
11.Chinese
12.Japanese
13. Arabic
14. Armenian
15. Ukrainian
16. Korean
17. Russian
18. Romanian
19. Portuguese
20. Maltese
21. Greek
22. Macedonian
23. Bulgarian
24. Croatian
25. Polish
26. Turkish
27. Malaysian
28. Indonesian
29. Danish
30. Hungarian
31. Norwegian
32. Serbian
33. Lithuanian
34. Farsi
35. Finnish
36. Albanian
37. Catalan
Privacy by Design:
Proactive in 37 Languages!
Privacy by Design’s Greatest Strength –
Positive-Sum: The Power of “And”
Change the paradigm from
the dated zero-sum (win/win)
to a “positive-sum” model:
Create a win/win scenario,
not an either/or (vs.)
involving unnecessary trade-offs
and false dichotomies …
replace “vs.” with “and”
Privacy by Design:
The 7 Foundational Principles
1. Proactive not Reactive:
Preventative, not Remedial;
2. Privacy as the Default setting;
3. Privacy Embedded into Design;
4. Full Functionality:
Positive-Sum, not Zero-Sum;
5. End-to-End Security:
Full Lifecycle Protection;
6. Visibility and Transparency:
Keep it Open;
7. Respect for User Privacy:
Keep it User-Centric.
Big Data
Big Data
• 90% of all data was created within the last 2 years;
• Big Data analysis and data analytics promise new
opportunities to gain valuable insights and benefits –
new predictive modes of analysis;
• But, it will also enable expanded surveillance, increasing
the risk of unauthorized use and disclosure, on a scale
previously unimaginable.
Big Data Technology is Not Foolproof
• “Despite rampant interest from enterprise
leaders and often sizeable investments in
Big Data technologies, many programs still
sputter or fail completely.”
— Evanta Leadership Network,
May 29, 2014.
Big Data is moving from its
“inflated expectations” phase
to a “trough of disillusionment.”
— Gartner Hype Cycle,
April, 2014
— Commissioner Cavoukian
“Privacy is just as Big as
Big Data. The tools exist to
systemically protect personal
information and bring about
the benefits of Big Data.
Together we can ensure that
Big Data and ‘Big Privacy’
can both be accomplished to
enable win-win scenario.”
“The success of data
analytics will depend on the
ability to ensure that
individuals’ privacy is
respected. One of the most
effective ways in which to do
this is through strong
“de-identification” of the
data — in essence, storing
and sharing the data without
revealing the identity of the
individuals involved.”
— Commissioner Cavoukian
“There are considerable
risks in abandoning
de-identification efforts,
including the fact that
individuals and
organizations may simply
cease disclosing de-
identified information for
secondary purposes, even
those seen to be in the
public interest.”
— Commissioner Cavoukian
Big Data
Needs
Big Privacy!
Contact Information
Ann Cavoukian, Ph.D.Ann Cavoukian, Ph.D.
Executive Director
Privacy and Big Data Institute
Ryerson University
285 Victoria Street
Toronto, Ontario
M5B 2K3
Phone: (416) 979-5000 ext. 3138
ann.cavoukian@ryerson.ca
ann.cavoukian@
ryerson.ca
twitter.com/Pri
acyBigData

More Related Content

What's hot

Dwyer ISSA Presentation
Dwyer ISSA PresentationDwyer ISSA Presentation
Dwyer ISSA PresentationCathy Dwyer
 
Exploring Emergent Consumer Experience: A Topological Data Analysis Approach
Exploring Emergent Consumer Experience: A Topological Data Analysis ApproachExploring Emergent Consumer Experience: A Topological Data Analysis Approach
Exploring Emergent Consumer Experience: A Topological Data Analysis ApproachDonna Hoffman
 
Privacy by design for peerlyst meetup
Privacy by design for peerlyst meetupPrivacy by design for peerlyst meetup
Privacy by design for peerlyst meetupIshay Tentser
 
Big data security the perfect storm
Big data security   the perfect stormBig data security   the perfect storm
Big data security the perfect stormUlf Mattsson
 
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Praveenkumar Hosangadi
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big dataPeter Wood
 
