SlideShare a Scribd company logo
1 of 8
Biometrics: redefining privacy
Can biometrics create a new kind of
privacy using bodies, not
passwords?
Juliet Lodge
Nesta, London 25 March 2014 Juliet Lodge
Biometrics – and privacy
‘… only a problem of labelling ‘ (UK Min)
Definition
Transparency
& the 60% rule
• Constitutional
• Procedural
• Practice as deception
• Trust and Privacy :
Who’s in control
Nesta, London 25 March 2014 Juliet Lodge
Starting point : the end of privacy
And what I call ‘Perverse Biometrics’ and
‘Quantum surveillance’
• Mission creep from territorial
border security to smart IoT, robotics
• Legitimising PPPs, data blending
• Insufficiency of scope of ethical codes apps
• Inadequate or obsolete politico-legal controls
Nesta, London 25 March 2014 : Juliet Lodge 3
Do Biometric apps redefine meaning
of privacy and transparency?
Constitutional: parallels in
misunderstanding
‘EU Council worse than a papal enclave’.
Duff, MEP
Procedural : … foreign ‘hysteria over EU
data protection laws ‘Jan Albrecht MEP
Fundamental rights v. Profits: ‘IT giants ...
trying to lobby away right to privacy’ Max
Shrems
Impact of biometric cyberworld on meaning of the
above and what it means to be human?
Recommendations.
Nesta, London 25 March 2014 Juliet Lodge
Perverse Biometrics – door to
quantum surveillance or credible
privacy?
Contradictory claimsmaking
• individual and/or collective privacy
• user control over personal data
• Legal certainty v. Technical credibility of new EU Regulation
on DP re: ‘right to be forgotten’
• The who, what and how of support measures: what
insufficiencies need addressing?
• Inconsistencies in law ( egEU regs and directives)
• Risks to fundamental rights for all
• Lack of consensus over biometrics beyond the fingerprint
Nesta, London 25 March 2014 Juliet Lodge
Purpose of an Independent
Kitemark?
• restore trust in resilience of ICTs and
credibility of Gov and PPS
• combat risks of (un)ethical human
(in)security
• give privacy genuine meaning and
credibility
• RECOMMENDATIONS from our ICT Ethics
f7p research project incl: - Complement
PIAs with EIAs
Nesta, London 25 March 2014: Juliet Lodge 6
Conclusion – trust what? The
certainty fallacy and perverse
biometrics
• Technology is insufficient as a privacy guardian
• Who’s in control?
• Ethical values and practice must inform info
collection, handling etc and can do so only if
human intervention (whether public or private
sector) is visible, identifiable and accountable
• How biometrics can uphold T & A to ensure
trust in hyperconnected/adjacent maximising
realities.
Nesta, London 25 March 2014 Juliet Lodge
Biometrics, privacy and
(un)certainty
‘Citizens must be able to understand
the system so that they can identify
its problems, criticise it, and
ultimately control it.’
Final report of the Convention on the Future of Europe
Working Group IX on Simplification 29 Nov 2002
[CONV 424/02 WGIX 13]
Nesta, London 25 March 2014 Juliet Lodge

More Related Content

What's hot

Caribbean needs more inclusive approach towards digital economy particpation
Caribbean needs more inclusive approach towards digital economy particpationCaribbean needs more inclusive approach towards digital economy particpation
Caribbean needs more inclusive approach towards digital economy particpationShiva Bissessar
 
Call for Papers-International Journal of Mobile Network Communications & Tele...
Call for Papers-International Journal of Mobile Network Communications & Tele...Call for Papers-International Journal of Mobile Network Communications & Tele...
Call for Papers-International Journal of Mobile Network Communications & Tele...ijmnct
 
Internet of things
Internet of thingsInternet of things
Internet of thingsSanoj Kumar
 
Internet Society (ISOC Uk England) Webinar on User Trust
Internet Society (ISOC Uk England) Webinar on User TrustInternet Society (ISOC Uk England) Webinar on User Trust
Internet Society (ISOC Uk England) Webinar on User TrustAnsgar Koene
 
