SlideShare a Scribd company logo
1 of 10
Download to read offline
Challenges of the Internet Of Things: 

Possible Solutions from Data Protecy
and 3D Privacy
Annual Privacy Forum
Frankfurt
September 7, 2016
Luca Bolognini
Camilla Bistolfi
l.bolognini@istitutoprivacy.it
c.bistolfi@istitutoprivacy.it
IOT PERVASIVENESS WITH RESPECT TO DAILY
LIFE
Wearable computing -
Internet of Bodies
Smart home/city
Waiting for Internet of
Blood/Cells?
Big Data
Collection
Personal data
collection
Environmental
sensing
Profiling/
Monitoring
Physical
Identification
Intersubjective
and interobjective
data transfer
Relevant IoT activities
Which are the risks?
Profiling without consent and behavioural monitoring
Interaction with other objects in order to analyze information and generate cross-profiles
Re-identification of a data subject thanks to the unique identifier assigned to the object
Unlawful data transmission between different data controllers (the developer of the object, the
application developer, the cloud provider, the developer of the other interacting objects etc.)
Loss of control of the personal data
Impacts on unaware data subjects (“Digital Subconscious”)
BEFORE IOT -> Data subject n.1 = active – interactive – in principle, the GDPR (and also
Directives 95/46/EC and 2002/58/EC) identifies an «interactive» data subject
AFTER IOT -> Data subject n. 2 as a NON-USER = the IoT implies the involvement of
passive subjects which are out of reach (in terms of information to be given and of consent
to be collected)
BEFORE IOT -> Controlling/processing actors = again, in principle, the GDPR (and also
Directives 95/46/EC and 2002/58/EC) considers data controller and data processor that are
active subjects
AFTER IOT -> NON-SUBJECTS as controlling/processing actors = data controllers and
processors are also, merely, objects (often without a face/interface)
IoT players: a new dimension
How to deal with pervasiveness?
1. THEORY - Reconsideration of the concepts of privacy and data protection, merging them together – as
the continuous processing of personal data (protected according to art. 8 of the Charter of
Fundamental Rights of the European Union, “CFREU”) is also by default accompanied in IoT by the
invasion of what, according to art. 7 of the “CFREU”, we define as private and family life.
2. PRACTICE - Adoption of tools possibly available to the data subjects, non-users, and citizens to
directly defend their own space and their own person from the invasion of smart objects and non-
subjects.
«Data
protecy»
«3D privacy»
“Data protecy”, not only a legalese neologism
The concept of “personal sphere” has changed. It has lost its classic features, opening its doors to the
first inanimate objects which now are able to act independently in terms of the information they reveal
and can even talk to each other, exchange data that they have acquired. Smart “things” are objects
which are precisely part of the “personal sphere” which carry risks of “interference” with respect to
the individual’s privacy.
Thanks to the intrinsic characteristics of the IoT, we have witnessed the reunification of the rights that
Articles 7 and 8 of the CFREU had divided: the Internet of things requires that data protection and
privacy are fused together in order to protect the individual from the activities of connected and
interconnected intelligent objects that invade the private sphere (even the human body) while
processing personal data.
Data protecy = physical + virtual
personal info protection
Often we cannot choose not to be a data subject and to remain invisible to sensors of the smart
object.
The protection of the personal sphere and its “material data” is becoming three-dimensional
3D privacy consists in adopting also physical security measures, empowering users and non-users as
data subjects with material tools in order to self-control over their information and to self-defend
from data collection in IoT open environments. It is the use of other objects or other physical
elements in order to avoid capture of personal information, shielding the individual from such
collection,
restoring the privacy of the individual sphere and keeping the data
protected
3D privacy
3D privacy = a kind of "data protecy self-
enforcement"
3D privacy: examples
Privacy
visors
iPhone passcode (not
remotely) / press-code
Anti-paparazzi
foulard
Privacy screen
Personal antiradar
Biometric passwords
Objects search engines
/augmented reality
privacy tools
Thank you!
Frankfurt
September 7, 2016
Luca Bolognini
Camilla Bistolfi
l.bolognini@istitutoprivacy.it
c.bistolfi@istitutoprivacy.it

More Related Content

What's hot

venkata krishna IoT ppt
venkata krishna IoT pptvenkata krishna IoT ppt
venkata krishna IoT ppt
Raja Krishna
 
Drm metadata presentation fina lwith-notes
Drm metadata presentation fina lwith-notesDrm metadata presentation fina lwith-notes
Drm metadata presentation fina lwith-notes
Pamela Carson
 

What's hot (20)

M018138085
M018138085M018138085
M018138085
 
The Internet of Things, Ubiquitous Computation and the Evolutionary Future of...
The Internet of Things, Ubiquitous Computation and the Evolutionary Future of...The Internet of Things, Ubiquitous Computation and the Evolutionary Future of...
The Internet of Things, Ubiquitous Computation and the Evolutionary Future of...
 
RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY
RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY
RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY
 
Start2AIM Legal focus points for AI in Marketing
Start2AIM Legal focus points for AI in Marketing Start2AIM Legal focus points for AI in Marketing
Start2AIM Legal focus points for AI in Marketing
 
Emergence of io t
Emergence of io tEmergence of io t
Emergence of io t
 
Introduction to Internet of Things
Introduction to Internet of ThingsIntroduction to Internet of Things
Introduction to Internet of Things
 
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction
 
Applications of Blockchains in the Internet of Things: A Comprehensive Survey
Applications of Blockchains in the Internet of Things: A Comprehensive SurveyApplications of Blockchains in the Internet of Things: A Comprehensive Survey
Applications of Blockchains in the Internet of Things: A Comprehensive Survey
 
Gdpr and smart cities
Gdpr and smart citiesGdpr and smart cities
Gdpr and smart cities
 
ETHICAL CHALLENGES IN THE USE OF IOT IN EDUCATION: ON THE PATH TO PERSONALIZA...
ETHICAL CHALLENGES IN THE USE OF IOT IN EDUCATION: ON THE PATH TO PERSONALIZA...ETHICAL CHALLENGES IN THE USE OF IOT IN EDUCATION: ON THE PATH TO PERSONALIZA...
ETHICAL CHALLENGES IN THE USE OF IOT IN EDUCATION: ON THE PATH TO PERSONALIZA...
 
venkata krishna IoT ppt
venkata krishna IoT pptvenkata krishna IoT ppt
venkata krishna IoT ppt
 
Iot
IotIot
Iot
 
Home monitoring system using io t
Home monitoring system using io tHome monitoring system using io t
Home monitoring system using io t
 
VET4SBO Level 1 module 3 - unit 1 - v1.0 en
VET4SBO Level 1   module 3 - unit 1 - v1.0 enVET4SBO Level 1   module 3 - unit 1 - v1.0 en
VET4SBO Level 1 module 3 - unit 1 - v1.0 en
 
Interner of Things Iinsurance gateway
Interner of Things Iinsurance gateway Interner of Things Iinsurance gateway
Interner of Things Iinsurance gateway
 
Drm metadata presentation fina lwith-notes
Drm metadata presentation fina lwith-notesDrm metadata presentation fina lwith-notes
Drm metadata presentation fina lwith-notes
 
Internet of Information and Services (IoIS): A Conceptual Integrative Archite...
Internet of Information and Services (IoIS): A Conceptual Integrative Archite...Internet of Information and Services (IoIS): A Conceptual Integrative Archite...
Internet of Information and Services (IoIS): A Conceptual Integrative Archite...
 
20170928 A (very short) introduction
20170928 A (very short) introduction20170928 A (very short) introduction
20170928 A (very short) introduction
 
Kees stuurman
Kees stuurmanKees stuurman
Kees stuurman
 
Internet of things PPT
Internet of things PPTInternet of things PPT
Internet of things PPT
 

Viewers also liked

Media genre research
Media genre researchMedia genre research
Media genre research
swiggtyswag
 
Industry Development & Job Creation FLAGSHIPS
Industry Development & Job Creation FLAGSHIPSIndustry Development & Job Creation FLAGSHIPS
Industry Development & Job Creation FLAGSHIPS
Brett Thomas (MCIPS)
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 ppt
Mhae Lyn
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Vala Afshar
 

Viewers also liked (19)

Media genre research
Media genre researchMedia genre research
Media genre research
 
Internet of things, big data & mobility vs privacy
Internet of things, big data & mobility vs privacyInternet of things, big data & mobility vs privacy
Internet of things, big data & mobility vs privacy
 
David meloy resume 2013
David meloy   resume 2013David meloy   resume 2013
David meloy resume 2013
 
Industry Development & Job Creation FLAGSHIPS
Industry Development & Job Creation FLAGSHIPSIndustry Development & Job Creation FLAGSHIPS
Industry Development & Job Creation FLAGSHIPS
 
WRA 150 Week 8 inclass
WRA 150 Week 8 inclassWRA 150 Week 8 inclass
WRA 150 Week 8 inclass
 
Melvin
MelvinMelvin
Melvin
 
Extra essay mit
Extra essay mitExtra essay mit
Extra essay mit
 
ES_Kokanee_poster_final
ES_Kokanee_poster_finalES_Kokanee_poster_final
ES_Kokanee_poster_final
 
