SlideShare une entreprise Scribd logo
1  sur  18
Télécharger pour lire hors ligne
P UB LI C SA FE TY
and
I NSTIT UT IO NAL
A S S U R A N C E
Do You Know Your
Privacy Risks?
Merri	Beth	Lavagnino,	Chief	Risk	Officer
Indiana	University
mbl@iu.edu
P UB LI C SA FE TY
and
I NSTIT UT IO NAL
A S S U R A N C E Privacy definition
“Privacy	is	the	claim	of	individuals,	groups	
or	institutions	to	determine	for	
themselves	when,	how,	and	to	what	
extent	information	about	them	is	
communicated	to	others.”
– Alan	Westin:	Privacy	&	Freedom,1967
P UB LI C SA FE TY
and
I NSTIT UT IO NAL
A S S U R A N C E But, it’s a moving target…
“Each	individual	is	continually	engaged	in	
a	personal	adjustment	process	in	
which	he	balances	the	desire	for	
privacy	with	the	desire	for	disclosure	
and	communication.”
– Alan	Westin:	Privacy	&	Freedom,1967
P UB LI C SA FE TY
and
I NSTIT UT IO NAL
A S S U R A N C E
Here’s how you do a privacy
assessment of a service, project,
initiative, app, etc.!
• Identify	the	potential	Privacy	Harms
• Determine	what	your	institution’s	
position	will	be
– Use	the	Privacy	Principles	to	devise	
ways	to	reduce	the	harms
– You	must	do	the	minimum	required	by	
law,	but,	you	also	can	choose	to	do	more	
than	is	required	by	law
P UB LI C SA FE TY
and
I NSTIT UT IO NAL
A S S U R A N C E
First, identify the Privacy Harms
• Brainstorm	the	possible	harms	so	you	
can	try	to	ANTICIPATE	(and	then	plan	to	reduce	
or	even	avoid)		these	harms
• Many	theorists	in	this	area
– William	Prosser	in	1960
– Alan	Westin	in	1967
– Daniel	J.	Solove’s 2008	“Taxonomy	of	
Privacy”
P UB LI C SA FE TY
and
I NSTIT UT IO NAL
A S S U R A N C E
What	the	person	might	think: “They are	collecting	
information	about	what	I am	doing	- more	than	they	
should!”	Examples	include:
§ Surveillance — watching,	listening	to,	or	recording	an	
individual’s	activities
§ Interrogation —inappropriately	probing	for	information
§ Visual — viewing	private	activities	without	the	individual’s	
knowledge
§ Communications —tapping	your	phone,	email,	Internet	traffic
§ Too	Much	Information	(TMI)— asking	for	“private"	information	
unnecessarily
The	Information	Collection	
Harm
P UB LI C SA FE TY
and
I NSTIT UT IO NAL
A S S U R A N C E
What	the	person	might	think: “They have	a	lot	of	data	
about	me,	and	they	are	storing,	manipulating,	and	
using	it!” Examples	include:
§ Aggregation	— combining	pieces	of	information	about	an	
individual	that	were	collected	from	different	sources
§ Identification	—linking	unidentified	information	elements	to	
particular	individuals
§ Insecurity	— failure	to	protect	information	from	leaks	and	
unauthorized	access
§ Secondary	use	— use	of	collected	information	for	a	purpose	
different	from	the	use	for	which	it	was	collected,	without	the	
individual’s	consent
§ Exclusion	—using	data	to	exclude	an	individual,	especially	if	
the	data	was	incorrect	or	interpreted	incorrectly
The	Information	Processing	
Harm
P UB LI C SA FE TY
and
I NSTIT UT IO NAL
A S S U R A N C E
What	the	person	might	think: “They spread	or	transfer	
information	about	me — more	than	I	think	they	should!”	
Examples	include:
§ Breach	of	confidentiality	— breaking	an	agreement	to	keep	
information	confidential
§ Disclosure	— disclosing	data	to	persons	or	entities	the	individual	
doesn’t	expect
§ Exposure	— revealing	intimate	information,	as	in	a	public	
exposure	of	private	facts
§ Increased	accessibility	— amplifying	the	accessibility	of	info
§ Blackmail	— a	threat	to	disclose	personal	information
§ Appropriation	— the	use	of	an	individual’s	identity,	such	as	using	a	
name	or	picture,	without	the	individual’s	permission
§ Distortion	— disseminating	false	or	misleading	information	about	
individuals
The	Information	Dissemination	
Harm
P UB LI C SA FE TY
and
I NSTIT UT IO NAL
A S S U R A N C E
What	the	person	might	think: “They come	into	my
space	and	contact	me,	or	tell	me	what	to	do!”	Examples	
include:
§ Invasions	into	private	affairs
§ Invasive	acts	that	disturb	an	individual’s	tranquility	or	solitude
§ Decisional	interference	— entering	into	an	individual’s	decisions	
regarding	her	private	affairs
§ Unwanted	email — did	you	know	that	unwanted	
communications	into	an	individual’s	personal	space,	including	
her	email	inbox,	is	considered	a	privacy	invasion?
§ Unwanted	phone	calls	—entering	into	an	individual’s	personal	
