SlideShare a Scribd company logo
1 of 12
RPAS RELATED PRIVACY
AND DATA PROTECTION:
PRACTICAL ADVICE FOR
RPAS USERS
Rachel Finn, Trilateral Research Ltd.
TRILATERAL COMPANY PROFILE
2
Privacy and data
protection
Security
and
surveillance
Data Science
Crisis and
disaster
management
Research
Technology assessment
Policy and regulatory advice
Impact assessment
Training
Trilateral Services
• Recently led a project for DG
ENTR on the privacy, data
protection and ethical issues
associated with civil RPAS
• Legislation analysis in 7 MS
allowing civil RPAS operations
+ the US and Switzerland
• Surveys with 149 stakeholders:
94 industry, 11 CAAs, 27 DPA
and 17 CSO reps
• Workshops with 85
stakeholders
• 385 page report
MOTIVATION FOR DRONERULES.EU
• Professional users WANT to be responsible, but they
do not know enough about privacy, data protection and
ethics
• Private, recreational users are the least regulated
category of user
• Commercial users are judged to be “medium risk”
• Not nearly enough practical information for those using
RPAS in civil contexts
KEY FINDINGS
• Most RPAS operators may be collecting personal data
• In a survey of 91 RPAS designers, manufacturers and
operators:
DETAILED FINDINGS
stated that their
systems either
captured members of
the public, or that they
did not know whether
they captured members
of the public
indicated that
the data
captured by
the RPAS
was recorded
indicated that
the data
recorded by the
RPAS was
stored
• The most common application in Europe
• Focused on infrastructure, not people
• Footage of people limited to the “tops of their heads”
DRONES FOR INFRASTRUCTURE INSPECTION
6
• The “tops of their heads”
≠ anonymisation
• Employers, colleagues,
etc. might recognise
individuals on film
• Drones have diverse:
– Capabilities
– Payloads
– Operational contexts
RISKS TO PRIVACY & DATA PROTECTION
ARE CONTEXTUAL
7
Using the same drone in with the same payload in a
different context can raise new and different
privacy and data protection impacts.
• Most are small organisations or sole proprietorships
• Most report only “basic” knowledge of European and
national privacy and data protection law
• They will need to assess almost every operation to
ensure that they adequately consider privacy and data
protection impacts
RPAS OPERATORS NEED SUPPORT
8
Data protection, privacy and ethical issues content
including:
– Legal information for professional users
– Case studies in professional RPAS use
– Privacy impact assessment template
– Good practice guidelines
– FAQs document
FOR PROFESSIONAL/COMMERCIAL USERS
9
Data protection, privacy and ethical issues content
including:
– Basics of RPAS privacy handbook
– Case studies in private RPAS use
– RPAS code of conduct on easy to carry card
– Slideshow and quiz on the “do’s and don’ts” of RPAS
use
FOR RECREATIONAL / PRIVATE USERS
10
FOR PRIVATE/RECREATIONAL USERS
• Reduce the presence of people in footage1
• Only record when necessary2
• Anonymise images3
• Ensure transparency and consent4
• Ensure purpose limitation5
• Ensure the security of data collected6
• Avoid storing unnecessary information7
• Decide who is the data controller prior to the mission8
PRACTICAL ADVICE (IN THE MEAN TIME)
11
RACHEL FINN
RACHEL.FINN@TRILATERALRESEARCH.COM
WWW.TRILATERALRESEARCH.COM

More Related Content

What's hot

Security stronghold presentation smart uac
Security stronghold presentation   smart uacSecurity stronghold presentation   smart uac
Security stronghold presentation smart uacw_harker
 
Ansgar rcep algorithmic_bias_july2018
Ansgar rcep algorithmic_bias_july2018Ansgar rcep algorithmic_bias_july2018
Ansgar rcep algorithmic_bias_july2018Ansgar Koene
 
