SlideShare a Scribd company logo
1 of 9
Download to read offline
ITU Kaleidoscope 2015
Trust in the Information Society
Barcelona, Spain
9-11 December 2015
DRONES. CURRENT CHALLENGES AND
STANDARDISATION SOLUTIONS IN THE
FIELD OF PRVACY AND DATA
PROTECTION
Presenters:
Cristina PAUNER University Jaume I, pauner@uji.es
Irene KAMARA, Vrije Universiteit Brussel, Irene.kamara@vub.ac.be
Jorge VIGURI, University Jaume I, jviguri@uji.es
DRONES. CURRENT CHALLENGES AND
STANDARDISATION SOLUTIONS IN THE
FIELD OF PRVACY AND DATA PROTECTION
Cristina Pauner
University Jaume I (Spain)
Irene Kamara
Vrije Universiteit Brussel (Belgium)
Jorge Viguri
University Jaume I (Spain)
1. INTRODUCTION
 Nowadays, EU data protection legislation does not cover new
threats posed by new products, services and systems (specially
RPAS or drones).
 How can a drone be defined in legal terms? Wide range of
applications with unlimited functionalities.
Current problems:
 Lack of a common and consistent framework. The EU legislation
is widely fragmented, which leads to legal uncertainty.
 What personal data should be protected? Unknown.
 Lack of mutual recognition for national certificates.
 “Self-regulation through certification may be an alternative to
detailed legislation, but not to all legislation”.
2. CHALLENGES POSED BY DRONES TO THE FUNDAMENTAL
RIGHTS TO PRIVACY AND DATA PROTECTION
 2.1. The impact of drones on the right to privacy
 No general concept of privacy (depending on social and
technological factors) but fundamental right and an element
of human dignity.
 The right to privacy interferes with other rights or liberties
(freedom of expression or right to association).
 Potential problems: the combination of technologies
embodied in drones allow a totally new type of surveillance,
that is likely covert or hidden, highly intrusive and
potentially permanent on persons and objects.
 Widespread concerns about the potential damages
that drones may cause to privacy.
2. CHALLENGES POSED BY DRONES TO THE FUNDAMENTAL RIGHTS
TO PRIVACY AND DATA PROTECTION
2.2. The impact of drones on the right to data protection
 Inability to determine general risks on the right to data
protection.
 Risk assessment:
 Lack of transparency in the collection, storage, and even further
transmission and data processing.
 Lack of purpose specification and function creep. Personal data
need to be collected for specific purposes and they cannot be
processed in an incompatible way with those purposes for which the
data are intended.
 Ensure data security, integrity and confidentiality. Required
security measures shall be implemented and personal data which is
not strictly needed must be removed or anonymised.
 Profiling. The process of assembling bulk data may create
disproportionately large datasets which may lead to discrimination
by identifying individuals or social groups for adverse treatment
based upon flawed assumptions.
3. STANDARDISATION OF DRONES: A DEVELOPING
FIELD
 Several activities related to drones:
 EC Roadmap on civil RPAS – new legislation expected by
end 2015
 EASA – “Concept of operations”
 EUROCAE – 2 working groups (WG-73 on UAV systems
and the WG-93 on Light Remotely Piloted Aircraft)
 JARUS – Certification specification
 ISO –ISO/TC20/SC 16 on UAS (8 participants, 4
observers)
Need for regulation of drones
(legislation/ self-, co-regulation, other)
4. STANDARDISATION OF DRONES: A DEVELOPING
FIELD
Existing Privacy-related
Standards/ mandates
Topic Areas/Risks still to be covered
ISO/IEC 29100:2011 Privacy terminology& high level
privacy principles
Terminology related to
drones/RPAS/UAV and their
capabilities
ISO/IEC 29101:2013 Information Technology–Security
Techniques–Privacy Architecture
Framework
1.vast collection of big data (flying
capability for a long time over large
areas) 2. function creep and 3.
security of all the collected and
transmitted data
European Commission
Standardisation request M/530
Privacy by Design- security
products/systems
Data protection risks related to
recreational/commercial use of
drones  not in scope
OASIS Privacy Management
Reference Model (PMRM)
privacy management functionality
and compliance controls
Privacy management for drones
needs extra care to accountability,
transparency issues, data
minimisation, data subject rights
(access, rectification, erasure)
OASIS Privacy by Design
Documentation for Software
Engineers
translates the PbD principles to
conformance requirements within
software engineering tasks
Generic conformance requirements
might require many more
requirements to “stricter”
jurisdictions (i.e. EU)
5. RECOMMENDATIONS
 Drones impact on privacy and data protection is not yet certain
because it is known as a new emerging technology.
 GDPR is intended to replace Data Protection Directive to
strengthen the existing legal framework. However, it is not
intended to cover all current and future challenges.
 In order to achieve a consistent legal framework, other forms of
governance are outlined in this paper:
a. EU data protection legislation must remain technology neutral in
order to be suitably flexible. Other mechanisms such as guidance
and recommendations developed by DPAs and delegated acts by
the EC should be also implemented.
b. The use of standardisation activity in the sector of drones as a
proactive measure shall be encouraged.
c. Certification schemes will need to be developed for the systems to
operate safely and with due regard for third party interests.
Questions?
pauner@uji.es
Irene.kamara@vub.ac.be
jviguri@uji.es
Thank you

