SlideShare a Scribd company logo
1 of 26
Data Protection Impact
Assessments: Examining the
challenges
Rowena Rodrigues & Julia Muraszkiewicz, Trilateral Research Ltd.
Workshop on implementation of the EU GDPR Privacy Impact Assessment
Brussels Privacy Hub,
4 October 2016
4 October 2016
Trilateral Research Ltd.
• Impact assessments
• Policy & regulatory advice
• Research services
• Technology assessment
• Data Services
• Training
•Government
•Inter-govermental organisations
•Humanitarian agencies
•Critical infrastructure
• Social science
• Science & Technology
• Economics
• Law
• Data analytics
• Privacy & data protection
• Security & surveillance
• Data science
• Crisis & disaster management
Deep
Expertise
Multiple
Disciplines
Core
Services
Key
Sectors
 Trilateral Research Ltd is a leading
London-based research services
company.
 We provide research, risk analysis,
advisory services and technology
solutions related to privacy, data
protection, new and emerging
technologies and policy.
 Small enterprise (SME) ≈20 staff
members representing over 10
different countries.
 Almost all research and technical staff
have postdoctoral experience (≈90%
have PhDs).
 Extensive publication list and excellent
international profile.
• In 2000, 41 significant attacks on aid workers were recorded
across the globe. By 2014, that number had risen to 190. In this
15-year period, over 3,000 aid workers have been killed, injured
or kidnapped.
• A novel and innovative approach to tracking and decision-making
is needed. iTRACK will achieve this through an interdisciplinary,
socio-technical approach, which will draw on the latest advances
in sensor development, visual data collection, location tracking,
artificial intelligence, information management, risk analysis, and
humanitarian logistics.
• The system will take into account a range of ethical and privacy
principles.
• The iTRACK system will be deployed, implemented and tested in
simulations with humanitarian practitioners. Pilot applications
with the World Food Programme and iMMAP in the on-going
conflict disasters in the Middle East.
EU funded:
Horizon 2020
12 partners
from 8 EU
states and
UNWFP
Aim: next
generation
intelligent
tracking
platform
3 years
• Aims to develop a common European framework for ethical assessment of research and
innovation.
• A 4-year project funded by the European Commission.
• Some key outputs:
• Comparative analysis of ethics assessment practices
• Report (Handbook) of participatory processes
• Report on legal frameworks that guide or constrain ethical procedures within research in
the EU
• Report on international differences in research cultures, ethical standards and legal
frameworks
• CEN Workshop Agreement: Ethics Assessment of Research & Innovation: open for public
consultation till 15 Nov 2016.
Structure of presentation
1. GDPR and data protection impact assessments (DPIAs).
2. Challenges in conducting a DPIA: based on lessons
particularly from ethical impact assessment guidance
(SATORI) and ethical, legal and societal impact
assessment (PULSE).
3. Case study: iTRACK project E/PIA experience.
DPIAs: the benefits
Tool to support data protection compliance.
Help meet individuals’ expectations of privacy.
Help organisations identify risks, fix problems, at an early stage,
reducing associated costs and damage to reputation.
Help organisations create efficient and effective data handling
processes.
Facilitate engagement-led data protection good practice learnings.
GDPR on DPIAs: Recital 84
WHY: to enhance compliance with the Regulation where processing
operations are likely to result in a high risk to the rights and freedoms
of natural persons.
WHO SHOULD DO WHAT: the controller should be responsible for
carrying out of a DPIA to evaluate, in particular, the origin, nature,
particularity and severity of that risk.
BENEFIT: The outcome of the assessment should be taken into
account when determining the appropriate measures to be taken in
order to demonstrate that the processing of personal data complies
with the Regulation.
DPIAs are required for cases of:
1. A systematic and extensive evaluation of personal aspects relating to
natural persons which is based on automated processing, including
profiling, and on which decisions are based that produce legal effects
concerning the natural person or similarly significantly affect the natural
person.
2. Processing on a large scale of special categories of data, or of personal
data relating to criminal convictions and offences or related security
measures.
3. A systematic monitoring of a publicly accessible area on a large scale.
Article 35 (3). See also Recitals 89-90.
Contents of the DPIA: Article 35 (7)
A systematic description of the envisaged processing operations, the purposes of the processing,
including, where applicable, the legitimate interest pursued by the controller.
An assessment of the necessity and proportionality of the processing operations in relation to the
purposes.
An assessment of the risks to the rights and freedoms of data subjects, and
The measures envisaged to address the risks, including safeguards, security measures and mechanisms to
ensure the protection of personal data and to demonstrate compliance with this Regulation taking into
account the rights and legitimate interests of data subjects and other persons concerned.
Risks of getting a DPIA wrong
Non-compliance with the Regulation.
Risk to the rights and freedoms of natural persons.
Resistance to products, services, schemes, by customers,
end users, citizens.
Loss of investment, funding and reputation.
Media censure.
The challenges
The right
expertise
Appropriateness
Adequacy
and
thoroughness
Engagement
Quality
Transparency
‘The right expertise’
• Who will be the assessor: the data controller….project manager? In-
house staff member?
• Does the DPIA assessor have the right expertise?
• Team approach: use of in-house experts e.g. consult data protection
officer.
• Seek external inputs from experts: will help identify impacts + boost
trust in findings
• In high impact cases: use external assessors = robust and trustworthy
DPIA.
‘Appropriateness’
• Is a DPIA the right type of assessment?
• Is it the only one that is needed in the situation?
• Is a broader one required ? I.e. one that takes into account
other legal, ethical and/or societal requirements?
• Who should take this decision, and on what basis?
‘Adequacy’ & ‘thoroughness’
• DPIA should not be a ‘whitewash’.
• Is the assessment adequate for the type of processing?