space	by	calling	his	personal	phone	number	(especially	if	it	is	a	
mobile	phone)
§ Entering	a	room	without	knocking
The	Invasion	Harm
P UB LI C SA FE TY
and
I NSTIT UT IO NAL
A S S U R A N C E
Once you’ve identified the possible
HARMS...
• Then	use	the	Privacy	PRINCIPLES	to	
design	controls/safeguards	that	
appropriately	address	those	harms
P UB LI C SA FE TY
and
I NSTIT UT IO NAL
A S S U R A N C E
Sources of privacy principles
• American	Institute	of	Certified	Public	Accountants,	Inc.	
(AICPA)	and	Canadian	Institute	of	Chartered	
Accountants	(CICA).	Generally	Accepted	Privacy	
Principles.	August,	2009.
• U.S.	Federal	Trade	Commission	(FTC).	Fair	Information	
Practice	Principles.	1998.
• Organisationfor	Economic	Co-operation	and	
Development	(OECD).	OECD	Guidelines	on	the	
Protection	of	Privacy	and	TransborderFlows	of	
Personal	Data.	1980,	revised	2013.
• U.S.	Department	of	Homeland	Security	(DHS).	DHS	
Fair	Information	Practice	Principles.	2008.
• U.S.	White	House.	Consumer	Data	Privacy	in	a	
Networked	World	(a.k.a.	Consumer	Privacy	Bill	of	
Rights). 2012.
P UB LI C SA FE TY
and
I NSTIT UT IO NAL
A S S U R A N C E
Different terminology…but same
general concepts
DHS
• Transparency
• Individual	Participation
• Purpose	Specification
• Data	Minimization
• Use	Limitation
• Data	Quality	and	
Integrity
• Security
• Accountability	and	
Auditing
GAPP
• Management
• Notice
• Choice	and	Consent
• Collection
• Use	and	Retention
• Access
• Disclosure	to	Third	
Parties
• Security	for	Privacy
• Quality
• Monitoring	and	
Enforcement
Indiana	University	Privacy	Principles:	https://protect.iu.edu/online-safety/program/principles.html
P UB LI C SA FE TY
and
I NSTIT UT IO NAL
A S S U R A N C E
§ Usually,	the	easiest	way	to	address	privacy	harms	is	
by	identifying	a	way	to	inform,	or	provide	“notice”	
to	users	of	institutional	practices	around	the	data	
collected	from	them.	
§ Posting	a	privacy	policy	on	your	website,	or	
explaining	on	a	form	or	login	screen	the	plans	for	
the	data	that	users	will	enter,	is	a	way	to	provide	
notice.		
The	Notice	Principle
P UB LI C SA FE TY
and
I NSTIT UT IO NAL
A S S U R A N C E
• Address	privacy	harms	by	identifying	a	way	to	obtain	
implicit	or	explicit	consent	from	individuals	with	
respect	to	the	collection,	use,	disclosure,	and	
retention	of	their	information.
• Choice	may	apply	to	"secondary	uses"—that	is,	uses	
beyond	the	original	reasons	for	which	the	data	was	
provided.	
• Choice	may	be	"opt	in"	(data	will	not	be	shared	
without	consent),	or	"opt	out"	(user	must	request	to	
stop	the	sharing	or	contacting).	
• Consider	providing	checkboxes	to	indicate	consent	to	
various	uses.
The	Choice	&	Consent	
Principle
P UB LI C SA FE TY
and
I NSTIT UT IO NAL
A S S U R A N C E
• Privacy	harms	can	be	addressed	by	reviewing	what	
data	is	being	collected	and	ensure	that	you	are	
collecting	only	the	information	needed	to	achieve	
the	purposes	identified,	in	support	of	the	
organization’s	mission,	and	as	outlined	in	the	notice.
• Especially	critical	are	very	sensitive	or	risky	pieces	of	
data	such	as	Social	Security	numbers,	credit	card	
numbers,	bank	account	numbers,	and	health	
information.
– Do	you	still	have	a	significant	business	purpose	for	it?
– If	not,	STOP	COLLECTING	it!
– If	so,	make	sure	you	PROTECT	it!	
The	Collection	Limitation	
Principle
P UB LI C SA FE TY
and
I NSTIT UT IO NAL
A S S U R A N C E
• Address	privacy	harms	by	reviewing	what	
information	you	are	disclosing	to	whom.	What	third	
parties	do	you	share	the	information	with?
• Ensure	that	you	are	disclosing	information	to	others	
only	as	outlined	in	the	notice	and	only	as	consented	
to—either	implicitly	or	explicitly.
• Review	contracts	with	third	parties	regularly,	to	
ensure	up-to-date	and	appropriate	data	
protection	language!
The	Disclosure	Limitation	
Principle
P UB LI C SA FE TY
and
I NSTIT UT IO NAL
A S S U R A N C E
Conclusion and
Questions
P UB LI C SA FE TY
and
I NSTIT UT IO NAL
A S S U R A N C E
Copyright	Merri	Beth	Lavagnino,	2016.	This	
work	is	the	intellectual	property	of	the	author.	
Permission	is	granted	for	this	material	to	be	
shared	for	non-commercial,	educational	
purposes,	 provided	that	this	copyright	
statement	appears	on	the	reproduced	
materials	and	notice	is	given	that	the	copying	
is	by	permission	of	the	author.	To	disseminate	
otherwise	or	to	republish	requires	written	
permission	 from	the	author.

