SlideShare a Scribd company logo
1 of 27
Download to read offline
Privacy in the age of
’BIG DATA’
  56th UIA Dresde Congress - November 1st, 2012
            ‘Rights of the Digital Person’

                       Marc Gallardo
                                              email:
          marc.gallardo@alliantabogados.com
# Summary




   1.- What is ‘Big Data’
       2.- Big Benefits
3.- Big Privacy Challenges
     4.- Final Remarks
# 1 Definition




‘Big data usually refers to data sets
whose size is beyond the ability of
commonly-used technology tools to
capture, store, manage, and process
the data within a tolerable elapsed
time             and            cost’

    Not a new concept: « data mining »
# Defining Features
Privacy in the Age of Big Data
5 exabytes of information created between the
      dawn of civilization through 2003


   Now 3 exabytes are created every day
              1 terabyte (TB) = 1000 gigabytes (GB)
            1 petabyte (PB) = 1.000.000 gigabytes (GB)
          1 exabyte (EB) = 1.000.000.000 gigabytes (GB)
       1 zettabyte (ZB) = 1.000.000.000.000 gigabytes (GB)


  90 % of the data that now exists has been
         created in the last 2 years

            … and the pace is growing
Privacy in the Age of Big Data
# Other data sources
Tech
   data                           Innovation



                                    Software
                  Collection    (Hadoop, NoSQL)
Vast amount of                     Hardware
                   Storage
      data        Processing       (faster processors,
                                 cheaper, bigger storage)
                 Sense-making


                 BIG DATA
# 2 Benefits
Privacy in the Age of Big Data
# 3 Privacy Risks




Big Data challenges
 some of the core
 privacy principles
Privacy in the Age of Big Data
Privacy in the Age of Big Data
Is the information amassed for such
   analysis TRULY ANONYMOUS?

        We can not be sure !!!

It can be relatively easy to take some
    types of de-identified data and
reassociate it with specific individuals
Privacy in the Age of Big Data
Re-identification of data subjects
using Non Personal Data (NPD)

Whether or not NPD that forms
the basis for data extractions of
new knowledge is covered by our
data protection laws
Privacy in the Age of Big Data
Personal data is any
information        about
identified or identifiable
person
Privacy in the Age of Big Data
# De Lege Ferenda




 Definition of PD and data subject
  might be expanded to cover
  technologies (i.e. data mining) that
  make reverse engineering of forms of
  « anonymisation » more feasible.

  > crux point for the Regulation not to
  become quickly obsolete.
Consent of Data Subject:

Freely given, specific, informed & explicit:
statement or affirmative action.

The problem under BD scenario is the DC
don’t know in advance what he may discover
after mining data so the data subject cannot
knowingly consent to the use of his data.
Automated individual decisions (AID) art. 15 DPD

Grants the right not to be subject to a decision
that produces legal effects which is based solely on
automated processing of data intented to evaluate
certain personal aspects.

Art. 12(a) grants the right to discover « the
knowledge of the logic ».

Limited scope: human intervention / knowledge
and remedy.
Automated individual decisions (AID) art. 20 DPR

Grants same right to oppose more broadly: not
only « evaluate » but analyse or predict the
person’s perfomance at work, economic situation,
location, health, personal preferences, reliability or
behaviour.

Right to « know the logic » is eliminated.

Right to know the existence and envisaged effect
of profiling.
To BD collectors & processors:

I. Engage PIA to identify and address risks relating
to                   BD                     analysis

2.- Be clear about what you collect and process

3.-     Use       de-identification      techniques

4.- Secure the data to avoid data breaches
Good trend and the real challenge
         for regulators

Preserve BD rewards
  whilst seeking to
minimize privacy risks
# End




THANK YOU

More Related Content

What's hot

Big Data & the Cloud
Big Data & the CloudBig Data & the Cloud
Big Data & the CloudDATAVERSITY
 
Introducing Technologies for Handling Big Data by Jaseela
Introducing Technologies for Handling Big Data by JaseelaIntroducing Technologies for Handling Big Data by Jaseela
Introducing Technologies for Handling Big Data by JaseelaStudent
 
