SlideShare a Scribd company logo
1 of 17
DATA, ETHICS AND THE LAW
SAMANTHA AHERN
UNIVERSITY COLLEGE LONDON
• What are the ethical and legal considerations for the IoT and
big data collection?
• What is the GDPR and what will it mean for processing and data
collection?
• What rights to privacy do we have and will we want?
• Who should be making those decisions – technologists or end
users?
THE VOLUME, VELOCITY AND VARIETY OF
DATA WE ARE GENERATING IS RAPIDLY
INCREASING. WE CREATE DATA ON ALMOST
ALL ASPECTS OF OUR LIVES, WHICH CAN BE
HARNESSED AND ANALYSED TO PROVIDE
POWERFUL INSIGHTS INTO OUR BEHAVIOUR,
OUR PREFERENCES AND OUR FUTURE ACTIONS.
From Bricks to Clicks: the Potential of Data and Analytics in Higher Education.
Policy Connect. Higher Education Commission (2016)
REUTERS: YAHOO SECRETLY SCANNED
CUSTOMER EMAILS FOR U.S. INTELLIGENCE
http://www.reuters.com/article/us-yahoo-nsa-exclusive-idUSKCN1241YT
DATA PROTECTION ACT (1998)
• used fairly and lawfully
• used for limited, specifically stated purposes
• used in a way that is adequate, relevant and not excessive
• accurate
• kept for no longer than is absolutely necessary
• handled according to people’s data protection rights
• kept safe and secure
• not transferred outside the European Economic Area without adequate
protection
https://www.gov.uk/data-protection/the-data-protection-act
PRIVACY SHIELD
• EU Commission fact sheet: http://ec.europa.eu/justice/data-
protection/files/factsheets/factsheet_eu-
us_privacy_shield_en.pdf
GENERAL DATA PROTECTION REGULATIONS
(GDPR)
• Will come into force in the UK on May 25 2018
• The GDPR imposes restrictions on the transfer of personal data
outside the European Union, to third countries or international
organisations.
• Principles: https://ico.org.uk/for-organisations/data-
protection-reform/overview-of-the-gdpr/principles/
WINDOWS 10
GDPR: INDIVIDUALS’ RIGHTS
The main rights for individuals under the GDPR will be:
• subject access,
• to have inaccuracies corrected,
• to have information erased,
• to prevent direct marketing,
• to prevent automated decision-making and profiling, and
• data portability.
https://ico.org.uk/media/1624219/preparing-for-the-gdpr-12-
METADATA AND AGGREGATION
• Where data is to be used anonymously particular care will be
taken by institutions to avoid:
• Identification of individuals from metadata
• Re-identification of individuals by aggregating multiple data sources
https://www.jisc.ac.uk/sites/default/files/jd0040_code_of_practice_for_l
earning_analytics_190515_v1.pdf
THE UNIVERSITY ENVIRONMENT
• Recommendation 3
• Recommendation 4
• Recommendation 5
BRICKS TO CLICKS RECOMMENDATIONS
From Bricks to Clicks: the Potential of Data and Analytics in Higher Education.
Policy Connect. Higher Education Commission (2016)
RECOMMENDATION 3
• All HEIs should consider introducing an appropriate learning
analytics system to improve student support / performance at
their institution.
• Any such decision should be fully informed by an analysis of
the benefits, limitations and risks attached.
RECOMMENDATION 4
• Institutions should put in place clear ethical policies and codes
of practices that govern the use of student data in analytics and
other digital systems.
• These policies should, at a minimum, address student privacy,
security of data and consent.
RECOMMENDATION 5
• In particular, when introducing learning analytics, HEIs should
seek fully informed consent from students to the use of their
personal and learning data in analytics.
• This should be sought again if new data is incorporated into
the system, or existing data is used in new ways.
By KylaBorg (Privacy) [CC BY 2.0 (http://creativecommons.org/licenses/by/2.0)],
via Wikimedia Commons
QUESTIONS

More Related Content

What's hot

Data protection and smart grids
Data protection and smart gridsData protection and smart grids
Data protection and smart gridsRónán Kennedy
 
Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...ijistjournal
 
EDF2014: Allan Hanbury, Senior Researcher, Vienna University of Technology, A...
EDF2014: Allan Hanbury, Senior Researcher, Vienna University of Technology, A...EDF2014: Allan Hanbury, Senior Researcher, Vienna University of Technology, A...
EDF2014: Allan Hanbury, Senior Researcher, Vienna University of Technology, A...European Data Forum
 
From Law to Code: Translating Legal Principles into Digital Rules
From Law to Code: Translating Legal Principles into Digital RulesFrom Law to Code: Translating Legal Principles into Digital Rules
From Law to Code: Translating Legal Principles into Digital RulesRónán Kennedy
 
Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...ijistjournal
 
Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...ijistjournal
 
Bioinformatics market
Bioinformatics marketBioinformatics market
Bioinformatics marketBarbarHinkle
 
Where Next for Open Data in the Russian Federation
Where Next for Open Data in the Russian FederationWhere Next for Open Data in the Russian Federation
Where Next for Open Data in the Russian FederationAndrew Stott
 
"The value of a European approach to mHealth in cancer Unleashing the mHealth...
"The value of a European approach to mHealth in cancer Unleashing the mHealth..."The value of a European approach to mHealth in cancer Unleashing the mHealth...
"The value of a European approach to mHealth in cancer Unleashing the mHealth...3GDR
 
Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...ijistjournal
 
Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...ijistjournal
 
Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...ijistjournal
 
Hidden Data Wiki Presentation
Hidden Data Wiki PresentationHidden Data Wiki Presentation
Hidden Data Wiki Presentationguest5cb8c7fc
 
Data sharing for development: a case of Infrastructural development in Uganda...
Data sharing for development: a case of Infrastructural development in Uganda...Data sharing for development: a case of Infrastructural development in Uganda...
Data sharing for development: a case of Infrastructural development in Uganda...African Open Science Platform
 
Practical Guide to Publishing Open Data
Practical Guide to Publishing Open DataPractical Guide to Publishing Open Data
Practical Guide to Publishing Open DataDerilinx
 

What's hot (20)

Data protection and smart grids
Data protection and smart gridsData protection and smart grids
Data protection and smart grids
 
Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...
 
Cybersecurity and Academic Research
Cybersecurity and Academic ResearchCybersecurity and Academic Research
Cybersecurity and Academic Research
 
EDF2014: Allan Hanbury, Senior Researcher, Vienna University of Technology, A...
EDF2014: Allan Hanbury, Senior Researcher, Vienna University of Technology, A...EDF2014: Allan Hanbury, Senior Researcher, Vienna University of Technology, A...
EDF2014: Allan Hanbury, Senior Researcher, Vienna University of Technology, A...
 
From Law to Code: Translating Legal Principles into Digital Rules
From Law to Code: Translating Legal Principles into Digital RulesFrom Law to Code: Translating Legal Principles into Digital Rules
From Law to Code: Translating Legal Principles into Digital Rules
 
Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...
 
Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...
 
Bioinformatics market
Bioinformatics marketBioinformatics market
Bioinformatics market
 
Where Next for Open Data in the Russian Federation
Where Next for Open Data in the Russian FederationWhere Next for Open Data in the Russian Federation
Where Next for Open Data in the Russian Federation
 
Data Portability and Interoperability – SWIRE – June 2021 OECD discussion
Data Portability and Interoperability – SWIRE – June 2021 OECD discussionData Portability and Interoperability – SWIRE – June 2021 OECD discussion
Data Portability and Interoperability – SWIRE – June 2021 OECD discussion
 
"The value of a European approach to mHealth in cancer Unleashing the mHealth...
"The value of a European approach to mHealth in cancer Unleashing the mHealth..."The value of a European approach to mHealth in cancer Unleashing the mHealth...
"The value of a European approach to mHealth in cancer Unleashing the mHealth...
 
Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...
 
Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...
 