Using Topological Data Analysis to Explore Emergent Consumer Experience from ...
Using Topological Data Analysis to Explore Emergent Consumer Experience from ...Using Topological Data Analysis to Explore Emergent Consumer Experience from ...
Using Topological Data Analysis to Explore Emergent Consumer Experience from ...Donna Hoffman
 
4 principles to get full benefit of the Internet of Things
4 principles to get full benefit of the Internet of Things4 principles to get full benefit of the Internet of Things
4 principles to get full benefit of the Internet of ThingsW. David Stephenson
 
Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011
Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011
Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011Jason Hong
 
Helen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry CollaborationHelen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry Collaborationcentralohioissa
 
Consumer Experience in the Internet of Things
Consumer Experience in the Internet of ThingsConsumer Experience in the Internet of Things
Consumer Experience in the Internet of ThingsDonna Hoffman
 
Technologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible CyberspaceTechnologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible Cyberspacemark-smith
 
Privacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the artPrivacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the artJames Mulhern
 
Consumer Experience in the Internet of Things: Conceptual Foundations
Consumer Experience in the Internet of Things: Conceptual FoundationsConsumer Experience in the Internet of Things: Conceptual Foundations
Consumer Experience in the Internet of Things: Conceptual FoundationsDonna Hoffman
 
The REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on PrivacyThe REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on PrivacyClaudiu Popa
 
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis
 
Spotlight on Technology 2017
Spotlight on Technology 2017Spotlight on Technology 2017
Spotlight on Technology 2017Craig Devlin
 
Scrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanScrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanNetIQ
 

What's hot (20)

Dwyer ISSA Presentation
Dwyer ISSA PresentationDwyer ISSA Presentation
Dwyer ISSA Presentation
 
Exploring Emergent Consumer Experience: A Topological Data Analysis Approach
Exploring Emergent Consumer Experience: A Topological Data Analysis ApproachExploring Emergent Consumer Experience: A Topological Data Analysis Approach
Exploring Emergent Consumer Experience: A Topological Data Analysis Approach
 
Privacy by design for peerlyst meetup
Privacy by design for peerlyst meetupPrivacy by design for peerlyst meetup
Privacy by design for peerlyst meetup
 
Big data security the perfect storm
Big data security   the perfect stormBig data security   the perfect storm
Big data security the perfect storm
 
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big data
 
Using Topological Data Analysis to Explore Emergent Consumer Experience from ...
Using Topological Data Analysis to Explore Emergent Consumer Experience from ...Using Topological Data Analysis to Explore Emergent Consumer Experience from ...
Using Topological Data Analysis to Explore Emergent Consumer Experience from ...
 
4 principles to get full benefit of the Internet of Things
4 principles to get full benefit of the Internet of Things4 principles to get full benefit of the Internet of Things
4 principles to get full benefit of the Internet of Things
 
Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011
Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011
Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011
 
Helen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry CollaborationHelen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry Collaboration
 
Consumer Experience in the Internet of Things
Consumer Experience in the Internet of ThingsConsumer Experience in the Internet of Things
Consumer Experience in the Internet of Things
 
Technologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible CyberspaceTechnologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible Cyberspace
 
Privacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the artPrivacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the art
 
Consumer Experience in the Internet of Things: Conceptual Foundations
Consumer Experience in the Internet of Things: Conceptual FoundationsConsumer Experience in the Internet of Things: Conceptual Foundations
Consumer Experience in the Internet of Things: Conceptual Foundations
 
The REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on PrivacyThe REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on Privacy
 
Big Data & Privacy
Big Data & PrivacyBig Data & Privacy
Big Data & Privacy
 
Data ethics
Data ethicsData ethics
Data ethics
 
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
 
Spotlight on Technology 2017
Spotlight on Technology 2017Spotlight on Technology 2017
Spotlight on Technology 2017
 
Scrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanScrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky Clean
 

Viewers also liked

Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowdenblogzilla
 
Ethics & Privacy for Learning Analytics
Ethics & Privacy for Learning AnalyticsEthics & Privacy for Learning Analytics
Ethics & Privacy for Learning AnalyticsTore Hoel
 