A koene un_bias_ieee_ebdvf_nov2017
A koene un_bias_ieee_ebdvf_nov2017A koene un_bias_ieee_ebdvf_nov2017
A koene un_bias_ieee_ebdvf_nov2017Ansgar Koene
 
Open source is coming gs
Open source is coming gsOpen source is coming gs
Open source is coming gsE.A. Draffan
 
NISO-STM RA21 Project Update
NISO-STM RA21 Project UpdateNISO-STM RA21 Project Update
NISO-STM RA21 Project UpdateTACNISO
 
Experience and perspective_of_security_installation
Experience and perspective_of_security_installationExperience and perspective_of_security_installation
Experience and perspective_of_security_installationOm Kumar
 
THE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity GuidanceTHE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity GuidancePam Gilmore
 
CyberSecurity Medical Devices
CyberSecurity Medical DevicesCyberSecurity Medical Devices
CyberSecurity Medical DevicesSuresh Mandava
 
Business model for single port robotic surgery
Business model for single port robotic surgeryBusiness model for single port robotic surgery
Business model for single port robotic surgeryJaya lakshmi Mekala
 
Hernan Huwyler - Boards in a Digitalized World
Hernan Huwyler - Boards in a Digitalized WorldHernan Huwyler - Boards in a Digitalized World
Hernan Huwyler - Boards in a Digitalized WorldHernan Huwyler, MBA CPA
 
Cybersecurity in medical devices
Cybersecurity in medical devicesCybersecurity in medical devices
Cybersecurity in medical devicesSafisSolutions
 
jtsec Arqus Alliance presentation
jtsec Arqus Alliance presentationjtsec Arqus Alliance presentation
jtsec Arqus Alliance presentationJavier Tallón
 
IT Summit 2015 (IoT panel)
IT Summit 2015 (IoT panel)IT Summit 2015 (IoT panel)
IT Summit 2015 (IoT panel)Jan Masaryk
 
KATS 4th Industrial Revolution Forum Seoul , Korea
KATS 4th Industrial Revolution Forum Seoul , KoreaKATS 4th Industrial Revolution Forum Seoul , Korea
KATS 4th Industrial Revolution Forum Seoul , KoreaGabriela Ehrlich
 
Collaborative Approaches for Medical Device & Healthcare Cybersecurity
Collaborative Approaches for Medical Device & Healthcare CybersecurityCollaborative Approaches for Medical Device & Healthcare Cybersecurity
Collaborative Approaches for Medical Device & Healthcare CybersecurityDr Dev Kambhampati
 

What's hot (15)

Security stronghold presentation smart uac
Security stronghold presentation   smart uacSecurity stronghold presentation   smart uac
Security stronghold presentation smart uac
 
Ansgar rcep algorithmic_bias_july2018
Ansgar rcep algorithmic_bias_july2018Ansgar rcep algorithmic_bias_july2018
Ansgar rcep algorithmic_bias_july2018
 
A koene un_bias_ieee_ebdvf_nov2017
A koene un_bias_ieee_ebdvf_nov2017A koene un_bias_ieee_ebdvf_nov2017
A koene un_bias_ieee_ebdvf_nov2017
 
Open source is coming gs
Open source is coming gsOpen source is coming gs
Open source is coming gs
 
NISO-STM RA21 Project Update
NISO-STM RA21 Project UpdateNISO-STM RA21 Project Update
NISO-STM RA21 Project Update
 
Experience and perspective_of_security_installation
Experience and perspective_of_security_installationExperience and perspective_of_security_installation
Experience and perspective_of_security_installation
 
THE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity GuidanceTHE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity Guidance
 
CyberSecurity Medical Devices
CyberSecurity Medical DevicesCyberSecurity Medical Devices
CyberSecurity Medical Devices
 
Business model for single port robotic surgery
Business model for single port robotic surgeryBusiness model for single port robotic surgery
Business model for single port robotic surgery
 
