Blockchains inherently process personal data across borders in an immutable manner, but some data processing is necessary for their functioning. To comply with the GDPR's data protection by design and default requirements, blockchains can implement measures like encrypting or hashing personal data stored on distributed ledgers. However, while crypto communities emphasize encryption and avoiding re-identification, other data protection principles like user control, privacy, and rights must also be respected. Governance and standards are needed to help blockchains fully implement data protection by design.
In Search of Simplicity: Redesigning the Digital Bleek and LloydLighton Phiri
DESIDOC Journal of Library & Information Technology: Special Issue on Digital Preservation original submission.
Publication URL: http://goo.gl/yUERj
BibTeX Citation
@article{D2524,
author = {Lighton Phiri and Hussein Suleman},
title = {In Search of Simplicity: Redesigning the Digital Bleek and Lloyd},
journal = {DESIDOC Journal of Library & Information Technology},
volume = {32},
number = {4},
year = {2012},
keywords = {},
abstract = {The Digital Bleek and Lloyd is a collection of digitised historical artefacts on the Bushman people ofSouthern Africa. The underlying software was initially designed to enable access from as many people aspossible so usage requirements were minimal – it was not even necessary to use a web server or database.However, the system was not focused on preservation, extensibility, or reusability. In this article, it is arguedthat such desirable attributes could manifest themselves in a natural evolution of the Bleek and Lloyd softwaresystem in the direction of greater simplicity. A case study demonstrates that this is indeed feasible in the caseof the Digital Bleek and Lloyd and potentially more generally applicable in digital libraries.},
issn = {0976-4658}, url = {http://publications.drdo.gov.in/ojs/index.php/djlit/article/view/2524}
}
These are the slides used by Mr Tawanda Kembo during his talk at the Computer Society of Zimbabwe monthly function for April 2016 under the theme, "The Internet of Things" on April 26 2016.
Blockchain Technology and its Business ApplicationPritom Chaki
The blockchain is now an exciting new alternative to traditional currency, centralized banking, and transaction methods that is not only changing the way we handle financial transactions, but also alternative uses that will change the world. In short, blockchain is a distributed ledger that maintains a continuously-growing list of every transaction across every network distributed over tens of thousands of computers. This makes it almost impossible to hack, changing the way banking is done.
Blockchain is a disruptive and distributed ledger technology that is widely used to accelerate catalyzing and creative innovation. Blockchain training program is specifically designed to help you learn the concept of Blockchain and its implementation.
In Search of Simplicity: Redesigning the Digital Bleek and LloydLighton Phiri
DESIDOC Journal of Library & Information Technology: Special Issue on Digital Preservation original submission.
Publication URL: http://goo.gl/yUERj
BibTeX Citation
@article{D2524,
author = {Lighton Phiri and Hussein Suleman},
title = {In Search of Simplicity: Redesigning the Digital Bleek and Lloyd},
journal = {DESIDOC Journal of Library & Information Technology},
volume = {32},
number = {4},
year = {2012},
keywords = {},
abstract = {The Digital Bleek and Lloyd is a collection of digitised historical artefacts on the Bushman people ofSouthern Africa. The underlying software was initially designed to enable access from as many people aspossible so usage requirements were minimal – it was not even necessary to use a web server or database.However, the system was not focused on preservation, extensibility, or reusability. In this article, it is arguedthat such desirable attributes could manifest themselves in a natural evolution of the Bleek and Lloyd softwaresystem in the direction of greater simplicity. A case study demonstrates that this is indeed feasible in the caseof the Digital Bleek and Lloyd and potentially more generally applicable in digital libraries.},
issn = {0976-4658}, url = {http://publications.drdo.gov.in/ojs/index.php/djlit/article/view/2524}
}
These are the slides used by Mr Tawanda Kembo during his talk at the Computer Society of Zimbabwe monthly function for April 2016 under the theme, "The Internet of Things" on April 26 2016.
