SlideShare une entreprise Scribd logo
1  sur  19
Télécharger pour lire hors ligne
Midata Thoughts
   Draft v2.0
        Simon Deane-Johns
        Consultant Solicitor and
Member of the Midata Interoperability Board



                                          9 January 2013
Contents

•   Overview

•   Participants/roles

•   Process flows

•   Developing co-regulatory environment

•   Scenario diagrams

•   Common operational risks, controls, challenges

•   Midata-specific challenges
Overview

• The voluntary Midata programme involves a Supplier making
  each Customer’s transaction data available to the Customer
  in computer-readable format (“midata”).

• This suggests three types of scenario:

   1. Release of midata by a Current Supplier to the Customer

   2. Release of midata by a Current Supplier to the Customer’s duly
      authorised data storage provider (Midata Store) or more active
      data services provider (Midata Service Provider)

   3. Release of midata by Current Supplier to Customer or MS/MSP,
      who transfers it to a third party supplier (“3PS”)
Participants/Roles

•   Supplier
     – Supplier of goods or services whose systems generate midata (e.g. utility, bank,
       telco)
     – Includes Supplier’s own outsourced service provider(s)
•   Customer
     – person or micro-business who interacts with Supplier to produce midata
•   Provider of data storage or extra data services, acting for the Customer:
     – Midata Store (“MS”)
          •   Only receives, stores and/or transmits midata, or tracks where midata sits
          •   May receive midata from Customer or from Current Supplier (“Linked Midata Store”)
          •   can’t ‘see’ or otherwise process content
          •   ‘mere conduit’?
     – Midata Service Provider (“MSP”)
          • May also act as a Midata Store
          • Adds value by analysing or otherwise processing data
          • May alter content and/or produce a result on which Customer/3PS relies.
•   Third Party Supplier (“3PS”)
     – Receives ‘midata’ (or a small extract) only for the purpose of deciding to supply
       goods or services to the Customer
Process Flows


Midata involves two separate process flows:
• Transaction flows
   – Offer and acceptance => contract between each of Customer,
     Current Supplier and MS/MSP
   – Messaging, including identification of each party, data release
     request, confirmation of receipt etc.
• Midata flows
   – Actual transfers of midata


[Funds flows related to payments due between participants
are currently out of scope]
Developing Co-regulatory Environment

•   Data Protection Act 1998 (“DPA”) etc supervised by Information
    Commissioner’s Office (“ICO”) and related exemptions
•   Guidance etc issued by ICO
•   Sector-specific law/regulation
     – Sections 9 DPA and 159 of Consumer Credit Act 1974, applicable to credit
       reference agency data
     – Electricity Act, Gas Act => Data and Communications Company
     – [new Telecoms/banking/consumer credit regulation]
•   Industry Codes
     –   Principles of Reciprocity (Credit Reference Agency data)
     –   Smart Energy Code
     –   [Other sector codes]
     –   Security standards, Privacy by Design etc.
     –   [Midata Principlesstandard permissions, rules on liablility etc?]
•   Contracts
     – Consents etc given under Contracts
     – [standard Midata permissions or Midata sharing agreements?]
Midata Scenario 1




                  1. ID authentication (“auth”)
                  2. Midata request
       Current
                                                  Customer
       Supplier

                      3. Midata transfer




Supply contract
Midata Scenario 2a


                                                         MS/MSP


                                         4. ID auth.                6. Midata
                                         5. Midata Request          transfer


                  1. ID auth   2. Midata request

      Current
                                                         Customer
      Supplier

                          3. Midata transfer



Supply contract   PIM Service contract
Midata Scenario 2b


                                              MS/MSP



                                                 3. ID auth.
                                                 4. Midata request



      Supplier                                Customer
                          1. ID auth
                          2. Midata Request



Supply contract   PIM Service contract
Midata Scenario 2b

Co-regulatory
                                              MS/MSP
relationship?



