SlideShare a Scribd company logo
ETHICAL, PRIVACY & DATA
PROTECTION CONSIDERATIONS
Joanna Simon & Rachel Finn
Trilateral Research Ltd
PRIVACY, DATA PROTECTION & ETHICAL CONSIDERATIONS
 Ethical considerations
 Privacy challenges
 Data protection legislation
Ethical values and principles underpin and inform privacy
and data protection considerations.
The concepts are intertwined.
Not simply about legislative compliance.
ETHICAL VALUES – RESPECT FOR AUTONOMY & DIGNITY
 Autonomy (equated with liberty) – Art 6 European Charter of Fundamental Rights, Art 3 UN Universal Declaration of Human
Rights
 QUESTIONS:
o Does DEVELOP curtail a person’s liberty in any way?
o Does DEVELOP have implications for a person’s freedom of movement or association?
o Is there a meaningful choice? I.e., what are the implications of not participating?
 Dignity – Art 1 Charter, Art 1 Universal Declaration
 Should be able to participate actively in formation and implementation of policies that affect their well-being.
 Treated fairly regardless of age, gender, racial or ethic background, disability or other status.
 QUESTIONS:
o Does DEVELOP violate dignity?
o Does DEVELOP mark users as cognitively or physically disabled (perhaps via non-participation?)?
PRIVACY is an essential component of autonomy and dignity
OTHER ETHICAL VALUES
 Various other relevant ethical values: e.g. inclusion/exclusion, isolation, discrimination, beneficence,
accessibility
 Does DEVELOP have any effect on the inclusion or exclusion of any groups?
 Will DEVELOP replace human contact?
 Could DEVELOP be seen as stigmatising for any particular group, including those who do not use the system?
 Could DEVELOP be perceived as discriminating against any groups?
 Who benefits and in what way? Employer, user, etc.?
 Is a certain level of technological knowledge or physical capability required?
 What are the consequences of not participating?
RIGHT AND EXPECTATION OF PRIVACY
 Article 8 European Convention of Human Rights
 Protects private life of individuals against arbitrary interference by public authorities and private organisations
 covers 4 areas
o private life
o family life
o home
o correspondence
 Article 7 Charter of Fundamental Rights of the European Union
EU DATA PROTECTION LAW
Legal Framework
 Charter of Fundamental Rights of the European Union enshrines
data protection as a fundamental right
 An individual’s personal data must be adequately protected
 Article 8 Charter – “everyone has the right to the protection of personal data”
 Principal EU legal instrument regulating data protection – Data Protection Directive (95/46/EC)
 Regulates processing of data and free movement of such data
 Designed to give substance to the principles in the right to privacy
 Draft General Data Protection Regulation – to supersede the Data Protection Directive
DATA PROTECTION DIRECTIVE 95/46/EC
 Article 6 – principles relating to data quality
Personal data must be:
 Processed fairly and lawfully
 Collected for specified, explicit and legitimate purposes
 Adequate, relevant and not excessive in relation to
purpose for which collected/ processed
 Accurate, kept up to date. Where inaccurate or
incomplete reasonable steps must be taken to rectify
or erase
 Identification of data subjects for no longer than is necessary
DATA PROTECTION DIRECTIVE 95/46/EC
 Article 7 – Criteria for making data processing legitimate
Personal data may be processed only if:
 Data subject gives unambiguous consent, or
 Processing is necessary for:
o performance of a contract, or
o compliance with a legal obligation, or
o protecting vital interests of the data subject, or
o performing task in the public interest/ exercise of official authority
o legitimate interests of data controller
DATA PROTECTION DIRECTIVE 95/46/EC
 Article 8 – Special categories of data
Prohibition on processing personal data revealing:
 Racial or ethnic origin
 Political opinions
 Religious or philosophical beliefs
 Trade-union membership
 Data concerning health or sex life
 Exception – explicit consent
DATA PROTECTION DIRECTIVE 95/46/EC
 Articles 10 & 11 – Information to be given to the data subject
Data controller must provide data subject with at least the following information:
 Identity of the controller
 The purposes of the processing
 Any further information, such as
o Recipients or categories of recipients of the data
o Whether replies to questions are obligatory or voluntary, consequences of failure to answer (where data collected from data subject)
o Categories of data
o Existence of right of access and right to rectify data
DATA PROTECTION DIRECTIVE 95/46/EC
 Article 12 – Right of access
 Outlines individual’s rights of access to their data
 Article 17 – Security of processing
 Individual’s data should be protected from misuse and unauthorised disclosure or access