Blockchain Technology and its Business ApplicationPritom Chaki
The blockchain is now an exciting new alternative to traditional currency, centralized banking, and transaction methods that is not only changing the way we handle financial transactions, but also alternative uses that will change the world. In short, blockchain is a distributed ledger that maintains a continuously-growing list of every transaction across every network distributed over tens of thousands of computers. This makes it almost impossible to hack, changing the way banking is done.
Blockchain is a disruptive and distributed ledger technology that is widely used to accelerate catalyzing and creative innovation. Blockchain training program is specifically designed to help you learn the concept of Blockchain and its implementation.
Decentralised AI and Distributed Ledgers - An IntroductionGokul Alex
The presentation on Decentralised Machine Intelligence powered by Distributed Ledgers from Gokul Alex in the 3AI Association Thought Leadership Forum Webinar Series. An introduction to Ocean Protocol, Raven Protocol, SingularityNET and reference architectures of decentralised machine intelligence.
Blockchanging the world - An overview of the blockchain academic landscapeSebastian Cochinescu
An overview of the blockchain academic landscape - presentation from the ICO Advisory Group's Event "Blockchanging the world – the academic, technological and legal challenges of the blockchain revolution" held at Techhub Bucharest on December 20th, 2017.
Decentralised AI through Distributed Ledger Technologies Gokul Alex
My seminar lecture session on Decentralised AI through Distributed Ledger Technologies in the second National Seminar on Machine Intelligence organised by University of Kerala, Department of Computer Science on 24th January 2020. I have covered the foundations of distributed ledger technologies, decentralisation roadmap, decentralised AI and decentralised data exchanges in this session.
Blockchain Essentials for Business Leaders - Value Propositions and Advantage...Gokul Alex
This is an Executive Leadership Workshop Program by Gokul Alex on the fundamentals and frontiers of Blockchain which is a transformative technology covering key concepts such as value proposition design, competitive advantage, operating models, value streams, architecture frameworks etc. It is a distillation of essential concepts and emerging frontiers in the world of distributed ledger technologies.
Immuto, enables users to leverage blockchain for protecting their digital content efficiently. There is significant potential for blockchain technology to protect artists, galleries, and buyers in the world of digital art and digital auctions. Namely, blockchain is used to securely and permanently track provenance, authenticity, and ownership over time.
PKI : The role of TTPs for the Development of secure Transaction SystemsJohn ILIADIS
Workshop on Software Process Improvement and Formal Methods in Security and Safety, Athens, Greece, March 1998, EPIC Project (Exchanging process information experiences across SMEs by conferencing on the Internet"), 1997-1998, European Commission, ESPRIT Programme
This slide contains of a basic introduction about Bitcoin and Blockchain technology covering topics on; what is Bitcoin, how Bitcoin works, who created bitcoin, what is blockchain technology, uses and benefits of blockchain.
3rd International Conference on Big Data and Blockchain (BDAB 2022)aciijournal
3rd International Conference on Big Data and Blockchain (BDAB 2022) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of Big Data and Blockchain. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the area of Big Data and Blockchain.
encryptedDB is an encrypted database for the cloud. It can protect information related to personal, health or financial data, while still support the same functionality as a non encrypted database.
The relation of the two concepts of ‘blockchain’ and ‘security’ - whether blockchain is redefining cybersecurity, what new challenges are, how we build a virtuous circle between blockchain and security
Author : Dr Mark Moir, Oracle Labs
Thomas Zakrzewski, EgisData. What is missing in blockchain to achieve scalabi...IT Arena
Thomas Zakrzewski (Tom Z.) is a Founder and Managing Partner at EgisData; Former Distinguished Engineer and Head of Blockchain at S&P Global Ratings. He developed products protecting private and confidential information using advanced cryptography and blockchain.
He co-authored a patent for a solution addressing issues with data privacy, data localization, and preparedness for post-quantum ciphers using advanced cryptography and blockchain.
Tom has over 25 years of IT experience in Financials, Software Engineering, Telecom, e-Commerce, Distribution & Logistics, and Healthcare. He holds a Bachelor’s Degree in Computer Science and Mathematics from Montclair State University and a Master’s Degree in Predictive Analytics from Northwestern University.