                                                 3. ID auth.
                                                 4. Midata request



      Current
                                              Customer
      Supplier
                          1. ID auth
                          2. Midata Request



Supply contract   PIM Service contract
Midata Scenario 3a

                  8. Data transfer

          3PS     7. ID auth                                 MS/MSP


                                                                 Transaction flow
                                                                 3. ID auth; 4. Request




      Current
                                                             Customer
      Supplier
                          Transaction flow
                          1. ID auth; 2. Request



Supply contract   PIM Service contract    3PS Service contract
Midata Scenario 3a

                  8. Data transfer

          3PS     7. ID auth                                 MS/MSP


                                                                 Transaction flow
                                                                 3. ID auth; 4. Request




      Current
                                                             Customer
      Supplier
                          Transaction flow
                          1. ID auth; 2. Request


                                                                      Co-regulatory
Supply contract   PIM Service contract    3PS Service contract
                                                                      relationships?
Midata Scenario 3b

                  8. Data transfer

          3PS     7. ID auth                                MS/MSP


                                         4. ID auth.                   6. Midata
                                         5. Midata Request             transfer


                  1. ID auth   2. Midata request

      Current
                                                            Customer
      Supplier

                          3. Midata transfer



Supply contract   PIM Service contract   3PS Service contract
Midata Scenario 3b

                  8. Data transfer

          3PS     7. ID auth                                MS/MSP


                                         4. ID auth.                     6. Midata
                                         5. Midata Request               transfer


                  1. ID auth   2. Midata request

      Current
                                                            Customer
      Supplier

                          3. Midata transfer


                                                                   Co-regulatory
Supply contract   PIM Service contract   3PS Service contract
                                                                   relationships?
Midata Scenario 3c


          3PS

                                              6. Midata
                                              transfer
                  4. ID auth.
                  5. Midata Request


                             1. ID auth
      Current                2. 2. Midata request              Customer
      Supplier

                             3. Midata transfer



Supply contract      PIM Service contract   3PS Service contract
Common Operational Risks

•   Failure to identify one or more parties
•   Fraudulent impersonation of one or more parties
•   ‘Wrongful’ refusal to release midata
•   Interception of messaging and/or midata in transit
•   Wrong midata released
•   Midata is inaccurate, late and/or unreliable
•   Midata is false, altered or corrupted
•   Midata misuse:
    –   loss
    –   destruction
    –   storage longer than agreed/necessary
    –   wrongful disclosure
    –   use for an illicit purpose (including breach of IPRs)
Common Operational Controls/Challenges

• Identity authentication/assurance for all parties
• Release of correct midata
• Secure transmission, processing, storage of midata
• Preserving secrecy/confidentiality of midata content
• Maintaining authenticity and integrity of midata
• Ensuring accuracy, timeliness and reliability of midata
• Guarding against various types of midata misuse
• Vesting and protection of intellectual property rights in midata
  and/or midata databases
Midata-specific Challenges

• Midata portability?

• Extent of ‘agency’ involved in personal information
  management by PIM

• Midata ‘community’ issues:
   –   Principles of reciprocity?
   –   Appropriate grounds for refusal to release?
   –   Mirror CRA and/or DCC environment?
   –   Apportionment of liability for various heads of loss or damage?
   –   Complaints handling?
   –   Enforcement?
   –   Mapping midata to legal rights/obligations to customer permissions
       => a ‘personal data mark-up language’ (WEF “Rethinking Personal
       Data”)
Comments


       Comments welcome via the related post at
                  The Fine Print:
http://sdj-thefineprint.blogspot.co.uk/2013/01/midata-thoughts-no-2.html

Contenu connexe

Tendances

SmartQuora - Learn to build a Smart Contract application on Hyperledger Block...
SmartQuora - Learn to build a Smart Contract application on Hyperledger Block...SmartQuora - Learn to build a Smart Contract application on Hyperledger Block...
SmartQuora - Learn to build a Smart Contract application on Hyperledger Block...Srini Karlekar
 
Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile...
Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile...Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile...
Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile...IOSR Journals
 
CoverSpace : Certificate authority for internal use plus e tax and e-policy01
CoverSpace : Certificate authority for internal use plus e tax and e-policy01CoverSpace : Certificate authority for internal use plus e tax and e-policy01
CoverSpace : Certificate authority for internal use plus e tax and e-policy01Damrongsak Kobtakul
 