• Has the assessment been thorough? Does it take into account the
four key elements: Origin+Nature+Severity+Mitigation
• Designate responsibility for adequacy: senior management? Board of
Directors? Coordinator of project?
• Carry out a review to assess adequacy and thoroughness.
• Consult with supervisory authority.
‘Engagement’
• Has the DPIA process engaged stakeholders?
• Are they the appropriate ones? Do they cover relevant perspectives?
• Internal: project management team, data protection officer, technical
experts, senior management, researchers, data processors, compliance,
communications etc.
• External: affected parties, data subjects, their representatives, supervisory
authorities etc.
• Is it optimised so stakeholders can have meaningful impact? Early
enough?
• Have the right mechanisms been used?
‘Quality’
• Run an Article 35(7) check:
• Does the DPIA properly describe the processing operations and the purposes,
including, legitimate interests pursued by the controller?
• Does it adequately assess the necessity and proportionality of the processing
in relation to the purpose?
• Does it adequately assess the risks to individuals?
• Does it clearly outline the measures to address risk, including security and to
demonstrate compliance? (including responsibilities?)
• Potentially, use other evaluation criteria to assess/review the quality of your
DPIA: e.g. Kush Wadhwa & Rowena Rodrigues (2013): Evaluating privacy impact
assessments, Innovation: The European Journal of Social Science Research,
http://dx.doi.org/10.1080/13511610.2013.761748
‘Transparency’: Process and results
• Has the process of conducting the DPIA been transparent?
• E.g. external consultation
• Are results available to stakeholders? To the public?
• Publication of DPIA report in full or summary form highly recommended.
• Improves accountability.
• Increase the public’s understanding of how information is, or will be used.
Case study
It was 10 am in the morning, when the first iTRACK alert came about new attacks to a small town in the Middle
East.
The alert was sent from staff working in a hospital in a town using the iTRACK app. Immediately, other civilian
responders working in the regions received the report, and were advised to take protective measures. At the
same time, a humanitarian convoy en route to the hospital was automatically informed and re-routed to the
next warehouse with free capacity.
Meanwhile, the activated iTRACK sensing devices on the assets and vehicles in town, combined with satellite
imagery allowed for continuous updates of the threats and risks. Rather than having to rely on reports from
different, and unreliable sources, unfiltered social media feeds and updates by the armed actors, the iTRACK
system provided trusted and direct data from the ground. An analysis of threat patterns and the damages that
occurred, was used for a rapid assessment of humanitarian impact and needs. Updates were then sent to the
iTRACK subscribers, who started to preposition vehicles and goods to respond to the novel humanitarian
situations and alleviate the suffering of the people on the ground in a safer and more efficient way.
Fictitious case study
Approach
Agreeing on
principles and
definitions
Interviews
Mapping of
information flows
in the system
architecture
Stakeholder
workshop
Mapping out the
risks and solutions
Review and audit
of ethical and
privacy
assessments by an
independent third-
party
Publications
How to identify the risks emanating from threats and vulnerabilities:
 A threat has capabilities to exploit vulnerabilities, it can be accidental, deliberate, natural or
human and can originate from within or outside the project e.g. hackers, theft, natural hazards,
etc.,
 Vulnerability is a weakness that makes the technology susceptible to
problems/attacks/exploitation/etc. e.g., employee who does not understand data protection
laws
 A risk is the impact of a threat acting on a vulnerability, e.g. reputation loss
THREAT: Hacker
VULNERABILITY: Insecure server
RISK: Reputational damage due to loss of personal and potentially sensitive data.
What is a risk?
Key notions in ethics and data protection & privacy
 Dignity
 Consent
 Avoiding harm
 Safety
 Social solidarity, inclusion and exclusion
 Discrimination and profiling
 Accessibility
 Sustainability
 Collection limitation
 Data quality
 Use limitation
 Transparency
 Individual participation and access to data
 Anonymity
 Privacy of the person
 Privacy of personal behaviours
Root of principles - GDPR
 Article 17 – Right to erasure (“right to be forgotten”)
 Article 21 – Right to object – on grounds including profiling
 Article 22 – Right not to be subject to a decision based solely on automated processing,
including profiling
 Article 25 – Data protection by design and by default
 Implement appropriate technical and organisational measures designed to implement
data protection principles
 Article 32 – Security of processing
 Implement appropriate technical and organisation measures to ensure level of security
appropriate for risk
 Article 35 – Data Protection Impact Assessment
Root of principles - other
We also broadened out beyond the GDPR:
 ISO/IEC 29100:2011
 ISO/IEC 27001:2005
 Universal Declaration on Human Rights 1948
 European Convention on Human Rights 1953
 Charter of Fundamental Human Rights of the European Union
2009*
More than just a DPIA: ethics are important!
 iTRACK’s technologies require ethical analysis: location tracking, health monitoring, image surveillance, social
media data collection, messaging services.
 Potentially vulnerable users: humanitarian workers pressured in emergency situations.
 Thus, based on the Kantian idea of respect for the dignity of the person. When the self can be technologically
invaded without permission and even often without the knowledge of the person, dignity and liberty are
diminished.
 An E/PIA can help understand, assess, analyse and potentially mitigate, reduce, or avoid a range of risks.
 The E/PIA will also benefit the iTRACK consortium by ensuring that:
 Harm to individuals is reduced, avoided, minimised.
 Unnecessary costs are avoided.
 Trust and reputation are maintained.
 Ethical and privacy principles are taken into account.
 Rowena Rodrigues: rowena.rodrigues@trilateralresearch.com
www.satoriproject.eu
Follow us on Twitter: @SATORI_EU
 Julia Muraszkiewicz: julia.muraszkiewicz@trilateralresearch.com
www.itrack-project.eu
Follow us on Twitter:@iTRACKProject1
Contact us:

