JIPITEC Vol 4 (2013)

Total Page:16

File Type:pdf, Size:1020Kb

JIPITEC Vol 4 (2013) 4 | 2013 Volume 4 (2013) Issue 1 ISSN 2190-3387 Articles “Privacy by Design”: Nice-to-have or a Necessary Principle of Data Protection Law? by David Krebs On the Role of Copyright Protection in the Information Society - Anti-ACTA Protests in Poland as a Lesson of Participatory Democracy Law and Electronic Commerce Information Technology, Intellectual Property, Journal of by Katarzyna Gracz Patentability and Scope of Protection for DNA Sequence-related Inventions from Perspective of the United States of America and Europe by Radoslav M. Milkov Reports Swiss Patent Jurisprudence 2012 by Cyrill P. Rigamonti Book Reviews Ch Geiger (ed), Criminal Enforcement of Intellectual Property by Rita Matulionyte Editors’ Pick by T. Dreier, L. Guibault, A. Metzger, M. Peguera Editors: Thomas Dreier Axel Metzger Gerald Spindler Lucie Guibault www.jipitec.eu Miquel Peguera Table Of Contents Articles Journal of Intellectual Property, Information Technology and “Privacy by Design“: Nice-to-have or Electronic Commerce a Necessary Principle of Data Protection Law? Law by David Krebs 2 Volume 4 Issue 1, 2013 www.jipitec.eu On the Role of Copyright Protection in the Information [email protected] Society - Anti-ACTA Protests in Poland as a Lesson of Participatory Democracy A joint publication of: by Katarzyna Gracz 21 Prof. Dr. Thomas Dreier, M. C. J., Karlsruhe Institute of Technology, Patentability and Scope of Protection for DNA Vincenz-Prießnitz-Str. 3, Sequence-related Inventions from Perspective 76131 Karlsruhe of the United States of America and Europe Prof. Dr. Axel Metzger, LL. M., by Radoslav M. Milkov 36 Institute for Legal Informatics, Leibniz Universität Hannover, Königsworther Platz 1, 30167 Hannover Reports Prof. Dr. Gerald Spindler, Swiss Patent Jurisprudence 2012 Dipl.-Ökonom, Georg-August- by Cyrill P. Rigamonti 53 Universität Göttingen, Platz der Göttinger Sieben 6, 37073 Göttingen Book Reviews Karlsruhe Institute of Technology, Leibniz Universität Hannover, and Ch Geiger (ed), Criminal Enforcement Georg-August-Universität Göttingen of Intellectual Property are corporations under public law, by Rita Matulionyte 63 and represented by their respective presidents. Editors‘ Pick by T. Dreier, L. Guibault, A. Metzger, M. Peguera 66 Editors: Thomas Dreier Axel Metzger Gerald Spindler Lucie Guibault Miquel Peguera Editor-in-charge for this issue: Thomas Dreier Administrative Editor: Philipp Zimbehl Student Editor: Jessica H. Lee Project Assistant: Michael Funke Layout: Magdalena Góralczyk, Matthias Haag, Marco Ganzhorn ISSN 2190-3387 Funded by 4 1 2013 David Krebs “Privacy by Design”: Nice-to-have or a Necessary Principle of Data Protection Law? by David Krebs* Juris Doctor, LL.M., Member of the Law Society of Alberta (Canada) Abstract: Privacy by Design is a term that was to contemporary technology. Effective privacy coined in 1997 by the Canadian privacy expert and legislation ought to include an explicit privacy-by- Commissioner for Ontario, Dr Ann Cavoukin, but one design requirement, including mandating specific that has recently been receiving more attention in technological requirements for those technologies terms of its inclusion as a positive requirement into that have the most privacy-intrusive potential. This EU, US and Canadian data protection frameworks. paper discusses three such applications and how This paper argues that the right to personal privacy is privacy considerations were applied at the design a fundamental right that deserves utmost protection stages. The recent proposal to amend the EU data by society and law. Taking privacy into consideration protection framework includes an explicit privacy-by- at the design stage of a system may today be an design requirement and presents a viable benchmark implicit requirement of Canadian federal and EU that Canadian lawmakers would be well-advised to legislation, but any such mention is not sufficiently take into consideration. concrete to protect privacy rights with respect Keywords: Data Protection, Canadian Privacy Law, Comparative Law, EU Data Protection Regulation, Right to Privacy © 2013 David Krebs Everybody may disseminate this article by electronic means and make it available for download under the terms and conditions of the Digital Peer Publishing Licence (DPPL). A copy of the license text