SlideShare une entreprise Scribd logo
1  sur  30
So You Want To Protect Privacy: Now What? ARMA Information Management Symposium June 1, 2011 Stuart Bailey
2 So You Want To Protect Privacy: Now What?
3 Privacy and Social Media “Instantaneous photographs and newspaper enterprise have invaded the sacred precincts of private and domestic life; and numerous mechanical devices threaten to make good the prediction that "what is whispered in the closet shall be proclaimed from the house-tops."“ “The Right to Privacy” Warren and Brandeis, The Right To Privacy, 4 Harvard Law Review 193 (1890) So You Want To Protect Privacy: Now What?
4 Privacy Means… Can be defined in many ways, for example, privacy of: Assault Nuisance Reputation Defamation (Slander, Libel) Property rights (Copyright, intellectual property) Opinions Body Communications Data So You Want To Protect Privacy: Now What?
5 Privacy and Data Protection Data protection legislation is the main lens through which we address privacy interests Documented information about specific individuals Prosser v. Gavison Privacy torts; something unique and distinct As seen recently in Law Times Jones v. Tsige 2011 ONSC 1475 (CanLII) http://www.canlii.org/en/on/onsc/doc/2011/2011onsc1475/2011onsc1475.html So You Want To Protect Privacy: Now What?
6 Social Media and Privacy The Right to Be Let Alone “The Right to Privacy” Warren and Brandeis, The Right To Privacy, 4 Harvard Law Review 193 (1890)  Freedom of Expression Private Communications The Right to Be Forgotten As seen recently in the European Union Location data Does it locate a data subject, or is data a location itself (i.e., a site)? Crossing Borders If skin is a border between people, what forms the border between data subjects? So You Want To Protect Privacy: Now What?
7 Prosser on Privacy Intrusion upon the plaintiff’s seclusion or solitude, or into his private affairs; Public disclosure of embarrassing private facts about the plaintiff; Publicity which places the plaintiff in a false light in the public eye;  and Appropriation, for the defendant’s advantage, of the plaintiff’s name or likeness. Privacy, 48 Cal.L.Rev. 383 (1960) So You Want To Protect Privacy: Now What?
8 Gavison: “Privacy and the Limits of Law” ,[object Object],Gavison, R., 1980, “Privacy and the Limits of Law”, Yale Law Journal 89: 421-71 Accessed at http://www.gavison.com/a2658-privacy-and-the-limits-of-law May 20, 2011. So You Want To Protect Privacy: Now What?
9 Jones v. Tsige, 2011 ONSC 1475 (CanLII) ,[object Object]
[53]           Turning back now to the various statutory provisions that govern privacy issues, most Canadian jurisdictions have statutory administrative schemes that govern and regulate privacy issues and disputes. In Ontario, it cannot be said that there is a legal vacuum that permits wrongs to go unrighted - requiring judicial intervention. 
[54]           More particularly here, there is no doubt that PIPEDA applies to the banking sector and Ms. Jones had the right to initiate a complaint to the Commissioner under that statute with eventual recourse to the Federal Court. For this reason I do not accept the suggestion that Ms. Jones would be without any remedy for a wrong, if I were to determine that there is no tort for the invasion of privacy.
[55]           Notwithstanding the careful reasoning in Somwar and its adoption in Nitsopoulos, I conclude that the decision of the Court of Appeal in Euteneier is binding and dispositive of the question as to whether the tort of invasion of privacy exists at common law.
[56]           I would also note that this is not an area of law that requires “judge-made” rights and obligations.  Statutory schemes that govern privacy issues are, for the most part, carefully nuanced and designed to balance practical concerns and needs in an industry-specific fashion.
