SlideShare a Scribd company logo
Review of privacy and data
issues
Emily Shaw
National Policy Manager, Sunlight Foundation
4th Amendment + technology = ?
• Riley v. California (2014) – physically locked on phone, but accessible
via cloud or electronic communications service?
• Parallel construction and law enforcement use of NSA-collected data
• US v. Jones (2012) – GPS on car, but uninstalled techniques?
• ACLU study found that 237 of 250 surveyed PDs track cellphones, mostly
without warrants
Main 4th Am & data privacy issue areas
1. Collection of new data – what are limits on new
surveillance tools?
2. Access to existing data – what are the standards for
protection?
1. New Surveillance Tools
• Automated License Plate Readers
• Stingray Tracking Devices
• Arial surveillance – known and unknown
• Sensor networks
• Public
• Public-private
Automatic License Plate Readers (ALPRs)
• Used regularly around the country, some states are restricting
• Where FOIA-able, can be used to track police behavior
• Not just photographing license plates – car occupants are also
subjects
Stingray Cellphone Tracking Devices
• Can collect phone ID, numbers dialed and
previous location (e.g., last tower)
• Used by at least 48 state and local PDs, but full
scale of adoption is not known (DC, Fairfax,
Montgomery County all have)
• Judges have been unfamiliar with tech and
unintentionally authorized
• LE often uses without explicit authorization,
though recent legal pushback
• 10 states now require warrants (yes MD, no VA)
Arial surveillance
• 13 states regulate drone use as of end of 2014 session but generally
exempt law enforcement. Local law enforcement use of drones is
mainly unregulated.
• Using technology developed for the war in Iraq, manned surveillance
planes like Persistent Surveillance Systems have been seeking
contracts with local law enforcement.
Sensor systems
• Public sensor systems: New York’s Domain Awareness System,
Chicago downtown public sensor array
• Contracted sensor systems: ShotSpotter, persistent sound recording in
over 60 US cities (as in DC, below)
• Public-private connected systems: Oakland’s Domain Awareness
Center (now reduced in scope)
What next?
• ACLU keeping track of emerging issues
2. Privacy-based limits on access to existing
data
• Government data: 1974 Privacy Act (& FIPs), HIPAA/FERPA,
state variation
• Privately-held data: Electronic Communications Privacy Act
Elements of government data protection
• “Personally Identifiable Information” (PII) or “Personal Health
Information” (PHI) protection – e.g., field elimination/transformation
• HIPAA Safe Harbor standard – removal of 18 fields
• 1974 Privacy Act identified the SSN as private data for all
governments
• Privacy Act also mandates that federal agencies provide you access to
data about you held within a “system of records” and to produce
“system of record notices” (SORNs); supposed to limit sharing.
• All privacy laws have a number of exceptions
“Notice and Consent” –
Fair Information Practices principles
• There must be no personal data record-keeping system whose very
existence is secret.
• There must be a way for an individual to find out what information about
him is in a record and how it is used.
• There must be a way for an individual to prevent information about him
that was obtained for one purpose from being used or made available for
other purposes without his consent.
• There must be a way for an individual to correct or amend a record of
identifiable information about him.
• Any organization creating, maintaining, using, or disseminating records of
identifiable personal data must assure the reliability of the data for their
intended use and must take precaution to prevent misuse of the data.
Electronic Communications Privacy Act
• Federal ECPA (1986) required law enforcement to get a warrant for
individuals’ email, unless it was stored on a third-party server for over
180 days.
• Under current technological practice, this leaves out most email.
• Federal efforts to reform have not been successful so far. Current
efforts: LEADS and ECPA Amendments Acts.
• Digital Due Process Principles created by broad coalition
• Maine and Texas have passed a form of improved ECPA and California,
Montana and Maryland currently considering bills
But what about benefits?
Privacy and Data-Sharing for Public Good
• Federal laws like HIPAA and FERPA, and a patchwork of varying state
laws, regularly limit inter-agency data-sharing
There are
two main
possibilities.
1. Keep it restricted.
Share private data within trusted partnerships, using:
• Exceptions for law enforcement
• Exceptions for improvement of a public service
• Exceptions for research to benefit the public
• Legal Mechanisms:
• Memorandums of Understanding
• Statutory change
• Other important elements:
• IRBs
• Social trust
2. Take out the restricted parts!
• Aggregation or anonymization
• Always a balance between privacy and data utility, but an evolving
area
If you like microdata, know your PII
• Rule for open data folks: Know your PII. There are at least 4 kinds:
1. Unintentional PII (legally shouldn’t be there, but it is)
2. Unnecessary PII (doesn’t need to be there, but it is)
3. Necessary PII (needs to be there)
4. Legally-identified information
• Know your rights to legally-identified info. Know to ask for
redaction of unnecessary PII. Know to seek better controls for
unintentional PII.
The Future! Exciting upcoming
surveillance/public access/privacy issues!
• Police body camera data
• Government relationships with third-party shared location data –
Google, Waze
• Public service location data - Metrocards, EZ Pass (recent example of
Christie’s political use of opponent’s EZ Pass data.)

