Privacy in Privacy in Ubiquitous Systems Ubiquitous Systems Marc Langheinrich ETH Zurich, Switzerland www.inf.ethz.ch/~langhein UEC, January 2002
About the ETH Zurich UEC, January 2002 � Swiss Federal Institute Of Technology (ETH) – Founded 1854 – 330 Professors (40% non-Swiss) – 12.000 Students (Computer Science: ~900) � Department of Computer Science – 23 Professors, ~120 PhD Students – Prof. Em. Niklaus Wirth (Pascal, Modula) � Zurich, Switzerland Introduction – Population: some 350,000 (All of Switzerland: 7.5 Million) – Only 1 hour to the Alps! 3/15/2002 Slide 2
The Distributed Systems Group UEC, January 2002 � Established 1999 – Prof. Friedemann Mattern (TH Darmstadt) – 13 PhD Students � Infrastructure for Ubiquitous Computing – Services Description & Discovery – Communications – Location Introduction – Reliability, Security, Privacy 3/15/2002 Slide 3
Projects & Partners UEC, January 2002 � Swiss National Fund (“Terminodes”) – Infrastructureless communications � European Union (partners from UK, DE, FI, …) – “Smart-Its” (sensor-networks) – “TAPIR” (ubicomp in health sector, appl. pending) � Ladenburger Symposium (Daimler Foundation) – Ubiquitous computing in the social sciences � M-Lab (together with Univ. St.Gallen, MIT) Introduction – Ubiquitous computing in business � “ETH World” – The future campus 3/15/2002 Slide 4
Contents UEC, January 2002 Privacy in Ubiquitous Systems � Privacy primer – Does privacy matter? – Privacy Models � Privacy in ubiquitous systems – What’s so different about it? – Issues to address in ubicomp systems � Privacy-aware infrastructures – A first attempt 3/15/2002 Slide 5
Just a Modern Fad? UEC, January 2002 � “All this secrecy is making life harder, more expensive, dangerous...“ – Peter Cochran, former head of BT Research � “You have zero privacy anyway” – Scott McNealy, CEO Sun Microsystems 1.1 Why Privacy? � “By 2010, privacy will become a meaningless concept in western society” – Gartner Report, 2000 3/15/2002 Slide 6
Privacy – a Human Need? UEC, January 2002 � References in the Bible � Justice of Peace act (England 1361) – Provides for arrest of Peeping Toms and eavesdroppers � Privacy is a human right 1.1 Why Privacy? – Universal declaration of human rights, article 12 (1948) – European convention on human rights, article 8 (1970) 3/15/2002 Slide 7
Do People Care? UEC, January 2002 � Japan’s Ministry of Postal & Telecommunications survey – interviews with 968 adults, 1999 – 70% have interest in privacy protection – 92% fear that personal information is used 1.1 Why Privacy? unknowingly 3/15/2002 Slide 8
What Data is Private? UEC, January 2002 1.1 Why Privacy? Source : Cranor, Reagle, Ackerman „Beyond Concern: Understanding Net Users’ Attitudes About Online Privacy“ 3/15/2002 Slide 9
Regional Differences UEC, January 2002 � IBM-Harris multinational survey – Phone interviews with 1000+ adults in each of three countries: US, UK and Germany (10/1999) – US: • greatest trust in companies, but 1.1 Why Privacy? • most likely to actively protect privacy – Germany: • most comfortable with governmental privacy protection 3/15/2002 Slide 10
Privacy Definitions UEC, January 2002 � “The right to be left alone” – Judge Brandeis, 1890 (“The right to privacy”) � “The desire of people to choose freely under what circumstances and to what 1.1 Why Privacy? extent they will expose themselves, their attitudes, and their behavior to others.” – Alan Westin, 1967 (“Privacy and Freedom”) 3/15/2002 Slide 11
Contents UEC, January 2002 Privacy in Ubiquitous Systems � Privacy primer – Does privacy matter? – Privacy Models � Privacy in ubiquitous systems – What’s so different about it? – Issues to address in ubicomp systems � Privacy-aware infrastructures – A first attempt 3/15/2002 Slide 12
Privacy Models UEC, January 2002 � Self-Regulation – Industry-developed code of practice, overseen by self-elected bodies � Comprehensive Laws – Covers both governmental and private data collection 1.2 Privacy Models � Sectorial Laws – Govern only specific privacy aspects in a single sector (e.g. video rental records) � Privacy Technology – Self-employed (e.g. Anonymizer, Encrpytion, etc) 3/15/2002 Slide 13
Self-Regulation UEC, January 2002 � Voluntary guidelines – Define acceptable base-line protection � Privacy policies – Communicate practices to users 1.2 Privacy Models � Seal programs – Establish trust relationships 3/15/2002 Slide 14
