SlideShare a Scribd company logo
1 of 15
Using the Power of
    Non-Identifying Energy Data


       Ann Cavoukian, Ph.D.
Information and Privacy Commissioner
               Ontario

          Future of Energy Summit
               June 8, 2012
Using the Power of Data


 Big Data ………Yes

Energy Data …...Yes

Personal Data – No!
Personal Privacy
        Must Remain Paramount
“The smart grid is certainly a good
idea, which I strongly support. But the
focus has been so singularly on
controlling energy use that I think the
privacy issue is a sleeper – it is not
top-of-mind.”
            — Commissioner Cavoukian

“We’ve taken the advice of the privacy
commissioner upfront before the smart
grid is even put in place.”
      — Brad Duguid,
Ontario Minister of Energy and Infrastructure

    Toronto Star, May 12, 2010
                                                http://tinyurl.com/24dzn9j
“Assets Beyond the Meter –
           Who Should Own Them?”
“There are sound reasons why energy consumers should
remain in control of the energy consumption information
they produce, even if there isn’t a law that requires this.
The underlying rationale is that consumer confidence and
trust in the Smart Grid, and in one’s local electricity
distributors, is vital in achieving the vision of a more
energy efficient electrical grid.”
                                       — Commissioner Cavoukian,
                                    Electric Light & Power Magazine
                                                       www.elp.com
Why Utilities Should Be Concerned
• Little consumer confidence and trust, one example:
• Residents of Marin County, California, created a road
  blockade to prevent PG&E trucks from going into their
  town to install smart meters;
• Residents were worried about their privacy, saying:
  “I don't want to be watched all the time;”
• 79% knew little or nothing about the smart grid;
• 76% didn’t know anything about smart meters;
   (Market Strategies International Study, 2010);
• As a result, consumers are wary, and at times, hostile.
The Decade of Privacy by Design
Adoption of “Privacy by Design”
         as an International Standard

Landmark Resolution Passed to Preserve
  the Future of Privacy
By Anna Ohlden – October 29th 2010 - http://www.science20.com/newswire/landmark_resolution_passed_preserve_future_privacy

JERUSALEM, October 29, 2010 – A landmark Resolution by
Ontario's Information and Privacy Commissioner, Dr. Ann Cavoukian,
was unanimously passed by International Data Protection and Privacy
Commissioners in Jerusalem today at their annual conference.
The resolution ensures that privacy is embedded into new technologies
and business practices, right from the outset – as an essential
component of fundamental privacy protection.

                                                  Full Article:
 http://www.science20.com/newswire/landmark_resolution_passed_preserve_future_privacy
Privacy by Design:
             The 7 Foundational Principles
1. Proactive not Reactive:
    Preventative, not Remedial;
3. Privacy as the Default setting;
5. Privacy Embedded into Design;
7. Full Functionality:
    Positive-Sum, not Zero-Sum;
9. End-to-End Security:
       Full Lifecycle Protection;
11. Visibility and Transparency:
       Keep it Open;
13. Respect for User Privacy:
       Keep it User-Centric.
                         www.ipc.on.ca/images/Resources/7foundationalprinciples.pdf
Joint Smart Grid Papers
Consumer Energy Usage Data = PII
• U.S. Department of Energy identified the issue of third party
  access to consumer-specific energy-usage data (CEUD) as…
  “perhaps the most critical question in the context of Smart Grid
  technologies” … “consumers should have rights to protect the
  privacy of their own CEUD and control access to it;”
• California Public Utility Commission issued a decision
  adopting rules to protect the privacy and security of customer
  electricity usage data, commending Privacy by Design:
“The Privacy by Design methodology offers a promising
  approach to ensuring that data practices promote privacy,
  not just in the FIP of data minimization, but in all aspects of
  privacy planning.”
Consumer Energy Usage Data (Cont’d)

• North American Energy Standards Board
  (NAESB) issued Business Practices for Third Party
  Access to Smart Meter-based Information. This
  guidance adopts Fair Information Practices, requiring
  informed consent, transparency, and accountability;
• My office is collaborating with NIST, the National
  Institute of Standards and Technology as part of its
  Cyber Security Working Group where Privacy by
  Design was cited in their Guidelines for Smart Grid
  Cyber Security: V. 2, Privacy and the Smart Grid.
“Big Data”
• Each day we create 2.5 quintillion bytes of data
  – 90% of the data today has been created in the
  past 2 years;
• Big data analysis and data analytics promises new
  opportunities to gain valuable insights and benefits,
  (e.g., improving pandemic response, advances in
  cancer research, etc.);
• However, it can also enable expanded surveillance,
  on a scale previously unimaginable;
• This situation cries out for a positive-sum solution,
  win-win strategy.
Announcing:
“Privacy by Design in the Age of Big Data”
• The Big Difference with
  Big Data;
• “Sensemaking” Systems;
• Privacy by Design in the
  Age of Big Data;
• The Creation of a Big Data
  Sensemaking System
  through PbD.