More Related Content

What's hot

Information Privacy
Information PrivacyInformation Privacy
Information Privacy
primeteacher32
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
sidra batool
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidanceAmy Purcell
 
Balancing Privacy and Digitization
Balancing Privacy and DigitizationBalancing Privacy and Digitization
Balancing Privacy and Digitization
Symptai Consulting Limited
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
imehreenx
 
When Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
When Big Data is Personal Data - Data Analytics in The Age of Privacy LawsWhen Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
When Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
Tara Aaron
 
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
APNIC
 
Intellectual Property in Cyberspace
Intellectual Property in CyberspaceIntellectual Property in Cyberspace
Intellectual Property in Cyberspace
Mindaugas Kiskis
 
Com Tech Research Project
Com Tech Research ProjectCom Tech Research Project
Com Tech Research Project
CasieLouttit
 
Privacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
Privacy Practice Fundamentals: Understanding Compliance Regimes and RequirementsPrivacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
Privacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
Anitafin
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
Tushar Rajput
 
Protection of Personal Information
Protection of Personal InformationProtection of Personal Information
Protection of Personal Information
Francois Naude Jr.
 
Ethics in Technology - Privacy
Ethics in Technology - PrivacyEthics in Technology - Privacy
Ethics in Technology - Privacy
Frances Coronel
 
Clyrofor popia readiness webinar
Clyrofor  popia readiness webinarClyrofor  popia readiness webinar
Clyrofor popia readiness webinar
Lesedi Mnisi
 
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
gallowayandcollens
 
A Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information TechnologyA Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information Technology
Laguna State Polytechnic University
 
GDPR clinic - CloudWATCH at Cloud Security Expo 2017
GDPR clinic - CloudWATCH at Cloud Security Expo 2017GDPR clinic - CloudWATCH at Cloud Security Expo 2017
GDPR clinic - CloudWATCH at Cloud Security Expo 2017
CloudWATCH Consortium
 
Strong Host Security Policies are Good Business
Strong Host Security Policies are Good BusinessStrong Host Security Policies are Good Business
Strong Host Security Policies are Good Business
HostingCon
 
Legal and privacy implications of IoT
Legal and privacy implications of IoTLegal and privacy implications of IoT
Legal and privacy implications of IoT
Andres Guadamuz
 

What's hot (19)

Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
 
Balancing Privacy and Digitization
Balancing Privacy and DigitizationBalancing Privacy and Digitization
Balancing Privacy and Digitization
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
When Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
When Big Data is Personal Data - Data Analytics in The Age of Privacy LawsWhen Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
When Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
 
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
 
Intellectual Property in Cyberspace
Intellectual Property in CyberspaceIntellectual Property in Cyberspace
Intellectual Property in Cyberspace
 
Com Tech Research Project
Com Tech Research ProjectCom Tech Research Project
Com Tech Research Project
 
Privacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
Privacy Practice Fundamentals: Understanding Compliance Regimes and RequirementsPrivacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
Privacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Protection of Personal Information
Protection of Personal InformationProtection of Personal Information
Protection of Personal Information
 
Ethics in Technology - Privacy
Ethics in Technology - PrivacyEthics in Technology - Privacy
Ethics in Technology - Privacy
 
Clyrofor popia readiness webinar
Clyrofor  popia readiness webinarClyrofor  popia readiness webinar
Clyrofor popia readiness webinar
 
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
 
A Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information TechnologyA Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information Technology
 
GDPR clinic - CloudWATCH at Cloud Security Expo 2017
GDPR clinic - CloudWATCH at Cloud Security Expo 2017GDPR clinic - CloudWATCH at Cloud Security Expo 2017
GDPR clinic - CloudWATCH at Cloud Security Expo 2017
 
