The Politics of Deep Packet Inspection: What Drives Surveillance by Internet Service Providers?

Total Page:16

File Type:pdf, Size:1020Kb

The Politics of Deep Packet Inspection: What Drives Surveillance by Internet Service Providers? The Politics of Deep Packet Inspection: What Drives Surveillance by Internet Service Providers? by Christopher Parsons M.A, University of Guelph, 2007 B.A., University of Guelph, 2006 A Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of DOCTOR OF PHILOSOPHY in the Department of Political Science © Christopher Parsons, 2013 University of Victoria This dissertation is licensed under a Creative Commons Attribution-NonCommercial- ShareAlike 3.0 Unported Copyright ii Supervisory Committee The Politics of Deep Packet Inspection: What Drives Surveillance by Internet Service Providers? by Christopher Parsons M.A., University of Guelph, 2007 B.A., University of Guelph, 2006 Supervisory Committee Dr. Colin J. Bennett, Political Science, University of Victoria Supervisor Dr. Arthur Kroker, Department of Political Science, University of Victoria Departmental Member Dr. Andrew Clement, Faculty of Information, University of Toronto Outside Member iii Abstract Supervisory Committee Dr. Colin J. Bennett, Department of Political Science Supervisor Dr. Arthur Kroker, Department of Political Science Departmental Member Dr. Andrew Clement, Faculty of Information, University of Toronto Outside Member Surveillance on the Internet today extends beyond collecting intelligence at the layer of the Web: major telecommunications companies use technologies to monitor, mediate, and modify data traffic in real time. Such companies functionally represent communicative bottlenecks through which online actions must pass before reaching the global Internet and are thus perfectly positioned to develop rich profiles of their subscribers and modify what they read, do, or say online. And some companies have sought to do just that. A key technology, deep packet inspection (DPI), facilitates such practices. In the course of evaluating the practices, regulations, and politics that have driven DPI in Canada, the US, and UK it has become evident that the adoption of DPI tends to be dependent on socio-political and economic conditions. Simply put, market or governmental demand is often a prerequisite for the technology’s adoption by ISPs. However, the existence of such demand is no indication of the success of such technologies; regulatory or political advocacy can lead to the restriction or ejection of particular DPI-related practices. The dissertation proceeds by first outlining how DPI functions and then what has driven its adoption in Canada, the US, and UK. Three conceptual frameworks, path dependency, international governance, and domestic framing, are used to explain whether power structures embedded into technological systems themselves, international standards bodies, or domestic politics are principally responsible for the adoption or resistance to the technology in each nation. After exploring how DPI has arisen as an issue in the respective states I argue that though domestic conditions have principally driven DPI’s adoption, and though the domestic methods of governing DPI and its associated practices have varied across cases, the outcomes of such governance are often quite similar. More broadly, I argue that while the technology and its associated practices iv constitute surveillance and can infringe upon individuals’ privacy, the debates around DPI must more expansively consider how DPI raises existential risks to deliberative democratic states. I conclude by offering some suggestions on defraying the risks DPI poses to such states. v Table of Contents Supervisory Committee ...................................................................................................... ii! Abstract .............................................................................................................................. iii! Table of Contents ................................................................................................................ v! List of Figures ................................................................................................................... vii! Abbreviations ................................................................................................................... viii! Acknowledgments ............................................................................................................... x! Chapter 1: Introduction ....................................................................................................... 1! Deep Packet Inspection ................................................................................................... 2! Interested Parties ............................................................................................................. 3! The Sites of Study ........................................................................................................... 6! Methodology ................................................................................................................... 9! Outline of Dissertation .................................................................................................. 10! Chapter 2: Deep Packet Inspection and Its Predecessors .................................................. 13! A Chronology of Data Packet Inspection ..................................................................... 14! Data Packets 101 ....................................................................................................... 15! Shallow Packet Inspection ........................................................................................ 19! Medium Packet Inspection ........................................................................................ 19! Deep Packet Inspection ............................................................................................. 22! Technical Capabilities and Their Potentials ................................................................. 27! The Technical Possibilities of DPI ........................................................................... 27! The Economic Potentials of DPI ............................................................................... 33! The Political Potentials of DPI ................................................................................. 38! Conclusion .................................................................................................................... 41! Chapter 3: Who and What Drives Deep Packet Inspection .............................................. 43! Fixed Paths for the Internet? ......................................................................................... 