Contenu connexe

En vedette

L’acquisition d’un outil de découverte_Expérience de l'Université Sherbrooke_...
L’acquisition d’un outil de découverte_Expérience de l'Université Sherbrooke_...L’acquisition d’un outil de découverte_Expérience de l'Université Sherbrooke_...
L’acquisition d’un outil de découverte_Expérience de l'Université Sherbrooke_...nst2011
 

En vedette (20)

Wheeler & Benedict -- Enabling the Preservation Relay
Wheeler & Benedict -- Enabling the Preservation RelayWheeler & Benedict -- Enabling the Preservation Relay
Wheeler & Benedict -- Enabling the Preservation Relay
 
Madsen Digital Preservation Policy & Strategy
Madsen Digital Preservation Policy & StrategyMadsen Digital Preservation Policy & Strategy
Madsen Digital Preservation Policy & Strategy
 
Wittenberg Portico: Lessons From a Community Supported Archive
Wittenberg Portico: Lessons From a Community Supported ArchiveWittenberg Portico: Lessons From a Community Supported Archive
Wittenberg Portico: Lessons From a Community Supported Archive
 
VanDyck Long-Term Preservation of Digital Scholarly Literature
VanDyck Long-Term Preservation of Digital Scholarly LiteratureVanDyck Long-Term Preservation of Digital Scholarly Literature
VanDyck Long-Term Preservation of Digital Scholarly Literature
 
Ferrante Durable Access to Digital Primary Sources
Ferrante Durable Access to Digital Primary SourcesFerrante Durable Access to Digital Primary Sources
Ferrante Durable Access to Digital Primary Sources
 
Goethals Harvard Library's Digital Preservation Repository
Goethals Harvard Library's Digital Preservation RepositoryGoethals Harvard Library's Digital Preservation Repository
Goethals Harvard Library's Digital Preservation Repository
 
L’acquisition d’un outil de découverte_Expérience de l'Université Sherbrooke_...
L’acquisition d’un outil de découverte_Expérience de l'Université Sherbrooke_...L’acquisition d’un outil de découverte_Expérience de l'Université Sherbrooke_...
L’acquisition d’un outil de découverte_Expérience de l'Université Sherbrooke_...
 
