University of Toronto Basic Privacy: January 24, 2012
University of Toronto Basic Privacy: January 24, 2012
PRIVACY
1. What is it? 2. Why does it matter?
Instantaneous photographs and newspaper enterprise have invaded the sacred precincts of private and domestic life; and numerous mechanical devices threaten to make good the prediction that "what is whispered in the closet shall be proclaimed from the housetops.
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html
Informational self-determination
2. Identifying Purposes
The purposes for which personal information is collected shall be identified by the organization at or before the time the information is collected.
3. Consent
The knowledge and consent of the individual are required for the collection, use or disclosure of personal information, except where inappropriate.
4. Limiting Collection
The collection of personal information shall be limited to that which is necessary for the purposes identified by the organization. Information shall be collected by fair and lawful means.
6. Accuracy
Personal information shall be as accurate, complete and up-to-date as is necessary for the purpose for which it is used.
7. Safeguards
Personal information shall be protected by security safeguards appropriate to the sensitivity of the information.
8. Openness
An organization shall make specific information about its policies and practices relating to the management of personal information readily available to individuals.
9. Individual Access
Upon request, an individual shall be informed of the existence, use, and disclosure of his or her personal information, and shall be given access to that information. An individual shall be able to challenge the accuracy and completeness of the information and have it amended as appropriate.
http://www.csa.ca/standards/privacy/code/Default.asp?articleID=5286&language=english
6.
7.
www.privacybydesign.ca
PRIVACY
1. Why does it matter? People want/need it Its good for business It is a legal requirement
Also true of some other provincial privacy laws and Canadian public sector privacy law http://laws.justice.gc.ca/en/showtdm/cs/P-21
PRIVACY
1. How does it work? Give people notice > reasonable expectations Then stick to notices and legal requirements Use adequate security/practices There are limits to privacy (user control)
U of T NOTICE of COLLECTION
The University of Toronto respects your privacy. Personal information that you provide to the University is collected pursuant to section 2(14) of the University of Toronto Act, 1971. It is collected for the purpose of administering admissions, registration, academic programs, universityrelated student activities, activities of student societies, financial assistance and awards, graduation and university advancement, and for the purpose of statistical reporting to government agencies. At all times it will be protected in accordance with the Freedom of Information and Protection of Privacy Act. If you have questions, please refer to www.utoronto.ca/privacy or contact the University Freedom of Information and Protection of Privacy Coordinator at 416946-7303, McMurrich Building, room 201, 12 Queen's Park Crescent West, Toronto, ON, M5S 1A8.
Destruction
Of personal information
COLLECTION
Three requirements:
Security comprises lock-and-key measures; data integrity, protection, confidentiality and identity authentication
Security supports and is a key enabler for privacy FIPPA General Reg. s. 4 lists security requirements
SECURITY
End-to-end (full lifecycle, all contexts)
Physical Technical / IT systems Administrative / behavioural (incl. policy)
PRIVACY
1. What should I do? Give users clear information
Policy
Practices
PRIVACY LIMITS
Privacy (in data protection laws) is never absolute; some exceptions for: -Law enforcement -Public health -Legal processes (generally supersede statutory privacy protections) subpoenas, summonses, court orders, etc. -Other legislation emergency management, health protection, anti-terrorism etc. data protection laws are made by law-makers, who may discover new priorities, exceptions or other reasons to change or abrogate privacy. The balance is found in the same way as other political/social balances. Public involvement, consultation and advocacy help to guide politicians
WORK REASONABLY
WITHIN LEGAL LIMITS AND IN UNREGULATED ACTIVITIES If you can, do the activity without personal information. Be creativeanonymize, use non-identifying token; eg. IPC HWY 407 solution:
http://www.ipc.on.ca/english/Resources/Discussion-Papers/Discussion-Papers-Summary/?id=335
-Is the personal information NECESSARY If personal information is NECESSARY for an activity; balance privacy interests being compromised against the value of the activity; eg. -public health surveillance threshold: Where between the common cold & SARS?? Beware erroneous (often well-established) misconceptions: -business may want more information than needed for a transaction -law enforcement personnel may look for a lot of data on everybody -a building manager may want access to video surveillance records.. How do you decide what is rightwhat is enough?
Remember risks of having PI breaches, data loss, ID theft, etc. Consider impact on your client/employer of a breach or misuse of data;
For example, IPC/MTO arrangement re access to driver and vehicle license databases http://www.ipc.on.ca/images/Resources/up-1num_25.pdf
ABOUT SECURITY
Most security measures cant guarantee confidentiality They make unauthorized access difficult so information is less likely to be accessed. Well chosen and applied security reduces the probability unauthorized access as much as circumstances and resources permit.
Roger Clarke Cloud Computing paper: Cloud computing emerged during 2006-09 as a fashion item.
http://www.rogerclarke.com/EC/CCEF.html
Your IT / security staff should know your systems, existing and planned
Data flows should be understood and finely mapped This activity is key to privacy or threat/risk assessments
Even if you are outsourcing, do this detailed work for any in house components or parts of the system/service
SECURING ASSURANCES
A negotiation with your vendor, involving: Procurement
IT/CIO staff
Legal Privacy Other experts as required.
ORGANIZATIONAL SUGGESTIONS
Keep it simple!!
Use simple binary rules; -Confidential or not -Secured or not
Provide clear guidance/rules --- avoid fuzzy lines, difficult distinctions If its not officially designated as public, its confidential If its electronic, keep it in a secure institutional server or keep it encrypted If its hard copy, keep in a locked cabinet inside a locked, non-public space Provosts security guideline
http://www.provost.utoronto.ca/policy/FIPPA_-_Guideline_Regarding_Security_for_Personal_and_Other_Confidential_Information.htm
ORGANIZATIONAL SUGGESTIONS
Know the Organization:
Mission, purposes, rules
How is it governed?
How is it administered? Think like an executive.big picture Avoid becoming a narrow expert