Personal Privacy in Ubiquitous Computing Tools and System Support. Marc Langheinrich
|
|
- Derrick Manning
- 5 years ago
- Views:
Transcription
1 Personal Privacy in Ubiquitous Computing Tools and System Support Marc Langheinrich
2 Ubiquitous Computing and Privacy Disappearing Computer Troubadour Project (10/02-05/03) Other People s Problem For [my colleague] it is more appropriate to think about privacy issues. It s not really the case in my case Privacy is Primarily a Security Problem All you need is really good firewalls It is All About Self-Regulation It's maybe about letting them find their own ways of cheating Incompatible with Ubiquitous Computing I think you can't think of privacy... it's impossible, because if I do it, I have troubles with finding [a] Ubicomp future November 3, 2005 Personal Privacy in Ubiquitous Computing 2
3 Ubiquitous Excuses? Computing and Privacy Disappearing Computer Troubadour Project (10/02-05/03) Other People s Problem For [my colleague] it is more appropriate to think about privacy issues. It s not really the case in my case Privacy is Primarily a Security Problem All you need is really good firewalls It is All About Self-Regulation It's maybe about letting them find their own ways of cheating Incompatible with Ubiquitous Computing I think you can't think of privacy... it's impossible, because if I do it, I have troubles with finding [a] Ubicomp future November 3, 2005 Personal Privacy in Ubiquitous Computing 3
4 The Vision of Ubiquitous Computing The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it. Mark Weiser ( ), XEROX PARC Basic Motivation of Ubiquitous Computing The computer as a tool for the everyday Things are aware of each other and the environment Integrating computers with intuitive user interfaces November 3, 2005 Personal Privacy in Ubiquitous Computing 4
5 Smart Toaster Gets weather forecast from the Internet Can remind you of important dates (from your electronic agenda) Quelle: November 3, 2005 Personal Privacy in Ubiquitous Computing 5
6 Instead of World inside the Computer... Not like this! World inside Computer would be Virtual Reality November 3, 2005 Personal Privacy in Ubiquitous Computing 6
7 Computer in the World! November 3, 2005 Personal Privacy in Ubiquitous Computing 7
8 Ubicomp Drivers (Technologies) Miniaturization Integration into everyday things New Materials Novel input/output capabilities Wireless Communication Simplifies communication Facilitates cooperation and coordination Sensors Smartness through context-awareness November 3, 2005 Personal Privacy in Ubiquitous Computing 8
9 Ubicomp Drivers (Society Trends) Higher Efficiency Lean production (Overproduction, Out-of-Stock) Targeted Sales (1-1 Marketing) More Convenience Finding your way (e.g., travel assistants) Lower TCO ( total cost of ownership ) w/ pay-per-use Increased Safety Homeland security (terrorism, drug trafficking, etc.) Petty crimes & negligence (e.g., traffic accidents, theft) November 3, 2005 Personal Privacy in Ubiquitous Computing 9
10 Example: Health Industry as Driving Factor for Ubiquitous Computing Higher Efficiency Localization system for medical personnel facilitates highly dynamic scheduling More Convenience Senior citizens can live independently with the help of a Smart Environment Increased Safety Electronically tagged blood packs and smart emergency room lower chances of mistakes November 3, 2005 Personal Privacy in Ubiquitous Computing 10
11 Today s Topics Analysis What is Privacy? How does Ubiquitous Computing affect it? Privacy Infrastructure (PawS) Privacy Beacons Privacy Proxies Privacy-Aware Database Real-World Example Privacy and RFID November 3, 2005 Personal Privacy in Ubiquitous Computing 11
12 Ubicomp Privacy Implications Data Collection Scale (everywhere, anytime) Manner (inconspicuous, invisible) Motivation (context!) Data Types Observational instead of factual data Data Access The Internet of Things November 3, 2005 Personal Privacy in Ubiquitous Computing 12
13 Ubicomp Privacy Implications Privacy is is not just other people s problem Privacy is is a core issue in in Ubicomp environments Data Collection Scale (everywhere, anytime) Manner (inconspicuous, invisible) Motivation (context!) Data Types Observational instead of factual data Data Access The Internet of Things November 3, 2005 Personal Privacy in Ubiquitous Computing 13
14 Why Privacy? Reasons for Privacy Free from Nuisance Louis D. Brandeis, The right to be let alone (1890) November 3, 2005 Personal Privacy in Ubiquitous Computing 14
15 Why Privacy? Reasons for Privacy Free from Nuisance Intimacy Erving M. Goffman, The Presentation of Self in Everyday Life (1959) November 3, 2005 Personal Privacy in Ubiquitous Computing 15
16 Why Privacy? Reasons for Privacy Free from Nuisance Intimacy Free to Decide for Oneself Beate Rössler Protecting the decisional autonomy in one s life (2001) November 3, 2005 Personal Privacy in Ubiquitous Computing 16
17 Why Privacy? Reasons for Privacy Free from Nuisance Intimacy Free to Decide for Oneself By Another Name... Data Protection Informational Self-Determination November 3, 2005 Personal Privacy in Ubiquitous Computing 17
18 Why Privacy? Privacy isn t just about keeping secrets data exchange and transparency are key issues! Reasons for Privacy Free from Nuisance Intimacy Free to Decide for Oneself By Another Name... Data Protection Informational Self-Determination November 3, 2005 Personal Privacy in Ubiquitous Computing 18
19 Solution Space Technology Social Norms & Habits Laws & Regulations November 3, 2005 Personal Privacy in Ubiquitous Computing 19
20 Fair Information Principles (FIP) Drawn up by the OECD, 1980 Organisation for economic cooperation and development Voluntary guidelines for member states Goal: ease transborder flow of goods (and information) Five Principles (simplified) 1. Openness 2. Data access and control 4. Collection Limitation 5. Data subject s consent 3. Data security Core principles of most modern privacy laws Implication: Technical solutions must support FIP November 3, 2005 Personal Privacy in Ubiquitous Computing 20