GENERAL DATA PROTECTION REGULATION – WHAT’S NEW?
 Article 17 – Right to erasure (“right to be forgotten”)
 Article 19 – Right to object – on grounds including profiling
 Article 20 – Right not to be subject to a decision based solely on automated processing, including
profiling
GENERAL DATA PROTECTION REGULATION – WHAT’S NEW?
 Article 23 – Data protection by design and by default
 Implement appropriate technical and organisational measures designed to
implement data protection principles
 Article 30 – Security of processing
 Implement appropriate technical and organisation measures to ensure level of
security appropriate for risk, including:
o pseudonymisation and encryption of personal data
o ability to ensure the ongoing confidentiality, integrity, availability and resilience of systems
and services processing personal data;
o the ability to restore the availability and access to data in a timely manner in the event of a
physical or technical incident;
o a process for regularly testing, assessing and evaluating the effectiveness of technical
and organisational measures for ensuring the security of the processing.
PRIVACY AND DATA PROTECTION CONSIDERATIONS
 Various privacy and data considerations flow from the ethical and legal constraints and values, e.g.:
 Informed consent
 Data minimisation
 Data quality
 Purpose specifications
 Use limitation
 Confidentiality
 Transparency
 Individual participation and access to data
 Anonymity
 Privacy of personal communications
INFORMED CONSENT
 Art 7 EU Data Protection Directive – personal data can only be processed if data subject has unambiguously given consent
 Consent must be meaningful:
 Given freely after person informed of nature, significance, implications and risks
 Questions:
 How will DEVELOP obtain free and informed consent?
 Informed of nature, significance, implications and risks of product?
 Evidence in writing, dated, signed, marked in some way?
 Does consent outline use for which data is collected, how it is collected, how to obtain copy of data, mechanism to correct
erroneous data, who has access to data?
 Right to withdraw?
 Truly voluntary? i.e. consequences of not consenting?
 Employer/employee relationship is significant here.
DATA MINIMISATION
 How will the project determine what constitutes the minimum
amount of personal data to be collected?
 Will any data be collected which is not necessary for fulfilling
the stated purpose of the project?
 Is information collected in ways of which the data subject is
unaware?
 Is information collected against the wishes of the person?
 For how long will the information be retained?
 Will the information be deleted when it is no longer needed for the purpose for which it was collected?
DATA QUALITY
 What measures will be put in place to ensure quality of information gathered?
 What assurances that data is true and accurate?
 Has information been collected from others than the person to whom it pertains?
 What are the implications of data inaccuracies?
 What measures are there to correct data inaccuracies?
CONFIDENTIALITY
 What measure to ensure protection of personal data?
E.g., encryption, access control etc.
 Who will have access to personal data?
 What safeguards will be put in place to ensure those who have
access treat the information in confidence?
ANONYMITY
 Have steps been taken to ensure that person cannot be identified from the data collected?
 Have pseudonyms or codes been use to replace data that could identify the individual?
 Could data from different sources be aggregated or matched in a way that undermines anonymity?
ACTION PLAN FOR UPCOMING DELIVERABLE
T4.1 – legal and
social
considerations –
due M09
Review legal
frameworks at EU
and national level
Review social
norms and
background for
each participating
country – drawing
on ethical principles
Draft framework of
legal and
social/ethical
considerations for
design of
DEVELOP
Framework to be
fed into design
principles for
DEVELOP, in
consultation with
other partners
CONSULT WITH CONSORTIUM
Partners to help us understand architecture
Describe information flows
Who will collect what
information?
• From whom?
• For what purpose?
How will the collected
information be used?
How will information be stored,
secured, processed and
distributed
• (i.e. to whom might the
organisation pass the
information)
• for what purpose
How well will secondary users
(e.g. the organisation’s service
providers, apps developers)
protect that information?
CONTACT US
 Joanna Simon – joanna.simon@trilateralresearch.com
 Rachel Finn – rachel.finn@trilateralresearch.com
 Website: www.trilateralresearch.com
 Twitter: @Trilateral_UK
 E-mail: info@trilateralresearch.com
 Phone: +44 (0)207 559 3550
 Address: Crown House
72 Hammersmith Road
London
United Kingdom

