SlideShare a Scribd company logo
1 of 18
Privacy and Data Protection:
a primer
September, 2018
Privacy Paradox
How we fear threats on one hand and yet voluntarily give away data
elsewhere. Researchers call this conundrum the
"privacy paradox".
"In a marketplace, there's cooperation and there's definitely an effort
to compete by giving people what they want. But there's also the
prospect of extracting as much rent as you can." But ultimately,...
users' primary concern comes down to this:
"People are worried about getting taken advantage of."
Privacy: a primer
US: “right to privacy” cobbled together via case
law (Supreme Court)
“The right to privacy refers to the concept that
one's personal information is protected from
public scrutiny.”
…so what could be personal information?
…does this apply equally across all forms of
information?
What is Personal Identifiable Information (PII)?
Any representation of information that permits the identity of an individual to
whom the information applies to be reasonably inferred by either direct or
indirect means. Further, PII is defined as information: (i) that directly identifies
an individual (e.g., name, address, social security number or other identifying
number or code, telephone number, email address, etc.) or (ii) by which an
agency intends to identify specific individuals in conjunction with other data
elements, i.e., indirect identification. (These data elements may include a
combination of gender, race, birth date, geographic indicator, and other
descriptors). Additionally, information permitting the physical or online
contacting of a specific individual is the same as personally identifiable
information. This information can be maintained in either paper, electronic or
other media.
PII Legally recognized ‘protected classes’ in US
Race (Civil Rights Act of 1964)
Color (Civil Rights Act of 1964)
Sex (Equal Pay Act of 1963;Civil Rights Act of 1964)
Religion (Civil Rights Act of 1964)
National origin (Civil Rights Act of 1964)
Citizenship (Immigration Reform and Control Act)
Age (Age Discrimination in Employment Act of 1967)
Pregnancy (Pregnancy Discrimination Act)
Familial status (Civil Rights Act of 1968)
Disability status (Rehabilitation Act of 1973; Americans with Disabilities Act of 1990)
Veteran status (Vietnam Era Veterans' Readjustment Assistance Act of 1974;
Uniformed Services Employment and Reemployment Rights Act)
Genetic information (Genetic Information Nondiscrimination Act)
Data Protection
The Management of Personal Information. Data protection is about securing
data against unauthorized access. Data privacy is about authorized access —
who has it and who defines it. Another way to look at it is this: Data protection
is essentially a technical issue, whereas data privacy is a legal one.
In Storage, data protection is the assurance that data is not corrupted, is
accessible for authorized purposes only, and is in compliance with applicable
requirements.
In Security, data protection is the implementation of appropriate administrative,
technical or physical means to guard against unauthorized intentional or
accidental disclosure, modification , or destruction.
General Data Protection Regulation (GDPR)
Personal data (GDPR) is any information
that relates to an identified or identifiable
living individual.
Different pieces of information, which
collected together can lead to the
identification of a particular person, also
constitute personal data.
- European Commission
https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/
GDPR Data Subject Rights
● Breach Notification
● Right to Access
● Right to Be Forgotten
● Data Portability
● Privacy by Design
● Data Minimization
● Data Protection Officers
Two key words on Privacy
TRUST - INFORMED CONSENT
The generation of Trust
Trust is defined as the confidence in something, or to believe
in someone based on fairness, truth and reliability.
Within the context of Privacy and Data Protection, the following are
principles for building Trust:
Privacy by design - transparency - data minimization - robust
cybersecurity - Accountability - Fairness - Utility - Empathy and
Respect : Human Centric design
The power of informed consent
Consent is an outcome, resulting from a mechanism which strives to obtain it.
Merely having an individual check a box or sign a piece of paper is not enough.
You must demonstrate that you gave the individual, in a clear and easy to
understand fashion, the information necessary to understand the scope and
impact of the data processing.
Informed consent cannot happen without a clear
description of how data is going to be used, by who
and under which context.
Privacy by Design - Implementation in practice
Principle 1: Proactive not reactive: preventative not remedial
Principle 2: Privacy as the default setting
Principle 3: Privacy embedded into design
Principle 4: Full functionality: positive-sum, not zero-sum
Principle 5: End-to-end security: full lifecycle protection
Principle 6: Visibility and transparency: keep it open
Principle 7: Respect for user privacy: keep it user-centric
Privacy and Data Protection Assessment
● Who/Recipients - People, organizations and
technologies who are the senders, recipients, and
subjects of information.
● What/Information - Information type, data fields
being used, transmitted or processed
● How/Transformation principles - Constraints and
processing through the flow of information.
● Why - Purpose of the use of information
● Where - foreseen effects due to the use or processing
of this information
Privacy and Data Protection Risks
Security. Protect Personal Identifiable Information (PII)
Potential discrimination. Big data tools can multiply internal bias effects and
become a tool for exclusion.
Non compliance. Small data stakeholders are usually in risk of data breachers
or exposing information that may lead to de-anonymization of information.
Accuracy. If inaccuracies exist in data sets, it can lead to negative effects to
individuals or communities.
Transparency. Lack of accountability may lead to distrust of any further
analysis.
Education. Lack of training and use of tools may create false conclusions, as well
as expose private data or data that may allow de-anonymization of datasets.
Final remarks
“Privacy is not something that one has, but something that one seeks to
achieve. It requires constant negotiation as information flows and contexts
shift.
To achieve privacy in a networked world, people must actively try to
manage the various social situations in which information is accessed,
consumed, interpreted, and shared.
They cannot simply focus on restricting the flow of information; they
must also account for the ways in which information is inferred and
used.”
-
Reframing Privacy, Data & Society
Contacts
Judith Mowry - Office of Equity and Human Rights
Judith.Mowry@portlandoregon.gov
Hector Dominguez - SmartCityPDX - Bureau of Planning and Sustainability
Hector.Dominguez@portlandoregon.gov
Elisabeth Perez - Mayor’s office
Elisabeth.Perez@portlandoregon.gov
Further readings
http://fortune.com/2018/04/10/facebook-cambridge-analytica-what-happened/
https://www.ftc.gov/equifax-data-breach
https://www.washingtonpost.com/news/the-switch/wp/2018/03/01/equifax-keeps-finding-
millions-more-people-who-were-affected-by-its-massive-data-breach/
https://www.forbes.com/sites/bernardmarr/2018/05/21/how-much-data-do-we-create-
every-day-the-mind-blowing-stats-everyone-should-read/
https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-
gdpr/individual-rights/
https://ico.org.uk/for-organisations/guide-to-data-protection/data-protection-principles/
https://ico.org.uk/for-organisations/guide-to-data-protection/conditions-for-processing/
https://en.wikipedia.org/wiki/Privacy_by_design
https://media.nesta.org.uk/documents/DECODE-2018_report-smart-cities.pdf