More Related Content

What's hot

EU General Data Protection Regulation
EU General Data Protection RegulationEU General Data Protection Regulation
EU General Data Protection RegulationRamiro Cid
 
Use of data in safe havens: ethics and reproducibility issues
Use of data in safe havens: ethics and reproducibility issuesUse of data in safe havens: ethics and reproducibility issues
Use of data in safe havens: ethics and reproducibility issuesLouise Corti
 
Dataprotectionpackage 2015pptx
Dataprotectionpackage 2015pptxDataprotectionpackage 2015pptx
Dataprotectionpackage 2015pptxMarco Gioanola
 
What is the new data protection regulation GDPR and why should you care? Jesp...
What is the new data protection regulation GDPR and why should you care? Jesp...What is the new data protection regulation GDPR and why should you care? Jesp...
What is the new data protection regulation GDPR and why should you care? Jesp...Exove
 
Domain management and brand protection in the era of the EU's GDPR
Domain management and brand protection in the era of the EU's GDPRDomain management and brand protection in the era of the EU's GDPR
Domain management and brand protection in the era of the EU's GDPRBartLieben
 
GDPR and EA Commissioning a web site part 2 - Legal Environment
GDPR and EA Commissioning a web site part 2 - Legal EnvironmentGDPR and EA Commissioning a web site part 2 - Legal Environment
GDPR and EA Commissioning a web site part 2 - Legal EnvironmentAllen Woods
 
Data Protection Forum meetup 23052017
Data Protection Forum meetup   23052017 Data Protection Forum meetup   23052017
Data Protection Forum meetup 23052017 John M Walsh
 
Privacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
Privacy Practice Fundamentals: Understanding Compliance Regimes and RequirementsPrivacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
Privacy Practice Fundamentals: Understanding Compliance Regimes and RequirementsAnitafin
 
General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...IISPEastMids
 
GDPR clinic - CloudWATCH at Cloud Security Expo 2017
GDPR clinic - CloudWATCH at Cloud Security Expo 2017GDPR clinic - CloudWATCH at Cloud Security Expo 2017
GDPR clinic - CloudWATCH at Cloud Security Expo 2017CloudWATCH Consortium
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internetmoldovaictsummit2016
 
3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICECFG
 
The EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to knowThe EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to knowSophos Benelux
 
An itinerary for FAIR and privacy respecting data-driven innovation and research
An itinerary for FAIR and privacy respecting data-driven innovation and researchAn itinerary for FAIR and privacy respecting data-driven innovation and research
An itinerary for FAIR and privacy respecting data-driven innovation and researchMarlon Domingus
 
GDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsGDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsUlf Mattsson
 

What's hot (17)

EU General Data Protection Regulation
EU General Data Protection RegulationEU General Data Protection Regulation
EU General Data Protection Regulation
 
Use of data in safe havens: ethics and reproducibility issues
Use of data in safe havens: ethics and reproducibility issuesUse of data in safe havens: ethics and reproducibility issues
Use of data in safe havens: ethics and reproducibility issues
 
Dataprotectionpackage 2015pptx
Dataprotectionpackage 2015pptxDataprotectionpackage 2015pptx
Dataprotectionpackage 2015pptx
 
What is the new data protection regulation GDPR and why should you care? Jesp...
What is the new data protection regulation GDPR and why should you care? Jesp...What is the new data protection regulation GDPR and why should you care? Jesp...
What is the new data protection regulation GDPR and why should you care? Jesp...
 
Domain management and brand protection in the era of the EU's GDPR
Domain management and brand protection in the era of the EU's GDPRDomain management and brand protection in the era of the EU's GDPR
Domain management and brand protection in the era of the EU's GDPR
 
Tim Midgley, Saferworld (UK )
Tim Midgley, Saferworld (UK )Tim Midgley, Saferworld (UK )
Tim Midgley, Saferworld (UK )
 
GDPR and EA Commissioning a web site part 2 - Legal Environment
GDPR and EA Commissioning a web site part 2 - Legal EnvironmentGDPR and EA Commissioning a web site part 2 - Legal Environment
GDPR and EA Commissioning a web site part 2 - Legal Environment
 
Data Protection Forum meetup 23052017
Data Protection Forum meetup   23052017 Data Protection Forum meetup   23052017
Data Protection Forum meetup 23052017
 
Howard Back,Ppt
Howard Back,PptHoward Back,Ppt
Howard Back,Ppt
 
Privacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
Privacy Practice Fundamentals: Understanding Compliance Regimes and RequirementsPrivacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
Privacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
 
General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...
 
GDPR clinic - CloudWATCH at Cloud Security Expo 2017
GDPR clinic - CloudWATCH at Cloud Security Expo 2017GDPR clinic - CloudWATCH at Cloud Security Expo 2017
GDPR clinic - CloudWATCH at Cloud Security Expo 2017
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internet
 
3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE
 
The EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to knowThe EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to know
 
An itinerary for FAIR and privacy respecting data-driven innovation and research
An itinerary for FAIR and privacy respecting data-driven innovation and researchAn itinerary for FAIR and privacy respecting data-driven innovation and research
An itinerary for FAIR and privacy respecting data-driven innovation and research
 
GDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsGDPR and evolving international privacy regulations
GDPR and evolving international privacy regulations
 

Similar to DPIAs: Examining the Challenges

Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...Trilateral Research
 
Survey of accountability, trust, consent, tracking, security and privacy mech...
Survey of accountability, trust, consent, tracking, security and privacy mech...Survey of accountability, trust, consent, tracking, security and privacy mech...
Survey of accountability, trust, consent, tracking, security and privacy mech...Karlos Svoboda
 
Meeting the challenges of big data
Meeting the challenges of big dataMeeting the challenges of big data
Meeting the challenges of big dataAntoine Vigneron
 
FACT-IR. Fairness, Accountability, Confidentiality and Transparency in Inform...
FACT-IR. Fairness, Accountability, Confidentiality and Transparency in Inform...FACT-IR. Fairness, Accountability, Confidentiality and Transparency in Inform...
FACT-IR. Fairness, Accountability, Confidentiality and Transparency in Inform...Darío Garigliotti
 
[AIIM18] GDPR: whose job is it now? - Paul Lanois
[AIIM18] GDPR: whose job is it now? - Paul Lanois[AIIM18] GDPR: whose job is it now? - Paul Lanois
[AIIM18] GDPR: whose job is it now? - Paul LanoisAIIM International
 
Workshop 4 rules and reg legislation 2016 its learning
Workshop 4 rules and reg legislation 2016 its learningWorkshop 4 rules and reg legislation 2016 its learning
Workshop 4 rules and reg legislation 2016 its learningelizabethp1066
 