44! Inventing the Internet’s Potentials ............................................................................ 44! ARPANET’s Values and the Contemporary Internet ............................................... 47! How a Technological Imperative Could Explain Deep Packet Inspection ............... 51! The Role of International Governance .......................................................................... 58! The Rise and Roles of International Internet Governance Bodies ............................ 58! International Governance Bodies and Control .......................................................... 62! How International Governance Could Explain Deep Packet Inspection .................. 65! The Politics of Framing ................................................................................................ 71! Policy Actors, Networks, and Communities ............................................................. 71! The Strategic Dimensions of Agenda-Setting and Policy Framing .......................... 75! How Domestic Framing Could Explain Deep Packet Inspection ............................. 78! Conclusion .................................................................................................................... 81! Chapter 4: The Canadian Experience ............................................................................... 83! Introducing the Actors .................................................................................................. 83! The Issues ...................................................................................................................... 87! Network Management ............................................................................................... 87! Content Control ......................................................................................................... 98! vi Advertising .............................................................................................................. 104! Policing and National Security ............................................................................... 107! Conclusion .................................................................................................................. 111! Chapter 5: The American Experience ............................................................................. 114! Introducing the Players ............................................................................................... 114! The Issues .................................................................................................................... 117! Network Management ............................................................................................. 118! Copyright and Content Control ............................................................................... 126! Advertising .............................................................................................................
Recommended publications
  • H-Environment Roundtable Reviews
    H-Environment Roundtable Reviews Volume 10, No. 10 (2020) Publication date: October 16, 2020 https://networks.h-net.org/h- Roundtable Review Editor: environment Kara Murphy Schlichting Thomas M. Wickman, Snowshoe Country: An Environmental and Cultural History of Winter in the Early American Northeast (Cambridge and New York: Cambridge University Press, 2018) ISBN: 978-1108426794 Contents Introduction by Kara Murphy Schlichting, Queens College CUNY 2 Comments by Jon T. Coleman, University of Notre Dame 4 Comments by Rachel B. Herrmann, Cardiff University 7 Comments by Andrew Lipman, Barnard College 10 Comments by Molly A. Warsh, University of Pittsburgh 13 Response by Thomas Wickman, Trinity College, Hartford, Connecticut 16 About the Contributors 24 Copyright © 2019 H-Net: Humanities and Social Sciences Online H-Net permits the redistribution and reprinting of this work for nonprofit, educational purposes, with full and accurate attribution to the author, web location, date of publication, H-Environment, and H-Net: Humanities & Social Sciences Online. H-Environment Roundtable Reviews, Vol. 10, No. 5 (2020) 2 Introduction by Kara Murphy Schlichting, Queens College CUNY n North America, winter is on the horizon. In my home of New York City, winter can be blustery and cold. This city is a fair weather metropolis, seasonally I embracing outdoor life in warm weather only. The coming winter of 2020-21, with the ongoing need for social distancing and outdoor congregations due to the COVID-19 pandemic, will likely force a reconsideration of the typical retreat indoors at the arrival of cold. From this vantage point of changing seasons and the need to rethink winter practices, Thomas Wickman’s Snowshoe Country: An Environmental and Cultural History of Winter in the Early American Northeast is an reminder that the interiority of a New York winter is a construct of this community and era.
    [Show full text]
  • Poster: Introducing Massbrowser: a Censorship Circumvention System Run by the Masses
    Poster: Introducing MassBrowser: A Censorship Circumvention System Run by the Masses Milad Nasr∗, Anonymous∗, and Amir Houmansadr University of Massachusetts Amherst fmilad,[email protected] ∗Equal contribution Abstract—We will present a new censorship circumvention sys- side the censorship regions, which relay the Internet traffic tem, currently being developed in our group. The new system of the censored users. This includes systems like Tor, VPNs, is called MassBrowser, and combines several techniques from Psiphon, etc. Unfortunately, such circumvention systems are state-of-the-art censorship studies to design a hard-to-block, easily blocked by the censors by enumerating their limited practical censorship circumvention system. MassBrowser is a set of proxy server IP addresses [14]. (2) Costly to operate: one-hop proxy system where the proxies are volunteer Internet To resist proxy blocking by the censors, recent circumven- users in the free world. The power of MassBrowser comes from tion systems have started to deploy the proxies on shared-IP the large number of volunteer proxies who frequently change platforms such as CDNs, App Engines, and Cloud Storage, their IP addresses as the volunteer users move to different a technique broadly referred to as domain fronting [3]. networks. To get a large number of volunteer proxies, we This mechanism, however, is prohibitively expensive [11] provide the volunteers the control over how their computers to operate for large scales of users. (3) Poor QoS: Proxy- are used by the censored users. Particularly, the volunteer based circumvention systems like Tor and it’s variants suffer users can decide what websites they will proxy for censored from low quality of service (e.g., high latencies and low users, and how much bandwidth they will allocate.
