NOTHING to HIDE: Tools for Talking (And Listening) About Data Privacy for Integrated Data Systems

Total Page:16

File Type:pdf, Size:1020Kb

NOTHING to HIDE: Tools for Talking (And Listening) About Data Privacy for Integrated Data Systems NOTHING TO HIDE: Tools for Talking (and Listening) About Data Privacy for Integrated Data Systems OCTOBER 2018 Acknowledgements: We extend our thanks to the AISP Network and Learning Community, whose members provided their support and input throughout the development of this toolkit. Special thanks to Whitney Leboeuf, Sue Gallagher, and Tiffany Davenport for sharing their experiences and insights about IDS privacy and engagement, and to FPF Policy Analyst Amy Oliver and FPF Policy Intern Robert Martin for their contributions to this report. We would also like to thank our partners at Third Sector Capital Partners and the Annie E. Casey Foundation for their support. This material is based upon work supported by the Corporation for National and Community Service (CNCS). Opinions or points of view expressed in this document are those of the authors and do not necessarily reflect the official position of, or a position that is endorsed by, CNCS or the Social Innovation Fund. TABLE OF CONTENTS Introduction ............................................................................................................................................................................................................................. 2 Why engage and communicate about privacy? ................................................................................................................................................. 2 Using this toolkit to establish social license to integrate data ...................................................................................................................... 2 Communicating about Integrated Data .......................................................................................................................................................................4 Sharing a clear and confident public message about integrated data and privacy .............................................................................4 Step 1) Set your communication goals ...................................................................................................................................................................4 Step 2) Develop your communications strategy .................................................................................................................................................4 Step 3) Develop specific messages that speak to your audience ................................................................................................................5 Step 4) Identify your communications channels and tools ............................................................................................................................6 Step 5) Mobilize your allies .......................................................................................................................................................................................... 7 Engaging Stakeholders around Integrated Data ......................................................................................................................................................8 Building strong and sustainable relationships with those who care about data and privacy ...........................................................8 Step 1) Establish your engagement strategy and resources ..........................................................................................................................8 Step 2) Identify and map your stakeholders ........................................................................................................................................................9 Step 3) Prepare for your engagement activities .................................................................................................................................................9 Step 4) Convene and engage your stakeholders .............................................................................................................................................. 10 Step 5) Follow through and follow up .................................................................................................................................................................. 10 Conclusion ...............................................................................................................................................................................................................................11 Appendix A – Understanding Data Privacy ...............................................................................................................................................................12 A.1: Privacy basics ...........................................................................................................................................................................................................12 A.2: Integrated data privacy .......................................................................................................................................................................................13 A.3: Privacy Fair Information Practice Principles (FIPPs) .............................................................................................................................. 14 A.4: Privacy tools and resources ..............................................................................................................................................................................15 Appendix B – Communications Talking Points and Exercises ............................................................................................................................17 B.1: Talking Points – Describing and distinguishing your IDS ........................................................................................................................17 B.2: Talking Points – Setting reasonable privacy expectations ....................................................................................................................18 B.3: Talking Points – Responding to others’ privacy expectations............................................................................................................. 19 B.4: Talking Points – Tips on language and privacy lingo ...............................................................................................................................21 B5: Exercise – Elevator Pitch .....................................................................................................................................................................................23 B6: Exercise – Advanced Elevator Pitch .............................................................................................................................................................. 24 B7: Exercise – Data Benefit Analysis ......................................................................................................................................................................25 Appendix C – Engagement Worksheets, Checklists and Sample Materials ................................................................................................ 26 C.1: Worksheet – Strategic Engagement Planning ........................................................................................................................................... 26 1. What are our objectives for this engagement? ....................................................................................................................................... 26 2. What is the environment for this engagement? .................................................................................................................................... 26 3. What are our resources for engagement? ................................................................................................................................................27 C.2: Worksheet – Stakeholder Mapping ............................................................................................................................................................... 29 1. Identify your potential stakeholders ............................................................................................................................................................ 29 2. Assess your potential stakeholders’ interests ......................................................................................................................................... 30 3. Prioritize your key stakeholders ................................................................................................................................................................... 30 C.3: Worksheet – Pre-Engagement Planning .......................................................................................................................................................31 1. Prepare answers to basic questions on process and substance .........................................................................................................31 2. Identify what informational or discussion materials you will need ..................................................................................................32 C.4: Worksheet – Convening Stakeholders .........................................................................................................................................................33 1. Deciding when to engage .................................................................................................................................................................................33
Recommended publications
  • NOTHING to HIDE: Tools for Talking (And Listening) About Data Privacy for Integrated Data Systems
    NOTHING TO HIDE: Tools for Talking (and Listening) About Data Privacy for Integrated Data Systems OCTOBER 2018 Acknowledgements: We extend our thanks to the AISP Network and Learning Community, whose members provided their support and input throughout the development of this toolkit. Special thanks to Whitney Leboeuf, Sue Gallagher, and Tiffany Davenport for sharing their experiences and insights about IDS privacy and engagement, and to FPF Policy Analyst Amy Oliver and FPF Policy Intern Robert Martin for their contributions to this report. We would also like to thank our partners at Third Sector Capital Partners and the Annie E. Casey Foundation for their support. This material is based upon work supported by the Corporation for National and Community Service (CNCS). Opinions or points of view expressed in this document are those of the authors and do not necessarily reflect the official position of, or a position that is endorsed by, CNCS or the Social Innovation Fund. TABLE OF CONTENTS Introduction ............................................................................................................................................................................................................................. 2 Why engage and communicate about privacy? ................................................................................................................................................. 2 Using this toolkit to establish social license to integrate data .....................................................................................................................