(Graham Brown) We trust big data but the data is wrong: social business and p...
(Graham Brown) We trust big data but the data is wrong: social business and p...(Graham Brown) We trust big data but the data is wrong: social business and p...
(Graham Brown) We trust big data but the data is wrong: social business and p...Graham Brown
 
Data security issues, ethical issues and challenges to privacy in knowledge-i...
Data security issues, ethical issues and challenges to privacy in knowledge-i...Data security issues, ethical issues and challenges to privacy in knowledge-i...
Data security issues, ethical issues and challenges to privacy in knowledge-i...Tore Hoel
 
Information security in big data -privacy and data mining
Information security in big data -privacy and data miningInformation security in big data -privacy and data mining
Information security in big data -privacy and data miningharithavijay94
 

Viewers also liked (6)

Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
 
Ethics & Privacy for Learning Analytics
Ethics & Privacy for Learning AnalyticsEthics & Privacy for Learning Analytics
Ethics & Privacy for Learning Analytics
 
Trade agreements and data flows
Trade agreements and data flowsTrade agreements and data flows
Trade agreements and data flows
 
(Graham Brown) We trust big data but the data is wrong: social business and p...
(Graham Brown) We trust big data but the data is wrong: social business and p...(Graham Brown) We trust big data but the data is wrong: social business and p...
(Graham Brown) We trust big data but the data is wrong: social business and p...
 
Data security issues, ethical issues and challenges to privacy in knowledge-i...
Data security issues, ethical issues and challenges to privacy in knowledge-i...Data security issues, ethical issues and challenges to privacy in knowledge-i...
Data security issues, ethical issues and challenges to privacy in knowledge-i...
 
Information security in big data -privacy and data mining
Information security in big data -privacy and data miningInformation security in big data -privacy and data mining
Information security in big data -privacy and data mining
 

Similar to The Myth of Zero-Risk Solutions; The Benefits of Privacy by Design

Feroot Smart Technology Privacy Summit: Privacy, Facial Recognition & Intelli...
Feroot Smart Technology Privacy Summit: Privacy, Facial Recognition & Intelli...Feroot Smart Technology Privacy Summit: Privacy, Facial Recognition & Intelli...
Feroot Smart Technology Privacy Summit: Privacy, Facial Recognition & Intelli...Feroot
 
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Design
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by DesignSay Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Design
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Designbradley_g
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsIrish Future Internet Forum
 
Innovation series 112318
Innovation series 112318Innovation series 112318
Innovation series 112318Tim Maurer
 
Future of privacy - Insights from Discussions Building on an Initial Perspect...
Future of privacy - Insights from Discussions Building on an Initial Perspect...Future of privacy - Insights from Discussions Building on an Initial Perspect...
Future of privacy - Insights from Discussions Building on an Initial Perspect...Future Agenda
 
2016 HPESR Cyber Risk Report
2016 HPESR Cyber Risk Report2016 HPESR Cyber Risk Report
2016 HPESR Cyber Risk ReportAngela Gunn
 
HPE Cyber Risk Report 2016
HPE Cyber Risk Report 2016HPE Cyber Risk Report 2016
HPE Cyber Risk Report 2016Tim Grieveson
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in MindGosia Fraser
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspectiveSravan Ankaraju
 
Presentation2 [Autosaved].pdf
Presentation2 [Autosaved].pdfPresentation2 [Autosaved].pdf
Presentation2 [Autosaved].pdfMustafasahibZada3
 
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityDeepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityPC Doctors NET
 
The X Factor in Data Centric Security
The X Factor in Data Centric SecurityThe X Factor in Data Centric Security
The X Factor in Data Centric SecurityWatchful Software
 
Cyber Security and the CEO
Cyber Security and the CEOCyber Security and the CEO
Cyber Security and the CEOMicheal Axelsen
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, LondonJohn Palfreyman
 
Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Ludmila Morozova-Buss
 
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face Detection
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face DetectionA Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face Detection
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face DetectionIRJET Journal
 
Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...Dave Holland
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 

Similar to The Myth of Zero-Risk Solutions; The Benefits of Privacy by Design (20)

Feroot Smart Technology Privacy Summit: Privacy, Facial Recognition & Intelli...
Feroot Smart Technology Privacy Summit: Privacy, Facial Recognition & Intelli...Feroot Smart Technology Privacy Summit: Privacy, Facial Recognition & Intelli...
Feroot Smart Technology Privacy Summit: Privacy, Facial Recognition & Intelli...
 