Privacy and Big Data Overload!
Privacy and Big Data Overload!Privacy and Big Data Overload!
Privacy and Big Data Overload!SparkPost
 
Presentation About Big Data (DBMS)
Presentation About Big Data (DBMS)Presentation About Big Data (DBMS)
Presentation About Big Data (DBMS)SiamAhmed16
 
Symantec Data Insight
Symantec Data InsightSymantec Data Insight
Symantec Data InsightSymantec
 
Big data by Mithlesh sadh
Big data by Mithlesh sadhBig data by Mithlesh sadh
Big data by Mithlesh sadhMithlesh Sadh
 
Big Data PPT by Rohit Dubey
Big Data PPT by Rohit DubeyBig Data PPT by Rohit Dubey
Big Data PPT by Rohit DubeyRohit Dubey
 
IABE Big Data information paper - An actuarial perspective
IABE Big Data information paper - An actuarial perspectiveIABE Big Data information paper - An actuarial perspective
IABE Big Data information paper - An actuarial perspectiveMateusz Maj
 
The Future Of Big Data
The Future Of Big DataThe Future Of Big Data
The Future Of Big DataMatthew Dennis
 
Big data analysis using map/reduce
Big data analysis using map/reduceBig data analysis using map/reduce
Big data analysis using map/reduceRenuSuren
 

What's hot (20)

Big Data Hadoop Training by Easylearning Guru
Big Data Hadoop Training by Easylearning GuruBig Data Hadoop Training by Easylearning Guru
Big Data Hadoop Training by Easylearning Guru
 
Big Data & the Cloud
Big Data & the CloudBig Data & the Cloud
Big Data & the Cloud
 
What is big data?
What is big data?What is big data?
What is big data?
 
Introducing Technologies for Handling Big Data by Jaseela
Introducing Technologies for Handling Big Data by JaseelaIntroducing Technologies for Handling Big Data by Jaseela
Introducing Technologies for Handling Big Data by Jaseela
 
Privacy and Big Data Overload!
Privacy and Big Data Overload!Privacy and Big Data Overload!
Privacy and Big Data Overload!
 
Big data
Big dataBig data
Big data
 
Presentation About Big Data (DBMS)
Presentation About Big Data (DBMS)Presentation About Big Data (DBMS)
Presentation About Big Data (DBMS)
 
Symantec Data Insight
Symantec Data InsightSymantec Data Insight
Symantec Data Insight
 
Big data-ppt
Big data-pptBig data-ppt
Big data-ppt
 
Research paper on big data and hadoop
Research paper on big data and hadoopResearch paper on big data and hadoop
Research paper on big data and hadoop
 
Big data by Mithlesh sadh
Big data by Mithlesh sadhBig data by Mithlesh sadh
Big data by Mithlesh sadh
 
Big data
Big dataBig data
Big data
 
Data Science
Data ScienceData Science
Data Science
 
Motivation for big data
Motivation for big dataMotivation for big data
Motivation for big data
 
Big_data_ppt
Big_data_ppt Big_data_ppt
Big_data_ppt
 
Big Data PPT by Rohit Dubey
Big Data PPT by Rohit DubeyBig Data PPT by Rohit Dubey
Big Data PPT by Rohit Dubey
 
IABE Big Data information paper - An actuarial perspective
IABE Big Data information paper - An actuarial perspectiveIABE Big Data information paper - An actuarial perspective
IABE Big Data information paper - An actuarial perspective
 
The Future Of Big Data
The Future Of Big DataThe Future Of Big Data
The Future Of Big Data
 
Our big data
Our big dataOur big data
Our big data
 
Big data analysis using map/reduce
Big data analysis using map/reduceBig data analysis using map/reduce
Big data analysis using map/reduce
 

Similar to Privacy in the Age of Big Data

Scott Edmunds slides from #IDCC13 Data Science session
Scott Edmunds slides from #IDCC13 Data Science sessionScott Edmunds slides from #IDCC13 Data Science session
Scott Edmunds slides from #IDCC13 Data Science sessionGigaScience, BGI Hong Kong
 
