living in a world of data exploitation - cpdp 2017

12
LIVING IN A WORLD OF DATA EXPLOITATION CPDP 2017 Frederike Kaltheuner | @fre8de8rike Policy Officer, Privacy International

Upload: frederike-kaltheuner

Post on 15-Feb-2017

291 views

Category:

Data & Analytics


4 download

TRANSCRIPT

Page 1: Living In a World of Data Exploitation - CPDP 2017

LIVING IN A WORLD OF DATA EXPLOITATION

CPDP 2017Frederike Kaltheuner | @fre8de8rikePolicy Officer, Privacy International

Page 2: Living In a World of Data Exploitation - CPDP 2017

More data, intelligent machines, new paradigm?Challenges to data protection:1. Informed consent2. Blurring line between sensitive,

personal, non-personal and publicly accessible data

3. Inherent opacity of intelligent systems

Page 3: Living In a World of Data Exploitation - CPDP 2017

The Internet of sensors

microphone

Wi-Fi

Bluetooth

3-axis load cells

accelerometer

gyroscope

conductivity sensors

Page 4: Living In a World of Data Exploitation - CPDP 2017

DATA EXPLOITATION:

generation

collection

processing

sharing supporting technologies:

AIIoT

Big DataCloud

Computing

Page 5: Living In a World of Data Exploitation - CPDP 2017

How to protect individuals (and groups):

devices networks

applications

aggregate

minimise excessive data generation and collection

Page 6: Living In a World of Data Exploitation - CPDP 2017

DEVICESDATA

GENERATION

DATACOLLECTION

= we have to blindly trust companies not to do this excessively

example: The Guardian is instructed by GCHQ to destroy hardware

Page 7: Living In a World of Data Exploitation - CPDP 2017

APPLICATION – emotion detectionNON-PERSONAL

HIGHLY SENSITIVE DATA

PERSONAL ANDHIGHLY SENSITIVE

DATA(that may be inaccurate)

= we have to blindly trustcompanies not to identifyindividuals

Page 8: Living In a World of Data Exploitation - CPDP 2017

AGGREGATE - SOCMINTPERSONAL

NON-SENSITIVEPUBLICLY

ACCESSIBLEDATA

PERSONALHIGHLY SENSITIVE

PROPRIETARYINFORMATION(that may be inaccurate)= we have to blindly trust that

companies (and government) to not exploit/misuse this

intelligence

example: Walmart using social media to gather intelligence about union

Page 9: Living In a World of Data Exploitation - CPDP 2017

GOVERNANCE AND ETHICS OF AI NEEDS TO ADDRESS PRIVACY!

[“automatic processing” is both too broad and too narrow]

Page 10: Living In a World of Data Exploitation - CPDP 2017

LITMUS TEST:A changing political climate

SENSITIVE INFORMATION ALL OVER THE PLACE

VULNERABLECONNECTED DEVICES AND NETWORKS

OPAQUE DECISIONS& DISPARATE

OUTCOMES BY INTELLIGENT

SYSTEMS

example: STASI-style network analysis

Page 11: Living In a World of Data Exploitation - CPDP 2017

How to protect individuals (and groups)Problem: imbalance of power & informational asymmetry

1. Individuals must regain control over their data!

2. Data minimisation – generation and collection!3. Rights violations are not risks that can be

assessed in a cost/benefit analysis!

Page 12: Living In a World of Data Exploitation - CPDP 2017

Frederike KaltheunerPolicy Officer@[email protected]