SlideShare a Scribd company logo
1 of 46
Click to edit
Master text
styles
CLICK TO EDIT MASTER
TITLE STYLE
iTRACK PRIVACY AND ETHICAL
IMPACT ASSESSMENT:
WORKSHOP
10/11/20161
Click to edit
Master text
styles
CLICK TO EDIT MASTER
TITLE STYLE
2
Click to edit Master title style
iTRACK Project
Agenda for the day
3
Time Activity
9.30 – 9.45 Registration and Coffee
9.45 -11.15 Introduction & Information Flows
11.15 -11.30 Coffee
11.30 – 12.30 What are Privacy and Ethical Risks
12.30 – 13.30 Lunch
13.30 – 14.45 Identifying Risks: Group Work
14.45 – 15.00 Coffee
15.00 – 17.00 Risk Likelihood, Solutions, Conclusion
Click to edit Master title style
iTRACK Project
WHAT are we doing today?
Ethics and Privacy Impact Assessment Workshop
4
Click to edit Master title styleWHERE ARE WE NOW?
What? We are developing a human-centred technology that takes into account actual
real-world practices of humanitarian aid workers, and provide policies for better
protection and a more effective and efficient response.
How? By building an integrated intelligent real-time tracking and threat identification
system.
Is there a potential problem? Could potentially be intrusive and people could be
suspicious of it.
What could be? A system that improves protection and improves efficiency.
Click to edit Master title styleWHY?
iTRACK’s nature
H2020
User expectations
Marketable
Click to edit Master title styleWHO for?
End user
Technology
developers
Research
Click to edit Master title styleWHAT is the output of today?
Deliverable
3.1
Future
Technology
Click to edit Master title styleMETHODOLOGY
1
Preparation
2
Interviews and mapping of information flows
3
Stakeholder workshop
4
Mapping out the risks and solutions
5
Review of ethical and privacy assessments by an
independent third-party
6
Publication
Click to edit Master title styleINTERVIEWS
Click to edit Master title styleEXAMPLE QUESTIONS…
Please describe the system/technology that you are developing.
Are there alternatives to the technology that are less
intrusive?
Could the technology affect vulnerable groups?
What personal information is collected?
Where will the information collected be stored?
Can users decline to use the technology?
Click to edit Master title style
iTRACK Project
TECHNOLOGY AND INFORMATION FLOWS
12
Understanding the
information flows involved
in a project is essential to a
proper assessment
System of systems
Click to edit Master title style
iTRACK Project
Information Flows – SOCIAL SENSE (K-NOW)
13
REMOVED: CONFIDENTIAL
Click to edit Master title style
iTRACK Project
Information Flows – STAFF SENSE (K-NOW)
14
REMOVED: CONFIDENTIAL
Click to edit Master title style
iTRACK Project
Information Flows – ON BOARD LOCALISATION AND
TRACKING IN VEHICLES (TREELOGIC)
15
REMOVED: CONFIDENTIAL
Click to edit Master title styleInformation Flows – RFID & GPS SENSORS (TREELOGIC)
REMOVED: CONFIDENTIAL
Click to edit Master title styleInformation Flows – 360-DEGREE PANORAMA CAMERA
(TEKNOVA)
REMOVED: CONFIDENTIAL
Click to edit Master title styleInformation Flows – SECURE COMMUNICATION
(Teleplan)
REMOVED: CONFIDENTIAL
Click to edit Master title styleInformation Flows – REAL TIME THREAT
DETECTION AND SUPPORT (UiA)
REMOVED: CONFIDENTIAL
Click to edit Master title styleInformation Flows – BACKEND SERVER (TREELOGIC)
REMOVED: CONFIDENTIAL
Click to edit Master title styleInformation Flows – iTRACK INTEGRATED SYSTEM
(INTRASOFT)
REMOVED: CONFIDENTIAL
Click to edit Master title styleCOFFEE BREAK
Click to edit Master title styleRISKS
We need to identify privacy risks
We need to identify ethical risks
Click to edit Master title stylePrinciples that will guide this analysis: ETHICS
Ethics, based on ECHR, UNDHR and
other pieces of legislation
Look out for: harm, invasion of
boundaries, invalidity, lack of trust,
undermining of human dignity,
breaching autonomy…
Click to edit Master title stylePrinciples that will guide this analysis: PRIVACY
There is no overarching
definition of the term however
in iTRACK we take a broad view
of privacy that goes beyond
traditional notions of personal
information
Click to edit Master title stylePrinciples that will guide this analysis: PRIVACY
Privacy of the person
Privacy of behaviour and action
Privacy of communication
Privacy of data and image
Privacy of thoughts and feelings
Privacy of location and space
Privacy of association
Click to edit Master title styleEXAMPLE OF A RISK
There is a risk that
iTRACK Reputational
damage due to loss of
personal and
potentially sensitive
data
Because the
server is
insecure
A hacker breaks
into the iTRACK
system
Click to edit Master title styleEXAMPLE OF A RISK
There is a risk that a
humanitarian worker
may be discriminated