Comodo Overview Presentation Read Only
Comodo Overview Presentation Read OnlyComodo Overview Presentation Read Only
Comodo Overview Presentation Read OnlyJayHicks
 
IRJET- A Review on Implementation Techniques of Blockchain Enabled Smart Cont...
IRJET- A Review on Implementation Techniques of Blockchain Enabled Smart Cont...IRJET- A Review on Implementation Techniques of Blockchain Enabled Smart Cont...
IRJET- A Review on Implementation Techniques of Blockchain Enabled Smart Cont...IRJET Journal
 
6 ways reduce pci dss audit scope tokenizing cardholder data
6 ways reduce pci dss audit scope tokenizing cardholder data6 ways reduce pci dss audit scope tokenizing cardholder data
6 ways reduce pci dss audit scope tokenizing cardholder dataRichard Thompson
 
Ethereum Smart contracts - Blockchain App Factory
Ethereum Smart contracts - Blockchain App FactoryEthereum Smart contracts - Blockchain App Factory
Ethereum Smart contracts - Blockchain App Factoryveronicaroyce
 
An Efficient Buyer - Seller Protocol to Identify the Perpetrator
An Efficient Buyer - Seller Protocol to Identify the PerpetratorAn Efficient Buyer - Seller Protocol to Identify the Perpetrator
An Efficient Buyer - Seller Protocol to Identify the PerpetratorIDES Editor
 

Tendances (13)

Payment Tokenization
Payment TokenizationPayment Tokenization
Payment Tokenization
 
SmartQuora - Learn to build a Smart Contract application on Hyperledger Block...
SmartQuora - Learn to build a Smart Contract application on Hyperledger Block...SmartQuora - Learn to build a Smart Contract application on Hyperledger Block...
SmartQuora - Learn to build a Smart Contract application on Hyperledger Block...
 
Fu3111411144
Fu3111411144Fu3111411144
Fu3111411144
 
Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile...
Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile...Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile...
Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile...
 
D.Silpa
D.SilpaD.Silpa
D.Silpa
 
CoverSpace : Certificate authority for internal use plus e tax and e-policy01
CoverSpace : Certificate authority for internal use plus e tax and e-policy01CoverSpace : Certificate authority for internal use plus e tax and e-policy01
CoverSpace : Certificate authority for internal use plus e tax and e-policy01
 
Comodo Overview Presentation Read Only
Comodo Overview Presentation Read OnlyComodo Overview Presentation Read Only
Comodo Overview Presentation Read Only
 
IRJET- A Review on Implementation Techniques of Blockchain Enabled Smart Cont...
IRJET- A Review on Implementation Techniques of Blockchain Enabled Smart Cont...IRJET- A Review on Implementation Techniques of Blockchain Enabled Smart Cont...
IRJET- A Review on Implementation Techniques of Blockchain Enabled Smart Cont...
 
6 ways reduce pci dss audit scope tokenizing cardholder data
6 ways reduce pci dss audit scope tokenizing cardholder data6 ways reduce pci dss audit scope tokenizing cardholder data
6 ways reduce pci dss audit scope tokenizing cardholder data
 
BITCOIN GLOSSARY
BITCOIN GLOSSARYBITCOIN GLOSSARY
BITCOIN GLOSSARY
 
Ethereum Smart contracts - Blockchain App Factory
Ethereum Smart contracts - Blockchain App FactoryEthereum Smart contracts - Blockchain App Factory
Ethereum Smart contracts - Blockchain App Factory
 
An Efficient Buyer - Seller Protocol to Identify the Perpetrator
An Efficient Buyer - Seller Protocol to Identify the PerpetratorAn Efficient Buyer - Seller Protocol to Identify the Perpetrator
An Efficient Buyer - Seller Protocol to Identify the Perpetrator
 
Bitcoin
BitcoinBitcoin
Bitcoin
 

En vedette

Regulating peer to-peer and alternative finance - sdj
Regulating peer to-peer and alternative finance - sdjRegulating peer to-peer and alternative finance - sdj
Regulating peer to-peer and alternative finance - sdjSimon Deane-Johns
 