Strong Host Security Policies are Good Business
Strong Host Security Policies are Good BusinessStrong Host Security Policies are Good Business
Strong Host Security Policies are Good Business
 
Legal and privacy implications of IoT
Legal and privacy implications of IoTLegal and privacy implications of IoT
Legal and privacy implications of IoT
 

Viewers also liked

Third Party Use of Legislative Data - Presentation for NCSL-NALIT
Third Party Use of Legislative Data - Presentation for NCSL-NALITThird Party Use of Legislative Data - Presentation for NCSL-NALIT
Third Party Use of Legislative Data - Presentation for NCSL-NALIT
EmilyDShaw
 
EXCLUSIVE BANK PROGRAM
EXCLUSIVE BANK PROGRAM EXCLUSIVE BANK PROGRAM
EXCLUSIVE BANK PROGRAM
Nationwide Investment Group LLC
 
Service Recovery; A 2nd Chance to Make a Good 1st Impression.
Service Recovery; A 2nd Chance to Make a Good 1st Impression.Service Recovery; A 2nd Chance to Make a Good 1st Impression.
Service Recovery; A 2nd Chance to Make a Good 1st Impression.
Gorman Business Consultants
 
DACS - The Internet of Things (IoT)
DACS - The Internet of Things (IoT)DACS - The Internet of Things (IoT)
DACS - The Internet of Things (IoT)
Steve Posick
 
What lets open data have impact
What lets open data have impactWhat lets open data have impact
What lets open data have impact
EmilyDShaw
 
Transparency: how do I do it?
Transparency: how do I do it?Transparency: how do I do it?
Transparency: how do I do it?
EmilyDShaw
 
WorkWatcher Prezentacja01
WorkWatcher Prezentacja01WorkWatcher Prezentacja01
WorkWatcher Prezentacja01
mkkp4x4
 
Natural new ingredients. - Free Online Library
Natural new ingredients. - Free Online LibraryNatural new ingredients. - Free Online Library
Natural new ingredients. - Free Online Library
culturedoptimis90
 
The Control of Media & Devices in an Internet of Things (IoT)
The Control of Media & Devices in an Internet of Things (IoT)The Control of Media & Devices in an Internet of Things (IoT)
The Control of Media & Devices in an Internet of Things (IoT)
Steve Posick
 
"7 Slight Edges to Keeping Your Customers"
"7 Slight Edges to Keeping Your Customers""7 Slight Edges to Keeping Your Customers"
"7 Slight Edges to Keeping Your Customers"
Gorman Business Consultants
 
Thursday mass
Thursday massThursday mass
Thursday mass
Mimi Soriano
 
Hair care: new ingredients. - Free Online Library
Hair care: new ingredients. - Free Online LibraryHair care: new ingredients. - Free Online Library
Hair care: new ingredients. - Free Online Library
culturedoptimis90
 
Nationwide Investment Group LLC
Nationwide Investment Group LLCNationwide Investment Group LLC
Nationwide Investment Group LLC
Nationwide Investment Group LLC
 
NBMOTIVATIONBOTS
NBMOTIVATIONBOTSNBMOTIVATIONBOTS
NBMOTIVATIONBOTSTony Marks
 
deneme
denemedeneme
Emiliagomez Trabajo Final
Emiliagomez Trabajo FinalEmiliagomez Trabajo Final
Emiliagomez Trabajo Final
Emilia Gabriella Gomez
 
De an-tuyen-sinh-dh-dan-lap-hai-phong
De an-tuyen-sinh-dh-dan-lap-hai-phongDe an-tuyen-sinh-dh-dan-lap-hai-phong
De an-tuyen-sinh-dh-dan-lap-hai-phong
giaoduc0123
 
chỗ nào dịch vụ giúp việc theo tháng chất lượng cao tại tphcm
chỗ nào dịch vụ giúp việc theo tháng chất lượng cao tại tphcmchỗ nào dịch vụ giúp việc theo tháng chất lượng cao tại tphcm
chỗ nào dịch vụ giúp việc theo tháng chất lượng cao tại tphcmrubye340
 
Greece bailout impact on world economies animation based
Greece bailout impact on world economies   animation basedGreece bailout impact on world economies   animation based
Greece bailout impact on world economies animation based
Shivraj Pawar
 