on the grounds of his
religion
A humanitarian
worker forgets
to turn off his
tracking device
and he is traced
to a place of
worship
A nosy
manager looks
where workers
go after work
Click to edit Master title styleEXAMPLE OF A RISK
There is a loss of
personal data and
thus a regulatory
fine & loss of
reputation
They leave
phones with
iTRACK apps lying
around with no
passowrd
Employees do not
know about
privacy and data
protection
Click to edit Master title styleLUNCH BREAK
Click to edit Master title style
• Group 1: Social Sense (Social media collection) & Staff Sense
(Tracking & communication & Health sensors)
• Group 2: On board localisation and tracking in vehicles
• Group 3: Tracking of assets: RFID
• Group 4: Real time threat detection and support
• Group 5: iTRACK Backend Server
• Group 6: 360-degree panorama camera (position and risk
detection)
GROUP EXERCISE
Click to edit Master title styleGroup - Names
Group 1
Alexander
Verbraeck
Hayley Watson
Paul
Crompton
Katrina
Petersen
Vita
Lanfranchi
Group 2
Yan Wang
Moran Naor
Gerardo
Glorios
Anne-Laure
DUVAL
Group 3
Julia
Muraszkiewicz
Christian
Baumhauer
Yngvar
Sørensen
Tunca Tabaklar
Mehdi Ben
Lazreg
Group 4
Jacinto
Esteban
Gyöngyi
Kovacs
Tina Comes
Anders Rye
Group 5
Heide Lukosch
Christos
Pateritsas
Lars Hamre
Hlekiwe
Kachali
Group 6
Philipp
Schwarz
Sofia
Tsekeridou
Lisa Maria
Svendsen
Morten
Goodwin
Click to edit Master title styleDISCUSSION - WHAT RISKS DID YOU IDENTIFY?
Group 1
Group 2
Group 3
Group 4
Group 5
Group 6
Click to edit Master title styleCOFFEE BREAK
Click to edit Master title style
• The aim of this tasks is to assess the value of the risk and
whether it is acceptable. The decisions are based on the
framework of:
– severity of the feared event: what would be the
consequence of the feared event happening?
– likelihood of the feared event?
RISK MAP
Click to edit Master title styleRISK MAP
Severity Rating Likelyhood
Minor severity: Risk poses little
potential for loss.
1 Minor Likelihood: Given the current
state of technology the risk is very
unlikely to occur
Moderate severity: Risk requires
significant resources to take place,
with significant potential for loss. Or,
risk requires little resources to take
place, with moderate potential for
loss.
2 Moderate Likelihood: Given the
current state of technology the risk
may occur
High severity: Risk requires few
resources take palce, with significant
potential for loss.
3 High Likelihood: Given the current
state of technology the risk is very
likely to occur
Click to edit Master title styleEXAMPLE OF A RISK
There is a risk that
iTRACK Reputational
damage due to loss of
personal and
potentially sensitive
data
Because the
server is
insecure
A hacker breaks
into the iTRACK
system
Click to edit Master title styleEXAMPLE OF A RISK: LOSS OF PERSONAL DATA
Security
safeguards in
place so likelihood
is low
The severity is
high (personal
data loss = data
breach = fines &
reputation loss =
significant impact
for individual and
the organisation)
Need to think
about solutions
Click to edit Master title styleGROUP EXERCISE
Click to edit Master title styleDISCUSSION
Please present 2x risks and their severity and likelihood.
Group 1
Group 2
Group 3
Group 4
Group 5
Group 6
Click to edit Master title style
• Risks with a high severity and likelihood absolutely must be avoided or
reduced by implementing measures that reduce both their severity and
their likelihood.
• Risks with a high severity but a low likelihood must be avoided or reduced
• Risks with a low severity but a high likelihood must be reduced by
implementing security measures that reduce their likelihood.
• Risks with a low severity and likelihood may be accepted, especially since
the treatment of other risks should also lead to their treatment.
SOLUTIONS
Click to edit Master title style
Risk Solution(s) Result (avoided, reduced,
minimised or transferred)
Risk: Reputational damage due to
loss of personal and potentially
sensitive data
Add extra protection
layer to server e.g., SSL
Minimised
Risk: Workers tracked and hurt
because tracking app was left
unattended
Ensure devices are
password protected
Minimised
SOLUTIONS
Click to edit Master title styleGROUP EXERCISE
Risk Solution(s) Result (avoided, reduced,
minimised or transferred)
Click to edit Master title styleDISCUSSION
What Solutions did you identify?
Group 1
Group 2
Group 3
Group 4
Group 5
Group 6
Click to edit Master title styleNEXT STEPS
EPIA
TRI’s next
steps
For tech
partners...
For end
user…
Other
tasks...
Click to edit
Master text
styles
CLICK TO EDIT MASTER
TITLE STYLE
46
THANK YOU
JULIA MURASZKIEWICZ & INGA KROENER
JULIA.MURASZKIEWICZ@TRILATERALRESEARCH.COM