Hernan Huwyler - Boards in a Digitalized World
Hernan Huwyler - Boards in a Digitalized WorldHernan Huwyler - Boards in a Digitalized World
Hernan Huwyler - Boards in a Digitalized World
 
Cybersecurity in medical devices
Cybersecurity in medical devicesCybersecurity in medical devices
Cybersecurity in medical devices
 
jtsec Arqus Alliance presentation
jtsec Arqus Alliance presentationjtsec Arqus Alliance presentation
jtsec Arqus Alliance presentation
 
IT Summit 2015 (IoT panel)
IT Summit 2015 (IoT panel)IT Summit 2015 (IoT panel)
IT Summit 2015 (IoT panel)
 
KATS 4th Industrial Revolution Forum Seoul , Korea
KATS 4th Industrial Revolution Forum Seoul , KoreaKATS 4th Industrial Revolution Forum Seoul , Korea
KATS 4th Industrial Revolution Forum Seoul , Korea
 
Collaborative Approaches for Medical Device & Healthcare Cybersecurity
Collaborative Approaches for Medical Device & Healthcare CybersecurityCollaborative Approaches for Medical Device & Healthcare Cybersecurity
Collaborative Approaches for Medical Device & Healthcare Cybersecurity
 

Viewers also liked

Bowell, Kyle CV 6.30.2015
Bowell, Kyle CV 6.30.2015Bowell, Kyle CV 6.30.2015
Bowell, Kyle CV 6.30.2015Kyle Bowell
 
Aprendizaje colaborativo
Aprendizaje colaborativoAprendizaje colaborativo
Aprendizaje colaborativoMMRossi
 
Learning from ELFT - Setting up an organisation wide QI programme
Learning from ELFT - Setting up an organisation wide QI programmeLearning from ELFT - Setting up an organisation wide QI programme
Learning from ELFT - Setting up an organisation wide QI programmeELFT_QI
 
cantwell_resume_2015new 2
cantwell_resume_2015new 2cantwell_resume_2015new 2
cantwell_resume_2015new 2Mike Cantwell
 
Label Pak Presentation
Label Pak PresentationLabel Pak Presentation
Label Pak PresentationAaron Dobbs
 
Dynamiser le développement économique agricole local
Dynamiser le développement économique agricole localDynamiser le développement économique agricole local
Dynamiser le développement économique agricole localYvonnick Huet
 
Hipervinculo 1 e-electronica_jcfa-dsl
Hipervinculo 1 e-electronica_jcfa-dslHipervinculo 1 e-electronica_jcfa-dsl
Hipervinculo 1 e-electronica_jcfa-dslJesus Ferrant Arevalo
 
Cristina Driver Sample Works
Cristina Driver Sample WorksCristina Driver Sample Works
Cristina Driver Sample WorksCristina Driver
 
E.S.T. No. 1 MIGUEL LERDO DE TEJADA CEREMONIA CÍVICA DEL 23 DE NOVIEMBRE DE ...
E.S.T. No. 1 MIGUEL LERDO DE TEJADA CEREMONIA CÍVICA DEL 23 DE NOVIEMBRE  DE ...E.S.T. No. 1 MIGUEL LERDO DE TEJADA CEREMONIA CÍVICA DEL 23 DE NOVIEMBRE  DE ...
E.S.T. No. 1 MIGUEL LERDO DE TEJADA CEREMONIA CÍVICA DEL 23 DE NOVIEMBRE DE ...VJ Medina Ortiz
 
E.S.T. No. 1 "MIGUEL LERDO DE TEJADA" Ceremonia Civica 28 de Septiembre de 2015
E.S.T. No. 1 "MIGUEL LERDO DE TEJADA" Ceremonia Civica 28 de Septiembre de 2015E.S.T. No. 1 "MIGUEL LERDO DE TEJADA" Ceremonia Civica 28 de Septiembre de 2015
E.S.T. No. 1 "MIGUEL LERDO DE TEJADA" Ceremonia Civica 28 de Septiembre de 2015VJ Medina Ortiz
 