Throughout his career, he held numerous positions ranging from developer to architect, to CIO. Currently, he serves on the Advisory Boards for the New Jersey Institute of Technology (NJIT) and Montclair State University, as well as the Big Data Certification Program at Rutgers University. Tom is also a Visiting Technologist Fellow at the National Security Institute (NSI). Tom is a frequent speaker at conferences discussing blockchain security, crypto assets, and quantitative models.
Speech Overview:
Encryption is the most effective method to protect information. Yet, due to the high cost of encryption products, maintenance, and implementation, encryption is only utilized by the Fortune 1000 companies. EgisData has developed the product Encryption as a Service, encompassing the integration of secured and scalable Key Management and fine-grained control access to resources. In this session, attendees will learn about today’s challenges to manage scalable blockchain deployments, Digital Identities management, and protection of private and confidential information.
Building Distributed Downstream Services Using OAI-PMHLighton Phiri
Invited talk given to 'Advanced Distributed Systems' postgraduate class in the Department of Computer Science [1] at The University of Zambia [2].
[1] http://www.cs.unza.zm
[2] http://www.unza.zm
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...Ioannis Krontiris
Download paper: http://www.ioanniskrontiris.de/publications/DEF-FORUM2012-eIDs.pdf
Electronic Identity (eID) cards are rapidly emerging in Europe and are gaining user acceptance. As an authentication token, an eID card is a gateway to personal information and as such it is subject to privacy risks. Several European countries have taken extra care to protect their citizens against these risks. A notable example is the German eID card, which we take as a case study in this paper. We first discuss important privacy and security threats that remain in the German eID system and elaborate on the advantages of using privacy attribute-based credentials (Privacy-ABCs) to address these threats. Then we study two approaches for integrating Privacy-ABCs with eID systems. In the first approach, we show that by introducing a new entity in the current German eID system, the citizen can get a lot of the Privacy-ABCs advantages, without further modifications. Then we concentrate on putting Privacy-ABCs directly on smart cards, and we present new results on performance, which demonstrate that it is now feasible for smart cards to support the required computations these mechanisms require.
DN18 | Privacy by Design for Blockchain | Silvan Jongerius | TechGDPR Dataconomy Media
About the Author:
Silvan Jongerius is the CEO and Founder of TechGDPR, a boutique consultancy for Data Protection and Privacy in tech-centric environments, such as Blockchain, AI and IoT. He has led Data Protection and security efforts since 2012, after spending 12 years in senior technology leadership, general management and innovation for large technology educators. In recent years, he has been particularly focused on Blockchain projects. He holds certifications from the Columbia Business School in Digital Strategies for Business, from the IAPP as Certified Information Privacy Professional (Europe/GDPR) and is TÜV certified Data Protection Officer (Datenschutzbeauftragter). He is the European Representative for DLT Labs, a Toronto-based blockchain development house. He is also a regular speaker, consultant and educator in GDPR, blockchain, innovation and technology, and is mentor and advisor for a number of innovative tech and blockchain projects.
Decentralised AI and Distributed Ledgers - An IntroductionGokul Alex
The presentation on Decentralised Machine Intelligence powered by Distributed Ledgers from Gokul Alex in the 3AI Association Thought Leadership Forum Webinar Series. An introduction to Ocean Protocol, Raven Protocol, SingularityNET and reference architectures of decentralised machine intelligence.
Blockchanging the world - An overview of the blockchain academic landscapeSebastian Cochinescu
An overview of the blockchain academic landscape - presentation from the ICO Advisory Group's Event "Blockchanging the world – the academic, technological and legal challenges of the blockchain revolution" held at Techhub Bucharest on December 20th, 2017.
Decentralised AI through Distributed Ledger Technologies Gokul Alex
My seminar lecture session on Decentralised AI through Distributed Ledger Technologies in the second National Seminar on Machine Intelligence organised by University of Kerala, Department of Computer Science on 24th January 2020. I have covered the foundations of distributed ledger technologies, decentralisation roadmap, decentralised AI and decentralised data exchanges in this session.