Towards Privacy by Design. Key issues to unlock science.
Towards Privacy by Design. Key issues to unlock science.Towards Privacy by Design. Key issues to unlock science.
Towards Privacy by Design. Key issues to unlock science.Marlon Domingus
 
Call for Paper - International Journal of Mobile Network Communications & Tel...
Call for Paper - International Journal of Mobile Network Communications & Tel...Call for Paper - International Journal of Mobile Network Communications & Tel...
Call for Paper - International Journal of Mobile Network Communications & Tel...ijmnct
 
Crowdsourcing and data journalism
Crowdsourcing and data journalism Crowdsourcing and data journalism
Crowdsourcing and data journalism Tanja Aitamurto
 
Making sense of big data
Making sense of big dataMaking sense of big data
Making sense of big databis_foresight
 
Call for Paper - International Journal of Mobile Network Communications & Tel...
Call for Paper - International Journal of Mobile Network Communications & Tel...Call for Paper - International Journal of Mobile Network Communications & Tel...
Call for Paper - International Journal of Mobile Network Communications & Tel...ijmnct
 
Ijmnct cfp july 25
Ijmnct cfp july 25Ijmnct cfp july 25
Ijmnct cfp july 25ijmnct
 
My Privacy at Risk, is it Safe?
My Privacy at Risk, is it Safe?My Privacy at Risk, is it Safe?
My Privacy at Risk, is it Safe?Andreas Drakos
 

What's hot (13)

Caribbean needs more inclusive approach towards digital economy particpation
Caribbean needs more inclusive approach towards digital economy particpationCaribbean needs more inclusive approach towards digital economy particpation
Caribbean needs more inclusive approach towards digital economy particpation
 
Call for Papers-International Journal of Mobile Network Communications & Tele...
Call for Papers-International Journal of Mobile Network Communications & Tele...Call for Papers-International Journal of Mobile Network Communications & Tele...
Call for Papers-International Journal of Mobile Network Communications & Tele...
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Sfit2
Sfit2Sfit2
Sfit2
 
Internet Society (ISOC Uk England) Webinar on User Trust
Internet Society (ISOC Uk England) Webinar on User TrustInternet Society (ISOC Uk England) Webinar on User Trust
Internet Society (ISOC Uk England) Webinar on User Trust
 
Krishna kumar singh
Krishna kumar singhKrishna kumar singh
Krishna kumar singh
 
Towards Privacy by Design. Key issues to unlock science.
Towards Privacy by Design. Key issues to unlock science.Towards Privacy by Design. Key issues to unlock science.
Towards Privacy by Design. Key issues to unlock science.
 
Call for Paper - International Journal of Mobile Network Communications & Tel...
Call for Paper - International Journal of Mobile Network Communications & Tel...Call for Paper - International Journal of Mobile Network Communications & Tel...
Call for Paper - International Journal of Mobile Network Communications & Tel...
 
Crowdsourcing and data journalism
Crowdsourcing and data journalism Crowdsourcing and data journalism
Crowdsourcing and data journalism
 
Making sense of big data
Making sense of big dataMaking sense of big data
Making sense of big data
 
Call for Paper - International Journal of Mobile Network Communications & Tel...
Call for Paper - International Journal of Mobile Network Communications & Tel...Call for Paper - International Journal of Mobile Network Communications & Tel...
Call for Paper - International Journal of Mobile Network Communications & Tel...
 
Ijmnct cfp july 25
Ijmnct cfp july 25Ijmnct cfp july 25
Ijmnct cfp july 25
 
My Privacy at Risk, is it Safe?
My Privacy at Risk, is it Safe?My Privacy at Risk, is it Safe?
My Privacy at Risk, is it Safe?
 