21 Fair Information Principles (FIP) Privacy is isnot just about self-regulation legal and social frameworks exist! Drawn up by the OECD, 1980 Organisation for economic cooperation and development Voluntary guidelines for member states Goal: ease transborder flow of goods (and information) Five Principles (simplified) 1. Openness 2. Data access and control 3. Data security 4. Collection Limitation 5. Data subject s consent Core principles of most modern privacy laws Implication: Technical solutions must support FIP November 3, 2005 Personal Privacy in Ubiquitous Computing 21
22 Technical Solution: P3P Platform for Privacy Preferences Project (W3C) Machine-readable data collection practices (Policy) Who collects and/or processes the data? What information is collected? For what purpose is this data collected? Basis-Dataschema Example: user.home.postal.street Web-Protocol For exchanging policies between server und browser Lorrie Cranor, Marc Langheinrich, Massimo Marchiori, Joseph Reagle: The Platform for Privacy Preferences 1.0 (P3P1.0) Specification. W3C Recommendation, April 16, November 3, 2005 Personal Privacy in Ubiquitous Computing 22
23 Technical Solution: P3P <POLICY xmlns=" entity= TheCoolCatalog, 123 Main Street, Seattle, WA 98103, USA"> <DISPUTES-GROUP> Platform <DISPUTES service=" for Privacy Preferences Project (W3C) resolution-type="independent" description="privacyseal, a third-party seal provider" image=" </DISPUTES-GROUP> Machine-readable data collection practices (Policy) <DISCLOSURE discuri=" access="none"/> <STATEMENT> <CONSEQUENCE-GROUP> <CONSEQUENCE>a Who collects site with clothes and/or you would processes appreciate</consequence> the data? </CONSEQUENCE-GROUP> <RECIPIENT><ours/></RECIPIENT> <RETENTION><indefinitely/></RETENTION> <PURPOSE><custom/><develop/></PURPOSE> <DATA-GROUP> What information is collected? <DATA For name="dynamic.cookies" what purpose category="state"/> is this data collected? <DATA name="user.gender"/> Basis-Dataschema <DATA name="dynamic.miscdata" category="preference"/> <DATA name="user.home." optional="yes"/> </DATA-GROUP> </STATEMENT> <STATEMENT> Example: user.home.postal.street <RECIPIENT><ours/></RECIPIENT> <PURPOSE><admin/><develop/></PURPOSE> <RETENTION><indefinitely/></RETENTION> Web-Protocol <DATA-GROUP> <DATA name="dynamic.clickstream.server"/> <DATA For name="dynamic.http.useragent"/> exchanging policies between server und browser </DATA-GROUP> </STATEMENT> </POLICY> Lorrie Cranor, Marc Langheinrich, Massimo Marchiori, Joseph Reagle: The Platform for Privacy Preferences 1.0 (P3P1.0) Specification. W3C Recommendation, April 16, November 3, 2005 Personal Privacy in Ubiquitous Computing 23
24 PawS A Privacy Awareness System Privacy Proxies Privacy Policy Accept / Decline Privacy Beacons Privacy DB November 3, 2005 Personal Privacy in Ubiquitous Computing 24
25 1. Privacy Beacons Announce (Unobtrusive) Data Collections Protocol Beacons integrated into communications protocol Stand-alone Beacons for video, audio, sensory data Detected by mobile Privacy Assistant (e.g., wristwatch) Describes Current/Potential Data Collection Format: machine-readable privacy policy ( P3P++ ) Extending it for Ubicomp-specific elements (e.g., sensor data) PA (Privacy Assistant) P3P policy Privacy Beacon November 3, 2005 Personal Privacy in Ubiquitous Computing 25
26 1. Privacy Beacons Announce (Unobtrusive) Data Collections Protocol Beacons integrated into communications protocol Stand-alone Beacons for video, audio, sensory data Detected by mobile Privacy Assistant (e.g., wristwatch) Describes Current/Potential Data Collection Format: machine-readable privacy policy ( P3P++ ) Privacy-Assistant Prototype Privacy-Beacon Prototype (IRREAL) Extending it for Ubicomp-specific elements (e.g., sensor data) PA (Privacy Assistant) P3P policy Privacy Beacon November 3, 2005 Personal Privacy in Ubiquitous Computing 26
27 2. Privacy Proxies Service Proxy Solicitates Consent (if Needed) User proxy compares user preferences with privacy policy of service provider Central Access Point for Data Management Supports updating and deleting data and contracts User Privacy Proxy Service Privacy Proxy Accept / Decline Privacy Policy Database Internet November 3, 2005 Personal Privacy in Ubiquitous Computing 27
28 2. Privacy Proxies Example of a user-initiated deletion request Service Proxy Solicitates Consent (if Needed) <DELETE> <DELETE> <DATA-GROUP> <DATA-GROUP> <DATA <DATA ref="#user.home-info.online. "/> ref="#user.home-info.online. "/> <DATA <DATA ref="#user.home-info.telecom.mobile"/> ref="#user.home-info.telecom.mobile"/>... User proxy compares user preferences with privacy policy of service provider... </DATA-GROUP> </DATA-GROUP> Central Access Point for Data Management </DELETE> </DELETE> Supports updating and deleting data and contracts User Privacy Proxy Service Privacy Proxy Accept / Decline Privacy Policy Database Internet November 3, 2005 Personal Privacy in Ubiquitous Computing 28
29 2. Privacy Proxies <QUERY> <QUERY> <DATA-GROUP> Example of a user-initiated deletion request Example of a service-initiated data update request <DATA-GROUP> Service <DATA <DATA Proxy ref="#user.location.submitted.symbolic.city"/> ref="#user.location.submitted.symbolic.city"/> Solicitates Consent (if Needed) <DELETE> <DELETE> <DATA <DATA-GROUP> <DATA ref="#user.location.submitted.symbolic.street"/> ref="#user.location.submitted.symbolic.street"/> <DATA-GROUP> </DATA-GROUP> <DATA User </DATA-GROUP> proxy compares user preferences with privacy <DATA ref="#user.home-info.online. "/> <INFO ref="#user.home-info.online. "/> <DATA <INFO discuri=" <DATA policy ref="#user.home-info.telecom.mobile"/> discuri=" We ref="#user.home-info.telecom.mobile"/> of service provider... We need need your your current current location location in order order to to provide provide you you with with... </DATA-GROUP> </DATA-GROUP> updated updated information information as as part part of of your your WHERE_AM_I(tm)-subscription. WHERE_AM_I(tm)-subscription. Central </INFO> Access Point for Data Management </DELETE> </INFO> </DELETE> </QUERY> </QUERY> Supports updating and deleting data and contracts User Privacy Proxy Service Privacy Proxy Accept / Decline Privacy Policy Database Internet November 3, 2005 Personal Privacy in Ubiquitous Computing 29