                               www.privacybydesign.ca
Conclusions

• Lead with Privacy by Design, featuring control over
  customer energy usage data – maintaining consumer
  confidence and trust will be essential;
• Make sure that privacy is strongly addressed – right
  from the outset – make it a priority by embedding it into
  technology and business practices;
• Enable both the Smart Grid and Privacy to grow in tandem
  – not one at the expense of the other – prevent the data
  breach … enable the service;
• If you don’t lead with Privacy, by Design, you may end up
  with privacy by chance – or worse, Privacy by Disaster!
How to Contact Us

  Ann Cavoukian, Ph.D.
  Information & Privacy Commissioner of Ontario
  2 Bloor Street East, Suite 1400
  Toronto, Ontario, Canada
  M4W 1A8
  Phone: (416) 326-3948 / 1-800-387-0073
  Web: www.ipc.on.ca
  E-mail: info@ipc.on.ca

For more information on Privacy by Design,        please
             visit: www.privacybydesign.ca

More Related Content

What's hot

Big Data and High Performance Computing
Big Data and High Performance ComputingBig Data and High Performance Computing
Big Data and High Performance ComputingAbzetdin Adamov
 
Towards Privacy by Design. Key issues to unlock science.
Towards Privacy by Design. Key issues to unlock science.Towards Privacy by Design. Key issues to unlock science.
Towards Privacy by Design. Key issues to unlock science.Marlon Domingus
 
Privacy by Design Seminar - Jan 22, 2015
Privacy by Design Seminar - Jan 22, 2015Privacy by Design Seminar - Jan 22, 2015
Privacy by Design Seminar - Jan 22, 2015Dr. Ann Cavoukian
 
CYBERSECURITY LEGISLATION
CYBERSECURITY LEGISLATIONCYBERSECURITY LEGISLATION
CYBERSECURITY LEGISLATION3.com
 
Capstone Final Presentation
Capstone Final PresentationCapstone Final Presentation
Capstone Final PresentationKartik Uppal
 
Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...
Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...
Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...Marie-Michelle Strah, PhD
 
Innovation in the Power Systems industry CIGRE
Innovation in the Power Systems industry CIGREInnovation in the Power Systems industry CIGRE
Innovation in the Power Systems industry CIGREPower System Operation
 
It's About the Data, Stupid: Mobile Security and BYOD for Healthcare
It's About the Data, Stupid: Mobile Security and BYOD for HealthcareIt's About the Data, Stupid: Mobile Security and BYOD for Healthcare
It's About the Data, Stupid: Mobile Security and BYOD for HealthcareMarie-Michelle Strah, PhD
 
Legal certainty as a tool for the spread of the internet of things
Legal certainty as a tool for the spread of the internet of thingsLegal certainty as a tool for the spread of the internet of things
Legal certainty as a tool for the spread of the internet of thingsGuido Noto La Diega
 
Innovation in the Power Systems industry
Innovation in the Power Systems industryInnovation in the Power Systems industry
Innovation in the Power Systems industryPower System Operation
 
Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathakChintan Pathak
 
Closing the Loop - From Citizen Sensing to Citizen Actuation
Closing the Loop - From Citizen Sensing to Citizen ActuationClosing the Loop - From Citizen Sensing to Citizen Actuation
Closing the Loop - From Citizen Sensing to Citizen ActuationDavid Crowley
 
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Adam Thierer
 
Cloud Computing: What You Don't Know Can Hurt You
Cloud Computing:  What You Don't Know Can Hurt YouCloud Computing:  What You Don't Know Can Hurt You
Cloud Computing: What You Don't Know Can Hurt YouPatrick Fowler
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawftii
 
Improving Policy Coherence and Accessibility through Semantic Web Technologie...
Improving Policy Coherence and Accessibility through Semantic Web Technologie...Improving Policy Coherence and Accessibility through Semantic Web Technologie...
Improving Policy Coherence and Accessibility through Semantic Web Technologie...Edward Curry
 
How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...Giulio Coraggio
 
ACS cloud discussion paper
ACS cloud discussion paperACS cloud discussion paper
ACS cloud discussion paperRoland Padilla
 
Metodologías de evaluación para incrementar el valor de incorporar tecnología...
Metodologías de evaluación para incrementar el valor de incorporar tecnología...Metodologías de evaluación para incrementar el valor de incorporar tecnología...
Metodologías de evaluación para incrementar el valor de incorporar tecnología...Ministerio TIC Colombia
 

What's hot (19)

Big Data and High Performance Computing
Big Data and High Performance ComputingBig Data and High Performance Computing
Big Data and High Performance Computing
 
Towards Privacy by Design. Key issues to unlock science.
Towards Privacy by Design. Key issues to unlock science.Towards Privacy by Design. Key issues to unlock science.
Towards Privacy by Design. Key issues to unlock science.
 
Privacy by Design Seminar - Jan 22, 2015
Privacy by Design Seminar - Jan 22, 2015Privacy by Design Seminar - Jan 22, 2015
Privacy by Design Seminar - Jan 22, 2015
 
CYBERSECURITY LEGISLATION
CYBERSECURITY LEGISLATIONCYBERSECURITY LEGISLATION
CYBERSECURITY LEGISLATION
 
Capstone Final Presentation
Capstone Final PresentationCapstone Final Presentation
Capstone Final Presentation
 
Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...
Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...
Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...
 