More Related Content

Viewers also liked

Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...IBM Security
 
StuartMillar_13616005_PIA
StuartMillar_13616005_PIAStuartMillar_13616005_PIA
StuartMillar_13616005_PIAStuart Millar
 
Privacy in Computing - Impact on emerging technologies
Privacy in Computing - Impact on emerging technologiesPrivacy in Computing - Impact on emerging technologies
Privacy in Computing - Impact on emerging technologiesMensah Sitti
 
Brussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACKBrussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACKTrilateral Research
 
Impact of CCTV on 'Right to Privacy'
Impact of CCTV on 'Right to Privacy'Impact of CCTV on 'Right to Privacy'
Impact of CCTV on 'Right to Privacy'SSoujanya
 
Impact of ict on privacy and personal data
Impact of ict on privacy and personal dataImpact of ict on privacy and personal data
Impact of ict on privacy and personal datamohd kamal
 
Robert beggs incident response teams - atlseccon2011
Robert beggs   incident response teams - atlseccon2011Robert beggs   incident response teams - atlseccon2011
Robert beggs incident response teams - atlseccon2011Atlantic Security Conference
 
Integrated Privacy Impact Assessment
Integrated Privacy Impact AssessmentIntegrated Privacy Impact Assessment
Integrated Privacy Impact AssessmentJeremy Hilton
 
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...Lilian Edwards
 
The Impact of Cloud: Cloud Computing Security and Privacy
The Impact of Cloud: Cloud Computing Security and PrivacyThe Impact of Cloud: Cloud Computing Security and Privacy
The Impact of Cloud: Cloud Computing Security and PrivacyCharles Mok
 
Patient data privacy and E-Health Policy – Sri Lanka
Patient data privacy and E-Health Policy – Sri LankaPatient data privacy and E-Health Policy – Sri Lanka
Patient data privacy and E-Health Policy – Sri LankaDilshan Ranasinghe
 
Individual Health Identifier (Ireland) - Privacy Impact Assessment
Individual Health Identifier (Ireland) - Privacy Impact AssessmentIndividual Health Identifier (Ireland) - Privacy Impact Assessment
Individual Health Identifier (Ireland) - Privacy Impact Assessmentipposi
 
Privacy, Drones, and IoT
Privacy, Drones, and IoTPrivacy, Drones, and IoT
Privacy, Drones, and IoTLAURA VIVET
 

Viewers also liked (18)

Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
 
Dean carey - data loss-prevention - atlseccon2011
Dean carey - data loss-prevention - atlseccon2011Dean carey - data loss-prevention - atlseccon2011
Dean carey - data loss-prevention - atlseccon2011
 
StuartMillar_13616005_PIA
StuartMillar_13616005_PIAStuartMillar_13616005_PIA
StuartMillar_13616005_PIA
 
Privacy in Computing - Impact on emerging technologies
Privacy in Computing - Impact on emerging technologiesPrivacy in Computing - Impact on emerging technologies
Privacy in Computing - Impact on emerging technologies
 
Brussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACKBrussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACK
 
Impact of CCTV on 'Right to Privacy'
Impact of CCTV on 'Right to Privacy'Impact of CCTV on 'Right to Privacy'
Impact of CCTV on 'Right to Privacy'
 
Impact of ict on privacy and personal data
Impact of ict on privacy and personal dataImpact of ict on privacy and personal data
Impact of ict on privacy and personal data
 
Robert beggs incident response teams - atlseccon2011
Robert beggs   incident response teams - atlseccon2011Robert beggs   incident response teams - atlseccon2011
Robert beggs incident response teams - atlseccon2011
 
Integrated Privacy Impact Assessment
Integrated Privacy Impact AssessmentIntegrated Privacy Impact Assessment
Integrated Privacy Impact Assessment
 
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
 
WRC Newsletter Feb 2013
WRC Newsletter Feb 2013WRC Newsletter Feb 2013
WRC Newsletter Feb 2013
 
The Impact of Cloud: Cloud Computing Security and Privacy
The Impact of Cloud: Cloud Computing Security and PrivacyThe Impact of Cloud: Cloud Computing Security and Privacy
The Impact of Cloud: Cloud Computing Security and Privacy
 
Patient data privacy and E-Health Policy – Sri Lanka
Patient data privacy and E-Health Policy – Sri LankaPatient data privacy and E-Health Policy – Sri Lanka
Patient data privacy and E-Health Policy – Sri Lanka
 
opncc_certificate OUM
opncc_certificate OUMopncc_certificate OUM
opncc_certificate OUM
 
Individual Health Identifier (Ireland) - Privacy Impact Assessment
Individual Health Identifier (Ireland) - Privacy Impact AssessmentIndividual Health Identifier (Ireland) - Privacy Impact Assessment
Individual Health Identifier (Ireland) - Privacy Impact Assessment
 
opncc_certificate SALES
opncc_certificate SALESopncc_certificate SALES
opncc_certificate SALES
 
opncc_certificate EBS
opncc_certificate EBSopncc_certificate EBS
opncc_certificate EBS
 
