SlideShare une entreprise Scribd logo
1  sur  30
Télécharger pour lire hors ligne
Security, Safety and Privacy? - Privacy challenges with ITS Christine Hafskjold Multimodal ITS, May 7 th  2009
Information technology for safety and security
Photo: w00kie, Flickr Creative Commons
Photo: Kenyee, Flickr Creative Commons
 
 
 
 
 
Privacy shall be a central issue from the start when planning new or changing old ICT systems.
The guide shall be used to evaluate privacy issues in all relevant cases in the transport- and communication sector.
Security/safety gain?
TOOLS
Legal tools
 
Photo: Kenyee, Flickr  Creative Commons
Technical tools
Name:  Christine Hafskjold Address:  Prinsens gate 18 Zip code:  0105 Credit card:  **** **** **** *2003 Age:  38 Favourite TV show:  The Wire   City:  Oslo Country:  Norway
Name:  Christine Hafskjold Address:  Prinsens gate 18 Zip code:  0105 Credit card:  **** **** **** *2003 Age:  38 Favourite TV show:  The Wire   City:  Oslo Country:  Norway Data minimisation:
Name:  Christine Hafskjold Address:  Prinsens gate 18 Zip code:  0105 Credit card:  **** **** **** *2003 Age:  38 Favourite TV show:  The Wire   City:  Oslo Country:  Norway Nerdgirl38 Anonymisation/pseudonymisation:
Organisational tools
 
RECOMMENDATION HIGHLIGHTS
Money = Power
Make privacy a criteria in public procurement
Evaluate the  use  and  effect  of technologies and means aimed at increasing safety and security
Terminate it if it doesn’t work
Or if it’s no longer needed
All our reports can be found on our website: ,[object Object],You can also order (free) printed copies of our reports, or subscribe to our newsletter.
 

Contenu connexe

Similaire à Safety, security and privacy?

Hellermann Tyton Fibre Optic, Telecom & Copper Products
Hellermann Tyton Fibre Optic, Telecom & Copper ProductsHellermann Tyton Fibre Optic, Telecom & Copper Products
Hellermann Tyton Fibre Optic, Telecom & Copper ProductsThorne & Derrick International
 
Eurodocs faxepark horizon 2020 presentation 2014 11-13
Eurodocs faxepark horizon 2020 presentation 2014 11-13Eurodocs faxepark horizon 2020 presentation 2014 11-13
Eurodocs faxepark horizon 2020 presentation 2014 11-13Eurodocs AB
 
invesl_lt_2015 03 let's talk lithuania
invesl_lt_2015 03 let's talk lithuaniainvesl_lt_2015 03 let's talk lithuania
invesl_lt_2015 03 let's talk lithuaniaLinas Eriksonas
 
Maryland-Netherlands Cybersecurity Soft Landing Program (Panel discussion Oct...
Maryland-Netherlands Cybersecurity Soft Landing Program (Panel discussion Oct...Maryland-Netherlands Cybersecurity Soft Landing Program (Panel discussion Oct...
Maryland-Netherlands Cybersecurity Soft Landing Program (Panel discussion Oct...Baltimore-Rotterdam Sister City Committee
 
Bernard Van Isacker - PhoenixKM - Experience in social media
Bernard Van Isacker - PhoenixKM - Experience in social mediaBernard Van Isacker - PhoenixKM - Experience in social media
Bernard Van Isacker - PhoenixKM - Experience in social mediaWeb2LLP
 
Protecting apps and APIs using Nordic eIDs
Protecting apps and APIs using Nordic eIDsProtecting apps and APIs using Nordic eIDs
Protecting apps and APIs using Nordic eIDsErik Wahlström
 

Similaire à Safety, security and privacy? (6)

Hellermann Tyton Fibre Optic, Telecom & Copper Products
Hellermann Tyton Fibre Optic, Telecom & Copper ProductsHellermann Tyton Fibre Optic, Telecom & Copper Products
Hellermann Tyton Fibre Optic, Telecom & Copper Products
 