Sandipa
SandipaSandipa
Sandipa
 
Brenda M. Simon, "The Pathologies of Biomedical ‘Data-Generating’ Patents: Le...
Brenda M. Simon, "The Pathologies of Biomedical ‘Data-Generating’ Patents: Le...Brenda M. Simon, "The Pathologies of Biomedical ‘Data-Generating’ Patents: Le...
Brenda M. Simon, "The Pathologies of Biomedical ‘Data-Generating’ Patents: Le...
 
Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...
 
Non-Price Effects of Mergers – LYNSKEY – June 2018 OECD discussion
Non-Price Effects of Mergers – LYNSKEY – June 2018 OECD discussionNon-Price Effects of Mergers – LYNSKEY – June 2018 OECD discussion
Non-Price Effects of Mergers – LYNSKEY – June 2018 OECD discussion
 
Hidden Data Wiki Presentation
Hidden Data Wiki PresentationHidden Data Wiki Presentation
Hidden Data Wiki Presentation
 
Data sharing for development: a case of Infrastructural development in Uganda...
Data sharing for development: a case of Infrastructural development in Uganda...Data sharing for development: a case of Infrastructural development in Uganda...
Data sharing for development: a case of Infrastructural development in Uganda...
 
Practical Guide to Publishing Open Data
Practical Guide to Publishing Open DataPractical Guide to Publishing Open Data
Practical Guide to Publishing Open Data
 

Viewers also liked

EU Sustainable Energy Week - How to support innovation to enter the market
EU Sustainable Energy Week - How to support innovation to enter the marketEU Sustainable Energy Week - How to support innovation to enter the market
EU Sustainable Energy Week - How to support innovation to enter the marketPeter Schellinck
 
Hereditas lingkungan-dan-penyakit
Hereditas lingkungan-dan-penyakitHereditas lingkungan-dan-penyakit
Hereditas lingkungan-dan-penyakitintankumara
 
Scope and aims of physiotherapy
Scope and aims of physiotherapy Scope and aims of physiotherapy
Scope and aims of physiotherapy Sam Shaikh
 
Pembelahan Sel
Pembelahan SelPembelahan Sel
Pembelahan Selnova147
 
Field failure analysis using root cause pattern diagrams
Field failure analysis using root cause pattern diagramsField failure analysis using root cause pattern diagrams
Field failure analysis using root cause pattern diagramsASQ Reliability Division
 
Chapter 4 anxiety disorders
Chapter 4  anxiety disordersChapter 4  anxiety disorders
Chapter 4 anxiety disordersKatiess1128
 

Viewers also liked (15)

The Joy of SLAM
The Joy of SLAMThe Joy of SLAM
The Joy of SLAM
 
EU Sustainable Energy Week - How to support innovation to enter the market
EU Sustainable Energy Week - How to support innovation to enter the marketEU Sustainable Energy Week - How to support innovation to enter the market
EU Sustainable Energy Week - How to support innovation to enter the market
 
CAL%C3%87OTS_Descobrir
CAL%C3%87OTS_DescobrirCAL%C3%87OTS_Descobrir
CAL%C3%87OTS_Descobrir
 
saad15_Final Thesis Draft
saad15_Final Thesis Draftsaad15_Final Thesis Draft
saad15_Final Thesis Draft
 
La baraja que se come
La baraja que se comeLa baraja que se come
La baraja que se come
 
Corporate_Presresentation
Corporate_PresresentationCorporate_Presresentation
Corporate_Presresentation
 
Koefisien distribusi (roni)
Koefisien distribusi (roni)Koefisien distribusi (roni)
Koefisien distribusi (roni)
 
Hereditas lingkungan-dan-penyakit
Hereditas lingkungan-dan-penyakitHereditas lingkungan-dan-penyakit
Hereditas lingkungan-dan-penyakit
 
Namibian presentation
Namibian presentationNamibian presentation
Namibian presentation
 
Scope and aims of physiotherapy
Scope and aims of physiotherapy Scope and aims of physiotherapy
Scope and aims of physiotherapy
 
Scope of Physiotherapy Practice
Scope of Physiotherapy PracticeScope of Physiotherapy Practice
Scope of Physiotherapy Practice
 
