SlideShare a Scribd company logo
1 of 41
Smart Cities of India: Privacy and Security
Concerns and Strategies
Kavitha Gupta
Senior Legal Counsel - APAC
Hitachi Consulting
V. Rajesh Kumar
Privacy & Data Protection Officer - APAC
HCL Technologies Limited
Smart City???
No Universally Acceptable Definition
Leveraging Technologies
Integration of Core Sub-
Systems of City Services
Deeper Analysis to provide Real Time Data
In Simple Terms…
• Connecting citizens with city
services
• Structuring dialog between
Government and Citizens
• Employment Opportunities
• Social & Economic Development
• Quality of Life
CitizensCitizens
Major Technologies…
Stakeholders
Carrier Networks, IoT, M2M, Operators,
Tran-receivers
Communication
Ownership, Liabilities, Data Usage Guidelines
and Policies, Anonymization and
Pseudonymization
Legal Boundaries
Behaviors, Consumption Pattern, Analysis,
Sharing, Destruction, Aggregation
Data
Big Data, Cloud, Ubiquitous computing
Access Controls, Authorization, Governance,
Operations & Management
Computing & Storage
Online and Offline
Users
Core Components
Data Flow Model
Smart City & India
Overall Market
Estimate
Overall Market
Estimate
FocusFocus
5 Years5 Years 100 Smart Cities100 Smart Cities
35% Urban
Population
35% Urban
Population
50,000 crores50,000 crores
Social InfrastructureSocial Infrastructure
Physical InfrastructurePhysical Infrastructure
Institutional InfrastructureInstitutional Infrastructure
Economic InfrastructureEconomic Infrastructure
Smart City
Mission – MUD
(June 2015)
Smart City
Mission – MUD
(June 2015)
Report on Integrated
ICT & Geo Spatial
Technologies -
Framework
Report on Integrated
ICT & Geo Spatial
Technologies -
Framework
Synergies with
Key National
Schemes
Synergies with
Key National
Schemes
Implementation Strategy
List of 100 Proposed Smart Cities in India
Source: http://indiatoday.intoday.in/story/modis-smart-cities-have-a-viability-gap/1/469389.html
Source:
https://blogs.voanews.com/techtonics/2017/05/12/smart-cities-are-not-just-about-technology/
Jaipur – Vision of Smart City
Applicable Laws and Regulations
• Information Technology Act, 2000
• Information Technology (Reasonable security practices and procedures and sensitive
personal data or information) Rules, 2011 – applicable to Private Sectors
• Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services)
Act, 2016
• National Telecom Policy 2012
• National Data Sharing and Accessibility Policy 2012
• National Cyber Security Policy 2013
• IoT Policy (Draft)
Privacy Practices
16
Taxanomy IT Act 2000 Aadhar Act 2016 GDPR
Information collection
Surveillance      
Interrogation      
Information processing
Aggregation      
Identification      
Insecurity      
Secondary use      
Exclusion      
Information dissemination
Breach of confidentiality      
Disclosure      
Exposure      
Increased accessibility      
Appropriation      
Distortion      
Invasion
Intrusion      
Decisional interference      
StrongStrong
WeakWeak
NoneNone
Critical Success Factors
Critical Success Factors
Critical Success Factors
Privacy Concerns
Individual Rights
• Whether the data collected are used for the right
purpose?
• Who are the other stakeholders using the data?
• Whether data usage is beyond the subscription
needs?
• Where any procedures in place to allow citizens
access to their data?
• Are there sufficient safeguards to protect the data
during transmit?
• Who owns accountability for any breaches?
• Are the practices “user (i.e. citizen) centric?”
Intrusion in to one’s personal life
Identity Fraud
Financial Theft
Identity Fraud
Financial Theft
Marketing
calls &
Mails
Marketing
calls &
Mails
Embarrassment
Discrimination
Embarrassment
Discrimination
Profiling