Innovation in the Power Systems industry CIGRE
Innovation in the Power Systems industry CIGREInnovation in the Power Systems industry CIGRE
Innovation in the Power Systems industry CIGRE
 
It's About the Data, Stupid: Mobile Security and BYOD for Healthcare
It's About the Data, Stupid: Mobile Security and BYOD for HealthcareIt's About the Data, Stupid: Mobile Security and BYOD for Healthcare
It's About the Data, Stupid: Mobile Security and BYOD for Healthcare
 
Legal certainty as a tool for the spread of the internet of things
Legal certainty as a tool for the spread of the internet of thingsLegal certainty as a tool for the spread of the internet of things
Legal certainty as a tool for the spread of the internet of things
 
Innovation in the Power Systems industry
Innovation in the Power Systems industryInnovation in the Power Systems industry
Innovation in the Power Systems industry
 
Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathak
 
Closing the Loop - From Citizen Sensing to Citizen Actuation
Closing the Loop - From Citizen Sensing to Citizen ActuationClosing the Loop - From Citizen Sensing to Citizen Actuation
Closing the Loop - From Citizen Sensing to Citizen Actuation
 
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
 
Cloud Computing: What You Don't Know Can Hurt You
Cloud Computing:  What You Don't Know Can Hurt YouCloud Computing:  What You Don't Know Can Hurt You
Cloud Computing: What You Don't Know Can Hurt You
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlaw
 
Improving Policy Coherence and Accessibility through Semantic Web Technologie...
Improving Policy Coherence and Accessibility through Semantic Web Technologie...Improving Policy Coherence and Accessibility through Semantic Web Technologie...
Improving Policy Coherence and Accessibility through Semantic Web Technologie...
 
How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...
 
ACS cloud discussion paper
ACS cloud discussion paperACS cloud discussion paper
ACS cloud discussion paper
 
Metodologías de evaluación para incrementar el valor de incorporar tecnología...
Metodologías de evaluación para incrementar el valor de incorporar tecnología...Metodologías de evaluación para incrementar el valor de incorporar tecnología...
Metodologías de evaluación para incrementar el valor de incorporar tecnología...
 

Viewers also liked

Designing the grid of the future by Stefan Kuppers
Designing the grid of the future by Stefan KuppersDesigning the grid of the future by Stefan Kuppers
Designing the grid of the future by Stefan KuppersMaRS Discovery District
 
Emerging energy generation and storage technology by Ted Sargent
Emerging energy generation and storage technology by  Ted SargentEmerging energy generation and storage technology by  Ted Sargent
Emerging energy generation and storage technology by Ted SargentMaRS Discovery District
 
Partnerships: A necessary evil? - MaRS Best Practices
Partnerships: A necessary evil? - MaRS Best PracticesPartnerships: A necessary evil? - MaRS Best Practices
Partnerships: A necessary evil? - MaRS Best PracticesMaRS Discovery District
 
MaRS Mavens answer the question“Innovation is…”
MaRS Mavens answer the question“Innovation is…”MaRS Mavens answer the question“Innovation is…”
MaRS Mavens answer the question“Innovation is…”MaRS Discovery District
 
Going Global Innovation (GGI) - Innovation Information Forum
Going Global Innovation (GGI) - Innovation Information ForumGoing Global Innovation (GGI) - Innovation Information Forum
Going Global Innovation (GGI) - Innovation Information ForumMaRS Discovery District
 
Partner or Perish: Forging effective alliances - MaRS Best Practices
Partner or Perish: Forging effective alliances - MaRS Best PracticesPartner or Perish: Forging effective alliances - MaRS Best Practices
Partner or Perish: Forging effective alliances - MaRS Best PracticesMaRS Discovery District
 
Investing in Business Innovation (IBI) - Innvation Information Forum
Investing in Business Innovation (IBI) - Innvation Information ForumInvesting in Business Innovation (IBI) - Innvation Information Forum
Investing in Business Innovation (IBI) - Innvation Information ForumMaRS Discovery District
 
Lived it Lecture with Dorothy Engelman: Entrepreneurship 101
Lived it Lecture with Dorothy Engelman: Entrepreneurship 101Lived it Lecture with Dorothy Engelman: Entrepreneurship 101
Lived it Lecture with Dorothy Engelman: Entrepreneurship 101MaRS Discovery District
 
Designing the grid of the future by Ravi Seethapathy
Designing the grid of the future by Ravi SeethapathyDesigning the grid of the future by Ravi Seethapathy
Designing the grid of the future by Ravi SeethapathyMaRS Discovery District
 
B2B Sales Strategy: Insider tips - MaRS Best Practices
B2B Sales Strategy: Insider tips - MaRS Best PracticesB2B Sales Strategy: Insider tips - MaRS Best Practices
B2B Sales Strategy: Insider tips - MaRS Best PracticesMaRS Discovery District
 
Startup Your Financial Future - MaRS Best practices
Startup Your Financial Future - MaRS Best practicesStartup Your Financial Future - MaRS Best practices
Startup Your Financial Future - MaRS Best practicesMaRS Discovery District
 
Barbara Jaworski - Older Workforce Strategy - Workplace Institute
Barbara Jaworski - Older Workforce Strategy - Workplace InstituteBarbara Jaworski - Older Workforce Strategy - Workplace Institute
Barbara Jaworski - Older Workforce Strategy - Workplace InstituteMaRS Discovery District
 
Terms of Investments - Entrepreneurship 101
Terms of Investments - Entrepreneurship 101 Terms of Investments - Entrepreneurship 101
Terms of Investments - Entrepreneurship 101 MaRS Discovery District
 
Marketing for Tech Start-Ups – Getting the fundamentals right - Entrepreneurs...
Marketing for Tech Start-Ups – Getting the fundamentals right - Entrepreneurs...Marketing for Tech Start-Ups – Getting the fundamentals right - Entrepreneurs...
Marketing for Tech Start-Ups – Getting the fundamentals right - Entrepreneurs...MaRS Discovery District
 
The Social Consumer: Cashing in on the social graph - MaRS Market Insights
The Social Consumer: Cashing in on the social graph - MaRS Market InsightsThe Social Consumer: Cashing in on the social graph - MaRS Market Insights
The Social Consumer: Cashing in on the social graph - MaRS Market InsightsMaRS Discovery District
 