Privacy, Drones, and IoT
Privacy, Drones, and IoTPrivacy, Drones, and IoT
Privacy, Drones, and IoT
 

Similar to iTrack WP3 workshop

The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezThe Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezEC-Council
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AWard Pyles
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionMarketingArrowECS_CZ
 
infosecurity-professional-magazine-mar-april-2015
infosecurity-professional-magazine-mar-april-2015infosecurity-professional-magazine-mar-april-2015
infosecurity-professional-magazine-mar-april-2015Niamh Vianney Muldoon
 
[Agile Portugal 2014] - Agile Decision Support System for Upper Management - ...
[Agile Portugal 2014] - Agile Decision Support System for Upper Management - ...[Agile Portugal 2014] - Agile Decision Support System for Upper Management - ...
[Agile Portugal 2014] - Agile Decision Support System for Upper Management - ...Pedro Henriques
 
CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docx
CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docxCMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docx
CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docxmary772
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...robbiesamuel
 
ISO 27001 Implementation using Force Field Analysis
ISO 27001 Implementation using Force Field AnalysisISO 27001 Implementation using Force Field Analysis
ISO 27001 Implementation using Force Field AnalysisPECB
 
Cause & Effect Diagram Use for H&S System Hazard Identification
Cause & Effect Diagram Use for H&S System Hazard IdentificationCause & Effect Diagram Use for H&S System Hazard Identification
Cause & Effect Diagram Use for H&S System Hazard IdentificationPECB
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksMatthew Rosenquist
 
Powering Prevention: Lessons Learned from Building a Global Security Response...
Powering Prevention: Lessons Learned from Building a Global Security Response...Powering Prevention: Lessons Learned from Building a Global Security Response...
Powering Prevention: Lessons Learned from Building a Global Security Response...Christopher Clark
 
You Can't Stop The Breach Without Prevention And Detection
You Can't Stop The Breach Without Prevention And DetectionYou Can't Stop The Breach Without Prevention And Detection
You Can't Stop The Breach Without Prevention And DetectionCrowdStrike
 
Change Management Obstacles And Problems PowerPoint Presentation Slides
Change Management Obstacles And Problems PowerPoint Presentation Slides Change Management Obstacles And Problems PowerPoint Presentation Slides
Change Management Obstacles And Problems PowerPoint Presentation Slides SlideTeam
 
CounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat ManagementCounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat ManagementMighty Guides, Inc.
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyMighty Guides, Inc.
 
Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?
Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?
Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?Capgemini
 

Similar to iTrack WP3 workshop (20)

The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezThe Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
 
Risky Business
Risky BusinessRisky Business
Risky Business
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 A
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data Protection
 
infosecurity-professional-magazine-mar-april-2015
infosecurity-professional-magazine-mar-april-2015infosecurity-professional-magazine-mar-april-2015
infosecurity-professional-magazine-mar-april-2015
 
[Agile Portugal 2014] - Agile Decision Support System for Upper Management - ...
[Agile Portugal 2014] - Agile Decision Support System for Upper Management - ...[Agile Portugal 2014] - Agile Decision Support System for Upper Management - ...
[Agile Portugal 2014] - Agile Decision Support System for Upper Management - ...
 
CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docx
CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docxCMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docx
CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docx
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
 
ISO 27001 Implementation using Force Field Analysis
ISO 27001 Implementation using Force Field AnalysisISO 27001 Implementation using Force Field Analysis
ISO 27001 Implementation using Force Field Analysis
 
Cause & Effect Diagram Use for H&S System Hazard Identification
Cause & Effect Diagram Use for H&S System Hazard IdentificationCause & Effect Diagram Use for H&S System Hazard Identification
Cause & Effect Diagram Use for H&S System Hazard Identification
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity Risks
 
Powering Prevention: Lessons Learned from Building a Global Security Response...
Powering Prevention: Lessons Learned from Building a Global Security Response...Powering Prevention: Lessons Learned from Building a Global Security Response...
Powering Prevention: Lessons Learned from Building a Global Security Response...
 
You Can't Stop The Breach Without Prevention And Detection
You Can't Stop The Breach Without Prevention And DetectionYou Can't Stop The Breach Without Prevention And Detection
You Can't Stop The Breach Without Prevention And Detection
 
Change Management Obstacles And Problems PowerPoint Presentation Slides
Change Management Obstacles And Problems PowerPoint Presentation Slides Change Management Obstacles And Problems PowerPoint Presentation Slides
Change Management Obstacles And Problems PowerPoint Presentation Slides
 
CounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat ManagementCounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat Management
 
MStoddart_ResumeDec2014
MStoddart_ResumeDec2014MStoddart_ResumeDec2014
MStoddart_ResumeDec2014
 
Notes prep guide
Notes prep guideNotes prep guide
Notes prep guide
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
 
Cyberedge 2015 Defense Report
Cyberedge 2015 Defense Report Cyberedge 2015 Defense Report
Cyberedge 2015 Defense Report
 
Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?
Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?
Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?
 