Herdrich -The Digital Library of the Middle East (DLME)
Herdrich -The Digital Library of the Middle East (DLME)Herdrich -The Digital Library of the Middle East (DLME)
Herdrich -The Digital Library of the Middle East (DLME)
 
Waraksa Digital Library of the Middle East
Waraksa Digital Library of the Middle EastWaraksa Digital Library of the Middle East
Waraksa Digital Library of the Middle East
 
Kettler Information Digitization in the Humanities
Kettler Information Digitization in the HumanitiesKettler Information Digitization in the Humanities
Kettler Information Digitization in the Humanities
 
Neylon From Principles to Action
Neylon From Principles to ActionNeylon From Principles to Action
Neylon From Principles to Action
 
Viggio Open VIVO
Viggio Open VIVOViggio Open VIVO
Viggio Open VIVO
 
Gonzalez Creating a Digital Makerspace
Gonzalez Creating a Digital MakerspaceGonzalez Creating a Digital Makerspace
Gonzalez Creating a Digital Makerspace
 
Weisberg - Museums and the Internet of Things
Weisberg - Museums and the Internet of ThingsWeisberg - Museums and the Internet of Things
Weisberg - Museums and the Internet of Things
 
Baraniuk public-openstax
Baraniuk public-openstaxBaraniuk public-openstax
Baraniuk public-openstax
 
Luther Knowledge Unlatched Case Study NISO Virtual Conference Ebooks
Luther Knowledge Unlatched Case Study NISO Virtual Conference EbooksLuther Knowledge Unlatched Case Study NISO Virtual Conference Ebooks
Luther Knowledge Unlatched Case Study NISO Virtual Conference Ebooks
 
Carpenter/Lagace: NISO Recommended Practices to Support Adoption of Altmetric...
Carpenter/Lagace: NISO Recommended Practices to Support Adoption of Altmetric...Carpenter/Lagace: NISO Recommended Practices to Support Adoption of Altmetric...
Carpenter/Lagace: NISO Recommended Practices to Support Adoption of Altmetric...
 
Meadows Role for Library-Based Makerspace in Liberal Arts School
Meadows Role for Library-Based Makerspace in Liberal Arts SchoolMeadows Role for Library-Based Makerspace in Liberal Arts School
Meadows Role for Library-Based Makerspace in Liberal Arts School
 
Burke What Library Makerspaces Need to Succeed
Burke What Library Makerspaces Need to SucceedBurke What Library Makerspaces Need to Succeed
Burke What Library Makerspaces Need to Succeed
 
Bosman-Kramer Changing Research Workflows
Bosman-Kramer Changing Research WorkflowsBosman-Kramer Changing Research Workflows
Bosman-Kramer Changing Research Workflows
 

Similaire à Lavignino Do You Know Your Privacy Risks

Emotional Resiliency
Emotional ResiliencyEmotional Resiliency
Emotional ResiliencyLisa Dickson
 
Influences on individual communication & interpersonal processes
Influences on individual communication & interpersonal processesInfluences on individual communication & interpersonal processes
Influences on individual communication & interpersonal processesLindsey Marie Arcilla-Vismanos
 
2017 Emotional Resiliency for Teens in Foster Care
2017 Emotional Resiliency for Teens in Foster Care2017 Emotional Resiliency for Teens in Foster Care
2017 Emotional Resiliency for Teens in Foster CareLisa Dickson
 
The Failure of Skepticism: Rethinking Information Literacy and Political Pol...
 The Failure of Skepticism: Rethinking Information Literacy and Political Pol... The Failure of Skepticism: Rethinking Information Literacy and Political Pol...
The Failure of Skepticism: Rethinking Information Literacy and Political Pol...Chris Sweet
 
Social Psychology14Enduring Issues in SocialPsychology.docx
Social Psychology14Enduring Issues in SocialPsychology.docxSocial Psychology14Enduring Issues in SocialPsychology.docx
Social Psychology14Enduring Issues in SocialPsychology.docxjensgosney
 
RESEARCH IN THE WORKPLACE Research in the workplace solves a.docx
RESEARCH IN THE WORKPLACE Research in the workplace solves a.docxRESEARCH IN THE WORKPLACE Research in the workplace solves a.docx
RESEARCH IN THE WORKPLACE Research in the workplace solves a.docxWilheminaRossi174
 