اخلاقيات الثاني
اخلاقيات الثانياخلاقيات الثاني
اخلاقيات الثانيBunayan ALdosari
 
Indicators for Monitoring Implementation of a National Human Rights Plan
Indicators for Monitoring Implementation of a National Human Rights PlanIndicators for Monitoring Implementation of a National Human Rights Plan
Indicators for Monitoring Implementation of a National Human Rights PlanMaksym Klyuchar
 
Assessing Risk: How Organizations Can Proactively Manage Privacy Risk
Assessing Risk: How Organizations Can Proactively Manage Privacy RiskAssessing Risk: How Organizations Can Proactively Manage Privacy Risk
Assessing Risk: How Organizations Can Proactively Manage Privacy RiskTrustArc
 
What is contact tracing?
What is contact tracing?What is contact tracing?
What is contact tracing?Ikuo Takahashi
 
Combating Harassment: Policy Innovations
Combating Harassment: Policy Innovations Combating Harassment: Policy Innovations
Combating Harassment: Policy Innovations SUPERA project
 
Big Data Socio-Economic Externalities – the BYTE Case Studies
Big Data Socio-Economic Externalities – the BYTE Case StudiesBig Data Socio-Economic Externalities – the BYTE Case Studies
Big Data Socio-Economic Externalities – the BYTE Case StudiesBYTE Project
 
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018e-SIDES.eu
 
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...Ansgar Koene
 
Governance of trustworthy AI
Governance of trustworthy AIGovernance of trustworthy AI
Governance of trustworthy AIsamossummit
 
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvExAvoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvExEADTU
 
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...Karlos Svoboda
 

Similar to DPIAs: Examining the Challenges (20)

Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
 
Survey of accountability, trust, consent, tracking, security and privacy mech...
Survey of accountability, trust, consent, tracking, security and privacy mech...Survey of accountability, trust, consent, tracking, security and privacy mech...
Survey of accountability, trust, consent, tracking, security and privacy mech...
 
Meeting the challenges of big data
Meeting the challenges of big dataMeeting the challenges of big data
Meeting the challenges of big data
 
FACT-IR. Fairness, Accountability, Confidentiality and Transparency in Inform...
FACT-IR. Fairness, Accountability, Confidentiality and Transparency in Inform...FACT-IR. Fairness, Accountability, Confidentiality and Transparency in Inform...
FACT-IR. Fairness, Accountability, Confidentiality and Transparency in Inform...
 
[AIIM18] GDPR: whose job is it now? - Paul Lanois
[AIIM18] GDPR: whose job is it now? - Paul Lanois[AIIM18] GDPR: whose job is it now? - Paul Lanois
[AIIM18] GDPR: whose job is it now? - Paul Lanois
 
Workshop 4 rules and reg legislation 2016 its learning
Workshop 4 rules and reg legislation 2016 its learningWorkshop 4 rules and reg legislation 2016 its learning
Workshop 4 rules and reg legislation 2016 its learning
 
اخلاقيات الثاني
اخلاقيات الثانياخلاقيات الثاني
اخلاقيات الثاني
 
Indicators for Monitoring Implementation of a National Human Rights Plan
Indicators for Monitoring Implementation of a National Human Rights PlanIndicators for Monitoring Implementation of a National Human Rights Plan
Indicators for Monitoring Implementation of a National Human Rights Plan
 
Assessing Risk: How Organizations Can Proactively Manage Privacy Risk
Assessing Risk: How Organizations Can Proactively Manage Privacy RiskAssessing Risk: How Organizations Can Proactively Manage Privacy Risk
Assessing Risk: How Organizations Can Proactively Manage Privacy Risk
 
What is contact tracing?
What is contact tracing?What is contact tracing?
What is contact tracing?
 
Combating Harassment: Policy Innovations
Combating Harassment: Policy Innovations Combating Harassment: Policy Innovations
Combating Harassment: Policy Innovations
 
Big Data Socio-Economic Externalities – the BYTE Case Studies
Big Data Socio-Economic Externalities – the BYTE Case StudiesBig Data Socio-Economic Externalities – the BYTE Case Studies
Big Data Socio-Economic Externalities – the BYTE Case Studies
 
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
 
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
 
Governance of trustworthy AI
Governance of trustworthy AIGovernance of trustworthy AI
Governance of trustworthy AI
 
Public deck
Public deckPublic deck
Public deck
 
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvExAvoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
 
Flight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the LawFlight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the Law
 
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
 
wkshp 4
wkshp 4wkshp 4
wkshp 4
 

More from Trilateral Research

Designing Security Across Boundaries: mapping disperse data to collaborative...
Designing Security Across Boundaries:  mapping disperse data to collaborative...Designing Security Across Boundaries:  mapping disperse data to collaborative...
Designing Security Across Boundaries: mapping disperse data to collaborative...Trilateral Research
 
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...Trilateral Research
 
Risky Borders: Designing togetherness using information technology for intero...
Risky Borders: Designing togetherness using information technology for intero...Risky Borders: Designing togetherness using information technology for intero...
Risky Borders: Designing togetherness using information technology for intero...Trilateral Research
 
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...Trilateral Research
 
Ethics and technology in humanitarian setting
Ethics and technology in humanitarian settingEthics and technology in humanitarian setting
Ethics and technology in humanitarian settingTrilateral Research
 
Privacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES ProjectPrivacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES ProjectTrilateral Research
 
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...Trilateral Research
 
CRISP project: overview of findings and lessons learned.
CRISP project: overview of findings and lessons learned.CRISP project: overview of findings and lessons learned.
CRISP project: overview of findings and lessons learned.Trilateral Research
 
Legal and ethical issues in social capital analysis
Legal and ethical issues in social capital analysis Legal and ethical issues in social capital analysis
Legal and ethical issues in social capital analysis Trilateral Research
 
Examining End-User Standardisation Needs for Disaster Resilience
Examining End-User Standardisation Needs for Disaster ResilienceExamining End-User Standardisation Needs for Disaster Resilience
Examining End-User Standardisation Needs for Disaster ResilienceTrilateral Research
 