More Related Content

What's hot

Information Privacy
Information PrivacyInformation Privacy
Information Privacy
imehreenx
 
Privacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminarPrivacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminarLance Michalson
 
Chapter2
Chapter2Chapter2
Chapter2Pibi Lu
 
Internet user's rights and fundamental freedoms day
Internet user's rights and fundamental freedoms dayInternet user's rights and fundamental freedoms day
Internet user's rights and fundamental freedoms day
moldovaictsummit2016
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and Security
AnuMarySunny
 
Privacy And Security Laws For Sm And Lbs (110120)
Privacy And Security Laws For Sm And Lbs (110120)Privacy And Security Laws For Sm And Lbs (110120)
Privacy And Security Laws For Sm And Lbs (110120)
JNicholson
 
John Nicholson Presentation
John Nicholson PresentationJohn Nicholson Presentation
John Nicholson PresentationMediabistro
 
Legal update
Legal updateLegal update
Legal update
Rachel Aldighieri
 
Privacy 101
Privacy 101Privacy 101
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
FLUZO
 
Lecture7(ethics&it use)
Lecture7(ethics&it use)Lecture7(ethics&it use)
Data Protection (Download for slideshow)
Data Protection (Download for slideshow)Data Protection (Download for slideshow)
Data Protection (Download for slideshow)
Andrew Sharpe
 
Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...
Santosh Sigdel
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
G Prachi
 
Wsgr eu data protection briefing march 20 2013 - final
Wsgr   eu data protection briefing march 20 2013 - finalWsgr   eu data protection briefing march 20 2013 - final
Wsgr eu data protection briefing march 20 2013 - finalValentin Korobkov
 
Data Protection Act presentation
Data Protection Act presentationData Protection Act presentation
Data Protection Act presentationIan Clive Oultram
 
The EU Data Protection Reform's Impact on Cross Border e-Discovery: new Devel...
The EU Data Protection Reform's Impact on Cross Border e-Discovery: new Devel...The EU Data Protection Reform's Impact on Cross Border e-Discovery: new Devel...
The EU Data Protection Reform's Impact on Cross Border e-Discovery: new Devel...
AltheimPrivacy
 

What's hot (20)

Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Privacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminarPrivacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminar
 
Chapter2
Chapter2Chapter2
Chapter2
 
Data protection
Data protectionData protection
Data protection
 
Internet user's rights and fundamental freedoms day
Internet user's rights and fundamental freedoms dayInternet user's rights and fundamental freedoms day
Internet user's rights and fundamental freedoms day
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and Security
 
Privacy And Security Laws For Sm And Lbs (110120)
Privacy And Security Laws For Sm And Lbs (110120)Privacy And Security Laws For Sm And Lbs (110120)
Privacy And Security Laws For Sm And Lbs (110120)
 
John Nicholson Presentation
John Nicholson PresentationJohn Nicholson Presentation
John Nicholson Presentation
 
Legal update
Legal updateLegal update
Legal update
 
Privacy 101
Privacy 101Privacy 101
Privacy 101
 
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
 
Lecture7(ethics&it use)
Lecture7(ethics&it use)Lecture7(ethics&it use)
Lecture7(ethics&it use)
 
Data Protection (Download for slideshow)
Data Protection (Download for slideshow)Data Protection (Download for slideshow)
Data Protection (Download for slideshow)
 
Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Wsgr eu data protection briefing march 20 2013 - final
Wsgr   eu data protection briefing march 20 2013 - finalWsgr   eu data protection briefing march 20 2013 - final
Wsgr eu data protection briefing march 20 2013 - final
 
Data Protection Act presentation
Data Protection Act presentationData Protection Act presentation
Data Protection Act presentation
 
The EU Data Protection Reform's Impact on Cross Border e-Discovery: new Devel...
The EU Data Protection Reform's Impact on Cross Border e-Discovery: new Devel...The EU Data Protection Reform's Impact on Cross Border e-Discovery: new Devel...
The EU Data Protection Reform's Impact on Cross Border e-Discovery: new Devel...
 