Blockchain Essentials for Business Leaders - Value Propositions and Advantage...Gokul Alex
This is an Executive Leadership Workshop Program by Gokul Alex on the fundamentals and frontiers of Blockchain which is a transformative technology covering key concepts such as value proposition design, competitive advantage, operating models, value streams, architecture frameworks etc. It is a distillation of essential concepts and emerging frontiers in the world of distributed ledger technologies.
Immuto, enables users to leverage blockchain for protecting their digital content efficiently. There is significant potential for blockchain technology to protect artists, galleries, and buyers in the world of digital art and digital auctions. Namely, blockchain is used to securely and permanently track provenance, authenticity, and ownership over time.
PKI : The role of TTPs for the Development of secure Transaction SystemsJohn ILIADIS
Workshop on Software Process Improvement and Formal Methods in Security and Safety, Athens, Greece, March 1998, EPIC Project (Exchanging process information experiences across SMEs by conferencing on the Internet"), 1997-1998, European Commission, ESPRIT Programme
This slide contains of a basic introduction about Bitcoin and Blockchain technology covering topics on; what is Bitcoin, how Bitcoin works, who created bitcoin, what is blockchain technology, uses and benefits of blockchain.
3rd International Conference on Big Data and Blockchain (BDAB 2022)aciijournal
3rd International Conference on Big Data and Blockchain (BDAB 2022) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of Big Data and Blockchain. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the area of Big Data and Blockchain.
encryptedDB is an encrypted database for the cloud. It can protect information related to personal, health or financial data, while still support the same functionality as a non encrypted database.
The relation of the two concepts of ‘blockchain’ and ‘security’ - whether blockchain is redefining cybersecurity, what new challenges are, how we build a virtuous circle between blockchain and security
Author : Dr Mark Moir, Oracle Labs
Thomas Zakrzewski, EgisData. What is missing in blockchain to achieve scalabi...IT Arena
Thomas Zakrzewski (Tom Z.) is a Founder and Managing Partner at EgisData; Former Distinguished Engineer and Head of Blockchain at S&P Global Ratings. He developed products protecting private and confidential information using advanced cryptography and blockchain.
He co-authored a patent for a solution addressing issues with data privacy, data localization, and preparedness for post-quantum ciphers using advanced cryptography and blockchain.
Tom has over 25 years of IT experience in Financials, Software Engineering, Telecom, e-Commerce, Distribution & Logistics, and Healthcare. He holds a Bachelor’s Degree in Computer Science and Mathematics from Montclair State University and a Master’s Degree in Predictive Analytics from Northwestern University.
Throughout his career, he held numerous positions ranging from developer to architect, to CIO. Currently, he serves on the Advisory Boards for the New Jersey Institute of Technology (NJIT) and Montclair State University, as well as the Big Data Certification Program at Rutgers University. Tom is also a Visiting Technologist Fellow at the National Security Institute (NSI). Tom is a frequent speaker at conferences discussing blockchain security, crypto assets, and quantitative models.
Speech Overview:
Encryption is the most effective method to protect information. Yet, due to the high cost of encryption products, maintenance, and implementation, encryption is only utilized by the Fortune 1000 companies. EgisData has developed the product Encryption as a Service, encompassing the integration of secured and scalable Key Management and fine-grained control access to resources. In this session, attendees will learn about today’s challenges to manage scalable blockchain deployments, Digital Identities management, and protection of private and confidential information.
Building Distributed Downstream Services Using OAI-PMHLighton Phiri
Invited talk given to 'Advanced Distributed Systems' postgraduate class in the Department of Computer Science [1] at The University of Zambia [2].
[1] http://www.cs.unza.zm
[2] http://www.unza.zm
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...Ioannis Krontiris
Download paper: http://www.ioanniskrontiris.de/publications/DEF-FORUM2012-eIDs.pdf
Electronic Identity (eID) cards are rapidly emerging in Europe and are gaining user acceptance. As an authentication token, an eID card is a gateway to personal information and as such it is subject to privacy risks. Several European countries have taken extra care to protect their citizens against these risks. A notable example is the German eID card, which we take as a case study in this paper. We first discuss important privacy and security threats that remain in the German eID system and elaborate on the advantages of using privacy attribute-based credentials (Privacy-ABCs) to address these threats. Then we study two approaches for integrating Privacy-ABCs with eID systems. In the first approach, we show that by introducing a new entity in the current German eID system, the citizen can get a lot of the Privacy-ABCs advantages, without further modifications. Then we concentrate on putting Privacy-ABCs directly on smart cards, and we present new results on performance, which demonstrate that it is now feasible for smart cards to support the required computations these mechanisms require.