30 3. Privacy-Aware Database All Data is Stored Together With Privacy (P3P) Policy Data and policy (Metadata) form logical unit Each Data Access Needs Usage Policy Database compares allowed/announced and proposed usage Data with non-matching allowed usage is held back Each data access (who, why) is recorded (auditing) <last name> <first name> <birthdate> <address> Personal Data Usage Policy Individual Privacy Policy November 3, 2005 Personal Privacy in Ubiquitous Computing 30
31 3. Privacy-Aware Database All Data is Stored Together With Privacy (P3P) Policy Data and policy (Metadata) form logical unit Each Data Access Needs Usage Policy Database compares allowed/announced and proposed usage Data with non-matching allowed usage is held back Each data access (who, why) is recorded (auditing) Example Example result result of of a a policy-based policy-based query query <last name> <first name> <birthdate> <address> Personal Data Usage Policy Individual Privacy Policy November 3, 2005 Personal Privacy in Ubiquitous Computing 31
32 PawS Example Camera Proxy Printer Proxy User Privacy Proxy Privacy Policy Accept / Decline Privacy Beacon Devices PA (Privacy Assistant) November 3, 2005 Personal Privacy in Ubiquitous Computing 32
33 PawS Implementation Privacy Database Oracle 8i, Java interface (no direct table access) P3P policies cached for speed Privacy Proxies Web service (Apache Tomcat) SOAP, SSH, DSig Extended P3P Privacy Beacons IR Beacon (IRREAL) Palm Tungsten C (WLAN) Privacy Policy Accept / Decline November 3, 2005 Personal Privacy in Ubiquitous Computing 33
34 PawS Implementation Privacy is iscompatible with Ubiquitous Computing technical solutions can support FIP FIP in in Ubicomp Privacy Database Oracle 8i, Java interface (no direct table access) P3P policies cached for speed Privacy Proxies Web service (Apache Tomcat) SOAP, SSH, DSig Extended P3P Privacy Beacons IR Beacon (IRREAL) Palm Tungsten C (WLAN) Privacy Policy Accept / Decline November 3, 2005 Personal Privacy in Ubiquitous Computing 34
35 Today s Topics Analysis What is Privacy? How does Ubiquitous Computing affect it? Privacy Infrastructure (PawS) Privacy Beacons Privacy Proxies Privacy-Aware Database Real-World Example Privacy and RFID November 3, 2005 Personal Privacy in Ubiquitous Computing 35
36 Today s RFID Systems Original RFID-Man Artwork (c) 2006 Ari Juels, RSA Laboratories Privacy Policy The information we learn from customers helps us personalize and continually improve your shopping experience. ID ID ID All tags respond, please! ID ID ID ID Slide Courtesy of Roland Schneider November 3, 2005 ID Personal Privacy in Ubiquitous Computing 36 DB ID ID ID ID ID
37 RFID-PawS Goal: Fair Information Principles for RFID PawS and RFID Privacy Beacon: RFID-Reader Privacy Assistant: Watchdog-Tag Privacy Proxies & Privacy Database Requirements RFID-Standard compatibility Low bandwith Christian Floerkemeier, Roland Schneider, Marc Langheinrich: Scanning with a Purpose Supporting the Fair Information Principles in RFID protocols. UCS 2004, Tokyo, Japan, November November 3, 2005 Personal Privacy in Ubiquitous Computing 37
38 Example: Openness in RFID-PawS Protocol extension Init round all SUID flag Round size CRC-5 1 bit 6 bits 1 bit 3 bits 5 bits Init_Round Command in ISO Part 6 Defines start of reading cycle (Aloha-based anti-collision) Defines Anti-collision protocol parameters November 3, 2005 Personal Privacy in Ubiquitous Computing 38
39 Example: Openness in RFID-PawS Protocol extension Init round all SUID flag Round size CRC-5 RPID Purpose Collection type CRC-16 1 bit 6 bits 1 bit 3 bits 5 bits 96 bits 16 bits 2 bits 16 bits Init_Round Command in ISO Part 6 Defines start of reading cycle (Aloha-based anti-collision) Defines Anti-collision protocol parameters New: 130 Bits Privacy-Header Extension November 3, 2005 Personal Privacy in Ubiquitous Computing 39
40 Openness using the ReaderPolicyID Protocol extension Init round all SUID flag Round size CRC-5 RPID Purpose Collection type CRC-16 1 bit 6 bits 1 bit 3 bits 5 bits 96 bits 16 bits 2 bits 16 bits Header Data Collector Policy Reader 8 bits 28 bit 24 bits 36 bits 5F.4A886EC.8EC947.24A68E4F6 Each Read Request can be Associated with Data Collector Data collector, reader, and privacy policy identifiable Format follows EPC standard (facilitates implementation) November 3, 2005 Personal Privacy in Ubiquitous Computing 40
41 RFID-PawS and Fair Information Principles Principle Openness Data Access & Control Data Security Collection Limitation User Consent Supported by ReaderPolicyID PawDB (PawDB) Tag Selection Mask, Purpose Declaration Watchdog-Tag November 3, 2005 Personal Privacy in Ubiquitous Computing 41
42 Today s RFID Systems (with RFID-PawS) Original RFID-Man Artwork (c) 2006 Ari Juels, RSA Laboratories Privacy Policy The information we learn from customers helps us personalize and continually improve your shopping experience. ID Example Store, Smart Shelf 4: LocalAll Identification; tags Inventory; respond, All please! ID ID ID ID Openness ID Data DataAccess & Control Control ID PawDB ID ID ID ID ID Slide Courtesy of Roland Schneider November 3, 2005 ID Personal Privacy in Ubiquitous Computing 42
43 Tomorrow s RFID-Systems? Example Store, Smart Shelf 4: Local Identification; Inventory; All PawDB Original RFID-Man Artwork (c) 2006 Ari Juels, RSA Laboratories??? Collection Limitation ID ID ID User User Consent Openness Data DataAccess & Control Control ID ID ID Slide Courtesy of Roland Schneider November 3, 2005 Personal Privacy in Ubiquitous Computing 43