POPI_Overview_E
POPI_Overview_EPOPI_Overview_E
POPI_Overview_E
 
POPI_Overview_E
POPI_Overview_EPOPI_Overview_E
POPI_Overview_E
 

Similar to Overview of privacy and data protection considerations for DEVELOP

Auditing your EU entities for data protection compliance 5661651 1
Auditing your EU entities for data protection compliance 5661651 1Auditing your EU entities for data protection compliance 5661651 1
Auditing your EU entities for data protection compliance 5661651 1rtjbond
 
Critical regulations governing data privacy and data protection 20 dec2018
Critical regulations governing data privacy and data protection 20 dec2018Critical regulations governing data privacy and data protection 20 dec2018
Critical regulations governing data privacy and data protection 20 dec2018
Surabhi Jain
 
六合彩,香港六合彩 » SlideShare
六合彩,香港六合彩 » SlideShare六合彩,香港六合彩 » SlideShare
六合彩,香港六合彩 » SlideShare
qsilytnc
 
香港六合彩 » SlideShare
香港六合彩 » SlideShare香港六合彩 » SlideShare
香港六合彩 » SlideShare
riguo
 
香港六合彩
香港六合彩香港六合彩
香港六合彩
racbhe
 
香港六合彩 » SlideShare
香港六合彩 » SlideShare香港六合彩 » SlideShare
香港六合彩 » SlideShare
uoemnumu
 
香港六合彩 » SlideShare
香港六合彩 » SlideShare香港六合彩 » SlideShare
香港六合彩 » SlideShare
yndadubf
 
香港六合彩
香港六合彩香港六合彩
香港六合彩
mhffyol
 
香港六合彩-六合彩
香港六合彩-六合彩香港六合彩-六合彩
香港六合彩-六合彩
eqhnwl
 
Training innovations information governance slideshare 2015
Training innovations information governance slideshare 2015Training innovations information governance slideshare 2015
Training innovations information governance slideshare 2015
Patrick Doyle
 
Legal and ethical considerations in nursing informatics
Legal and ethical considerations in nursing informaticsLegal and ethical considerations in nursing informatics
Legal and ethical considerations in nursing informatics
AHMED ZINHOM
 
Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issuesSagar Rahurkar
 
Is Pandemia a Good Reason to Give Up on Privacy
Is Pandemia a Good Reason to Give Up on PrivacyIs Pandemia a Good Reason to Give Up on Privacy
Is Pandemia a Good Reason to Give Up on Privacy
Giovanni Maria Riccio
 
Medical device data protection and security
Medical device data protection and security Medical device data protection and security
Medical device data protection and security
Erik Vollebregt
 
Privacy Ordinance in Hong Kong
Privacy Ordinance in Hong KongPrivacy Ordinance in Hong Kong
Privacy Ordinance in Hong Kong若水 鲁
 
Privacy and data protection primer - City of Portland
Privacy and data protection primer - City of PortlandPrivacy and data protection primer - City of Portland
Privacy and data protection primer - City of Portland
Hector Dominguez
 
2014-04-16 Protection of Personal Information Act Readiness Workshop
2014-04-16 Protection of Personal Information Act Readiness Workshop2014-04-16 Protection of Personal Information Act Readiness Workshop
2014-04-16 Protection of Personal Information Act Readiness Workshop
Paul Jacobson
 
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
ICT Watch
 
ISO/IEC 27001, ISO/IEC 27701, and Data Privacy Laws: Key threats in 2022
ISO/IEC 27001, ISO/IEC 27701, and Data Privacy Laws: Key threats in 2022ISO/IEC 27001, ISO/IEC 27701, and Data Privacy Laws: Key threats in 2022
ISO/IEC 27001, ISO/IEC 27701, and Data Privacy Laws: Key threats in 2022
PECB
 

Similar to Overview of privacy and data protection considerations for DEVELOP (20)

Auditing your EU entities for data protection compliance 5661651 1
Auditing your EU entities for data protection compliance 5661651 1Auditing your EU entities for data protection compliance 5661651 1
Auditing your EU entities for data protection compliance 5661651 1
 
Critical regulations governing data privacy and data protection 20 dec2018
Critical regulations governing data privacy and data protection 20 dec2018Critical regulations governing data privacy and data protection 20 dec2018
Critical regulations governing data privacy and data protection 20 dec2018
 
LO1.pptx
LO1.pptxLO1.pptx
LO1.pptx
 
六合彩,香港六合彩 » SlideShare
六合彩,香港六合彩 » SlideShare六合彩,香港六合彩 » SlideShare
六合彩,香港六合彩 » SlideShare
 
