SlideShare a Scribd company logo
The governance of data in the
age of the internet of things
Melissa A. Schilling
New York University
Privacy concerns from internet of things
• Devices collect data that could lead to:
• Loss of autonomy, individuality, and personhood
• Discrimination (price, social, employment, etc.)
• Predation (financial, physical, social)
• Consumers should have control over “opt in” and standard rules for times
when rules are not specified (e.g., public surveillance)
Types of Data – Benefits and Risks
Data Type Biological/
Medical
Consumer
Preferences
Financial Geographic Social/Emotional
Examples Lab tests
Prescription data
Fitness trackers
Purchase history
Browsing history
Bank records
Taxes
Credit/Debt
GPS on phone
GPS on car
Tolls
Social media
posts
Alexa, Siri, etc.
Browsing history
Benefits/
Risks
**/***
Health alerts
Science
Employment risk
Insurance risk
**/**
Targeted ads
Innovation
Price discrimination
Inf. for other cats.
*/***
Targeted offers
Discrimination
ID Theft & Fraud
Predation
***/***
Targeted offers
Safety services
Price discrimination
Predation
*/***
Science
Discrimination
Emotional harm
Data Governance
• Data is intellectual property; consumer produces the data and thus should own the data and
control the license rights
• Standard license terms could make the licensing process simpler and safer
• License should specify at a minimum the following:
• Level of user access restriction, including:
• who has access
• rights or prohibitions regarding transfer of data to others
• Identification level of the data, e.g.,
• Anonymous
• Anonymous with identifier code (to match data sets)
• Identified
• Time window for data holding and use
• Instant flush
• Medium term window (0-3 years)
• Long term window (3-10 years)
• Permanent
Level of User Access Restrictions
• Should have standardized access-level restrictions,
e.g.,
• Public
• Passive licensing (any users with limits of use)
• Restricted licensing (specified users with limits of use)
• Restricted licensing to specified bonded and licensed
professionals
• No access
Identification Level Protocols
• Should have standard identification protocols, e.g.,
• Authenticated ID
• Anonymized with code for data concordance
• Guaranteed anonymous (no ID)
Data Holding and Use Periods
• All license should have specified data holding/use
period restrictions, similar to standard license
agreements, e.g.,
• Permanent
• Long window (3 - 10 years)
• Medium window (1 - 3 years)
• Short window (<1 year)
• Instant flush
Some Data Examples and Suggested
License Standards
Biological/
Medical
Consumer
Preferences
Financial Geographic Social/
Emotional
Highest
restriction
(bonded
licensed
professionals)
with user
consent; 5 year
window
Consumer can
license;
anonymized
with code, 1-3
year time
window
Highest
restriction
(bonded
licensed
professionals)
with user
consent; 5
year window
Consumer can
license; ID or
anonymous
with code, <1
year window
Highest
restriction
(default: no
access)
Instant flush
Thanks!
• Questions & comments: mschilli@stern.nyu.edu

More Related Content

Similar to Internet of things and data governance

Legal challenges of big data
Legal challenges of big dataLegal challenges of big data
Legal challenges of big data
Roger Royse
 
week 7.pptx
week 7.pptxweek 7.pptx
week 7.pptx
StephenGwadi
 
Sharing Confidential Data in ICPSR
Sharing Confidential Data in ICPSRSharing Confidential Data in ICPSR
Sharing Confidential Data in ICPSR
ARDC
 
EU Medical Device Clinical Research under the General Data Protection Regulation
EU Medical Device Clinical Research under the General Data Protection RegulationEU Medical Device Clinical Research under the General Data Protection Regulation
EU Medical Device Clinical Research under the General Data Protection Regulation
Erik Vollebregt
 
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
emermell
 
Privacy In The Digital Age
Privacy In The Digital AgePrivacy In The Digital Age
Privacy In The Digital Age
Jane Prusakova
 
Confidentiality Privacy and Security.ppt
Confidentiality Privacy and Security.pptConfidentiality Privacy and Security.ppt
Confidentiality Privacy and Security.ppt
JohnLagman3
 