More from Trilateral Research

Designing Security Across Boundaries: mapping disperse data to collaborative...
Designing Security Across Boundaries:  mapping disperse data to collaborative...Designing Security Across Boundaries:  mapping disperse data to collaborative...
Designing Security Across Boundaries: mapping disperse data to collaborative...Trilateral Research
 
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...Trilateral Research
 
Risky Borders: Designing togetherness using information technology for intero...
Risky Borders: Designing togetherness using information technology for intero...Risky Borders: Designing togetherness using information technology for intero...
Risky Borders: Designing togetherness using information technology for intero...Trilateral Research
 
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...Trilateral Research
 
Ethics and technology in humanitarian setting
Ethics and technology in humanitarian settingEthics and technology in humanitarian setting
Ethics and technology in humanitarian settingTrilateral Research
 
Privacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES ProjectPrivacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES ProjectTrilateral Research
 
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...Trilateral Research
 
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...Trilateral Research
 
CRISP project: overview of findings and lessons learned.
CRISP project: overview of findings and lessons learned.CRISP project: overview of findings and lessons learned.
CRISP project: overview of findings and lessons learned.Trilateral Research
 
Legal and ethical issues in social capital analysis
Legal and ethical issues in social capital analysis Legal and ethical issues in social capital analysis
Legal and ethical issues in social capital analysis Trilateral Research
 
Examining End-User Standardisation Needs for Disaster Resilience
Examining End-User Standardisation Needs for Disaster ResilienceExamining End-User Standardisation Needs for Disaster Resilience
Examining End-User Standardisation Needs for Disaster ResilienceTrilateral Research
 
A stakeholder based approach to standardisation for disaster resilience
A stakeholder based approach to standardisation for disaster resilienceA stakeholder based approach to standardisation for disaster resilience
A stakeholder based approach to standardisation for disaster resilienceTrilateral Research
 
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforce
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforceEvolving Technology - Delivering Neighbourhood Policing with a smaller workforce
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforceTrilateral Research
 
Social Media and ICT in Neighbourhood Policing - Opportunities and Challanges
Social Media and ICT in Neighbourhood Policing - Opportunities and ChallangesSocial Media and ICT in Neighbourhood Policing - Opportunities and Challanges
Social Media and ICT in Neighbourhood Policing - Opportunities and ChallangesTrilateral Research
 
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction Trilateral Research
 
ENERGIC-OD @ GEO Business 2017 presentation
ENERGIC-OD @ GEO Business 2017 presentationENERGIC-OD @ GEO Business 2017 presentation
ENERGIC-OD @ GEO Business 2017 presentationTrilateral Research
 
Esports in the UK - privacy risks
Esports in the UK - privacy risksEsports in the UK - privacy risks
Esports in the UK - privacy risksTrilateral Research
 
Enhancing ethics assessment in R&I at the national level
Enhancing ethics assessment in R&I at the national levelEnhancing ethics assessment in R&I at the national level
Enhancing ethics assessment in R&I at the national levelTrilateral Research
 

More from Trilateral Research (20)

Star II sme hotline 21.01.20
Star II sme hotline 21.01.20Star II sme hotline 21.01.20
Star II sme hotline 21.01.20
 
Designing Security Across Boundaries: mapping disperse data to collaborative...
Designing Security Across Boundaries:  mapping disperse data to collaborative...Designing Security Across Boundaries:  mapping disperse data to collaborative...
Designing Security Across Boundaries: mapping disperse data to collaborative...
 
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
 
Risky Borders: Designing togetherness using information technology for intero...
Risky Borders: Designing togetherness using information technology for intero...Risky Borders: Designing togetherness using information technology for intero...
Risky Borders: Designing togetherness using information technology for intero...
 
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
 
Ethics and technology in humanitarian setting
Ethics and technology in humanitarian settingEthics and technology in humanitarian setting
Ethics and technology in humanitarian setting
 
Privacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES ProjectPrivacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES Project
 
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
 
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
 
Overview of CLARITY project
Overview of CLARITY projectOverview of CLARITY project
Overview of CLARITY project
 
CRISP project: overview of findings and lessons learned.
CRISP project: overview of findings and lessons learned.CRISP project: overview of findings and lessons learned.
CRISP project: overview of findings and lessons learned.
 
