Top Banner
Privacy Privacy Looking Ahead… Looking Ahead… ____________________________________________ ____________________________________________ J. Trevor Hughes J. Trevor Hughes Executive Director Executive Director International Association of Privacy Professionals International Association of Privacy Professionals
49
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Presentation Material (Powerpoint)

PrivacyPrivacyLooking Ahead…Looking Ahead…

________________________________________________________________________________________J. Trevor HughesJ. Trevor Hughes

Executive DirectorExecutive DirectorInternational Association of Privacy ProfessionalsInternational Association of Privacy Professionals

Page 2: Presentation Material (Powerpoint)

Emerging Privacy IssuesEmerging Privacy Issues

Show me the harm:Show me the harm: ID TheftID Theft SSNs SSNs SpamSpam TelemarketingTelemarketing FCRAFCRA

SecuritySecurity The Ugly StepchildThe Ugly Stepchild

A Look AheadA Look Ahead Emerging TechnologyEmerging Technology BiometricsBiometrics Data FluidityData Fluidity Data AggregationData Aggregation

Page 3: Presentation Material (Powerpoint)

The Privacy StrataThe Privacy Strata

Technology Standards

Self-Regulatory Standards

US Government

FCRA GLBA HIPPA

The States (Legislatures, DOIs and AGs)

The Rest of the

World

The Rest of the

World

Page 4: Presentation Material (Powerpoint)

Show me the harm...Show me the harm...

Marketing Telemarketing SPAM Identity Theft

Harm to Public

Page 5: Presentation Material (Powerpoint)

Identity TheftIdentity Theft

FTC Complaints:FTC Complaints: 2000: 31,0002000: 31,000 2001: 86,0002001: 86,000 2002: 162,0002002: 162,000 Top consumer fraud Top consumer fraud

complaint in 2002complaint in 2002 30% growth predicted 30% growth predicted

going forwardgoing forward Estimated 9.9 million Estimated 9.9 million

victims in 2002victims in 2002

Average impact:Average impact: $1500$1500 175 hours of clean up175 hours of clean up credit disruptionscredit disruptions

Cost to consumers = $5 Cost to consumers = $5 billionbillion

Cost to industry = $48 Cost to industry = $48 billionbillion

42% of complaints 42% of complaints involve credit card fraudinvolve credit card fraud

Identity theft coverage now availableIdentity theft coverage now available

Page 6: Presentation Material (Powerpoint)

Social Security NumbersSocial Security Numbers

California:California: Correspondence to residential addresses cannot Correspondence to residential addresses cannot

include a SSNinclude a SSN (Simitian bill) employers cannot use SSN for purposes (Simitian bill) employers cannot use SSN for purposes

other than taxesother than taxes

Feds:Feds: Proposals to limit use as college IDProposals to limit use as college ID

Looking ahead:Looking ahead: Restrictions on the use of SSNs as internal identifiersRestrictions on the use of SSNs as internal identifiers

May be used for verification of identity, accessing medical May be used for verification of identity, accessing medical files and credit reportsfiles and credit reportsMay not be used as an account numberMay not be used as an account number

Page 7: Presentation Material (Powerpoint)

SPAMSPAM

Hotmail – 80% unsolicited Hotmail – 80% unsolicited bulk emailbulk emailMSN and AOLMSN and AOL

2.5 BILLION blocked per 2.5 BILLION blocked per day EACHday EACH

55% of all email today55% of all email todayWork productivity/liability Work productivity/liability concernsconcernsDeliverability concernsDeliverability concernsChannel viability Channel viability concerns (the “900” concerns (the “900” phenomenon)phenomenon)

Page 8: Presentation Material (Powerpoint)

What is SPAM?What is SPAM?

Page 9: Presentation Material (Powerpoint)

Spam is in the eye of the Spam is in the eye of the beholder…beholder…

FTC Study: 66% of spam in the “fridge” is FTC Study: 66% of spam in the “fridge” is false or misleadingfalse or misleading

Brightmail: 90% of spam in their spam Brightmail: 90% of spam in their spam traps is untraceabletraps is untraceable

At a minimum: At a minimum: SPAM IS DECEPTIVESPAM IS DECEPTIVE

Page 10: Presentation Material (Powerpoint)

Killing the Killer App?Killing the Killer App?