Submission to commission on banking standards sdj 08 02 13 final
Submission to commission on banking standards sdj 08 02 13   final Submission to commission on banking standards sdj 08 02 13   final
Submission to commission on banking standards sdj 08 02 13 final Simon Deane-Johns
 
Response to FCA crowdfunding consultation simon deane-johns - final
Response to FCA crowdfunding consultation   simon deane-johns - finalResponse to FCA crowdfunding consultation   simon deane-johns - final
Response to FCA crowdfunding consultation simon deane-johns - finalSimon Deane-Johns
 
Response to EC crowdfunding consultation Dec 2013
Response to EC crowdfunding consultation Dec 2013Response to EC crowdfunding consultation Dec 2013
Response to EC crowdfunding consultation Dec 2013Simon Deane-Johns
 
Blockchain 2015: Analyzing the Blockchain in Financial Services
Blockchain 2015: Analyzing the Blockchain in Financial ServicesBlockchain 2015: Analyzing the Blockchain in Financial Services
Blockchain 2015: Analyzing the Blockchain in Financial ServicesThe Business Blockchain
 
CBGTBT - Part 1 - Workshop introduction & primer
CBGTBT - Part 1 - Workshop introduction & primerCBGTBT - Part 1 - Workshop introduction & primer
CBGTBT - Part 1 - Workshop introduction & primerBlockstrap.com
 

En vedette (7)

Regulating peer to-peer and alternative finance - sdj
Regulating peer to-peer and alternative finance - sdjRegulating peer to-peer and alternative finance - sdj
Regulating peer to-peer and alternative finance - sdj
 
Submission to commission on banking standards sdj 08 02 13 final
Submission to commission on banking standards sdj 08 02 13   final Submission to commission on banking standards sdj 08 02 13   final
Submission to commission on banking standards sdj 08 02 13 final
 
Response to FCA crowdfunding consultation simon deane-johns - final
Response to FCA crowdfunding consultation   simon deane-johns - finalResponse to FCA crowdfunding consultation   simon deane-johns - final
Response to FCA crowdfunding consultation simon deane-johns - final
 
Response to EC crowdfunding consultation Dec 2013
Response to EC crowdfunding consultation Dec 2013Response to EC crowdfunding consultation Dec 2013
Response to EC crowdfunding consultation Dec 2013
 
Crowdfunding sdj oct 2014
Crowdfunding   sdj oct 2014Crowdfunding   sdj oct 2014
Crowdfunding sdj oct 2014
 
Blockchain 2015: Analyzing the Blockchain in Financial Services
Blockchain 2015: Analyzing the Blockchain in Financial ServicesBlockchain 2015: Analyzing the Blockchain in Financial Services
Blockchain 2015: Analyzing the Blockchain in Financial Services
 
CBGTBT - Part 1 - Workshop introduction & primer
CBGTBT - Part 1 - Workshop introduction & primerCBGTBT - Part 1 - Workshop introduction & primer
CBGTBT - Part 1 - Workshop introduction & primer
 

Similaire à Midata Process Flows and Operational Challenges

1. PCI Compliance Overview
1. PCI Compliance Overview1. PCI Compliance Overview
1. PCI Compliance Overviewokrantz
 
Information ownership in the cloud
Information ownership in the cloudInformation ownership in the cloud
Information ownership in the cloudCloud Legal Project
 
#AssurTech : BlockChain et assurance : des POC aux applications pratiques
#AssurTech : BlockChain et assurance : des POC aux applications pratiques#AssurTech : BlockChain et assurance : des POC aux applications pratiques
#AssurTech : BlockChain et assurance : des POC aux applications pratiquesSerrerom
 
PCI What When AISA Sydney 2009
PCI What When AISA Sydney 2009PCI What When AISA Sydney 2009
PCI What When AISA Sydney 2009Jason Edelstein
 
An Overview of the interface of MODRNA and GSMA Mobile Connect
An Overview of the interface of MODRNA and GSMA Mobile ConnectAn Overview of the interface of MODRNA and GSMA Mobile Connect
An Overview of the interface of MODRNA and GSMA Mobile ConnectBjorn Hjelm
 