Viewers also liked (20)

The Eco Laundry Room
The Eco Laundry RoomThe Eco Laundry Room
The Eco Laundry Room
 
Designing the grid of the future by Stefan Kuppers
Designing the grid of the future by Stefan KuppersDesigning the grid of the future by Stefan Kuppers
Designing the grid of the future by Stefan Kuppers
 
Emerging energy generation and storage technology by Ted Sargent
Emerging energy generation and storage technology by  Ted SargentEmerging energy generation and storage technology by  Ted Sargent
Emerging energy generation and storage technology by Ted Sargent
 
Michael Meagher - Cogniciti
Michael Meagher - CognicitiMichael Meagher - Cogniciti
Michael Meagher - Cogniciti
 
Partnerships: A necessary evil? - MaRS Best Practices
Partnerships: A necessary evil? - MaRS Best PracticesPartnerships: A necessary evil? - MaRS Best Practices
Partnerships: A necessary evil? - MaRS Best Practices
 
Geoff Mulgan - The Paradoxes of Ageing
Geoff Mulgan - The Paradoxes of AgeingGeoff Mulgan - The Paradoxes of Ageing
Geoff Mulgan - The Paradoxes of Ageing
 
MaRS Mavens answer the question“Innovation is…”
MaRS Mavens answer the question“Innovation is…”MaRS Mavens answer the question“Innovation is…”
MaRS Mavens answer the question“Innovation is…”
 
Going Global Innovation (GGI) - Innovation Information Forum
Going Global Innovation (GGI) - Innovation Information ForumGoing Global Innovation (GGI) - Innovation Information Forum
Going Global Innovation (GGI) - Innovation Information Forum
 
Partner or Perish: Forging effective alliances - MaRS Best Practices
Partner or Perish: Forging effective alliances - MaRS Best PracticesPartner or Perish: Forging effective alliances - MaRS Best Practices
Partner or Perish: Forging effective alliances - MaRS Best Practices
 
Investing in Business Innovation (IBI) - Innvation Information Forum
Investing in Business Innovation (IBI) - Innvation Information ForumInvesting in Business Innovation (IBI) - Innvation Information Forum
Investing in Business Innovation (IBI) - Innvation Information Forum
 
Lived it Lecture with Dorothy Engelman: Entrepreneurship 101
Lived it Lecture with Dorothy Engelman: Entrepreneurship 101Lived it Lecture with Dorothy Engelman: Entrepreneurship 101
Lived it Lecture with Dorothy Engelman: Entrepreneurship 101
 
Designing the grid of the future by Ravi Seethapathy
Designing the grid of the future by Ravi SeethapathyDesigning the grid of the future by Ravi Seethapathy
Designing the grid of the future by Ravi Seethapathy
 
B2B Sales Strategy: Insider tips - MaRS Best Practices
B2B Sales Strategy: Insider tips - MaRS Best PracticesB2B Sales Strategy: Insider tips - MaRS Best Practices
B2B Sales Strategy: Insider tips - MaRS Best Practices
 
Sales - Entrepreneurship 101
Sales - Entrepreneurship 101 Sales - Entrepreneurship 101
Sales - Entrepreneurship 101
 
Startup Your Financial Future - MaRS Best practices
Startup Your Financial Future - MaRS Best practicesStartup Your Financial Future - MaRS Best practices
Startup Your Financial Future - MaRS Best practices
 
Barbara Jaworski - Older Workforce Strategy - Workplace Institute
Barbara Jaworski - Older Workforce Strategy - Workplace InstituteBarbara Jaworski - Older Workforce Strategy - Workplace Institute
Barbara Jaworski - Older Workforce Strategy - Workplace Institute
 
Terms of Investments - Entrepreneurship 101
Terms of Investments - Entrepreneurship 101 Terms of Investments - Entrepreneurship 101
Terms of Investments - Entrepreneurship 101
 
Social innovation summit
Social innovation summitSocial innovation summit
Social innovation summit
 
Marketing for Tech Start-Ups – Getting the fundamentals right - Entrepreneurs...
Marketing for Tech Start-Ups – Getting the fundamentals right - Entrepreneurs...Marketing for Tech Start-Ups – Getting the fundamentals right - Entrepreneurs...
Marketing for Tech Start-Ups – Getting the fundamentals right - Entrepreneurs...
 
The Social Consumer: Cashing in on the social graph - MaRS Market Insights
The Social Consumer: Cashing in on the social graph - MaRS Market InsightsThe Social Consumer: Cashing in on the social graph - MaRS Market Insights
The Social Consumer: Cashing in on the social graph - MaRS Market Insights
 

Similar to Introduction by ann cavoukian

Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter GridEnlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Gridbradley_g
 
Mobile Solutions and Privacy – Not One at the Expense of the Other
 Mobile Solutions and Privacy – Not One at the Expense of the Other Mobile Solutions and Privacy – Not One at the Expense of the Other
Mobile Solutions and Privacy – Not One at the Expense of the Otherbradley_g
 
Restructuring Roundtable 10 28 11 Final
Restructuring Roundtable 10 28 11 FinalRestructuring Roundtable 10 28 11 Final
Restructuring Roundtable 10 28 11 Finalvtdobrien
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016Melissa Krasnow
 
MREC_Massoud Amin-02-20-15_expanded_final
MREC_Massoud Amin-02-20-15_expanded_finalMREC_Massoud Amin-02-20-15_expanded_final
MREC_Massoud Amin-02-20-15_expanded_finalMassoud Amin
 