Analisi skripsi (Kemampuan Representasi Matematis Siswa Melalui Pendekatan Ko...
Analisi skripsi (Kemampuan Representasi Matematis Siswa Melalui Pendekatan Ko...Analisi skripsi (Kemampuan Representasi Matematis Siswa Melalui Pendekatan Ko...
Analisi skripsi (Kemampuan Representasi Matematis Siswa Melalui Pendekatan Ko...Arini Dyah
 
New Methods in Automated XSS Detection & Dynamic Exploit Creation
New Methods in Automated XSS Detection & Dynamic Exploit CreationNew Methods in Automated XSS Detection & Dynamic Exploit Creation
New Methods in Automated XSS Detection & Dynamic Exploit CreationKen Belva
 

Viewers also liked (14)

Bowell, Kyle CV 6.30.2015
Bowell, Kyle CV 6.30.2015Bowell, Kyle CV 6.30.2015
Bowell, Kyle CV 6.30.2015
 
Aprendizaje colaborativo
Aprendizaje colaborativoAprendizaje colaborativo
Aprendizaje colaborativo
 
Learning from ELFT - Setting up an organisation wide QI programme
Learning from ELFT - Setting up an organisation wide QI programmeLearning from ELFT - Setting up an organisation wide QI programme
Learning from ELFT - Setting up an organisation wide QI programme
 
Linkedin slide
Linkedin slideLinkedin slide
Linkedin slide
 
cantwell_resume_2015new 2
cantwell_resume_2015new 2cantwell_resume_2015new 2
cantwell_resume_2015new 2
 
Label Pak Presentation
Label Pak PresentationLabel Pak Presentation
Label Pak Presentation
 
Dynamiser le développement économique agricole local
Dynamiser le développement économique agricole localDynamiser le développement économique agricole local
Dynamiser le développement économique agricole local
 
Hipervinculo 1 e-electronica_jcfa-dsl
Hipervinculo 1 e-electronica_jcfa-dslHipervinculo 1 e-electronica_jcfa-dsl
Hipervinculo 1 e-electronica_jcfa-dsl
 
Cristina Driver Sample Works
Cristina Driver Sample WorksCristina Driver Sample Works
Cristina Driver Sample Works
 
E.S.T. No. 1 MIGUEL LERDO DE TEJADA CEREMONIA CÍVICA DEL 23 DE NOVIEMBRE DE ...
E.S.T. No. 1 MIGUEL LERDO DE TEJADA CEREMONIA CÍVICA DEL 23 DE NOVIEMBRE  DE ...E.S.T. No. 1 MIGUEL LERDO DE TEJADA CEREMONIA CÍVICA DEL 23 DE NOVIEMBRE  DE ...
E.S.T. No. 1 MIGUEL LERDO DE TEJADA CEREMONIA CÍVICA DEL 23 DE NOVIEMBRE DE ...
 
E.S.T. No. 1 "MIGUEL LERDO DE TEJADA" Ceremonia Civica 28 de Septiembre de 2015
E.S.T. No. 1 "MIGUEL LERDO DE TEJADA" Ceremonia Civica 28 de Septiembre de 2015E.S.T. No. 1 "MIGUEL LERDO DE TEJADA" Ceremonia Civica 28 de Septiembre de 2015
E.S.T. No. 1 "MIGUEL LERDO DE TEJADA" Ceremonia Civica 28 de Septiembre de 2015
 
Analisi skripsi (Kemampuan Representasi Matematis Siswa Melalui Pendekatan Ko...
Analisi skripsi (Kemampuan Representasi Matematis Siswa Melalui Pendekatan Ko...Analisi skripsi (Kemampuan Representasi Matematis Siswa Melalui Pendekatan Ko...
Analisi skripsi (Kemampuan Representasi Matematis Siswa Melalui Pendekatan Ko...
 