Commercial Tracking
Profiling
Commercial Tracking
Data Sharing
• How are data shared between Government agencies
and privacy players?
• What sort of policies and guidelines are build for data
flow between the stakeholders?
• Rights to re-use the data
• Who owns when new personal data is created in the
process of collection and use?
• What steps are taken by the Government to prevent
loss of control over the data?
• What agreements are in place to prevent misuse of
data?
Data Profiling
•Automatic Processing or
computer techniques (such
as data mining)
•Analytics
•Algorithms
AggregateAggregate
• Data Attributes
• Online data
• Offline records (such
as Tax Info,
Purchases)
• Demographic
Information
• Data Attributes
• Online data
• Offline records (such
as Tax Info,
Purchases)
• Demographic
Information
• Predictive
Profiling
• Individual
Behaviors
• Likes
• Dislikes
• Preferences
• Attitudes
• Predictive
Profiling
• Individual
Behaviors
• Likes
• Dislikes
• Preferences
• Attitudes
DiscoverDiscover
•Online Advertisers
•Data Brokers
•Online Advertisers
•Data Brokers
Data Security
Surveillance
• Chilling effect on the Society at
Large
– Being free from observation or
disturbance
– Freedom of expression (Fear of Isolation)
– Safeguards against discrimination
– Unlawful arrests
Critical Success Factors
Security Concerns
Identification & Authentication
SensorsSensors SensorsSensors SensorsSensors SensorsSensors
GatewayGateway
Applications
[Mobile/Web]
Applications
[Mobile/Web]UserUser
City Systems &
Services
City Systems &
Services
Identity ManagementIdentity Management
Access Mgmt/
Authentication
[OpenID, OAuth, SAML]
Access Mgmt/
Authentication
[OpenID, OAuth, SAML]
DevicesDevices
GovernmentGovernment
Identifiers
contain
Attributes
Identifiers
contain
Attributes PIIPII
• Information Tracking
• Unauthorized Access
• Data Loss
• Lack of In-depth controls
C
y
b
e
r
C
r
i
m
i
n
al
s
C
y
b
e
r
C
r
i
m
i
n
al
s
Inter-Operability
OSOS
Wired
Sensors
Wired
Sensors
Vendor
Fragm
entation
Vendor
Fragm
entation
UtilityUtility
FTTHFTTH
Com
m
unicatio
n
Protocols
Com
m
unicatio
n
Protocols
Hardware
Platforms
Hardware
PlatformsApplication
s
Application
s
Information
Sharing
Technologie
s
Information
Sharing
Technologie
s
Wireless
Sensors
Wireless
Sensors
• Estimated waste of $341
billion by 2025 due to
fragmented solutions
• Using non-standardization
solutions will drive global
implementation cost of
project cities to $1.12 trillion
Technology
Providers
Technology
Providers
• Confidentiality
• Integrity
• Accessibility of the Services
• Availability of real time data
Above 90% of IT professionals
believe Smart Cities don’t have
any protection from cyber
attacks today (Source: TripWire).
Overarching ecosystem with multiple players and different technologies
Inconsistent Controls
Growing Cyber Threats
Data Security
Way Forward
Privacy Management
Privacy Enhancing Technologies
• Encryption Tools
• Policy Tools
• Filtering Tools
• Anonymity Tools
To uniquely identify devices along with
responsibility of the stakeholders
Inter-operability Standards
• National Institute of Standards and Technology Big
Data Interoperability Framework
• IEEE Standard for an Architectural Framework for the
Internet of Things (IoT)
• ISO/TC 268, which is focused on sustainable
development in communities
• ISO 37120:2014
• ISO/TS 37151 and ISO/TR 37152 Smart community
infrastructures
• ISO/IEC JTC 1 Working group on Smart Cities (WG 11)
• 7001 - PRIPARE Smart City Strategy
• Smart city framework standard (PAS 181)
• Data concept model for smart cities (PAS 182)
Law & Accountability
Governance
Cyber Response Team
Close collaboration between
Government, Citizens and
Private Sectors
Thank You