may be obtained at http://nbn-resolving. de/urn:nbn:de:0009-dppl-v3-en8. Recommended citation: David Krebs, “Privacy by Design”: Nice-to-have or a Necessary Principle of Data Protection Law?, 4 (2013) JIPITEC 2, para. 1. A. Introduction biometrics and private sector Internet marketing initiatives. Currently, for the most part at least, 1 The threats to the individual right to privacy – technology is being adjusted after the fact to patch or what is sometimes referred to as the right to privacy-related issues as they arise or after they have ‘informational self-determination’1 or simply already had a negative impact. the ‘right to be let alone’2 – are currently being widely discussed, debated and analysed. This is 2 To address these concerns and to move from a particularly so where this right is impacted by reactive to a proactive approach, Dr Ann Cavoukian, new technologies or the incremental move of current Privacy Commissioner for Ontario, in 1997 our daily activities online. New technologies that had already developed the principles behind – and impact the way in which information about people, coined the phrase – ‘privacy by design’ (PbD). PbD ‘personally identifiable information’3 (‘PII’), is used, recognizes that the deployment of technologies collected, stored and disseminated are appearing designed to achieve a certain commercial or public sector goal without having considered the privacy at a frequent and rapid pace. These may be ‘apps’, 4 facial recognition technologies, smart electricity implications at the design stage of the technology grids, Radio Frequency Technologies (RFID), cloud can result in personally identifiable information (PII) computing, mass and surreptitious surveillance, being used or disclosed in ways that harm privacy rights permanently. PbD embodies the merger of 4 2 2013 “Privacy by Design”: Nice-to-have or a Necessary Principle of Data Protection Law? two objectives: the protection and control of PII and been some significant developments in this regard. privacy, and the advancement of the commercial The third part will look at pertinent examples of application of technologies in a sustainable but systems to which PbD principles were applied, and competitive manner.5 The Protection of Information without which the resulting systems would likely and Electronics Documents Act6 (‘PIPEDA’)7 (as well have been much more privacy-intrusive. The last as the European Data Protection Directive)8 contains part of the analysis will focus on the views of data provisions relating to the adequacy of protective protection authorities relating to incorporating security measures and also, implicitly, privacy ‘by PbD into legislative frameworks, including a close design’ requirements. At present, however, PbD look at the legislative proposal from the Ontario is not an explicit part of the legislative scheme in Commissioner, Dr Ann Cavoukian, which was Canada, the European Union (EU) or the United included as part of a very recent publication from States of America (US), even though it is often cited her office.15 The final part of this article will make as a best practice and perhaps even as the ‘gold some recommendations and suggested points for standard’ in privacy protection.9 future research in this regard.16 3 Calls for an introduction of PbD into legislative frameworks have been receiving more attention B. Privacy by Design recently, for example, within the proposal for an EU privacy framework,10 in proposed legislation in the US,11 as well as a resolution at the 32nd International I. The Right to Privacy Conference of Data Protection and Privacy Commissioners in Jerusalem. In Canada, there have been no such [Code] will present the greatest threat to both concrete proposals, only the vocal views of the liberal and libertarian ideals, as well as their Federal and Ontario Commissioners. greatest promise. We can build, or architect, 4 This paper argues that legislated PbD is the cyberspace to protect values that we believe necessary next step in privacy law to protect a are fundamental. Or we can build, or architect, right that is fundamental to liberty, personal or code cyberspace to allow those values to 17 integrity and democracy. For this reason, PbD disappear. deserves explicit mention as a tenet of privacy and 6 This section is not intended to provide an exhaustive data protection law. However, the view that laws