[57]           I conclude that there is no tort of invasion of privacy in Ontario.http://www.canlii.org/en/on/onsc/doc/2011/2011onsc1475/2011onsc1475.html Accessed May 20, 2011 (emphasis added) If there is no tort of invasion of privacy, recoveries for privacy harms must be done through other means – but how will those be acted on? So You Want To Protect Privacy: Now What?
10 A Privacy Proposition If there is no tort for invasion of privacy Privacy harms are appended to other torts  And there is still something unique and distinct about privacy that lets us have internal thoughts Privacy rights are based on a concept that cannot be numerated Therefore, protecting privacy rights is a matter of linking shared principles to everyday actions and finding “privacy” through other established activities Data protection and the need to manage information So You Want To Protect Privacy: Now What?
11 Data and Privacy Data are everywhere; some personal, some not – some personal information can be derived from seemingly non-personal information. Personal data can be a location as much as a physical address is. Determining and adhering to “consistent use” can prove to be difficult. So You Want To Protect Privacy: Now What?
12 Information Management Information Management is the discipline of managing information like an asset – the same as we do for money, people, or infrastructure. So You Want To Protect Privacy: Now What?
13 What Is Information Management? http://www.aiim.org/What-is-Information-Management So You Want To Protect Privacy: Now What?
14 IM and Related Disciplines How does this affect or enable re-use by Policy, Records Management, Privacy, etc.? What enterprise-level models help create consistency across specialized subjects? ,[object Object]
IM looks at the information that crosses boundaries:
Technical environment (e.g., e-mail > shared drive > collaboration site > report repository)
Subject-matter (e.g., policy > business analysis > customer support > application design)So You Want To Protect Privacy: Now What?
15 IM Process and Context Users Intersection of Information Management Issues and Activities fn.ln@ontario.ca; un/pw e.g., Briefing Note; Report; Approval; Procurement; Agreement; Project Records e.g., E-mail; Shared Drive; Collab sites; Mobile Content Context http://collectionscanada.ca/government/news-events/091/007001-misc06-e-v5.jpg Affects ability to enable and support:  Sharing, Collecting, Reporting, Collaborating, Re-Using, Guiding, Managing Knowledge, Corporate Knowledge Repositories; Managing the Public Record So You Want To Protect Privacy: Now What?
16 Control Models Information Management ,[object Object]
Collection / Creation
Use, Disclosure, Maintenance
Disposition
EvaluationPrivacy Accountability Identifying Purposes Consent Limiting Collection Limiting Use, Disclosure, and Retention Accuracy Safeguards Openness Individual Access Challenging Compliance So You Want To Protect Privacy: Now What?
17 Planning What information do you want? Why do you want that information? Who will be using that information, and to accomplish what? Does everyone understand what you want to do with the information? Have you got the authority to collect, and use the information? Intended Purpose Authorizations to Collect Notice and Consent So You Want To Protect Privacy: Now What?
18 Collection / Creation Have you given proper notice for what you want to collect? Is the notice traceable to the collection and management of the information? Can you demonstrate how collection has been limited? Do you know how you will protect the information? Can you demonstrate how this is consistent with your policies? Who is accountable if the information is lost? Notifications and Consent Limiting Collection Safeguards Openness Accountability So You Want To Protect Privacy: Now What?