Similar to Prof juliet lodge nesta presentation on biometrics and privacy

Riseptis report 1
Riseptis report 1Riseptis report 1
Riseptis report 1vafopoulos
 
Marsden Regulating Disinformation Kluge 342020
Marsden Regulating Disinformation Kluge 342020Marsden Regulating Disinformation Kluge 342020
Marsden Regulating Disinformation Kluge 342020Chris Marsden
 
DAY 1_ITEM 4_Privacy and personal data protection.ppt
DAY 1_ITEM 4_Privacy and personal data protection.pptDAY 1_ITEM 4_Privacy and personal data protection.ppt
DAY 1_ITEM 4_Privacy and personal data protection.pptGmvViju1
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsIrish Future Internet Forum
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodblogzilla
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemSimon Aderinlola
 
Surveillance_Consultation_Paper
Surveillance_Consultation_PaperSurveillance_Consultation_Paper
Surveillance_Consultation_PaperLara Rabiee
 
Caroline pauwels digital society
Caroline pauwels   digital societyCaroline pauwels   digital society
Caroline pauwels digital societyimec.archive
 
Caroline pauwels digital society
Caroline pauwels   digital societyCaroline pauwels   digital society
Caroline pauwels digital societyimec.archive
 
Governing algorithms – perils and powers of ai in the public sector1(1)
Governing algorithms – perils and powers of ai in the public sector1(1)Governing algorithms – perils and powers of ai in the public sector1(1)
Governing algorithms – perils and powers of ai in the public sector1(1)PanagiotisKeramidis
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obamaLilian Edwards
 
The death of data protection
The death of data protection The death of data protection
The death of data protection Lilian Edwards
 
CINECA webinar slides: Status Update Code of Conduct: Teaming up & Talking ab...
CINECA webinar slides: Status Update Code of Conduct: Teaming up & Talking ab...CINECA webinar slides: Status Update Code of Conduct: Teaming up & Talking ab...
CINECA webinar slides: Status Update Code of Conduct: Teaming up & Talking ab...CINECAProject
 
Identity & Health in a Digital World (Emory)
Identity & Health in a Digital World (Emory)Identity & Health in a Digital World (Emory)
Identity & Health in a Digital World (Emory)Deborah Gonzalez, Esq.
 
COVID-19 and Contact Tracing Apps - What Should Ireland Do? - Webinar
COVID-19 and Contact Tracing Apps - What Should Ireland Do? - WebinarCOVID-19 and Contact Tracing Apps - What Should Ireland Do? - Webinar
COVID-19 and Contact Tracing Apps - What Should Ireland Do? - Webinardri_ireland
 

Similar to Prof juliet lodge nesta presentation on biometrics and privacy (20)

Riseptis report 1
Riseptis report 1Riseptis report 1
Riseptis report 1
 
Marsden Regulating Disinformation Kluge 342020
Marsden Regulating Disinformation Kluge 342020Marsden Regulating Disinformation Kluge 342020
Marsden Regulating Disinformation Kluge 342020
 
DAY 1_ITEM 4_Privacy and personal data protection.ppt
DAY 1_ITEM 4_Privacy and personal data protection.pptDAY 1_ITEM 4_Privacy and personal data protection.ppt
DAY 1_ITEM 4_Privacy and personal data protection.ppt
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public good
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
 
Data-sharing, individual rights, and the future | Victoria Cetinkaya | Januar...
Data-sharing, individual rights, and the future | Victoria Cetinkaya | Januar...Data-sharing, individual rights, and the future | Victoria Cetinkaya | Januar...
Data-sharing, individual rights, and the future | Victoria Cetinkaya | Januar...
 
Identity Management Policy Seminar
Identity Management Policy SeminarIdentity Management Policy Seminar
Identity Management Policy Seminar
 
Surveillance_Consultation_Paper
Surveillance_Consultation_PaperSurveillance_Consultation_Paper
Surveillance_Consultation_Paper
 
Caroline pauwels digital society
Caroline pauwels   digital societyCaroline pauwels   digital society
Caroline pauwels digital society
 
Caroline pauwels digital society
Caroline pauwels   digital societyCaroline pauwels   digital society
Caroline pauwels digital society
 
Governing algorithms – perils and powers of ai in the public sector1(1)
Governing algorithms – perils and powers of ai in the public sector1(1)Governing algorithms – perils and powers of ai in the public sector1(1)
Governing algorithms – perils and powers of ai in the public sector1(1)
 
Multimedia Privacy
Multimedia PrivacyMultimedia Privacy
Multimedia Privacy
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obama
 
The death of data protection
The death of data protection The death of data protection
The death of data protection
 
CINECA webinar slides: Status Update Code of Conduct: Teaming up & Talking ab...
CINECA webinar slides: Status Update Code of Conduct: Teaming up & Talking ab...CINECA webinar slides: Status Update Code of Conduct: Teaming up & Talking ab...
CINECA webinar slides: Status Update Code of Conduct: Teaming up & Talking ab...
 