Voluntary Guidelines UEC, January 2002 � Often based on “OECD Fair Information Principles” created in 1981 � Examples – Online Privacy Alliance 1.2 Privacy Models http://www.privacyalliance.org – Direct Marketing Association Privacy Promise http://www.thedma.org/library/privacy/ privacypromise.shtml 3/15/2002 Slide 15
OECD Fair Information Principles UEC, January 2002 � Notice and awareness � Choice and consent � Security safeguards � Data quality and access 1.2 Privacy Models � Accountability � Use limitation � Collection limitation (data minimization) 3/15/2002 Slide 16
Privacy Policies UEC, January 2002 � Policies let consumers know about site’s privacy practices � Consumers can then decide whether or not practices are acceptable, when to 1.2 Privacy Models opt-in or opt-out, and who to do business with � The presence or privacy policies increases consumer trust 3/15/2002 Slide 17
Privacy Policy Drawbacks UEC, January 2002 � BUT policies are often – difficult to understand – hard to find – take a long time to read 1.2 Privacy Models • usually 3-4 pages! – changed without notice 3/15/2002 Slide 18
Seal Programs UEC, January 2002 � TRUSTe – http://www.truste.org � BBBOnline – http://www.bbbonline.org � CPA WebTrust – http://www.cpawebtrust.org/ 1.2 Privacy Models � Japanese Privacy Mark http://www.jipdec.or.jp/security/privacy/ 3/15/2002 Slide 19
Seal Program Problems UEC, January 2002 � Basic Principle: – Publish a policy ( any policy) and follow it � Only few require base-level standard – BBBOnline requires client in good standing 1.2 Privacy Models with Better Business Bureau � Effect: – Good notices of bad practices 3/15/2002 Slide 20
Privacy Models UEC, January 2002 � Self-Regulation – Industry-developed code of practice, overseen by self-elected bodies � Comprehensive Laws – Covers both governmental and private data collection 1.2 Privacy Models � Sectorial Laws – Govern only specific privacy aspects in a single sector (e.g. video rental records) � Privacy Technology – Self-employed (e.g. Anonymizer, Encrpytion, etc) 3/15/2002 Slide 21
Laws and Regulations UEC, January 2002 � Privacy laws and regulations vary widely throughout the world � US has mostly sector-specific laws, with relatively minimal protections – Self-Regulation favored over comprehensive Privacy Laws – Fear that regulation hinders (e-)commerce 1.2 Privacy Models � Europe has long favoured strong privacy laws – First data protection law in the world: State of Hesse, Germany (1970) – Council of Europe Convention on Automatic Procession of Personal Data (1981) – Privacy commissions in each country (some countries have national and state commissions) 3/15/2002 Slide 22
Some US Privacy Laws UEC, January 2002 � Bank Secrecy Act, 1970 � Fair Credit Reporting Act, 1971 � Privacy Act, 1974 � Right to Financial Privacy Act, 1978 � Cable TV Privacy Act, 1984 1.2 Privacy Models � Video Privacy Protection Act, 1988 � Family Educational Right to Privacy Act, 1993 � Electronic Communications Privacy Act, 1994 � Freedom of Information Act, 1966, 1991, 1996 3/15/2002 Slide 23
EU Data Directive UEC, January 2002 � 1995 Data Protection Directive 95/46/EC – Limits data collection – Requires comprehensive disclosures � Member states responsible for passing relevant national laws by 10/1998 1.2 Privacy Models – 12 out of 15 member states have passed legislation, france, ireland, luxemb. are still pending (as of 01/2002) � World-wide impact – Prohibits data export to „unsafe“ countries • Prompted legislative updates worldwide 3/15/2002 Slide 24
Safe Harbor UEC, January 2002 � Membership – US companies self-certify adherance to requirements – Dept. of Commerce maintains signatory list http://www.export.gov/safeharbor/SafeHarborInfo.htm � Signatories must provide – notice notice of data collected, purposes, and recipients – choice choice of opt-out of 3rd-party transfers, opt-in for sensitive data 1.2 Privacy Models – access access rights to delete or edit inaccurate information – security security for storage of collected data – enforc enforcem ement ent mechanisms for individual complaints � Approved July 26, 2000 by EU – reserves right to renegotiate if remedies for EU citizens prove to be inadequate 3/15/2002 Slide 25
Recommend
More recommend