Contenu connexe

Tendances

Data protection guide
Data protection guideData protection guide
Data protection guidepetertran
 
Privacy & Data Ethics
Privacy & Data EthicsPrivacy & Data Ethics
Privacy & Data EthicsErik Kokkonen
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologiessidra batool
 
eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...
eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...
eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...Aurélie Pols
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation Data-Set
 
Privacy introduction
Privacy introduction Privacy introduction
Privacy introduction brentcarey
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Actburto111
 
Privacy by design for startups: legal and technology
Privacy by design for startups: legal and technologyPrivacy by design for startups: legal and technology
Privacy by design for startups: legal and technologyIshay Tentser
 
UOP - AET/531 - Legal and Ethical Issue PPT - Final
UOP - AET/531 - Legal and Ethical Issue PPT - Final UOP - AET/531 - Legal and Ethical Issue PPT - Final
UOP - AET/531 - Legal and Ethical Issue PPT - Final nycgarcia
 
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...FLUZO
 
The Right to be forgotten by the Internet-
The Right to be forgotten by the Internet-The Right to be forgotten by the Internet-
The Right to be forgotten by the Internet-Kenneth Muhangi Esq.
 
Data set Legislation
Data set LegislationData set Legislation
Data set LegislationData-Set
 
Data set Legislation
Data set LegislationData set Legislation
Data set LegislationData-Set
 
Data set module 4
Data set   module 4Data set   module 4
Data set module 4Data-Set
 
4. florence dupre new usagesprivacy legal framework fd
4. florence dupre new usagesprivacy legal framework fd4. florence dupre new usagesprivacy legal framework fd
4. florence dupre new usagesprivacy legal framework fdGlobalForum
 
Baker & McKenzie Presentation (E2.0)
Baker & McKenzie Presentation (E2.0)Baker & McKenzie Presentation (E2.0)
Baker & McKenzie Presentation (E2.0)guesta04b0
 
Age Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAge Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAgeFriendlyEconomy
 
Censorship and Privacy
Censorship and Privacy Censorship and Privacy
Censorship and Privacy Daniel Appiah
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533Hubbamar
 

Tendances (20)

Data protection guide
Data protection guideData protection guide
Data protection guide
 
Privacy & Data Ethics
Privacy & Data EthicsPrivacy & Data Ethics
Privacy & Data Ethics
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...
eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...
eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
 
Privacy introduction
Privacy introduction Privacy introduction
Privacy introduction
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
 
Privacy by design for startups: legal and technology
Privacy by design for startups: legal and technologyPrivacy by design for startups: legal and technology
Privacy by design for startups: legal and technology
 
UOP - AET/531 - Legal and Ethical Issue PPT - Final
UOP - AET/531 - Legal and Ethical Issue PPT - Final UOP - AET/531 - Legal and Ethical Issue PPT - Final
UOP - AET/531 - Legal and Ethical Issue PPT - Final
 
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
 
The Right to be forgotten by the Internet-
The Right to be forgotten by the Internet-The Right to be forgotten by the Internet-
The Right to be forgotten by the Internet-
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Data set module 4
Data set   module 4Data set   module 4
Data set module 4
 
4. florence dupre new usagesprivacy legal framework fd
4. florence dupre new usagesprivacy legal framework fd4. florence dupre new usagesprivacy legal framework fd
4. florence dupre new usagesprivacy legal framework fd
 
Baker & McKenzie Presentation (E2.0)
Baker & McKenzie Presentation (E2.0)Baker & McKenzie Presentation (E2.0)
Baker & McKenzie Presentation (E2.0)
 
Age Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAge Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data Use
 
Censorship and Privacy
Censorship and Privacy Censorship and Privacy
Censorship and Privacy
 
Human identity inforg
Human identity   inforgHuman identity   inforg
Human identity inforg
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533
 

En vedette

20130629 If you build it, will they visit [ala lita lightning talk]
20130629 If you build it, will they visit [ala lita lightning talk]20130629 If you build it, will they visit [ala lita lightning talk]
20130629 If you build it, will they visit [ala lita lightning talk]Frederick Zarndt
 
Erlang On Xen @ Kiev Functional Programming event, Aug 3 2013
Erlang On Xen @ Kiev Functional Programming event, Aug 3 2013Erlang On Xen @ Kiev Functional Programming event, Aug 3 2013
Erlang On Xen @ Kiev Functional Programming event, Aug 3 2013Viktor Sovietov
 
Aman kingrubyoo pnew
Aman kingrubyoo pnew Aman kingrubyoo pnew
Aman kingrubyoo pnew ThoughtWorks
 
The Interface Of The Knowing Organization V02 (2009 11 21)Posted
The Interface Of The Knowing Organization V02 (2009 11 21)PostedThe Interface Of The Knowing Organization V02 (2009 11 21)Posted
The Interface Of The Knowing Organization V02 (2009 11 21)PostedStuart Bailey
 

En vedette (7)

20130629 If you build it, will they visit [ala lita lightning talk]
20130629 If you build it, will they visit [ala lita lightning talk]20130629 If you build it, will they visit [ala lita lightning talk]
20130629 If you build it, will they visit [ala lita lightning talk]
 