Legal Responses:Legal Responses: 35 states with anti-35 states with anti-

spam legislationspam legislation Can Spam Act in Can Spam Act in

SenateSenate Commerce/Judiciary Commerce/Judiciary

efforts in Houseefforts in House EU opt-in EU opt-in

requirementsrequirements

Tech ResponsesTech Responses BlacklistsBlacklists Filtering by ISPsFiltering by ISPs Solution providersSolution providers

HabeusHabeus

Trusted SenderTrusted Sender

IronPortIronPort

BrightmailBrightmail

Aggressive filtering results in “false positives”(legitimate email being blocked)

Page 11: Presentation Material (Powerpoint)
Page 12: Presentation Material (Powerpoint)

FiltersFilters

Page 13: Presentation Material (Powerpoint)

The Value of EmailThe Value of Email

Spam

Value to R

ecipient PermissionAcquisition

PermissionRetention

Relational Messages:Transactional, personal, paid service,

permission-based non-marketing

Page 14: Presentation Material (Powerpoint)

ISPs and False PositivesISPs and False Positives

NetZ

ero 27%

Yahoo 22%

AO

L 18%

Com

puserve 14%

Hotm

ail 8%

Mall.com

MS

N

US

A.net

Earthlink

BellS

outh

Average Non-Delivery for Top ISPs: 17%

Assurance Systems, Feb. 2003

Page 15: Presentation Material (Powerpoint)

Employee PrivacyEmployee Privacy

Blurring of work/home Blurring of work/home boundariesboundaries30% of 2002 ecommerce 30% of 2002 ecommerce sales generated from the sales generated from the workplaceworkplaceExtensive use of Extensive use of company email for company email for personal usepersonal useIssue: employer Issue: employer monitoring?monitoring?European v. US European v. US approachesapproaches

Page 16: Presentation Material (Powerpoint)

TelemarketingTelemarketing

The “must have” The “must have” legislation for every legislation for every up-and-coming AGup-and-coming AG

FTC’s gift to FTC’s gift to consumers: a national consumers: a national do not call registry (44 do not call registry (44 million registrants)million registrants)

Telemarketing will Telemarketing will diminish as a sales diminish as a sales vehiclevehicle

Page 17: Presentation Material (Powerpoint)

Fair Credit Reporting ActFair Credit Reporting Act

Reauthorization in 2003Reauthorization in 2003

Big issues:Big issues: Expand consumer privacy protections?Expand consumer privacy protections? Sunset state preemption?Sunset state preemption?

NAAG says “YES!”NAAG says “YES!”

Business community says “please, no!”Business community says “please, no!” Expanded identity theft provisionsExpanded identity theft provisions

For insurers: beware of scope creep in FCRA For insurers: beware of scope creep in FCRA reauthorization (Sen. Shelby – GLBA did not go reauthorization (Sen. Shelby – GLBA did not go far enough; wants opt in for third party transfers)far enough; wants opt in for third party transfers)

Page 18: Presentation Material (Powerpoint)

Layered Privacy NoticesLayered Privacy Notices

Page 19: Presentation Material (Powerpoint)
Page 20: Presentation Material (Powerpoint)
Page 21: Presentation Material (Powerpoint)
Page 22: Presentation Material (Powerpoint)

SecuritySecurity

The Ugly Stepchild of PrivacyThe Ugly Stepchild of Privacy

Page 23: Presentation Material (Powerpoint)
Page 24: Presentation Material (Powerpoint)
Page 25: Presentation Material (Powerpoint)
Page 26: Presentation Material (Powerpoint)
Page 27: Presentation Material (Powerpoint)

SecuritySecurity

Security AuditSecurity Audit Quickest, easiest way to get a snapshot of your security Quickest, easiest way to get a snapshot of your security

issuesissues

Develop a “Security Portfolio”Develop a “Security Portfolio” Internet/Acceptable use policiesInternet/Acceptable use policies E-mail policiesE-mail policies Remote access policiesRemote access policies Special access policiesSpecial access policies Data protection policiesData protection policies Firewall management policiesFirewall management policies Cost sensitive, appropriate architectureCost sensitive, appropriate architecture

Reassess, Audit, ReviseReassess, Audit, Revise

DefenseIn

Depth!