Big Data in Distributed Analytics,Cybersecurity And Digital Forensics
Big Data in Distributed Analytics,Cybersecurity And Digital ForensicsBig Data in Distributed Analytics,Cybersecurity And Digital Forensics
Big Data in Distributed Analytics,Cybersecurity And Digital ForensicsSherinMariamReji05
 
An Overview of BigData
An Overview of BigDataAn Overview of BigData
An Overview of BigDataValarmathi V
 
SWOT of Bigdata Security Using Machine Learning Techniques
SWOT of Bigdata Security Using Machine Learning TechniquesSWOT of Bigdata Security Using Machine Learning Techniques
SWOT of Bigdata Security Using Machine Learning Techniquesijistjournal
 
How MongoDB can accelerate a path to GDPR compliance
How MongoDB can accelerate a path to GDPR complianceHow MongoDB can accelerate a path to GDPR compliance
How MongoDB can accelerate a path to GDPR complianceMongoDB
 
Data Mining in the World of BIG Data-A Survey
Data Mining in the World of BIG Data-A SurveyData Mining in the World of BIG Data-A Survey
Data Mining in the World of BIG Data-A SurveyEditor IJCATR
 
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data DistortionMultilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data DistortionIOSR Journals
 
Information Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data MiningInformation Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data Miningwanani181
 
Big Data Mining, Techniques, Handling Technologies and Some Related Issues: A...
Big Data Mining, Techniques, Handling Technologies and Some Related Issues: A...Big Data Mining, Techniques, Handling Technologies and Some Related Issues: A...
Big Data Mining, Techniques, Handling Technologies and Some Related Issues: A...IJSRD
 
Big Data Mining, Techniques, Handling Technologies and Some Related Issues: A...
Big Data Mining, Techniques, Handling Technologies and Some Related Issues: A...Big Data Mining, Techniques, Handling Technologies and Some Related Issues: A...
Big Data Mining, Techniques, Handling Technologies and Some Related Issues: A...IJSRD
 
Unlocking Value in the Fragmented World of Big Data Analytics (POV Paper)
Unlocking Value in the Fragmented World of Big Data Analytics (POV Paper)Unlocking Value in the Fragmented World of Big Data Analytics (POV Paper)
Unlocking Value in the Fragmented World of Big Data Analytics (POV Paper)Cisco Service Provider Mobility
 
Big data management
Big data managementBig data management
Big data managementzeba khanam
 
big data Big Things
big data Big Thingsbig data Big Things
big data Big Thingspateelhs
 

Similar to Privacy in the Age of Big Data (20)

Scott Edmunds slides from #IDCC13 Data Science session
Scott Edmunds slides from #IDCC13 Data Science sessionScott Edmunds slides from #IDCC13 Data Science session
Scott Edmunds slides from #IDCC13 Data Science session
 
Big Data in Distributed Analytics,Cybersecurity And Digital Forensics
Big Data in Distributed Analytics,Cybersecurity And Digital ForensicsBig Data in Distributed Analytics,Cybersecurity And Digital Forensics
Big Data in Distributed Analytics,Cybersecurity And Digital Forensics
 
An Overview of BigData
An Overview of BigDataAn Overview of BigData
An Overview of BigData
 
SWOT of Bigdata Security Using Machine Learning Techniques
SWOT of Bigdata Security Using Machine Learning TechniquesSWOT of Bigdata Security Using Machine Learning Techniques
SWOT of Bigdata Security Using Machine Learning Techniques
 
How MongoDB can accelerate a path to GDPR compliance
How MongoDB can accelerate a path to GDPR complianceHow MongoDB can accelerate a path to GDPR compliance
How MongoDB can accelerate a path to GDPR compliance
 
Data Ownership: Who Owns 'My Data'?
Data Ownership: Who Owns 'My Data'?Data Ownership: Who Owns 'My Data'?
Data Ownership: Who Owns 'My Data'?
 