Confidential data management_key_concepts
Confidential data management_key_conceptsConfidential data management_key_concepts
Confidential data management_key_concepts
Micah Altman
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidancePrivacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
Amy Purcell
 
Legal challenges for big data companies
Legal challenges for big data companiesLegal challenges for big data companies
Legal challenges for big data companies
Roger Royse
 
Data Protection: We\'re In This Together
Data Protection: We\'re In This TogetherData Protection: We\'re In This Together
Data Protection: We\'re In This Together
myeaton
 
Surveillance and security.pptx
Surveillance and security.pptxSurveillance and security.pptx
Surveillance and security.pptx
john6938
 
Gdpr for business full
Gdpr for business fullGdpr for business full
Gdpr for business full
Fionnuala Hendrick
 
BMS _ 1. Biometrics and privacy.ppt
BMS _ 1. Biometrics and privacy.pptBMS _ 1. Biometrics and privacy.ppt
BMS _ 1. Biometrics and privacy.ppt
ssuser7ec6af
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) Data
DATAVERSITY
 
Respect Thy Data: The Gospel
Respect Thy Data: The GospelRespect Thy Data: The Gospel
Respect Thy Data: The Gospel
Jill Gilbert
 
Ethical & Legal Issues for Health IT in Thailand's Context
Ethical & Legal Issues for Health IT in Thailand's ContextEthical & Legal Issues for Health IT in Thailand's Context
Ethical & Legal Issues for Health IT in Thailand's Context
Nawanan Theera-Ampornpunt
 
PERSONALISED PRICING – DE STREEL – November 2018 OECD discussion
PERSONALISED PRICING – DE STREEL – November 2018 OECD discussionPERSONALISED PRICING – DE STREEL – November 2018 OECD discussion
PERSONALISED PRICING – DE STREEL – November 2018 OECD discussion
OECD Directorate for Financial and Enterprise Affairs
 
Privacy-Enhanced Personalization
Privacy-Enhanced PersonalizationPrivacy-Enhanced Personalization
Privacy-Enhanced Personalization
IHM'10
 
Universal Unique Patient Information Identifier UUPII
Universal Unique Patient Information Identifier UUPIIUniversal Unique Patient Information Identifier UUPII
Universal Unique Patient Information Identifier UUPII
Frank Avignone
 

Similar to Internet of things and data governance (20)

Legal challenges of big data
Legal challenges of big dataLegal challenges of big data
Legal challenges of big data
 
week 7.pptx
week 7.pptxweek 7.pptx
week 7.pptx
 
Sharing Confidential Data in ICPSR
Sharing Confidential Data in ICPSRSharing Confidential Data in ICPSR
Sharing Confidential Data in ICPSR
 
EU Medical Device Clinical Research under the General Data Protection Regulation
EU Medical Device Clinical Research under the General Data Protection RegulationEU Medical Device Clinical Research under the General Data Protection Regulation
EU Medical Device Clinical Research under the General Data Protection Regulation
 
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
 
Privacy In The Digital Age
Privacy In The Digital AgePrivacy In The Digital Age
Privacy In The Digital Age
 
Confidentiality Privacy and Security.ppt
Confidentiality Privacy and Security.pptConfidentiality Privacy and Security.ppt
Confidentiality Privacy and Security.ppt
 
Confidential data management_key_concepts
Confidential data management_key_conceptsConfidential data management_key_concepts
Confidential data management_key_concepts
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidancePrivacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
 
Legal challenges for big data companies
Legal challenges for big data companiesLegal challenges for big data companies
Legal challenges for big data companies
 
Data Protection: We\'re In This Together
Data Protection: We\'re In This TogetherData Protection: We\'re In This Together
Data Protection: We\'re In This Together
 
Surveillance and security.pptx
Surveillance and security.pptxSurveillance and security.pptx
Surveillance and security.pptx
 
Gdpr for business full
Gdpr for business fullGdpr for business full
Gdpr for business full
 