Trabajo práctico n°1
Trabajo práctico n°1Trabajo práctico n°1
Trabajo práctico n°1
Agus Sci
 

Viewers also liked (20)

Third Party Use of Legislative Data - Presentation for NCSL-NALIT
Third Party Use of Legislative Data - Presentation for NCSL-NALITThird Party Use of Legislative Data - Presentation for NCSL-NALIT
Third Party Use of Legislative Data - Presentation for NCSL-NALIT
 
EXCLUSIVE BANK PROGRAM
EXCLUSIVE BANK PROGRAM EXCLUSIVE BANK PROGRAM
EXCLUSIVE BANK PROGRAM
 
Service Recovery; A 2nd Chance to Make a Good 1st Impression.
Service Recovery; A 2nd Chance to Make a Good 1st Impression.Service Recovery; A 2nd Chance to Make a Good 1st Impression.
Service Recovery; A 2nd Chance to Make a Good 1st Impression.
 
DACS - The Internet of Things (IoT)
DACS - The Internet of Things (IoT)DACS - The Internet of Things (IoT)
DACS - The Internet of Things (IoT)
 
What lets open data have impact
What lets open data have impactWhat lets open data have impact
What lets open data have impact
 
Transparency: how do I do it?
Transparency: how do I do it?Transparency: how do I do it?
Transparency: how do I do it?
 
WorkWatcher Prezentacja01
WorkWatcher Prezentacja01WorkWatcher Prezentacja01
WorkWatcher Prezentacja01
 
Natural new ingredients. - Free Online Library
Natural new ingredients. - Free Online LibraryNatural new ingredients. - Free Online Library
Natural new ingredients. - Free Online Library
 
The Control of Media & Devices in an Internet of Things (IoT)
The Control of Media & Devices in an Internet of Things (IoT)The Control of Media & Devices in an Internet of Things (IoT)
The Control of Media & Devices in an Internet of Things (IoT)
 
"7 Slight Edges to Keeping Your Customers"
"7 Slight Edges to Keeping Your Customers""7 Slight Edges to Keeping Your Customers"
"7 Slight Edges to Keeping Your Customers"
 
Thursday mass
Thursday massThursday mass
Thursday mass
 
Hair care: new ingredients. - Free Online Library
Hair care: new ingredients. - Free Online LibraryHair care: new ingredients. - Free Online Library
Hair care: new ingredients. - Free Online Library
 
Nationwide Investment Group LLC
Nationwide Investment Group LLCNationwide Investment Group LLC
Nationwide Investment Group LLC
 
NBMOTIVATIONBOTS
NBMOTIVATIONBOTSNBMOTIVATIONBOTS
NBMOTIVATIONBOTS
 
deneme
denemedeneme
deneme
 
Emiliagomez Trabajo Final
Emiliagomez Trabajo FinalEmiliagomez Trabajo Final
Emiliagomez Trabajo Final
 
De an-tuyen-sinh-dh-dan-lap-hai-phong
De an-tuyen-sinh-dh-dan-lap-hai-phongDe an-tuyen-sinh-dh-dan-lap-hai-phong
De an-tuyen-sinh-dh-dan-lap-hai-phong
 
chỗ nào dịch vụ giúp việc theo tháng chất lượng cao tại tphcm
chỗ nào dịch vụ giúp việc theo tháng chất lượng cao tại tphcmchỗ nào dịch vụ giúp việc theo tháng chất lượng cao tại tphcm
chỗ nào dịch vụ giúp việc theo tháng chất lượng cao tại tphcm
 
Greece bailout impact on world economies animation based
Greece bailout impact on world economies   animation basedGreece bailout impact on world economies   animation based
Greece bailout impact on world economies animation based
 
Trabajo práctico n°1
Trabajo práctico n°1Trabajo práctico n°1
Trabajo práctico n°1
 

Similar to Current Privacy and Data Issues (for people who care about open data!)