background to or a detailed comparative analysis based on PbD principles alone would be sufficient of the right to privacy in Canada versus other in this regard is not tenable in a world of ubiquitous Western jurisdictions.18 Rather, it is intended to computing and transformative technologies. A set the stage for the discussion of why a legislated broad, principled approach relies on organizations PbD requirement might be a necessary addition to adopting appropriate measures without providing existing data privacy frameworks in order to protect the necessary guidance necessary to prevent actions the right to privacy as a fundamental personal and injurious to personal privacy such as data breaches, democratic right. unwanted tracking or uncontrolled collection of ever-increasing amounts of PII. PbD needs to be 7 In some jurisdictions,
Recommended publications
  • Automated Vehicles Tactical Plan
    Attachment 1: Automated Vehicles Tactical Plan IE8.7 - Attachment 1 AUTOMATED VEHICLES TACTICAL PLANDRAFT INTENTIONALLY LEFT BLANK DRAFT ACKNOWLEDGMENTS This document is the result of guidance, feedback and support from a number of individuals and organizations. In the development of this Automated Vehicles Tactical Plan, the City of Toronto hosted many stakeholder workshops and one-on-one meetings, consulted panels, and provided an open call for feedback via surveys and public posting. Responses were provided by academic institutions, industry representatives, community associations, City staff, advocacy groups, neighbouring municipalities, members of the public and international experts – among other stakeholders. A special thank you to the 2018 Toronto Planning Review Panel, the 2019 Accessibility Advisory Committee, and the 2019 Expert Review Panel hosted by the Ontario Centres of Excellence for their detailed feedback on the AV Tactical Plan. Expert Review Panel Members Emiko Atherton Anthony Townsend Director National Complete Streets Principal Consultant and Author, Bits Coalition, Smart Growth America and Atoms LLC (New York City, NY) (Washington, DC) Dr. Tom Vöge Ann Cavoukian Policy Analyst Intelligent Transport Distinguished Expert-in-Residence, Systems, Organization for Economic Privacy by Design Centre of Cooperation and Development – Excellence, Ryerson University International Transport Forum (Paris, (Toronto, ON) France) Rita Excell Bryant Walker Smith Executive Director, Australia and New Assistant Professor School of
    [Show full text]
  • Urbanism Under Google: Lessons from Sidewalk Toronto
    Fordham Law Review Volume 88 Issue 2 Article 4 2019 Urbanism Under Google: Lessons from Sidewalk Toronto Ellen P. Goodman Rutgers Law School Julia Powles University of Western Australia Follow this and additional works at: https://ir.lawnet.fordham.edu/flr Part of the Law and Society Commons, and the Science and Technology Law Commons Recommended Citation Ellen P. Goodman and Julia Powles, Urbanism Under Google: Lessons from Sidewalk Toronto, 88 Fordham L. Rev. 457 (2019). Available at: https://ir.lawnet.fordham.edu/flr/vol88/iss2/4 This Symposium is brought to you for free and open access by FLASH: The Fordham Law Archive of Scholarship and History. It has been accepted for inclusion in Fordham Law Review by an authorized editor of FLASH: The Fordham Law Archive of Scholarship and History. For more information, please contact [email protected]. URBANISM UNDER GOOGLE: LESSONS FROM SIDEWALK TORONTO Ellen P. Goodman* & Julia Powles** Cities around the world are rapidly adopting digital technologies, data analytics, and the trappings of “smart” infrastructure. These innovations are touted as solutions to help rationalize services and address rising urban challenges, whether in housing, transit, energy, law enforcement, health care, waste management, or population flow. Promises of urban innovation unite cities’ need for help with technology firms’ need for markets and are rarely subject to evidentiary burdens about projected benefits (let alone costs). For the city, being smart is about functioning better and attracting tech plaudits. For the technology company, the smart city is a way to capture the value of data flows—either by directly monetizing behavioral insights or by using those insights to design or acquire services—and then realizing the network effects and monopoly rents that have characterized information technology platforms.