A stakeholder based approach to standardisation for disaster resilience
A stakeholder based approach to standardisation for disaster resilienceA stakeholder based approach to standardisation for disaster resilience
A stakeholder based approach to standardisation for disaster resilienceTrilateral Research
 
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforce
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforceEvolving Technology - Delivering Neighbourhood Policing with a smaller workforce
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforceTrilateral Research
 
Social Media and ICT in Neighbourhood Policing - Opportunities and Challanges
Social Media and ICT in Neighbourhood Policing - Opportunities and ChallangesSocial Media and ICT in Neighbourhood Policing - Opportunities and Challanges
Social Media and ICT in Neighbourhood Policing - Opportunities and ChallangesTrilateral Research
 
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction Trilateral Research
 
ENERGIC-OD @ GEO Business 2017 presentation
ENERGIC-OD @ GEO Business 2017 presentationENERGIC-OD @ GEO Business 2017 presentation
ENERGIC-OD @ GEO Business 2017 presentationTrilateral Research
 
Esports in the UK - privacy risks
Esports in the UK - privacy risksEsports in the UK - privacy risks
Esports in the UK - privacy risksTrilateral Research
 
Enhancing ethics assessment in R&I at the national level
Enhancing ethics assessment in R&I at the national levelEnhancing ethics assessment in R&I at the national level
Enhancing ethics assessment in R&I at the national levelTrilateral Research
 
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...Trilateral Research
 

More from Trilateral Research (20)

Star II sme hotline 21.01.20
Star II sme hotline 21.01.20Star II sme hotline 21.01.20
Star II sme hotline 21.01.20
 
Designing Security Across Boundaries: mapping disperse data to collaborative...
Designing Security Across Boundaries:  mapping disperse data to collaborative...Designing Security Across Boundaries:  mapping disperse data to collaborative...
Designing Security Across Boundaries: mapping disperse data to collaborative...
 
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
 
Risky Borders: Designing togetherness using information technology for intero...
Risky Borders: Designing togetherness using information technology for intero...Risky Borders: Designing togetherness using information technology for intero...
Risky Borders: Designing togetherness using information technology for intero...
 
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
 
Ethics and technology in humanitarian setting
Ethics and technology in humanitarian settingEthics and technology in humanitarian setting
Ethics and technology in humanitarian setting
 
Privacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES ProjectPrivacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES Project
 
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
 
Overview of CLARITY project
Overview of CLARITY projectOverview of CLARITY project
Overview of CLARITY project
 
CRISP project: overview of findings and lessons learned.
CRISP project: overview of findings and lessons learned.CRISP project: overview of findings and lessons learned.
CRISP project: overview of findings and lessons learned.
 
Legal and ethical issues in social capital analysis
Legal and ethical issues in social capital analysis Legal and ethical issues in social capital analysis
Legal and ethical issues in social capital analysis
 
Examining End-User Standardisation Needs for Disaster Resilience
Examining End-User Standardisation Needs for Disaster ResilienceExamining End-User Standardisation Needs for Disaster Resilience
Examining End-User Standardisation Needs for Disaster Resilience
 
A stakeholder based approach to standardisation for disaster resilience
A stakeholder based approach to standardisation for disaster resilienceA stakeholder based approach to standardisation for disaster resilience
A stakeholder based approach to standardisation for disaster resilience
 
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforce
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforceEvolving Technology - Delivering Neighbourhood Policing with a smaller workforce
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforce
 
Social Media and ICT in Neighbourhood Policing - Opportunities and Challanges
Social Media and ICT in Neighbourhood Policing - Opportunities and ChallangesSocial Media and ICT in Neighbourhood Policing - Opportunities and Challanges
Social Media and ICT in Neighbourhood Policing - Opportunities and Challanges
 
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
 
ENERGIC-OD @ GEO Business 2017 presentation
ENERGIC-OD @ GEO Business 2017 presentationENERGIC-OD @ GEO Business 2017 presentation
ENERGIC-OD @ GEO Business 2017 presentation
 
Esports in the UK - privacy risks
Esports in the UK - privacy risksEsports in the UK - privacy risks
Esports in the UK - privacy risks
 
Enhancing ethics assessment in R&I at the national level
Enhancing ethics assessment in R&I at the national levelEnhancing ethics assessment in R&I at the national level
Enhancing ethics assessment in R&I at the national level
 
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...
 

Recently uploaded

Enhancing Indigenous Peoples' right to self-determination in the context of t...
Enhancing Indigenous Peoples' right to self-determination in the context of t...Enhancing Indigenous Peoples' right to self-determination in the context of t...
Enhancing Indigenous Peoples' right to self-determination in the context of t...Christina Parmionova
 
How to design healthy team dynamics to deliver successful digital projects.pptx
How to design healthy team dynamics to deliver successful digital projects.pptxHow to design healthy team dynamics to deliver successful digital projects.pptx
How to design healthy team dynamics to deliver successful digital projects.pptxTechSoupConnectLondo
 
2024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 262024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 26JSchaus & Associates
 
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...narwatsonia7
 
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...narwatsonia7
 
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...narwatsonia7
 
Take action for a healthier planet and brighter future.
Take action for a healthier planet and brighter future.Take action for a healthier planet and brighter future.
Take action for a healthier planet and brighter future.Christina Parmionova
 
call girls in DLF Phase 1 gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in DLF Phase 1  gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝...call girls in DLF Phase 1  gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in DLF Phase 1 gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...saminamagar
 
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual UrgesCall Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urgesnarwatsonia7
 
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...narwatsonia7
 
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdfYHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdfyalehistoricalreview
 
How the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists LawmakersHow the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists LawmakersCongressional Budget Office
 
Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012
Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012
Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012rehmti665
 
Call Girls Service Race Course Road Just Call 7001305949 Enjoy College Girls ...
Call Girls Service Race Course Road Just Call 7001305949 Enjoy College Girls ...Call Girls Service Race Course Road Just Call 7001305949 Enjoy College Girls ...
Call Girls Service Race Course Road Just Call 7001305949 Enjoy College Girls ...narwatsonia7
 