    [Show full text]
  • Designing Privacy for You a Practical Approach for User-Centric Privacy
    Designing Privacy for You A Practical Approach for User-Centric Privacy Awanthika Senarath1, Nalin A.G. Arachchilage2, and Jill Slay3 1 Australian Centre for Cyber Security University of New South Wales - Canberra Australian Defence force Academy, Australia Email: [email protected] 2 Email: [email protected] 3 Email: [email protected] Abstract. Privacy directly concerns the user as the data owner (data- subject) and hence privacy in systems should be implemented in a man- ner which concerns the user (user-centered). There are many concepts and guidelines that support development of privacy and embedding pri- vacy into systems. However, none of them approaches privacy in a user- centered manner. Through this research we propose a framework that would enable developers and designers to grasp privacy in a user-centered manner and implement it along with the software development life cycle. 1 Introduction Donald Trump’s presidential campaign was seriously damaged, when a personal conversation he had with a friend ten years ago (in 2005) was recorded and re- leased to the public during his run in the elections in 2016 in the USA. The recording had been done without the knowledge of the two people engaged in the conversation and was released at a very critical moment in the presidential campaign [1]. This is not much different to the situation users face on a daily basis when using on-line applications to network, communicate, shopping and banking on-line, and for many other personal tasks [9]. Due to the pervasiveness of Information and Communication Technology on-line applications have be- come an integral part of users [7].
    [Show full text]
  • The Internet of Audio Things: State-Of-The-Art, Vision, and Challenges Carlo Fischione, Luca Turchet, György Fazekas, Mathieu Lagrange, Hossein Ghadikolaei
    The Internet of Audio Things: state-of-the-art, vision, and challenges Carlo Fischione, Luca Turchet, György Fazekas, Mathieu Lagrange, Hossein Ghadikolaei To cite this version: Carlo Fischione, Luca Turchet, György Fazekas, Mathieu Lagrange, Hossein Ghadikolaei. The Internet of Audio Things: state-of-the-art, vision, and challenges. IEEE internet of things journal, IEEE, 2020, 7 (10), pp.10233-10249. 10.1109/JIOT.2020.2997047. hal-02930053v2 HAL Id: hal-02930053 https://hal.archives-ouvertes.fr/hal-02930053v2 Submitted on 8 Jan 2021 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. IEEE INTERNET OF THINGS JOURNAL, VOL. XX, NO. X, NOVEMBER 2020 1 The Internet of Audio Things: state-of-the-art, vision, and challenges Luca Turchet, Gyorgy¨ Fazekas, Mathieu Lagrange, Hossein S. Ghadikolaei, and Carlo Fischione, Senior Member, IEEE, Abstract—The Internet of Audio Things (IoAuT) is an emerg- the emerging field of the Internet of Musical Things (IoMusT) ing research field positioned at the intersection of the Internet [7], where a number of devices for music production and of Things, sound and music computing, artificial intelligence, consumption are connected within ecosystems that multiply and human-computer interaction.