New Methods in Automated XSS Detection & Dynamic Exploit Creation
New Methods in Automated XSS Detection & Dynamic Exploit CreationNew Methods in Automated XSS Detection & Dynamic Exploit Creation
New Methods in Automated XSS Detection & Dynamic Exploit Creation
 
Onu
OnuOnu
Onu
 

Similar to RPAS Privacy and Data Protection Advice

Privacy for tech startups
Privacy for tech startups Privacy for tech startups
Privacy for tech startups Marc Gallardo
 
GDPR: What Your Startup Should Know and Start Doing Now
GDPR: What Your Startup Should Know and Start Doing NowGDPR: What Your Startup Should Know and Start Doing Now
GDPR: What Your Startup Should Know and Start Doing NowAmazon Web Services
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...Financial Poise
 
Mind Your Business: Why Privacy Matters to the Successful Enterprise
 Mind Your Business: Why Privacy Matters to the Successful Enterprise Mind Your Business: Why Privacy Matters to the Successful Enterprise
Mind Your Business: Why Privacy Matters to the Successful EnterpriseEric Kavanagh
 
Iron Mountain® Policy Center Solution Enterprise Edition
Iron Mountain® Policy Center Solution Enterprise EditionIron Mountain® Policy Center Solution Enterprise Edition
Iron Mountain® Policy Center Solution Enterprise EditionInfoGoTo
 
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionCloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionNetskope
 
Sure Fire Ways to Succeed with Data Analytics
Sure Fire Ways to Succeed with Data AnalyticsSure Fire Ways to Succeed with Data Analytics
Sure Fire Ways to Succeed with Data AnalyticsJim Kaplan CIA CFE
 
How to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security ProgramHow to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security ProgramFinancial Poise
 
Adalimumab- comprehensive patent search
Adalimumab- comprehensive patent searchAdalimumab- comprehensive patent search
Adalimumab- comprehensive patent searchKate Cleverley
 
Storm on the Horizon: Data Governance & Security vs. Employee Privacy
Storm on the Horizon: Data Governance & Security vs. Employee PrivacyStorm on the Horizon: Data Governance & Security vs. Employee Privacy
Storm on the Horizon: Data Governance & Security vs. Employee PrivacyAurélie Pols
 
Privacy frameworks 101
Privacy frameworks 101Privacy frameworks 101
Privacy frameworks 101Saumya Vishnoi
 
Data Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessData Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessEversheds Sutherland
 
EU General Data Protection Regulation
EU General Data Protection RegulationEU General Data Protection Regulation
EU General Data Protection RegulationPeter Haase
 
ICCESOMAR International Code
ICCESOMAR International CodeICCESOMAR International Code
ICCESOMAR International CodeHuy Kim
 
Accounting Information Systems An Introduction
 Accounting Information Systems An Introduction Accounting Information Systems An Introduction
Accounting Information Systems An IntroductionMuzammilAbdul
 

Similar to RPAS Privacy and Data Protection Advice (20)

Privacy for tech startups
Privacy for tech startups Privacy for tech startups
Privacy for tech startups
 
GDPR: What Your Startup Should Know and Start Doing Now
GDPR: What Your Startup Should Know and Start Doing NowGDPR: What Your Startup Should Know and Start Doing Now
GDPR: What Your Startup Should Know and Start Doing Now
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
 
All about a DPIA by Andrey Prozorov 2.0, 220518.pdf
All about a DPIA by Andrey Prozorov 2.0, 220518.pdfAll about a DPIA by Andrey Prozorov 2.0, 220518.pdf
All about a DPIA by Andrey Prozorov 2.0, 220518.pdf
 
Forecast 2014: eDiscovery and Forensics
Forecast 2014: eDiscovery and Forensics Forecast 2014: eDiscovery and Forensics
Forecast 2014: eDiscovery and Forensics
 