High Class Call Girls Mumbai Tanvi 9910780858 Independent Escort Service Mumbai
High Class Call Girls Mumbai Tanvi 9910780858 Independent Escort Service MumbaiHigh Class Call Girls Mumbai Tanvi 9910780858 Independent Escort Service Mumbai
High Class Call Girls Mumbai Tanvi 9910780858 Independent Escort Service Mumbaisonalikaur4
 
Jewish Efforts to Influence American Immigration Policy in the Years Before t...
Jewish Efforts to Influence American Immigration Policy in the Years Before t...Jewish Efforts to Influence American Immigration Policy in the Years Before t...
Jewish Efforts to Influence American Immigration Policy in the Years Before t...yalehistoricalreview
 
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...“Exploring the world: One page turn at a time.” World Book and Copyright Day ...
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...Christina Parmionova
 
Start Donating your Old Clothes to Poor People
Start Donating your Old Clothes to Poor PeopleStart Donating your Old Clothes to Poor People
Start Donating your Old Clothes to Poor PeopleSERUDS INDIA
 

Recently uploaded (20)

Enhancing Indigenous Peoples' right to self-determination in the context of t...
Enhancing Indigenous Peoples' right to self-determination in the context of t...Enhancing Indigenous Peoples' right to self-determination in the context of t...
Enhancing Indigenous Peoples' right to self-determination in the context of t...
 
How to design healthy team dynamics to deliver successful digital projects.pptx
How to design healthy team dynamics to deliver successful digital projects.pptxHow to design healthy team dynamics to deliver successful digital projects.pptx
How to design healthy team dynamics to deliver successful digital projects.pptx
 
2024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 262024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 26
 
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
 
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
 
Hot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort Service
 
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
 
Take action for a healthier planet and brighter future.
Take action for a healthier planet and brighter future.Take action for a healthier planet and brighter future.
Take action for a healthier planet and brighter future.
 
9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR
9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR
9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR
 
call girls in DLF Phase 1 gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in DLF Phase 1  gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝...call girls in DLF Phase 1  gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in DLF Phase 1 gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
 
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual UrgesCall Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
 
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
 
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdfYHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
 
How the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists LawmakersHow the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists Lawmakers
 
Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012
Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012
Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012
 
Call Girls Service Race Course Road Just Call 7001305949 Enjoy College Girls ...
Call Girls Service Race Course Road Just Call 7001305949 Enjoy College Girls ...Call Girls Service Race Course Road Just Call 7001305949 Enjoy College Girls ...
Call Girls Service Race Course Road Just Call 7001305949 Enjoy College Girls ...
 
High Class Call Girls Mumbai Tanvi 9910780858 Independent Escort Service Mumbai
High Class Call Girls Mumbai Tanvi 9910780858 Independent Escort Service MumbaiHigh Class Call Girls Mumbai Tanvi 9910780858 Independent Escort Service Mumbai
High Class Call Girls Mumbai Tanvi 9910780858 Independent Escort Service Mumbai
 
Jewish Efforts to Influence American Immigration Policy in the Years Before t...
Jewish Efforts to Influence American Immigration Policy in the Years Before t...Jewish Efforts to Influence American Immigration Policy in the Years Before t...
Jewish Efforts to Influence American Immigration Policy in the Years Before t...
 
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...“Exploring the world: One page turn at a time.” World Book and Copyright Day ...
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...
 
Start Donating your Old Clothes to Poor People
Start Donating your Old Clothes to Poor PeopleStart Donating your Old Clothes to Poor People
Start Donating your Old Clothes to Poor People
 

