Dr Ian Brown
a personal view
@1br0wn
Data science and privacy regulation
Overview
1. What is regulation?
⬜ Definitions
⬜ Science as a regulator
2. Privacy and consent - problems for the laissez-faire
conception of privacy regulation with “big data”
3. Designing for privacy - will the “data exhaust” be shut
off?
Lessig’s (1996) “Pathetic Dot”
modalities of Internet regulation
Brown and Marsden (2013) “Iceberg”
model of Internet regulation
Regulation is “The sustained and focused attempt to alter the behaviour of others
according to defined standards and purposes with the intention of producing a
broadly identified outcome or outcomes, which may involve mechanisms of
standard-setting, information-gathering and behaviour modification” (Black, 2002)
Do politics have (scientific) artefacts (or irreproducible results)?
“highly persuasive similes are at work: pious stories, seemingly reaped from research,
suggesting certain general theoretical insights. Variously adapted, they are handed
down: in the process, they acquire almost doctrinal unassailability.” (Joerges 1999)
Scientists, and scientific communities, have norms, values,
processes too - paradigms and prejudices (Kuhn and followers -
see Chalmers (2013))
Hence, the need for responsible research and innovation
Science as a regulator
Overview
1. What is regulation?
2. Privacy and consent - problems for the laissez-faire
conception of privacy regulation with “big data”
⬜ Market failures
⬜ Insider threats
⬜ The Digital Panopticon
3. Designing for privacy - will the “data exhaust” be shut
off?
Market failures
Information asymmetry – data gathered ubiquitously and invisibly
in a way few understand
Privacy policies unreadable and difficult to verify/enforce
Most individuals bad at immediate benefit v deferred, uncertain
cost decisions
Privacy risks are highly probabilistic, cumulative, and difficult to calculate
Information industries highly concentrated (DG Competition and
FTC investigations)
Brown (2014)
Insider threats
Information required Price paid to ‘blagger’ Price charged
Occupant search not known £17.50
Telephone reverse trace £40 £75
Friends and Family £60 – £80 not known
Vehicle check at DVLA £70 £150 – £200
Criminal records check not known £500
Locating a named person not known £60
Ex-directory search £40 £65 – £75
Mobile phone account not known £750
Licence check not known £250
“What price privacy?”, Information Commissioner’s Office (2006)
Data science and privacy regulation
Overview
1. What is regulation?
2. Privacy and consent - problems for the
laissez-faire/”buyer beware” conception of privacy
regulation with “big data”
3. Designing for privacy - will the “data exhaust” be shut
off?
Designing for privacy
Data minimisation key: is your personal data
really necessary? Limit & decentralise personal
data collection, storage, access and usage –
enforced using cryptography
Protects against hackers, corrupt insiders, and
function creep
Users should also be notified and consent to
the processing of data – easy-to-use interfaces
are critical. What are defaults? Jedrzejczyk et al. (2010)
EU data ‘exhaust’ concerns
Source: European Commission (2016) Flash Eurobarometer #443 Data Protection in the EU, p.30
Euro constitutional protections
ECHR, 1950
Reaffirming their profound belief in those
fundamental freedoms which are the foundation
of justice and peace in the world…
§8 Everyone has the right to respect for his private
and family life, his home and his correspondence
§9 Everyone has the right to freedom of thought,
conscience and religion
§10 Everyone has the right to freedom of
expression
§11 Everyone has the right to freedom of peaceful
assembly and to freedom of association with
others
EU Charter of Fundamental Rights, 2012
The peoples of Europe, in creating an ever closer
union among them, are resolved to share a
peaceful future based on common values…
§7 Everyone has the right to respect for his or her
private and family life, home and
communications.
§8 1. Everyone has the right to the protection of
personal data concerning him or her.
2. Such data must be processed fairly for