Legal and ethical issues in social capital analysis
Legal and ethical issues in social capital analysis Legal and ethical issues in social capital analysis
Legal and ethical issues in social capital analysis
 
Examining End-User Standardisation Needs for Disaster Resilience
Examining End-User Standardisation Needs for Disaster ResilienceExamining End-User Standardisation Needs for Disaster Resilience
Examining End-User Standardisation Needs for Disaster Resilience
 
A stakeholder based approach to standardisation for disaster resilience
A stakeholder based approach to standardisation for disaster resilienceA stakeholder based approach to standardisation for disaster resilience
A stakeholder based approach to standardisation for disaster resilience
 
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforce
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforceEvolving Technology - Delivering Neighbourhood Policing with a smaller workforce
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforce
 
Social Media and ICT in Neighbourhood Policing - Opportunities and Challanges
Social Media and ICT in Neighbourhood Policing - Opportunities and ChallangesSocial Media and ICT in Neighbourhood Policing - Opportunities and Challanges
Social Media and ICT in Neighbourhood Policing - Opportunities and Challanges
 
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
 
ENERGIC-OD @ GEO Business 2017 presentation
ENERGIC-OD @ GEO Business 2017 presentationENERGIC-OD @ GEO Business 2017 presentation
ENERGIC-OD @ GEO Business 2017 presentation
 
Esports in the UK - privacy risks
Esports in the UK - privacy risksEsports in the UK - privacy risks
Esports in the UK - privacy risks
 
Enhancing ethics assessment in R&I at the national level
Enhancing ethics assessment in R&I at the national levelEnhancing ethics assessment in R&I at the national level
Enhancing ethics assessment in R&I at the national level
 

Recently uploaded

2024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 292024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 29JSchaus & Associates
 
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...CedZabala
 
Climate change and safety and health at work
Climate change and safety and health at workClimate change and safety and health at work
Climate change and safety and health at workChristina Parmionova
 
Goa Escorts WhatsApp Number South Goa Call Girl … 8588052666…
Goa Escorts WhatsApp Number South Goa Call Girl … 8588052666…Goa Escorts WhatsApp Number South Goa Call Girl … 8588052666…
Goa Escorts WhatsApp Number South Goa Call Girl … 8588052666…nishakur201
 
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...Suhani Kapoor
 
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...ranjana rawat
 
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...ranjana rawat
 
Fair Trash Reduction - West Hartford, CT
Fair Trash Reduction - West Hartford, CTFair Trash Reduction - West Hartford, CT
Fair Trash Reduction - West Hartford, CTaccounts329278
 
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up NumberMs Riya
 
How the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists LawmakersHow the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists LawmakersCongressional Budget Office
 
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation -  Humble BeginningsZechariah Boodey Farmstead Collaborative presentation -  Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginningsinfo695895
 
Regional Snapshot Atlanta Aging Trends 2024
Regional Snapshot Atlanta Aging Trends 2024Regional Snapshot Atlanta Aging Trends 2024
Regional Snapshot Atlanta Aging Trends 2024ARCResearch
 
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...Suhani Kapoor
 
VIP Call Girls Pune Vani 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Vani 8617697112 Independent Escort Service PuneVIP Call Girls Pune Vani 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Vani 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
Night 7k to 12k Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
Night 7k to 12k  Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...Night 7k to 12k  Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
Night 7k to 12k Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...aartirawatdelhi
 
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Roomishabajaj13
 
Item # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdfItem # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdfahcitycouncil
 

Recently uploaded (20)

2024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 292024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 29
 
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
 
Russian Call Girls Service Ashiyana Colony { Lucknow Call Girls Service 95482...
Russian Call Girls Service Ashiyana Colony { Lucknow Call Girls Service 95482...Russian Call Girls Service Ashiyana Colony { Lucknow Call Girls Service 95482...
Russian Call Girls Service Ashiyana Colony { Lucknow Call Girls Service 95482...
 
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
 
Climate change and safety and health at work
Climate change and safety and health at workClimate change and safety and health at work
Climate change and safety and health at work
 
Goa Escorts WhatsApp Number South Goa Call Girl … 8588052666…
Goa Escorts WhatsApp Number South Goa Call Girl … 8588052666…Goa Escorts WhatsApp Number South Goa Call Girl … 8588052666…
Goa Escorts WhatsApp Number South Goa Call Girl … 8588052666…
 
The Federal Budget and Health Care Policy
The Federal Budget and Health Care PolicyThe Federal Budget and Health Care Policy
The Federal Budget and Health Care Policy
 
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
 
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
 
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
 
Fair Trash Reduction - West Hartford, CT
Fair Trash Reduction - West Hartford, CTFair Trash Reduction - West Hartford, CT
Fair Trash Reduction - West Hartford, CT
 
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up Number
 
How the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists LawmakersHow the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists Lawmakers
 
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation -  Humble BeginningsZechariah Boodey Farmstead Collaborative presentation -  Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
 
Regional Snapshot Atlanta Aging Trends 2024
Regional Snapshot Atlanta Aging Trends 2024Regional Snapshot Atlanta Aging Trends 2024
Regional Snapshot Atlanta Aging Trends 2024
 
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
 
VIP Call Girls Pune Vani 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Vani 8617697112 Independent Escort Service PuneVIP Call Girls Pune Vani 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Vani 8617697112 Independent Escort Service Pune
 
Night 7k to 12k Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
Night 7k to 12k  Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...Night 7k to 12k  Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
Night 7k to 12k Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
 