More Related Content

What's hot

Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...
Charles Mok
 

What's hot (20)

COVID-19 and Contact Tracing Apps - What Should Ireland Do? - Webinar
COVID-19 and Contact Tracing Apps - What Should Ireland Do? - WebinarCOVID-19 and Contact Tracing Apps - What Should Ireland Do? - Webinar
COVID-19 and Contact Tracing Apps - What Should Ireland Do? - Webinar
 
(SACON) Shivangi Nadkarni & Sandeep Rao - An introduction to Data Privacy
(SACON) Shivangi Nadkarni & Sandeep Rao -  An introduction to Data Privacy(SACON) Shivangi Nadkarni & Sandeep Rao -  An introduction to Data Privacy
(SACON) Shivangi Nadkarni & Sandeep Rao - An introduction to Data Privacy
 
Future of digital identity initial perspective - final lr
Future of digital identity   initial perspective - final lrFuture of digital identity   initial perspective - final lr
Future of digital identity initial perspective - final lr
 
Cyber Awareness : Perspective Bangladesh & Covid-19
Cyber Awareness : Perspective Bangladesh & Covid-19Cyber Awareness : Perspective Bangladesh & Covid-19
Cyber Awareness : Perspective Bangladesh & Covid-19
 
Online privacy
Online privacyOnline privacy
Online privacy
 
Alan Shark
Alan SharkAlan Shark
Alan Shark
 
The Tide is Changing: The Importance of Digital for Your Community
The Tide is Changing: The Importance of Digital for Your CommunityThe Tide is Changing: The Importance of Digital for Your Community
The Tide is Changing: The Importance of Digital for Your Community
 
Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology Risk
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...
 
Credit Internet Tools
Credit Internet ToolsCredit Internet Tools
Credit Internet Tools
 
Dealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response PlanDealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response Plan
 
Government 3.0
Government 3.0Government 3.0
Government 3.0
 
Big data and smart cities: Key data issues
Big data and smart cities: Key data issuesBig data and smart cities: Key data issues
Big data and smart cities: Key data issues
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data Privacy
 
Internet Regulations 2
 Internet Regulations 2 Internet Regulations 2
Internet Regulations 2
 
Anonos PR Newswire Press Release 07-09-15
Anonos PR Newswire Press Release 07-09-15Anonos PR Newswire Press Release 07-09-15
Anonos PR Newswire Press Release 07-09-15
 
Transformation from Identity Stone Age to Digital Identity
Transformation from Identity Stone Age to Digital IdentityTransformation from Identity Stone Age to Digital Identity
Transformation from Identity Stone Age to Digital Identity
 
PKI IN Government Identity Management Systems
PKI IN Government Identity Management SystemsPKI IN Government Identity Management Systems
PKI IN Government Identity Management Systems
 
Your've Been Hacked in Florida! Now What?
Your've Been Hacked in Florida! Now What?Your've Been Hacked in Florida! Now What?
Your've Been Hacked in Florida! Now What?
 
Tools of the Trade: Privacy in the Digital Age - 2018-05-17
Tools of the Trade: Privacy in the Digital Age - 2018-05-17Tools of the Trade: Privacy in the Digital Age - 2018-05-17
Tools of the Trade: Privacy in the Digital Age - 2018-05-17
 

Similar to Smart Cities in India: Privacy & Security Concerns and Strategies

Future of digital identity programme summary - 19 mar 2019 lr
Future of digital identity   programme summary - 19 mar 2019 lrFuture of digital identity   programme summary - 19 mar 2019 lr
Future of digital identity programme summary - 19 mar 2019 lr
Future Agenda
 

Similar to Smart Cities in India: Privacy & Security Concerns and Strategies (20)