specified purposes and on the basis of the consent
of the person concerned or some other legitimate
basis laid down by law. Everyone has the right of
access to data which has been collected
concerning him or her, and the right to have it
rectified...
Bulk vs. targeted surveillance
President Obama’s NSA Review Panel :
"Although we might be safer if the government had ready access to a massive storehouse of
information about every detail of our lives, the impact of such a program on the quality of life and
on individual freedom would simply be too great… We recommend that the US Government should
examine the feasibility of creating software that would allow the National Security Agency and other
intelligence agencies more easily to conduct targeted information acquisition rather than bulk-data
collection.”
Deputy Prime Minister, 4 Mar 2014 :
“[O]ur current framework assumes that the collection of bulk data is uncontroversial as long as
arrangements for accessing it are suitably stringent. I don’t accept that... [S]trong access controls
are vital to prevent employees from going on ‘fishing expeditions’ once a store of data exists. But the
case for collection itself has to be made, not assumed.”
GDPR Art. 23 DP by design & default
1. …the controller… shall…implement appropriate and proportionate technical and organisational
measures and procedures in such a way that the processing will meet the requirements of this
Regulation and ensure the protection of the rights of the data subject… data protection by
design shall be a prerequisite for public procurement tenders… [and] procurement by entities
operating in the water, energy, transport and postal services sector
2. The controller shall ensure that, by default, only those personal data are processed which are
necessary for each specific purpose of the processing and are especially not collected,
retained or disseminated beyond the minimum necessary for those purposes, both in terms of
the amount of the data and the time of their storage. In particular, those mechanisms shall
ensure that by default personal data are not made accessible to an indefinite number of
individuals and that data subjects are able to control the distribution of their personal data.
See Korff & Brown (2010)
Conclusion
Technology developments can have a significant social impact – societies
can shape/regulate the values Internet technologies embed if they wish
(Brown, Clark & Trossen 2010) - data science equivalents?
There are very significant legal regulatory constraints in Europe on
collection, retention, and use of personal data - can’t be wished away
These are questions not just for computer scientists, but also lawyers,
economists, sociologists – and citizens and their representatives
References
J. Black (2002) Critical Reflections on Regulation.
Australian Journal of Legal Philosophy 27, p.26.
I. Brown (2014) The economics of privacy, data
protection and surveillance. In J.M. Bauer and M.
Latzer (eds.) Research Handbook on the
Economics of the Internet. Cheltenham: Edward
Elgar.
I. Brown, D. Clark and D. Trossen (2010) Should
Specific Values Be Embedded In The Internet
Architecture? Re-Architecting the Internet:
Proceedings of CO-NEXT 2010, New York, NY: ACM
Press.
I. Brown and C. Marsden (2013) Regulating Code:
Good Governance and Better Regulation in the
Information Age. Cambridge, MA: MIT Press.
A. Chalmers (2013) What is this thing called
science? 4th edition. McGraw-Hill Education.
L. Lessig (1996) The New Chicago School. The
Journal of Legal Studies 27(S2) pp.661–691.
L. Jedrzejczyk, B. A. Price, A. K. Bandara and B.
Nuseibeh (2010) On The Impact of Real-Time
Feedback on Users’ Behaviour in Mobile
Location-Sharing Applications, Symposium on
Usable Privacy and Security, Redmond.
D. Korff and I. Brown (2010) New Challenges to
Data Protection. European Commission DG
Freedom, Security and Justice.
A. McDonald and L.F. Cranor (2008) The Cost of
Reading Privacy Policies. I/S 4 p.543.
B. Joerges (1999) Do politics have artefacts? Social
Studies of Science 29(3) pp.411-431.