香港六合彩 » SlideShare
香港六合彩 » SlideShare香港六合彩 » SlideShare
香港六合彩 » SlideShare
 
香港六合彩
香港六合彩香港六合彩
香港六合彩
 
香港六合彩 » SlideShare
香港六合彩 » SlideShare香港六合彩 » SlideShare
香港六合彩 » SlideShare
 
香港六合彩 » SlideShare
香港六合彩 » SlideShare香港六合彩 » SlideShare
香港六合彩 » SlideShare
 
香港六合彩
香港六合彩香港六合彩
香港六合彩
 
香港六合彩-六合彩
香港六合彩-六合彩香港六合彩-六合彩
香港六合彩-六合彩
 
Training innovations information governance slideshare 2015
Training innovations information governance slideshare 2015Training innovations information governance slideshare 2015
Training innovations information governance slideshare 2015
 
Legal and ethical considerations in nursing informatics
Legal and ethical considerations in nursing informaticsLegal and ethical considerations in nursing informatics
Legal and ethical considerations in nursing informatics
 
Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issues
 
Is Pandemia a Good Reason to Give Up on Privacy
Is Pandemia a Good Reason to Give Up on PrivacyIs Pandemia a Good Reason to Give Up on Privacy
Is Pandemia a Good Reason to Give Up on Privacy
 
Medical device data protection and security
Medical device data protection and security Medical device data protection and security
Medical device data protection and security
 
Privacy Ordinance in Hong Kong
Privacy Ordinance in Hong KongPrivacy Ordinance in Hong Kong
Privacy Ordinance in Hong Kong
 
Privacy and data protection primer - City of Portland
Privacy and data protection primer - City of PortlandPrivacy and data protection primer - City of Portland
Privacy and data protection primer - City of Portland
 
2014-04-16 Protection of Personal Information Act Readiness Workshop
2014-04-16 Protection of Personal Information Act Readiness Workshop2014-04-16 Protection of Personal Information Act Readiness Workshop
2014-04-16 Protection of Personal Information Act Readiness Workshop
 
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
 
ISO/IEC 27001, ISO/IEC 27701, and Data Privacy Laws: Key threats in 2022
ISO/IEC 27001, ISO/IEC 27701, and Data Privacy Laws: Key threats in 2022ISO/IEC 27001, ISO/IEC 27701, and Data Privacy Laws: Key threats in 2022
ISO/IEC 27001, ISO/IEC 27701, and Data Privacy Laws: Key threats in 2022
 

More from Trilateral Research

Star II sme hotline 21.01.20
Star II sme hotline 21.01.20Star II sme hotline 21.01.20
Star II sme hotline 21.01.20
Trilateral Research
 
Designing Security Across Boundaries: mapping disperse data to collaborative...
Designing Security Across Boundaries:  mapping disperse data to collaborative...Designing Security Across Boundaries:  mapping disperse data to collaborative...
Designing Security Across Boundaries: mapping disperse data to collaborative...
Trilateral Research
 
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
Trilateral Research
 
Risky Borders: Designing togetherness using information technology for intero...
Risky Borders: Designing togetherness using information technology for intero...Risky Borders: Designing togetherness using information technology for intero...
Risky Borders: Designing togetherness using information technology for intero...
Trilateral Research
 
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
Trilateral Research
 
Ethics and technology in humanitarian setting
Ethics and technology in humanitarian settingEthics and technology in humanitarian setting
Ethics and technology in humanitarian setting
Trilateral Research
 
Privacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES ProjectPrivacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES Project
Trilateral Research
 
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Trilateral Research
 
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Trilateral Research
 
Overview of CLARITY project
Overview of CLARITY projectOverview of CLARITY project
Overview of CLARITY project
Trilateral Research
 
CRISP project: overview of findings and lessons learned.
CRISP project: overview of findings and lessons learned.CRISP project: overview of findings and lessons learned.
CRISP project: overview of findings and lessons learned.
Trilateral Research
 
Legal and ethical issues in social capital analysis
Legal and ethical issues in social capital analysis Legal and ethical issues in social capital analysis
Legal and ethical issues in social capital analysis
Trilateral Research
 
Examining End-User Standardisation Needs for Disaster Resilience
Examining End-User Standardisation Needs for Disaster ResilienceExamining End-User Standardisation Needs for Disaster Resilience
Examining End-User Standardisation Needs for Disaster Resilience
Trilateral Research
 