More Related Content

What's hot

“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation tomasztopa
 
Presentation3
Presentation3Presentation3
Presentation3ITNet
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacyimehreenx
 
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...VALLOYD
 
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015ICT Watch
 
Pubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David MinkPubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David MinkMatt Siltala
 
Big Data and Big Law at Walmart - StampedeCon 2013
Big Data and Big Law at Walmart - StampedeCon 2013Big Data and Big Law at Walmart - StampedeCon 2013
Big Data and Big Law at Walmart - StampedeCon 2013StampedeCon
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challengemsdee3362
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal informationUc Man
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentationmlw32785
 
E governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalfE governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalfE-Journal ICT4D
 
Privacy by design for startups: legal and technology
Privacy by design for startups: legal and technologyPrivacy by design for startups: legal and technology
Privacy by design for startups: legal and technologyIshay Tentser
 
4. florence dupre new usagesprivacy legal framework fd
4. florence dupre new usagesprivacy legal framework fd4. florence dupre new usagesprivacy legal framework fd
4. florence dupre new usagesprivacy legal framework fdGlobalForum
 
Privacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable ClaimsPrivacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable ClaimsDavid Wood
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protectionsp_krishna
 
Solutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionSolutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionTrend Micro
 
661 lead discussion
661   lead discussion661   lead discussion
661 lead discussionguest62b6b81
 

What's hot (20)

“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
Presentation3
Presentation3Presentation3
Presentation3
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
 
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
 
Pubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David MinkPubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David Mink
 