More Related Content

PPTX
The need for a transparent data supply chain
PPTX
More ways of symbol grounding for knowledge graphs?
PPTX
Machines are people too
PPTX
End-to-End Learning for Answering Structured Queries Directly over Text
PPTX
Minimal viable-datareuse-czi
PDF
Reproducible research: First steps.
PDF
The Fourth Paradigm - Deltares Data Science Day, 31 October 2014
PPTX
Content + Signals: The value of the entire data estate for machine learning
The need for a transparent data supply chain
More ways of symbol grounding for knowledge graphs?
Machines are people too
End-to-End Learning for Answering Structured Queries Directly over Text
Minimal viable-datareuse-czi
Reproducible research: First steps.
The Fourth Paradigm - Deltares Data Science Day, 31 October 2014
Content + Signals: The value of the entire data estate for machine learning

What's hot (20)

PPTX
The Roots: Linked data and the foundations of successful Agriculture Data
PPT
Data Citation in The Dataverse Network
PDF
Knowledge Graph Maintenance
PPTX
Sci Know Mine 2013: What can we learn from topic modeling on 350M academic do...
PPTX
The Research Object Initiative: Frameworks and Use Cases
PDF
A Data Biosphere for Biomedical Research
PPTX
Search, Discovery and Analysis of Sensory Data Streams
PPTX
Internet Search: the past, present and the future
PDF
Crossing the Analytics Chasm and Getting the Models You Developed Deployed
PDF
Some Frameworks for Improving Analytic Operations at Your Company
PPT
Aaas Data Intensive Science And Grid
PDF
Citrination-MRS Fall Meeting 2015
PPT
Semantics for Bioinformatics: What, Why and How of Search, Integration and An...
PPT
Evolution of e-Research
PDF
BIOMAG2018 - Denis Engemann - MNE-HCP
PDF
Open interoperability standards, tools and services at EMBL-EBI
PPTX
Knowledge Graph Semantics/Interoperability
PPTX
SEEKing our way to better presentation of data and models from scientific inv...
PPTX
Tragedy of the (Data) Commons
PPTX
Towards open and reproducible neuroscience in the age of big data
The Roots: Linked data and the foundations of successful Agriculture Data
Data Citation in The Dataverse Network
Knowledge Graph Maintenance
Sci Know Mine 2013: What can we learn from topic modeling on 350M academic do...
The Research Object Initiative: Frameworks and Use Cases
A Data Biosphere for Biomedical Research
Search, Discovery and Analysis of Sensory Data Streams
Internet Search: the past, present and the future
Crossing the Analytics Chasm and Getting the Models You Developed Deployed
Some Frameworks for Improving Analytic Operations at Your Company
Aaas Data Intensive Science And Grid
Citrination-MRS Fall Meeting 2015
Semantics for Bioinformatics: What, Why and How of Search, Integration and An...
Evolution of e-Research
BIOMAG2018 - Denis Engemann - MNE-HCP
Open interoperability standards, tools and services at EMBL-EBI
Knowledge Graph Semantics/Interoperability
SEEKing our way to better presentation of data and models from scientific inv...
Tragedy of the (Data) Commons
Towards open and reproducible neuroscience in the age of big data
Ad

Similar to Data science and privacy regulation (20)

PPTX
Keeping our secrets? Shaping Internet technologies for the public good
PDF
Christopher Millard Legally Compliant Use Of Personal Data In E Social Science
PPTX
Reconciling Humanities and Social Science Research With Data Protection
PPTX
An itinerary for FAIR and privacy respecting data-driven innovation and research
PPTX
Lesson4-Privacy and Data Protection.pptx
PPTX
The death of data protection
PPTX
The death of data protection sans obama
DOCX
Ethics and data protection .docx
PDF
Sovereignty: the state of data
PDF
Third Principle Of The Data Protection Act, 1998 (Uk)
PDF
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
PDF
Privacy Impact Assessment Methodologies for Protection of Personal Data
PDF
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
PDF
Introduction privacy and drones130902.pptx (alleen lezen)
PPT
Updating the EU Data Protection Directive
PDF
Right to be forgotten final paper
PDF
Legal and ethical considerations for sharing research data
PPTX
PLA Legal aspects of Big Data analytics final
PPTX
Paperless Lab Academy 'legal aspects of big data analytics'
PPTX
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
Keeping our secrets? Shaping Internet technologies for the public good
Christopher Millard Legally Compliant Use Of Personal Data In E Social Science
Reconciling Humanities and Social Science Research With Data Protection
An itinerary for FAIR and privacy respecting data-driven innovation and research
Lesson4-Privacy and Data Protection.pptx
The death of data protection
The death of data protection sans obama
Ethics and data protection .docx
Sovereignty: the state of data
Third Principle Of The Data Protection Act, 1998 (Uk)
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
Privacy Impact Assessment Methodologies for Protection of Personal Data
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
Introduction privacy and drones130902.pptx (alleen lezen)
Updating the EU Data Protection Directive
Right to be forgotten final paper
Legal and ethical considerations for sharing research data
PLA Legal aspects of Big Data analytics final
Paperless Lab Academy 'legal aspects of big data analytics'
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
Ad