Pembelahan Sel
Pembelahan SelPembelahan Sel
Pembelahan Sel
 
Field failure analysis using root cause pattern diagrams
Field failure analysis using root cause pattern diagramsField failure analysis using root cause pattern diagrams
Field failure analysis using root cause pattern diagrams
 
Mutacije
MutacijeMutacije
Mutacije
 
Chapter 4 anxiety disorders
Chapter 4  anxiety disordersChapter 4  anxiety disorders
Chapter 4 anxiety disorders
 

Similar to Ggmuk conf talk-samanthaahern

Big Data and Privacy
Big Data and PrivacyBig Data and Privacy
Big Data and Privacymjsale781
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspectiveSravan Ankaraju
 
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONPranav Godse
 
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017e-SIDES.eu
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationcaniceconsulting
 
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...Ansgar Koene
 
dataminingppt-170616163835.pdf jejwwkwnwnn
dataminingppt-170616163835.pdf jejwwkwnwnndataminingppt-170616163835.pdf jejwwkwnwnn
dataminingppt-170616163835.pdf jejwwkwnwnnjainutkarsh078
 
Data Security and Data Governance: Foundation and Case Studies - November 4, ...
Data Security and Data Governance: Foundation and Case Studies - November 4, ...Data Security and Data Governance: Foundation and Case Studies - November 4, ...
Data Security and Data Governance: Foundation and Case Studies - November 4, ...Dr. Thiti Vacharasintopchai, ATSI-DX, CISA
 
SoBigData. European Research Infrastructure for Big Data and Social Mining
SoBigData. European Research Infrastructure for Big Data and Social MiningSoBigData. European Research Infrastructure for Big Data and Social Mining
SoBigData. European Research Infrastructure for Big Data and Social MiningResearch Data Alliance
 
Age Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAge Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAgeFriendlyEconomy
 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible DataTom Walker
 
Scaling up learning analytics solutions: Is privacy a show-stopper?
Scaling up learning analytics solutions:  Is privacy a show-stopper?Scaling up learning analytics solutions:  Is privacy a show-stopper?
Scaling up learning analytics solutions: Is privacy a show-stopper?Tore Hoel
 
Ethics and Politics of Big Data
Ethics and Politics of Big DataEthics and Politics of Big Data
Ethics and Politics of Big Datarobkitchin
 
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018e-SIDES.eu
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarEryk Budi Pratama
 

Similar to Ggmuk conf talk-samanthaahern (20)

Big Data and Privacy
Big Data and PrivacyBig Data and Privacy
Big Data and Privacy
 
DATAIA & TransAlgo
DATAIA & TransAlgoDATAIA & TransAlgo
DATAIA & TransAlgo
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
 
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
 
Data Analytics Ethics: Issues and Questions (Arnie Aronoff, Ph.D.)
Data Analytics Ethics: Issues and Questions (Arnie Aronoff, Ph.D.)Data Analytics Ethics: Issues and Questions (Arnie Aronoff, Ph.D.)
Data Analytics Ethics: Issues and Questions (Arnie Aronoff, Ph.D.)
 
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
 
Marcus Comiter, "Data Policy for Internet of Things Healthcare Devices: Align...
Marcus Comiter, "Data Policy for Internet of Things Healthcare Devices: Align...Marcus Comiter, "Data Policy for Internet of Things Healthcare Devices: Align...
Marcus Comiter, "Data Policy for Internet of Things Healthcare Devices: Align...
 
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
 
Data mining
Data mining Data mining
Data mining
 
dataminingppt-170616163835.pdf jejwwkwnwnn
dataminingppt-170616163835.pdf jejwwkwnwnndataminingppt-170616163835.pdf jejwwkwnwnn
dataminingppt-170616163835.pdf jejwwkwnwnn
 
Data Security and Data Governance: Foundation and Case Studies - November 4, ...
Data Security and Data Governance: Foundation and Case Studies - November 4, ...Data Security and Data Governance: Foundation and Case Studies - November 4, ...
Data Security and Data Governance: Foundation and Case Studies - November 4, ...
 