A stakeholder based approach to standardisation for disaster resilience
A stakeholder based approach to standardisation for disaster resilienceA stakeholder based approach to standardisation for disaster resilience
A stakeholder based approach to standardisation for disaster resilience
Trilateral Research
 
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforce
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforceEvolving Technology - Delivering Neighbourhood Policing with a smaller workforce
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforce
Trilateral Research
 
Social Media and ICT in Neighbourhood Policing - Opportunities and Challanges
Social Media and ICT in Neighbourhood Policing - Opportunities and ChallangesSocial Media and ICT in Neighbourhood Policing - Opportunities and Challanges
Social Media and ICT in Neighbourhood Policing - Opportunities and Challanges
Trilateral Research
 
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
Trilateral Research
 
ENERGIC-OD @ GEO Business 2017 presentation
ENERGIC-OD @ GEO Business 2017 presentationENERGIC-OD @ GEO Business 2017 presentation
ENERGIC-OD @ GEO Business 2017 presentation
Trilateral Research
 
Esports in the UK - privacy risks
Esports in the UK - privacy risksEsports in the UK - privacy risks
Esports in the UK - privacy risks
Trilateral Research
 
Enhancing ethics assessment in R&I at the national level
Enhancing ethics assessment in R&I at the national levelEnhancing ethics assessment in R&I at the national level
Enhancing ethics assessment in R&I at the national level
Trilateral Research
 

More from Trilateral Research (20)

Star II sme hotline 21.01.20
Star II sme hotline 21.01.20Star II sme hotline 21.01.20
Star II sme hotline 21.01.20
 
Designing Security Across Boundaries: mapping disperse data to collaborative...
Designing Security Across Boundaries:  mapping disperse data to collaborative...Designing Security Across Boundaries:  mapping disperse data to collaborative...
Designing Security Across Boundaries: mapping disperse data to collaborative...
 
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
 
Risky Borders: Designing togetherness using information technology for intero...
Risky Borders: Designing togetherness using information technology for intero...Risky Borders: Designing togetherness using information technology for intero...
Risky Borders: Designing togetherness using information technology for intero...
 
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
 
Ethics and technology in humanitarian setting
Ethics and technology in humanitarian settingEthics and technology in humanitarian setting
Ethics and technology in humanitarian setting
 
Privacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES ProjectPrivacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES Project
 
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
 
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
 
Overview of CLARITY project
Overview of CLARITY projectOverview of CLARITY project
Overview of CLARITY project
 
CRISP project: overview of findings and lessons learned.
CRISP project: overview of findings and lessons learned.CRISP project: overview of findings and lessons learned.
CRISP project: overview of findings and lessons learned.
 
Legal and ethical issues in social capital analysis
Legal and ethical issues in social capital analysis Legal and ethical issues in social capital analysis
Legal and ethical issues in social capital analysis
 
Examining End-User Standardisation Needs for Disaster Resilience
Examining End-User Standardisation Needs for Disaster ResilienceExamining End-User Standardisation Needs for Disaster Resilience
Examining End-User Standardisation Needs for Disaster Resilience
 
A stakeholder based approach to standardisation for disaster resilience
A stakeholder based approach to standardisation for disaster resilienceA stakeholder based approach to standardisation for disaster resilience
A stakeholder based approach to standardisation for disaster resilience
 
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforce
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforceEvolving Technology - Delivering Neighbourhood Policing with a smaller workforce
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforce
 
Social Media and ICT in Neighbourhood Policing - Opportunities and Challanges
Social Media and ICT in Neighbourhood Policing - Opportunities and ChallangesSocial Media and ICT in Neighbourhood Policing - Opportunities and Challanges
Social Media and ICT in Neighbourhood Policing - Opportunities and Challanges
 
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
 
ENERGIC-OD @ GEO Business 2017 presentation
ENERGIC-OD @ GEO Business 2017 presentationENERGIC-OD @ GEO Business 2017 presentation
ENERGIC-OD @ GEO Business 2017 presentation
 
Esports in the UK - privacy risks
Esports in the UK - privacy risksEsports in the UK - privacy risks
Esports in the UK - privacy risks
 