Essay On Self Esteem.pdf
Essay On Self Esteem.pdfEssay On Self Esteem.pdf
Essay On Self Esteem.pdfJackie Rojas
 
Master's Presentation to Intel Security
Master's Presentation to Intel Security Master's Presentation to Intel Security
Master's Presentation to Intel Security Andrea Wong
 
474 2015 implicit prejudice up
474 2015 implicit prejudice up474 2015 implicit prejudice up
474 2015 implicit prejudice upmpeffl
 
The urban educator #1
The urban educator #1The urban educator #1
The urban educator #1AyizeWeR1
 
Don T Call Me Ishmael Essay. Dont Call Me Ishmael - Reading Australia
Don T Call Me Ishmael Essay. Dont Call Me Ishmael - Reading AustraliaDon T Call Me Ishmael Essay. Dont Call Me Ishmael - Reading Australia
Don T Call Me Ishmael Essay. Dont Call Me Ishmael - Reading AustraliaWendy Fricke
 
Cultural pursuit 01-2016*
Cultural pursuit 01-2016*Cultural pursuit 01-2016*
Cultural pursuit 01-2016*Eric Strayer
 
Goffman intro
Goffman introGoffman intro
Goffman introYOYO1970
 
Racial Profiling and Its Effects
Racial Profiling and Its EffectsRacial Profiling and Its Effects
Racial Profiling and Its EffectsChey Bradley
 
Systemic Practice and Action Research, Vol. 18, No. 2, April 2.docx
Systemic Practice and Action Research, Vol. 18, No. 2, April 2.docxSystemic Practice and Action Research, Vol. 18, No. 2, April 2.docx
Systemic Practice and Action Research, Vol. 18, No. 2, April 2.docxssuserf9c51d
 
CUT AND COPY https://www.slideshare.net/RevolutionaryAuthor/3-its-a-titanic-s...
CUT AND COPY https://www.slideshare.net/RevolutionaryAuthor/3-its-a-titanic-s...CUT AND COPY https://www.slideshare.net/RevolutionaryAuthor/3-its-a-titanic-s...
CUT AND COPY https://www.slideshare.net/RevolutionaryAuthor/3-its-a-titanic-s...Shawn Cullen
 

Similaire à Lavignino Do You Know Your Privacy Risks (20)

Diversit yupload
Diversit yuploadDiversit yupload
Diversit yupload
 
Emotional Resiliency
Emotional ResiliencyEmotional Resiliency
Emotional Resiliency
 
Influences on individual communication & interpersonal processes
Influences on individual communication & interpersonal processesInfluences on individual communication & interpersonal processes
Influences on individual communication & interpersonal processes
 
2017 Emotional Resiliency for Teens in Foster Care
2017 Emotional Resiliency for Teens in Foster Care2017 Emotional Resiliency for Teens in Foster Care
2017 Emotional Resiliency for Teens in Foster Care
 
The Failure of Skepticism: Rethinking Information Literacy and Political Pol...
 The Failure of Skepticism: Rethinking Information Literacy and Political Pol... The Failure of Skepticism: Rethinking Information Literacy and Political Pol...
The Failure of Skepticism: Rethinking Information Literacy and Political Pol...
 
Social Psychology14Enduring Issues in SocialPsychology.docx
Social Psychology14Enduring Issues in SocialPsychology.docxSocial Psychology14Enduring Issues in SocialPsychology.docx
Social Psychology14Enduring Issues in SocialPsychology.docx
 
Type theory
Type theoryType theory
Type theory
 
Type theory
Type theoryType theory
Type theory
 
RESEARCH IN THE WORKPLACE Research in the workplace solves a.docx
RESEARCH IN THE WORKPLACE Research in the workplace solves a.docxRESEARCH IN THE WORKPLACE Research in the workplace solves a.docx
RESEARCH IN THE WORKPLACE Research in the workplace solves a.docx
 
Essay On Self Esteem.pdf
Essay On Self Esteem.pdfEssay On Self Esteem.pdf
Essay On Self Esteem.pdf
 
Master's Presentation to Intel Security
Master's Presentation to Intel Security Master's Presentation to Intel Security
Master's Presentation to Intel Security
 
474 2015 implicit prejudice up
474 2015 implicit prejudice up474 2015 implicit prejudice up
474 2015 implicit prejudice up
 
The urban educator #1
The urban educator #1The urban educator #1
The urban educator #1
 