SoBigData. European Research Infrastructure for Big Data and Social Mining
SoBigData. European Research Infrastructure for Big Data and Social MiningSoBigData. European Research Infrastructure for Big Data and Social Mining
SoBigData. European Research Infrastructure for Big Data and Social Mining
 
Age Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAge Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data Use
 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible Data
 
Scaling up learning analytics solutions: Is privacy a show-stopper?
Scaling up learning analytics solutions:  Is privacy a show-stopper?Scaling up learning analytics solutions:  Is privacy a show-stopper?
Scaling up learning analytics solutions: Is privacy a show-stopper?
 
Data Mining With Big Data
Data Mining With Big DataData Mining With Big Data
Data Mining With Big Data
 
Ethics and Politics of Big Data
Ethics and Politics of Big DataEthics and Politics of Big Data
Ethics and Politics of Big Data
 
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI Webinar
 

More from Samantha Ahern

Love data birkbeck-feb2019
Love data birkbeck-feb2019Love data birkbeck-feb2019
Love data birkbeck-feb2019Samantha Ahern
 
LearnHack 5.0 Accessible Design Talk
LearnHack 5.0 Accessible Design TalkLearnHack 5.0 Accessible Design Talk
LearnHack 5.0 Accessible Design TalkSamantha Ahern
 
InfiniteConf18-Caterpillar and Crocodile
InfiniteConf18-Caterpillar and CrocodileInfiniteConf18-Caterpillar and Crocodile
InfiniteConf18-Caterpillar and CrocodileSamantha Ahern
 
The Caterpillar and The Crocodile
The Caterpillar and The CrocodileThe Caterpillar and The Crocodile
The Caterpillar and The CrocodileSamantha Ahern
 
Learning Analytics - what is it and why is it difficult (InfiniteConf Bytes)
Learning Analytics - what is it and why is it difficult (InfiniteConf Bytes)Learning Analytics - what is it and why is it difficult (InfiniteConf Bytes)
Learning Analytics - what is it and why is it difficult (InfiniteConf Bytes)Samantha Ahern
 

More from Samantha Ahern (9)

Echo360 feb2019
Echo360 feb2019Echo360 feb2019
Echo360 feb2019
 
Love data birkbeck-feb2019
Love data birkbeck-feb2019Love data birkbeck-feb2019
Love data birkbeck-feb2019
 
Bless nov18
Bless nov18Bless nov18
Bless nov18
 
LearnHack 5.0 Accessible Design Talk
LearnHack 5.0 Accessible Design TalkLearnHack 5.0 Accessible Design Talk
LearnHack 5.0 Accessible Design Talk
 
InfiniteConf18-Caterpillar and Crocodile
InfiniteConf18-Caterpillar and CrocodileInfiniteConf18-Caterpillar and Crocodile
InfiniteConf18-Caterpillar and Crocodile
 
The Caterpillar and The Crocodile
The Caterpillar and The CrocodileThe Caterpillar and The Crocodile
The Caterpillar and The Crocodile
 
Oer18 walk thetalk
Oer18 walk thetalkOer18 walk thetalk
Oer18 walk thetalk
 
Ethical conundrums
Ethical conundrumsEthical conundrums
Ethical conundrums
 
Learning Analytics - what is it and why is it difficult (InfiniteConf Bytes)
Learning Analytics - what is it and why is it difficult (InfiniteConf Bytes)Learning Analytics - what is it and why is it difficult (InfiniteConf Bytes)
Learning Analytics - what is it and why is it difficult (InfiniteConf Bytes)
 