44 PawS: Limits and Open Issues Privacy Beacon Signal (Stand-alone Mode) Needs localization model when using wireless announcements (WLAN, Bluetooth, Zigbee) User Interface for Privacy Assistant Needs user study to assess practical usefulness Limited to Institutional Data Collections Not very useful for peer privacy (e.g., friend finder applications) Sensor Data? Anonymity? Location Privacy? November 3, 2005 Personal Privacy in Ubiquitous Computing 44
45 Summary Other Privacy People s Core Problems in Ubicomp Environments For Ubicomp [my colleague] significantly it is affects more appropriate privacy to think about privacy issues. Requires It s solutions not really on the multiple case in levels my case (collection & processing) Privacy is Primarily not Just About a Security Security Problem All Data you exchange need iswith reallyothers good firewalls just as important It Legal is All and About Social Self-Regulation Frameworks exist Basis: It's maybe Fair Information about letting Principles them find their own ways of cheating Incompatible Technical Privacy withinfrastructure Ubiquitous Computing Possible I Privacy think Beacons, you can't Privacy think of Assistants, privacy... it's Privacy impossible, Proxies, because Privacy if DBI do it, I have troubles with finding [a] Ubicomp future Embedded in legal and social mechanisms November 3, 2005 Personal Privacy in Ubiquitous Computing 45
46 Much Related Work Privacy Infrastructures Myles et al. 03, Aura 03, Confab Toolkit 04 User Interfaces CSCW (Bellotti/Sellen 93, Neustaedter/Greenberg 03) Peer Privacy (Aware Home Project, Confab Toolkit) Identity Management Borking s Identity Protector 96, Lederer s Faces 02 Privacy Databases k-anonymity 02, Hippocratic Databases 02, Enterprise P3P 02 Web Privacy, RFID Privacy, Location Privacy November 3, 2005 Personal Privacy in Ubiquitous Computing 46
P3P and Hippocratic Databases Privacy Metadata and its Implication for Data Management
P3P and Hippocratic Databases Privacy Metadata and its Implication for Data Management Marc Langheinrich Institute for Pervasive Computing ETH Zurich Oct. 13, 2005 Unilever Research Colloquium 1 Today
More informationThe Platform for Privacy Preferences
The Platform for Privacy Preferences A user empowerment approach (P3P) February 2000 Update Marc Langheinrich P3P Preference Group Chair ETH Zurich Platform for Privacy Preferences Outline Policy Background
More informationTechnical Solutions Novel Challenges to Privacy Privacy Enhancing Technologies Examples
Muhammad Eka WIJAYA Technical Solutions Novel Challenges to Privacy Privacy Enhancing Technologies Examples How to Address Privacy in Ubiquitous Work Understand Application Define Problem Know Tools 2
More informationPage 1. Ubiquitous Computing: Beyond platforms, beyond screens; the invisible computer. Topics for Today. Ubiquitous Computing Fundamentals
Ubiquitous Computing: Beyond platforms, beyond screens; the invisible computer Shwetak N. Patel 2 Topics for Today Ubiquitous Computing Fundamentals Review the history of ubiquitous computing (ubicomp)
More informationPrivacy and Security in Ubiquitous Personalized Applications
Privacy and Security in Ubiquitous Personalized Applications Ajay Brar, Judy Kay School of Information Technologies University of Sydney {abrar1, judy}@it.usyd.edu.au Abstract. Personalization systems
More informationUbiquitous Computing. Ambient Intelligence
Ubiquitous Computing Ambient Intelligence CS4031 Introduction to Digital Media 2016 Computing Evolution Ubiquitous Computing Mark Weiser, Xerox PARC 1988 Ubiquitous computing enhances computer use by making
More informationThe Platform for Privacy Preferences (P3P) A user empowerment approach. ETH Zurich. Marc Langheinrich APPEL Subgroup Chair P3P Working Group
The Platform for Privacy Preferences A user empowerment approach (P3P) December 2000 Update Marc Langheinrich APPEL Subgroup Chair P3P Working Group ETH Zurich Platform for Privacy Preferences! What is
More informationControlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes:
Page 1 of 6 I. Common Principles and Approaches to Privacy A. A Modern History of Privacy a. Descriptions, definitions and classes b. Historical and social origins B. Types of Information a. Personal information
More informationSome Computer Science Issues in
Some Computer Science Issues in Ubiquitous Computing Communications of the ACM (CACM) Vol. 36, No.7, July 1993 M. Weiser Presented by Hwajung Kim (hkim@dcslab.snu.ac.kr) DCSLab, SNU Table of Contents Background
More informationMobile and Ubiquitous Computing
Mobile and Ubiquitous Computing Today l Mobile, pervasive and volatile systems l Association and Interoperation l Sensing context and adaptation RIP? How is mobility different Mobile elements are resource-poor
More informationSystem Challenges for Pervasive and Ubiquitous Computing
System Challenges for Pervasive and Ubiquitous Computing 18 th Roy Want Intel Research May 2005, ICSE 05 St. Louis th May 2005, ICSE What is Ubiquitous Computing? The most profound technologies are those
More informationSpontaneous Interaction using Mobile Phones and Short Text Messages
Spontaneous Interaction using Mobile Phones and Short Text Messages Frank Siegemund Distributed Systems Group, Department of Computer Science, Swiss Federal Institute of Technology (ETH) Zurich, 8092 Zurich,
More informationUnit 2: Technology Systems
Unit 2: Technology Systems Level: 1 and 2 Unit type: Core Guided learning hours: 30 Assessment type: External Unit introduction Technology systems are involved in many of the objects we use every day,
More informationA Very Short Introduction to Pervasive Computing
A Very Short Introduction to Pervasive Computing Nicola Dragoni Embedded Systems Engineering Section DTU Informatics Technical University of Denmark These slides have been found on the Web and adapted
More informationAn Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs)
An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs) Sekhar KONDEPUDI Ph.D. Vice Chair FG-SSC & Coordinator Working Group 1 ICT role and roadmap for
More information3. How is technology used to serve our advertisements on other Sites that you visit and what choices do you have?
