Your SlideShare is downloading. ×
Privacy as a key system requirement for building trust
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Privacy as a key system requirement for building trust

1,432
views

Published on

Published in: Economy & Finance, Technology

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,432
On Slideshare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
11
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Privacy as a key system requirement for building trust Dr Ian Brown
  • 2. HMRC data debacle  25m names, addresses, dates of birth, Child Benefit numbers, National Insurance numbers and bank or building society account details lost  A stream of other losses to be Steve Bell, The Guardian, 22/11/07 revealed
  • 3. Insider fraud Information required Price paid to Price to ‘blagger’ customer Occupant search/Electoral roll check not known £17.50 (obtaining address) Telephone reverse trace £40 £75 Telephone conversion (mobile) not known £75 Friends and Family £60 – £80 not known Vehicle check at DVLA £70 £150 – £200 Criminal records check not known £500 Area search (locating a named person not known £60 across a wide area) Company/Director search not known £40 Ex-directory search £40 £65 – £75 Mobile telephone account enquiries not known £750 Licence check not known £250 Source: “What price privacy?”, Information Commissioner, May 2006
  • 4. Engineering privacy  Privacy, like security, must be built in to a system from the start - not bolted on at a late stage  Key legal and technology requirements are minimisation (of personal data collected, purpose, time kept, access given) and protection (data stored securely and access strictly limited)
  • 5. Privacy Directive principles 1. Personal data shall be processed fairly and lawfully 2. Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes. 3. Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed. 4. Personal data shall be accurate and, where necessary, kept up to date. 5. Personal data processed for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes. 6. Personal data shall be processed in accordance with the rights of data subjects under this Act. 7. Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destructionof, or damage to, personal data. 8. Personal data shall not be transferred to a country or territory outside the European Economic Area unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data.
  • 6. Minimisation  Why is personal data being collected in the first place?  Identification vs authorisation  Privacy Enhancing Technologies  Distributed v centralised
  • 7. Protection  Data held and transmitted securely to prevent unauthorised access and modification  Extensive protection against data loss or corruption  Resistant to Denial of Service attacks  All transactions must be loggable by user
  • 8. Some (bad) UK examples  NPfIT (over 1 million potential users)  ContactPoint (330,000 users)  National Identity Register (public & private sector use)