3.1 phaeno - The World of Phenomena
3.1 phaeno -  The World of Phenomena3.1 phaeno -  The World of Phenomena
3.1 phaeno - The World of Phenomena
 
Urok 1 4-0-99
Urok 1 4-0-99Urok 1 4-0-99
Urok 1 4-0-99
 
Report heydar aliyev zaha hadid aniruddh ashutosh snehanshu
Report heydar aliyev zaha hadid aniruddh ashutosh snehanshuReport heydar aliyev zaha hadid aniruddh ashutosh snehanshu
Report heydar aliyev zaha hadid aniruddh ashutosh snehanshu
 
What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGS
 
Медіакультура бібліотекаря
Медіакультура бібліотекаряМедіакультура бібліотекаря
Медіакультура бібліотекаря
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and Applications
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 ppt
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 

Similar to Internet of Things: data protecy and 3d privacy

Privacy and visibility in the sensor society
Privacy and visibility in the sensor societyPrivacy and visibility in the sensor society
Privacy and visibility in the sensor society
Considerati
 
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdfInternet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
ImXaib
 
CHAPTER 4.pptx
CHAPTER 4.pptxCHAPTER 4.pptx
CHAPTER 4.pptx
ttyu2
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
Samir SEHIL
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obama
Lilian Edwards
 

Similar to Internet of Things: data protecy and 3d privacy (20)

Emergig-Technology-ch-4.ppt
Emergig-Technology-ch-4.pptEmergig-Technology-ch-4.ppt
Emergig-Technology-ch-4.ppt
 
Webinos approach in IOT
Webinos approach in IOTWebinos approach in IOT
Webinos approach in IOT
 
Privacy and visibility in the sensor society
Privacy and visibility in the sensor societyPrivacy and visibility in the sensor society
Privacy and visibility in the sensor society
 
chaptertaaaaaaaaaaaaaaadddddddd2222 4.ppt
chaptertaaaaaaaaaaaaaaadddddddd2222 4.pptchaptertaaaaaaaaaaaaaaadddddddd2222 4.ppt
chaptertaaaaaaaaaaaaaaadddddddd2222 4.ppt
 
iot ppt.pptx
iot ppt.pptxiot ppt.pptx
iot ppt.pptx
 
IoT ppt
IoT pptIoT ppt
IoT ppt
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdfInternet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
 
The internet of things
The internet of thingsThe internet of things
The internet of things
 
Internet Of Things(IoT).pptx
Internet Of Things(IoT).pptxInternet Of Things(IoT).pptx
Internet Of Things(IoT).pptx
 
CHAPTER 4.pptx
CHAPTER 4.pptxCHAPTER 4.pptx
CHAPTER 4.pptx
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
 
IoT.pptx
IoT.pptxIoT.pptx
IoT.pptx
 
IoT Intro.pptx
IoT Intro.pptxIoT Intro.pptx
IoT Intro.pptx
 
PECB Webinar: The Internet of Things
PECB Webinar: The Internet of ThingsPECB Webinar: The Internet of Things
PECB Webinar: The Internet of Things
 
Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...
 
Дорожная карта промышленного интернета
Дорожная карта промышленного интернетаДорожная карта промышленного интернета
Дорожная карта промышленного интернета
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obama
 
The death of data protection
The death of data protection The death of data protection
The death of data protection
 
IoT
IoTIoT
IoT
 

Recently uploaded

一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
Airst S
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
Airst S
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
e9733fc35af6
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
F La
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
Airst S
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
Airst S
 
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
F La
 
一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书
一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书
一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书
irst
 
一比一原版(UM毕业证书)密苏里大学毕业证如何办理
一比一原版(UM毕业证书)密苏里大学毕业证如何办理一比一原版(UM毕业证书)密苏里大学毕业证如何办理
一比一原版(UM毕业证书)密苏里大学毕业证如何办理
F La
 
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
CssSpamx
 
一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理
e9733fc35af6
 
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
e9733fc35af6
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理
Airst S
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书
irst
 
一比一原版(UWA毕业证书)西澳大学毕业证如何办理
一比一原版(UWA毕业证书)西澳大学毕业证如何办理一比一原版(UWA毕业证书)西澳大学毕业证如何办理
一比一原版(UWA毕业证书)西澳大学毕业证如何办理
bd2c5966a56d
 
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
e9733fc35af6
 

Recently uploaded (20)

Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
 
Reason Behind the Success of Law Firms in India
Reason Behind the Success of Law Firms in IndiaReason Behind the Success of Law Firms in India
Reason Behind the Success of Law Firms in India
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
 
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
 
一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书
一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书
一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书
 