DN18 | Privacy by Design for Blockchain | Silvan Jongerius | TechGDPR Dataconomy Media
About the Author:
Silvan Jongerius is the CEO and Founder of TechGDPR, a boutique consultancy for Data Protection and Privacy in tech-centric environments, such as Blockchain, AI and IoT. He has led Data Protection and security efforts since 2012, after spending 12 years in senior technology leadership, general management and innovation for large technology educators. In recent years, he has been particularly focused on Blockchain projects. He holds certifications from the Columbia Business School in Digital Strategies for Business, from the IAPP as Certified Information Privacy Professional (Europe/GDPR) and is TÜV certified Data Protection Officer (Datenschutzbeauftragter). He is the European Representative for DLT Labs, a Toronto-based blockchain development house. He is also a regular speaker, consultant and educator in GDPR, blockchain, innovation and technology, and is mentor and advisor for a number of innovative tech and blockchain projects.
ISSA Atlanta - Emerging application and data protection for multi cloudUlf Mattsson
Personal data privacy will be the most prominent issue affecting how businesses gather, store, process, and disclose data in public cloud. Businesses have been inundated with information on what recent privacy laws like GDPR and CCPA require, but many are still trying to figure out how to comply with them on a practical level. Many companies are focusing on data privacy from the legal and security side, which are foundational, but are missing the focus on data. The good news is that these data privacy regulations compel businesses to get a handle on personal data — how they get it, where they get it from, which systems process it, where it goes internally and externally, etc. In other words, the new norms of data privacy require proactive data management, which enables organizations to extract real business value from their data, improve the customer experience, streamline internal processes, and better understand their customers.
The new Verizon Data Breach Investigations Report (DBIR) provides perspectives on how Criminals simply shift their focus and adapt their tactics to locate and steal the data they find to be of most value.
This session will discuss Emerging Application and Data Protection for Multi-cloud and review Differential privacy, Tokenization, Homomorphic encryption, and Privacy-preserving computation.
• Learn New Application and Data Protection Strategies
• Learn Advancements in Machine Learning
• Learn how to develop a roadmap for EU GDPR compliance
• Learn Data-centric Security for Digital Business
• Learn Where Data Security and Value of Data Meet in the Cloud
• Learn Data Protection On-premises, and in Public and Private Clouds
• Learn about Emerging Application and Data Protection for Multi-cloud
• Learn about Emerging Data Privacy and Security for Cloud
• Learn about New Enterprise Application and Data Security Challenges
• Learn about Differential privacy, Tokenization, Homomorphic encryption, and Privacy-preserving computation
How MongoDB can accelerate a path to GDPR complianceMongoDB
The timeline for compliance with the European Union’s General Data Protection Regulation (GDPR) is fast approaching. To help you ensure you’re prepared, we’re hosting an online discussion in advance of May 25th (when the regulation goes into effect). We’ll cover:
The specific requirements of GDPR
How these map to required database capabilities
How MongoDB can provide the core technology foundations to help organizations accelerate their path to compliance
Continuous PCI and GDPR Compliance With Data-Centric SecurityTokenEx
Continuous PCI and GDPR Compliance With Data-Centric Security describes how to develop a data security environment that is GDPR and/or PCI DSS compliant by utilizing tokenisation to pseudonymize sensitive data. Contact: Sales@tokenex.com
apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...apidays
apidays LIVE Paris 2021 - APIs and the Future of Software
December 7, 8 & 9, 2021
Data privacy in the era of cloud native app
Guillaume Montard, Founder & CEO at Bearer
In recent years, there has been a buzz around the term "crypto" or "cryptocurrency." But what exactly is crypto and how does it work?
Reading this guide will help you understand the World of Cryptocurrencies, Blockchain, and Decentralized Finance.