More Related Content

What's hot

IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021Francesco Flammini
 
Data protection and smart grids
Data protection and smart gridsData protection and smart grids
Data protection and smart gridsRónán Kennedy
 
From Law to Code: Translating Legal Principles into Digital Rules
From Law to Code: Translating Legal Principles into Digital RulesFrom Law to Code: Translating Legal Principles into Digital Rules
From Law to Code: Translating Legal Principles into Digital RulesRónán Kennedy
 
Priorities for Research on Current and Emerging Network Technologies
Priorities for Research on Current and Emerging Network TechnologiesPriorities for Research on Current and Emerging Network Technologies
Priorities for Research on Current and Emerging Network TechnologiesKarlos Svoboda
 
Data Privacy and Security in Autonomous Vehicles
Data Privacy and Security in Autonomous VehiclesData Privacy and Security in Autonomous Vehicles
Data Privacy and Security in Autonomous Vehiclessulaiman_karim
 
ICT and Environmental Regulation in the Developing World: Inequalities in Ins...
ICT and Environmental Regulation in the Developing World: Inequalities in Ins...ICT and Environmental Regulation in the Developing World: Inequalities in Ins...
ICT and Environmental Regulation in the Developing World: Inequalities in Ins...Rónán Kennedy
 
Cybersecurity Discipline
Cybersecurity DisciplineCybersecurity Discipline
Cybersecurity DisciplineMark Stockman
 
Rainer Zimmermann (European Commission): The role of the European Commission ...
Rainer Zimmermann (European Commission): The role of the European Commission ...Rainer Zimmermann (European Commission): The role of the European Commission ...
Rainer Zimmermann (European Commission): The role of the European Commission ...ServiceWave 2010
 
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems  ( IJASSN )International Journal of Advanced Smart Sensor Network Systems  ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )ijassn
 
NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...
NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...
NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...ijassn
 
WCET Presentation
WCET PresentationWCET Presentation
WCET PresentationAmr Awad
 
CfP International Network Confernce Inc2010
CfP International Network Confernce Inc2010CfP International Network Confernce Inc2010
CfP International Network Confernce Inc2010schilkes
 
Center for Public Safety and Cybersecurity Education
Center for Public Safety and Cybersecurity EducationCenter for Public Safety and Cybersecurity Education
Center for Public Safety and Cybersecurity EducationTaylor Rosecrans
 
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )ijassn
 
Mobilis 2008 - B3 : Inter-vehicles Communication: A New Frontier of Ad Hoc Ne...
Mobilis 2008 - B3 : Inter-vehicles Communication: A New Frontier of Ad Hoc Ne...Mobilis 2008 - B3 : Inter-vehicles Communication: A New Frontier of Ad Hoc Ne...
Mobilis 2008 - B3 : Inter-vehicles Communication: A New Frontier of Ad Hoc Ne...Mobilis Conférence
 
Research revealed on access control challenges for multinationals
Research revealed on access control challenges for multinationalsResearch revealed on access control challenges for multinationals
Research revealed on access control challenges for multinationalsDoreen Loeber
 

What's hot (20)

CaselliM_CV
CaselliM_CVCaselliM_CV
CaselliM_CV
 
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
 
AtinerICT18
AtinerICT18AtinerICT18
AtinerICT18
 
Data protection and smart grids
Data protection and smart gridsData protection and smart grids
Data protection and smart grids
 
From Law to Code: Translating Legal Principles into Digital Rules
From Law to Code: Translating Legal Principles into Digital RulesFrom Law to Code: Translating Legal Principles into Digital Rules
From Law to Code: Translating Legal Principles into Digital Rules
 
Priorities for Research on Current and Emerging Network Technologies
Priorities for Research on Current and Emerging Network TechnologiesPriorities for Research on Current and Emerging Network Technologies
Priorities for Research on Current and Emerging Network Technologies
 
Data Privacy and Security in Autonomous Vehicles
Data Privacy and Security in Autonomous VehiclesData Privacy and Security in Autonomous Vehicles
Data Privacy and Security in Autonomous Vehicles
 
ICT and Environmental Regulation in the Developing World: Inequalities in Ins...
ICT and Environmental Regulation in the Developing World: Inequalities in Ins...ICT and Environmental Regulation in the Developing World: Inequalities in Ins...
ICT and Environmental Regulation in the Developing World: Inequalities in Ins...
 