Hi2413031309
Hi2413031309Hi2413031309
Hi2413031309
 
Unit 2
Unit 2Unit 2
Unit 2
 
Big data
Big dataBig data
Big data
 
Big data
Big dataBig data
Big data
 
Data Mining in the World of BIG Data-A Survey
Data Mining in the World of BIG Data-A SurveyData Mining in the World of BIG Data-A Survey
Data Mining in the World of BIG Data-A Survey
 
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data DistortionMultilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
 
Information Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data MiningInformation Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data Mining
 
Big Data Mining, Techniques, Handling Technologies and Some Related Issues: A...
Big Data Mining, Techniques, Handling Technologies and Some Related Issues: A...Big Data Mining, Techniques, Handling Technologies and Some Related Issues: A...
Big Data Mining, Techniques, Handling Technologies and Some Related Issues: A...
 
Big Data Mining, Techniques, Handling Technologies and Some Related Issues: A...
Big Data Mining, Techniques, Handling Technologies and Some Related Issues: A...Big Data Mining, Techniques, Handling Technologies and Some Related Issues: A...
Big Data Mining, Techniques, Handling Technologies and Some Related Issues: A...
 
Big data.pptx
Big data.pptxBig data.pptx
Big data.pptx
 
Unlocking Value in the Fragmented World of Big Data Analytics (POV Paper)
Unlocking Value in the Fragmented World of Big Data Analytics (POV Paper)Unlocking Value in the Fragmented World of Big Data Analytics (POV Paper)
Unlocking Value in the Fragmented World of Big Data Analytics (POV Paper)
 
Big data management
Big data managementBig data management
Big data management
 
Sible 09
Sible 09Sible 09
Sible 09
 
big data Big Things
big data Big Thingsbig data Big Things
big data Big Things
 

More from marcgallardo

Internet of Things
Internet of Things Internet of Things
Internet of Things marcgallardo
 
Some IT law issues in Spain
Some IT law issues in SpainSome IT law issues in Spain
Some IT law issues in Spainmarcgallardo
 
La protección de la reputación online en España
La protección de la reputación online en EspañaLa protección de la reputación online en España
La protección de la reputación online en Españamarcgallardo
 
Cookies U.E./España/Reino Unido
Cookies U.E./España/Reino UnidoCookies U.E./España/Reino Unido
Cookies U.E./España/Reino Unidomarcgallardo
 
Cadre Juridique des Cookies dans l'UE
Cadre Juridique des Cookies dans l'UECadre Juridique des Cookies dans l'UE
Cadre Juridique des Cookies dans l'UEmarcgallardo
 
e-réputation en Espagne
e-réputation en Espagnee-réputation en Espagne
e-réputation en Espagnemarcgallardo
 

More from marcgallardo (10)

Internet of Things
Internet of Things Internet of Things
Internet of Things
 
Some IT law issues in Spain
Some IT law issues in SpainSome IT law issues in Spain
Some IT law issues in Spain
 
La protección de la reputación online en España
La protección de la reputación online en EspañaLa protección de la reputación online en España
La protección de la reputación online en España
 
Cookies U.E./España/Reino Unido
Cookies U.E./España/Reino UnidoCookies U.E./España/Reino Unido
Cookies U.E./España/Reino Unido
 
Privacy on SNS
Privacy on SNSPrivacy on SNS
Privacy on SNS
 
Privacy on SNS II
Privacy on SNS IIPrivacy on SNS II
Privacy on SNS II
 
Privacy on SNS
Privacy on SNSPrivacy on SNS
Privacy on SNS
 
Cadre Juridique des Cookies dans l'UE
Cadre Juridique des Cookies dans l'UECadre Juridique des Cookies dans l'UE
Cadre Juridique des Cookies dans l'UE
 
e-réputation en Espagne
e-réputation en Espagnee-réputation en Espagne
e-réputation en Espagne
 