The WITDOM first project presentation has been updated to include a summary of the results corresponding to the first 18 months of the project. The presentation includes a high-level overview of the project scenarios, methodologies to elicit requirements and to formalize them into technical requirements, as well as the initial architecture.
GDPR for operations and development teams. GDPR includes the data protection by default and data protection by design principles that can be troublesome if not taken into consideration in the beginning of the secure software development life cycle. What are the technical requirements to be considered as "satte of the art" that are mentioned in the regulation. What are the methods of implementation to the risk-based approach the general data protection regulation has.
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...IBM Security
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing the Impact of a Breach
Encryption has been viewed as the ultimate way to protect sensitive data for compliance. But it has also been considered very complex to implement. Today, encryption is essential to meet compliance objectives, and has become much simpler to implement. The challenge is knowing when and where to use encryption, how it can simplify compliance, what controls need to be in place, and the options for good encryption key management. This session will cover the options for encryption and key management, what each provides, and their requirements. Encryption and key management topics include application-level encryption for data in use, network encryption of data in motion, and storage encryption for data at rest.
Amsterdam Privacy Conference 2018. Workshop entitled: "Controlling your data: the competing visions of blockchains and GDPR" organised by the Blockchain and Society Policy Lab, IViR
Présentation dans le cadre du Master 2 professionnel Droit des nouvelles technologies de l'information et de la communication à l'Université de Versailles Saint-Quentin-en-Yvelines
Lifting the Corporate Veil. Power Point Presentationseri bangash
"Lifting the Corporate Veil" is a legal concept that refers to the judicial act of disregarding the separate legal personality of a corporation or limited liability company (LLC). Normally, a corporation is considered a legal entity separate from its shareholders or members, meaning that the personal assets of shareholders or members are protected from the liabilities of the corporation. However, there are certain situations where courts may decide to "pierce" or "lift" the corporate veil, holding shareholders or members personally liable for the debts or actions of the corporation.
Here are some common scenarios in which courts might lift the corporate veil:
Fraud or Illegality: If shareholders or members use the corporate structure to perpetrate fraud, evade legal obligations, or engage in illegal activities, courts may disregard the corporate entity and hold those individuals personally liable.
Undercapitalization: If a corporation is formed with insufficient capital to conduct its intended business and meet its foreseeable liabilities, and this lack of capitalization results in harm to creditors or other parties, courts may lift the corporate veil to hold shareholders or members liable.
Failure to Observe Corporate Formalities: Corporations and LLCs are required to observe certain formalities, such as holding regular meetings, maintaining separate financial records, and avoiding commingling of personal and corporate assets. If these formalities are not observed and the corporate structure is used as a mere façade, courts may disregard the corporate entity.
Alter Ego: If there is such a unity of interest and ownership between the corporation and its shareholders or members that the separate personalities of the corporation and the individuals no longer exist, courts may treat the corporation as the alter ego of its owners and hold them personally liable.
Group Enterprises: In some cases, where multiple corporations are closely related or form part of a single economic unit, courts may pierce the corporate veil to achieve equity, particularly if one corporation's actions harm creditors or other stakeholders and the corporate structure is being used to shield culpable parties from liability.
Car Accident Injury Do I Have a Case....Knowyourright
Every year, thousands of Minnesotans are injured in car accidents. These injuries can be severe – even life-changing. Under Minnesota law, you can pursue compensation through a personal injury lawsuit.
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersHarpreetSaini48
Discover how Mississauga criminal defence lawyers defend clients facing weapon offence charges with expert legal guidance and courtroom representation.
To know more visit: https://www.saini-law.com/
Matthew Professional CV experienced Government LiaisonMattGardner52
As an experienced Government Liaison, I have demonstrated expertise in Corporate Governance. My skill set includes senior-level management in Contract Management, Legal Support, and Diplomatic Relations. I have also gained proficiency as a Corporate Liaison, utilizing my strong background in accounting, finance, and legal, with a Bachelor's degree (B.A.) from California State University. My Administrative Skills further strengthen my ability to contribute to the growth and success of any organization.