DPIAs: Examining the Challenges

  • 1. Data Protection Impact Assessments: Examining the challenges Rowena Rodrigues & Julia Muraszkiewicz, Trilateral Research Ltd. Workshop on implementation of the EU GDPR Privacy Impact Assessment Brussels Privacy Hub, 4 October 2016 4 October 2016
  • 2. Trilateral Research Ltd. • Impact assessments • Policy & regulatory advice • Research services • Technology assessment • Data Services • Training •Government •Inter-govermental organisations •Humanitarian agencies •Critical infrastructure • Social science • Science & Technology • Economics • Law • Data analytics • Privacy & data protection • Security & surveillance • Data science • Crisis & disaster management Deep Expertise Multiple Disciplines Core Services Key Sectors  Trilateral Research Ltd is a leading London-based research services company.  We provide research, risk analysis, advisory services and technology solutions related to privacy, data protection, new and emerging technologies and policy.  Small enterprise (SME) ≈20 staff members representing over 10 different countries.  Almost all research and technical staff have postdoctoral experience (≈90% have PhDs).  Extensive publication list and excellent international profile.
  • 3. • In 2000, 41 significant attacks on aid workers were recorded across the globe. By 2014, that number had risen to 190. In this 15-year period, over 3,000 aid workers have been killed, injured or kidnapped. • A novel and innovative approach to tracking and decision-making is needed. iTRACK will achieve this through an interdisciplinary, socio-technical approach, which will draw on the latest advances in sensor development, visual data collection, location tracking, artificial intelligence, information management, risk analysis, and humanitarian logistics. • The system will take into account a range of ethical and privacy principles. • The iTRACK system will be deployed, implemented and tested in simulations with humanitarian practitioners. Pilot applications with the World Food Programme and iMMAP in the on-going conflict disasters in the Middle East. EU funded: Horizon 2020 12 partners from 8 EU states and UNWFP Aim: next generation intelligent tracking platform 3 years
  • 4. • Aims to develop a common European framework for ethical assessment of research and innovation. • A 4-year project funded by the European Commission. • Some key outputs: • Comparative analysis of ethics assessment practices • Report (Handbook) of participatory processes • Report on legal frameworks that guide or constrain ethical procedures within research in the EU • Report on international differences in research cultures, ethical standards and legal frameworks • CEN Workshop Agreement: Ethics Assessment of Research & Innovation: open for public consultation till 15 Nov 2016.
  • 5. Structure of presentation 1. GDPR and data protection impact assessments (DPIAs). 2. Challenges in conducting a DPIA: based on lessons particularly from ethical impact assessment guidance (SATORI) and ethical, legal and societal impact assessment (PULSE). 3. Case study: iTRACK project E/PIA experience.
  • 6. DPIAs: the benefits Tool to support data protection compliance. Help meet individuals’ expectations of privacy. Help organisations identify risks, fix problems, at an early stage, reducing associated costs and damage to reputation. Help organisations create efficient and effective data handling processes. Facilitate engagement-led data protection good practice learnings.
  • 7. GDPR on DPIAs: Recital 84 WHY: to enhance compliance with the Regulation where processing operations are likely to result in a high risk to the rights and freedoms of natural persons. WHO SHOULD DO WHAT: the controller should be responsible for carrying out of a DPIA to evaluate, in particular, the origin, nature, particularity and severity of that risk. BENEFIT: The outcome of the assessment should be taken into account when determining the appropriate measures to be taken in order to demonstrate that the processing of personal data complies with the Regulation.
  • 8. DPIAs are required for cases of: 1. A systematic and extensive evaluation of personal aspects relating to natural persons which is based on automated processing, including profiling, and on which decisions are based that produce legal effects concerning the natural person or similarly significantly affect the natural person. 2. Processing on a large scale of special categories of data, or of personal data relating to criminal convictions and offences or related security measures. 3. A systematic monitoring of a publicly accessible area on a large scale. Article 35 (3). See also Recitals 89-90.
  • 9. Contents of the DPIA: Article 35 (7) A systematic description of the envisaged processing operations, the purposes of the processing, including, where applicable, the legitimate interest pursued by the controller. An assessment of the necessity and proportionality of the processing operations in relation to the purposes. An assessment of the risks to the rights and freedoms of data subjects, and The measures envisaged to address the risks, including safeguards, security measures and mechanisms to ensure the protection of personal data and to demonstrate compliance with this Regulation taking into account the rights and legitimate interests of data subjects and other persons concerned.
  • 10. Risks of getting a DPIA wrong Non-compliance with the Regulation. Risk to the rights and freedoms of natural persons. Resistance to products, services, schemes, by customers, end users, citizens. Loss of investment, funding and reputation. Media censure.
  • 12. ‘The right expertise’ • Who will be the assessor: the data controller….project manager? In- house staff member? • Does the DPIA assessor have the right expertise? • Team approach: use of in-house experts e.g. consult data protection officer. • Seek external inputs from experts: will help identify impacts + boost trust in findings • In high impact cases: use external assessors = robust and trustworthy DPIA.
  • 13. ‘Appropriateness’ • Is a DPIA the right type of assessment? • Is it the only one that is needed in the situation? • Is a broader one required ? I.e. one that takes into account other legal, ethical and/or societal requirements? • Who should take this decision, and on what basis?
  • 14. ‘Adequacy’ & ‘thoroughness’ • DPIA should not be a ‘whitewash’. • Is the assessment adequate for the type of processing? • Has the assessment been thorough? Does it take into account the four key elements: Origin+Nature+Severity+Mitigation • Designate responsibility for adequacy: senior management? Board of Directors? Coordinator of project? • Carry out a review to assess adequacy and thoroughness. • Consult with supervisory authority.
  • 15. ‘Engagement’ • Has the DPIA process engaged stakeholders? • Are they the appropriate ones? Do they cover relevant perspectives? • Internal: project management team, data protection officer, technical experts, senior management, researchers, data processors, compliance, communications etc. • External: affected parties, data subjects, their representatives, supervisory authorities etc. • Is it optimised so stakeholders can have meaningful impact? Early enough? • Have the right mechanisms been used?
  • 16. ‘Quality’ • Run an Article 35(7) check: • Does the DPIA properly describe the processing operations and the purposes, including, legitimate interests pursued by the controller? • Does it adequately assess the necessity and proportionality of the processing in relation to the purpose? • Does it adequately assess the risks to individuals? • Does it clearly outline the measures to address risk, including security and to demonstrate compliance? (including responsibilities?) • Potentially, use other evaluation criteria to assess/review the quality of your DPIA: e.g. Kush Wadhwa & Rowena Rodrigues (2013): Evaluating privacy impact assessments, Innovation: The European Journal of Social Science Research, http://dx.doi.org/10.1080/13511610.2013.761748
  • 17. ‘Transparency’: Process and results • Has the process of conducting the DPIA been transparent? • E.g. external consultation • Are results available to stakeholders? To the public? • Publication of DPIA report in full or summary form highly recommended. • Improves accountability. • Increase the public’s understanding of how information is, or will be used.
  • 19. It was 10 am in the morning, when the first iTRACK alert came about new attacks to a small town in the Middle East. The alert was sent from staff working in a hospital in a town using the iTRACK app. Immediately, other civilian responders working in the regions received the report, and were advised to take protective measures. At the same time, a humanitarian convoy en route to the hospital was automatically informed and re-routed to the next warehouse with free capacity. Meanwhile, the activated iTRACK sensing devices on the assets and vehicles in town, combined with satellite imagery allowed for continuous updates of the threats and risks. Rather than having to rely on reports from different, and unreliable sources, unfiltered social media feeds and updates by the armed actors, the iTRACK system provided trusted and direct data from the ground. An analysis of threat patterns and the damages that occurred, was used for a rapid assessment of humanitarian impact and needs. Updates were then sent to the iTRACK subscribers, who started to preposition vehicles and goods to respond to the novel humanitarian situations and alleviate the suffering of the people on the ground in a safer and more efficient way. Fictitious case study
  • 20. Approach Agreeing on principles and definitions Interviews Mapping of information flows in the system architecture Stakeholder workshop Mapping out the risks and solutions Review and audit of ethical and privacy assessments by an independent third- party Publications
  • 21. How to identify the risks emanating from threats and vulnerabilities:  A threat has capabilities to exploit vulnerabilities, it can be accidental, deliberate, natural or human and can originate from within or outside the project e.g. hackers, theft, natural hazards, etc.,  Vulnerability is a weakness that makes the technology susceptible to problems/attacks/exploitation/etc. e.g., employee who does not understand data protection laws  A risk is the impact of a threat acting on a vulnerability, e.g. reputation loss THREAT: Hacker VULNERABILITY: Insecure server RISK: Reputational damage due to loss of personal and potentially sensitive data. What is a risk?
  • 22. Key notions in ethics and data protection & privacy  Dignity  Consent  Avoiding harm  Safety  Social solidarity, inclusion and exclusion  Discrimination and profiling  Accessibility  Sustainability  Collection limitation  Data quality  Use limitation  Transparency  Individual participation and access to data  Anonymity  Privacy of the person  Privacy of personal behaviours
  • 23. Root of principles - GDPR  Article 17 – Right to erasure (“right to be forgotten”)  Article 21 – Right to object – on grounds including profiling  Article 22 – Right not to be subject to a decision based solely on automated processing, including profiling  Article 25 – Data protection by design and by default  Implement appropriate technical and organisational measures designed to implement data protection principles  Article 32 – Security of processing  Implement appropriate technical and organisation measures to ensure level of security appropriate for risk  Article 35 – Data Protection Impact Assessment
  • 24. Root of principles - other We also broadened out beyond the GDPR:  ISO/IEC 29100:2011  ISO/IEC 27001:2005  Universal Declaration on Human Rights 1948  European Convention on Human Rights 1953  Charter of Fundamental Human Rights of the European Union 2009*
  • 25. More than just a DPIA: ethics are important!  iTRACK’s technologies require ethical analysis: location tracking, health monitoring, image surveillance, social media data collection, messaging services.  Potentially vulnerable users: humanitarian workers pressured in emergency situations.  Thus, based on the Kantian idea of respect for the dignity of the person. When the self can be technologically invaded without permission and even often without the knowledge of the person, dignity and liberty are diminished.  An E/PIA can help understand, assess, analyse and potentially mitigate, reduce, or avoid a range of risks.  The E/PIA will also benefit the iTRACK consortium by ensuring that:  Harm to individuals is reduced, avoided, minimised.  Unnecessary costs are avoided.  Trust and reputation are maintained.  Ethical and privacy principles are taken into account.
  • 26.  Rowena Rodrigues: rowena.rodrigues@trilateralresearch.com www.satoriproject.eu Follow us on Twitter: @SATORI_EU  Julia Muraszkiewicz: julia.muraszkiewicz@trilateralresearch.com www.itrack-project.eu Follow us on Twitter:@iTRACKProject1 Contact us:

Editor's Notes

  1. Where processing operations in, particular, involve using new technologies, or are of a new kind and where no data protection impact assessment has been carried out before by the controller Where they become necessary in the light of the time that has elapsed since the initial processing. Large-scale processing operations which aim to process a considerable amount of personal data at regional, national or supranational level and which could affect a large number of data subjects and which are likely to result in a high risk. Where personal data are processed for taking decisions regarding specific natural persons following any systematic and extensive evaluation of personal aspects relating to natural persons based on profiling those data or following the processing of special categories of personal data, biometric data, or data on criminal convictions and offences or related security measures. For monitoring publicly accessible areas on a large scale, especially when using optic-electronic devices or for any other operations where the competent supervisory authority considers that the processing is likely to result in a high risk to the rights and freedoms of data subjects, in particular because they prevent data subjects from exercising a right or using a service or a contract, or because they are carried out systematically on a large scale. (Exception: The processing of personal data should not be considered to be on a large scale if the processing concerns personal data from patients or clients by an individual physician, other health care professional or lawyer. In such cases, a data protection impact assessment should not be mandatory)
  2. The controller shall seek the advice of the data protection officer, where designated, when carrying out a data protection impact assessment. Does the DPIA assessor have the right expertise: data protection law, privacy, information security, risk management, law, ethics, operational procedures, information handling procedures, industry or subject specific knowledge?
  3. Kush Wadhwa & Rowena Rodrigues (2013): Evaluating privacy impact assessments, Innovation: The European Journal of Social Science Research, http://dx.doi.org/10.1080/13511610.2013.761748 Criteria: Clarification of early initiation, Identification of who conducted PIA, Project description, purpose and relevant contextual information, Information flow mapping, Legislative compliance checks, Identification of privacy risks and impacts, Identification of solutions/options for risk avoidance, mitigation, Recommendations , Publication, Identification of stakeholder consultation.
  4. Note: GDPR on the principle of transparency: any information and communication relating to the processing of personal data be easily accessible and easy to understand, and that clear and plain language be used.
  5. The aim of the ethics and privacy impact assessment (E/PIA) is to become part of the design process from beginning to end and incorporates ethical and privacy principles in a comprehensive manner within the iTRACK project. Importantly, the assessment is not carried out in isolation but with the help of end users and other stakeholders; and this helps to assess, analyse and provide a set of possible solutions to risks identified and views with regard to the risks posed by the technology. We are not giving a top down approach but instead stress collaboration. Talk about upcoming workshop and how it will look.
  6. this is our approach but there are many others that could be taken
  7. This is because a project like iTRACK goes beyond EU borders (Jordan / Turkey / Lebanon), so looking at more global standards is appropriate. Also they allow us to explore ethical concepts in greater detail – the GDPR only stipulates a DPIA yet a project like iTRACK needs more. This is because of the close proximity between human rights/fundamental rights and ethical rights like dignity. If we are monitoring persons we need to ensure this does not erode their dignity. Similar, why in issues around assisted living technologies we also include a scrutiny of ethics.
  8. The development and deployment of technologies, such as the iTRACK platform, may have various consequences – including, privacy and ethical issues. iTRACK will monitor heart beat, it will track location, it will record images and collect social media data. These have consequences that go beyond Data and privacy protection. In addition, some of the victims of humanitarian disasters or humanitarian workers may be in a vulnerable position, whereby they are pressured in emergency situations, making them more susceptible to accepting conditions and consenting to situations and/or technologies they may otherwise not have done. Hence ethical considerations are key