Enhancing ethics assessment in R&I at the national level
Enhancing ethics assessment in R&I at the national levelEnhancing ethics assessment in R&I at the national level
Enhancing ethics assessment in R&I at the national level
 

Recently uploaded

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 

Overview of privacy and data protection considerations for DEVELOP

  • 1. ETHICAL, PRIVACY & DATA PROTECTION CONSIDERATIONS Joanna Simon & Rachel Finn Trilateral Research Ltd
  • 2. PRIVACY, DATA PROTECTION & ETHICAL CONSIDERATIONS  Ethical considerations  Privacy challenges  Data protection legislation Ethical values and principles underpin and inform privacy and data protection considerations. The concepts are intertwined. Not simply about legislative compliance.
  • 3. ETHICAL VALUES – RESPECT FOR AUTONOMY & DIGNITY  Autonomy (equated with liberty) – Art 6 European Charter of Fundamental Rights, Art 3 UN Universal Declaration of Human Rights  QUESTIONS: o Does DEVELOP curtail a person’s liberty in any way? o Does DEVELOP have implications for a person’s freedom of movement or association? o Is there a meaningful choice? I.e., what are the implications of not participating?  Dignity – Art 1 Charter, Art 1 Universal Declaration  Should be able to participate actively in formation and implementation of policies that affect their well-being.  Treated fairly regardless of age, gender, racial or ethic background, disability or other status.  QUESTIONS: o Does DEVELOP violate dignity? o Does DEVELOP mark users as cognitively or physically disabled (perhaps via non-participation?)? PRIVACY is an essential component of autonomy and dignity
  • 4. OTHER ETHICAL VALUES  Various other relevant ethical values: e.g. inclusion/exclusion, isolation, discrimination, beneficence, accessibility  Does DEVELOP have any effect on the inclusion or exclusion of any groups?  Will DEVELOP replace human contact?  Could DEVELOP be seen as stigmatising for any particular group, including those who do not use the system?  Could DEVELOP be perceived as discriminating against any groups?  Who benefits and in what way? Employer, user, etc.?  Is a certain level of technological knowledge or physical capability required?  What are the consequences of not participating?
  • 5. RIGHT AND EXPECTATION OF PRIVACY  Article 8 European Convention of Human Rights  Protects private life of individuals against arbitrary interference by public authorities and private organisations  covers 4 areas o private life o family life o home o correspondence  Article 7 Charter of Fundamental Rights of the European Union
  • 6. EU DATA PROTECTION LAW Legal Framework  Charter of Fundamental Rights of the European Union enshrines data protection as a fundamental right  An individual’s personal data must be adequately protected  Article 8 Charter – “everyone has the right to the protection of personal data”  Principal EU legal instrument regulating data protection – Data Protection Directive (95/46/EC)  Regulates processing of data and free movement of such data  Designed to give substance to the principles in the right to privacy  Draft General Data Protection Regulation – to supersede the Data Protection Directive
  • 7. DATA PROTECTION DIRECTIVE 95/46/EC  Article 6 – principles relating to data quality Personal data must be:  Processed fairly and lawfully  Collected for specified, explicit and legitimate purposes  Adequate, relevant and not excessive in relation to purpose for which collected/ processed  Accurate, kept up to date. Where inaccurate or incomplete reasonable steps must be taken to rectify or erase  Identification of data subjects for no longer than is necessary
  • 8. DATA PROTECTION DIRECTIVE 95/46/EC  Article 7 – Criteria for making data processing legitimate Personal data may be processed only if:  Data subject gives unambiguous consent, or  Processing is necessary for: o performance of a contract, or o compliance with a legal obligation, or o protecting vital interests of the data subject, or o performing task in the public interest/ exercise of official authority o legitimate interests of data controller
  • 9. DATA PROTECTION DIRECTIVE 95/46/EC  Article 8 – Special categories of data Prohibition on processing personal data revealing:  Racial or ethnic origin  Political opinions  Religious or philosophical beliefs  Trade-union membership  Data concerning health or sex life  Exception – explicit consent
  • 10. DATA PROTECTION DIRECTIVE 95/46/EC  Articles 10 & 11 – Information to be given to the data subject Data controller must provide data subject with at least the following information:  Identity of the controller  The purposes of the processing  Any further information, such as o Recipients or categories of recipients of the data o Whether replies to questions are obligatory or voluntary, consequences of failure to answer (where data collected from data subject) o Categories of data o Existence of right of access and right to rectify data