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011Andris Soroka
 
Strong Customer Authentication & Biometrics
Strong Customer Authentication & BiometricsStrong Customer Authentication & Biometrics
Strong Customer Authentication & BiometricsFIDO Alliance
 
PCI Compliance What Does This Mean For the Australian Market Place 2007
PCI Compliance What Does This Mean For the Australian Market Place 2007PCI Compliance What Does This Mean For the Australian Market Place 2007
PCI Compliance What Does This Mean For the Australian Market Place 2007Jason Edelstein
 
OpenID Foundation MODRNA WG Update
OpenID Foundation MODRNA WG UpdateOpenID Foundation MODRNA WG Update
OpenID Foundation MODRNA WG UpdateBjorn Hjelm
 
How Data is Revolutionizing Authentication
How Data is Revolutionizing AuthenticationHow Data is Revolutionizing Authentication
How Data is Revolutionizing AuthenticationCardinalCommerce
 
A Secure Account-Based Mobile Payment Protocol with Public Key Cryptography
A Secure Account-Based Mobile Payment Protocol with Public Key CryptographyA Secure Account-Based Mobile Payment Protocol with Public Key Cryptography
A Secure Account-Based Mobile Payment Protocol with Public Key CryptographyIDES Editor
 
10 Steps To Secure and PCI Compliant Credit Card Processing In Oracle Receiva...
10 Steps To Secure and PCI Compliant Credit Card Processing In Oracle Receiva...10 Steps To Secure and PCI Compliant Credit Card Processing In Oracle Receiva...
10 Steps To Secure and PCI Compliant Credit Card Processing In Oracle Receiva...amadhireddy
 
OpenID Connect: The Mobile Profile
OpenID Connect: The Mobile ProfileOpenID Connect: The Mobile Profile
OpenID Connect: The Mobile ProfileBjorn Hjelm
 
OpenID Foundation MODRNA WG Update
OpenID Foundation MODRNA WG UpdateOpenID Foundation MODRNA WG Update
OpenID Foundation MODRNA WG UpdateBjorn Hjelm
 

Similaire à Midata Process Flows and Operational Challenges (20)

Mb2420032007
Mb2420032007Mb2420032007
Mb2420032007
 
1. PCI Compliance Overview
1. PCI Compliance Overview1. PCI Compliance Overview
1. PCI Compliance Overview
 
Information ownership in the cloud
Information ownership in the cloudInformation ownership in the cloud
Information ownership in the cloud
 
Mis06
Mis06Mis06
Mis06
 
#AssurTech : BlockChain et assurance : des POC aux applications pratiques
#AssurTech : BlockChain et assurance : des POC aux applications pratiques#AssurTech : BlockChain et assurance : des POC aux applications pratiques
#AssurTech : BlockChain et assurance : des POC aux applications pratiques
 
PCI What When AISA Sydney 2009
PCI What When AISA Sydney 2009PCI What When AISA Sydney 2009
PCI What When AISA Sydney 2009
 
An Overview of the interface of MODRNA and GSMA Mobile Connect
An Overview of the interface of MODRNA and GSMA Mobile ConnectAn Overview of the interface of MODRNA and GSMA Mobile Connect
An Overview of the interface of MODRNA and GSMA Mobile Connect
 
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
 
Strong Customer Authentication & Biometrics
Strong Customer Authentication & BiometricsStrong Customer Authentication & Biometrics
Strong Customer Authentication & Biometrics
 
PCI Compliance What Does This Mean For the Australian Market Place 2007
PCI Compliance What Does This Mean For the Australian Market Place 2007PCI Compliance What Does This Mean For the Australian Market Place 2007
PCI Compliance What Does This Mean For the Australian Market Place 2007
 
SSL TSL;& SET
SSL TSL;& SETSSL TSL;& SET
SSL TSL;& SET
 
OpenID Foundation MODRNA WG Update
OpenID Foundation MODRNA WG UpdateOpenID Foundation MODRNA WG Update
OpenID Foundation MODRNA WG Update
 