Big Data and Big Law at Walmart - StampedeCon 2013
Big Data and Big Law at Walmart - StampedeCon 2013Big Data and Big Law at Walmart - StampedeCon 2013
Big Data and Big Law at Walmart - StampedeCon 2013
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
 
Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
E governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalfE governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalf
 
Privacy by design for startups: legal and technology
Privacy by design for startups: legal and technologyPrivacy by design for startups: legal and technology
Privacy by design for startups: legal and technology
 
4. florence dupre new usagesprivacy legal framework fd
4. florence dupre new usagesprivacy legal framework fd4. florence dupre new usagesprivacy legal framework fd
4. florence dupre new usagesprivacy legal framework fd
 
Privacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable ClaimsPrivacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable Claims
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
 
Solutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionSolutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryption
 
Trust and inclusion
Trust and inclusionTrust and inclusion
Trust and inclusion
 
661 lead discussion
661   lead discussion661   lead discussion
661 lead discussion
 

Similar to Privacy and data protection primer - City of Portland

Privacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishPrivacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishRSIS International
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
Lesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxLesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxadnis1
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsAT Internet
 
Links Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docxLinks Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docxsmile790243
 
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Ted Myerson
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Fullgloriakt
 
Mantelero collective privacy in3_def
Mantelero collective privacy in3_defMantelero collective privacy in3_def
Mantelero collective privacy in3_defAlessandro Mantelero
 
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptxETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptxurvashipundir04
 

Similar to Privacy and data protection primer - City of Portland (13)

Privacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishPrivacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or Perish
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Lesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxLesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptx
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
Privacy and Surveillance
Privacy and SurveillancePrivacy and Surveillance
Privacy and Surveillance
 
Links Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docxLinks Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docx
 
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
 
Finding balance in the age of open data
Finding balance in the age of open dataFinding balance in the age of open data
Finding balance in the age of open data
 
G0953643
G0953643G0953643
G0953643
 
Marden - Privacy in the 21st Century Why It Matters Now More Than Ever
Marden - Privacy in the 21st Century Why It Matters Now More Than EverMarden - Privacy in the 21st Century Why It Matters Now More Than Ever
Marden - Privacy in the 21st Century Why It Matters Now More Than Ever
 
Mantelero collective privacy in3_def
Mantelero collective privacy in3_defMantelero collective privacy in3_def
Mantelero collective privacy in3_def
 
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptxETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
 

More from Hector Dominguez

Surveillance technologies a primer
Surveillance technologies  a primerSurveillance technologies  a primer
Surveillance technologies a primerHector Dominguez
 
Optimizing water use in agriculture - SmartVinayerds
Optimizing water use in agriculture - SmartVinayerdsOptimizing water use in agriculture - SmartVinayerds
Optimizing water use in agriculture - SmartVinayerdsHector Dominguez
 
Water innovation and IoT technology
Water innovation and IoT technologyWater innovation and IoT technology
Water innovation and IoT technologyHector Dominguez
 
¿Ya superaste la cacofobia?
¿Ya superaste la cacofobia?¿Ya superaste la cacofobia?
¿Ya superaste la cacofobia?Hector Dominguez
 
Presentacion economia solidaria 2013
Presentacion economia solidaria   2013Presentacion economia solidaria   2013
Presentacion economia solidaria 2013Hector Dominguez
 
Presentacion social responsibility
Presentacion social responsibilityPresentacion social responsibility
Presentacion social responsibilityHector Dominguez
 
Sustainable Manufacturing South-South PSU Vietnam forum
Sustainable Manufacturing South-South PSU Vietnam forumSustainable Manufacturing South-South PSU Vietnam forum
Sustainable Manufacturing South-South PSU Vietnam forumHector Dominguez
 
Sesion 8 regulaciones ambientales
Sesion 8   regulaciones ambientalesSesion 8   regulaciones ambientales
Sesion 8 regulaciones ambientalesHector Dominguez
 
Sesion 7 deseño de productos sustentables
Sesion 7   deseño de productos sustentablesSesion 7   deseño de productos sustentables
Sesion 7 deseño de productos sustentablesHector Dominguez
 