Eurodocs faxepark horizon 2020 presentation 2014 11-13
Eurodocs faxepark horizon 2020 presentation 2014 11-13Eurodocs faxepark horizon 2020 presentation 2014 11-13
Eurodocs faxepark horizon 2020 presentation 2014 11-13
 
invesl_lt_2015 03 let's talk lithuania
invesl_lt_2015 03 let's talk lithuaniainvesl_lt_2015 03 let's talk lithuania
invesl_lt_2015 03 let's talk lithuania
 
Maryland-Netherlands Cybersecurity Soft Landing Program (Panel discussion Oct...
Maryland-Netherlands Cybersecurity Soft Landing Program (Panel discussion Oct...Maryland-Netherlands Cybersecurity Soft Landing Program (Panel discussion Oct...
Maryland-Netherlands Cybersecurity Soft Landing Program (Panel discussion Oct...
 
Bernard Van Isacker - PhoenixKM - Experience in social media
Bernard Van Isacker - PhoenixKM - Experience in social mediaBernard Van Isacker - PhoenixKM - Experience in social media
Bernard Van Isacker - PhoenixKM - Experience in social media
 
Protecting apps and APIs using Nordic eIDs
Protecting apps and APIs using Nordic eIDsProtecting apps and APIs using Nordic eIDs
Protecting apps and APIs using Nordic eIDs
 

Plus de Teknologirådet

Klimatoppmøte i skolen 2012
Klimatoppmøte i skolen 2012Klimatoppmøte i skolen 2012
Klimatoppmøte i skolen 2012Teknologirådet
 
Climate change in the classroom
Climate change in the classroomClimate change in the classroom
Climate change in the classroomTeknologirådet
 
Teknologirådets årsmelding 2010
Teknologirådets årsmelding 2010Teknologirådets årsmelding 2010
Teknologirådets årsmelding 2010Teknologirådet
 
LOFTSLAGSRÁÐSTEFNU í skólanum
LOFTSLAGSRÁÐSTEFNU í skólanumLOFTSLAGSRÁÐSTEFNU í skólanum
LOFTSLAGSRÁÐSTEFNU í skólanumTeknologirådet
 
Klimattoppmöte i skolan 2011 - svensk
Klimattoppmöte i skolan 2011 - svenskKlimattoppmöte i skolan 2011 - svensk
Klimattoppmöte i skolan 2011 - svenskTeknologirådet
 
Klimatoppmøde i skolen 2011 - dansk
Klimatoppmøde i skolen 2011 - danskKlimatoppmøde i skolen 2011 - dansk
Klimatoppmøde i skolen 2011 - danskTeknologirådet
 
Klimatoppmøte i skolen 2011
Klimatoppmøte i skolen 2011Klimatoppmøte i skolen 2011
Klimatoppmøte i skolen 2011Teknologirådet
 
Presentasjon dubestemmer og digital mobbing
Presentasjon dubestemmer og digital mobbingPresentasjon dubestemmer og digital mobbing
Presentasjon dubestemmer og digital mobbingTeknologirådet
 
Biometri - utfordringer for personvernet
Biometri - utfordringer for personvernetBiometri - utfordringer for personvernet
Biometri - utfordringer for personvernetTeknologirådet
 
Datalagringsdirektivet - Høring på Stortinget 07.02.11
Datalagringsdirektivet - Høring på Stortinget 07.02.11Datalagringsdirektivet - Høring på Stortinget 07.02.11
Datalagringsdirektivet - Høring på Stortinget 07.02.11Teknologirådet
 
Collecting to share - public data for democracy and innovation?
Collecting to share - public data for democracy and innovation?Collecting to share - public data for democracy and innovation?
Collecting to share - public data for democracy and innovation?Teknologirådet
 
Pasientjournal på nett: Tilgang, bruk og muligheter
Pasientjournal på nett: Tilgang, bruk og muligheterPasientjournal på nett: Tilgang, bruk og muligheter
Pasientjournal på nett: Tilgang, bruk og muligheterTeknologirådet
 