Erlang On Xen @ Kiev Functional Programming event, Aug 3 2013
Erlang On Xen @ Kiev Functional Programming event, Aug 3 2013Erlang On Xen @ Kiev Functional Programming event, Aug 3 2013
Erlang On Xen @ Kiev Functional Programming event, Aug 3 2013
 
Premium bikes
Premium bikesPremium bikes
Premium bikes
 
Aman kingrubyoo pnew
Aman kingrubyoo pnew Aman kingrubyoo pnew
Aman kingrubyoo pnew
 
The Interface Of The Knowing Organization V02 (2009 11 21)Posted
The Interface Of The Knowing Organization V02 (2009 11 21)PostedThe Interface Of The Knowing Organization V02 (2009 11 21)Posted
The Interface Of The Knowing Organization V02 (2009 11 21)Posted
 
Musician ppt
Musician pptMusician ppt
Musician ppt
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 

Similaire à So You Want to Protect Privacy: Now What?

Anti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyAnti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyPECB
 
Write about Distribution Network Configuration and Inventory Contr.docx
Write about Distribution Network Configuration and Inventory Contr.docxWrite about Distribution Network Configuration and Inventory Contr.docx
Write about Distribution Network Configuration and Inventory Contr.docxericbrooks84875
 
Employee Monitoring DiscussionKindly discuss in 100 words wh
Employee Monitoring DiscussionKindly discuss in 100 words whEmployee Monitoring DiscussionKindly discuss in 100 words wh
Employee Monitoring DiscussionKindly discuss in 100 words whTanaMaeskm
 
2014-09-18 Protection of Personal Information Act readiness workshop
2014-09-18 Protection of Personal Information Act readiness workshop2014-09-18 Protection of Personal Information Act readiness workshop
2014-09-18 Protection of Personal Information Act readiness workshopPaul Jacobson
 
The principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - ukThe principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - uk- Mark - Fullbright
 
Links Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docxLinks Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docxsmile790243
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...
Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...
Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...EUDAT
 
Xiaowan blog post
Xiaowan blog postXiaowan blog post
Xiaowan blog postXiaowan Mao
 

Similaire à So You Want to Protect Privacy: Now What? (10)

Anti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyAnti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacy
 
Write about Distribution Network Configuration and Inventory Contr.docx
Write about Distribution Network Configuration and Inventory Contr.docxWrite about Distribution Network Configuration and Inventory Contr.docx
Write about Distribution Network Configuration and Inventory Contr.docx
 
Review questions
Review questionsReview questions
Review questions
 
Employee Monitoring DiscussionKindly discuss in 100 words wh
Employee Monitoring DiscussionKindly discuss in 100 words whEmployee Monitoring DiscussionKindly discuss in 100 words wh
Employee Monitoring DiscussionKindly discuss in 100 words wh
 
2014-09-18 Protection of Personal Information Act readiness workshop
2014-09-18 Protection of Personal Information Act readiness workshop2014-09-18 Protection of Personal Information Act readiness workshop
2014-09-18 Protection of Personal Information Act readiness workshop
 
The principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - ukThe principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - uk
 
Links Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docxLinks Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docx
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...
Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...
Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...
 
Xiaowan blog post
Xiaowan blog postXiaowan blog post
Xiaowan blog post
 

So You Want to Protect Privacy: Now What?