Page 28: Presentation Material (Powerpoint)

SecuritySecurity

Protect Internally and Protect Internally and ExternallyExternally IIS Survey (2000) – IIS Survey (2000) –

68% of attacks are 68% of attacks are internalinternal

Protect Network AND Protect Network AND DataData Data is usually the Data is usually the

target of an attack, not target of an attack, not the “network”the “network”

Page 29: Presentation Material (Powerpoint)
Page 30: Presentation Material (Powerpoint)
Page 31: Presentation Material (Powerpoint)

Security – What to do?Security – What to do?

Standards Emerge!Standards Emerge! Data encryption to the Data encryption to the

column levelcolumn level Role-based access Role-based access

control to the row levelcontrol to the row level Role-based access for Role-based access for

DBAsDBAs Transaction Transaction

auditabilityauditability

Pay now, or Pay Pay now, or Pay Later!Later!

Page 32: Presentation Material (Powerpoint)

A look ahead...A look ahead...

Page 33: Presentation Material (Powerpoint)

Emerging Privacy IssuesEmerging Privacy Issues

Data FluidityData FluidityData AggregationData Aggregation

PersonalizationPersonalizationBiometricsBiometricsPersistent Persistent SurveillanceSurveillanceRFIDsRFIDsGeo PrivacyGeo Privacy

Page 34: Presentation Material (Powerpoint)

Data Friction and FluidityData Friction and Fluidity

FRICTION FLUIDITY

Stone Tablets

Paper

Printing Press

Digital Data

Data Velocity

Page 35: Presentation Material (Powerpoint)

Data AggregationData AggregationData Silos Aggregation

Core Data

Inferred Data

Meta Data

Derivative Data

Personalization and Velocity

Page 36: Presentation Material (Powerpoint)

““Hello, John Anderton”Hello, John Anderton”

Page 37: Presentation Material (Powerpoint)

PersonalizationPersonalization

As data becomes more As data becomes more fluid, personal targeting fluid, personal targeting becomes possiblebecomes possible

Privacy issues prevailPrivacy issues prevail

The rise of GUIDsThe rise of GUIDs Never entering your name, Never entering your name,

password, address and password, address and credit card againcredit card again

Do we really want this?Do we really want this?

Page 38: Presentation Material (Powerpoint)
Page 39: Presentation Material (Powerpoint)
Page 40: Presentation Material (Powerpoint)

Biometrics EverywhereBiometrics Everywhere

Biometric AttestationsBiometric Attestations Faceprints, eyeprints, Faceprints, eyeprints,

fingerprints, hand fingerprints, hand geometry, voice geometry, voice recognition, vein recognition, vein patterns, gait patterns, gait recognition, odor...recognition, odor...

Page 41: Presentation Material (Powerpoint)

Face RecognitionFace Recognition

2001 Superbowl2001 Superbowl

AirportsAirports

Urban hot spotsUrban hot spots

Business campusBusiness campus

Page 42: Presentation Material (Powerpoint)

Iris/Fingerprint RecognitionIris/Fingerprint Recognition

Airports (Vancouver Airports (Vancouver and Toronto)and Toronto)

SignaturesSignatures

High security High security buildingsbuildings

Page 43: Presentation Material (Powerpoint)

Persistent Persistent SurveillanceSurveillance

““He’s been idented on He’s been idented on the Metro...”the Metro...”

Page 44: Presentation Material (Powerpoint)
Page 45: Presentation Material (Powerpoint)

RFIDsRFIDs

Page 46: Presentation Material (Powerpoint)

RFIDsRFIDs

Page 47: Presentation Material (Powerpoint)

Geo PrivacyGeo Privacy

e911e911

Geo Targeted Geo Targeted Wireless ServicesWireless Services ““Smell that coffee? Smell that coffee?

Come in for a cup!”Come in for a cup!”

Page 48: Presentation Material (Powerpoint)

Lessons to be LearnedLessons to be Learned

Data Becomes Much Data Becomes Much More FluidMore FluidData Management Data Management Becomes Much More Becomes Much More DifficultDifficultData Moves More QuicklyData Moves More QuicklySmart Companies will Smart Companies will Harness the Power of Harness the Power of Data Fluidity to Reduce Data Fluidity to Reduce Costs and Improve Their Costs and Improve Their Value Propositions Value Propositions

Page 49: Presentation Material (Powerpoint)

THANKS!THANKS!

J. Trevor HughesJ. Trevor Hughes

[email protected]@privacyassociation.org

207 351 1500207 351 1500