    [Show full text]
  • REPORTER "Eluding Electronic Servicing
    MAY, 1963 35 CENTS REPORTER "eluding Electronic Servicing Special Equipment Speeds Servicing A...,-`" _.. .., . _ . --:._ Molecular Electronics Explained Resistors With More Than One Job } www.americanradiohistory.com BIG -SYSTEM MUSCLE... _ . u . , . ... : .: : . .- . : . a .,...: .. e : : . ... a . + _.. a ! a . e s s . ! . 1 . ! . e i . 1 . s e e . / . a ' / 11 . / . / s f ! . e . ! ! e s . > . te...... cc..... / a e a a . 1 w . a f i . : / ! . / / . .. - / / . ! ! ! / . .. ....... ................... 18Í . e . .. t a a e + e1V . 7J / Ma/ i Qç } ; , ! a- ir '+4 . +. & ! ,. e ! ' "' ac. 4 .:.a a . SMALL -SYSTEM PRICE! NEW JERROLD TV DISTRIBUTION SYSTEM ENGINEERED FOR THE NEW COLOR -TV ERA Designed for TV shops, dealers' showrooms, The JERROLD "Challenger" Amplifier, small apartments and motels Model ACL-200, delivers 20db minimum gain Feeds up to 32 TV and FM sets over the low band, 19db No controls or adjustments over the high band. New "Quick -Disconnect" plug-in outlets Flat response-unique in a low-price amplifier, but necessary for good color TV. Easy to install, Here's the distribution system to sell to TV and no controls to adjust. Famous JERROLD qual- FM dealers for their color -TV showrooms .. ity is built in to stay. perfect too for the small apartment building or Model ACL-200, $38.97 net motel that's been needing an antenna system See your JERROLD distributor or write but couldn't afford one before. It's also ideal for Jerrold Electronics, Distributor Sales Division, your own service shop. Philadelphia 32, Pa. icz:=;`1 JER RO LO New crown -washer screw Exclusive "Gamma" ELECTRONICS New 4- and 8 -way nigh - terminals for stripped or chassis fittings for quick isolation networks.
    [Show full text]
  • NET NEUTRALITY Work Operator
    Database NET NEUTRALITY work operator. In October 2007, Comcast was ac- cused of secretly deploying filtering technologies to manage its network in order to keep some peer-to- Net neutrality denotes the neutral transmission of peer traffic from overloading its network and hence data via the Internet, i.e., every packet of data, affecting the accessing speeds of its other Internet regardless of its content, origin and the application subscribers. The FCC deemed it unreasonable for that created it, is treated the same way and the best Comcast to discriminate against particular Internet effort should always be made to forward it.This con- applications and not to disclose its practice ade- cept is often regarded as a fundamental characteris- quately to its customers and therefore ruled against tic of the Internet. However, the amount of data that Comcast’s practices of throttling Internet traffic and is transported via the Internet is increasing rapidly, delaying peer-to-peer traffic. Comcast appealed to especially because of applications like music and vi- the US Court of Appeals, claiming that no legally deo downloads, Internet TV,and Internet telephony. enforceable standards or rules on the matter existed. All these applications require large capacities. This In April 2010 the federal appeals court ruled that the may lead to a capacity overload and delays of data FCC had limited power over Internet traffic under transmissions.The current technological state allows current law. This decision allows network operators for assigning different priorities to different data to block or slow specific sites and charge sites to packets. Therefore, the discussion has emerged deliver their content faster to users.