Bici maquinas presentación
Bici maquinas presentaciónBici maquinas presentación
Bici maquinas presentaciónHector Dominguez
 
Manufactura sustentable: Realidades, Retos y Estrategias
Manufactura sustentable: Realidades, Retos y EstrategiasManufactura sustentable: Realidades, Retos y Estrategias
Manufactura sustentable: Realidades, Retos y EstrategiasHector Dominguez
 
Sesion 6 herramientas hacia la manufactura sustentable
Sesion 6   herramientas hacia la manufactura sustentableSesion 6   herramientas hacia la manufactura sustentable
Sesion 6 herramientas hacia la manufactura sustentableHector Dominguez
 
Sesion 5 metrica manufactura limpia
Sesion 5   metrica manufactura limpiaSesion 5   metrica manufactura limpia
Sesion 5 metrica manufactura limpiaHector Dominguez
 
Sesion 4 manufactura sustentable 2011
Sesion 4 manufactura sustentable 2011Sesion 4 manufactura sustentable 2011
Sesion 4 manufactura sustentable 2011Hector Dominguez
 
Sesion 3 Manufactura Verde 2011
Sesion 3   Manufactura Verde 2011Sesion 3   Manufactura Verde 2011
Sesion 3 Manufactura Verde 2011Hector Dominguez
 
Sesion 2 Economía Ecológica
Sesion 2   Economía Ecológica Sesion 2   Economía Ecológica
Sesion 2 Economía Ecológica Hector Dominguez
 
Sesion 1 introduccion sustentabilidad
Sesion 1   introduccion sustentabilidadSesion 1   introduccion sustentabilidad
Sesion 1 introduccion sustentabilidadHector Dominguez
 

More from Hector Dominguez (20)

Surveillance technologies a primer
Surveillance technologies  a primerSurveillance technologies  a primer
Surveillance technologies a primer
 
Optimizing water use in agriculture - SmartVinayerds
Optimizing water use in agriculture - SmartVinayerdsOptimizing water use in agriculture - SmartVinayerds
Optimizing water use in agriculture - SmartVinayerds
 
Water innovation and IoT technology
Water innovation and IoT technologyWater innovation and IoT technology
Water innovation and IoT technology
 
¿Ya superaste la cacofobia?
¿Ya superaste la cacofobia?¿Ya superaste la cacofobia?
¿Ya superaste la cacofobia?
 
Presentacion economia solidaria 2013
Presentacion economia solidaria   2013Presentacion economia solidaria   2013
Presentacion economia solidaria 2013
 
Presentacion social responsibility
Presentacion social responsibilityPresentacion social responsibility
Presentacion social responsibility
 
Presentacion real people
Presentacion real peoplePresentacion real people
Presentacion real people
 
Sustainable Manufacturing South-South PSU Vietnam forum
Sustainable Manufacturing South-South PSU Vietnam forumSustainable Manufacturing South-South PSU Vietnam forum
Sustainable Manufacturing South-South PSU Vietnam forum
 
Sesion 9 fábricas verdes
Sesion 9   fábricas verdesSesion 9   fábricas verdes
Sesion 9 fábricas verdes
 
Sesion 8 regulaciones ambientales
Sesion 8   regulaciones ambientalesSesion 8   regulaciones ambientales
Sesion 8 regulaciones ambientales
 
Sesion 7 deseño de productos sustentables
Sesion 7   deseño de productos sustentablesSesion 7   deseño de productos sustentables
Sesion 7 deseño de productos sustentables
 
Familia del magueyal
Familia del magueyalFamilia del magueyal
Familia del magueyal
 
Bici maquinas presentación
Bici maquinas presentaciónBici maquinas presentación
Bici maquinas presentación
 
Manufactura sustentable: Realidades, Retos y Estrategias
Manufactura sustentable: Realidades, Retos y EstrategiasManufactura sustentable: Realidades, Retos y Estrategias
Manufactura sustentable: Realidades, Retos y Estrategias
 
Sesion 6 herramientas hacia la manufactura sustentable
Sesion 6   herramientas hacia la manufactura sustentableSesion 6   herramientas hacia la manufactura sustentable
Sesion 6 herramientas hacia la manufactura sustentable
 