Don T Call Me Ishmael Essay. Dont Call Me Ishmael - Reading Australia
Don T Call Me Ishmael Essay. Dont Call Me Ishmael - Reading AustraliaDon T Call Me Ishmael Essay. Dont Call Me Ishmael - Reading Australia
Don T Call Me Ishmael Essay. Dont Call Me Ishmael - Reading Australia
 
Cultural pursuit 01-2016*
Cultural pursuit 01-2016*Cultural pursuit 01-2016*
Cultural pursuit 01-2016*
 
Goffman intro
Goffman introGoffman intro
Goffman intro
 
Racial Profiling and Its Effects
Racial Profiling and Its EffectsRacial Profiling and Its Effects
Racial Profiling and Its Effects
 
Systemic Practice and Action Research, Vol. 18, No. 2, April 2.docx
Systemic Practice and Action Research, Vol. 18, No. 2, April 2.docxSystemic Practice and Action Research, Vol. 18, No. 2, April 2.docx
Systemic Practice and Action Research, Vol. 18, No. 2, April 2.docx
 
Identity: Who are you?
Identity: Who are you?Identity: Who are you?
Identity: Who are you?
 
CUT AND COPY https://www.slideshare.net/RevolutionaryAuthor/3-its-a-titanic-s...
CUT AND COPY https://www.slideshare.net/RevolutionaryAuthor/3-its-a-titanic-s...CUT AND COPY https://www.slideshare.net/RevolutionaryAuthor/3-its-a-titanic-s...
CUT AND COPY https://www.slideshare.net/RevolutionaryAuthor/3-its-a-titanic-s...
 

Plus de National Information Standards Organization (NISO)

Plus de National Information Standards Organization (NISO) (20)

Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Bazargan "NISO Webinar, Sustainability in Publishing"
Bazargan "NISO Webinar, Sustainability in Publishing"Bazargan "NISO Webinar, Sustainability in Publishing"
Bazargan "NISO Webinar, Sustainability in Publishing"
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Compton "NISO Webinar, Sustainability in Publishing"
Compton "NISO Webinar, Sustainability in Publishing"Compton "NISO Webinar, Sustainability in Publishing"
Compton "NISO Webinar, Sustainability in Publishing"
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...
Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...
Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...
 
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
 
Mattingly "Text and Data Mining: Building Data Driven Applications"
Mattingly "Text and Data Mining: Building Data Driven Applications"Mattingly "Text and Data Mining: Building Data Driven Applications"
Mattingly "Text and Data Mining: Building Data Driven Applications"
 
Mattingly "Text and Data Mining: Searching Vectors"
Mattingly "Text and Data Mining: Searching Vectors"Mattingly "Text and Data Mining: Searching Vectors"
Mattingly "Text and Data Mining: Searching Vectors"
 
Mattingly "Text Mining Techniques"
Mattingly "Text Mining Techniques"Mattingly "Text Mining Techniques"
Mattingly "Text Mining Techniques"
 
Mattingly "Text Processing for Library Data: Representing Text as Data"
Mattingly "Text Processing for Library Data: Representing Text as Data"Mattingly "Text Processing for Library Data: Representing Text as Data"
Mattingly "Text Processing for Library Data: Representing Text as Data"
 
Carpenter "Designing NISO's New Strategic Plan: 2023-2026"
Carpenter "Designing NISO's New Strategic Plan: 2023-2026"Carpenter "Designing NISO's New Strategic Plan: 2023-2026"
Carpenter "Designing NISO's New Strategic Plan: 2023-2026"
 
Ross and Clark "Strategic Planning"
Ross and Clark "Strategic Planning"Ross and Clark "Strategic Planning"
Ross and Clark "Strategic Planning"
 
Mattingly "Data Mining Techniques: Classification and Clustering"
Mattingly "Data Mining Techniques: Classification and Clustering"Mattingly "Data Mining Techniques: Classification and Clustering"
Mattingly "Data Mining Techniques: Classification and Clustering"
 
Straza "Global collaboration towards equitable and open science: UNESCO Recom...
Straza "Global collaboration towards equitable and open science: UNESCO Recom...Straza "Global collaboration towards equitable and open science: UNESCO Recom...
Straza "Global collaboration towards equitable and open science: UNESCO Recom...
 