Cybersecurity Discipline
Cybersecurity DisciplineCybersecurity Discipline
Cybersecurity Discipline
 
Rainer Zimmermann (European Commission): The role of the European Commission ...
Rainer Zimmermann (European Commission): The role of the European Commission ...Rainer Zimmermann (European Commission): The role of the European Commission ...
Rainer Zimmermann (European Commission): The role of the European Commission ...
 
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems  ( IJASSN )International Journal of Advanced Smart Sensor Network Systems  ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
 
Intro: UBI-SERV
Intro: UBI-SERVIntro: UBI-SERV
Intro: UBI-SERV
 
NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...
NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...
NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...
 
Howard Back,Ppt
Howard Back,PptHoward Back,Ppt
Howard Back,Ppt
 
WCET Presentation
WCET PresentationWCET Presentation
WCET Presentation
 
CfP International Network Confernce Inc2010
CfP International Network Confernce Inc2010CfP International Network Confernce Inc2010
CfP International Network Confernce Inc2010
 
Center for Public Safety and Cybersecurity Education
Center for Public Safety and Cybersecurity EducationCenter for Public Safety and Cybersecurity Education
Center for Public Safety and Cybersecurity Education
 
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
 
Mobilis 2008 - B3 : Inter-vehicles Communication: A New Frontier of Ad Hoc Ne...
Mobilis 2008 - B3 : Inter-vehicles Communication: A New Frontier of Ad Hoc Ne...Mobilis 2008 - B3 : Inter-vehicles Communication: A New Frontier of Ad Hoc Ne...
Mobilis 2008 - B3 : Inter-vehicles Communication: A New Frontier of Ad Hoc Ne...
 
Research revealed on access control challenges for multinationals
Research revealed on access control challenges for multinationalsResearch revealed on access control challenges for multinationals
Research revealed on access control challenges for multinationals
 

Viewers also liked

Euralarm - Glen Dale on security industry perspective on certification of sec...
Euralarm - Glen Dale on security industry perspective on certification of sec...Euralarm - Glen Dale on security industry perspective on certification of sec...
Euralarm - Glen Dale on security industry perspective on certification of sec...CRISP Project
 
CRISP - Overview and results
CRISP - Overview and results CRISP - Overview and results
CRISP - Overview and results CRISP Project
 
2. crisp final conf ste fi workshop_reflections iec-tc79 wg12
2. crisp final conf ste fi workshop_reflections iec-tc79 wg122. crisp final conf ste fi workshop_reflections iec-tc79 wg12
2. crisp final conf ste fi workshop_reflections iec-tc79 wg12CRISP Project
 
CRISP evaluation using the STEFi approach
CRISP evaluation using the STEFi approachCRISP evaluation using the STEFi approach
CRISP evaluation using the STEFi approachCRISP Project
 
EU Data Protection, Legislation and Certification
EU Data Protection, Legislation and Certification EU Data Protection, Legislation and Certification
EU Data Protection, Legislation and Certification CRISP Project
 
Policy and Standardisation perspective - CRISP Final Conference
Policy and Standardisation perspective - CRISP Final ConferencePolicy and Standardisation perspective - CRISP Final Conference
Policy and Standardisation perspective - CRISP Final ConferenceCRISP Project
 
CRISP and HECTOS projects - key findings
CRISP and HECTOS projects - key findings CRISP and HECTOS projects - key findings
CRISP and HECTOS projects - key findings CRISP Project
 
Standardisation and certification basics
Standardisation and certification basicsStandardisation and certification basics
Standardisation and certification basicsCRISP Project
 
Can Trust In Security TEchnologies be Enhanced through Certification?
Can Trust In Security TEchnologies be Enhanced through Certification?Can Trust In Security TEchnologies be Enhanced through Certification?
Can Trust In Security TEchnologies be Enhanced through Certification?CRISP Project
 
Smart Video Surveillance and Privacy - CRISP Final Conference
Smart Video Surveillance and Privacy - CRISP Final ConferenceSmart Video Surveillance and Privacy - CRISP Final Conference
Smart Video Surveillance and Privacy - CRISP Final ConferenceCRISP Project
 
Introduction to the CWA process - CRISP Final Conference
Introduction to the CWA process - CRISP Final Conference Introduction to the CWA process - CRISP Final Conference
Introduction to the CWA process - CRISP Final Conference CRISP Project
 
1st eStandards conference: next steps for standardization in large scale eHea...
1st eStandards conference: next steps for standardization in large scale eHea...1st eStandards conference: next steps for standardization in large scale eHea...
1st eStandards conference: next steps for standardization in large scale eHea...chronaki
 
Interoperability and Open Standards EC 19 Nov2008
Interoperability and Open Standards EC 19 Nov2008Interoperability and Open Standards EC 19 Nov2008
Interoperability and Open Standards EC 19 Nov2008aclorrain
 
2016 jun16 msp european catalogue
2016 jun16 msp   european catalogue2016 jun16 msp   european catalogue
2016 jun16 msp european catalogueRodolphe Wouters
 