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Design
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by DesignSay Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Design
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Design
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
 
Innovation series 112318
Innovation series 112318Innovation series 112318
Innovation series 112318
 
Future of privacy - Insights from Discussions Building on an Initial Perspect...
Future of privacy - Insights from Discussions Building on an Initial Perspect...Future of privacy - Insights from Discussions Building on an Initial Perspect...
Future of privacy - Insights from Discussions Building on an Initial Perspect...
 
2016 HPESR Cyber Risk Report
2016 HPESR Cyber Risk Report2016 HPESR Cyber Risk Report
2016 HPESR Cyber Risk Report
 
HPE Security Report 2016
HPE Security Report 2016HPE Security Report 2016
HPE Security Report 2016
 
HPE Cyber Risk Report 2016
HPE Cyber Risk Report 2016HPE Cyber Risk Report 2016
HPE Cyber Risk Report 2016
 
Hpe security research cyber risk report 2016
Hpe security research  cyber risk report 2016Hpe security research  cyber risk report 2016
Hpe security research cyber risk report 2016
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
 
Presentation2 [Autosaved].pdf
Presentation2 [Autosaved].pdfPresentation2 [Autosaved].pdf
Presentation2 [Autosaved].pdf
 
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityDeepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
 
The X Factor in Data Centric Security
The X Factor in Data Centric SecurityThe X Factor in Data Centric Security
The X Factor in Data Centric Security
 
Cyber Security and the CEO
Cyber Security and the CEOCyber Security and the CEO
Cyber Security and the CEO
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, London
 
Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!
 
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face Detection
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face DetectionA Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face Detection
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face Detection
 
Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 

Recently uploaded

APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 

Recently uploaded (20)

APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 

The Myth of Zero-Risk Solutions; The Benefits of Privacy by Design

  • 1. Ann Cavoukian, Ph.D.Ann Cavoukian, Ph.D. Executive Director Privacy and Big Data Institute Ryerson University Let’s Get Real: We Need Privacy AND Smart Data Analytics De-identification Symposium Ryerson University October 21, 2014
  • 4. Privacy ≠ Secrecy Privacy is not about having something to hide
  • 5. Privacy = Personal Control •User control is critical •Freedom of choice •Informational self-determination Context is key!
  • 6. Privacy is Essential to Freedom: A Necessary Condition for Societal Prosperity and Well-Being • Innovation, creativity, and the resultant prosperity of a society requires freedom; • Privacy is the essence of freedom: Without privacy, individual human rights, property rights and civil liberties – the conceptual engines of innovation and creativity, could not exist in a meaningful manner; • Surveillance is the antithesis of privacy: A negative consequence of surveillance is the usurpation of a person’s limited cognitive bandwidth, away from innovation and creativity.
  • 7. Landmark Resolution Passed to Preserve the Future of Privacy By Anna Ohlden – October 29th 2010 - http://www.science20.com/newswire/landmark_resolution_passed_preserve_future_privacy JERUSALEM, October 29, 2010 – A landmark Resolution by Ontario's Information and Privacy Commissioner, Dr. Ann Cavoukian, was approved by international Data Protection and Privacy Commissioners in Jerusalem today at their annual conference. The resolution recognizes Commissioner Cavoukian's concept of Privacy by Design - which ensures that privacy is embedded into new technologies and business practices, right from the outset - as an essential component of fundamental privacy protection. Full Article: http://www.science20.com/newswire/landmark_resolution_passed_preserve_future_privacy Adoption of “Privacy by Design” as an International Standard
  • 8. 1. English 2. French 3. German 4. Spanish 5. Italian 6. Czech 7. Dutch 8. Estonian 9. Hebrew 10.Hindi 11.Chinese 12.Japanese 13. Arabic 14. Armenian 15. Ukrainian 16. Korean 17. Russian 18. Romanian 19. Portuguese 20. Maltese 21. Greek 22. Macedonian 23. Bulgarian 24. Croatian 25. Polish 26. Turkish 27. Malaysian 28. Indonesian 29. Danish 30. Hungarian 31. Norwegian 32. Serbian 33. Lithuanian 34. Farsi 35. Finnish 36. Albanian 37. Catalan Privacy by Design: Proactive in 37 Languages!
  • 9. Privacy by Design’s Greatest Strength – Positive-Sum: The Power of “And” Change the paradigm from the dated zero-sum (win/win) to a “positive-sum” model: Create a win/win scenario, not an either/or (vs.) involving unnecessary trade-offs and false dichotomies … replace “vs.” with “and”
  • 10. Privacy by Design: The 7 Foundational Principles 1. Proactive not Reactive: Preventative, not Remedial; 2. Privacy as the Default setting; 3. Privacy Embedded into Design; 4. Full Functionality: Positive-Sum, not Zero-Sum; 5. End-to-End Security: Full Lifecycle Protection; 6. Visibility and Transparency: Keep it Open; 7. Respect for User Privacy: Keep it User-Centric.
  • 12. Big Data • 90% of all data was created within the last 2 years; • Big Data analysis and data analytics promise new opportunities to gain valuable insights and benefits – new predictive modes of analysis; • But, it will also enable expanded surveillance, increasing the risk of unauthorized use and disclosure, on a scale previously unimaginable.
  • 13. Big Data Technology is Not Foolproof • “Despite rampant interest from enterprise leaders and often sizeable investments in Big Data technologies, many programs still sputter or fail completely.” — Evanta Leadership Network, May 29, 2014.
  • 14. Big Data is moving from its “inflated expectations” phase to a “trough of disillusionment.” — Gartner Hype Cycle, April, 2014
  • 15.
  • 16. — Commissioner Cavoukian “Privacy is just as Big as Big Data. The tools exist to systemically protect personal information and bring about the benefits of Big Data. Together we can ensure that Big Data and ‘Big Privacy’ can both be accomplished to enable win-win scenario.”
  • 17. “The success of data analytics will depend on the ability to ensure that individuals’ privacy is respected. One of the most effective ways in which to do this is through strong “de-identification” of the data — in essence, storing and sharing the data without revealing the identity of the individuals involved.” — Commissioner Cavoukian
  • 18. “There are considerable risks in abandoning de-identification efforts, including the fact that individuals and organizations may simply cease disclosing de- identified information for secondary purposes, even those seen to be in the public interest.” — Commissioner Cavoukian
  • 20. Contact Information Ann Cavoukian, Ph.D.Ann Cavoukian, Ph.D. Executive Director Privacy and Big Data Institute Ryerson University 285 Victoria Street Toronto, Ontario M5B 2K3 Phone: (416) 979-5000 ext. 3138 ann.cavoukian@ryerson.ca ann.cavoukian@ ryerson.ca twitter.com/Pri acyBigData

Editor's Notes

  1. Privacy is Essential to Freedom And we will be releasing our 3rd paper in our trilogy on Dig Data with Deloitte in the spring!
  2. PbD in 37 Languages
  3. 7 Foundational Principles
  4. Big Data
  5. MIT – Alex Pentland “… as we learn that it cant yet do what it advocates claim. Once we appreciate its limits, however, we’ll more clearly see its benefits.”
  6. June 10 - IPC/Deloitte Big Data Paper This paper demonstrates how privacy and responsibility can be advanced in this new age of Big Data analytics: “Context Actualizing” The big change is Big Data. More specifically, how organizations will leverage Big Data analytics to maximize these growing information assets — driven by their deep interest to maximize their resources and better compete in the market. While organizations have practical incentives to make the most of their ever-growing observation space (the data they have access to), they also have a pressing need to embed in these systems enhanced privacy protections. We outline in this paper just such an example — how an advanced Big Data sensemaking technology was, from the ground up, engineered with privacy-enhancing features. Some of these features are so critical to accuracy that the team decided they should be mandatory — so deeply baked-in they cannot be turned off.
  7. IPC – ITIF Paper
  8. IPC/Khaled Paper