    [Show full text]
  • Idioms-And-Expressions.Pdf
    Idioms and Expressions by David Holmes A method for learning and remembering idioms and expressions I wrote this model as a teaching device during the time I was working in Bangkok, Thai- land, as a legal editor and language consultant, with one of the Big Four Legal and Tax companies, KPMG (during my afternoon job) after teaching at the university. When I had no legal documents to edit and no individual advising to do (which was quite frequently) I would sit at my desk, (like some old character out of a Charles Dickens’ novel) and prepare language materials to be used for helping professionals who had learned English as a second language—for even up to fifteen years in school—but who were still unable to follow a movie in English, understand the World News on TV, or converse in a colloquial style, because they’d never had a chance to hear and learn com- mon, everyday expressions such as, “It’s a done deal!” or “Drop whatever you’re doing.” Because misunderstandings of such idioms and expressions frequently caused miscom- munication between our management teams and foreign clients, I was asked to try to as- sist. I am happy to be able to share the materials that follow, such as they are, in the hope that they may be of some use and benefit to others. The simple teaching device I used was three-fold: 1. Make a note of an idiom/expression 2. Define and explain it in understandable words (including synonyms.) 3. Give at least three sample sentences to illustrate how the expression is used in context.
    [Show full text]
  • Roundtable-1-Presentation-March-20-2018.Pdf
    welcome! Thanks for coming! We will give tonight’s presentation and invite questions twice (6 pm and 7:30 pm). Please be sure to also join a small group roundtable discussion at the other end of the hall. hello! Hi, I’m Meg Davis, + I’m Rit Aggarwala 3 Thank you! For joining us to roll up your sleeves and tackle some tough questions with us 4 Town Hall What we heard you care about Well-being and community health People-centred planning Public transit and personal mobility Sustainable, resilient, climate-positive development Diversity and inclusion Housing quality and affordability Data-informed decision-making Privacy and data governance Green space, recreation and leisure Engaged communities Entrepreneurship and innovation 5 5 Since Last Time Built and organized our joint Sidewalk Toronto team and opened a TO office Developed a robust public engagement plan with firm dates Forming 6 advisory groups (80+ local leaders) to guide us in our work Met with key stakeholders, including representatives of all levels of government Exploring a series of pilots and prototypes to launch in Toronto Focused our core research questions to develop work plans and hypotheses 6 Tonight Describe what this project is all about Explain what we’re working on and where we need your input Open the floor to your questions and address some of your concerns Discuss key questions in a roundtable conversation 7 7 Who We Are Transforming the waterfront for the use and enjoyment of the people and visitors of Toronto, Ontario and Canada, to foster economic growth and to redefine how the city, province and country are perceived by the world — a project of national significance.
    [Show full text]
  • Movielistings
    4b The Goodland Star-News / Friday, December 29, 2006 Like puzzles? Then you’ll love sudoku. This mind-bending puzzle will have FUN BY THE NUMBERS you hooked from the moment you square off, so sharpen your pencil and put your sudoku savvy to the test! Here’s How It Works: Sudoku puzzles are formatted as a 9x9 grid, broken down into nine 3x3 boxes. To solve a sudoku, the numbers 1 through 9 must fill each row, col- umn and box. Each number can appear only once in each row, column and box. You can figure out the order in which the numbers will appear by using the numeric clues already provided in the boxes. The more numbers you name, the easier it gets to solve the puzzle! ANSWER TO TUESDAY’S SATURDAY EVENING DECEMBER 30, 2006 SUNDAY EVENING DECEMBER 31, 2006 6PM 6:30 7PM 7:30 8PM 8:30 9PM 9:30 10PM 10:30 6PM 6:30 7PM 7:30 8PM 8:30 9PM 9:30 10PM 10:30 E S E = Eagle Cable S = S&T Telephone E S E = Eagle Cable S = S&T Telephone Flip This House Profit chal- Flip This House: The Movie Justice: Deadly Magnolia: Justice Hooker kills men. Flip This House Profit chal- The First 48: Fallen; Dog the Bounty Hunter: Dog the Bounty Hunter Dog the Dog the The First 48: Fallen; 36 47 A&E lenge. (TV G) (R) Star House (R) Patricia Allanson (TVPG) lenge. (TV G) (R) 36 47 A&E Texas Burning (R) Bonds of Love (R) (TVPG) (R) Hunter (R) Hunter (R) Texas Burning (R) Ugly Betty: After Hours Ugly Betty: Lose the Boss? Ugly Betty: Fake Plastic KAKE News (:35) American Idol Re- (:35) Enter- Extreme Makeover: Desperate Housewives: Dick Clark’s New Year’s KAKE News (:35)
    [Show full text]
  • Testing Our Trust: Consumers and the Internet of Things (2017 Review)
    Testing our trust: consumers and the Internet of Things 2017 review Contents 1. Connected by default: why the internet of things is important for consumers 1 2. Review of the consumer internet of things market 3 Steady growth 3 New opportunities 6 3. Consumer attitudes to the Internet of Things 7 Privacy and security remain big concerns for consumers 7 Safety fears 7 Low trust in technology 8 4. Challenges that persist for consumers in the Internet of Things 8 Consumers are not informed 8 Security vulnerabilities cause global internet disruption 9 Privacy violations 10 Remote enforcement of contract terms 10 Buying a brick 11 Companies not equipped for proper aftercare 11 5. Responses to consumer challenges and concerns 12 National governments and inter-governmental bodies 12 Industry, civil society and coalition responses 16 6. Conclusions and next steps 18 Demand side power? 18 The role of the consumer movement 19 2 2017 review: testing our trust Coming together for change 1. Connected by default: With 5G predicted to arrive in some countries early next year2, we can expect faster speeds, improved response why the Internet of time, and the bandwidth needed for billions of Internet of Things devices to communicate with each other. 5G Things is important could also mean a reduction in energy usage. These improvements are predicted to not only improve user for consumers experience but also pave the way for further innovations. Consumer applications in the Internet of Things The way that we currently experience the internet can bring many benefits to people around the world involves, to some extent, a choice about how and when to including: more responsive services; shorter feedback engage.