Blind - Standardisation and standards as research and innovation indicators
Blind - Standardisation and standards as research and innovation indicatorsBlind - Standardisation and standards as research and innovation indicators
Blind - Standardisation and standards as research and innovation indicatorsinnovationoecd
 
Estándares en Unión Europea: Marco, Desafíos y Oportunidades - Francisco Garc...
Estándares en Unión Europea: Marco, Desafíos y Oportunidades - Francisco Garc...Estándares en Unión Europea: Marco, Desafíos y Oportunidades - Francisco Garc...
Estándares en Unión Europea: Marco, Desafíos y Oportunidades - Francisco Garc...Asociación XBRL España
 
Counterterrorism Hospitals Preparedness and Response, An Italian Pilot Projec...
Counterterrorism Hospitals Preparedness and Response, An Italian Pilot Projec...Counterterrorism Hospitals Preparedness and Response, An Italian Pilot Projec...
Counterterrorism Hospitals Preparedness and Response, An Italian Pilot Projec...Global Risk Forum GRFDavos
 
Certified Systems to Reduce Security Risks in Modern Societies and the Contri...
Certified Systems to Reduce Security Risks in Modern Societies and the Contri...Certified Systems to Reduce Security Risks in Modern Societies and the Contri...
Certified Systems to Reduce Security Risks in Modern Societies and the Contri...Global Risk Forum GRFDavos
 
Adapting Mass Casualty Response In An Era Of Increased Active Shooter Inciden...
Adapting Mass Casualty Response In An Era Of Increased Active Shooter Inciden...Adapting Mass Casualty Response In An Era Of Increased Active Shooter Inciden...
Adapting Mass Casualty Response In An Era Of Increased Active Shooter Inciden...Global Risk Forum GRFDavos
 

Viewers also liked (20)

Euralarm - Glen Dale on security industry perspective on certification of sec...
Euralarm - Glen Dale on security industry perspective on certification of sec...Euralarm - Glen Dale on security industry perspective on certification of sec...
Euralarm - Glen Dale on security industry perspective on certification of sec...
 
CRISP - Overview and results
CRISP - Overview and results CRISP - Overview and results
CRISP - Overview and results
 
2. crisp final conf ste fi workshop_reflections iec-tc79 wg12
2. crisp final conf ste fi workshop_reflections iec-tc79 wg122. crisp final conf ste fi workshop_reflections iec-tc79 wg12
2. crisp final conf ste fi workshop_reflections iec-tc79 wg12
 
CRISP evaluation using the STEFi approach
CRISP evaluation using the STEFi approachCRISP evaluation using the STEFi approach
CRISP evaluation using the STEFi approach
 
EU Data Protection, Legislation and Certification
EU Data Protection, Legislation and Certification EU Data Protection, Legislation and Certification
EU Data Protection, Legislation and Certification
 
Policy and Standardisation perspective - CRISP Final Conference
Policy and Standardisation perspective - CRISP Final ConferencePolicy and Standardisation perspective - CRISP Final Conference
Policy and Standardisation perspective - CRISP Final Conference
 
CRISP and HECTOS projects - key findings
CRISP and HECTOS projects - key findings CRISP and HECTOS projects - key findings
CRISP and HECTOS projects - key findings
 
Standardisation and certification basics
Standardisation and certification basicsStandardisation and certification basics
Standardisation and certification basics
 
Can Trust In Security TEchnologies be Enhanced through Certification?
Can Trust In Security TEchnologies be Enhanced through Certification?Can Trust In Security TEchnologies be Enhanced through Certification?
Can Trust In Security TEchnologies be Enhanced through Certification?
 
Smart Video Surveillance and Privacy - CRISP Final Conference
Smart Video Surveillance and Privacy - CRISP Final ConferenceSmart Video Surveillance and Privacy - CRISP Final Conference
Smart Video Surveillance and Privacy - CRISP Final Conference
 
Introduction to the CWA process - CRISP Final Conference
Introduction to the CWA process - CRISP Final Conference Introduction to the CWA process - CRISP Final Conference
Introduction to the CWA process - CRISP Final Conference
 
1st eStandards conference: next steps for standardization in large scale eHea...
1st eStandards conference: next steps for standardization in large scale eHea...1st eStandards conference: next steps for standardization in large scale eHea...
1st eStandards conference: next steps for standardization in large scale eHea...
 
Interoperability and Open Standards EC 19 Nov2008
Interoperability and Open Standards EC 19 Nov2008Interoperability and Open Standards EC 19 Nov2008
Interoperability and Open Standards EC 19 Nov2008
 
Promoting (meta)-data standards - The European Commission ISA Programme per...
 Promoting (meta)-data standards- The European Commission ISA Programme per... Promoting (meta)-data standards- The European Commission ISA Programme per...
Promoting (meta)-data standards - The European Commission ISA Programme per...
 