Identity & Health in a Digital World (Emory)
Identity & Health in a Digital World (Emory)Identity & Health in a Digital World (Emory)
Identity & Health in a Digital World (Emory)
 
Sfit1
Sfit1Sfit1
Sfit1
 
The BYTE Project
The BYTE Project The BYTE Project
The BYTE Project
 
COVID-19 and Contact Tracing Apps - What Should Ireland Do? - Webinar
COVID-19 and Contact Tracing Apps - What Should Ireland Do? - WebinarCOVID-19 and Contact Tracing Apps - What Should Ireland Do? - Webinar
COVID-19 and Contact Tracing Apps - What Should Ireland Do? - Webinar
 

More from Nesta

Added value test
Added value testAdded value test
Added value testNesta
 
Nesta impact partnerships
Nesta impact partnershipsNesta impact partnerships
Nesta impact partnershipsNesta
 
Open Jobs
Open JobsOpen Jobs
Open JobsNesta
 
Crowdfunding good causes
Crowdfunding good causesCrowdfunding good causes
Crowdfunding good causesNesta
 
Realising the Value Stakeholder Event - Main slide deck
Realising the Value Stakeholder Event - Main slide deckRealising the Value Stakeholder Event - Main slide deck
Realising the Value Stakeholder Event - Main slide deckNesta
 
Realising the Value Stakeholder Event -Workshop: How does the system support
Realising the Value Stakeholder Event -Workshop: How does the system support Realising the Value Stakeholder Event -Workshop: How does the system support
Realising the Value Stakeholder Event -Workshop: How does the system support Nesta
 
Realising the Value Stakeholder Event - Workshop:Prioritising our ‘long list’...
Realising the Value Stakeholder Event - Workshop:Prioritising our ‘long list’...Realising the Value Stakeholder Event - Workshop:Prioritising our ‘long list’...
Realising the Value Stakeholder Event - Workshop:Prioritising our ‘long list’...Nesta
 
Realising the Value Stakeholder Event - Workshop:Let's think in terms of beha...
Realising the Value Stakeholder Event - Workshop:Let's think in terms of beha...Realising the Value Stakeholder Event - Workshop:Let's think in terms of beha...
Realising the Value Stakeholder Event - Workshop:Let's think in terms of beha...Nesta
 
Realising the Value Stakeholder Event - Workshop: How do we understand value?
Realising the Value Stakeholder Event - Workshop: How do we understand value? Realising the Value Stakeholder Event - Workshop: How do we understand value?
Realising the Value Stakeholder Event - Workshop: How do we understand value? Nesta
 
Sabine Junginger: Developing & Maintaining Design Capabilities
Sabine Junginger: Developing & Maintaining Design Capabilities Sabine Junginger: Developing & Maintaining Design Capabilities
Sabine Junginger: Developing & Maintaining Design Capabilities Nesta
 
Stephane Vincent: Empowering civil servants with service design skills
Stephane Vincent: Empowering civil servants with service design skillsStephane Vincent: Empowering civil servants with service design skills
Stephane Vincent: Empowering civil servants with service design skillsNesta
 
Dominic Campbell: Futuregov
Dominic Campbell: FuturegovDominic Campbell: Futuregov
Dominic Campbell: FuturegovNesta
 
Stian Westlake: the quiet rebirth of industrial policy
Stian Westlake: the quiet rebirth of industrial policyStian Westlake: the quiet rebirth of industrial policy
Stian Westlake: the quiet rebirth of industrial policyNesta
 