Privacy Policy for U.S. Websites Scope. This Privacy Policy applies to personal information collected online, used and disclosed by Stanley Black & Decker, Inc. s affiliates including but not limited to
More informationAcceptance. Changes to this Policy
Privacy Policy Last Updated: January 3, 2019 Thank you for visiting Etalia Foods! We work hard to provide you unforgettable and naturally gluten-free pizzas. We know that by choosing Etalia Foods for your
More informationUbiquitous Computing Introduction
Ubiquitous Introduction University of Innsbruck WS 2010/2011 Prof. Dr. Thomas Strang thomas.strang@uibk.ac.at Where it all started The term Ubiquitous 1 goes back to the late Mark Weiser, who wrote 1991
More informationMachine Readability and P3P The Basics
Machine Readability and P3P The Basics Lorrie Faith Cranor P3P Specification Working Group Chair Carnegie Mellon University January 2004 http://lorrie.cranor.org/ P3P Basics Privacy policies Policies let
More informationThe Good, the Bad and the Ugly: Privacy and Legal Implications of Internet of Things for Businesses
The Good, the Bad and the Ugly: Privacy and Legal Implications of Internet of Things for Businesses July 29, 2014 Presented by: Joshua B. Konvisser, Partner Catherine D. Meyer, Senior Counsel Pillsbury
More informationSecure Messaging Mobile App Privacy Policy. Privacy Policy Highlights
Secure Messaging Mobile App Privacy Policy Privacy Policy Highlights For ease of review, Everbridge provides these Privacy Policy highlights, which cover certain aspects of our Privacy Policy. Please review
More informationVETDATA PRIVACY POLICY
Last Updated: April 20, 2018. VETDATA PRIVACY POLICY PLEASE READ THIS PRIVACY POLICY CAREFULLY. Direct Vet Marketing, Inc. and its consolidated affiliates (hereinafter, Vets First Choice, we, us, our )
More informationSecurity Challenges with ITS : A law enforcement view
Security Challenges with ITS : A law enforcement view Central Observatory for Intelligent Transportation Systems FRENCH MINISTRY OF INTERIOR GENDARMERIE NATIONALE Colonel Franck MARESCAL franck.marescal@gendarmerie.interieur.gouv.fr
More informationRegulation and the Internet of Things
Regulation and the Internet of Things 15 th Global Symposium for Regulators (GSR15) Prof. Ian Brown The views expressed in this presentation are those of the author and do not necessarily reflect the opinions
More informationAs you review our policies, here are a few general principles to keep in mind:
Your Privacy and Data Security are Very Important to Us Your privacy is important to us. This Comprehensive Privacy Policy explains how we collect, share, use, and protect information when you visit or
More informationTravelers Rest Festival Privacy Policy. Privacy Policy. PRIVACY POLICY LAST UPDATED: MAY
Travelers Rest Festival Privacy Policy Privacy Policy http://travelersrestfest.com/ PRIVACY POLICY LAST UPDATED: MAY 24 2018 This Privacy Policy describes our policies on the collection, use and disclosure
More informationVersion 11
The Big Challenges Networked and Electronic Media European Technology Platform The birth of a new sector www.nem-initiative.org Version 11 1. NEM IN THE WORLD The main objective of the Networked and Electronic
More informationCritical Information Infrastructure Protection Law
Critical Information Infrastructure Protection Law CCD COE Training 8 September 2009 Tallinn, Estonia Maeve Dion Center for Infrastructure Protection George Mason University School of Law Arlington, Virginia.