    [Show full text]
  • The Animated Roots of Wildlife Films: Animals, People
    THE ANIMATED ROOTS OF WILDLIFE FILMS: ANIMALS, PEOPLE, ANIMATION AND THE ORIGIN OF WALT DISNEY’S TRUE-LIFE ADVENTURES by Robert Cruz Jr. A thesis submitted in partial fulfillment of the requirements for the degree of Master of Fine Arts in Science and Natural History Filmmaking MONTANA STATE UNIVERSITY Bozeman, Montana April 2012 ©COPYRIGHT by Robert Cruz Jr. 2012 All Rights Reserved ii APPROVAL of a thesis submitted by Robert Cruz Jr. This thesis has been read by each member of the thesis committee and has been found to be satisfactory regarding content, English usage, format, citation, bibliographic style, and consistency and is ready for submission to The Graduate School. Dennis Aig Approved for the School of Film and Photography Robert Arnold Approved for The Graduate School Dr. Carl A. Fox iii STATEMENT OF PERMISSION TO USE In presenting this thesis in partial fulfillment of the requirements for a master’s degree at Montana State University, I agree that the Library shall make it available to borrowers under rules of the Library. If I have indicated my intention to copyright this thesis by including a copyright notice page, copying is allowable only for scholarly purposes, consistent with “fair use” as prescribed in the U.S. Copyright Law. Requests for permission for extended quotation from or reproduction of this thesis in whole or in parts may be granted only by the copyright holder. Robert Cruz Jr. April 2012 iv TABLE OF CONTENTS 1. INTRODUCTORY QUOTES .....................................................................................1
    [Show full text]
  • Brocade Vyatta Network OS ALG Configuration Guide, 5.2R1
    CONFIGURATION GUIDE Brocade Vyatta Network OS ALG Configuration Guide, 5.2R1 Supporting Brocade 5600 vRouter, VNF Platform, and Distributed Services Platform 53-1004711-01 24 October 2016 © 2016, Brocade Communications Systems, Inc. All Rights Reserved. Brocade, the B-wing symbol, and MyBrocade are registered trademarks of Brocade Communications Systems, Inc., in the United States and in other countries. Other brands, product names, or service names mentioned of Brocade Communications Systems, Inc. are listed at www.brocade.com/en/legal/ brocade-Legal-intellectual-property/brocade-legal-trademarks.html. Other marks may belong to third parties. Notice: This document is for informational purposes only and does not set forth any warranty, expressed or implied, concerning any equipment, equipment feature, or service offered or to be offered by Brocade. Brocade reserves the right to make changes to this document at any time, without notice, and assumes no responsibility for its use. This informational document describes features that may not be currently available. Contact a Brocade sales office for information on feature and product availability. Export of technical data contained in this document may require an export license from the United States government. The authors and Brocade Communications Systems, Inc. assume no liability or responsibility to any person or entity with respect to the accuracy of this document or any loss, cost, liability, or damages arising from the information contained herein or the computer programs that accompany it. The product described by this document may contain open source software covered by the GNU General Public License or other open source license agreements. To find out which open source software is included in Brocade products, view the licensing terms applicable to the open source software, and obtain a copy of the programming source code, please visit http://www.brocade.com/support/oscd.
    [Show full text]
  • Security Forum Strategic Panel Phorm Position Paper
    Security Forum Strategic Panel Phorm Position Paper PHORM – PRIVACY IMPACT OF NEW INTERNET ADVERTISING MECHANISMS 1. INTRODUCTION 1.1. Online advertising company Phorm has caused a stir in the Internet community because of its profile-driven service. Phorm has trialled this service with BT, and signed further contracts with Virgin Media and TalkTalk. However, critics claim that the service breaches the Regulation of Investigatory Powers Act (2000), and that Phorm’s approach is contrary to users’ privacy wishes. 1.2. The BCS believes that the solution to this debate rests in self-regulation of online advertising: companies must establish and enforce a code of conduct; be completely transparent about their practices; resist sharing data with third parties; and submit to ongoing oversight from an independent third party organisation. 2. THE BATTLE FOR THE INTERNET 2.1. The massive market for online advertising is one that affects every Internet user: many search engines and websites depend upon advertising revenues for funding, and some ISPs use advertising to subsidise subscription costs. In the absence of those funding sources they would either have to pass on additional operating costs to users, or cease trading altogether. 2.2. The battle for control of Internet advertising had, until recently, been confined to a small number of (rapidly consolidating) players including the likes of Microsoft, Google, Yahoo! and DoubleClick. These well-established companies have built their offerings over many years and believed themselves to control the market, with little threat from new companies. 2.3. However, a new breed of online advertising company has recently appeared.