Ethics and Politics of Big Data
Ethics and Politics of Big DataEthics and Politics of Big Data
Ethics and Politics of Big Data
 
Future of digital identity programme summary - 19 mar 2019 lr
Future of digital identity   programme summary - 19 mar 2019 lrFuture of digital identity   programme summary - 19 mar 2019 lr
Future of digital identity programme summary - 19 mar 2019 lr
 
Future of digital identity Programme summary - 15 dec 2018 lr
Future of digital identity  Programme summary - 15 dec 2018 lrFuture of digital identity  Programme summary - 15 dec 2018 lr
Future of digital identity Programme summary - 15 dec 2018 lr
 
Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2
 
Strong Authentication - Open Source
Strong Authentication - Open SourceStrong Authentication - Open Source
Strong Authentication - Open Source
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect id
 
The ethics and risks of urban big data and smart cities
The ethics and risks of urban big data and smart citiesThe ethics and risks of urban big data and smart cities
The ethics and risks of urban big data and smart cities
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for value
 
The Next Gen Auditor - Auditing through technological disruptions
The Next Gen Auditor - Auditing through technological disruptionsThe Next Gen Auditor - Auditing through technological disruptions
The Next Gen Auditor - Auditing through technological disruptions
 
005. Ethics, Privacy and Security
005. Ethics, Privacy and Security005. Ethics, Privacy and Security
005. Ethics, Privacy and Security
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Tivi - Tunnistautuminen - 2020
Tivi - Tunnistautuminen - 2020Tivi - Tunnistautuminen - 2020
Tivi - Tunnistautuminen - 2020
 
Big Data: Trends, Applications and Potentials
Big Data: Trends, Applications and PotentialsBig Data: Trends, Applications and Potentials
Big Data: Trends, Applications and Potentials
 
Surveillance and security.pptx
Surveillance and security.pptxSurveillance and security.pptx
Surveillance and security.pptx
 
Open Data e Smart Government: tecnologie e trend di mercato Alessio Meloni
Open Data e Smart Government: tecnologie e trend di mercato Alessio MeloniOpen Data e Smart Government: tecnologie e trend di mercato Alessio Meloni
Open Data e Smart Government: tecnologie e trend di mercato Alessio Meloni
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
NSTIC and IDESG Update
NSTIC and IDESG UpdateNSTIC and IDESG Update
NSTIC and IDESG Update
 

Recently uploaded

一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
Fir La
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
ss
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
Airst S
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
JosephCanama
 
Article 12 of the Indian Constitution law
Article 12 of the Indian Constitution lawArticle 12 of the Indian Constitution law
Article 12 of the Indian Constitution law
yogita9398
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
Airst S
 
Types of Agricultural markets LLB- SEM I
Types of Agricultural markets LLB- SEM ITypes of Agricultural markets LLB- SEM I
Types of Agricultural markets LLB- SEM I
yogita9398
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
bd2c5966a56d
 
一比一原版(AUT毕业证书)新西兰奥克兰理工大学毕业证如何办理
一比一原版(AUT毕业证书)新西兰奥克兰理工大学毕业证如何办理一比一原版(AUT毕业证书)新西兰奥克兰理工大学毕业证如何办理
一比一原版(AUT毕业证书)新西兰奥克兰理工大学毕业证如何办理
e9733fc35af6
 
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
ZurliaSoop
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
Airst S
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理
Airst S
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
Airst S
 

Recently uploaded (20)

一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
 
Elective Course on Forensic Science in Law
Elective Course on Forensic Science  in LawElective Course on Forensic Science  in Law
Elective Course on Forensic Science in Law
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
 
Article 12 of the Indian Constitution law
Article 12 of the Indian Constitution lawArticle 12 of the Indian Constitution law
Article 12 of the Indian Constitution law
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
 
Reason Behind the Success of Law Firms in India
Reason Behind the Success of Law Firms in IndiaReason Behind the Success of Law Firms in India
Reason Behind the Success of Law Firms in India
 