Cookies.eu
Cookies.euCookies.eu
Cookies.eu
 

Recently uploaded

UiPath Studio Web workshop series - Day 1
UiPath Studio Web workshop series  - Day 1UiPath Studio Web workshop series  - Day 1
UiPath Studio Web workshop series - Day 1DianaGray10
 
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024Alkin Tezuysal
 
IT Service Management (ITSM) Best Practices for Advanced Computing
IT Service Management (ITSM) Best Practices for Advanced ComputingIT Service Management (ITSM) Best Practices for Advanced Computing
IT Service Management (ITSM) Best Practices for Advanced ComputingMAGNIntelligence
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024Brian Pichman
 
Top 10 Squarespace Development Companies
Top 10 Squarespace Development CompaniesTop 10 Squarespace Development Companies
Top 10 Squarespace Development CompaniesTopCSSGallery
 
March Patch Tuesday
March Patch TuesdayMarch Patch Tuesday
March Patch TuesdayIvanti
 
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - TechWebinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - TechProduct School
 
Extra-120324-Visite-Entreprise-icare.pdf
Extra-120324-Visite-Entreprise-icare.pdfExtra-120324-Visite-Entreprise-icare.pdf
Extra-120324-Visite-Entreprise-icare.pdfInfopole1
 
The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)IES VE
 
GraphSummit Copenhagen 2024 - Neo4j Vision and Roadmap.pptx
GraphSummit Copenhagen 2024 - Neo4j Vision and Roadmap.pptxGraphSummit Copenhagen 2024 - Neo4j Vision and Roadmap.pptx
GraphSummit Copenhagen 2024 - Neo4j Vision and Roadmap.pptxNeo4j
 
The New Cloud World Order Is FinOps (Slideshow)
The New Cloud World Order Is FinOps (Slideshow)The New Cloud World Order Is FinOps (Slideshow)
The New Cloud World Order Is FinOps (Slideshow)codyslingerland1
 
Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)Muhammad Tiham Siddiqui
 
Keep Your Finger on the Pulse of Your Building's Performance with IES Live
Keep Your Finger on the Pulse of Your Building's Performance with IES LiveKeep Your Finger on the Pulse of Your Building's Performance with IES Live
Keep Your Finger on the Pulse of Your Building's Performance with IES LiveIES VE
 
LF Energy Webinar - Unveiling OpenEEMeter 4.0
LF Energy Webinar - Unveiling OpenEEMeter 4.0LF Energy Webinar - Unveiling OpenEEMeter 4.0
LF Energy Webinar - Unveiling OpenEEMeter 4.0DanBrown980551
 
Q4 2023 Quarterly Investor Presentation - FINAL - v1.pdf
Q4 2023 Quarterly Investor Presentation - FINAL - v1.pdfQ4 2023 Quarterly Investor Presentation - FINAL - v1.pdf
Q4 2023 Quarterly Investor Presentation - FINAL - v1.pdfTejal81
 
Introduction - IPLOOK NETWORKS CO., LTD.
Introduction - IPLOOK NETWORKS CO., LTD.Introduction - IPLOOK NETWORKS CO., LTD.
Introduction - IPLOOK NETWORKS CO., LTD.IPLOOK Networks
 
AI Workshops at Computers In Libraries 2024
AI Workshops at Computers In Libraries 2024AI Workshops at Computers In Libraries 2024
AI Workshops at Computers In Libraries 2024Brian Pichman
 
Planetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile BrochurePlanetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile BrochurePlanetek Italia Srl
 
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptxEmil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptxNeo4j
 

Recently uploaded (20)

UiPath Studio Web workshop series - Day 1
UiPath Studio Web workshop series  - Day 1UiPath Studio Web workshop series  - Day 1
UiPath Studio Web workshop series - Day 1
 
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024
 
IT Service Management (ITSM) Best Practices for Advanced Computing
IT Service Management (ITSM) Best Practices for Advanced ComputingIT Service Management (ITSM) Best Practices for Advanced Computing
IT Service Management (ITSM) Best Practices for Advanced Computing
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 
Top 10 Squarespace Development Companies
Top 10 Squarespace Development CompaniesTop 10 Squarespace Development Companies
Top 10 Squarespace Development Companies
 