  • 1. So You Want To Protect Privacy: Now What? ARMA Information Management Symposium June 1, 2011 Stuart Bailey
  • 2. 2 So You Want To Protect Privacy: Now What?
  • 3. 3 Privacy and Social Media “Instantaneous photographs and newspaper enterprise have invaded the sacred precincts of private and domestic life; and numerous mechanical devices threaten to make good the prediction that "what is whispered in the closet shall be proclaimed from the house-tops."“ “The Right to Privacy” Warren and Brandeis, The Right To Privacy, 4 Harvard Law Review 193 (1890) So You Want To Protect Privacy: Now What?
  • 4. 4 Privacy Means… Can be defined in many ways, for example, privacy of: Assault Nuisance Reputation Defamation (Slander, Libel) Property rights (Copyright, intellectual property) Opinions Body Communications Data So You Want To Protect Privacy: Now What?
  • 5. 5 Privacy and Data Protection Data protection legislation is the main lens through which we address privacy interests Documented information about specific individuals Prosser v. Gavison Privacy torts; something unique and distinct As seen recently in Law Times Jones v. Tsige 2011 ONSC 1475 (CanLII) http://www.canlii.org/en/on/onsc/doc/2011/2011onsc1475/2011onsc1475.html So You Want To Protect Privacy: Now What?
  • 6. 6 Social Media and Privacy The Right to Be Let Alone “The Right to Privacy” Warren and Brandeis, The Right To Privacy, 4 Harvard Law Review 193 (1890) Freedom of Expression Private Communications The Right to Be Forgotten As seen recently in the European Union Location data Does it locate a data subject, or is data a location itself (i.e., a site)? Crossing Borders If skin is a border between people, what forms the border between data subjects? So You Want To Protect Privacy: Now What?
  • 7. 7 Prosser on Privacy Intrusion upon the plaintiff’s seclusion or solitude, or into his private affairs; Public disclosure of embarrassing private facts about the plaintiff; Publicity which places the plaintiff in a false light in the public eye;  and Appropriation, for the defendant’s advantage, of the plaintiff’s name or likeness. Privacy, 48 Cal.L.Rev. 383 (1960) So You Want To Protect Privacy: Now What?
  • 8.
  • 9.
  • 10. [53]           Turning back now to the various statutory provisions that govern privacy issues, most Canadian jurisdictions have statutory administrative schemes that govern and regulate privacy issues and disputes. In Ontario, it cannot be said that there is a legal vacuum that permits wrongs to go unrighted - requiring judicial intervention. 
  • 11. [54]           More particularly here, there is no doubt that PIPEDA applies to the banking sector and Ms. Jones had the right to initiate a complaint to the Commissioner under that statute with eventual recourse to the Federal Court. For this reason I do not accept the suggestion that Ms. Jones would be without any remedy for a wrong, if I were to determine that there is no tort for the invasion of privacy.
  • 12. [55]           Notwithstanding the careful reasoning in Somwar and its adoption in Nitsopoulos, I conclude that the decision of the Court of Appeal in Euteneier is binding and dispositive of the question as to whether the tort of invasion of privacy exists at common law.
  • 13. [56]           I would also note that this is not an area of law that requires “judge-made” rights and obligations.  Statutory schemes that govern privacy issues are, for the most part, carefully nuanced and designed to balance practical concerns and needs in an industry-specific fashion.
  • 14. [57]           I conclude that there is no tort of invasion of privacy in Ontario.http://www.canlii.org/en/on/onsc/doc/2011/2011onsc1475/2011onsc1475.html Accessed May 20, 2011 (emphasis added) If there is no tort of invasion of privacy, recoveries for privacy harms must be done through other means – but how will those be acted on? So You Want To Protect Privacy: Now What?
  • 15. 10 A Privacy Proposition If there is no tort for invasion of privacy Privacy harms are appended to other torts And there is still something unique and distinct about privacy that lets us have internal thoughts Privacy rights are based on a concept that cannot be numerated Therefore, protecting privacy rights is a matter of linking shared principles to everyday actions and finding “privacy” through other established activities Data protection and the need to manage information So You Want To Protect Privacy: Now What?
  • 16. 11 Data and Privacy Data are everywhere; some personal, some not – some personal information can be derived from seemingly non-personal information. Personal data can be a location as much as a physical address is. Determining and adhering to “consistent use” can prove to be difficult. So You Want To Protect Privacy: Now What?
  • 17. 12 Information Management Information Management is the discipline of managing information like an asset – the same as we do for money, people, or infrastructure. So You Want To Protect Privacy: Now What?
