SlideShare une entreprise Scribd logo
1  sur  9
1GOSIA RYBAKOWSKA © 2017
PRIVACYSECURITYCENTRE.ORG
INTERNET OF
THINGS
WITH
PRIVACY IN
MIND
2
WHAT DO I
DO?
I am a programmer, data analyst, privacy and data protection advocate.
I value open society and fair policies.
I am a CEO of Privacy and Security Analysis Centre.
We work together with organisations and companies to ensure that
security, privacy and ethics are included in all aspects of technology and
data processing.
CONTACT:
mr@privacysecuritycentre.org
@Apsalaar
Internet of Things devices add to the pool of personal
data collected about us.
Even fragmented data - gathered, collated and
analysed - can reveal sensitive information.
We surrender our privacy because we are unaware
what data is collected and how it’s being used. Time
to change this.
The number of connected
devices is constantly growing.
It is predicted that Internet of
Things will expand to 25 billions
devices until 2020.
3
4
Source: Mozilla Internet Health Report: https://internethealthreport.org/v01/privacy-and-security/
5
What
happens to
our data?
We don’t
know.
➔ 59% of devices failed to adequately explain to
customers how their personal information was
collected, used and disclosed
➔ 68% failed to properly explain how information
was stored
➔ 72% failed to explain how customers could
delete their information off the device, and
➔ 38% failed to include easily identifiable contact
details if customers had privacy concerns
INTERNATIONAL STUDY SHOWS THAT
INTERNET OF THINGS MANUFACTURERS
DON’T COMMUNICATE PRIVACY TO THEIR
CUSTOMERS*
* Source: https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2016/09/privacy-regulators-study-finds-internet-of-things-shortfalls/
● Giant data pool: Federal Trade Commission
states that fewer than 10.000 households can
generate 150 million discrete data points every
day
● Secondary uses of data: “predictive analytics”
and commercial data brokers
○ a data broker might handle more than 350
kinds of information about single user!
● Privacy becoming a “premium feature” or a
product for privileged users willing to pay for it
● Loss of consumers’ confidence and trust
blocking the innovation and IoT potential
Internet of Things Privacy Risks...
6
Image: https://www.flickr.com/photos/whaleforset/
7
● Privacy standards are ensured best when you
introduce them during the design stage - Privacy by
Design is a methodology to follow
○ Proactive approach
○ Privacy as a default setting
○ Privacy embedded into design
○ Fully functional
○ End-to-end security
○ Transparency
○ User-centric
● Privacy Impact Assessment and Data Protection
Impact Assessment are tools helping to identify and
mitigate risks as well as producing better policies and -
in general - systems and APIs safer for their users.
… and how to mitigate them at very early stage
8
BENEFITS OF
PRIVACY
IMPACT
ASSESSMENT
● It helps you to understand data protection needs
● … and shape better Privacy Policies
● It is also the best way to demonstrate that an Organisation follows
the highest data protection standards
● It greatly improves transparency
● conducting a Data Protection Impact Assessment might be
mandatory (GDPR) when processing of sensitive data is involved
1GOSIA RYBAKOWSKA © 2017
PRIVACYSECURITYCENTRE.ORG
THANK YOU!
@APSALAAR

Contenu connexe

Tendances

Data Privacy and Security by Design
Data Privacy and Security by DesignData Privacy and Security by Design
Data Privacy and Security by Design
Data Con LA
 
IT Controls Presentation
IT Controls PresentationIT Controls Presentation
IT Controls Presentation
Bill Lisse
 

Tendances (20)

Data Security
Data SecurityData Security
Data Security
 
Gdpr questions for compliance difficulties
Gdpr questions for compliance difficultiesGdpr questions for compliance difficulties
Gdpr questions for compliance difficulties
 
Privacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the artPrivacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the art
 
Realizing the Value of Social: Evolving from Social Media to Customer Experience
Realizing the Value of Social: Evolving from Social Media to Customer ExperienceRealizing the Value of Social: Evolving from Social Media to Customer Experience
Realizing the Value of Social: Evolving from Social Media to Customer Experience
 
2016 Network Security Outlook
2016 Network Security Outlook2016 Network Security Outlook
2016 Network Security Outlook
 
Data Privacy and Security by Design
Data Privacy and Security by DesignData Privacy and Security by Design
Data Privacy and Security by Design
 
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
 
Privacy in the digital space
Privacy in the digital spacePrivacy in the digital space
Privacy in the digital space
 
Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and drivers
 
Cyber and Data Risks
Cyber and Data RisksCyber and Data Risks
Cyber and Data Risks
 
IT Controls Presentation
IT Controls PresentationIT Controls Presentation
IT Controls Presentation
 
Privacy by Design: White Papaer
Privacy by Design: White PapaerPrivacy by Design: White Papaer
Privacy by Design: White Papaer
 
Cyphra - Cyber Security
Cyphra - Cyber SecurityCyphra - Cyber Security
Cyphra - Cyber Security
 
call for papers - International Journal on Cryptography and Information Secur...
call for papers - International Journal on Cryptography and Information Secur...call for papers - International Journal on Cryptography and Information Secur...
call for papers - International Journal on Cryptography and Information Secur...
 