Stian Westlake: six trends of the future
Stian Westlake: six trends of the futureStian Westlake: six trends of the future
Stian Westlake: six trends of the futureNesta
 
Oliver Quinlan: new movement in education
Oliver Quinlan: new movement in educationOliver Quinlan: new movement in education
Oliver Quinlan: new movement in educationNesta
 
Prof. Mike Osborne: creativity vs. robots
Prof. Mike Osborne: creativity vs. robotsProf. Mike Osborne: creativity vs. robots
Prof. Mike Osborne: creativity vs. robotsNesta
 
Prof. Mike Osborne: the future of employment
Prof. Mike Osborne: the future of employmentProf. Mike Osborne: the future of employment
Prof. Mike Osborne: the future of employmentNesta
 
Mark Bartlett: the future of personalised medicine
Mark Bartlett: the future of personalised medicineMark Bartlett: the future of personalised medicine
Mark Bartlett: the future of personalised medicineNesta
 
John Loder: people powered health
John Loder: people powered healthJohn Loder: people powered health
John Loder: people powered healthNesta
 
Jenny Barnett: digital healthcare
Jenny Barnett: digital healthcareJenny Barnett: digital healthcare
Jenny Barnett: digital healthcareNesta
 

More from Nesta (20)

Added value test
Added value testAdded value test
Added value test
 
Nesta impact partnerships
Nesta impact partnershipsNesta impact partnerships
Nesta impact partnerships
 
Open Jobs
Open JobsOpen Jobs
Open Jobs
 
Crowdfunding good causes
Crowdfunding good causesCrowdfunding good causes
Crowdfunding good causes
 
Realising the Value Stakeholder Event - Main slide deck
Realising the Value Stakeholder Event - Main slide deckRealising the Value Stakeholder Event - Main slide deck
Realising the Value Stakeholder Event - Main slide deck
 
Realising the Value Stakeholder Event -Workshop: How does the system support
Realising the Value Stakeholder Event -Workshop: How does the system support Realising the Value Stakeholder Event -Workshop: How does the system support
Realising the Value Stakeholder Event -Workshop: How does the system support
 
Realising the Value Stakeholder Event - Workshop:Prioritising our ‘long list’...
Realising the Value Stakeholder Event - Workshop:Prioritising our ‘long list’...Realising the Value Stakeholder Event - Workshop:Prioritising our ‘long list’...
Realising the Value Stakeholder Event - Workshop:Prioritising our ‘long list’...
 
Realising the Value Stakeholder Event - Workshop:Let's think in terms of beha...
Realising the Value Stakeholder Event - Workshop:Let's think in terms of beha...Realising the Value Stakeholder Event - Workshop:Let's think in terms of beha...
Realising the Value Stakeholder Event - Workshop:Let's think in terms of beha...
 
Realising the Value Stakeholder Event - Workshop: How do we understand value?
Realising the Value Stakeholder Event - Workshop: How do we understand value? Realising the Value Stakeholder Event - Workshop: How do we understand value?
Realising the Value Stakeholder Event - Workshop: How do we understand value?
 
Sabine Junginger: Developing & Maintaining Design Capabilities
Sabine Junginger: Developing & Maintaining Design Capabilities Sabine Junginger: Developing & Maintaining Design Capabilities
Sabine Junginger: Developing & Maintaining Design Capabilities
 
Stephane Vincent: Empowering civil servants with service design skills
Stephane Vincent: Empowering civil servants with service design skillsStephane Vincent: Empowering civil servants with service design skills
Stephane Vincent: Empowering civil servants with service design skills
 
Dominic Campbell: Futuregov
Dominic Campbell: FuturegovDominic Campbell: Futuregov
Dominic Campbell: Futuregov
 
Stian Westlake: the quiet rebirth of industrial policy
Stian Westlake: the quiet rebirth of industrial policyStian Westlake: the quiet rebirth of industrial policy
Stian Westlake: the quiet rebirth of industrial policy
 
Stian Westlake: six trends of the future
Stian Westlake: six trends of the futureStian Westlake: six trends of the future
Stian Westlake: six trends of the future
 
