SlideShare une entreprise Scribd logo
1  sur  20
Protecting Privacy by using data labels ,[object Object]
No Labels = Grim Surprises
Strictest handling procedure must be applied for all jars
But I know what ’ s on  that  shelf
But what happens when we give a sample to another lab? ,[object Object],[object Object],[object Object]
Unlabeled jar Cabinet
We ’ ve got 16kB of PHI right here
Changing Context, Losing Knowledge
Authorization as proxy for explicit knowledge ,[object Object],[object Object],[object Object]
Privacy Professional Security Professional
What happens next?
Feed the social layer
 
 
Relationship Context Metadata
Beads and Strings
What ’ s in a bead? Parties & their relationships Consented Uses & Disclosures Obligations What do to if you aren ’ t one of the parties
What to do if you find data in the wild
Privacy is a Social Construct ,[object Object],[object Object],[object Object]
Making the Implicit Explicit ,[object Object],[object Object],[object Object]

Contenu connexe

Similaire à Protecting Privacy by Using Data Labels

Testing or Hacking: Real Advice on Effective Security Testing Stratagies
Testing or Hacking: Real Advice on Effective Security Testing StratagiesTesting or Hacking: Real Advice on Effective Security Testing Stratagies
Testing or Hacking: Real Advice on Effective Security Testing StratagiesDaniel Billing
 
Business considerations for privacy and open data: how not to get caught out
Business considerations for privacy and open data: how not to get caught outBusiness considerations for privacy and open data: how not to get caught out
Business considerations for privacy and open data: how not to get caught outtheODI
 
Protecting young-children-online-power point-presentation-security
Protecting young-children-online-power point-presentation-securityProtecting young-children-online-power point-presentation-security
Protecting young-children-online-power point-presentation-securityMohamed ElGabry
 
Transcript FAIR webinar #2: A for Accessable-06-06-2017
Transcript FAIR webinar #2: A for Accessable-06-06-2017Transcript FAIR webinar #2: A for Accessable-06-06-2017
Transcript FAIR webinar #2: A for Accessable-06-06-2017ARDC
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Programsecratic
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetysmartinson
 
Data management workshop 101113
Data management workshop 101113Data management workshop 101113
Data management workshop 101113Jackie Wirz, PhD
 
DIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School StudentsDIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School StudentsLeon Letkeman
 
20161109_Mahan_Brighttalk_Webinar_Final
20161109_Mahan_Brighttalk_Webinar_Final20161109_Mahan_Brighttalk_Webinar_Final
20161109_Mahan_Brighttalk_Webinar_FinalPhillip Mahan
 
10 questions for LAFOIP in the classroom
10 questions for LAFOIP in the classroom10 questions for LAFOIP in the classroom
10 questions for LAFOIP in the classroomkmuench
 
A Little Privacy, Please… Diving into Data Privacy for Nonprofits
A Little Privacy, Please… Diving into Data Privacy for NonprofitsA Little Privacy, Please… Diving into Data Privacy for Nonprofits
A Little Privacy, Please… Diving into Data Privacy for NonprofitsTechSoup
 
TIES 2013 Education Technology Conference
TIES 2013 Education Technology ConferenceTIES 2013 Education Technology Conference
TIES 2013 Education Technology ConferenceEvan Francen
 
Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?
Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?
Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?Jim Adler
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social NetworksOuriel Ohayon
 
Student privacy and technology
Student privacy and technologyStudent privacy and technology
Student privacy and technologykmuench
 
Salesforce & GDPR: What happens next?
Salesforce & GDPR: What happens next? Salesforce & GDPR: What happens next?
Salesforce & GDPR: What happens next? Desynit
 
Ethics and Privacy in Learning Analytics
Ethics and Privacy in Learning AnalyticsEthics and Privacy in Learning Analytics
Ethics and Privacy in Learning AnalyticsAbelardo Pardo
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...Frances Coronel
 
Rsqrd AI: A Survey of The Current Ecosystem of Explainability Techniques
Rsqrd AI: A Survey of The Current Ecosystem of Explainability TechniquesRsqrd AI: A Survey of The Current Ecosystem of Explainability Techniques
Rsqrd AI: A Survey of The Current Ecosystem of Explainability TechniquesSanjana Chowdhury
 

Similaire à Protecting Privacy by Using Data Labels (20)

Testing or Hacking: Real Advice on Effective Security Testing Stratagies
Testing or Hacking: Real Advice on Effective Security Testing StratagiesTesting or Hacking: Real Advice on Effective Security Testing Stratagies
Testing or Hacking: Real Advice on Effective Security Testing Stratagies
 
Business considerations for privacy and open data: how not to get caught out
Business considerations for privacy and open data: how not to get caught outBusiness considerations for privacy and open data: how not to get caught out
Business considerations for privacy and open data: how not to get caught out
 
Protecting young-children-online-power point-presentation-security
Protecting young-children-online-power point-presentation-securityProtecting young-children-online-power point-presentation-security
Protecting young-children-online-power point-presentation-security
 
Transcript FAIR webinar #2: A for Accessable-06-06-2017
Transcript FAIR webinar #2: A for Accessable-06-06-2017Transcript FAIR webinar #2: A for Accessable-06-06-2017
Transcript FAIR webinar #2: A for Accessable-06-06-2017
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Program
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Data management workshop 101113
Data management workshop 101113Data management workshop 101113
Data management workshop 101113
 
DIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School StudentsDIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School Students
 