More from blogzilla (20)

PDF
Interoperability for SNS competition
PPTX
Transatlantic data flows following the Schrems II judgment
PPTX
Lessons for interoperability remedies from UK Open Banking
PPTX
Covid exposure apps in England and Wales
PPTX
Key issues in data protection policy
PPTX
Trusted government access to private sector data
PDF
Interoperability in the Digital Services Act
PPTX
Making effective policy use of academic expertise
PPTX
Introduction to Cybersecurity for Elections
PPTX
Cyber Essentials for Managers
PDF
Privacy and Data Protection in South Africa
PPTX
Human rights and the future of surveillance - Lord Anderson QC
PPTX
Where next for encryption regulation?
PPTX
Where next for the Regulation of Investigatory Powers Act?
PPTX
Regulation and the Internet of Things
PPTX
Global Cyber Security Capacity Centre
PPTX
Privacy post-Snowden
PPT
The Data Retention Directive: recent developments
PPTX
Trust in the Cloud
PPT
Copyright and privacy by design - what lessons have we learned?
Interoperability for SNS competition
Transatlantic data flows following the Schrems II judgment
Lessons for interoperability remedies from UK Open Banking
Covid exposure apps in England and Wales
Key issues in data protection policy
Trusted government access to private sector data
Interoperability in the Digital Services Act
Making effective policy use of academic expertise
Introduction to Cybersecurity for Elections
Cyber Essentials for Managers
Privacy and Data Protection in South Africa
Human rights and the future of surveillance - Lord Anderson QC
Where next for encryption regulation?
Where next for the Regulation of Investigatory Powers Act?
Regulation and the Internet of Things
Global Cyber Security Capacity Centre
Privacy post-Snowden
The Data Retention Directive: recent developments
Trust in the Cloud
Copyright and privacy by design - what lessons have we learned?

Recently uploaded (20)

PDF
Wound infection.pdfWound infection.pdf123
PPTX
Microbes in human welfare class 12 .pptx
PDF
CHAPTER 3 Cell Structures and Their Functions Lecture Outline.pdf
PPTX
Probability.pptx pearl lecture first year
PDF
CHAPTER 2 The Chemical Basis of Life Lecture Outline.pdf
PPT
veterinary parasitology ````````````.ppt
PDF
Worlds Next Door: A Candidate Giant Planet Imaged in the Habitable Zone of ↵ ...
PPTX
POULTRY PRODUCTION AND MANAGEMENTNNN.pptx
PPT
Computional quantum chemistry study .ppt
PPT
Mutation in dna of bacteria and repairss
PDF
Cosmic Outliers: Low-spin Halos Explain the Abundance, Compactness, and Redsh...
PPT
LEC Synthetic Biology and its application.ppt
PDF
Worlds Next Door: A Candidate Giant Planet Imaged in the Habitable Zone of ↵ ...
PPTX
A powerpoint on colorectal cancer with brief background
PPTX
ap-psych-ch-1-introduction-to-psychology-presentation.pptx
PPTX
Hypertension_Training_materials_English_2024[1] (1).pptx
PPTX
SCIENCE 4 Q2W5 PPT.pptx Lesson About Plnts and animals and their habitat
PPT
Presentation of a Romanian Institutee 2.
PPTX
Introcution to Microbes Burton's Biology for the Health
PPTX
TORCH INFECTIONS in pregnancy with toxoplasma
Wound infection.pdfWound infection.pdf123
Microbes in human welfare class 12 .pptx
CHAPTER 3 Cell Structures and Their Functions Lecture Outline.pdf
Probability.pptx pearl lecture first year
CHAPTER 2 The Chemical Basis of Life Lecture Outline.pdf
veterinary parasitology ````````````.ppt
Worlds Next Door: A Candidate Giant Planet Imaged in the Habitable Zone of ↵ ...
POULTRY PRODUCTION AND MANAGEMENTNNN.pptx
Computional quantum chemistry study .ppt
Mutation in dna of bacteria and repairss
Cosmic Outliers: Low-spin Halos Explain the Abundance, Compactness, and Redsh...
LEC Synthetic Biology and its application.ppt
Worlds Next Door: A Candidate Giant Planet Imaged in the Habitable Zone of ↵ ...
A powerpoint on colorectal cancer with brief background
ap-psych-ch-1-introduction-to-psychology-presentation.pptx
Hypertension_Training_materials_English_2024[1] (1).pptx
SCIENCE 4 Q2W5 PPT.pptx Lesson About Plnts and animals and their habitat
Presentation of a Romanian Institutee 2.
Introcution to Microbes Burton's Biology for the Health
TORCH INFECTIONS in pregnancy with toxoplasma