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...Ted Myerson
 
Ontario Smart Grid Forum Report
Ontario Smart Grid Forum ReportOntario Smart Grid Forum Report
Ontario Smart Grid Forum ReportMichael Morrison
 
Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)Bernard Kufluk
 
SMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conferenceSMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conferenceDale Butler
 
Speaking at John Carrol University on the Internet of Things
Speaking at John Carrol University on the Internet of ThingsSpeaking at John Carrol University on the Internet of Things
Speaking at John Carrol University on the Internet of ThingsJustin Grammens
 
Framework to Manage Big Data in Smart Home Services
Framework to Manage Big Data in Smart Home ServicesFramework to Manage Big Data in Smart Home Services
Framework to Manage Big Data in Smart Home Servicesijtsrd
 
Transforming Connected Services into Industry Beating Experiences | Insurance...
Transforming Connected Services into Industry Beating Experiences | Insurance...Transforming Connected Services into Industry Beating Experiences | Insurance...
Transforming Connected Services into Industry Beating Experiences | Insurance...Dion Hinchcliffe
 
IT law : the middle kingdom between east and West
IT law : the middle kingdom between east and WestIT law : the middle kingdom between east and West
IT law : the middle kingdom between east and WestLilian Edwards
 
The IoT of Energy | From Smart Products to Intelligent Solutions
The IoT of Energy | From Smart Products to Intelligent SolutionsThe IoT of Energy | From Smart Products to Intelligent Solutions
The IoT of Energy | From Smart Products to Intelligent SolutionsAdvisian
 
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009Frocomm Australia
 
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Leonardo ENERGY
 
Presentation - Mckinsey - Exploring the potential of the “Internet of Things”...
Presentation - Mckinsey - Exploring the potential of the “Internet of Things”...Presentation - Mckinsey - Exploring the potential of the “Internet of Things”...
Presentation - Mckinsey - Exploring the potential of the “Internet of Things”...Ajay Gangakhedkar
 
Tigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy IndustryTigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy IndustryChristian Glover Wilson
 
Data Privacy of the Internet of Things
Data Privacy of the Internet of ThingsData Privacy of the Internet of Things
Data Privacy of the Internet of Thingsmabualsh
 

Similar to Introduction by ann cavoukian (20)

Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter GridEnlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Grid
 
Mobile Solutions and Privacy – Not One at the Expense of the Other
 Mobile Solutions and Privacy – Not One at the Expense of the Other Mobile Solutions and Privacy – Not One at the Expense of the Other
Mobile Solutions and Privacy – Not One at the Expense of the Other
 
Restructuring Roundtable 10 28 11 Final
Restructuring Roundtable 10 28 11 FinalRestructuring Roundtable 10 28 11 Final
Restructuring Roundtable 10 28 11 Final
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016
 
MREC_Massoud Amin-02-20-15_expanded_final
MREC_Massoud Amin-02-20-15_expanded_finalMREC_Massoud Amin-02-20-15_expanded_final
MREC_Massoud Amin-02-20-15_expanded_final
 
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...
 
Ontario Smart Grid Forum Report
Ontario Smart Grid Forum ReportOntario Smart Grid Forum Report
Ontario Smart Grid Forum Report
 
Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)
 
SMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conferenceSMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conference
 
T063500000200201 ppte
T063500000200201 ppteT063500000200201 ppte
T063500000200201 ppte
 
Speaking at John Carrol University on the Internet of Things
Speaking at John Carrol University on the Internet of ThingsSpeaking at John Carrol University on the Internet of Things
Speaking at John Carrol University on the Internet of Things
 
Framework to Manage Big Data in Smart Home Services
Framework to Manage Big Data in Smart Home ServicesFramework to Manage Big Data in Smart Home Services
Framework to Manage Big Data in Smart Home Services
 
Transforming Connected Services into Industry Beating Experiences | Insurance...
Transforming Connected Services into Industry Beating Experiences | Insurance...Transforming Connected Services into Industry Beating Experiences | Insurance...
Transforming Connected Services into Industry Beating Experiences | Insurance...
 
IT law : the middle kingdom between east and West
IT law : the middle kingdom between east and WestIT law : the middle kingdom between east and West
IT law : the middle kingdom between east and West
 
The IoT of Energy | From Smart Products to Intelligent Solutions
The IoT of Energy | From Smart Products to Intelligent SolutionsThe IoT of Energy | From Smart Products to Intelligent Solutions
The IoT of Energy | From Smart Products to Intelligent Solutions
 
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
 
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
 
Presentation - Mckinsey - Exploring the potential of the “Internet of Things”...
Presentation - Mckinsey - Exploring the potential of the “Internet of Things”...Presentation - Mckinsey - Exploring the potential of the “Internet of Things”...
Presentation - Mckinsey - Exploring the potential of the “Internet of Things”...
 
Tigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy IndustryTigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy Industry
 
Data Privacy of the Internet of Things
Data Privacy of the Internet of ThingsData Privacy of the Internet of Things
Data Privacy of the Internet of Things
 

More from MaRS Discovery District

Don Tapscott's New Solutions for a Connected Planet - MaRS Global Leadership
Don Tapscott's New Solutions for a Connected Planet - MaRS Global LeadershipDon Tapscott's New Solutions for a Connected Planet - MaRS Global Leadership
Don Tapscott's New Solutions for a Connected Planet - MaRS Global LeadershipMaRS Discovery District
 
Supporting the commercialization of new energy technology by Kaliyur Sridharan
Supporting the commercialization of new energy technology by  Kaliyur SridharanSupporting the commercialization of new energy technology by  Kaliyur Sridharan
Supporting the commercialization of new energy technology by Kaliyur SridharanMaRS Discovery District
 
Supporting the commercialization of new energy technology by Celine Bak
Supporting the commercialization of new energy technology by  Celine BakSupporting the commercialization of new energy technology by  Celine Bak
Supporting the commercialization of new energy technology by Celine BakMaRS Discovery District
 
Supporting the commercialization of new energy technology by Annette Verschuren
Supporting the commercialization of new energy technology by Annette VerschurenSupporting the commercialization of new energy technology by Annette Verschuren
Supporting the commercialization of new energy technology by Annette VerschurenMaRS Discovery District
 
Emerging energy generation and storage technology by Ken Nakahara
Emerging energy generation and storage technology by Ken NakaharaEmerging energy generation and storage technology by Ken Nakahara
Emerging energy generation and storage technology by Ken NakaharaMaRS Discovery District
 
Emerging energy generation and storage technology by Mark Tinkler
Emerging energy generation and storage technology by Mark TinklerEmerging energy generation and storage technology by Mark Tinkler
Emerging energy generation and storage technology by Mark TinklerMaRS Discovery District
 
Emerging energy generation and storage technology by John MacRitchie
Emerging energy generation and storage technology by John MacRitchieEmerging energy generation and storage technology by John MacRitchie
Emerging energy generation and storage technology by John MacRitchieMaRS Discovery District
 
Combining different energy sources and uses by David Teichroeb
Combining different energy sources and uses by  David TeichroebCombining different energy sources and uses by  David Teichroeb
Combining different energy sources and uses by David TeichroebMaRS Discovery District
 
Combining different energy sources and uses by Joe Cargnelli
Combining different energy sources and uses by  Joe CargnelliCombining different energy sources and uses by  Joe Cargnelli
Combining different energy sources and uses by Joe CargnelliMaRS Discovery District
 
Combining different energy sources and uses by Murray McCaig
Combining different energy sources and uses by Murray McCaigCombining different energy sources and uses by Murray McCaig
Combining different energy sources and uses by Murray McCaigMaRS Discovery District
 
Designing the grid of the future by Darren Finkbeiner
Designing the grid of the future by Darren FinkbeinerDesigning the grid of the future by Darren Finkbeiner
Designing the grid of the future by Darren FinkbeinerMaRS Discovery District
 
SR&ED: What you need to know about the changing landscape - MaRS Best Practices
SR&ED: What you need to know about the changing landscape - MaRS Best PracticesSR&ED: What you need to know about the changing landscape - MaRS Best Practices
SR&ED: What you need to know about the changing landscape - MaRS Best PracticesMaRS Discovery District
 
Alain Sotto Business of Aging Summit 2012
Alain Sotto Business of Aging Summit 2012Alain Sotto Business of Aging Summit 2012
Alain Sotto Business of Aging Summit 2012MaRS Discovery District
 
Geoff Mulgan on Austerity and Innovation - MaRS Global Leadership
Geoff Mulgan on Austerity and Innovation - MaRS Global Leadership Geoff Mulgan on Austerity and Innovation - MaRS Global Leadership
Geoff Mulgan on Austerity and Innovation - MaRS Global Leadership MaRS Discovery District
 

More from MaRS Discovery District (20)

Don Tapscott's New Solutions for a Connected Planet - MaRS Global Leadership
Don Tapscott's New Solutions for a Connected Planet - MaRS Global LeadershipDon Tapscott's New Solutions for a Connected Planet - MaRS Global Leadership
Don Tapscott's New Solutions for a Connected Planet - MaRS Global Leadership
 
Closing Remarks by Tom Rand
Closing Remarks by Tom RandClosing Remarks by Tom Rand
Closing Remarks by Tom Rand
 
Supporting the commercialization of new energy technology by Kaliyur Sridharan
Supporting the commercialization of new energy technology by  Kaliyur SridharanSupporting the commercialization of new energy technology by  Kaliyur Sridharan
Supporting the commercialization of new energy technology by Kaliyur Sridharan
 
Supporting the commercialization of new energy technology by Celine Bak
Supporting the commercialization of new energy technology by  Celine BakSupporting the commercialization of new energy technology by  Celine Bak
Supporting the commercialization of new energy technology by Celine Bak
 
Supporting the commercialization of new energy technology by Annette Verschuren
Supporting the commercialization of new energy technology by Annette VerschurenSupporting the commercialization of new energy technology by Annette Verschuren
Supporting the commercialization of new energy technology by Annette Verschuren
 
Emerging energy generation and storage technology by Ken Nakahara
Emerging energy generation and storage technology by Ken NakaharaEmerging energy generation and storage technology by Ken Nakahara
Emerging energy generation and storage technology by Ken Nakahara
 
Emerging energy generation and storage technology by Mark Tinkler
Emerging energy generation and storage technology by Mark TinklerEmerging energy generation and storage technology by Mark Tinkler
Emerging energy generation and storage technology by Mark Tinkler
 
Emerging energy generation and storage technology by John MacRitchie
Emerging energy generation and storage technology by John MacRitchieEmerging energy generation and storage technology by John MacRitchie
Emerging energy generation and storage technology by John MacRitchie
 
Lunch keynote by Minister Duguid
Lunch keynote by Minister DuguidLunch keynote by Minister Duguid
Lunch keynote by Minister Duguid
 