Types of Agricultural markets LLB- SEM I
Types of Agricultural markets LLB- SEM ITypes of Agricultural markets LLB- SEM I
Types of Agricultural markets LLB- SEM I
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
Understanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective BargainingUnderstanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective Bargaining
 
Career As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsCareer As Legal Reporters for Law Students
Career As Legal Reporters for Law Students
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
 
一比一原版(AUT毕业证书)新西兰奥克兰理工大学毕业证如何办理
一比一原版(AUT毕业证书)新西兰奥克兰理工大学毕业证如何办理一比一原版(AUT毕业证书)新西兰奥克兰理工大学毕业证如何办理
一比一原版(AUT毕业证书)新西兰奥克兰理工大学毕业证如何办理
 
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理
 
CASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptx
CASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptxCASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptx
CASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptx
 
ARTICLE 370 PDF about the indian constitution.
ARTICLE 370 PDF about the  indian constitution.ARTICLE 370 PDF about the  indian constitution.
ARTICLE 370 PDF about the indian constitution.
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 

Smart Cities in India: Privacy & Security Concerns and Strategies

  • 1.
  • 2. Smart Cities of India: Privacy and Security Concerns and Strategies Kavitha Gupta Senior Legal Counsel - APAC Hitachi Consulting V. Rajesh Kumar Privacy & Data Protection Officer - APAC HCL Technologies Limited
  • 5. Leveraging Technologies Integration of Core Sub- Systems of City Services Deeper Analysis to provide Real Time Data In Simple Terms… • Connecting citizens with city services • Structuring dialog between Government and Citizens • Employment Opportunities • Social & Economic Development • Quality of Life CitizensCitizens
  • 6.
  • 9. Carrier Networks, IoT, M2M, Operators, Tran-receivers Communication Ownership, Liabilities, Data Usage Guidelines and Policies, Anonymization and Pseudonymization Legal Boundaries Behaviors, Consumption Pattern, Analysis, Sharing, Destruction, Aggregation Data Big Data, Cloud, Ubiquitous computing Access Controls, Authorization, Governance, Operations & Management Computing & Storage Online and Offline Users Core Components
  • 11. Smart City & India Overall Market Estimate Overall Market Estimate FocusFocus 5 Years5 Years 100 Smart Cities100 Smart Cities 35% Urban Population 35% Urban Population 50,000 crores50,000 crores Social InfrastructureSocial Infrastructure Physical InfrastructurePhysical Infrastructure Institutional InfrastructureInstitutional Infrastructure Economic InfrastructureEconomic Infrastructure Smart City Mission – MUD (June 2015) Smart City Mission – MUD (June 2015) Report on Integrated ICT & Geo Spatial Technologies - Framework Report on Integrated ICT & Geo Spatial Technologies - Framework Synergies with Key National Schemes Synergies with Key National Schemes
  • 13. List of 100 Proposed Smart Cities in India Source: http://indiatoday.intoday.in/story/modis-smart-cities-have-a-viability-gap/1/469389.html
  • 15. Applicable Laws and Regulations • Information Technology Act, 2000 • Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 – applicable to Private Sectors • Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016 • National Telecom Policy 2012 • National Data Sharing and Accessibility Policy 2012 • National Cyber Security Policy 2013 • IoT Policy (Draft)
  • 16. Privacy Practices 16 Taxanomy IT Act 2000 Aadhar Act 2016 GDPR Information collection Surveillance       Interrogation       Information processing Aggregation       Identification       Insecurity       Secondary use       Exclusion       Information dissemination Breach of confidentiality       Disclosure       Exposure       Increased accessibility       Appropriation       Distortion       Invasion Intrusion       Decisional interference       StrongStrong WeakWeak NoneNone