Data science and privacy regulation

  • 1. Dr Ian Brown a personal view @1br0wn Data science and privacy regulation
  • 2. Overview 1. What is regulation? ⬜ Definitions ⬜ Science as a regulator 2. Privacy and consent - problems for the laissez-faire conception of privacy regulation with “big data” 3. Designing for privacy - will the “data exhaust” be shut off?
  • 3. Lessig’s (1996) “Pathetic Dot” modalities of Internet regulation Brown and Marsden (2013) “Iceberg” model of Internet regulation Regulation is “The sustained and focused attempt to alter the behaviour of others according to defined standards and purposes with the intention of producing a broadly identified outcome or outcomes, which may involve mechanisms of standard-setting, information-gathering and behaviour modification” (Black, 2002)
  • 4. Do politics have (scientific) artefacts (or irreproducible results)? “highly persuasive similes are at work: pious stories, seemingly reaped from research, suggesting certain general theoretical insights. Variously adapted, they are handed down: in the process, they acquire almost doctrinal unassailability.” (Joerges 1999) Scientists, and scientific communities, have norms, values, processes too - paradigms and prejudices (Kuhn and followers - see Chalmers (2013)) Hence, the need for responsible research and innovation Science as a regulator
  • 5. Overview 1. What is regulation? 2. Privacy and consent - problems for the laissez-faire conception of privacy regulation with “big data” ⬜ Market failures ⬜ Insider threats ⬜ The Digital Panopticon 3. Designing for privacy - will the “data exhaust” be shut off?
  • 6. Market failures Information asymmetry – data gathered ubiquitously and invisibly in a way few understand Privacy policies unreadable and difficult to verify/enforce Most individuals bad at immediate benefit v deferred, uncertain cost decisions Privacy risks are highly probabilistic, cumulative, and difficult to calculate Information industries highly concentrated (DG Competition and FTC investigations) Brown (2014)
  • 7. Insider threats Information required Price paid to ‘blagger’ Price charged Occupant search not known £17.50 Telephone reverse trace £40 £75 Friends and Family £60 – £80 not known Vehicle check at DVLA £70 £150 – £200 Criminal records check not known £500 Locating a named person not known £60 Ex-directory search £40 £65 – £75 Mobile phone account not known £750 Licence check not known £250 “What price privacy?”, Information Commissioner’s Office (2006)
  • 9. Overview 1. What is regulation? 2. Privacy and consent - problems for the laissez-faire/”buyer beware” conception of privacy regulation with “big data” 3. Designing for privacy - will the “data exhaust” be shut off?
  • 10. Designing for privacy Data minimisation key: is your personal data really necessary? Limit & decentralise personal data collection, storage, access and usage – enforced using cryptography Protects against hackers, corrupt insiders, and function creep Users should also be notified and consent to the processing of data – easy-to-use interfaces are critical. What are defaults? Jedrzejczyk et al. (2010)
  • 11. EU data ‘exhaust’ concerns Source: European Commission (2016) Flash Eurobarometer #443 Data Protection in the EU, p.30
  • 12. Euro constitutional protections ECHR, 1950 Reaffirming their profound belief in those fundamental freedoms which are the foundation of justice and peace in the world… §8 Everyone has the right to respect for his private and family life, his home and his correspondence §9 Everyone has the right to freedom of thought, conscience and religion §10 Everyone has the right to freedom of expression §11 Everyone has the right to freedom of peaceful assembly and to freedom of association with others EU Charter of Fundamental Rights, 2012 The peoples of Europe, in creating an ever closer union among them, are resolved to share a peaceful future based on common values… §7 Everyone has the right to respect for his or her private and family life, home and communications. §8 1. Everyone has the right to the protection of personal data concerning him or her. 2. Such data must be processed fairly for specified purposes and on the basis of the consent of the person concerned or some other legitimate basis laid down by law. Everyone has the right of access to data which has been collected concerning him or her, and the right to have it rectified...