More informationFerrous Metal Transfer Privacy Policy
Updated: March 13, 2018 Ferrous Metal Transfer Privacy Policy Ferrous Metal Transfer s Commitment to Privacy Ferrous Metal Transfer Co. ( FMT, we, our, and us ) respects your concerns about privacy, and
More informationMobile Security Fall 2012
Mobile Security 14-829 Fall 2012 Patrick Tague Class #9 The Internet of Things Partial slide credit to L. Zoia and Y. Zhang Announcements If you haven't signed up for a Survey presentation (two teams,
More informationLaws and Regulations & Data Governance
Executive Development Course: Digital Government for Transformation Towards Sustainable and Resilient Societies the Singapore Experience Laws and Regulations & Data Governance 2-6 April 2018 UNDP Global
More informationMultiple Dimensions in Convergence and Related Issues
Multiple Dimensions in Convergence and Related Issues S.R. Subramanya LG Electronics CDG Technology Forum Las Vegas, Oct. 7, 2005 LGE Mobile Research, USA Talk Outline Introduction» Convergence Layers
More informationYOUR PRIVACY RIGHTS Privacy Policy General Col ection and Use voluntarily
YOUR PRIVACY RIGHTS Privacy Policy The Travel Society (DBA The Travel Society, LLC ) (AKA: Company ) in addition to the Members (AKA: Affiliates ) of The Travel Society values your privacy. This Privacy
More informationIntroduction to the Semantic Web
ITTALKS Introduction to the Web example applications ITTALKS is a database driven web site of IT related talks at UMC and other institutions. The database contains information on Seminar events http://ittalks.org/
More informationBrowsing the World in the Sensors Continuum. Franco Zambonelli. Motivations. all our everyday objects all our everyday environments
Browsing the World in the Sensors Continuum Agents and Franco Zambonelli Agents and Motivations Agents and n Computer-based systems and sensors will be soon embedded in everywhere all our everyday objects
More informationIntroduction. Angela Holzworth, RHIA, CISA, GSEC. Kimberly Gray, Esq., CIPP/US. Sr. IT Infrastructure Analyst
Introduction Angela Holzworth, RHIA, CISA, GSEC Sr. IT Infrastructure Analyst Kimberly Gray, Esq., CIPP/US Chief Privacy Officer, Global, IMS Health 1 Incorporating Privacy into the CSF: Approach and Benefits
More informationNetwork Communications Standards. Applied Information Technology
Network Communications Standards Applied Information Technology Network Standards Why do we need network standards? Defined guidelines for how computers or networked devices communicate Think of it as
More informationWireless Network Security Spring 2013
Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #19 Location Privacy & Tracking Agenda Location privacy and tracking Implications / risks of location information Location privacy and anonymity
More informationPRIVACY POLICY QUICK GUIDE TO CONTENTS
PRIVACY POLICY This privacy policy describes the policies and practices of Comodo Security Solutions, Inc. and Comodo Security Solutions Ltd. (collectively and individually referred to herein as "Comodo"),
More informationWonderline Europe Zrt.
Wonderline Europe Zrt. PRIVACY POLICY AND DATA PROTECTION REGULATION WWW.WONDERLINE.EU Accepted: 23. May, 2018. It is forbidden to make copies of this document in part or whole without the prior written
More informationThe Ubiquitous Web. Dave Raggett, W3C Technical Plenary, March /14
The Ubiquitous Web Dave Raggett, W3C Technical Plenary, March 2005 1/14 Ubiquitous. [adj] 1. (seemingly) present everywhere simultaneously. 2. often encountered [Latin ubique everywhere] Oxford English
More informationMOBILE.NET PRIVACY POLICY
MOBILE.NET PRIVACY POLICY As the operator of the Mobile.net website (https://mobile.net.ltd/) (Website), ADX Labs, LLC. (Company, we or us) is committed to protecting and respecting your privacy. The data
More informatione180 Privacy Policy July 2018
e180 Privacy Policy July 2018 We are e180, the creators of Braindate. We care deeply about protecting your personal information, so we ve outlined everything you need to know about it here. Last modified:
More informationWhat information do we collect online and how is it used?
Thirty-One Gifts LLC - Privacy Policy This Privacy Policy is intended to assist you in understanding what personal information we gather about you when you visit Thirty-One Gifts online, how we use and
More information2017 RIMS CYBER SURVEY
2017 RIMS CYBER SURVEY This report marks the third year that RIMS has surveyed its membership about cyber risks and transfer practices. This is, of course, a topic that only continues to captivate the
More informationInformation we collect about you: (Rewritten)
Local Search Titan, LLC ( LST, "we", "us" or "our") respects the privacy of our users and has developed this Privacy Policy to demonstrate its commitment to protecting your privacy. The intention of this
More informationA Framework for Managing Crime and Fraud
A Framework for Managing Crime and Fraud ASIS International Asia Pacific Security Forum & Exhibition Macau, December 4, 2013 Torsten Wolf, CPP Head of Group Security Operations Agenda Introduction Economic
More informationMaking Privacy Operational
Making Privacy Operational Introduction to the Privacy Management Reference Model John Sabo Director, Global Government relations CA, Inc. and President, ISTPA john.t.sabo@ca.com Michael Willett President,
More informationRecruitment Privacy Notice
Rev. A May 22, 2018 Contents 1. About Us... 2 2. Collection... 2 3. Use of Personal Data... 3 4. Legal Basis... 3 5. Sharing of Personal Data... 4 5.1 Within Jacobs... 4 5.2 With Third Parties... 4 6.
More informationInformation technology Security techniques Information security controls for the energy utility industry
INTERNATIONAL STANDARD ISO/IEC 27019 First edition 2017-10 Information technology Security techniques Information security controls for the energy utility industry Technologies de l'information Techniques
More informationFuture-Proof Security & Privacy in IoT
All rights reserved, Arthur s Legal B.V. Future-Proof Security & Privacy in IoT From State of Play, To State of The Art Arthur van der Wees, LLM Managing Director Arthur s Legal, the global tech-by-design
More informationIntroduction to Distributed Systems
Introduction to Distributed Systems Other matters: review of the Bakery Algorithm: why can t we simply keep track of the last ticket taken and the next ticvket to be called? Ref: [Coulouris&al Ch 1, 2]
More informationDHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017
DHS Cybersecurity Election Infrastructure as Critical Infrastructure June 2017 Department of Homeland Security Safeguard the American People, Our Homeland, and Our Values Homeland Security Missions 1.