2016 jun16 msp european catalogue
2016 jun16 msp   european catalogue2016 jun16 msp   european catalogue
2016 jun16 msp european catalogue
 
Blind - Standardisation and standards as research and innovation indicators
Blind - Standardisation and standards as research and innovation indicatorsBlind - Standardisation and standards as research and innovation indicators
Blind - Standardisation and standards as research and innovation indicators
 
Estándares en Unión Europea: Marco, Desafíos y Oportunidades - Francisco Garc...
Estándares en Unión Europea: Marco, Desafíos y Oportunidades - Francisco Garc...Estándares en Unión Europea: Marco, Desafíos y Oportunidades - Francisco Garc...
Estándares en Unión Europea: Marco, Desafíos y Oportunidades - Francisco Garc...
 
Counterterrorism Hospitals Preparedness and Response, An Italian Pilot Projec...
Counterterrorism Hospitals Preparedness and Response, An Italian Pilot Projec...Counterterrorism Hospitals Preparedness and Response, An Italian Pilot Projec...
Counterterrorism Hospitals Preparedness and Response, An Italian Pilot Projec...
 
Certified Systems to Reduce Security Risks in Modern Societies and the Contri...
Certified Systems to Reduce Security Risks in Modern Societies and the Contri...Certified Systems to Reduce Security Risks in Modern Societies and the Contri...
Certified Systems to Reduce Security Risks in Modern Societies and the Contri...
 
Adapting Mass Casualty Response In An Era Of Increased Active Shooter Inciden...
Adapting Mass Casualty Response In An Era Of Increased Active Shooter Inciden...Adapting Mass Casualty Response In An Era Of Increased Active Shooter Inciden...
Adapting Mass Casualty Response In An Era Of Increased Active Shooter Inciden...
 

Similar to Crisp kaleidoscope presentation 13112015

Security and Privacy of Big Data in Mobile Devices
Security and Privacy of Big Data in Mobile DevicesSecurity and Privacy of Big Data in Mobile Devices
Security and Privacy of Big Data in Mobile DevicesIOSRjournaljce
 
GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network InfrastructureMuhammad Zeeshan
 
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING IJNSA Journal
 
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELINGDESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELINGIJNSA Journal
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation Anjana Shivangi
 
Cloud4eu - WhitePaper - OnChallengeofAcceptanceofCloudSolutionsinEUPublicSect...
Cloud4eu - WhitePaper - OnChallengeofAcceptanceofCloudSolutionsinEUPublicSect...Cloud4eu - WhitePaper - OnChallengeofAcceptanceofCloudSolutionsinEUPublicSect...
Cloud4eu - WhitePaper - OnChallengeofAcceptanceofCloudSolutionsinEUPublicSect...John Nas
 
Cloud Security: Techniques and frameworks for ensuring the security and priva...
Cloud Security: Techniques and frameworks for ensuring the security and priva...Cloud Security: Techniques and frameworks for ensuring the security and priva...
Cloud Security: Techniques and frameworks for ensuring the security and priva...IRJET Journal
 
NEW CORONA VIRUS DISEASE 2022: SOCIAL DISTANCING IS AN EFFECTIVE MEASURE (COV...
NEW CORONA VIRUS DISEASE 2022: SOCIAL DISTANCING IS AN EFFECTIVE MEASURE (COV...NEW CORONA VIRUS DISEASE 2022: SOCIAL DISTANCING IS AN EFFECTIVE MEASURE (COV...
NEW CORONA VIRUS DISEASE 2022: SOCIAL DISTANCING IS AN EFFECTIVE MEASURE (COV...IRJET Journal
 
Ethical Issues Of Information Technology
Ethical Issues Of Information TechnologyEthical Issues Of Information Technology
Ethical Issues Of Information TechnologySandra Arveseth
 
20150630_D6 1_Legal and EthicalFrameworkand Privacy and Security Principles
20150630_D6 1_Legal and EthicalFrameworkand Privacy and Security Principles20150630_D6 1_Legal and EthicalFrameworkand Privacy and Security Principles
20150630_D6 1_Legal and EthicalFrameworkand Privacy and Security PrinciplesLisa Catanzaro
 
R E G U L A R P A P E RUser-centric privacy awareness in v.docx
R E G U L A R P A P E RUser-centric privacy awareness in v.docxR E G U L A R P A P E RUser-centric privacy awareness in v.docx
R E G U L A R P A P E RUser-centric privacy awareness in v.docxmakdul
 
EveryCloud_GDPR_Whitepaper_v2
EveryCloud_GDPR_Whitepaper_v2EveryCloud_GDPR_Whitepaper_v2
EveryCloud_GDPR_Whitepaper_v2Paul Richards
 
EveryCloud_GDPR_Whitepaper_v2
EveryCloud_GDPR_Whitepaper_v2EveryCloud_GDPR_Whitepaper_v2
EveryCloud_GDPR_Whitepaper_v2Keith Purves
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET Journal
 
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...Konstantinos Demertzis
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
 