Teknologirådets årsmelding 2009
Teknologirådets årsmelding 2009Teknologirådets årsmelding 2009
Teknologirådets årsmelding 2009Teknologirådet
 
RTT Datalagringsdirektivet
RTT DatalagringsdirektivetRTT Datalagringsdirektivet
RTT DatalagringsdirektivetTeknologirådet
 
RTT Offentlige skattelister
RTT Offentlige skattelisterRTT Offentlige skattelister
RTT Offentlige skattelisterTeknologirådet
 
Er du sikker? Tilleggsmodul til Klimatoppmøte i skolen 2010
Er du sikker? Tilleggsmodul til Klimatoppmøte i skolen 2010Er du sikker? Tilleggsmodul til Klimatoppmøte i skolen 2010
Er du sikker? Tilleggsmodul til Klimatoppmøte i skolen 2010Teknologirådet
 
Klimatoppmøte i skolen 2010
Klimatoppmøte i skolen 2010Klimatoppmøte i skolen 2010
Klimatoppmøte i skolen 2010Teknologirådet
 
Saken forklart: GPS-basert veiprising - fremtidens bilavgift?
Saken forklart: GPS-basert veiprising - fremtidens bilavgift?Saken forklart: GPS-basert veiprising - fremtidens bilavgift?
Saken forklart: GPS-basert veiprising - fremtidens bilavgift?Teknologirådet
 

Plus de Teknologirådet (20)

Klimatoppmøte i skolen 2012
Klimatoppmøte i skolen 2012Klimatoppmøte i skolen 2012
Klimatoppmøte i skolen 2012
 
Climate change in the classroom
Climate change in the classroomClimate change in the classroom
Climate change in the classroom
 
Teknologirådets årsmelding 2010
Teknologirådets årsmelding 2010Teknologirådets årsmelding 2010
Teknologirådets årsmelding 2010
 
LOFTSLAGSRÁÐSTEFNU í skólanum
LOFTSLAGSRÁÐSTEFNU í skólanumLOFTSLAGSRÁÐSTEFNU í skólanum
LOFTSLAGSRÁÐSTEFNU í skólanum
 
Klimattoppmöte i skolan 2011 - svensk
Klimattoppmöte i skolan 2011 - svenskKlimattoppmöte i skolan 2011 - svensk
Klimattoppmöte i skolan 2011 - svensk
 
Klimatoppmøde i skolen 2011 - dansk
Klimatoppmøde i skolen 2011 - danskKlimatoppmøde i skolen 2011 - dansk
Klimatoppmøde i skolen 2011 - dansk
 
Klimatoppmøte i skolen 2011
Klimatoppmøte i skolen 2011Klimatoppmøte i skolen 2011
Klimatoppmøte i skolen 2011
 
Empowerment and privacy
Empowerment and privacyEmpowerment and privacy
Empowerment and privacy
 
Presentasjon dubestemmer og digital mobbing
Presentasjon dubestemmer og digital mobbingPresentasjon dubestemmer og digital mobbing
Presentasjon dubestemmer og digital mobbing
 
Biometri - utfordringer for personvernet
Biometri - utfordringer for personvernetBiometri - utfordringer for personvernet
Biometri - utfordringer for personvernet
 
Datalagringsdirektivet - Høring på Stortinget 07.02.11
Datalagringsdirektivet - Høring på Stortinget 07.02.11Datalagringsdirektivet - Høring på Stortinget 07.02.11
Datalagringsdirektivet - Høring på Stortinget 07.02.11
 
Collecting to share - public data for democracy and innovation?
Collecting to share - public data for democracy and innovation?Collecting to share - public data for democracy and innovation?
Collecting to share - public data for democracy and innovation?
 