More informationPRIVACY POLICY OUR SERVICES. Last modified: November 29, 2015
PRIVACY POLICY Last modified: November 29, 2015 Thank you for using Creatubbles. Creatubbles PTE. LTD and its affiliates ( Creatubbles ) values your privacy, and we want you to know what information we
More informationHow the European Commission is supporting innovation in mobile health technologies Nordic Mobile Healthcare Technology Congress 2015
How the European Commission is supporting innovation in mobile health technologies Nordic Mobile Healthcare Technology Congress 2015 Claudia Prettner, Unit for Health and Well-Being, DG CONNECT Table of
More informationA QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES
A QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES We are experts in, CODING SUPPORT FOR FINAL YEAR PROJECT JOURNAL PREPARATION
More informationPrivacy Policy. Implemented on: November 2, 2017
Implemented on: November 2, 2017 Privacy Policy STH JAPAN K.K. (the "Company") will strictly control any personal information received from you (the "User(s)") via the website https://hospitality.rugbyworldcup.com/
More informationThe West End Community Trust Privacy Policy
The West End Community Trust Privacy Policy We are committed to protecting your personal information and being transparent about what we do with it, however you interact with us. We are therefore committed
More informationITU Arab Forum on Emerging Technologies Algiers Algeria, Feb. 2018
ITU Arab Forum on Emerging Technologies Algiers Algeria, 14-15 Feb. 2018 IOT AS THE NEXT MILESTONE FOR INNOVATIONS IN THE 21 ST CENTURY by: Osama Ghanim Nour Smart Solution 14 th Feb 2018 3 Time Attendance
More informationLeveraging Mobile Interaction with Sensor-Driven and Multimodal User Interfaces"
Leveraging Mobile Interaction with Sensor-Driven and Multimodal User Interfaces Andreas Möller Betreuer: Prof. Dr. Matthias Kranz Doktorandenseminar an der LMU München Institute for Media Technology My
More informationTen lessons learned about Ubiquitous Computing. Roy Want Intel Research Dagstuhl, September 2001
Ten lessons learned about Ubiquitous Computing Roy Want Intel Research Dagstuhl, September 2001 Ubiquitous Computing Olivetti 1988-1991 1991 Andy Hopper Pandora Active Badge Xerox PARC 1991-2000 Mark Weiser
More informationProfiles and Context Awareness for Mobile Users a Middleware Approach supporting Personal Security.
Profiles and Context Awareness for Mobile Users a Middleware Approach supporting Personal Security. Security of Pervasive Communication, SPC 06 T-Systems Enterprise Services GmbH Technologiezentrum ENPS
More informationA Planet of Smarter Cities: Security and critical infrastructures impact
A Planet of Smarter Cities: Security and critical infrastructures impact Alberto Barrientos Director of Public Sector IBM Smarter Cities Alberto.barrientos@es.ibm.com Urban population growth expected to
More informationNovember Integrating RFID with your Mainframe
Integrating RFID with your Mainframe November 2004 Agenda RFID Review Integrating RFID The Lightyear Solution Demonstration Slide 2 RFID Timeline RFID developed in WWII to uniquely identify aircraft Wal-Mart
More informationThe Value of Handhelds in Smart Environments
The Value of Handhelds in Smart Environments Frank Siegemund, Christian Floerkemeier, and Harald Vogt Institute for Pervasive Computing Department of Computer Science ETH Zurich, Switzerland {siegemund
More informationBeam Technologies Inc. Privacy Policy
Beam Technologies Inc. Privacy Policy Introduction Beam Technologies Inc., Beam Dental Insurance Services LLC, Beam Insurance Administrators LLC, Beam Perks LLC, and Beam Insurance Services LLC, (collectively,
More informationMobile and Ubiquitous Computing
Mobile and Ubiquitous Computing Today l Volatile systems l Association and Interoperation l Sensing context and adaptation Volatile systems " Mobile computing Exploiting the connectedness of devices as
More informationetouches, Inc. Privacy Policy
etouches, Inc. Privacy Policy Effective Date: March 1, 2017 This privacy policy applies to etouches, Inc. ( etouches ) and covers the site, www.etouches.com corporate site and application(s) accessed via
More informationPrivacy Policy. Last Updated: August 2017
Privacy Policy Last Updated: August 2017 Here at ConsenSys we know how much you value privacy, and we realize that you care about what happens to the information you provide to us through our website,
More informationConformity Assessment Schemes and Interoperability Testing (1) Keith Mainwaring ITU Telecommunication Standardization Bureau (TSB) Consultant
Conformity Assessment Schemes and Interoperability Testing (1) Keith Mainwaring ITU Standardization Bureau (TSB) Consultant Moscow, 9-11 november 2011 Contents The benefits of conformity assessment Conformity
More informationSensorPlanet: a global test platform for mobile- centric wireless sensor network research
SensorPlanet: a global test platform for mobilecentric wireless sensor network research Owner: Contacts: Henry Tirri Barbara Heikkinen, Boda Péter 1 2006 Nokia SensorPlanet Nokia Research Center, Helsinki
More informationMEETING ISO STANDARDS
WHITE PAPER MEETING ISO 27002 STANDARDS September 2018 SECURITY GUIDELINE COMPLIANCE Organizations have seen a rapid increase in malicious insider threats, sensitive data exfiltration, and other advanced
More informationInternet of Things. Sungkyunkwan University. Mobile Computing. Hyunseung Choo
Sungkyunkwan University Internet of Things Mobile Computing Sungkyunkwan University Hyunseung Choo choo@skku.edu Mobile Computing Copyright 2000-2016 Networking Laboratory 1/32 Contents Introduction Characteristics
More informationInnovating with a Trillion Smart Objects
Bucharest April 2013 Innovating with a Trillion Smart Objects Ian Kennedy Senior Director, Cisco Europe, Middle East, Africa, Russia 2011 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect
More informationYou may contact The Translation Network by at You may also call The Translation Network at
The Translation Network Privacy Policy This is a privacy policy for The Translation Network Group Inc. The Translation Network has created this privacy statement in order to demonstrate its firm commitment
More informationOnline Privacy. Promise or Peril? Lorrie Faith Cranor AT&T Labs-Research
Online Privacy Promise or Peril? Lorrie Faith Cranor AT&T Labs-Research http://lorrie.cranor.org/ Online privacy in the comics! Cathy February 25, 2000 2 Why is Cathy concerned? Cathy March 1, 2000 3 How
More informationEagles Charitable Foundation Privacy Policy
Eagles Charitable Foundation Privacy Policy Effective Date: 1/18/2018 The Eagles Charitable Foundation, Inc. ( Eagles Charitable Foundation, we, our, us ) respects your privacy and values your trust and
More informationThis document is a preview generated by EVS
INTERNATIONAL STANDARD ISO/IEC 29151 First edition 2017-08 Information technology Security techniques Code of practice for personally identifiable information protection Technologies de l'information Techniques
More information"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary
Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business
More informationAbout the information we collect We collect and process personal data including but not limited to:-
Privacy Policy About us TP Supported Accommodation is responsible for collecting, processing, storing and safe keeping of personal information as part of our business activities. We manage information
More information119 Ministries Privacy Policy v1.1 5/24/18. Full Policy
119 Ministries Privacy Policy v1.1 5/24/18 Full Policy This Privacy Policy discloses the privacy practices for the 119 Ministries, Inc. website (collectively, the Website located at www.119ministries.com).