Sesion 5 metrica manufactura limpia
Sesion 5   metrica manufactura limpiaSesion 5   metrica manufactura limpia
Sesion 5 metrica manufactura limpia
 
Sesion 4 manufactura sustentable 2011
Sesion 4 manufactura sustentable 2011Sesion 4 manufactura sustentable 2011
Sesion 4 manufactura sustentable 2011
 
Sesion 3 Manufactura Verde 2011
Sesion 3   Manufactura Verde 2011Sesion 3   Manufactura Verde 2011
Sesion 3 Manufactura Verde 2011
 
Sesion 2 Economía Ecológica
Sesion 2   Economía Ecológica Sesion 2   Economía Ecológica
Sesion 2 Economía Ecológica
 
Sesion 1 introduccion sustentabilidad
Sesion 1   introduccion sustentabilidadSesion 1   introduccion sustentabilidad
Sesion 1 introduccion sustentabilidad
 

Recently uploaded

{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...Pooja Nehwal
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一ffjhghh
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改atducpo
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Jack DiGiovanna
 
Aminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
Aminabad Call Girl Agent 9548273370 , Call Girls Service LucknowAminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
Aminabad Call Girl Agent 9548273370 , Call Girls Service Lucknowmakika9823
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiSuhani Kapoor
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...Suhani Kapoor
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...Suhani Kapoor
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptxthyngster
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfSocial Samosa
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...Suhani Kapoor
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxEmmanuel Dauda
 

Recently uploaded (20)

{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
 
Aminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
Aminabad Call Girl Agent 9548273370 , Call Girls Service LucknowAminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
Aminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
 
E-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptxE-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptx
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptx
 