    [Show full text]
  • Net Neutrality Reloaded
    Luca Belli Editor Net Neutrality Reloaded: Net Neutrality Reloaded: Zero Rating, Specialised Service, Ad Blocking and Traffic Management Zero Rating, Specialised Service, Annual Report of the UN IGF Dynamic Coalition on Net Neutrality Ad Blocking and Traffic Management Luca Belli Editor Annual Report of the UN IGF This Report is the 2016 outcome of the IGF Dynamic Coalition on Network Neutrality (DCNN). The Report gathers a series of case studies on a variety Dynamic Coalition of net neutrality issues from the perspective of different stakeholders. The double purpose of this report is to trigger meaningful discussion on net on Net Neutrality neutrality trends, while providing informative material that may be used by researchers, policy-makers and civil society alike. Researchers, practitioners and policy-makers regularly contribute to the DCNN report, providing a wide range of heterogeneous views. Preface by Tim Wu In 2016, Zero Rating was by large the most debated net neutrality issue, as reflected by the considerable number of contributions focusing on the topic within this report. Such high number of analyses on zero rating seems particularly useful to meet the increasing demand of research exploring the pros and cons of price discrimination practices. Furthermore, the report examines other very relevant and discussed topics, such as specialised services, ad blocking and reasonable traffic management, providing useful insight on some of the most recent policy evolutions in a variety of countries. Net Neutrality Reloaded: Zero Rating,
    [Show full text]
  • Thomas Wickman CV
    Thomas Michael Wickman 91 Center Street Department of History Wethersfield, CT 06019 Trinity College 300 Summit Street [email protected] Hartford, CT 06106 Cell: 617.733.1291 Office: 860.297.2393 EDUCATION Harvard University, Cambridge, Massachusetts Ph.D., History of American Civilization, 2012 Dissertation: “Snowshoe Country: Indians, Colonists, and Winter Spaces of Power in the Northeast, 1620-1727” Committee: Joyce Chaplin, David D. Hall, Lawrence Buell Fourth Reader: Lisa Brooks Harvard University, Cambridge, Massachusetts A.M., History, 2009 Harvard College, Cambridge, Massachusetts A.B., History and Literature, 2007, magna cum laude EMPLOYMENT Associate Professor of History and American Studies, Trinity College, Hartford, CT, July 2018 to the present Assistant Professor of History and American Studies, Trinity College, Hartford, CT, July 2012 to June 2018 BOOK Snowshoe Country: An Environmental and Cultural History of Winter in the Early American Northeast (Cambridge: Cambridge University Press, 2018, paperback, 2019). • Reviewed by Katherine Grandjean in The English Historical Review ceaa216 (2020). • Reviewed by Jon T. Coleman, Rachel B. Herrmann, Andrew Lipman, Molly A. Warsh in H-Environment Roundtable Reviews 10:10 (2020). • Reviewed by Andrea Smalley, American Historical Review 125:2 (2020): 643-644. • Reviewed by Ted Steinberg, Early American Literature 55:1 (2020): 269-272. • Featured on Ben Franklin’s World: A Podcast about Early American History, Episode 267, December 3, 2019. • Reviewed by Anya Zilberstein, Journal of Interdisciplinary History 50:3 (2020): 462-3. • Reviewed by Andrew Detch, H-War, October 17, 2019. • Reviewed by Michael Gunther, Journal of American History 106:2 (2019): 428-9. 1 • Reviewed by Claire Campbell, William and Mary Quarterly 76:2 (2019): 355-8.