March Patch Tuesday
March Patch TuesdayMarch Patch Tuesday
March Patch Tuesday
 
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - TechWebinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
 
Extra-120324-Visite-Entreprise-icare.pdf
Extra-120324-Visite-Entreprise-icare.pdfExtra-120324-Visite-Entreprise-icare.pdf
Extra-120324-Visite-Entreprise-icare.pdf
 
The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)
 
GraphSummit Copenhagen 2024 - Neo4j Vision and Roadmap.pptx
GraphSummit Copenhagen 2024 - Neo4j Vision and Roadmap.pptxGraphSummit Copenhagen 2024 - Neo4j Vision and Roadmap.pptx
GraphSummit Copenhagen 2024 - Neo4j Vision and Roadmap.pptx
 
The New Cloud World Order Is FinOps (Slideshow)
The New Cloud World Order Is FinOps (Slideshow)The New Cloud World Order Is FinOps (Slideshow)
The New Cloud World Order Is FinOps (Slideshow)
 
Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)
 
Keep Your Finger on the Pulse of Your Building's Performance with IES Live
Keep Your Finger on the Pulse of Your Building's Performance with IES LiveKeep Your Finger on the Pulse of Your Building's Performance with IES Live
Keep Your Finger on the Pulse of Your Building's Performance with IES Live
 
LF Energy Webinar - Unveiling OpenEEMeter 4.0
LF Energy Webinar - Unveiling OpenEEMeter 4.0LF Energy Webinar - Unveiling OpenEEMeter 4.0
LF Energy Webinar - Unveiling OpenEEMeter 4.0
 
Q4 2023 Quarterly Investor Presentation - FINAL - v1.pdf
Q4 2023 Quarterly Investor Presentation - FINAL - v1.pdfQ4 2023 Quarterly Investor Presentation - FINAL - v1.pdf
Q4 2023 Quarterly Investor Presentation - FINAL - v1.pdf
 
SheDev 2024
SheDev 2024SheDev 2024
SheDev 2024
 
Introduction - IPLOOK NETWORKS CO., LTD.
Introduction - IPLOOK NETWORKS CO., LTD.Introduction - IPLOOK NETWORKS CO., LTD.
Introduction - IPLOOK NETWORKS CO., LTD.
 
AI Workshops at Computers In Libraries 2024
AI Workshops at Computers In Libraries 2024AI Workshops at Computers In Libraries 2024
AI Workshops at Computers In Libraries 2024
 
Planetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile BrochurePlanetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile Brochure
 
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptxEmil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
 