BMS _ 1. Biometrics and privacy.ppt
BMS _ 1. Biometrics and privacy.pptBMS _ 1. Biometrics and privacy.ppt
BMS _ 1. Biometrics and privacy.ppt
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) Data
 
Respect Thy Data: The Gospel
Respect Thy Data: The GospelRespect Thy Data: The Gospel
Respect Thy Data: The Gospel
 
Ethical & Legal Issues for Health IT in Thailand's Context
Ethical & Legal Issues for Health IT in Thailand's ContextEthical & Legal Issues for Health IT in Thailand's Context
Ethical & Legal Issues for Health IT in Thailand's Context
 
PERSONALISED PRICING – DE STREEL – November 2018 OECD discussion
PERSONALISED PRICING – DE STREEL – November 2018 OECD discussionPERSONALISED PRICING – DE STREEL – November 2018 OECD discussion
PERSONALISED PRICING – DE STREEL – November 2018 OECD discussion
 
Privacy-Enhanced Personalization
Privacy-Enhanced PersonalizationPrivacy-Enhanced Personalization
Privacy-Enhanced Personalization
 
Universal Unique Patient Information Identifier UUPII
Universal Unique Patient Information Identifier UUPIIUniversal Unique Patient Information Identifier UUPII
Universal Unique Patient Information Identifier UUPII
 

Recently uploaded

"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 

Recently uploaded (20)

"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 

Internet of things and data governance

  • 1. The governance of data in the age of the internet of things Melissa A. Schilling New York University
  • 2. Privacy concerns from internet of things • Devices collect data that could lead to: • Loss of autonomy, individuality, and personhood • Discrimination (price, social, employment, etc.) • Predation (financial, physical, social) • Consumers should have control over “opt in” and standard rules for times when rules are not specified (e.g., public surveillance)
  • 3. Types of Data – Benefits and Risks Data Type Biological/ Medical Consumer Preferences Financial Geographic Social/Emotional Examples Lab tests Prescription data Fitness trackers Purchase history Browsing history Bank records Taxes Credit/Debt GPS on phone GPS on car Tolls Social media posts Alexa, Siri, etc. Browsing history Benefits/ Risks **/*** Health alerts Science Employment risk Insurance risk **/** Targeted ads Innovation Price discrimination Inf. for other cats. */*** Targeted offers Discrimination ID Theft & Fraud Predation ***/*** Targeted offers Safety services Price discrimination Predation */*** Science Discrimination Emotional harm
  • 4. Data Governance • Data is intellectual property; consumer produces the data and thus should own the data and control the license rights • Standard license terms could make the licensing process simpler and safer • License should specify at a minimum the following: • Level of user access restriction, including: • who has access • rights or prohibitions regarding transfer of data to others • Identification level of the data, e.g., • Anonymous • Anonymous with identifier code (to match data sets) • Identified • Time window for data holding and use • Instant flush • Medium term window (0-3 years) • Long term window (3-10 years) • Permanent
  • 5. Level of User Access Restrictions • Should have standardized access-level restrictions, e.g., • Public • Passive licensing (any users with limits of use) • Restricted licensing (specified users with limits of use) • Restricted licensing to specified bonded and licensed professionals • No access
  • 6. Identification Level Protocols • Should have standard identification protocols, e.g., • Authenticated ID • Anonymized with code for data concordance • Guaranteed anonymous (no ID)
  • 7. Data Holding and Use Periods • All license should have specified data holding/use period restrictions, similar to standard license agreements, e.g., • Permanent • Long window (3 - 10 years) • Medium window (1 - 3 years) • Short window (<1 year) • Instant flush
  • 8. Some Data Examples and Suggested License Standards Biological/ Medical Consumer Preferences Financial Geographic Social/ Emotional Highest restriction (bonded licensed professionals) with user consent; 5 year window Consumer can license; anonymized with code, 1-3 year time window Highest restriction (bonded licensed professionals) with user consent; 5 year window Consumer can license; ID or anonymous with code, <1 year window Highest restriction (default: no access) Instant flush
  • 9. Thanks! • Questions & comments: mschilli@stern.nyu.edu