Digital mobbing
Digital mobbingDigital mobbing
Digital mobbing
 
Pasientjournal på nett: Tilgang, bruk og muligheter
Pasientjournal på nett: Tilgang, bruk og muligheterPasientjournal på nett: Tilgang, bruk og muligheter
Pasientjournal på nett: Tilgang, bruk og muligheter
 
Teknologirådets årsmelding 2009
Teknologirådets årsmelding 2009Teknologirådets årsmelding 2009
Teknologirådets årsmelding 2009
 
RTT Datalagringsdirektivet
RTT DatalagringsdirektivetRTT Datalagringsdirektivet
RTT Datalagringsdirektivet
 
RTT Offentlige skattelister
RTT Offentlige skattelisterRTT Offentlige skattelister
RTT Offentlige skattelister
 
Er du sikker? Tilleggsmodul til Klimatoppmøte i skolen 2010
Er du sikker? Tilleggsmodul til Klimatoppmøte i skolen 2010Er du sikker? Tilleggsmodul til Klimatoppmøte i skolen 2010
Er du sikker? Tilleggsmodul til Klimatoppmøte i skolen 2010
 
Klimatoppmøte i skolen 2010
Klimatoppmøte i skolen 2010Klimatoppmøte i skolen 2010
Klimatoppmøte i skolen 2010
 
Saken forklart: GPS-basert veiprising - fremtidens bilavgift?
Saken forklart: GPS-basert veiprising - fremtidens bilavgift?Saken forklart: GPS-basert veiprising - fremtidens bilavgift?
Saken forklart: GPS-basert veiprising - fremtidens bilavgift?
 

Dernier

Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 

Dernier (20)

Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 

Safety, security and privacy?