4-Privacy1.pptx
4-Privacy1.pptx4-Privacy1.pptx
4-Privacy1.pptx
SherifElGohary7
 
ethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptethcpp04-Unit 3.ppt
ethcpp04-Unit 3.ppt
Anil Yadav
 
ethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptethcpp04-Unit 3.ppt
ethcpp04-Unit 3.ppt
Anil Yadav
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Diana Maier
 
Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
Aurora Computer Studies
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
Cengage Learning
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx
JohnLagman3
 
Legal-Ethical-Professionalin-IS.pptx
Legal-Ethical-Professionalin-IS.pptxLegal-Ethical-Professionalin-IS.pptx
Legal-Ethical-Professionalin-IS.pptx
Shruthi48
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management
Endcode_org
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analytics
shekharkanodia
 
Privacy and missing persons
Privacy and missing personsPrivacy and missing persons
Privacy and missing personsmpcislides
 
Chapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxChapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptx
Nargis Parveen
 
Data Privacy Trends in 2021: Compliance with New Regulations
Data Privacy Trends in 2021: Compliance with New RegulationsData Privacy Trends in 2021: Compliance with New Regulations
Data Privacy Trends in 2021: Compliance with New Regulations
PECB
 
Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...
Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...
Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...
Quarles & Brady
 
Evolving Issues in Workplace Privacy
Evolving Issues in Workplace PrivacyEvolving Issues in Workplace Privacy
Evolving Issues in Workplace Privacy
mkeane
 
Gary Davis
Gary DavisGary Davis
Gary Davis
dri_ireland
 
Information Assurance And Security - Chapter 3 - Lesson 1
Information Assurance And Security - Chapter 3 - Lesson 1Information Assurance And Security - Chapter 3 - Lesson 1
Information Assurance And Security - Chapter 3 - Lesson 1
MLG College of Learning, Inc
 
Lesson 1
Lesson 1Lesson 1
Lesson 1- Laws and Ethics
Lesson 1- Laws and EthicsLesson 1- Laws and Ethics
Lesson 1- Laws and Ethics
MLG College of Learning, Inc
 

Similar to Current Privacy and Data Issues (for people who care about open data!) (20)

4-Privacy1.pptx
4-Privacy1.pptx4-Privacy1.pptx
4-Privacy1.pptx
 
ethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptethcpp04-Unit 3.ppt
ethcpp04-Unit 3.ppt
 
ethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptethcpp04-Unit 3.ppt
ethcpp04-Unit 3.ppt
 
Cloud primer
Cloud primerCloud primer
Cloud primer
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx
 
Legal-Ethical-Professionalin-IS.pptx
Legal-Ethical-Professionalin-IS.pptxLegal-Ethical-Professionalin-IS.pptx
Legal-Ethical-Professionalin-IS.pptx
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analytics
 
Privacy and missing persons
Privacy and missing personsPrivacy and missing persons
Privacy and missing persons
 
Chapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxChapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptx
 
Data Privacy Trends in 2021: Compliance with New Regulations
Data Privacy Trends in 2021: Compliance with New RegulationsData Privacy Trends in 2021: Compliance with New Regulations
Data Privacy Trends in 2021: Compliance with New Regulations
 
Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...
Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...
Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...
 
Evolving Issues in Workplace Privacy
Evolving Issues in Workplace PrivacyEvolving Issues in Workplace Privacy
Evolving Issues in Workplace Privacy
 
Gary Davis
Gary DavisGary Davis
Gary Davis
 
Information Assurance And Security - Chapter 3 - Lesson 1
Information Assurance And Security - Chapter 3 - Lesson 1Information Assurance And Security - Chapter 3 - Lesson 1
Information Assurance And Security - Chapter 3 - Lesson 1
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Lesson 1- Laws and Ethics
Lesson 1- Laws and EthicsLesson 1- Laws and Ethics
Lesson 1- Laws and Ethics
 

Recently uploaded

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 

Recently uploaded (20)

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 

Current Privacy and Data Issues (for people who care about open data!)