Mind Your Business: Why Privacy Matters to the Successful Enterprise
 Mind Your Business: Why Privacy Matters to the Successful Enterprise Mind Your Business: Why Privacy Matters to the Successful Enterprise
Mind Your Business: Why Privacy Matters to the Successful Enterprise
 
Iron Mountain® Policy Center Solution Enterprise Edition
Iron Mountain® Policy Center Solution Enterprise EditionIron Mountain® Policy Center Solution Enterprise Edition
Iron Mountain® Policy Center Solution Enterprise Edition
 
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionCloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity Edition
 
Seeley "Necessary Protections of Privacy"
Seeley "Necessary Protections of Privacy"Seeley "Necessary Protections of Privacy"
Seeley "Necessary Protections of Privacy"
 
Sure Fire Ways to Succeed with Data Analytics
Sure Fire Ways to Succeed with Data AnalyticsSure Fire Ways to Succeed with Data Analytics
Sure Fire Ways to Succeed with Data Analytics
 
NOCLAR
NOCLARNOCLAR
NOCLAR
 
How to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security ProgramHow to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security Program
 
Adalimumab- comprehensive patent search
Adalimumab- comprehensive patent searchAdalimumab- comprehensive patent search
Adalimumab- comprehensive patent search
 
Storm on the Horizon: Data Governance & Security vs. Employee Privacy
Storm on the Horizon: Data Governance & Security vs. Employee PrivacyStorm on the Horizon: Data Governance & Security vs. Employee Privacy
Storm on the Horizon: Data Governance & Security vs. Employee Privacy
 
Privacy frameworks 101
Privacy frameworks 101Privacy frameworks 101
Privacy frameworks 101
 
Data Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessData Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your business
 
EU General Data Protection Regulation
EU General Data Protection RegulationEU General Data Protection Regulation
EU General Data Protection Regulation
 
ICCESOMAR International Code
ICCESOMAR International CodeICCESOMAR International Code
ICCESOMAR International Code
 
Accounting Information Systems An Introduction
 Accounting Information Systems An Introduction Accounting Information Systems An Introduction
Accounting Information Systems An Introduction
 
GDPR and Hadoop
GDPR and HadoopGDPR and Hadoop
GDPR and Hadoop
 

More from Trilateral Research

Designing Security Across Boundaries: mapping disperse data to collaborative...
Designing Security Across Boundaries:  mapping disperse data to collaborative...Designing Security Across Boundaries:  mapping disperse data to collaborative...
Designing Security Across Boundaries: mapping disperse data to collaborative...Trilateral Research
 
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...Trilateral Research
 
Risky Borders: Designing togetherness using information technology for intero...
Risky Borders: Designing togetherness using information technology for intero...Risky Borders: Designing togetherness using information technology for intero...
Risky Borders: Designing togetherness using information technology for intero...Trilateral Research
 
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...Trilateral Research
 
Ethics and technology in humanitarian setting
Ethics and technology in humanitarian settingEthics and technology in humanitarian setting
Ethics and technology in humanitarian settingTrilateral Research
 
Privacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES ProjectPrivacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES ProjectTrilateral Research
 
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...Trilateral Research
 
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...Trilateral Research
 
CRISP project: overview of findings and lessons learned.
CRISP project: overview of findings and lessons learned.CRISP project: overview of findings and lessons learned.
CRISP project: overview of findings and lessons learned.Trilateral Research
 
Legal and ethical issues in social capital analysis
Legal and ethical issues in social capital analysis Legal and ethical issues in social capital analysis
Legal and ethical issues in social capital analysis Trilateral Research
 
Examining End-User Standardisation Needs for Disaster Resilience
Examining End-User Standardisation Needs for Disaster ResilienceExamining End-User Standardisation Needs for Disaster Resilience
Examining End-User Standardisation Needs for Disaster ResilienceTrilateral Research
 