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Room
 
Item # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdfItem # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdf
 

iTrack WP3 workshop

  • 1. Click to edit Master text styles CLICK TO EDIT MASTER TITLE STYLE iTRACK PRIVACY AND ETHICAL IMPACT ASSESSMENT: WORKSHOP 10/11/20161
  • 2. Click to edit Master text styles CLICK TO EDIT MASTER TITLE STYLE 2
  • 3. Click to edit Master title style iTRACK Project Agenda for the day 3 Time Activity 9.30 – 9.45 Registration and Coffee 9.45 -11.15 Introduction & Information Flows 11.15 -11.30 Coffee 11.30 – 12.30 What are Privacy and Ethical Risks 12.30 – 13.30 Lunch 13.30 – 14.45 Identifying Risks: Group Work 14.45 – 15.00 Coffee 15.00 – 17.00 Risk Likelihood, Solutions, Conclusion
  • 4. Click to edit Master title style iTRACK Project WHAT are we doing today? Ethics and Privacy Impact Assessment Workshop 4
  • 5. Click to edit Master title styleWHERE ARE WE NOW? What? We are developing a human-centred technology that takes into account actual real-world practices of humanitarian aid workers, and provide policies for better protection and a more effective and efficient response. How? By building an integrated intelligent real-time tracking and threat identification system. Is there a potential problem? Could potentially be intrusive and people could be suspicious of it. What could be? A system that improves protection and improves efficiency.
  • 6. Click to edit Master title styleWHY? iTRACK’s nature H2020 User expectations Marketable
  • 7. Click to edit Master title styleWHO for? End user Technology developers Research
  • 8. Click to edit Master title styleWHAT is the output of today? Deliverable 3.1 Future Technology
  • 9. Click to edit Master title styleMETHODOLOGY 1 Preparation 2 Interviews and mapping of information flows 3 Stakeholder workshop 4 Mapping out the risks and solutions 5 Review of ethical and privacy assessments by an independent third-party 6 Publication
  • 10. Click to edit Master title styleINTERVIEWS
  • 11. Click to edit Master title styleEXAMPLE QUESTIONS… Please describe the system/technology that you are developing. Are there alternatives to the technology that are less intrusive? Could the technology affect vulnerable groups? What personal information is collected? Where will the information collected be stored? Can users decline to use the technology?
  • 12. Click to edit Master title style iTRACK Project TECHNOLOGY AND INFORMATION FLOWS 12 Understanding the information flows involved in a project is essential to a proper assessment System of systems
  • 13. Click to edit Master title style iTRACK Project Information Flows – SOCIAL SENSE (K-NOW) 13 REMOVED: CONFIDENTIAL
  • 14. Click to edit Master title style iTRACK Project Information Flows – STAFF SENSE (K-NOW) 14 REMOVED: CONFIDENTIAL
  • 15. Click to edit Master title style iTRACK Project Information Flows – ON BOARD LOCALISATION AND TRACKING IN VEHICLES (TREELOGIC) 15 REMOVED: CONFIDENTIAL
  • 16. Click to edit Master title styleInformation Flows – RFID & GPS SENSORS (TREELOGIC) REMOVED: CONFIDENTIAL
  • 17. Click to edit Master title styleInformation Flows – 360-DEGREE PANORAMA CAMERA (TEKNOVA) REMOVED: CONFIDENTIAL
  • 18. Click to edit Master title styleInformation Flows – SECURE COMMUNICATION (Teleplan) REMOVED: CONFIDENTIAL
  • 19. Click to edit Master title styleInformation Flows – REAL TIME THREAT DETECTION AND SUPPORT (UiA) REMOVED: CONFIDENTIAL
  • 20. Click to edit Master title styleInformation Flows – BACKEND SERVER (TREELOGIC) REMOVED: CONFIDENTIAL
  • 21. Click to edit Master title styleInformation Flows – iTRACK INTEGRATED SYSTEM (INTRASOFT) REMOVED: CONFIDENTIAL
  • 22. Click to edit Master title styleCOFFEE BREAK
  • 23. Click to edit Master title styleRISKS We need to identify privacy risks We need to identify ethical risks
  • 24. Click to edit Master title stylePrinciples that will guide this analysis: ETHICS Ethics, based on ECHR, UNDHR and other pieces of legislation Look out for: harm, invasion of boundaries, invalidity, lack of trust, undermining of human dignity, breaching autonomy…
  • 25. Click to edit Master title stylePrinciples that will guide this analysis: PRIVACY There is no overarching definition of the term however in iTRACK we take a broad view of privacy that goes beyond traditional notions of personal information
  • 26. Click to edit Master title stylePrinciples that will guide this analysis: PRIVACY Privacy of the person Privacy of behaviour and action Privacy of communication Privacy of data and image Privacy of thoughts and feelings Privacy of location and space Privacy of association
  • 27. Click to edit Master title styleEXAMPLE OF A RISK There is a risk that iTRACK Reputational damage due to loss of personal and potentially sensitive data Because the server is insecure A hacker breaks into the iTRACK system