  • 21. Individual Rights • Whether the data collected are used for the right purpose? • Who are the other stakeholders using the data? • Whether data usage is beyond the subscription needs? • Where any procedures in place to allow citizens access to their data? • Are there sufficient safeguards to protect the data during transmit? • Who owns accountability for any breaches? • Are the practices “user (i.e. citizen) centric?”
  • 22. Intrusion in to one’s personal life Identity Fraud Financial Theft Identity Fraud Financial Theft Marketing calls & Mails Marketing calls & Mails Embarrassment Discrimination Embarrassment Discrimination Profiling Commercial Tracking Profiling Commercial Tracking
  • 23. Data Sharing • How are data shared between Government agencies and privacy players? • What sort of policies and guidelines are build for data flow between the stakeholders? • Rights to re-use the data • Who owns when new personal data is created in the process of collection and use? • What steps are taken by the Government to prevent loss of control over the data? • What agreements are in place to prevent misuse of data?
  • 24. Data Profiling •Automatic Processing or computer techniques (such as data mining) •Analytics •Algorithms AggregateAggregate • Data Attributes • Online data • Offline records (such as Tax Info, Purchases) • Demographic Information • Data Attributes • Online data • Offline records (such as Tax Info, Purchases) • Demographic Information • Predictive Profiling • Individual Behaviors • Likes • Dislikes • Preferences • Attitudes • Predictive Profiling • Individual Behaviors • Likes • Dislikes • Preferences • Attitudes DiscoverDiscover •Online Advertisers •Data Brokers •Online Advertisers •Data Brokers
  • 26. Surveillance • Chilling effect on the Society at Large – Being free from observation or disturbance – Freedom of expression (Fear of Isolation) – Safeguards against discrimination – Unlawful arrests
  • 29. Identification & Authentication SensorsSensors SensorsSensors SensorsSensors SensorsSensors GatewayGateway Applications [Mobile/Web] Applications [Mobile/Web]UserUser City Systems & Services City Systems & Services Identity ManagementIdentity Management Access Mgmt/ Authentication [OpenID, OAuth, SAML] Access Mgmt/ Authentication [OpenID, OAuth, SAML] DevicesDevices GovernmentGovernment Identifiers contain Attributes Identifiers contain Attributes PIIPII • Information Tracking • Unauthorized Access • Data Loss • Lack of In-depth controls C y b e r C r i m i n al s C y b e r C r i m i n al s
  • 30. Inter-Operability OSOS Wired Sensors Wired Sensors Vendor Fragm entation Vendor Fragm entation UtilityUtility FTTHFTTH Com m unicatio n Protocols Com m unicatio n Protocols Hardware Platforms Hardware PlatformsApplication s Application s Information Sharing Technologie s Information Sharing Technologie s Wireless Sensors Wireless Sensors • Estimated waste of $341 billion by 2025 due to fragmented solutions • Using non-standardization solutions will drive global implementation cost of project cities to $1.12 trillion Technology Providers Technology Providers • Confidentiality • Integrity • Accessibility of the Services • Availability of real time data Above 90% of IT professionals believe Smart Cities don’t have any protection from cyber attacks today (Source: TripWire). Overarching ecosystem with multiple players and different technologies
  • 36. Privacy Enhancing Technologies • Encryption Tools • Policy Tools • Filtering Tools • Anonymity Tools To uniquely identify devices along with responsibility of the stakeholders
  • 37. Inter-operability Standards • National Institute of Standards and Technology Big Data Interoperability Framework • IEEE Standard for an Architectural Framework for the Internet of Things (IoT) • ISO/TC 268, which is focused on sustainable development in communities • ISO 37120:2014 • ISO/TS 37151 and ISO/TR 37152 Smart community infrastructures • ISO/IEC JTC 1 Working group on Smart Cities (WG 11) • 7001 - PRIPARE Smart City Strategy • Smart city framework standard (PAS 181) • Data concept model for smart cities (PAS 182)
  • 40. Cyber Response Team Close collaboration between Government, Citizens and Private Sectors