A stakeholder based approach to standardisation for disaster resilience
A stakeholder based approach to standardisation for disaster resilienceA stakeholder based approach to standardisation for disaster resilience
A stakeholder based approach to standardisation for disaster resilienceTrilateral Research
 
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforce
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforceEvolving Technology - Delivering Neighbourhood Policing with a smaller workforce
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforceTrilateral Research
 
Social Media and ICT in Neighbourhood Policing - Opportunities and Challanges
Social Media and ICT in Neighbourhood Policing - Opportunities and ChallangesSocial Media and ICT in Neighbourhood Policing - Opportunities and Challanges
Social Media and ICT in Neighbourhood Policing - Opportunities and ChallangesTrilateral Research
 
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction Trilateral Research
 
ENERGIC-OD @ GEO Business 2017 presentation
ENERGIC-OD @ GEO Business 2017 presentationENERGIC-OD @ GEO Business 2017 presentation
ENERGIC-OD @ GEO Business 2017 presentationTrilateral Research
 
Esports in the UK - privacy risks
Esports in the UK - privacy risksEsports in the UK - privacy risks
Esports in the UK - privacy risksTrilateral Research
 
Enhancing ethics assessment in R&I at the national level
Enhancing ethics assessment in R&I at the national levelEnhancing ethics assessment in R&I at the national level
Enhancing ethics assessment in R&I at the national levelTrilateral Research
 

More from Trilateral Research (20)

Star II sme hotline 21.01.20
Star II sme hotline 21.01.20Star II sme hotline 21.01.20
Star II sme hotline 21.01.20
 
Designing Security Across Boundaries: mapping disperse data to collaborative...
Designing Security Across Boundaries:  mapping disperse data to collaborative...Designing Security Across Boundaries:  mapping disperse data to collaborative...
Designing Security Across Boundaries: mapping disperse data to collaborative...
 
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
 
Risky Borders: Designing togetherness using information technology for intero...
Risky Borders: Designing togetherness using information technology for intero...Risky Borders: Designing togetherness using information technology for intero...
Risky Borders: Designing togetherness using information technology for intero...
 
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
 
Ethics and technology in humanitarian setting
Ethics and technology in humanitarian settingEthics and technology in humanitarian setting
Ethics and technology in humanitarian setting
 
Privacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES ProjectPrivacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES Project
 
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
 
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
 
Overview of CLARITY project
Overview of CLARITY projectOverview of CLARITY project
Overview of CLARITY project
 
CRISP project: overview of findings and lessons learned.
CRISP project: overview of findings and lessons learned.CRISP project: overview of findings and lessons learned.
CRISP project: overview of findings and lessons learned.
 
Legal and ethical issues in social capital analysis
Legal and ethical issues in social capital analysis Legal and ethical issues in social capital analysis
Legal and ethical issues in social capital analysis
 
Examining End-User Standardisation Needs for Disaster Resilience
Examining End-User Standardisation Needs for Disaster ResilienceExamining End-User Standardisation Needs for Disaster Resilience
Examining End-User Standardisation Needs for Disaster Resilience
 
A stakeholder based approach to standardisation for disaster resilience
A stakeholder based approach to standardisation for disaster resilienceA stakeholder based approach to standardisation for disaster resilience
A stakeholder based approach to standardisation for disaster resilience
 
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforce
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforceEvolving Technology - Delivering Neighbourhood Policing with a smaller workforce
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforce
 
Social Media and ICT in Neighbourhood Policing - Opportunities and Challanges
Social Media and ICT in Neighbourhood Policing - Opportunities and ChallangesSocial Media and ICT in Neighbourhood Policing - Opportunities and Challanges
Social Media and ICT in Neighbourhood Policing - Opportunities and Challanges
 
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
 
ENERGIC-OD @ GEO Business 2017 presentation
ENERGIC-OD @ GEO Business 2017 presentationENERGIC-OD @ GEO Business 2017 presentation
ENERGIC-OD @ GEO Business 2017 presentation
 