Lippincott "Beyond access: Accelerating discovery and increasing trust throug...
Lippincott "Beyond access: Accelerating discovery and increasing trust throug...Lippincott "Beyond access: Accelerating discovery and increasing trust throug...
Lippincott "Beyond access: Accelerating discovery and increasing trust throug...
 
Kriegsman "Integrating Open and Equitable Research into Open Science"
Kriegsman "Integrating Open and Equitable Research into Open Science"Kriegsman "Integrating Open and Equitable Research into Open Science"
Kriegsman "Integrating Open and Equitable Research into Open Science"
 
Mattingly "Ethics and Cleaning Data"
Mattingly "Ethics and Cleaning Data"Mattingly "Ethics and Cleaning Data"
Mattingly "Ethics and Cleaning Data"
 
Mercado-Lara "Open & Equitable Program"
Mercado-Lara "Open & Equitable Program"Mercado-Lara "Open & Equitable Program"
Mercado-Lara "Open & Equitable Program"
 

Dernier

Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 

Dernier (20)

Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 

Lavignino Do You Know Your Privacy Risks

  • 1. P UB LI C SA FE TY and I NSTIT UT IO NAL A S S U R A N C E Do You Know Your Privacy Risks? Merri Beth Lavagnino, Chief Risk Officer Indiana University mbl@iu.edu
  • 2. P UB LI C SA FE TY and I NSTIT UT IO NAL A S S U R A N C E Privacy definition “Privacy is the claim of individuals, groups or institutions to determine for themselves when, how, and to what extent information about them is communicated to others.” – Alan Westin: Privacy & Freedom,1967
  • 3. P UB LI C SA FE TY and I NSTIT UT IO NAL A S S U R A N C E But, it’s a moving target… “Each individual is continually engaged in a personal adjustment process in which he balances the desire for privacy with the desire for disclosure and communication.” – Alan Westin: Privacy & Freedom,1967
  • 4. P UB LI C SA FE TY and I NSTIT UT IO NAL A S S U R A N C E Here’s how you do a privacy assessment of a service, project, initiative, app, etc.! • Identify the potential Privacy Harms • Determine what your institution’s position will be – Use the Privacy Principles to devise ways to reduce the harms – You must do the minimum required by law, but, you also can choose to do more than is required by law
  • 5. P UB LI C SA FE TY and I NSTIT UT IO NAL A S S U R A N C E First, identify the Privacy Harms • Brainstorm the possible harms so you can try to ANTICIPATE (and then plan to reduce or even avoid) these harms • Many theorists in this area – William Prosser in 1960 – Alan Westin in 1967 – Daniel J. Solove’s 2008 “Taxonomy of Privacy”
  • 6. P UB LI C SA FE TY and I NSTIT UT IO NAL A S S U R A N C E What the person might think: “They are collecting information about what I am doing - more than they should!” Examples include: § Surveillance — watching, listening to, or recording an individual’s activities § Interrogation —inappropriately probing for information § Visual — viewing private activities without the individual’s knowledge § Communications —tapping your phone, email, Internet traffic § Too Much Information (TMI)— asking for “private" information unnecessarily The Information Collection Harm
  • 7. P UB LI C SA FE TY and I NSTIT UT IO NAL A S S U R A N C E What the person might think: “They have a lot of data about me, and they are storing, manipulating, and using it!” Examples include: § Aggregation — combining pieces of information about an individual that were collected from different sources § Identification —linking unidentified information elements to particular individuals § Insecurity — failure to protect information from leaks and unauthorized access § Secondary use — use of collected information for a purpose different from the use for which it was collected, without the individual’s consent § Exclusion —using data to exclude an individual, especially if the data was incorrect or interpreted incorrectly The Information Processing Harm
  • 8. P UB LI C SA FE TY and I NSTIT UT IO NAL A S S U R A N C E What the person might think: “They spread or transfer information about me — more than I think they should!” Examples include: § Breach of confidentiality — breaking an agreement to keep information confidential § Disclosure — disclosing data to persons or entities the individual doesn’t expect § Exposure — revealing intimate information, as in a public exposure of private facts § Increased accessibility — amplifying the accessibility of info § Blackmail — a threat to disclose personal information § Appropriation — the use of an individual’s identity, such as using a name or picture, without the individual’s permission § Distortion — disseminating false or misleading information about individuals The Information Dissemination Harm