More informationPRIVACY POLICY. 3.1 This policy does not apply to the collection, holding, use or disclosure of personal information that is an employee record.
1. Introduction 1.1 From time to time Business & Risk Solutions Pty Ltd ("the Company") is required to collect, hold, use and/or disclose personal information relating to individuals (including, but not
More informationITU Asia-Pacific Centres of Excellence Training on Conformity and Interoperability. Session 2: Conformity Assessment Principles
ITU Asia-Pacific Centres of Excellence Training on Conformity and Interoperability Session 2: Conformity Assessment Principles 12-16 October 2015 Beijing, China Keith Mainwaring ITU Expert Agenda 1. Context
More informationCommunity Driven Development. Becomes Pervasive. Seminar Thesis Outline Andreas Herglotz
Community Driven Development and Social Networking Becomes Pervasive Seminar Thesis Outline Andreas Herglotz 18.01.2008 Agenda Different Aspects (Ubiquitous Computing, Social Networking, Community Driven
More informationMobile and Ubiquitous Computing 2017/18 Fundamental Challenges and Problems
Mobile and Ubiquitous Computing 2017/18 Fundamental Challenges and Problems Based on materials by Prof. Paulo Ferreira Introduction Evolution Wheredo wewantto go? Challenges last class Basic Definitions
More informationAuthenticating Pervasive Devices with Human Protocols
Authenticating Pervasive Devices with Human Protocols Presented by Xiaokun Mu Paper Authors: Ari Juels RSA Laboratories Stephen A. Weis Massachusetts Institute of Technology Authentication Problems It
More informationA full list of SaltWire Network Inc. publications is available by visiting saltwire.com.
Introduction Effective January 1, 2004, private sector organizations must follow a code for the protection of personal information in accordance with the Personal Information Protection and Electronic
More informationCyber Security. Activities of an national insurance association based on the example of VVO
Cyber Security Activities of an national insurance association based on the example of VVO Michael Brandstetter EU and International Affairs Austrian Insurance Association (VVO) IIF Insurance in the Digital
More informationenter into application on 25 May 2018
General Data Protection Regulation What is GDPR? Is GDPR applicable for you? Which actions are required from you (and us)? Which rights do your clients have and which services can KBC Securities s provide
More informationPrivacy Implications Guide. for. the CIS Critical Security Controls (Version 6)
Privacy Implications Guide for the CIS Critical Security Controls (Version 6) Privacy Implications Guide for the CIS Critical Security Controls (Version 6) Acknowledgements: The Center for Internet Security
More informationAn Introduction to the ISO Security Standards
An Introduction to the ISO Security Standards Agenda Security vs Privacy Who or What is the ISO? ISO 27001:2013 ISO 27001/27002 domains Building Blocks of Security AVAILABILITY INTEGRITY CONFIDENTIALITY
More informationUnit 1: Introduction to Ubiquitous Services
Ubiquitous and Secure Networks and Services Redes y Servicios Ubicuos y Seguros Unit 1: Introduction to Ubiquitous Services Lourdes López Santidrián llopez@diatel.upm.es, lourdes.lopez@upm.es Lourdes López
More informationngenius Products in a GDPR Compliant Environment
l FAQ l ngenius Products in a GDPR Compliant Environment This document addresses questions from organizations that use ngenius Smart Data Core platform and application products and are evaluating their
More informationSAC PA Security Frameworks - FISMA and NIST
SAC PA Security Frameworks - FISMA and NIST 800-171 June 23, 2017 SECURITY FRAMEWORKS Chris Seiders, CISSP Scott Weinman, CISSP, CISA Agenda Compliance standards FISMA NIST SP 800-171 Importance of Compliance
More informationIEI Smart Healthcare Solution
Population aging is becoming a worldwide phenomenon, and the requirements of health-caring are increasing. The World Health Organization (WHO) reports that 90% of seniors (US population) have at least
More information1 Privacy Statement INDEX
INDEX 1 Privacy Statement Mphasis is committed to protecting the personal information of its customers, employees, suppliers, contractors and business associates. Personal information includes data related
More informationWebsite Privacy Notice
This privacy notice explains the processing of personal data on the website of Assurity Consulting Ltd (including the entity of Assurity Consulting Holdings Ltd). Assurity Consulting Ltd is committed to
More informationPolicy-Based Context-Management for Mobile Solutions
Policy-Based Context-Management for Mobile Solutions Caroline Funk 1,Björn Schiemann 2 1 Ludwig-Maximilians-Universität München Oettingenstraße 67, 80538 München caroline.funk@nm.ifi.lmu.de 2 Siemens AG,
More informationEmergency Response: How dedicated short range communication will help in the future. Matthew Henchey and Tejswaroop Geetla, University at Buffalo
Emergency Response: How dedicated short range communication will help in the future. 1.0 Introduction Matthew Henchey and Tejswaroop Geetla, University at Buffalo Dedicated short range communication (DSRC)
More informationINFS 328 Systems Analysis and Design
INFS 328 Systems Analysis and Design Session 6 System Design Part 1 Lecturer: Prof. Ellis Edwin Badu, Dept. of Information Studies Contact Information: eebadu@ug.edu.gh College of Education School of Continuing
More information