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Massimo Talia
This guide aims to provide information on how lawyers will be able to use the opportunities provided by AI tools and how such tools could help the business processes of small firms. Its objective is to provide lawyers with some background to understand what they can and cannot realistically expect from these products. This guide aims to give a reference point for small law practices in the EU
against which they can evaluate those classes of AI applications that are probably the most relevant for them.
In 2020, the Ministry of Home Affairs established a committee led by Prof. (Dr.) Ranbir Singh, former Vice Chancellor of National Law University (NLU), Delhi. This committee was tasked with reviewing the three codes of criminal law. The primary objective of the committee was to propose comprehensive reforms to the country’s criminal laws in a manner that is both principled and effective.
The committee’s focus was on ensuring the safety and security of individuals, communities, and the nation as a whole. Throughout its deliberations, the committee aimed to uphold constitutional values such as justice, dignity, and the intrinsic value of each individual. Their goal was to recommend amendments to the criminal laws that align with these values and priorities.
Subsequently, in February, the committee successfully submitted its recommendations regarding amendments to the criminal law. These recommendations are intended to serve as a foundation for enhancing the current legal framework, promoting safety and security, and upholding the constitutional principles of justice, dignity, and the inherent worth of every individual.
Data protection by design and by default on the blockchain
1. {
Data protection by
design and by default
on the blockchain
TILTing2019 - 17 May 2019
Alexandra Giannopoulou
Blockchain and Society Policy Lab
Institute for Information Law (IViR)
University of Amsterdam
2. Immutability of the blockchain
Transnational processing
Some personal data processing is
essential for the functioning of
blockchains
Dessine-moi une blockchain…
3. Blocks containing transactions
Metadata
Encrypted personal data
Hashed personal data
What do we store on the
distributed ledger?
4. Article 25 GDPR Data protection by design and by default
1. Taking into account the state of the art, the cost of implementation and the nature,
scope, context and purposes of processing as well as the risks of varying likelihood
and severity for rights and freedoms of natural persons posed by the processing, the
controller shall, both at the time of the determination of the means for processing
and at the time of the processing itself, implement appropriate technical and
organisational measures, such as pseudonymisation, which are designed to
implement data-protection principles, such as data minimisation, in an effective
manner and to integrate the necessary safeguards into the processing in order to
meet the requirements of this Regulation and protect the rights of data subjects.
1. The controller shall implement appropriate technical and organisational measures
for ensuring that, by default, only personal data which are necessary for each
specific purpose of the processing are processed. That obligation applies to the
amount of personal data collected, the extent of their processing, the period of their
storage and their accessibility. In particular, such measures shall ensure that by
default personal data are not made accessible without the individual's intervention
to an indefinite number of natural persons.
5. Not at odds conceptually because …
Blockchains and DPbD
Asymmetric encryption is a basic component and essential feature of
blockchains, contributing to giving the technology the value it has today
7. • Where does this awareness stem from?
However…
Crypto (as in encryption not in currency) communities imp
8. • Where does this awareness stem from?
The inherent goal of the PETs is to avoid re-identification of
parties and transactions
However…
Crypto (as in encryption not in currency) communities imp
9. • Where does this awareness stem from?
The inherent goal of the PETs is to avoid re-identification of
parties and transactions
• What about other features of data protection by design?
However…
Crypto (as in encryption not in currency) communities imp
But…
11. Escape the surveillance machine!
Trust the technology’s features but what about user control?
12. Escape the surveillance machine!
Trust the technology’s features but what about user control?
Respect for data protection
principles
Respect for data
subjects’ rights
13. Privacy-enhancing technologies emerging on
the blockchain
Zero-knowledge proof
Ring signatures
Taproot “scriptless scripts”
Which design features? Which standards?
Governance!
Technology to the rescue!
14. Waiting on blockchain case law to form
guidelines and interpretations?
How about liability?
Is there a conciliation
point in sight?
Decentralization is seen as the architectural guarantee of censorship resistance, and a safeguard against the coercive influence of any centralized, top-down force
Multifaceted concept that goes beyond the aspect of confidentiality but that is often constrained within the limits of the pseudonymization goals.