Fraud in Telecoms
Fraud in TelecomsFraud in Telecoms
Fraud in Telecoms
 
How Data is Revolutionizing Authentication
How Data is Revolutionizing AuthenticationHow Data is Revolutionizing Authentication
How Data is Revolutionizing Authentication
 
Bg24375379
Bg24375379Bg24375379
Bg24375379
 
A Secure Account-Based Mobile Payment Protocol with Public Key Cryptography
A Secure Account-Based Mobile Payment Protocol with Public Key CryptographyA Secure Account-Based Mobile Payment Protocol with Public Key Cryptography
A Secure Account-Based Mobile Payment Protocol with Public Key Cryptography
 
10 Steps To Secure and PCI Compliant Credit Card Processing In Oracle Receiva...
10 Steps To Secure and PCI Compliant Credit Card Processing In Oracle Receiva...10 Steps To Secure and PCI Compliant Credit Card Processing In Oracle Receiva...
10 Steps To Secure and PCI Compliant Credit Card Processing In Oracle Receiva...
 
OpenID Connect: The Mobile Profile
OpenID Connect: The Mobile ProfileOpenID Connect: The Mobile Profile
OpenID Connect: The Mobile Profile
 
OpenID Foundation MODRNA WG Update
OpenID Foundation MODRNA WG UpdateOpenID Foundation MODRNA WG Update
OpenID Foundation MODRNA WG Update
 
Straight Talk on Data Tokenization for PCI & Cloud
Straight Talk on Data Tokenization for PCI & CloudStraight Talk on Data Tokenization for PCI & Cloud
Straight Talk on Data Tokenization for PCI & Cloud
 

Plus de Simon Deane-Johns

Trends in Digital Regulation
Trends in Digital RegulationTrends in Digital Regulation
Trends in Digital RegulationSimon Deane-Johns
 
Embedding Encouragement of Innovation Across the FCA
Embedding Encouragement of Innovation Across the FCAEmbedding Encouragement of Innovation Across the FCA
Embedding Encouragement of Innovation Across the FCASimon Deane-Johns
 
My response to HM Treasury consultation on Implementing PSD2
My response to HM Treasury consultation on Implementing PSD2My response to HM Treasury consultation on Implementing PSD2
My response to HM Treasury consultation on Implementing PSD2Simon Deane-Johns
 
How P2P Finance Models Work: Risks, Controls and Regulatory Barriers
How P2P Finance Models Work: Risks, Controls and Regulatory BarriersHow P2P Finance Models Work: Risks, Controls and Regulatory Barriers
How P2P Finance Models Work: Risks, Controls and Regulatory BarriersSimon Deane-Johns
 
Proposed amendments to the financial services bill sdj 21 06 12
Proposed amendments to the financial services bill sdj 21 06 12Proposed amendments to the financial services bill sdj 21 06 12
Proposed amendments to the financial services bill sdj 21 06 12Simon Deane-Johns
 
Enabling The Growth of P2P Finance - Simon Deane-Johns
Enabling The Growth of P2P Finance -  Simon Deane-JohnsEnabling The Growth of P2P Finance -  Simon Deane-Johns
Enabling The Growth of P2P Finance - Simon Deane-JohnsSimon Deane-Johns
 
Business implications of evolutions in privacy law mes infos 23 04 12 - simo...
Business implications of evolutions in privacy law  mes infos 23 04 12 - simo...Business implications of evolutions in privacy law  mes infos 23 04 12 - simo...
Business implications of evolutions in privacy law mes infos 23 04 12 - simo...Simon Deane-Johns
 
Alternative Finance Briefing Paper - Simon Deane-Johns 27 01 12
Alternative Finance Briefing Paper  - Simon Deane-Johns 27 01 12Alternative Finance Briefing Paper  - Simon Deane-Johns 27 01 12
Alternative Finance Briefing Paper - Simon Deane-Johns 27 01 12Simon Deane-Johns
 

Plus de Simon Deane-Johns (8)

Trends in Digital Regulation
Trends in Digital RegulationTrends in Digital Regulation
Trends in Digital Regulation
 
Embedding Encouragement of Innovation Across the FCA
Embedding Encouragement of Innovation Across the FCAEmbedding Encouragement of Innovation Across the FCA
Embedding Encouragement of Innovation Across the FCA
 