    [Show full text]
  • NOTHING to HIDE: Tools for Talking (And Listening) About Data Privacy for Integrated Data Systems
    NOTHING TO HIDE: Tools for Talking (and Listening) About Data Privacy for Integrated Data Systems OCTOBER 2018 Acknowledgements: We extend our thanks to the AISP Network and Learning Community, whose members provided their support and input throughout the development of this toolkit. Special thanks to Whitney Leboeuf, Sue Gallagher, and Tiffany Davenport for sharing their experiences and insights about IDS privacy and engagement, and to FPF Policy Analyst Amy Oliver and FPF Policy Intern Robert Martin for their contributions to this report. We would also like to thank our partners at Third Sector Capital Partners and the Annie E. Casey Foundation for their support. This material is based upon work supported by the Corporation for National and Community Service (CNCS). Opinions or points of view expressed in this document are those of the authors and do not necessarily reflect the official position of, or a position that is endorsed by, CNCS or the Social Innovation Fund. TABLE OF CONTENTS Introduction ............................................................................................................................................................................................................................. 2 Why engage and communicate about privacy? ................................................................................................................................................. 2 Using this toolkit to establish social license to integrate data .....................................................................................................................
    [Show full text]
  • Designing Privacy for You a Practical Approach for User-Centric Privacy
    Designing Privacy for You A Practical Approach for User-Centric Privacy Awanthika Senarath1, Nalin A.G. Arachchilage2, and Jill Slay3 1 Australian Centre for Cyber Security University of New South Wales - Canberra Australian Defence force Academy, Australia Email: [email protected] 2 Email: [email protected] 3 Email: [email protected] Abstract. Privacy directly concerns the user as the data owner (data- subject) and hence privacy in systems should be implemented in a man- ner which concerns the user (user-centered). There are many concepts and guidelines that support development of privacy and embedding pri- vacy into systems. However, none of them approaches privacy in a user- centered manner. Through this research we propose a framework that would enable developers and designers to grasp privacy in a user-centered manner and implement it along with the software development life cycle. 1 Introduction Donald Trump’s presidential campaign was seriously damaged, when a personal conversation he had with a friend ten years ago (in 2005) was recorded and re- leased to the public during his run in the elections in 2016 in the USA. The recording had been done without the knowledge of the two people engaged in the conversation and was released at a very critical moment in the presidential campaign [1]. This is not much different to the situation users face on a daily basis when using on-line applications to network, communicate, shopping and banking on-line, and for many other personal tasks [9]. Due to the pervasiveness of Information and Communication Technology on-line applications have be- come an integral part of users [7].
    [Show full text]
  • BOARD of GOVERNORS Thursday, June 29, 2017 Jorgenson Hall – JOR 1410 380 Victoria Street 4:00 P.M
    BOARD OF GOVERNORS Thursday, June 29, 2017 Jorgenson Hall – JOR 1410 380 Victoria Street 4:00 p.m. to 6:00 p.m. Time Item Presenter/s Action 4:00 1. IN-CAMERA DISCUSSION (Board Members Only) 4:15 2. IN-CAMERA DISCUSSION (Executive Group Invited) END OF IN-CAMERA DISCUSSION 3. INTRODUCTION 4:40 3.1 Chair’s Remarks Janice Fukakusa Information 3.2 Approval of the June 29, 2017 Agenda Janice Fukakusa Approval 4:45 4. REPORT FROM THE PRESIDENT Mohamed Lachemi Information 4.1 Congress of the Humanities and Social Sciences 2017 Pam Sugiman Information Highlights 5:00 5. REPORT FROM THE SECRETARY Julia Shin Doi Information 5.1 Board of Governors Student Leadership Award and Julia Shin Doi Information Medal 5.2 Annual Board Assessments Julia Shin Doi Information 5:05 6. REPORT FROM