Privacy in the Age of Big Data

  • 1. Privacy in the age of ’BIG DATA’ 56th UIA Dresde Congress - November 1st, 2012 ‘Rights of the Digital Person’ Marc Gallardo email: marc.gallardo@alliantabogados.com
  • 2. # Summary 1.- What is ‘Big Data’ 2.- Big Benefits 3.- Big Privacy Challenges 4.- Final Remarks
  • 3. # 1 Definition ‘Big data usually refers to data sets whose size is beyond the ability of commonly-used technology tools to capture, store, manage, and process the data within a tolerable elapsed time and cost’  Not a new concept: « data mining »
  • 6. 5 exabytes of information created between the dawn of civilization through 2003 Now 3 exabytes are created every day 1 terabyte (TB) = 1000 gigabytes (GB) 1 petabyte (PB) = 1.000.000 gigabytes (GB) 1 exabyte (EB) = 1.000.000.000 gigabytes (GB) 1 zettabyte (ZB) = 1.000.000.000.000 gigabytes (GB) 90 % of the data that now exists has been created in the last 2 years … and the pace is growing
  • 8. # Other data sources
  • 9. Tech data Innovation Software Collection (Hadoop, NoSQL) Vast amount of Hardware Storage data Processing (faster processors, cheaper, bigger storage) Sense-making BIG DATA
  • 12. # 3 Privacy Risks Big Data challenges some of the core privacy principles
  • 15. Is the information amassed for such analysis TRULY ANONYMOUS? We can not be sure !!! It can be relatively easy to take some types of de-identified data and reassociate it with specific individuals
  • 17. Re-identification of data subjects using Non Personal Data (NPD) Whether or not NPD that forms the basis for data extractions of new knowledge is covered by our data protection laws
  • 19. Personal data is any information about identified or identifiable person
  • 21. # De Lege Ferenda  Definition of PD and data subject might be expanded to cover technologies (i.e. data mining) that make reverse engineering of forms of « anonymisation » more feasible. > crux point for the Regulation not to become quickly obsolete.
  • 22. Consent of Data Subject: Freely given, specific, informed & explicit: statement or affirmative action. The problem under BD scenario is the DC don’t know in advance what he may discover after mining data so the data subject cannot knowingly consent to the use of his data.
  • 23. Automated individual decisions (AID) art. 15 DPD Grants the right not to be subject to a decision that produces legal effects which is based solely on automated processing of data intented to evaluate certain personal aspects. Art. 12(a) grants the right to discover « the knowledge of the logic ». Limited scope: human intervention / knowledge and remedy.
  • 24. Automated individual decisions (AID) art. 20 DPR Grants same right to oppose more broadly: not only « evaluate » but analyse or predict the person’s perfomance at work, economic situation, location, health, personal preferences, reliability or behaviour. Right to « know the logic » is eliminated. Right to know the existence and envisaged effect of profiling.
  • 25. To BD collectors & processors: I. Engage PIA to identify and address risks relating to BD analysis 2.- Be clear about what you collect and process 3.- Use de-identification techniques 4.- Secure the data to avoid data breaches
  • 26. Good trend and the real challenge for regulators Preserve BD rewards whilst seeking to minimize privacy risks