    [Show full text]
  • Interview Transcripts Peter Brant
    Washington Post Peter Brant, childhood friend Peter Brant: I do consider him a friend in the sense that we knew each other so well. But by the time that he left around 13 to go to New York Military Academy, I think that I really didn’t have much contact with him until he came back to New York and was in business for -- you know, he’s a success coming into the New York. I didn’t really see him very much, hardly at all until the ‘80s and then I kind of reconnected with him in the ‘90s and we were social friends. I played golf with him. He’d been to my house several times in the ‘90s. Michael E. Miller (Washington Post): This one here or -- Brant: No. Miller: Connecticut? Brant: No, I’d been to Mar-a-Lago, not a member there but my sister is. I was a member of the golf course that he has here in Palm Beach but only because it was a corporate membership. And my partner at that time, who is my cousin, who’d been my partner for many, many years and whose father was my father’s partner, loves to play golf and he was a member. So I might have played there twice in my life, you know. So there’s no real connection then. You know, he would write me a letter every now and then, just talking about marriage or whatever and -- 1 Miller: Seeking your advice on things or -- Brant: No, no, no, no, no.
    [Show full text]
  • Privacy by Design
    JANUARY 2018 Privacy by Design Privacy by Design is a methodology for proactively embedding privacy into information technology, business practices, and networked infrastructures. The Privacy by Design measures are designed to anticipate and prevent privacy invasive events before they occur. SEVEN FOUNDATIONAL PRINCIPLES The Privacy by Design framework is based on seven foundational principles: 1. Proactive not Reactive; Preventative not Remedial Anticipate, identify and prevent privacy invasive events before they occur. 2. Privacy as the Default Setting Build in the maximum degree of privacy into the default settings for any system or business practice. Doing so will keep a user’s privacy intact, even if they choose to do nothing. 3. Privacy Embedded into Design Embed privacy settings into the design and architecture of information technology systems and business practices instead of implementing them after the fact as an add-on. 4. Full Functionality — Positive-Sum, not Zero-Sum Accommodate all legitimate interests and objectives in a positive-sum manner to create a balance between privacy and security because it is possible to have both. 5. End-to-End Security — Full Lifecycle Protection Embed strong security measures to the complete lifecycle of data to ensure secure management of the information from beginning to end. 6. Visibility and Transparency — Keep it Open Assure stakeholders that privacy standards are open, transparent and subject to independent verification. 7. Respect for User Privacy — Keep it User-Centric Protect the interests of users by offering strong privacy defaults, appropriate notice, and empowering user-friendly options. PRIVACY TECHNOLOGYBY DESIGN FACT SHEET: PROTECTING AGAINST RANSOMWARE 2 2 .