Combining different energy sources and uses by David Teichroeb
Combining different energy sources and uses by  David TeichroebCombining different energy sources and uses by  David Teichroeb
Combining different energy sources and uses by David Teichroeb
 
Combining different energy sources and uses by Joe Cargnelli
Combining different energy sources and uses by  Joe CargnelliCombining different energy sources and uses by  Joe Cargnelli
Combining different energy sources and uses by Joe Cargnelli
 
Combining different energy sources and uses by Murray McCaig
Combining different energy sources and uses by Murray McCaigCombining different energy sources and uses by Murray McCaig
Combining different energy sources and uses by Murray McCaig
 
Designing the grid of the future by Darren Finkbeiner
Designing the grid of the future by Darren FinkbeinerDesigning the grid of the future by Darren Finkbeiner
Designing the grid of the future by Darren Finkbeiner
 
Introduction by ann cavoukian
Introduction by ann cavoukianIntroduction by ann cavoukian
Introduction by ann cavoukian
 
SR&ED: What you need to know about the changing landscape - MaRS Best Practices
SR&ED: What you need to know about the changing landscape - MaRS Best PracticesSR&ED: What you need to know about the changing landscape - MaRS Best Practices
SR&ED: What you need to know about the changing landscape - MaRS Best Practices
 
Vicki Cammack, Tyze Personal Networks
Vicki Cammack, Tyze Personal NetworksVicki Cammack, Tyze Personal Networks
Vicki Cammack, Tyze Personal Networks
 
Trevor van Mierlo, Evolution Health
Trevor van Mierlo, Evolution HealthTrevor van Mierlo, Evolution Health
Trevor van Mierlo, Evolution Health
 
Neil F. Gordon, INTERxVENT
Neil F. Gordon, INTERxVENTNeil F. Gordon, INTERxVENT
Neil F. Gordon, INTERxVENT
 
Alain Sotto Business of Aging Summit 2012
Alain Sotto Business of Aging Summit 2012Alain Sotto Business of Aging Summit 2012
Alain Sotto Business of Aging Summit 2012
 
Geoff Mulgan on Austerity and Innovation - MaRS Global Leadership
Geoff Mulgan on Austerity and Innovation - MaRS Global Leadership Geoff Mulgan on Austerity and Innovation - MaRS Global Leadership
Geoff Mulgan on Austerity and Innovation - MaRS Global Leadership
 

Recently uploaded

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Introduction by ann cavoukian

  • 1. Using the Power of Non-Identifying Energy Data Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario Future of Energy Summit June 8, 2012
  • 2. Using the Power of Data Big Data ………Yes Energy Data …...Yes Personal Data – No!
  • 3. Personal Privacy Must Remain Paramount “The smart grid is certainly a good idea, which I strongly support. But the focus has been so singularly on controlling energy use that I think the privacy issue is a sleeper – it is not top-of-mind.” — Commissioner Cavoukian “We’ve taken the advice of the privacy commissioner upfront before the smart grid is even put in place.” — Brad Duguid, Ontario Minister of Energy and Infrastructure Toronto Star, May 12, 2010 http://tinyurl.com/24dzn9j
  • 4. “Assets Beyond the Meter – Who Should Own Them?” “There are sound reasons why energy consumers should remain in control of the energy consumption information they produce, even if there isn’t a law that requires this. The underlying rationale is that consumer confidence and trust in the Smart Grid, and in one’s local electricity distributors, is vital in achieving the vision of a more energy efficient electrical grid.” — Commissioner Cavoukian, Electric Light & Power Magazine www.elp.com
  • 5. Why Utilities Should Be Concerned • Little consumer confidence and trust, one example: • Residents of Marin County, California, created a road blockade to prevent PG&E trucks from going into their town to install smart meters; • Residents were worried about their privacy, saying: “I don't want to be watched all the time;” • 79% knew little or nothing about the smart grid; • 76% didn’t know anything about smart meters; (Market Strategies International Study, 2010); • As a result, consumers are wary, and at times, hostile.
  • 6. The Decade of Privacy by Design
  • 7. Adoption of “Privacy by Design” as an International Standard Landmark Resolution Passed to Preserve the Future of Privacy By Anna Ohlden – October 29th 2010 - http://www.science20.com/newswire/landmark_resolution_passed_preserve_future_privacy JERUSALEM, October 29, 2010 – A landmark Resolution by Ontario's Information and Privacy Commissioner, Dr. Ann Cavoukian, was unanimously passed by International Data Protection and Privacy Commissioners in Jerusalem today at their annual conference. The resolution ensures that privacy is embedded into new technologies and business practices, right from the outset – as an essential component of fundamental privacy protection. Full Article: http://www.science20.com/newswire/landmark_resolution_passed_preserve_future_privacy
  • 8. Privacy by Design: The 7 Foundational Principles 1. Proactive not Reactive: Preventative, not Remedial; 3. Privacy as the Default setting; 5. Privacy Embedded into Design; 7. Full Functionality: Positive-Sum, not Zero-Sum; 9. End-to-End Security: Full Lifecycle Protection; 11. Visibility and Transparency: Keep it Open; 13. Respect for User Privacy: Keep it User-Centric. www.ipc.on.ca/images/Resources/7foundationalprinciples.pdf
  • 10. Consumer Energy Usage Data = PII • U.S. Department of Energy identified the issue of third party access to consumer-specific energy-usage data (CEUD) as… “perhaps the most critical question in the context of Smart Grid technologies” … “consumers should have rights to protect the privacy of their own CEUD and control access to it;” • California Public Utility Commission issued a decision adopting rules to protect the privacy and security of customer electricity usage data, commending Privacy by Design: “The Privacy by Design methodology offers a promising approach to ensuring that data practices promote privacy, not just in the FIP of data minimization, but in all aspects of privacy planning.”
  • 11. Consumer Energy Usage Data (Cont’d) • North American Energy Standards Board (NAESB) issued Business Practices for Third Party Access to Smart Meter-based Information. This guidance adopts Fair Information Practices, requiring informed consent, transparency, and accountability; • My office is collaborating with NIST, the National Institute of Standards and Technology as part of its Cyber Security Working Group where Privacy by Design was cited in their Guidelines for Smart Grid Cyber Security: V. 2, Privacy and the Smart Grid.
  • 12. “Big Data” • Each day we create 2.5 quintillion bytes of data – 90% of the data today has been created in the past 2 years; • Big data analysis and data analytics promises new opportunities to gain valuable insights and benefits, (e.g., improving pandemic response, advances in cancer research, etc.); • However, it can also enable expanded surveillance, on a scale previously unimaginable; • This situation cries out for a positive-sum solution, win-win strategy.
  • 13. Announcing: “Privacy by Design in the Age of Big Data” • The Big Difference with Big Data; • “Sensemaking” Systems; • Privacy by Design in the Age of Big Data; • The Creation of a Big Data Sensemaking System through PbD. www.privacybydesign.ca
  • 14. Conclusions • Lead with Privacy by Design, featuring control over customer energy usage data – maintaining consumer confidence and trust will be essential; • Make sure that privacy is strongly addressed – right from the outset – make it a priority by embedding it into technology and business practices; • Enable both the Smart Grid and Privacy to grow in tandem – not one at the expense of the other – prevent the data breach … enable the service; • If you don’t lead with Privacy, by Design, you may end up with privacy by chance – or worse, Privacy by Disaster!
  • 15. How to Contact Us Ann Cavoukian, Ph.D. Information & Privacy Commissioner of Ontario 2 Bloor Street East, Suite 1400 Toronto, Ontario, Canada M4W 1A8 Phone: (416) 326-3948 / 1-800-387-0073 Web: www.ipc.on.ca E-mail: info@ipc.on.ca For more information on Privacy by Design, please visit: www.privacybydesign.ca