20161109_Mahan_Brighttalk_Webinar_Final
20161109_Mahan_Brighttalk_Webinar_Final20161109_Mahan_Brighttalk_Webinar_Final
20161109_Mahan_Brighttalk_Webinar_Final
 
10 questions for LAFOIP in the classroom
10 questions for LAFOIP in the classroom10 questions for LAFOIP in the classroom
10 questions for LAFOIP in the classroom
 
A Little Privacy, Please… Diving into Data Privacy for Nonprofits
A Little Privacy, Please… Diving into Data Privacy for NonprofitsA Little Privacy, Please… Diving into Data Privacy for Nonprofits
A Little Privacy, Please… Diving into Data Privacy for Nonprofits
 
TIES 2013 Education Technology Conference
TIES 2013 Education Technology ConferenceTIES 2013 Education Technology Conference
TIES 2013 Education Technology Conference
 
Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?
Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?
Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social Networks
 
Student privacy and technology
Student privacy and technologyStudent privacy and technology
Student privacy and technology
 
Salesforce & GDPR: What happens next?
Salesforce & GDPR: What happens next? Salesforce & GDPR: What happens next?
Salesforce & GDPR: What happens next?
 
Ethics and Privacy in Learning Analytics
Ethics and Privacy in Learning AnalyticsEthics and Privacy in Learning Analytics
Ethics and Privacy in Learning Analytics
 
Cap 233 intro
Cap 233 introCap 233 intro
Cap 233 intro
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
 
Rsqrd AI: A Survey of The Current Ecosystem of Explainability Techniques
Rsqrd AI: A Survey of The Current Ecosystem of Explainability TechniquesRsqrd AI: A Survey of The Current Ecosystem of Explainability Techniques
Rsqrd AI: A Survey of The Current Ecosystem of Explainability Techniques
 

Dernier

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Dernier (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Protecting Privacy by Using Data Labels

Notes de l'éditeur

  1. Picture a chemistry lab Picture a cabinet in that lab All of the jars in that cabinet are unlabeled Image courtesy of UF Digital Collections - http://www.flickr.com/photos/ufdc/3333277041/
  2. Each jar contains a potentially grim surprise * Caustic * Toxic * Harmless * Volatile Image courtesty of bhikku - http://www.flickr.com/photos/bhikku/4608657906/
  3. Because the jars are unlabeled The strictest handling procedures must be applied for all jars * Even though some don ’ t require such strictness This increases the handling costs. Requires spot audit programs Make everything more difficult Image courtesy of
  4. But I know what is on that shelf Implicit knowledge might be generated * Items on this shelf are caustic * Items on this shelf are volatile * Items on this shelf are harmless Image courtesy of Shobhit Agrawal - http://www.flickr.com/photos/shobhitagrawal/400862418/sizes/z/
  5. Image courtesy of code poet - http://www.flickr.com/photos/alphageek/5094405942/
  6. This is how enterprises handle data Our systems and databases are the cabinets and the unlabeled jars We do not tailor handling procedures to the data well We do not inform handlers about the data well Image courtesy of carrierdetect - http://www.flickr.com/photos/carrierdetect/3316432467/
  7. We have implicit knowledge We have implicit knowledge of the data based on the system it comes from * “ If it came from that system, it must be this kind of data ” * This implicit knowledge informs our data handling procedures Image courtesy of scriptingnews - http://www.flickr.com/photos/scriptingnews/2627291590/
  8. Transferring data moves that data from one context to anotherWhen data changes context, implicit knowledge is lostBad enough when the sharing is within the enterpriseFar worse when we share beyond our walls Image courtesy of dan4th - http://www.flickr.com/photos/dan4th/2402329882/
  9. The authorization event is the end of the story to a security professional. But the authorization event is merely the beginning of the story to a privacy professional. What happens after authorization is the interesting bit from a privacy perspective. Image courtesy of davedugdale - http://www.flickr.com/photos/davedugdale/5099718716/
  10. How should we handle the data?Are our obligations to the data met?What uses and disclosures were consented to?Answering these questions require context Image courtesy of Paul Bratcher Photography: http://www.flickr.com/photos/pdbratcher/4748616980/
  11. Determining how to handle data requires the social layer of the enterprise to be informedPeople know how to evaluate context Image courtesy of tjdewey - http://www.flickr.com/photos/22416200@N05/5197320220/
  12. Need to keep the social layer informed We don ’ t label our data.Any context information we have is stripped when data changes hands. This makes handling transferred data expensive and fraught with danger
  13. Use data labels to protect privacy Make the implicit explicitDescribe context in human readable termsHelp the social layer make better data handling decisions http://www.flickr.com/photos/31818948@N07/3488770096/sizes/z/
  14. Use data labels to protect privacy Richer context information for technical controls to useAssign accountability more accurately and fairlyWe call these data labels relationship context metadata
  15. RCM is created when data is transferred * Intra-company transfers * Inter-company transfers * Individual to organizations transfers Each piece of RCM is called a bead and beads are attached to strings. A string adorns a set of data.
  16. What to do if you find data in the wild The use of data labels can help companies track where their data flows. It can also be used when data flows out of the control of the originating organization. One could image instructions such as the following embedded in the RCM: “ Call Hemisphere Medical ’ s Data Protection office. Tell them you ’ ve discovered RCM number 8541-BOS-123001 ”“ Call the Massachusetts State Attorney General ’ s office at (617) 727-8400. Tell them you have found MA 201 CMR 17 information. ” Image courtesy of bill barber: http://www.flickr.com/photos/wdwbarber/4373658475/