一比一原版(UM毕业证书)密苏里大学毕业证如何办理
一比一原版(UM毕业证书)密苏里大学毕业证如何办理一比一原版(UM毕业证书)密苏里大学毕业证如何办理
一比一原版(UM毕业证书)密苏里大学毕业证如何办理
 
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
 
一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理
 
Career As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsCareer As Legal Reporters for Law Students
Career As Legal Reporters for Law Students
 
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
 
5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdf5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdf
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书
 
一比一原版(UWA毕业证书)西澳大学毕业证如何办理
一比一原版(UWA毕业证书)西澳大学毕业证如何办理一比一原版(UWA毕业证书)西澳大学毕业证如何办理
一比一原版(UWA毕业证书)西澳大学毕业证如何办理
 
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
 

Internet of Things: data protecy and 3d privacy

  • 1. Challenges of the Internet Of Things: 
 Possible Solutions from Data Protecy and 3D Privacy Annual Privacy Forum Frankfurt September 7, 2016 Luca Bolognini Camilla Bistolfi l.bolognini@istitutoprivacy.it c.bistolfi@istitutoprivacy.it
  • 2. IOT PERVASIVENESS WITH RESPECT TO DAILY LIFE Wearable computing - Internet of Bodies Smart home/city Waiting for Internet of Blood/Cells?
  • 4. Which are the risks? Profiling without consent and behavioural monitoring Interaction with other objects in order to analyze information and generate cross-profiles Re-identification of a data subject thanks to the unique identifier assigned to the object Unlawful data transmission between different data controllers (the developer of the object, the application developer, the cloud provider, the developer of the other interacting objects etc.) Loss of control of the personal data Impacts on unaware data subjects (“Digital Subconscious”)
  • 5. BEFORE IOT -> Data subject n.1 = active – interactive – in principle, the GDPR (and also Directives 95/46/EC and 2002/58/EC) identifies an «interactive» data subject AFTER IOT -> Data subject n. 2 as a NON-USER = the IoT implies the involvement of passive subjects which are out of reach (in terms of information to be given and of consent to be collected) BEFORE IOT -> Controlling/processing actors = again, in principle, the GDPR (and also Directives 95/46/EC and 2002/58/EC) considers data controller and data processor that are active subjects AFTER IOT -> NON-SUBJECTS as controlling/processing actors = data controllers and processors are also, merely, objects (often without a face/interface) IoT players: a new dimension
  • 6. How to deal with pervasiveness? 1. THEORY - Reconsideration of the concepts of privacy and data protection, merging them together – as the continuous processing of personal data (protected according to art. 8 of the Charter of Fundamental Rights of the European Union, “CFREU”) is also by default accompanied in IoT by the invasion of what, according to art. 7 of the “CFREU”, we define as private and family life. 2. PRACTICE - Adoption of tools possibly available to the data subjects, non-users, and citizens to directly defend their own space and their own person from the invasion of smart objects and non- subjects. «Data protecy» «3D privacy»
  • 7. “Data protecy”, not only a legalese neologism The concept of “personal sphere” has changed. It has lost its classic features, opening its doors to the first inanimate objects which now are able to act independently in terms of the information they reveal and can even talk to each other, exchange data that they have acquired. Smart “things” are objects which are precisely part of the “personal sphere” which carry risks of “interference” with respect to the individual’s privacy. Thanks to the intrinsic characteristics of the IoT, we have witnessed the reunification of the rights that Articles 7 and 8 of the CFREU had divided: the Internet of things requires that data protection and privacy are fused together in order to protect the individual from the activities of connected and interconnected intelligent objects that invade the private sphere (even the human body) while processing personal data. Data protecy = physical + virtual personal info protection
  • 8. Often we cannot choose not to be a data subject and to remain invisible to sensors of the smart object. The protection of the personal sphere and its “material data” is becoming three-dimensional 3D privacy consists in adopting also physical security measures, empowering users and non-users as data subjects with material tools in order to self-control over their information and to self-defend from data collection in IoT open environments. It is the use of other objects or other physical elements in order to avoid capture of personal information, shielding the individual from such collection, restoring the privacy of the individual sphere and keeping the data protected 3D privacy 3D privacy = a kind of "data protecy self- enforcement"
  • 9. 3D privacy: examples Privacy visors iPhone passcode (not remotely) / press-code Anti-paparazzi foulard Privacy screen Personal antiradar Biometric passwords Objects search engines /augmented reality privacy tools
  • 10. Thank you! Frankfurt September 7, 2016 Luca Bolognini Camilla Bistolfi l.bolognini@istitutoprivacy.it c.bistolfi@istitutoprivacy.it