IT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesIT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesAsst.prof M.Gokilavani
 
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...Ted Myerson
 

Similar to Crisp kaleidoscope presentation 13112015 (20)

Security and Privacy of Big Data in Mobile Devices
Security and Privacy of Big Data in Mobile DevicesSecurity and Privacy of Big Data in Mobile Devices
Security and Privacy of Big Data in Mobile Devices
 
GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network Infrastructure
 
Ci31560566
Ci31560566Ci31560566
Ci31560566
 
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
 
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELINGDESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
 
Cloud4eu - WhitePaper - OnChallengeofAcceptanceofCloudSolutionsinEUPublicSect...
Cloud4eu - WhitePaper - OnChallengeofAcceptanceofCloudSolutionsinEUPublicSect...Cloud4eu - WhitePaper - OnChallengeofAcceptanceofCloudSolutionsinEUPublicSect...
Cloud4eu - WhitePaper - OnChallengeofAcceptanceofCloudSolutionsinEUPublicSect...
 
Cloud Security: Techniques and frameworks for ensuring the security and priva...
Cloud Security: Techniques and frameworks for ensuring the security and priva...Cloud Security: Techniques and frameworks for ensuring the security and priva...
Cloud Security: Techniques and frameworks for ensuring the security and priva...
 
NEW CORONA VIRUS DISEASE 2022: SOCIAL DISTANCING IS AN EFFECTIVE MEASURE (COV...
NEW CORONA VIRUS DISEASE 2022: SOCIAL DISTANCING IS AN EFFECTIVE MEASURE (COV...NEW CORONA VIRUS DISEASE 2022: SOCIAL DISTANCING IS AN EFFECTIVE MEASURE (COV...
NEW CORONA VIRUS DISEASE 2022: SOCIAL DISTANCING IS AN EFFECTIVE MEASURE (COV...
 
Ethical Issues Of Information Technology
Ethical Issues Of Information TechnologyEthical Issues Of Information Technology
Ethical Issues Of Information Technology
 
20150630_D6 1_Legal and EthicalFrameworkand Privacy and Security Principles
20150630_D6 1_Legal and EthicalFrameworkand Privacy and Security Principles20150630_D6 1_Legal and EthicalFrameworkand Privacy and Security Principles
20150630_D6 1_Legal and EthicalFrameworkand Privacy and Security Principles
 
R E G U L A R P A P E RUser-centric privacy awareness in v.docx
R E G U L A R P A P E RUser-centric privacy awareness in v.docxR E G U L A R P A P E RUser-centric privacy awareness in v.docx
R E G U L A R P A P E RUser-centric privacy awareness in v.docx
 
EveryCloud_GDPR_Whitepaper_v2
EveryCloud_GDPR_Whitepaper_v2EveryCloud_GDPR_Whitepaper_v2
EveryCloud_GDPR_Whitepaper_v2
 
EveryCloud_GDPR_Whitepaper_v2
EveryCloud_GDPR_Whitepaper_v2EveryCloud_GDPR_Whitepaper_v2
EveryCloud_GDPR_Whitepaper_v2
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
 
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
NIST article I wrote
NIST article I wroteNIST article I wrote
NIST article I wrote
 
IT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesIT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notes
 
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...
 

Recently uploaded

The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Technical SEO for Improved Accessibility WTS FEST
Technical SEO for Improved Accessibility  WTS FESTTechnical SEO for Improved Accessibility  WTS FEST
Technical SEO for Improved Accessibility WTS FESTBillieHyde
 
.NET 8 ChatBot with Azure OpenAI Services.pptx
.NET 8 ChatBot with Azure OpenAI Services.pptx.NET 8 ChatBot with Azure OpenAI Services.pptx
.NET 8 ChatBot with Azure OpenAI Services.pptxHansamali Gamage
 
SIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENT
SIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENTSIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENT
SIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENTxtailishbaloch
 
Scenario Library et REX Discover industry- and role- based scenarios
Scenario Library et REX Discover industry- and role- based scenariosScenario Library et REX Discover industry- and role- based scenarios
Scenario Library et REX Discover industry- and role- based scenariosErol GIRAUDY
 
Novo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4jNovo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4jNeo4j
 
March Patch Tuesday
March Patch TuesdayMarch Patch Tuesday
March Patch TuesdayIvanti
 
Flow Control | Block Size | ST Min | First Frame
Flow Control | Block Size | ST Min | First FrameFlow Control | Block Size | ST Min | First Frame
Flow Control | Block Size | ST Min | First FrameKapil Thakar
 
20140402 - Smart house demo kit
20140402 - Smart house demo kit20140402 - Smart house demo kit
20140402 - Smart house demo kitJamie (Taka) Wang
 
My key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAIMy key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAIVijayananda Mohire
 
Introduction - IPLOOK NETWORKS CO., LTD.
Introduction - IPLOOK NETWORKS CO., LTD.Introduction - IPLOOK NETWORKS CO., LTD.
Introduction - IPLOOK NETWORKS CO., LTD.IPLOOK Networks
 