  • 28. Click to edit Master title styleEXAMPLE OF A RISK There is a risk that a humanitarian worker may be discriminated on the grounds of his religion A humanitarian worker forgets to turn off his tracking device and he is traced to a place of worship A nosy manager looks where workers go after work
  • 29. Click to edit Master title styleEXAMPLE OF A RISK There is a loss of personal data and thus a regulatory fine & loss of reputation They leave phones with iTRACK apps lying around with no passowrd Employees do not know about privacy and data protection
  • 30. Click to edit Master title styleLUNCH BREAK
  • 31. Click to edit Master title style • Group 1: Social Sense (Social media collection) & Staff Sense (Tracking & communication & Health sensors) • Group 2: On board localisation and tracking in vehicles • Group 3: Tracking of assets: RFID • Group 4: Real time threat detection and support • Group 5: iTRACK Backend Server • Group 6: 360-degree panorama camera (position and risk detection) GROUP EXERCISE
  • 32. Click to edit Master title styleGroup - Names Group 1 Alexander Verbraeck Hayley Watson Paul Crompton Katrina Petersen Vita Lanfranchi Group 2 Yan Wang Moran Naor Gerardo Glorios Anne-Laure DUVAL Group 3 Julia Muraszkiewicz Christian Baumhauer Yngvar Sørensen Tunca Tabaklar Mehdi Ben Lazreg Group 4 Jacinto Esteban Gyöngyi Kovacs Tina Comes Anders Rye Group 5 Heide Lukosch Christos Pateritsas Lars Hamre Hlekiwe Kachali Group 6 Philipp Schwarz Sofia Tsekeridou Lisa Maria Svendsen Morten Goodwin
  • 33. Click to edit Master title styleDISCUSSION - WHAT RISKS DID YOU IDENTIFY? Group 1 Group 2 Group 3 Group 4 Group 5 Group 6
  • 34. Click to edit Master title styleCOFFEE BREAK
  • 35. Click to edit Master title style • The aim of this tasks is to assess the value of the risk and whether it is acceptable. The decisions are based on the framework of: – severity of the feared event: what would be the consequence of the feared event happening? – likelihood of the feared event? RISK MAP
  • 36. Click to edit Master title styleRISK MAP Severity Rating Likelyhood Minor severity: Risk poses little potential for loss. 1 Minor Likelihood: Given the current state of technology the risk is very unlikely to occur Moderate severity: Risk requires significant resources to take place, with significant potential for loss. Or, risk requires little resources to take place, with moderate potential for loss. 2 Moderate Likelihood: Given the current state of technology the risk may occur High severity: Risk requires few resources take palce, with significant potential for loss. 3 High Likelihood: Given the current state of technology the risk is very likely to occur
  • 37. Click to edit Master title styleEXAMPLE OF A RISK There is a risk that iTRACK Reputational damage due to loss of personal and potentially sensitive data Because the server is insecure A hacker breaks into the iTRACK system
  • 38. Click to edit Master title styleEXAMPLE OF A RISK: LOSS OF PERSONAL DATA Security safeguards in place so likelihood is low The severity is high (personal data loss = data breach = fines & reputation loss = significant impact for individual and the organisation) Need to think about solutions
  • 39. Click to edit Master title styleGROUP EXERCISE
  • 40. Click to edit Master title styleDISCUSSION Please present 2x risks and their severity and likelihood. Group 1 Group 2 Group 3 Group 4 Group 5 Group 6
  • 41. Click to edit Master title style • Risks with a high severity and likelihood absolutely must be avoided or reduced by implementing measures that reduce both their severity and their likelihood. • Risks with a high severity but a low likelihood must be avoided or reduced • Risks with a low severity but a high likelihood must be reduced by implementing security measures that reduce their likelihood. • Risks with a low severity and likelihood may be accepted, especially since the treatment of other risks should also lead to their treatment. SOLUTIONS
  • 42. Click to edit Master title style Risk Solution(s) Result (avoided, reduced, minimised or transferred) Risk: Reputational damage due to loss of personal and potentially sensitive data Add extra protection layer to server e.g., SSL Minimised Risk: Workers tracked and hurt because tracking app was left unattended Ensure devices are password protected Minimised SOLUTIONS
  • 43. Click to edit Master title styleGROUP EXERCISE Risk Solution(s) Result (avoided, reduced, minimised or transferred)
  • 44. Click to edit Master title styleDISCUSSION What Solutions did you identify? Group 1 Group 2 Group 3 Group 4 Group 5 Group 6
  • 45. Click to edit Master title styleNEXT STEPS EPIA TRI’s next steps For tech partners... For end user… Other tasks...
  • 46. Click to edit Master text styles CLICK TO EDIT MASTER TITLE STYLE 46 THANK YOU JULIA MURASZKIEWICZ & INGA KROENER JULIA.MURASZKIEWICZ@TRILATERALRESEARCH.COM