Editor's Notes

  1. Put simply .. Not a new concept … is a more powerful version of knowledge discovery in databases or data mining which has been defined as « the non trivial extraction of implicit, previously unknown and potentially useful information from data » which also enables firms to discover or infer previously unknown facts and patterns in a databse. The term big data describe a new generation of technologies and architectures designed to economically extract value for large volumes of a wide variety of data. Obviously as tech changes and improves the size of a dataset that would qualify as big data would also change.
  2. 1.- Volume: the main attraction to BD analytics. Most immediate challenge for to conventional IT structures because you need scalable storage and distributed approach for querying . 2.- Velocity: important to take data fast from input to decision (called streaming data).input and output data. The quicker the greater the competitive advantage. The results might go directly into a product such as a recommendation feature or into dashboard used to drive decision-making. 3.- Variety: rarely does the data present itself in a form perfectly ordered and ready for processing. It can be data feed direcly from a sensor source and social network data. None of this things come ready for integration into an application. Risk of loss of information when moving from source data to processed application data. Choice on software depending on how structured the data are (variety comes into play). The terms has been invented by big tecnology companies eager to sell their software and software. Some of the big players are IBM, HP, Oracle, … ANALYTICAL USE to gain competitive advantage. Extract value: mathematitians are now suddenly sexy. As a lawyer i have always found those with a facility with numbers to be appeling. I’m happy to see im not the only one and others agree wiith me. Successfully exploiting the value in BD requires experimentation and even access to best data decyphering tool is not guarantee of great wisdom. Very few companies have people on staff with the training not to only evaluate mountains of data but also to do something with it. Capturing data is one thing making it useful is a whole other.
  3. -> what this means is that the amount of data that companies, governements and people are creating is growing exponentially and that does not even begin to point across. -< yotabytes: 1 billion zetabytes Generally speaking experts consider petabytes of data volumes as the starting point for BD Market research firm IDC estimates that 1200 exabytes of data will be generated this year alone 3 exabytes every ten minutes. Projected 2012 sales of 367,2 million PCs, 107 million tablets, 650 million smartphones.
  4. Not only persons feed data to the Internet, things can do it. Low cost sensors (RFID: key of your car, packages logistics sector) : digital thermostat combining sensors, machine learning and web technology, it senses not just air temperature, but the movements of people in the house their comings and goings and adjust rooms temperature to save energy. There is a lot more data generated with these sources and we can observe that they are entirely new sources of data (sensors) not just more stream of data. There are now countless digital sensors worlwide in industrial equipment,automobiles … that are communicating data to computing intellenge creating the IoT or the Industrial Internet.
  5. New context: BG trend is MORE DATA, FASTER COMPUTERS and NEW ANALYTIC TECHNIQUES Hardware falling computing costs and scalable, distributed data processing models and open source software as Hadoop bring BD processing into the reach of the less well resourced. Hadoop is an open source software for working with BD. It was derived from Google tech and put into practice by Yahoo and others. But BD is too varied and complex for a one size fits all solution. While Hadoop has surely captured the greatest name recognition it is just one of the 3 classesof tech weel suited to storing and managing BD. The other 2 are non SQL and Massive Parallel Processing data stores. Sense making over data: which is why we have the data to begin with. Also big players providing BD solutions: IBM, Oracle, SAP, Microsoft, HP. Google (bigquery software that can scan terabytes of information in seconds).
  6. Uses of big data can be transformative, potential benefits are vast and still largely unrealised. Smart grid: directional data flux the user receives electricity as usual but send information about what how much it consumes to be analysed, companies supplying electricity can manage this good more efficiently and adopt more rational decions about energy production (once produced electricity can be stored and must be consumed immediately). Companies: Analysts at Forrester Research estimate that enterprises use only 5% of their available data, leaving the field open to those who wants to fill up the remaining 95% and obtain th hidden value their data holds, illuminating trends, unlock new sources of economic value, improve business processes and more. Google flu trends a tool using aggregate search queries to identfy flu outbreaks by region.
  7. I would’nt claim to have all the answers INCREASE OF DATA SUBJECTS WHOSE DATA WILL BE PROCESSED INCREASE OF DATABASES CONTAINING THESE TYPE OF DATA INCREASE OF ‘INTELLIGENCE’ OF PROCESSINGS: AGGREGATED DATA  Privacy and data protection means the same thing in the age of big data as it always has but the capacity of machines to capture, store, process, synthetise and analyse details about everyone has forced new boundaries. Digital data now available to organizations or the novel ways in which BD combines these diverse data sets. BD not suprinsingly intensify existing privacy concerns over tracking and profiling.
  8. Data is not deidentified simply because you strip of a name or an address, now much of our personal information is linked to specific devices like smartphones or laptops through UDIDs, IP adresses, fingerprinting an other means which are personally identifiable.
  9. And once created would be regulated as personal data? Regulatory dilemma.
  10. An identifiable person is one who can identified, directly or indirectly, in particular by reference to an identitication number or to one or more specific factors
  11. Neither silence nor inactivity can constitute valid consent.
  12. AID gains importance as far as BD intensifies the use of automated decision – making by substantially improving its accuracy and scope Knowledge of the logic involved in any automatic processing of data concerning him Limited remedies: it requires that the data controller brings some human judgement by reviewing the factors forming the basis of the automated decision
  13. AID gains importance as far as BD intensifies the use of automated decision – making by substantially improving its accuracy and scope Knowledge of the logic involved in any automatic processing of data concerning him Limited remedies: it requires that the data controller brings some human judgement by reviewing the factors forming the basis of the automated decision. Should include the the controller obligation to inform data subjects on techinques and procedures for profiling (algortyms). As well as document results of profiling in case of complaints
  14. BD’s impact on privacy requires some new and hard thinking of all of us. Be clear about what you collect: Compete case (FTC De-identify but do not ignore the fact big data can increase the risk of re-identification We need to pay attention to these issues so that bd IS REALIZED and the risks are kept to minimum. Industriy has a strong and justifiable need to contnue to innovate but we need to discuss further about collection and use in this ecoystem to instill consumer trust in the online and mobile marketplace.