  • 1. Review of privacy and data issues Emily Shaw National Policy Manager, Sunlight Foundation
  • 2. 4th Amendment + technology = ? • Riley v. California (2014) – physically locked on phone, but accessible via cloud or electronic communications service? • Parallel construction and law enforcement use of NSA-collected data • US v. Jones (2012) – GPS on car, but uninstalled techniques? • ACLU study found that 237 of 250 surveyed PDs track cellphones, mostly without warrants
  • 3. Main 4th Am & data privacy issue areas 1. Collection of new data – what are limits on new surveillance tools? 2. Access to existing data – what are the standards for protection?
  • 4. 1. New Surveillance Tools • Automated License Plate Readers • Stingray Tracking Devices • Arial surveillance – known and unknown • Sensor networks • Public • Public-private
  • 5. Automatic License Plate Readers (ALPRs) • Used regularly around the country, some states are restricting • Where FOIA-able, can be used to track police behavior • Not just photographing license plates – car occupants are also subjects
  • 6. Stingray Cellphone Tracking Devices • Can collect phone ID, numbers dialed and previous location (e.g., last tower) • Used by at least 48 state and local PDs, but full scale of adoption is not known (DC, Fairfax, Montgomery County all have) • Judges have been unfamiliar with tech and unintentionally authorized • LE often uses without explicit authorization, though recent legal pushback • 10 states now require warrants (yes MD, no VA)
  • 7. Arial surveillance • 13 states regulate drone use as of end of 2014 session but generally exempt law enforcement. Local law enforcement use of drones is mainly unregulated. • Using technology developed for the war in Iraq, manned surveillance planes like Persistent Surveillance Systems have been seeking contracts with local law enforcement.
  • 8. Sensor systems • Public sensor systems: New York’s Domain Awareness System, Chicago downtown public sensor array • Contracted sensor systems: ShotSpotter, persistent sound recording in over 60 US cities (as in DC, below) • Public-private connected systems: Oakland’s Domain Awareness Center (now reduced in scope)
  • 9. What next? • ACLU keeping track of emerging issues
  • 10. 2. Privacy-based limits on access to existing data • Government data: 1974 Privacy Act (& FIPs), HIPAA/FERPA, state variation • Privately-held data: Electronic Communications Privacy Act
  • 11. Elements of government data protection • “Personally Identifiable Information” (PII) or “Personal Health Information” (PHI) protection – e.g., field elimination/transformation • HIPAA Safe Harbor standard – removal of 18 fields • 1974 Privacy Act identified the SSN as private data for all governments • Privacy Act also mandates that federal agencies provide you access to data about you held within a “system of records” and to produce “system of record notices” (SORNs); supposed to limit sharing. • All privacy laws have a number of exceptions
  • 12. “Notice and Consent” – Fair Information Practices principles • There must be no personal data record-keeping system whose very existence is secret. • There must be a way for an individual to find out what information about him is in a record and how it is used. • There must be a way for an individual to prevent information about him that was obtained for one purpose from being used or made available for other purposes without his consent. • There must be a way for an individual to correct or amend a record of identifiable information about him. • Any organization creating, maintaining, using, or disseminating records of identifiable personal data must assure the reliability of the data for their intended use and must take precaution to prevent misuse of the data.
  • 13. Electronic Communications Privacy Act • Federal ECPA (1986) required law enforcement to get a warrant for individuals’ email, unless it was stored on a third-party server for over 180 days. • Under current technological practice, this leaves out most email. • Federal efforts to reform have not been successful so far. Current efforts: LEADS and ECPA Amendments Acts. • Digital Due Process Principles created by broad coalition • Maine and Texas have passed a form of improved ECPA and California, Montana and Maryland currently considering bills
  • 14. But what about benefits? Privacy and Data-Sharing for Public Good • Federal laws like HIPAA and FERPA, and a patchwork of varying state laws, regularly limit inter-agency data-sharing There are two main possibilities.
  • 15. 1. Keep it restricted. Share private data within trusted partnerships, using: • Exceptions for law enforcement • Exceptions for improvement of a public service • Exceptions for research to benefit the public • Legal Mechanisms: • Memorandums of Understanding • Statutory change • Other important elements: • IRBs • Social trust
  • 16. 2. Take out the restricted parts! • Aggregation or anonymization • Always a balance between privacy and data utility, but an evolving area
  • 17. If you like microdata, know your PII • Rule for open data folks: Know your PII. There are at least 4 kinds: 1. Unintentional PII (legally shouldn’t be there, but it is) 2. Unnecessary PII (doesn’t need to be there, but it is) 3. Necessary PII (needs to be there) 4. Legally-identified information • Know your rights to legally-identified info. Know to ask for redaction of unnecessary PII. Know to seek better controls for unintentional PII.
  • 18. The Future! Exciting upcoming surveillance/public access/privacy issues! • Police body camera data • Government relationships with third-party shared location data – Google, Waze • Public service location data - Metrocards, EZ Pass (recent example of Christie’s political use of opponent’s EZ Pass data.)