AI Workshops at Computers In Libraries 2024
AI Workshops at Computers In Libraries 2024AI Workshops at Computers In Libraries 2024
AI Workshops at Computers In Libraries 2024Brian Pichman
 
Where developers are challenged, what developers want and where DevEx is going
Where developers are challenged, what developers want and where DevEx is goingWhere developers are challenged, what developers want and where DevEx is going
Where developers are challenged, what developers want and where DevEx is goingFrancesco Corti
 
How to become a GDSC Lead GDSC MI AOE.pptx
How to become a GDSC Lead GDSC MI AOE.pptxHow to become a GDSC Lead GDSC MI AOE.pptx
How to become a GDSC Lead GDSC MI AOE.pptxKaustubhBhavsar6
 
Planetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile BrochurePlanetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile BrochurePlanetek Italia Srl
 
Patch notes explaining DISARM Version 1.4 update
Patch notes explaining DISARM Version 1.4 updatePatch notes explaining DISARM Version 1.4 update
Patch notes explaining DISARM Version 1.4 updateadam112203
 
How to release an Open Source Dataweave Library
How to release an Open Source Dataweave LibraryHow to release an Open Source Dataweave Library
How to release an Open Source Dataweave Libraryshyamraj55
 
Oracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptxOracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptxSatishbabu Gunukula
 
UiPath Studio Web workshop series - Day 1
UiPath Studio Web workshop series  - Day 1UiPath Studio Web workshop series  - Day 1
UiPath Studio Web workshop series - Day 1DianaGray10
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc
 

Recently uploaded (20)

The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Technical SEO for Improved Accessibility WTS FEST
Technical SEO for Improved Accessibility  WTS FESTTechnical SEO for Improved Accessibility  WTS FEST
Technical SEO for Improved Accessibility WTS FEST
 
.NET 8 ChatBot with Azure OpenAI Services.pptx
.NET 8 ChatBot with Azure OpenAI Services.pptx.NET 8 ChatBot with Azure OpenAI Services.pptx
.NET 8 ChatBot with Azure OpenAI Services.pptx
 
SIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENT
SIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENTSIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENT
SIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENT
 
Scenario Library et REX Discover industry- and role- based scenarios
Scenario Library et REX Discover industry- and role- based scenariosScenario Library et REX Discover industry- and role- based scenarios
Scenario Library et REX Discover industry- and role- based scenarios
 
Novo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4jNovo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4j
 
March Patch Tuesday
March Patch TuesdayMarch Patch Tuesday
March Patch Tuesday
 
Flow Control | Block Size | ST Min | First Frame
Flow Control | Block Size | ST Min | First FrameFlow Control | Block Size | ST Min | First Frame
Flow Control | Block Size | ST Min | First Frame
 
20140402 - Smart house demo kit
20140402 - Smart house demo kit20140402 - Smart house demo kit
20140402 - Smart house demo kit
 
My key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAIMy key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAI
 
Introduction - IPLOOK NETWORKS CO., LTD.
Introduction - IPLOOK NETWORKS CO., LTD.Introduction - IPLOOK NETWORKS CO., LTD.
Introduction - IPLOOK NETWORKS CO., LTD.
 
AI Workshops at Computers In Libraries 2024
AI Workshops at Computers In Libraries 2024AI Workshops at Computers In Libraries 2024
AI Workshops at Computers In Libraries 2024
 
Where developers are challenged, what developers want and where DevEx is going
Where developers are challenged, what developers want and where DevEx is goingWhere developers are challenged, what developers want and where DevEx is going
Where developers are challenged, what developers want and where DevEx is going
 
How to become a GDSC Lead GDSC MI AOE.pptx
How to become a GDSC Lead GDSC MI AOE.pptxHow to become a GDSC Lead GDSC MI AOE.pptx
How to become a GDSC Lead GDSC MI AOE.pptx
 
Planetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile BrochurePlanetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile Brochure
 
Patch notes explaining DISARM Version 1.4 update
Patch notes explaining DISARM Version 1.4 updatePatch notes explaining DISARM Version 1.4 update
Patch notes explaining DISARM Version 1.4 update
 
How to release an Open Source Dataweave Library
How to release an Open Source Dataweave LibraryHow to release an Open Source Dataweave Library
How to release an Open Source Dataweave Library
 
Oracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptxOracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptx
 
UiPath Studio Web workshop series - Day 1
UiPath Studio Web workshop series  - Day 1UiPath Studio Web workshop series  - Day 1
UiPath Studio Web workshop series - Day 1
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
 