  • 11. DATA PROTECTION DIRECTIVE 95/46/EC  Article 12 – Right of access  Outlines individual’s rights of access to their data  Article 17 – Security of processing  Individual’s data should be protected from misuse and unauthorised disclosure or access
  • 12. GENERAL DATA PROTECTION REGULATION – WHAT’S NEW?  Article 17 – Right to erasure (“right to be forgotten”)  Article 19 – Right to object – on grounds including profiling  Article 20 – Right not to be subject to a decision based solely on automated processing, including profiling
  • 13. GENERAL DATA PROTECTION REGULATION – WHAT’S NEW?  Article 23 – Data protection by design and by default  Implement appropriate technical and organisational measures designed to implement data protection principles  Article 30 – Security of processing  Implement appropriate technical and organisation measures to ensure level of security appropriate for risk, including: o pseudonymisation and encryption of personal data o ability to ensure the ongoing confidentiality, integrity, availability and resilience of systems and services processing personal data; o the ability to restore the availability and access to data in a timely manner in the event of a physical or technical incident; o a process for regularly testing, assessing and evaluating the effectiveness of technical and organisational measures for ensuring the security of the processing.
  • 14. PRIVACY AND DATA PROTECTION CONSIDERATIONS  Various privacy and data considerations flow from the ethical and legal constraints and values, e.g.:  Informed consent  Data minimisation  Data quality  Purpose specifications  Use limitation  Confidentiality  Transparency  Individual participation and access to data  Anonymity  Privacy of personal communications
  • 15. INFORMED CONSENT  Art 7 EU Data Protection Directive – personal data can only be processed if data subject has unambiguously given consent  Consent must be meaningful:  Given freely after person informed of nature, significance, implications and risks  Questions:  How will DEVELOP obtain free and informed consent?  Informed of nature, significance, implications and risks of product?  Evidence in writing, dated, signed, marked in some way?  Does consent outline use for which data is collected, how it is collected, how to obtain copy of data, mechanism to correct erroneous data, who has access to data?  Right to withdraw?  Truly voluntary? i.e. consequences of not consenting?  Employer/employee relationship is significant here.
  • 16. DATA MINIMISATION  How will the project determine what constitutes the minimum amount of personal data to be collected?  Will any data be collected which is not necessary for fulfilling the stated purpose of the project?  Is information collected in ways of which the data subject is unaware?  Is information collected against the wishes of the person?  For how long will the information be retained?  Will the information be deleted when it is no longer needed for the purpose for which it was collected?
  • 17. DATA QUALITY  What measures will be put in place to ensure quality of information gathered?  What assurances that data is true and accurate?  Has information been collected from others than the person to whom it pertains?  What are the implications of data inaccuracies?  What measures are there to correct data inaccuracies?
  • 18. CONFIDENTIALITY  What measure to ensure protection of personal data? E.g., encryption, access control etc.  Who will have access to personal data?  What safeguards will be put in place to ensure those who have access treat the information in confidence?
  • 19. ANONYMITY  Have steps been taken to ensure that person cannot be identified from the data collected?  Have pseudonyms or codes been use to replace data that could identify the individual?  Could data from different sources be aggregated or matched in a way that undermines anonymity?
  • 20. ACTION PLAN FOR UPCOMING DELIVERABLE T4.1 – legal and social considerations – due M09 Review legal frameworks at EU and national level Review social norms and background for each participating country – drawing on ethical principles Draft framework of legal and social/ethical considerations for design of DEVELOP Framework to be fed into design principles for DEVELOP, in consultation with other partners
  • 21. CONSULT WITH CONSORTIUM Partners to help us understand architecture Describe information flows Who will collect what information? • From whom? • For what purpose? How will the collected information be used? How will information be stored, secured, processed and distributed • (i.e. to whom might the organisation pass the information) • for what purpose How well will secondary users (e.g. the organisation’s service providers, apps developers) protect that information?
  • 22. CONTACT US  Joanna Simon – joanna.simon@trilateralresearch.com  Rachel Finn – rachel.finn@trilateralresearch.com  Website: www.trilateralresearch.com  Twitter: @Trilateral_UK  E-mail: info@trilateralresearch.com  Phone: +44 (0)207 559 3550  Address: Crown House 72 Hammersmith Road London United Kingdom