Recently uploaded

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 

Ggmuk conf talk-samanthaahern

  • 1. DATA, ETHICS AND THE LAW SAMANTHA AHERN UNIVERSITY COLLEGE LONDON
  • 2. • What are the ethical and legal considerations for the IoT and big data collection? • What is the GDPR and what will it mean for processing and data collection? • What rights to privacy do we have and will we want? • Who should be making those decisions – technologists or end users?
  • 3. THE VOLUME, VELOCITY AND VARIETY OF DATA WE ARE GENERATING IS RAPIDLY INCREASING. WE CREATE DATA ON ALMOST ALL ASPECTS OF OUR LIVES, WHICH CAN BE HARNESSED AND ANALYSED TO PROVIDE POWERFUL INSIGHTS INTO OUR BEHAVIOUR, OUR PREFERENCES AND OUR FUTURE ACTIONS. From Bricks to Clicks: the Potential of Data and Analytics in Higher Education. Policy Connect. Higher Education Commission (2016)
  • 4. REUTERS: YAHOO SECRETLY SCANNED CUSTOMER EMAILS FOR U.S. INTELLIGENCE http://www.reuters.com/article/us-yahoo-nsa-exclusive-idUSKCN1241YT
  • 5. DATA PROTECTION ACT (1998) • used fairly and lawfully • used for limited, specifically stated purposes • used in a way that is adequate, relevant and not excessive • accurate • kept for no longer than is absolutely necessary • handled according to people’s data protection rights • kept safe and secure • not transferred outside the European Economic Area without adequate protection https://www.gov.uk/data-protection/the-data-protection-act
  • 6. PRIVACY SHIELD • EU Commission fact sheet: http://ec.europa.eu/justice/data- protection/files/factsheets/factsheet_eu- us_privacy_shield_en.pdf
  • 7. GENERAL DATA PROTECTION REGULATIONS (GDPR) • Will come into force in the UK on May 25 2018 • The GDPR imposes restrictions on the transfer of personal data outside the European Union, to third countries or international organisations. • Principles: https://ico.org.uk/for-organisations/data- protection-reform/overview-of-the-gdpr/principles/
  • 9. GDPR: INDIVIDUALS’ RIGHTS The main rights for individuals under the GDPR will be: • subject access, • to have inaccuracies corrected, • to have information erased, • to prevent direct marketing, • to prevent automated decision-making and profiling, and • data portability. https://ico.org.uk/media/1624219/preparing-for-the-gdpr-12-
  • 10. METADATA AND AGGREGATION • Where data is to be used anonymously particular care will be taken by institutions to avoid: • Identification of individuals from metadata • Re-identification of individuals by aggregating multiple data sources https://www.jisc.ac.uk/sites/default/files/jd0040_code_of_practice_for_l earning_analytics_190515_v1.pdf
  • 12. • Recommendation 3 • Recommendation 4 • Recommendation 5 BRICKS TO CLICKS RECOMMENDATIONS From Bricks to Clicks: the Potential of Data and Analytics in Higher Education. Policy Connect. Higher Education Commission (2016)
  • 13. RECOMMENDATION 3 • All HEIs should consider introducing an appropriate learning analytics system to improve student support / performance at their institution. • Any such decision should be fully informed by an analysis of the benefits, limitations and risks attached.
  • 14. RECOMMENDATION 4 • Institutions should put in place clear ethical policies and codes of practices that govern the use of student data in analytics and other digital systems. • These policies should, at a minimum, address student privacy, security of data and consent.
  • 15. RECOMMENDATION 5 • In particular, when introducing learning analytics, HEIs should seek fully informed consent from students to the use of their personal and learning data in analytics. • This should be sought again if new data is incorporated into the system, or existing data is used in new ways.
  • 16. By KylaBorg (Privacy) [CC BY 2.0 (http://creativecommons.org/licenses/by/2.0)], via Wikimedia Commons

Editor's Notes

  1. Yahoo Inc last year secretly built a custom software program to search all of its customers' incoming emails for specific information provided by U.S. intelligence officials, according to people familiar with the matter. The company complied with a classified U.S. government demand, scanning hundreds of millions of Yahoo Mail accounts at the behest of the National Security Agency or FBI, said three former employees and a fourth person apprised of the events. US law allows the country's intelligence agencies to order the release of customer data that they believe could prevent a terrorist attack, among other reasons. Companies can challenge such orders behind closed doors in the Foreign Intelligence Surveillance Court. But Reuters reports that Yahoo decided not to fight the matter because it thought it would lose. It adds that some Yahoo employees were upset by that decision.