THE INTERIM PROVOST AND VICE Chris Evans Information PRESIDENT ACADEMIC 6.1 Policy and Procedures Relating to Search Committees Mohamed Lachemi Approval and Appointments in the Academic Administration and Christopher Evans to the Development and Evaluation of the Performance Saeed Zolfaghari of Academic Administrators (“AAA Policy”) 7. DISCUSSION 5:25 7.1 REPORT FROM THE INTERIM VICE PRESIDENT Rivi Frankle Information UNIVERSITY ADVANCEMENT 5:30 7.2 REPORT FROM THE CHAIR OF THE AUDIT COMMITTEE Jack Cockwell Information 7.2.1 Draft Audited Financial Statements -Year Ended April 30, Joanne McKee Approval 2017 7.2.2 Safe Disclosure Policy Janice Winton Approval Scott Clarke 5:40 7.3 REPORT FROM THE CHAIR OF THE EMPLOYEE RELATIONS Mitch Frazer AND PENSION COMMITTEE 7.3.1 Audited Financial Statements of the Ryerson Retirement Christina Sass-Kortsak Approval Pension Plan (RRPP) January 1, 2017 and Audit Findings for the year ending December 31, 2016 7.3.2 Preliminary Valuation of the Ryerson Retirement Mitch Frazer Approval Pension Plan (RRPP) January 1, 2017 Christina Sass-Kortsak 7.3.3 Amendments to the Ryerson Retirement Pension Plan Christina Sass-Kortsak Approval Statement of Investment Policies & Procedures 8.
    [Show full text]
  • The Internet of Audio Things: State-Of-The-Art, Vision, and Challenges Carlo Fischione, Luca Turchet, György Fazekas, Mathieu Lagrange, Hossein Ghadikolaei
    The Internet of Audio Things: state-of-the-art, vision, and challenges Carlo Fischione, Luca Turchet, György Fazekas, Mathieu Lagrange, Hossein Ghadikolaei To cite this version: Carlo Fischione, Luca Turchet, György Fazekas, Mathieu Lagrange, Hossein Ghadikolaei. The Internet of Audio Things: state-of-the-art, vision, and challenges. IEEE internet of things journal, IEEE, 2020, 7 (10), pp.10233-10249. 10.1109/JIOT.2020.2997047. hal-02930053v2 HAL Id: hal-02930053 https://hal.archives-ouvertes.fr/hal-02930053v2 Submitted on 8 Jan 2021 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. IEEE INTERNET OF THINGS JOURNAL, VOL. XX, NO. X, NOVEMBER 2020 1 The Internet of Audio Things: state-of-the-art, vision, and challenges Luca Turchet, Gyorgy¨ Fazekas, Mathieu Lagrange, Hossein S. Ghadikolaei, and Carlo Fischione, Senior Member, IEEE, Abstract—The Internet of Audio Things (IoAuT) is an emerg- the emerging field of the Internet of Musical Things (IoMusT) ing research field positioned at the intersection of the Internet [7], where a number of devices for music production and of Things, sound and music computing, artificial intelligence, consumption are connected within ecosystems that multiply and human-computer interaction.
    [Show full text]
  • Roundtable-1-Presentation-March-20-2018.Pdf
    welcome! Thanks for coming! We will give tonight’s presentation and invite questions twice (6 pm and 7:30 pm). Please be sure to also join a small group roundtable discussion at the other end of the hall. hello! Hi, I’m Meg Davis, + I’m Rit Aggarwala 3 Thank you! For joining us to roll up your sleeves and tackle some tough questions with us 4 Town Hall What we heard you care about Well-being and community health People-centred planning Public transit and personal mobility Sustainable, resilient, climate-positive development Diversity and inclusion Housing quality and affordability Data-informed decision-making Privacy and data governance Green space, recreation and leisure Engaged communities Entrepreneurship and innovation 5 5 Since Last Time Built and organized our joint Sidewalk Toronto team and opened a TO office Developed a robust public engagement plan with firm dates Forming 6 advisory groups (80+ local leaders) to guide us in our work Met with key stakeholders, including representatives of all levels of government Exploring a series of pilots and prototypes to launch in Toronto Focused our core research questions to develop work plans and hypotheses 6 Tonight Describe what this project is all about Explain what we’re working on and where we need your input Open the floor to your questions and address some of your concerns Discuss key questions in a roundtable conversation 7 7 Who We Are Transforming the waterfront for the use and enjoyment of the people and visitors of Toronto, Ontario and Canada, to foster economic growth and to redefine how the city, province and country are perceived by the world — a project of national significance.