  • 9. P UB LI C SA FE TY and I NSTIT UT IO NAL A S S U R A N C E What the person might think: “They come into my space and contact me, or tell me what to do!” Examples include: § Invasions into private affairs § Invasive acts that disturb an individual’s tranquility or solitude § Decisional interference — entering into an individual’s decisions regarding her private affairs § Unwanted email — did you know that unwanted communications into an individual’s personal space, including her email inbox, is considered a privacy invasion? § Unwanted phone calls —entering into an individual’s personal space by calling his personal phone number (especially if it is a mobile phone) § Entering a room without knocking The Invasion Harm
  • 10. P UB LI C SA FE TY and I NSTIT UT IO NAL A S S U R A N C E Once you’ve identified the possible HARMS... • Then use the Privacy PRINCIPLES to design controls/safeguards that appropriately address those harms
  • 11. P UB LI C SA FE TY and I NSTIT UT IO NAL A S S U R A N C E Sources of privacy principles • American Institute of Certified Public Accountants, Inc. (AICPA) and Canadian Institute of Chartered Accountants (CICA). Generally Accepted Privacy Principles. August, 2009. • U.S. Federal Trade Commission (FTC). Fair Information Practice Principles. 1998. • Organisationfor Economic Co-operation and Development (OECD). OECD Guidelines on the Protection of Privacy and TransborderFlows of Personal Data. 1980, revised 2013. • U.S. Department of Homeland Security (DHS). DHS Fair Information Practice Principles. 2008. • U.S. White House. Consumer Data Privacy in a Networked World (a.k.a. Consumer Privacy Bill of Rights). 2012.
  • 12. P UB LI C SA FE TY and I NSTIT UT IO NAL A S S U R A N C E Different terminology…but same general concepts DHS • Transparency • Individual Participation • Purpose Specification • Data Minimization • Use Limitation • Data Quality and Integrity • Security • Accountability and Auditing GAPP • Management • Notice • Choice and Consent • Collection • Use and Retention • Access • Disclosure to Third Parties • Security for Privacy • Quality • Monitoring and Enforcement Indiana University Privacy Principles: https://protect.iu.edu/online-safety/program/principles.html
  • 13. P UB LI C SA FE TY and I NSTIT UT IO NAL A S S U R A N C E § Usually, the easiest way to address privacy harms is by identifying a way to inform, or provide “notice” to users of institutional practices around the data collected from them. § Posting a privacy policy on your website, or explaining on a form or login screen the plans for the data that users will enter, is a way to provide notice. The Notice Principle
  • 14. P UB LI C SA FE TY and I NSTIT UT IO NAL A S S U R A N C E • Address privacy harms by identifying a way to obtain implicit or explicit consent from individuals with respect to the collection, use, disclosure, and retention of their information. • Choice may apply to "secondary uses"—that is, uses beyond the original reasons for which the data was provided. • Choice may be "opt in" (data will not be shared without consent), or "opt out" (user must request to stop the sharing or contacting). • Consider providing checkboxes to indicate consent to various uses. The Choice & Consent Principle
  • 15. P UB LI C SA FE TY and I NSTIT UT IO NAL A S S U R A N C E • Privacy harms can be addressed by reviewing what data is being collected and ensure that you are collecting only the information needed to achieve the purposes identified, in support of the organization’s mission, and as outlined in the notice. • Especially critical are very sensitive or risky pieces of data such as Social Security numbers, credit card numbers, bank account numbers, and health information. – Do you still have a significant business purpose for it? – If not, STOP COLLECTING it! – If so, make sure you PROTECT it! The Collection Limitation Principle
  • 16. P UB LI C SA FE TY and I NSTIT UT IO NAL A S S U R A N C E • Address privacy harms by reviewing what information you are disclosing to whom. What third parties do you share the information with? • Ensure that you are disclosing information to others only as outlined in the notice and only as consented to—either implicitly or explicitly. • Review contracts with third parties regularly, to ensure up-to-date and appropriate data protection language! The Disclosure Limitation Principle
  • 17. P UB LI C SA FE TY and I NSTIT UT IO NAL A S S U R A N C E Conclusion and Questions
  • 18. P UB LI C SA FE TY and I NSTIT UT IO NAL A S S U R A N C E Copyright Merri Beth Lavagnino, 2016. This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.