Esports in the UK - privacy risks
Esports in the UK - privacy risksEsports in the UK - privacy risks
Esports in the UK - privacy risks
 
Enhancing ethics assessment in R&I at the national level
Enhancing ethics assessment in R&I at the national levelEnhancing ethics assessment in R&I at the national level
Enhancing ethics assessment in R&I at the national level
 

Recently uploaded

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

RPAS Privacy and Data Protection Advice

  • 1. RPAS RELATED PRIVACY AND DATA PROTECTION: PRACTICAL ADVICE FOR RPAS USERS Rachel Finn, Trilateral Research Ltd.
  • 2. TRILATERAL COMPANY PROFILE 2 Privacy and data protection Security and surveillance Data Science Crisis and disaster management Research Technology assessment Policy and regulatory advice Impact assessment Training Trilateral Services
  • 3. • Recently led a project for DG ENTR on the privacy, data protection and ethical issues associated with civil RPAS • Legislation analysis in 7 MS allowing civil RPAS operations + the US and Switzerland • Surveys with 149 stakeholders: 94 industry, 11 CAAs, 27 DPA and 17 CSO reps • Workshops with 85 stakeholders • 385 page report MOTIVATION FOR DRONERULES.EU
  • 4. • Professional users WANT to be responsible, but they do not know enough about privacy, data protection and ethics • Private, recreational users are the least regulated category of user • Commercial users are judged to be “medium risk” • Not nearly enough practical information for those using RPAS in civil contexts KEY FINDINGS
  • 5. • Most RPAS operators may be collecting personal data • In a survey of 91 RPAS designers, manufacturers and operators: DETAILED FINDINGS stated that their systems either captured members of the public, or that they did not know whether they captured members of the public indicated that the data captured by the RPAS was recorded indicated that the data recorded by the RPAS was stored
  • 6. • The most common application in Europe • Focused on infrastructure, not people • Footage of people limited to the “tops of their heads” DRONES FOR INFRASTRUCTURE INSPECTION 6 • The “tops of their heads” ≠ anonymisation • Employers, colleagues, etc. might recognise individuals on film
  • 7. • Drones have diverse: – Capabilities – Payloads – Operational contexts RISKS TO PRIVACY & DATA PROTECTION ARE CONTEXTUAL 7 Using the same drone in with the same payload in a different context can raise new and different privacy and data protection impacts.
  • 8. • Most are small organisations or sole proprietorships • Most report only “basic” knowledge of European and national privacy and data protection law • They will need to assess almost every operation to ensure that they adequately consider privacy and data protection impacts RPAS OPERATORS NEED SUPPORT 8
  • 9. Data protection, privacy and ethical issues content including: – Legal information for professional users – Case studies in professional RPAS use – Privacy impact assessment template – Good practice guidelines – FAQs document FOR PROFESSIONAL/COMMERCIAL USERS 9
  • 10. Data protection, privacy and ethical issues content including: – Basics of RPAS privacy handbook – Case studies in private RPAS use – RPAS code of conduct on easy to carry card – Slideshow and quiz on the “do’s and don’ts” of RPAS use FOR RECREATIONAL / PRIVATE USERS 10 FOR PRIVATE/RECREATIONAL USERS
  • 11. • Reduce the presence of people in footage1 • Only record when necessary2 • Anonymise images3 • Ensure transparency and consent4 • Ensure purpose limitation5 • Ensure the security of data collected6 • Avoid storing unnecessary information7 • Decide who is the data controller prior to the mission8 PRACTICAL ADVICE (IN THE MEAN TIME) 11

Editor's Notes

  1. Legal information for professional users Privacy and DP legislation in 28 MS Case studies in professional RPAS use Focused on common applications Privacy impact assessment template For case-by-case impact assessment Good practice guidelines FAQs document