  • 18. 13 What Is Information Management? http://www.aiim.org/What-is-Information-Management So You Want To Protect Privacy: Now What?
  • 19.
  • 20. IM looks at the information that crosses boundaries:
  • 21. Technical environment (e.g., e-mail > shared drive > collaboration site > report repository)
  • 22. Subject-matter (e.g., policy > business analysis > customer support > application design)So You Want To Protect Privacy: Now What?
  • 23. 15 IM Process and Context Users Intersection of Information Management Issues and Activities fn.ln@ontario.ca; un/pw e.g., Briefing Note; Report; Approval; Procurement; Agreement; Project Records e.g., E-mail; Shared Drive; Collab sites; Mobile Content Context http://collectionscanada.ca/government/news-events/091/007001-misc06-e-v5.jpg Affects ability to enable and support: Sharing, Collecting, Reporting, Collaborating, Re-Using, Guiding, Managing Knowledge, Corporate Knowledge Repositories; Managing the Public Record So You Want To Protect Privacy: Now What?
  • 24.
  • 28. EvaluationPrivacy Accountability Identifying Purposes Consent Limiting Collection Limiting Use, Disclosure, and Retention Accuracy Safeguards Openness Individual Access Challenging Compliance So You Want To Protect Privacy: Now What?
  • 29. 17 Planning What information do you want? Why do you want that information? Who will be using that information, and to accomplish what? Does everyone understand what you want to do with the information? Have you got the authority to collect, and use the information? Intended Purpose Authorizations to Collect Notice and Consent So You Want To Protect Privacy: Now What?
  • 30. 18 Collection / Creation Have you given proper notice for what you want to collect? Is the notice traceable to the collection and management of the information? Can you demonstrate how collection has been limited? Do you know how you will protect the information? Can you demonstrate how this is consistent with your policies? Who is accountable if the information is lost? Notifications and Consent Limiting Collection Safeguards Openness Accountability So You Want To Protect Privacy: Now What?
  • 31. 19 Use, Disclosure, Maintenance How can you demonstrate that you have limited use, disclosure, or retention? How have you applied policies (e.g., retention) against information? Where are the safeguards being applied? By whom? For how long? Against what? What if you use encryption – how will you decrypt if needed? If challenged, can you demonstrate compliance with your own policies? Limiting Use, Disclosure, Retention Accuracy Safeguards Challenging Compliance Individual Access So You Want To Protect Privacy: Now What?
  • 32. 20 Disposition When destroying, can you demonstrate that use was limited? When protecting, can you be sure you’re protecting enough – or not too much? How will you ensure that you are working with the most accurate information? If requested, will you know where to find all relevant information? Limiting Use, Disclosure, and Retention Safeguards Accuracy Individual Access So You Want To Protect Privacy: Now What?
  • 33. 21 Evaluation How can you demonstrate that you have complied with the principles? Once you have made your policies open and accessible, can you show how you are complying with them? How is accountability traceable and demonstrable to outside observers? What is the effect of governance decisions? Challenging Compliance Openness Accountability So You Want To Protect Privacy: Now What?
  • 34. Sparkle Eyes 22 So You Want To Protect Privacy: Now What?
  • 35. 23 Information Management http://www.imdb.com/name/nm0000123/ So You Want To Protect Privacy: Now What?
  • 36. 24 Bio on IMDB.com Job Type Year Ratings Votes TV Series Genre Keyword So You Want To Protect Privacy: Now What?
  • 37. 25 Celebrities’ Private Lives Tombstone data Filmography Thoughts and Opinions Movement Communications Intimacy So You Want To Protect Privacy: Now What?
  • 38. 26 Automated Systems For example, in a SharePoint environment, metadata enables features like rights management, document routing, and disposition. So You Want To Protect Privacy: Now What?
  • 39. 27 Retention Schedules So You Want To Protect Privacy: Now What?
  • 40. 28 Demonstrating Compliance To demonstrate compliance with legislation and policies, specific data about specific individuals must be tracked and managed. In the event of a breach, specific actions about specific points in the organization (e.g., database, program area, etc.) need to be taken in order to respond. So You Want To Protect Privacy: Now What?
  • 41. 29 Conclusion Privacy is an abstract concept Respecting and protecting privacy happens through data protection Data protection requires common, consistent management activities in various contexts Data in context is information Therefore, protecting privacy means managing information So You Want To Protect Privacy: Now What?