  • 13. Bulk vs. targeted surveillance President Obama’s NSA Review Panel : "Although we might be safer if the government had ready access to a massive storehouse of information about every detail of our lives, the impact of such a program on the quality of life and on individual freedom would simply be too great… We recommend that the US Government should examine the feasibility of creating software that would allow the National Security Agency and other intelligence agencies more easily to conduct targeted information acquisition rather than bulk-data collection.” Deputy Prime Minister, 4 Mar 2014 : “[O]ur current framework assumes that the collection of bulk data is uncontroversial as long as arrangements for accessing it are suitably stringent. I don’t accept that... [S]trong access controls are vital to prevent employees from going on ‘fishing expeditions’ once a store of data exists. But the case for collection itself has to be made, not assumed.”
  • 14. GDPR Art. 23 DP by design & default 1. …the controller… shall…implement appropriate and proportionate technical and organisational measures and procedures in such a way that the processing will meet the requirements of this Regulation and ensure the protection of the rights of the data subject… data protection by design shall be a prerequisite for public procurement tenders… [and] procurement by entities operating in the water, energy, transport and postal services sector 2. The controller shall ensure that, by default, only those personal data are processed which are necessary for each specific purpose of the processing and are especially not collected, retained or disseminated beyond the minimum necessary for those purposes, both in terms of the amount of the data and the time of their storage. In particular, those mechanisms shall ensure that by default personal data are not made accessible to an indefinite number of individuals and that data subjects are able to control the distribution of their personal data. See Korff & Brown (2010)
  • 15. Conclusion Technology developments can have a significant social impact – societies can shape/regulate the values Internet technologies embed if they wish (Brown, Clark & Trossen 2010) - data science equivalents? There are very significant legal regulatory constraints in Europe on collection, retention, and use of personal data - can’t be wished away These are questions not just for computer scientists, but also lawyers, economists, sociologists – and citizens and their representatives
  • 16. References J. Black (2002) Critical Reflections on Regulation. Australian Journal of Legal Philosophy 27, p.26. I. Brown (2014) The economics of privacy, data protection and surveillance. In J.M. Bauer and M. Latzer (eds.) Research Handbook on the Economics of the Internet. Cheltenham: Edward Elgar. I. Brown, D. Clark and D. Trossen (2010) Should Specific Values Be Embedded In The Internet Architecture? Re-Architecting the Internet: Proceedings of CO-NEXT 2010, New York, NY: ACM Press. I. Brown and C. Marsden (2013) Regulating Code: Good Governance and Better Regulation in the Information Age. Cambridge, MA: MIT Press. A. Chalmers (2013) What is this thing called science? 4th edition. McGraw-Hill Education. L. Lessig (1996) The New Chicago School. The Journal of Legal Studies 27(S2) pp.661–691. L. Jedrzejczyk, B. A. Price, A. K. Bandara and B. Nuseibeh (2010) On The Impact of Real-Time Feedback on Users’ Behaviour in Mobile Location-Sharing Applications, Symposium on Usable Privacy and Security, Redmond. D. Korff and I. Brown (2010) New Challenges to Data Protection. European Commission DG Freedom, Security and Justice. A. McDonald and L.F. Cranor (2008) The Cost of Reading Privacy Policies. I/S 4 p.543. B. Joerges (1999) Do politics have artefacts? Social Studies of Science 29(3) pp.411-431.