Privacy and data protection primer - City of Portland

  • 1. Privacy and Data Protection: a primer September, 2018
  • 2.
  • 3. Privacy Paradox How we fear threats on one hand and yet voluntarily give away data elsewhere. Researchers call this conundrum the "privacy paradox". "In a marketplace, there's cooperation and there's definitely an effort to compete by giving people what they want. But there's also the prospect of extracting as much rent as you can." But ultimately,... users' primary concern comes down to this: "People are worried about getting taken advantage of."
  • 4. Privacy: a primer US: “right to privacy” cobbled together via case law (Supreme Court) “The right to privacy refers to the concept that one's personal information is protected from public scrutiny.” …so what could be personal information? …does this apply equally across all forms of information?
  • 5. What is Personal Identifiable Information (PII)? Any representation of information that permits the identity of an individual to whom the information applies to be reasonably inferred by either direct or indirect means. Further, PII is defined as information: (i) that directly identifies an individual (e.g., name, address, social security number or other identifying number or code, telephone number, email address, etc.) or (ii) by which an agency intends to identify specific individuals in conjunction with other data elements, i.e., indirect identification. (These data elements may include a combination of gender, race, birth date, geographic indicator, and other descriptors). Additionally, information permitting the physical or online contacting of a specific individual is the same as personally identifiable information. This information can be maintained in either paper, electronic or other media.
  • 6. PII Legally recognized ‘protected classes’ in US Race (Civil Rights Act of 1964) Color (Civil Rights Act of 1964) Sex (Equal Pay Act of 1963;Civil Rights Act of 1964) Religion (Civil Rights Act of 1964) National origin (Civil Rights Act of 1964) Citizenship (Immigration Reform and Control Act) Age (Age Discrimination in Employment Act of 1967) Pregnancy (Pregnancy Discrimination Act) Familial status (Civil Rights Act of 1968) Disability status (Rehabilitation Act of 1973; Americans with Disabilities Act of 1990) Veteran status (Vietnam Era Veterans' Readjustment Assistance Act of 1974; Uniformed Services Employment and Reemployment Rights Act) Genetic information (Genetic Information Nondiscrimination Act)
  • 7. Data Protection The Management of Personal Information. Data protection is about securing data against unauthorized access. Data privacy is about authorized access — who has it and who defines it. Another way to look at it is this: Data protection is essentially a technical issue, whereas data privacy is a legal one. In Storage, data protection is the assurance that data is not corrupted, is accessible for authorized purposes only, and is in compliance with applicable requirements. In Security, data protection is the implementation of appropriate administrative, technical or physical means to guard against unauthorized intentional or accidental disclosure, modification , or destruction.
  • 8. General Data Protection Regulation (GDPR) Personal data (GDPR) is any information that relates to an identified or identifiable living individual. Different pieces of information, which collected together can lead to the identification of a particular person, also constitute personal data. - European Commission https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/
  • 9. GDPR Data Subject Rights ● Breach Notification ● Right to Access ● Right to Be Forgotten ● Data Portability ● Privacy by Design ● Data Minimization ● Data Protection Officers
  • 10. Two key words on Privacy TRUST - INFORMED CONSENT
  • 11. The generation of Trust Trust is defined as the confidence in something, or to believe in someone based on fairness, truth and reliability. Within the context of Privacy and Data Protection, the following are principles for building Trust: Privacy by design - transparency - data minimization - robust cybersecurity - Accountability - Fairness - Utility - Empathy and Respect : Human Centric design
  • 12. The power of informed consent Consent is an outcome, resulting from a mechanism which strives to obtain it. Merely having an individual check a box or sign a piece of paper is not enough. You must demonstrate that you gave the individual, in a clear and easy to understand fashion, the information necessary to understand the scope and impact of the data processing. Informed consent cannot happen without a clear description of how data is going to be used, by who and under which context.
  • 13. Privacy by Design - Implementation in practice Principle 1: Proactive not reactive: preventative not remedial Principle 2: Privacy as the default setting Principle 3: Privacy embedded into design Principle 4: Full functionality: positive-sum, not zero-sum Principle 5: End-to-end security: full lifecycle protection Principle 6: Visibility and transparency: keep it open Principle 7: Respect for user privacy: keep it user-centric
  • 14. Privacy and Data Protection Assessment ● Who/Recipients - People, organizations and technologies who are the senders, recipients, and subjects of information. ● What/Information - Information type, data fields being used, transmitted or processed ● How/Transformation principles - Constraints and processing through the flow of information. ● Why - Purpose of the use of information ● Where - foreseen effects due to the use or processing of this information
  • 15. Privacy and Data Protection Risks Security. Protect Personal Identifiable Information (PII) Potential discrimination. Big data tools can multiply internal bias effects and become a tool for exclusion. Non compliance. Small data stakeholders are usually in risk of data breachers or exposing information that may lead to de-anonymization of information. Accuracy. If inaccuracies exist in data sets, it can lead to negative effects to individuals or communities. Transparency. Lack of accountability may lead to distrust of any further analysis. Education. Lack of training and use of tools may create false conclusions, as well as expose private data or data that may allow de-anonymization of datasets.
  • 16. Final remarks “Privacy is not something that one has, but something that one seeks to achieve. It requires constant negotiation as information flows and contexts shift. To achieve privacy in a networked world, people must actively try to manage the various social situations in which information is accessed, consumed, interpreted, and shared. They cannot simply focus on restricting the flow of information; they must also account for the ways in which information is inferred and used.” - Reframing Privacy, Data & Society
  • 17. Contacts Judith Mowry - Office of Equity and Human Rights Judith.Mowry@portlandoregon.gov Hector Dominguez - SmartCityPDX - Bureau of Planning and Sustainability Hector.Dominguez@portlandoregon.gov Elisabeth Perez - Mayor’s office Elisabeth.Perez@portlandoregon.gov
  • 18. Further readings http://fortune.com/2018/04/10/facebook-cambridge-analytica-what-happened/ https://www.ftc.gov/equifax-data-breach https://www.washingtonpost.com/news/the-switch/wp/2018/03/01/equifax-keeps-finding- millions-more-people-who-were-affected-by-its-massive-data-breach/ https://www.forbes.com/sites/bernardmarr/2018/05/21/how-much-data-do-we-create- every-day-the-mind-blowing-stats-everyone-should-read/ https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation- gdpr/individual-rights/ https://ico.org.uk/for-organisations/guide-to-data-protection/data-protection-principles/ https://ico.org.uk/for-organisations/guide-to-data-protection/conditions-for-processing/ https://en.wikipedia.org/wiki/Privacy_by_design https://media.nesta.org.uk/documents/DECODE-2018_report-smart-cities.pdf