    [Show full text]
  • Privacy by Design: Current Practices
    Public Disclosure Authorized Public Disclosure Authorized Public Disclosure Authorized Public Disclosure Authorized Current Practices Practices Current in Estonia,India, and Austria Privacy by Privacy Design: © 2018 International Bank for Reconstruction and Development/The World Bank 1818 H Street, NW, Washington, D.C., 20433 Telephone: 202-473-1000; Internet: www.worldbank.org Some Rights Reserved This work is a product of the staff of The World Bank with external contributions. The findings, interpretations, and conclusions expressed in this work do not necessarily reflect the views of The World Bank, its Board of Executive Directors, or the governments they represent. The World Bank does not guarantee the accuracy of the data included in this work. The boundaries, colors, denominations, and other information shown on any map in this work do not imply any judgment on the part of The World Bank concerning the legal status of any territory or the endorsement or acceptance of such boundaries. Nothing herein shall constitute or be considered to be a limitation upon or waiver of the privileges and immunities of The World Bank, or of any participating organization to which such privileges and immunities may apply, all of which are specifically reserved. Rights and Permission This work is available under the Creative Commons Attribution 3.0 IGO license (CC BY 3.0 IGO) http:// creativecommons.org/licenses/by/3.0/igo. Under the Creative Commons Attribution license, you are free to copy, distribute, transmit, and adapt this work, including for commercial purposes, under the following conditions: Attribution—Please cite the work as follows: World Bank. 2018.
    [Show full text]
  • Heroes and Philosophy
    ftoc.indd viii 6/23/09 10:11:32 AM HEROES AND PHILOSOPHY ffirs.indd i 6/23/09 10:11:11 AM The Blackwell Philosophy and Pop Culture Series Series Editor: William Irwin South Park and Philosophy Edited by Robert Arp Metallica and Philosophy Edited by William Irwin Family Guy and Philosophy Edited by J. Jeremy Wisnewski The Daily Show and Philosophy Edited by Jason Holt Lost and Philosophy Edited by Sharon Kaye 24 and Philosophy Edited by Richard Davis, Jennifer Hart Week, and Ronald Weed Battlestar Galactica and Philosophy Edited by Jason T. Eberl The Offi ce and Philosophy Edited by J. Jeremy Wisnewski Batman and Philosophy Edited by Mark D. White and Robert Arp House and Philosophy Edited by Henry Jacoby Watchmen and Philosophy Edited by Mark D. White X-Men and Philosophy Edited by Rebecca Housel and J. Jeremy Wisnewski Terminator and Philosophy Edited by Richard Brown and Kevin Decker ffirs.indd ii 6/23/09 10:11:12 AM HEROES AND PHILOSOPHY BUY THE BOOK, SAVE THE WORLD Edited by David Kyle Johnson John Wiley & Sons, Inc. ffirs.indd iii 6/23/09 10:11:12 AM This book is printed on acid-free paper. Copyright © 2009 by John Wiley & Sons, Inc. All rights reserved Published by John Wiley & Sons, Inc., Hoboken, New Jersey Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or autho- rization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750–8400, fax (978) 646–8600, or on the web at www.copyright.com.
    [Show full text]
  • 1M Im^K^M/^ Nn
    W*m mi.. zm ^Artist* Use \ Weldi^i Their Me^W, fc^> »./ : m 1M iM^k^m/^Mya^S^. QmL&p'&%S&! nn|M^ WwlKmi\&f*-1sEi! PUBLISHED BY THE AMERICAN WELDING SOCIETY TO ADVANCE THE SCIENCE, TECHNOLOGY, AND APPLICATION OF WELDING AND ALLIED JOINING AND CUTTING PROCESSES, INCLUDING BRAZING, SOLDERING, AND THERMAL SPRAYING Select-Arc Electrodes Wear Well. Select-Arc has introduced a compre- other conditions For more information on the hensive line of hardsurfacing elec- including impact, hardsurfacing electrodes designed trodes specially developed to tackle adhesion, corrosion, with tough applications in mind, call formidable welding applications. erosion and elevated Select-Arc at 1-800-341-3213 or visit SelectWear• hardsurfacing wires are temperatures. our website: www.select-arc.com. formulated to improve your welding productivity, enhance performance Of course, all Select-Arc hardsurfacing and reduce machinery downtime products deliver the same exceptional SELECT by increasing component life. In electrode quality that our customers addition, these Select-Arc electrodes have come to rely on over the past can provide heightened resistance to decade. For Info go to www.aws.org/ad-index Kimberly-Clark PROFESSIONAL* *** Looking out for number one? Let's get it done. We don't need to tell you about the hazards you face on the job. We do want to tell you about JACKSON SAFETY* welding helmets and safety glasses -your number one combination for maximum comfort and productivity, with patented ADF technology and one-of-a-kind graphics. Count on KIMBERLY CLARK PROFESSIONAL* for a wide range of industrial safety solutions, including JACKSON SAFETY* Halo X welding helmets and NEMESIS* eyewear.
    [Show full text]