    [Show full text]
  • Freedom Liberty
    2013 ACCESS AND PRIVACY Office of the Information and Privacy Commissioner Ontario, Canada FREEDOM & LIBERTY As Commissioner, I feel that one of the most important parts of my mandate is to engage citizens so that the message of “respect our privacy, respect our freedoms,” can be heard loud and clear. COMMISSIONER’S MESSAGE WHEN I BEGAN MY FIRST TERM AS ONTARIO’S INFORMATION AND PRI- 2009 VACY COMMISSIONER IN 1997, I COULD In 2009, I continued to advance Privacy by NOT HAVE IMAGINED HOW MUCH THE Design on the world stage by launching The 7 WORLD WOULD BE CHANGING! Com- Foundational Principles of Privacy by Design, puters and the Internet were still largely limited which I am proud to say have now been trans- to desktops in homes and offices. Laptops were lated into 35 languages, with more to come. still unwieldy devices, and cellphones were still To ensure that Privacy by Design continued to a long way from becoming “smart.” gain strong global momentum, I also launched Today, information technology is compact, www.privacybydesign.ca as a repository of mobile, and everywhere. You cannot walk down news, information and research. the street without seeing someone using some In an entirely different area, following an exten- sort of mobile device that has more computing sive investigation, I issued a special report en- power than an office floor full of computers, just a generation ago. There is almost no aspect of titled, Excessive Background Checks Conducted our lives left that remains untouched by infor- on Prospective Jurors: A Special Investigation Re- mation and communications technology.
    [Show full text]
  • 20777807 Lprob 1.Pdf
    Inman Harvey · Ann Cavoukian George Tomko · Don Borrett Hon Kwan · Dimitrios Hatzinakos Editors SmartData Privacy Meets Evolutionary Robotics SmartData Inman Harvey • Ann Cavoukian George Tomko • Don Borrett Hon Kwan • Dimitrios Hatzinakos Editors SmartData Privacy Meets Evolutionary Robotics Editors Inman Harvey Ann Cavoukian School of Informatics Office of the Information University of Sussex and Privacy Commissioner of Ontario Brighton, UK Toronto, ON, Canada George Tomko Don Borrett Identity, Privacy and Security Initiative Department of Medicine University of Toronto University of Toronto Toronto, ON, Canada Toronto, ON, Canada Hon Kwan Dimitrios Hatzinakos Department of Neurophysiology Electrical and Computer Engineering University of Toronto University of Toronto Toronto, ON, Canada Toronto, ON, Canada ISBN 978-1-4614-6408-2 ISBN 978-1-4614-6409-9 (eBook) DOI 10.1007/978-1-4614-6409-9 Springer New York Heidelberg Dordrecht London Library of Congress Control Number: 2013932866 # Springer Science+Business Media New York 2013 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Exempted from this legal reservation are brief excerpts in connection with reviews or scholarly analysis or material supplied specifically for the purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the work. Duplication of this publication or parts thereof is permitted only under the provisions of the Copyright Law of the Publisher’s location, in its current version, and permission for use must always be obtained from Springer.