Oliver Quinlan: new movement in education
Oliver Quinlan: new movement in educationOliver Quinlan: new movement in education
Oliver Quinlan: new movement in education
 
Prof. Mike Osborne: creativity vs. robots
Prof. Mike Osborne: creativity vs. robotsProf. Mike Osborne: creativity vs. robots
Prof. Mike Osborne: creativity vs. robots
 
Prof. Mike Osborne: the future of employment
Prof. Mike Osborne: the future of employmentProf. Mike Osborne: the future of employment
Prof. Mike Osborne: the future of employment
 
Mark Bartlett: the future of personalised medicine
Mark Bartlett: the future of personalised medicineMark Bartlett: the future of personalised medicine
Mark Bartlett: the future of personalised medicine
 
John Loder: people powered health
John Loder: people powered healthJohn Loder: people powered health
John Loder: people powered health
 
Jenny Barnett: digital healthcare
Jenny Barnett: digital healthcareJenny Barnett: digital healthcare
Jenny Barnett: digital healthcare
 

Recently uploaded

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 

Prof juliet lodge nesta presentation on biometrics and privacy

  • 1. Biometrics: redefining privacy Can biometrics create a new kind of privacy using bodies, not passwords? Juliet Lodge Nesta, London 25 March 2014 Juliet Lodge
  • 2. Biometrics – and privacy ‘… only a problem of labelling ‘ (UK Min) Definition Transparency & the 60% rule • Constitutional • Procedural • Practice as deception • Trust and Privacy : Who’s in control Nesta, London 25 March 2014 Juliet Lodge
  • 3. Starting point : the end of privacy And what I call ‘Perverse Biometrics’ and ‘Quantum surveillance’ • Mission creep from territorial border security to smart IoT, robotics • Legitimising PPPs, data blending • Insufficiency of scope of ethical codes apps • Inadequate or obsolete politico-legal controls Nesta, London 25 March 2014 : Juliet Lodge 3
  • 4. Do Biometric apps redefine meaning of privacy and transparency? Constitutional: parallels in misunderstanding ‘EU Council worse than a papal enclave’. Duff, MEP Procedural : … foreign ‘hysteria over EU data protection laws ‘Jan Albrecht MEP Fundamental rights v. Profits: ‘IT giants ... trying to lobby away right to privacy’ Max Shrems Impact of biometric cyberworld on meaning of the above and what it means to be human? Recommendations. Nesta, London 25 March 2014 Juliet Lodge
  • 5. Perverse Biometrics – door to quantum surveillance or credible privacy? Contradictory claimsmaking • individual and/or collective privacy • user control over personal data • Legal certainty v. Technical credibility of new EU Regulation on DP re: ‘right to be forgotten’ • The who, what and how of support measures: what insufficiencies need addressing? • Inconsistencies in law ( egEU regs and directives) • Risks to fundamental rights for all • Lack of consensus over biometrics beyond the fingerprint Nesta, London 25 March 2014 Juliet Lodge
  • 6. Purpose of an Independent Kitemark? • restore trust in resilience of ICTs and credibility of Gov and PPS • combat risks of (un)ethical human (in)security • give privacy genuine meaning and credibility • RECOMMENDATIONS from our ICT Ethics f7p research project incl: - Complement PIAs with EIAs Nesta, London 25 March 2014: Juliet Lodge 6
  • 7. Conclusion – trust what? The certainty fallacy and perverse biometrics • Technology is insufficient as a privacy guardian • Who’s in control? • Ethical values and practice must inform info collection, handling etc and can do so only if human intervention (whether public or private sector) is visible, identifiable and accountable • How biometrics can uphold T & A to ensure trust in hyperconnected/adjacent maximising realities. Nesta, London 25 March 2014 Juliet Lodge
  • 8. Biometrics, privacy and (un)certainty ‘Citizens must be able to understand the system so that they can identify its problems, criticise it, and ultimately control it.’ Final report of the Convention on the Future of Europe Working Group IX on Simplification 29 Nov 2002 [CONV 424/02 WGIX 13] Nesta, London 25 March 2014 Juliet Lodge