How Walmart is Combating Fraud and Saving Consumers Millions
How Walmart is Combating Fraud and Saving Consumers MillionsHow Walmart is Combating Fraud and Saving Consumers Millions
How Walmart is Combating Fraud and Saving Consumers Millions
 
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
 
Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891
 
Data Protection Presentation
Data Protection PresentationData Protection Presentation
Data Protection Presentation
 
Big data security challenges and recommendations!
Big data security challenges and recommendations!Big data security challenges and recommendations!
Big data security challenges and recommendations!
 

Similaire à Internet of Things With Privacy in Mind

Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learning
Ulf Mattsson
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016
Melissa Krasnow
 
The Data Privacy Imperative
The Data Privacy ImperativeThe Data Privacy Imperative
The Data Privacy Imperative
butest
 

Similaire à Internet of Things With Privacy in Mind (20)

Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learning
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
 
TLabs - deutsche telekom
TLabs -  deutsche telekomTLabs -  deutsche telekom
TLabs - deutsche telekom
 
Perspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data GovernancePerspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data Governance
 
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina TorinoTrustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
 
The Privacy Illusion
The Privacy IllusionThe Privacy Illusion
The Privacy Illusion
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act Brings
 
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
 
Privacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSPrivacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMS
 
Data foundation for analytics excellence
Data foundation for analytics excellenceData foundation for analytics excellence
Data foundation for analytics excellence
 
apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...
apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...
apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
 
GDPR Complaince: Don't Let SIEM BE Your Downfall
GDPR Complaince: Don't Let SIEM BE Your DownfallGDPR Complaince: Don't Let SIEM BE Your Downfall
GDPR Complaince: Don't Let SIEM BE Your Downfall
 
The Data Privacy Imperative
The Data Privacy ImperativeThe Data Privacy Imperative
The Data Privacy Imperative
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
 
The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Internet of Things With Privacy in Mind

  • 1. 1GOSIA RYBAKOWSKA © 2017 PRIVACYSECURITYCENTRE.ORG INTERNET OF THINGS WITH PRIVACY IN MIND
  • 2. 2 WHAT DO I DO? I am a programmer, data analyst, privacy and data protection advocate. I value open society and fair policies. I am a CEO of Privacy and Security Analysis Centre. We work together with organisations and companies to ensure that security, privacy and ethics are included in all aspects of technology and data processing. CONTACT: mr@privacysecuritycentre.org @Apsalaar
  • 3. Internet of Things devices add to the pool of personal data collected about us. Even fragmented data - gathered, collated and analysed - can reveal sensitive information. We surrender our privacy because we are unaware what data is collected and how it’s being used. Time to change this. The number of connected devices is constantly growing. It is predicted that Internet of Things will expand to 25 billions devices until 2020. 3
  • 4. 4 Source: Mozilla Internet Health Report: https://internethealthreport.org/v01/privacy-and-security/
  • 5. 5 What happens to our data? We don’t know. ➔ 59% of devices failed to adequately explain to customers how their personal information was collected, used and disclosed ➔ 68% failed to properly explain how information was stored ➔ 72% failed to explain how customers could delete their information off the device, and ➔ 38% failed to include easily identifiable contact details if customers had privacy concerns INTERNATIONAL STUDY SHOWS THAT INTERNET OF THINGS MANUFACTURERS DON’T COMMUNICATE PRIVACY TO THEIR CUSTOMERS* * Source: https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2016/09/privacy-regulators-study-finds-internet-of-things-shortfalls/
  • 6. ● Giant data pool: Federal Trade Commission states that fewer than 10.000 households can generate 150 million discrete data points every day ● Secondary uses of data: “predictive analytics” and commercial data brokers ○ a data broker might handle more than 350 kinds of information about single user! ● Privacy becoming a “premium feature” or a product for privileged users willing to pay for it ● Loss of consumers’ confidence and trust blocking the innovation and IoT potential Internet of Things Privacy Risks... 6 Image: https://www.flickr.com/photos/whaleforset/
  • 7. 7 ● Privacy standards are ensured best when you introduce them during the design stage - Privacy by Design is a methodology to follow ○ Proactive approach ○ Privacy as a default setting ○ Privacy embedded into design ○ Fully functional ○ End-to-end security ○ Transparency ○ User-centric ● Privacy Impact Assessment and Data Protection Impact Assessment are tools helping to identify and mitigate risks as well as producing better policies and - in general - systems and APIs safer for their users. … and how to mitigate them at very early stage
  • 8. 8 BENEFITS OF PRIVACY IMPACT ASSESSMENT ● It helps you to understand data protection needs ● … and shape better Privacy Policies ● It is also the best way to demonstrate that an Organisation follows the highest data protection standards ● It greatly improves transparency ● conducting a Data Protection Impact Assessment might be mandatory (GDPR) when processing of sensitive data is involved
  • 9. 1GOSIA RYBAKOWSKA © 2017 PRIVACYSECURITYCENTRE.ORG THANK YOU! @APSALAAR