I think it is safe to say that the current privacy enhancing technologies that are being applied in blockchain technologies are mainly a result of the high privacy-awareness of what used to be the crypto community (crypto as in encryption and not as in cryptocurrencies).
PETs have always quite predominantly been used as a means to make information harder to be linked to a natural person and in that sense, they are becoming popular because blockchains attribute a big role in reinforcing encryption techniques and technologies that focus on unlinkability.
So, conceptually, a lot of similarities with the privacy by design broader theoretical context of protection. However, insufficient for the breadth of the data protection by design principles and what they imply.
I think it is safe to say that the current privacy enhancing technologies that are being applied in blockchain technologies are mainly a result of the high privacy-awareness of what used to be the crypto community (crypto as in encryption and not as in cryptocurrencies).
PETs have always quite predominantly been used as a means to make information harder to be linked to a natural person and in that sense, they are becoming popular because blockchains attribute a big role in reinforcing encryption techniques and technologies that focus on unlinkability.
So, conceptually, a lot of similarities with the privacy by design broader theoretical context of protection. However, insufficient for the breadth of the data protection by design principles and what they imply.
I think it is safe to say that the current privacy enhancing technologies that are being applied in blockchain technologies are mainly a result of the high privacy-awareness of what used to be the crypto community (crypto as in encryption and not as in cryptocurrencies).
PETs have always quite predominantly been used as a means to make information harder to be linked to a natural person and in that sense, they are becoming popular because blockchains attribute a big role in reinforcing encryption techniques and technologies that focus on unlinkability.
So, conceptually, a lot of similarities with the privacy by design broader theoretical context of protection. However, insufficient for the breadth of the data protection by design principles and what they imply.
I think it is safe to say that the current privacy enhancing technologies that are being applied in blockchain technologies are mainly a result of the high privacy-awareness of what used to be the crypto community (crypto as in encryption and not as in cryptocurrencies).
PETs have always quite predominantly been used as a means to make information harder to be linked to a natural person and in that sense, they are becoming popular because blockchains attribute a big role in reinforcing encryption techniques and technologies that focus on unlinkability.
So, conceptually, a lot of similarities with the privacy by design broader theoretical context of protection. However, insufficient for the breadth of the data protection by design principles and what they imply.
So the same principles that applied to the former cryptosavvy communities that were trying to develop technology that escape ubiquitous surveillance state mechanisms and technologies deployed by these institutions.
This is a rather good stepping stone in the current highly ambivalent state of comformity of blockchains with data protection law. As it has been illustrated firstly by Michele Finck and by other academics, data protection rules are hard to reconcile within the realm of decentralized technologies. How can the tools available from the PETs be used to contribute to a better comformity with GDPR predominantly.
In that sense, one could say that the blockchain’s reverts to trust in the technology’s ability to protect from reidentification and no on reinforcing the control aspect of individuals.
So the same principles that applied to the former cryptosavvy communities that were trying to develop technology that escape ubiquitous surveillance state mechanisms and technologies deployed by these institutions.
This is a rather good stepping stone in the current highly ambivalent state of comformity of blockchains with data protection law. As it has been illustrated firstly by Michele Finck and by other academics, data protection rules are hard to reconcile within the realm of decentralized technologies. How can the tools available from the PETs be used to contribute to a better comformity with GDPR predominantly.
In that sense, one could say that the blockchain’s reverts to trust in the technology’s ability to protect from reidentification and no on reinforcing the control aspect of individuals.
So the same principles that applied to the former cryptosavvy communities that were trying to develop technology that escape ubiquitous surveillance state mechanisms and technologies deployed by these institutions.
This is a rather good stepping stone in the current highly ambivalent state of comformity of blockchains with data protection law. As it has been illustrated firstly by Michele Finck and by other academics, data protection rules are hard to reconcile within the realm of decentralized technologies. How can the tools available from the PETs be used to contribute to a better comformity with GDPR predominantly.
In that sense, one could say that the blockchain’s reverts to trust in the technology’s ability to protect from reidentification and no on reinforcing the control aspect of individuals.