Crisp kaleidoscope presentation 13112015

  • 1. ITU Kaleidoscope 2015 Trust in the Information Society Barcelona, Spain 9-11 December 2015 DRONES. CURRENT CHALLENGES AND STANDARDISATION SOLUTIONS IN THE FIELD OF PRVACY AND DATA PROTECTION Presenters: Cristina PAUNER University Jaume I, pauner@uji.es Irene KAMARA, Vrije Universiteit Brussel, Irene.kamara@vub.ac.be Jorge VIGURI, University Jaume I, jviguri@uji.es
  • 2. DRONES. CURRENT CHALLENGES AND STANDARDISATION SOLUTIONS IN THE FIELD OF PRVACY AND DATA PROTECTION Cristina Pauner University Jaume I (Spain) Irene Kamara Vrije Universiteit Brussel (Belgium) Jorge Viguri University Jaume I (Spain)
  • 3. 1. INTRODUCTION  Nowadays, EU data protection legislation does not cover new threats posed by new products, services and systems (specially RPAS or drones).  How can a drone be defined in legal terms? Wide range of applications with unlimited functionalities. Current problems:  Lack of a common and consistent framework. The EU legislation is widely fragmented, which leads to legal uncertainty.  What personal data should be protected? Unknown.  Lack of mutual recognition for national certificates.  “Self-regulation through certification may be an alternative to detailed legislation, but not to all legislation”.
  • 4. 2. CHALLENGES POSED BY DRONES TO THE FUNDAMENTAL RIGHTS TO PRIVACY AND DATA PROTECTION  2.1. The impact of drones on the right to privacy  No general concept of privacy (depending on social and technological factors) but fundamental right and an element of human dignity.  The right to privacy interferes with other rights or liberties (freedom of expression or right to association).  Potential problems: the combination of technologies embodied in drones allow a totally new type of surveillance, that is likely covert or hidden, highly intrusive and potentially permanent on persons and objects.  Widespread concerns about the potential damages that drones may cause to privacy.
  • 5. 2. CHALLENGES POSED BY DRONES TO THE FUNDAMENTAL RIGHTS TO PRIVACY AND DATA PROTECTION 2.2. The impact of drones on the right to data protection  Inability to determine general risks on the right to data protection.  Risk assessment:  Lack of transparency in the collection, storage, and even further transmission and data processing.  Lack of purpose specification and function creep. Personal data need to be collected for specific purposes and they cannot be processed in an incompatible way with those purposes for which the data are intended.  Ensure data security, integrity and confidentiality. Required security measures shall be implemented and personal data which is not strictly needed must be removed or anonymised.  Profiling. The process of assembling bulk data may create disproportionately large datasets which may lead to discrimination by identifying individuals or social groups for adverse treatment based upon flawed assumptions.
  • 6. 3. STANDARDISATION OF DRONES: A DEVELOPING FIELD  Several activities related to drones:  EC Roadmap on civil RPAS – new legislation expected by end 2015  EASA – “Concept of operations”  EUROCAE – 2 working groups (WG-73 on UAV systems and the WG-93 on Light Remotely Piloted Aircraft)  JARUS – Certification specification  ISO –ISO/TC20/SC 16 on UAS (8 participants, 4 observers) Need for regulation of drones (legislation/ self-, co-regulation, other)
  • 7. 4. STANDARDISATION OF DRONES: A DEVELOPING FIELD Existing Privacy-related Standards/ mandates Topic Areas/Risks still to be covered ISO/IEC 29100:2011 Privacy terminology& high level privacy principles Terminology related to drones/RPAS/UAV and their capabilities ISO/IEC 29101:2013 Information Technology–Security Techniques–Privacy Architecture Framework 1.vast collection of big data (flying capability for a long time over large areas) 2. function creep and 3. security of all the collected and transmitted data European Commission Standardisation request M/530 Privacy by Design- security products/systems Data protection risks related to recreational/commercial use of drones  not in scope OASIS Privacy Management Reference Model (PMRM) privacy management functionality and compliance controls Privacy management for drones needs extra care to accountability, transparency issues, data minimisation, data subject rights (access, rectification, erasure) OASIS Privacy by Design Documentation for Software Engineers translates the PbD principles to conformance requirements within software engineering tasks Generic conformance requirements might require many more requirements to “stricter” jurisdictions (i.e. EU)
  • 8. 5. RECOMMENDATIONS  Drones impact on privacy and data protection is not yet certain because it is known as a new emerging technology.  GDPR is intended to replace Data Protection Directive to strengthen the existing legal framework. However, it is not intended to cover all current and future challenges.  In order to achieve a consistent legal framework, other forms of governance are outlined in this paper: a. EU data protection legislation must remain technology neutral in order to be suitably flexible. Other mechanisms such as guidance and recommendations developed by DPAs and delegated acts by the EC should be also implemented. b. The use of standardisation activity in the sector of drones as a proactive measure shall be encouraged. c. Certification schemes will need to be developed for the systems to operate safely and with due regard for third party interests.

Editor's Notes

  1. Cristina
  2. Cristina
  3. Jorge
  4. Jorge
  5. Irene
  6. Irene
  7. Cristina/Jorge?