Notes de l'éditeur

  1. What I’m going to present to you today is based on an EU-funded project that Teknologirådet participated in, and that was finished last year, called PRISE.
  2. Our focus was on technologies and means to ensure the security of the society, but the result should be applicable also to safety and security in the transport sector. We started out by making an overview of different basic technologies that make up security applications. These technologies are also central in ITS applications:
  3. Communication technologies is a basis for all ITS applications. The use of positioning technology such as GPS is an example - and in particular when the position of the vehicle is communicated to other systems. A very relevant example is eCall – that will ”phone home” – or rather 112 – and give a full report when a vehicle has been involved in an accident. The potential for use of positioning or locating technologies in other applications, such as traffic planning, is growing with every gadget we get with a GPS. In a few years most of us will walk or drive around with more than one of these on us. And communication technology is more than what we traditionally think of – phone calls, e-mails and such. There is also communication between an RFID sender and the toll booth that we pass, between the two cameras involved in automated traffic control over a distance etc. The main privacy challenge with communications technology is eavesdropping – that someone can get hold of the information during the communication.
  4. And of course we looked at sensors, such as cameras (electro optical sensors). In safety and security in the transport sector they are both used traditionally – for surveillance for instance in busses and trains, but also for ATC, licence plate registration and recognition etc.
  5. Other sensors can be RFID chips for road pricing or toll. Black boxes (i didn’t find a good picture of that), ticketing systems for public transport. And – if we leave the road for a while – embedded in identity documents used when we travel abroad. The main privacy challenge with sensors is transparency: It is often impossible for a person to know if he or she is captured by a camera, of if an RFID tag is read by a reader.
  6. I’d like to also touch on biometrics. We see an increasing use of this in the transport sector, mainly for security reasons, or a combination of security and efficiency: Check-in at airports using fingerprints, iris scans etc. On the roads, license plate recognition is the most used (“biometrics” for cars), and of course with enough cameras – like in London – there is a potential to follow a car around town with the cameras. As facial recognition improves, we will see the possibility of following a person around on CCTV. Biometrics are of course very closely linked to the person they belong to, but the privacy challenges are mainly connected to how you collect the information and how you handle it later. Is it communicated in any way – from a local checkpoint to a central register? Or is it only stored locally – for instance on the subjects ID-card?
  7. Which leads us to storage. When I started working in the computer industry, the problem used to be that there wasn’t enough storage – in fact a chunk of the Norwegian Motor vehicle registry was deleted at one point - i think it was in the 80s - to save storage space. Today the problem – from a privacy perspective - is the opposite. There is so much storage space and it’s so cheap that it’s actually cheaper to just keep data than to delete it when you don’t need it any more. We store data about everything: Toll booth passing, air and sea travel, travel by public transport, information about vehicles...
  8. And information in different databases can be analysed and put together And here we come to the privacy concerns: Is the data correct? Updated? Complete? Is it secure? Or is it easy to get access to data you don’t really need to see? Is it only used for the purpose that it was collected for? If not, we have what we call function creep, and it is a big concern in the privacy communities. Function creep is for instance when you start giving tax authorities access to toll booth data so they can check that people don’t get tax deductions they aren’t entitled to...
  9. In order to take privacy into consideration, the privacy impact need to be assessed for all projects that involve personal data. I’m very happy that The Norwegian Ministry of Administration and Government Reform has made a guide for making such an assessment.
  10. I was also very pleased when I found this quote in the new National Transport Plan from the Ministry of Transport and Communication.
  11. And this: And just a small disclaimer: These are my own translations from Norwegian to English, not official ones.
  12. Making an evaluation is nice, but what do you do when you find that the things that you REALLY REALLY want to do come with a cost for privacy? I think we should be realistic enough to acknowledge that we still will get both safety and security technologies or means that will affect privacy in the future. An ITS example – although not so safety or security related – could be road pricing. Road pricing can be implemented in many ways. The simplest one is that you pay a certain amount of money when you pass a toll booth – most commonly on your way into a big city. Of course this can be really unfair. Someone who lives just outside the ”border” and drives 10 minutes to work, pays the same as someone who drives around inside the city limits all day! With a ”black box” and a GPS you could make a much more fair system, where those who drive the most, in rush hours, on the most densely trafficked roads, pays the most. Similar systems could of course be part of a safety system, where back boxes could be checked by the police or insurance companies, or the car could ”phone home” every time you commit a traffic violation. But this is a type of technology that people find extremely privacy violating. We need to ask ourselves: Does the gain in safety or security outweigh the cost to privacy? In cases where you – after careful analysis – end up implementing something that you know will impact privacy, it is important to try and minimise the effect as much as possible.
  13. We need some tools. The PRISE project have identified three types of such tools.
  14. The first is legal tools. Which is what we always want to do, isn’t is – just regulate ourselves away from the problem? Legal tools regulate the use of the technology, and sometimes we need this because most technologies can be used for many different purposes.
  15. Data storage for instance can be used to store a lot of information that does not affect peoples’ privacy, but because it can also be used for storing personal data, we need to regulate what can be stored, for how long, etc.
  16. Most people have one or more cameras – we can’t ban cameras just because they can be used to violate privacy. But if you want to set it up as a surveillance means in a public space we regulate where you can put them and who you must inform the public.
  17. We also have some technical tools. These can be the implementation of privacy enhancing technologies,
  18. Such as data minimisation – that is not collecting more data than you need in the first place.
  19. Like this.
  20. Or anonymisation, or pseudonymisation.
  21. Organisational tools are often forgotten, but they are very important. Because for many technologies it’s how they’re actually put to use that decide whether they are privacy friendly or not. It doesn’t help to have laws protecting privacy, when the employees at the toll both company will tell the “concerned” husband that his wife passed the booth 30 minutes ago anyway!
  22. And it doesn’t help that an ICT system has excellent features for assigning roles and access rights, if all employees are just entered as ”administrators”.
  23. If you have money, you have the power to change things.
  24. Governments have money. Make privacy a criteria in public procurement. Private enterprises make a living by delivering products and services that are in demand. If privacy is in demand, they will deliver it.
  25. Evaluate the use and effect of technologies and means for security. Did the cameras really reduce the crime rate? Does the police get more convictions when they can store telecommunications data longer? It sounds obvious, but the fact is that for Norway, nobody can answer these questions.
  26. Terminate it if it doesn’t work
  27. OR if it’s no longer needed. When something bad happens we want our politicians to react. – And they want to be seen to do something. Sometimes we end up with new security measures. And Security measures already installed and funded have this annoying habit of becoming permanent – even when there is no apparent reason why they should. We need routines to make sure that we get rid of privacy infringing security measures that doesn’t work or are no longer needed.