    [Show full text]
  • Testing Our Trust: Consumers and the Internet of Things (2017 Review)
    Testing our trust: consumers and the Internet of Things 2017 review Contents 1. Connected by default: why the internet of things is important for consumers 1 2. Review of the consumer internet of things market 3 Steady growth 3 New opportunities 6 3. Consumer attitudes to the Internet of Things 7 Privacy and security remain big concerns for consumers 7 Safety fears 7 Low trust in technology 8 4. Challenges that persist for consumers in the Internet of Things 8 Consumers are not informed 8 Security vulnerabilities cause global internet disruption 9 Privacy violations 10 Remote enforcement of contract terms 10 Buying a brick 11 Companies not equipped for proper aftercare 11 5. Responses to consumer challenges and concerns 12 National governments and inter-governmental bodies 12 Industry, civil society and coalition responses 16 6. Conclusions and next steps 18 Demand side power? 18 The role of the consumer movement 19 2 2017 review: testing our trust Coming together for change 1. Connected by default: With 5G predicted to arrive in some countries early next year2, we can expect faster speeds, improved response why the Internet of time, and the bandwidth needed for billions of Internet of Things devices to communicate with each other. 5G Things is important could also mean a reduction in energy usage. These improvements are predicted to not only improve user for consumers experience but also pave the way for further innovations. Consumer applications in the Internet of Things The way that we currently experience the internet can bring many benefits to people around the world involves, to some extent, a choice about how and when to including: more responsive services; shorter feedback engage.
    [Show full text]
  • Privacy and the Open Networked Enterprise Privacy June, 2005 and the IT& Open Networked Enterprise CA Big Idea
    Information Technology & Competitive Advantage Privacy and the Open Networked Enterprise Privacy June, 2005 June, and the IT& Open Networked Enterprise CA Big Idea by Dr. Ann Cavoukian New Paradigm October 17, 2006 Privacy and the Enterprise 2.0 by Dr. Ann Cavoukian and Don Tapscott The Story in Brief Based on the new Web—known as the Web 2.0—a new model of the corporation is emerging—call it the Enterprise 2.0. The new enterprise is highly networked and open, with high transparency, and effective use of IT to link with various stakeholders—all on a global basis. By necessity, within the Enterprise 2.0, corporate boundaries blur: in order to facilitate effective collaboration, the new enterprise compiles highly granular data from disparate sources (i.e., multiple stakeholders) to create a more holistic business intelligence. Smart firms will build appropriate and effective privacy policies and practices into their systems. In doing so, these firms can avoid potential disasters and create the conditions for trust, loyalty, long-term relationships, and economic advantage. Privacy is no longer a compliance issue; it is a business issue. It must be a business imperative. Table of Contents 1 The Context: Privacy and Technology 12 Relationships Context 4 The Web 2.0 Privacy concerns: consumer trust 5 New Boundaries, New Business Processes Possible Solutions Context 15 Information Liquidity Privacy concerns: outsourcing and offshoring Context Recommendations Privacy concerns: bad data, bad decisions 9 Modus Operandi Possible solutions Context
    [Show full text]
  • Privacy by Design
    JANUARY 2018 Privacy by Design Privacy by Design is a methodology for proactively embedding privacy into information technology, business practices, and networked infrastructures. The Privacy by Design measures are designed to anticipate and prevent privacy invasive events before they occur. SEVEN FOUNDATIONAL PRINCIPLES The Privacy by Design framework is based on seven foundational principles: 1. Proactive not Reactive; Preventative not Remedial Anticipate, identify and prevent privacy invasive events before they occur. 2. Privacy as the Default Setting Build in the maximum degree of privacy into the default settings for any system or business practice. Doing so will keep a user’s privacy intact, even if they choose to do nothing. 3. Privacy Embedded into Design Embed privacy settings into the design and architecture of information technology systems and business practices instead of implementing them after the fact as an add-on. 4. Full Functionality — Positive-Sum, not Zero-Sum Accommodate all legitimate interests and objectives in a positive-sum manner to create a balance between privacy and security because it is possible to have both. 5. End-to-End Security — Full Lifecycle Protection Embed strong security measures to the complete lifecycle of data to ensure secure management of the information from beginning to end. 6. Visibility and Transparency — Keep it Open Assure stakeholders that privacy standards are open, transparent and subject to independent verification. 7. Respect for User Privacy — Keep it User-Centric Protect the interests of users by offering strong privacy defaults, appropriate notice, and empowering user-friendly options. PRIVACY TECHNOLOGYBY DESIGN FACT SHEET: PROTECTING AGAINST RANSOMWARE 2 2 .
    [Show full text]