My response to HM Treasury consultation on Implementing PSD2
My response to HM Treasury consultation on Implementing PSD2My response to HM Treasury consultation on Implementing PSD2
My response to HM Treasury consultation on Implementing PSD2
 
How P2P Finance Models Work: Risks, Controls and Regulatory Barriers
How P2P Finance Models Work: Risks, Controls and Regulatory BarriersHow P2P Finance Models Work: Risks, Controls and Regulatory Barriers
How P2P Finance Models Work: Risks, Controls and Regulatory Barriers
 
Proposed amendments to the financial services bill sdj 21 06 12
Proposed amendments to the financial services bill sdj 21 06 12Proposed amendments to the financial services bill sdj 21 06 12
Proposed amendments to the financial services bill sdj 21 06 12
 
Enabling The Growth of P2P Finance - Simon Deane-Johns
Enabling The Growth of P2P Finance -  Simon Deane-JohnsEnabling The Growth of P2P Finance -  Simon Deane-Johns
Enabling The Growth of P2P Finance - Simon Deane-Johns
 
Business implications of evolutions in privacy law mes infos 23 04 12 - simo...
Business implications of evolutions in privacy law  mes infos 23 04 12 - simo...Business implications of evolutions in privacy law  mes infos 23 04 12 - simo...
Business implications of evolutions in privacy law mes infos 23 04 12 - simo...
 
Alternative Finance Briefing Paper - Simon Deane-Johns 27 01 12
Alternative Finance Briefing Paper  - Simon Deane-Johns 27 01 12Alternative Finance Briefing Paper  - Simon Deane-Johns 27 01 12
Alternative Finance Briefing Paper - Simon Deane-Johns 27 01 12
 