    [Show full text]
  • Managed Firewalls
    DEDICATED HOSTING PRODUCT OVERVIEW MANAGED FIREWALLS Securing your network from malicious activity. Rackspace delivers expertise and service for the world’s leading clouds and technologies. TRUST RACKSPACE And we can help secure your dedicated servers and your cloud, with firewalls from Cisco® and • A leader in the 2017 Gartner Magic Quadrant Juniper Networks — fully supported around the clock by certified Rackspace engineers. Your for Public Cloud Infrastructure Managed Service firewall is dedicated completely to your environment for the highest level of network security Providers, Worldwide and connectivity, and includes access to our Firewall Manager and our One-Hour Hardware • Hosting provider for more than half of the Replacement Guarantee. Fortune 100 • 16+ years of hosting experience WHY RACKSPACE FOR DEDICATED, FULLY MANAGED FIREWALLS? • Customers in 150+ countries You have valuable and confidential information stored on your dedicated and cloud servers. Dedicated firewalls from Cisco and Juniper Networks add an additional layer of security to your servers, helping to stop potentially malicious packets from ever reaching your network. “RACKSPACE’S SECURITY CONTROLS AND REPUTATION AS AN SSAE 16 CERTIFIED KEY BENEFITS PROVIDER HAS BEEN A Highest level of security: Help protect your data and stop potentially malicious packets TREMENDOUS FACTOR IN OUR from entering your network with an IPSec, and Common Criteria EAL4 evaluation status certified firewall. SUCCESS.” DAVID SCHIFFER :: FOUNDER AND PRESIDENT, Expertise: Rackspace security experts fully manage your firewalls 24x7x365. Consult with SAFE BANKING SYSTEMS CISSP-certified security engineers to assess and architect your firewalls to help you meet your security and compliance requirements. Visibility and control: Help protect your infrastructure with deep packet inspection of traffic based on traffic filtering rules you define.
    [Show full text]
  • AB 1699 Page 1
    AB 1699 Page 1 Date of Hearing: April 30, 2019 ASSEMBLY COMMITTEE ON PRIVACY AND CONSUMER PROTECTION Ed Chau, Chair AB 1699 (Levine) – As Amended April 22, 2019 SUBJECT: Telecommunications: public safety customer accounts: states of emergency SUMMARY: This bill would prohibit, among other things, a mobile internet service provider (ISP) from impairing or degrading the lawful internet traffic of its public safety customer accounts, subject to reasonable network management, as specified, during a state of emergency declared by the President or the Governor, or upon the declaration of a local emergency by an official, board, or other governing body vested with authority to make such a declaration in any city, county, or city and county. This bill would state that the Legislature finds and declares that this bill is adopted pursuant to the police power granted to the State of California under the United States Constitution and cannot be preempted by the Federal Communications Commission (FCC), and that the bill ensures police and emergency services personnel have access to all of the resources necessary for them to operate effectively during a state of emergency. EXISTING LAW: 1) Declares it unlawful for a fixed or mobile ISP, insofar as the provider is engaged in providing fixed broadband internet access service, to engage in certain activities, including, among other things: Blocking lawful content, applications, services, or nonharmful devices, subject to reasonable network management. Impairing or degrading lawful internet traffic on the basis of internet content, application, or service, or use of a nonharmful device, subject to reasonable network management. Unreasonably interfering with, or unreasonably disadvantaging, either an end user’s ability to select, access, and use broadband internet access service or the lawful internet content, applications, services, or devices of the end user’s choice, or an edge provider’s ability to make lawful content, applications, services, or devices available to end users, subject to reasonable network management.
    [Show full text]
  • Phorm PIA Interim
    80/20 Thinking Ltd: Interim PIA for Phorm Inc 1 80/20 Thinking Ltd First Stage (Interim) Privacy Impact Assessment For Phorm Inc. February 10, 2008 80/20 Thinking Limited Registered office: 4th floor, 18 Pall Mall, London, SW1Y 5LU Company number 06483833 80/20 Thinking Ltd: Interim PIA for Phorm Inc 2 INTRODUCTION Phorm Inc has engaged 80/20 Thinking Ltd to deliver a Privacy Impact Assessment (PIA) as an integrated component of product development and deployment of its technology. This document serves as an Interim (first stage) report that will lead to the publication of a full PIA in March 2008. The commissioned work involves the following elements: • Scoping the technology and engineering elements to assess privacy functionality. • Assessment of due diligence and compliance aspects. • Conducting a full risk assessment of presentational and other elements of the product launch and deployment. • Working collaboratively to develop a sustainable privacy framework within the organisation. • Conducting privacy training to all Phorm staff. • Auditing the privacy policies. • Developing an outreach and stakeholder engagement process. • Creating a rapid response privacy reporting & response regime. • Follow-up for nine months, involving meetings with the executive team. As this assessment is being conducted relatively late in the lifecycle of Phorm’s product deployment, 80/20 Thinking has developed a “late stage implementation” PIA model that aims to satisfy most, if not all, of the criteria of a “full product cycle” PIA. This model is specifically designed to assist the implementation of a risk mitigation strategy for the implementation and lifecycle of IT projects that either involve personal data or which deploy potentially complex or controversial technologies and techniques.
    [Show full text]