Editor's Notes

  1. Using the Power of Big Data
  2. Toronto Star Smart Grid Article
  3. Assets Beyond the Meter E. L. Quinn, “ Privacy and the New Energy Infrastructure ” (Working Paper Series, 2009) htto://ssrn.com/abstract=1370731 This lead to a series of meetings with utilities in our jurisdiction of Ontario – which (fortunately) fall under our FOI and Privacy laws. We worked closely with 2 of the largest utilities – Hydro One and Toronto Hydro – who felt it was in their best interest to do so – and the best interests of their customers Increase in the granular collection, use and disclosure of personal energy information; Data linkage of personally identifiable information with detailed energy use; The creation of an entirely new “ library ” of personal information. (Elias Quinn, 2009)
  4. Why Utilities Should Be Concerned This article is forthcoming – estimated to be published in September/October.
  5. Privacy by Design However, it was also found that after having the technologies explained to them : 75% of people felt that the smart grid, complete with smart meters, should be a priority over the next 1-5 years; and 67% support their utility company in installing the technologies. Distributech – monetization of their data flows
  6. Jerusalem Landmark Resolution I first developed the concept of Privacy by Design in the ’ 90s, as a response to the growing threats to online privacy that were beginning to emerge; Privacy by Design seeks to build in privacy – up front, right into the design specifications; into the architecture; embedding privacy into the very technology used – bake it in ; Data minimization is key : minimize the routine collection and use of personally identifiable information – use encrypted or coded information, whenever possible; Use privacy-enhancing technologies (PETs) where possible, but make it PETs Plus , invoking a positive-sum paradigm, and giving people maximum control over their own data.
  7. 7 Foundational Principles Translated into 25 languages!
  8. IPC Joint Smart Grid Papers Proactive not Reactive; Preventative not Remedial Privacy as the Default Privacy Embedded into Design Full Functionality: Positive-Sum, not Zero-Sum End-to-End Lifecycle Protection Visibility and Transparency Respect for User Privacy
  9. CEUD
  10. CEUD (Cont ’ d) The U.S. Department of Energy (DOE) has been involved in a number of Smart Grid activities, including among other things: Publishing reports on Data Access and Privacy Issues Related to Smart Grid Technologies and Communications Requirements of Smart Grid Technologies. Leading the Federal Smart Grid Task Force, which ensures awareness, coordination, and integration of the diverse activities of the federal government related to smarter grid technologies, practices, and services. Establishing the Smart Grid Information Clearinghouse (developed and maintained by Virginia Tech Advanced Research Institute) to provide information on Smart Grid pilot projects, use cases, standards, legislation, policy and regulation, lessons learned and best practices, and topics research and development topics. Supporting the development of the Smart Grid Maturity Model: a management tool that organizations can use to appraise, guide, and improve their Smart Grid transformation.
  11. Big Data
  12. IPC Paper – PbD and Big Data The Virtuous Cycle of Big Data The virtuous cycle that may emerge: Systems that are respectful of personal information, with privacy assured from the outset, will increase user confidence and trust; This will increase users' engagement, driving more “ voluntary ” and “ accurate ” data into the system; More data will yield greater benefits for all stakeholders including users, without trading away their privacy – a positive-sum outcome!
  13. Conclusions
  14. How to Contact Us