Midata Process Flows and Operational Challenges

  • 1. Midata Thoughts Draft v2.0 Simon Deane-Johns Consultant Solicitor and Member of the Midata Interoperability Board 9 January 2013
  • 2. Contents • Overview • Participants/roles • Process flows • Developing co-regulatory environment • Scenario diagrams • Common operational risks, controls, challenges • Midata-specific challenges
  • 3. Overview • The voluntary Midata programme involves a Supplier making each Customer’s transaction data available to the Customer in computer-readable format (“midata”). • This suggests three types of scenario: 1. Release of midata by a Current Supplier to the Customer 2. Release of midata by a Current Supplier to the Customer’s duly authorised data storage provider (Midata Store) or more active data services provider (Midata Service Provider) 3. Release of midata by Current Supplier to Customer or MS/MSP, who transfers it to a third party supplier (“3PS”)
  • 4. Participants/Roles • Supplier – Supplier of goods or services whose systems generate midata (e.g. utility, bank, telco) – Includes Supplier’s own outsourced service provider(s) • Customer – person or micro-business who interacts with Supplier to produce midata • Provider of data storage or extra data services, acting for the Customer: – Midata Store (“MS”) • Only receives, stores and/or transmits midata, or tracks where midata sits • May receive midata from Customer or from Current Supplier (“Linked Midata Store”) • can’t ‘see’ or otherwise process content • ‘mere conduit’? – Midata Service Provider (“MSP”) • May also act as a Midata Store • Adds value by analysing or otherwise processing data • May alter content and/or produce a result on which Customer/3PS relies. • Third Party Supplier (“3PS”) – Receives ‘midata’ (or a small extract) only for the purpose of deciding to supply goods or services to the Customer
  • 5. Process Flows Midata involves two separate process flows: • Transaction flows – Offer and acceptance => contract between each of Customer, Current Supplier and MS/MSP – Messaging, including identification of each party, data release request, confirmation of receipt etc. • Midata flows – Actual transfers of midata [Funds flows related to payments due between participants are currently out of scope]
  • 6. Developing Co-regulatory Environment • Data Protection Act 1998 (“DPA”) etc supervised by Information Commissioner’s Office (“ICO”) and related exemptions • Guidance etc issued by ICO • Sector-specific law/regulation – Sections 9 DPA and 159 of Consumer Credit Act 1974, applicable to credit reference agency data – Electricity Act, Gas Act => Data and Communications Company – [new Telecoms/banking/consumer credit regulation] • Industry Codes – Principles of Reciprocity (Credit Reference Agency data) – Smart Energy Code – [Other sector codes] – Security standards, Privacy by Design etc. – [Midata Principlesstandard permissions, rules on liablility etc?] • Contracts – Consents etc given under Contracts – [standard Midata permissions or Midata sharing agreements?]
  • 7. Midata Scenario 1 1. ID authentication (“auth”) 2. Midata request Current Customer Supplier 3. Midata transfer Supply contract
  • 8. Midata Scenario 2a MS/MSP 4. ID auth. 6. Midata 5. Midata Request transfer 1. ID auth 2. Midata request Current Customer Supplier 3. Midata transfer Supply contract PIM Service contract
  • 9. Midata Scenario 2b MS/MSP 3. ID auth. 4. Midata request Supplier Customer 1. ID auth 2. Midata Request Supply contract PIM Service contract
  • 10. Midata Scenario 2b Co-regulatory MS/MSP relationship? 3. ID auth. 4. Midata request Current Customer Supplier 1. ID auth 2. Midata Request Supply contract PIM Service contract
  • 11. Midata Scenario 3a 8. Data transfer 3PS 7. ID auth MS/MSP Transaction flow 3. ID auth; 4. Request Current Customer Supplier Transaction flow 1. ID auth; 2. Request Supply contract PIM Service contract 3PS Service contract
  • 12. Midata Scenario 3a 8. Data transfer 3PS 7. ID auth MS/MSP Transaction flow 3. ID auth; 4. Request Current Customer Supplier Transaction flow 1. ID auth; 2. Request Co-regulatory Supply contract PIM Service contract 3PS Service contract relationships?
  • 13. Midata Scenario 3b 8. Data transfer 3PS 7. ID auth MS/MSP 4. ID auth. 6. Midata 5. Midata Request transfer 1. ID auth 2. Midata request Current Customer Supplier 3. Midata transfer Supply contract PIM Service contract 3PS Service contract
  • 14. Midata Scenario 3b 8. Data transfer 3PS 7. ID auth MS/MSP 4. ID auth. 6. Midata 5. Midata Request transfer 1. ID auth 2. Midata request Current Customer Supplier 3. Midata transfer Co-regulatory Supply contract PIM Service contract 3PS Service contract relationships?
  • 15. Midata Scenario 3c 3PS 6. Midata transfer 4. ID auth. 5. Midata Request 1. ID auth Current 2. 2. Midata request Customer Supplier 3. Midata transfer Supply contract PIM Service contract 3PS Service contract
  • 16. Common Operational Risks • Failure to identify one or more parties • Fraudulent impersonation of one or more parties • ‘Wrongful’ refusal to release midata • Interception of messaging and/or midata in transit • Wrong midata released • Midata is inaccurate, late and/or unreliable • Midata is false, altered or corrupted • Midata misuse: – loss – destruction – storage longer than agreed/necessary – wrongful disclosure – use for an illicit purpose (including breach of IPRs)
  • 17. Common Operational Controls/Challenges • Identity authentication/assurance for all parties • Release of correct midata • Secure transmission, processing, storage of midata • Preserving secrecy/confidentiality of midata content • Maintaining authenticity and integrity of midata • Ensuring accuracy, timeliness and reliability of midata • Guarding against various types of midata misuse • Vesting and protection of intellectual property rights in midata and/or midata databases
  • 18. Midata-specific Challenges • Midata portability? • Extent of ‘agency’ involved in personal information management by PIM • Midata ‘community’ issues: – Principles of reciprocity? – Appropriate grounds for refusal to release? – Mirror CRA and/or DCC environment? – Apportionment of liability for various heads of loss or damage? – Complaints handling? – Enforcement? – Mapping midata to legal rights/obligations to customer permissions => a ‘personal data mark-up language’ (WEF “Rethinking Personal Data”)
  • 19. Comments Comments welcome via the related post at The Fine Print: http://sdj-thefineprint.blogspot.co.uk/2013/01/midata-thoughts-no-2.html