Dismantling the Twelve Privacy Purposes

42
Dismantling the Twelve Privacy Purposes Sabah S. Al-Fedaghi Department of Computer Engineering Kuwait University [email protected] IFIP 2007

Transcript of Dismantling the Twelve Privacy Purposes

Page 1: Dismantling the Twelve Privacy Purposes

Dismantling the Twelve Privacy Purposes

Sabah S. Al-Fedaghi

Department of Computer Engineering

Kuwait University

[email protected]

IFIP 2007

Page 2: Dismantling the Twelve Privacy Purposes

Agenda

• Contribution: Focusing fundamental terms of informational privacy

• Problems with Purpose

• Definitions

• Purposes and P3P

• Framework for replacing Purpose

• Dismantling “CURRENT”

• Dismantling “ADMIN”

Page 3: Dismantling the Twelve Privacy Purposes

ContributionThe Platform for Privacy Preferences (P3P)EPAL XACMLHippocratic databases In spite of these impressive systems, insufficient attention

is directed to fundamental terms of informational privacy.

P3P is singled out since it is the oldest of these projects that is supposed to reach a mature foundation of specification ; however, the implication applies similarly to other projects..

I direct my efforts on the most important notion in P3P and other systems: purpose.

Page 4: Dismantling the Twelve Privacy Purposes

Purpose appears in all privacy guidelines, codes, policies, and legislations. It plays a central role in many privacy-related systems.

Purpose commonly is defined in general terms as how the collected data can be used, or the intended use of the data element, or a description of the reason(s) for data collection and data access.

Page 5: Dismantling the Twelve Privacy Purposes

Purpose appears as uses (e.g., delivery of purchase) of personal information and acts (e.g., research) on personal information

• Claim: P3P 12 standard purposes mix uses of personal information (PI) with acts on personal information and mix uses of personal information privacy with other states of affairs that have several interpretations. Some purposes are not even strongly privacy-related purposes.

• Proposal: to use chains of information handling that let the user exercise more control on the use of his/her PI and allow the personal information (PI) gatherer to excise more control on the processing and accessing of information in its procession.

Page 6: Dismantling the Twelve Privacy Purposes

Problems with Purpose

Purpose is defined in the 2006 W3C Working P3P Draft as

“The reason(s) for data collection and use.”

Reasons are given in response to

why questions.

REASON

?

Page 9: Dismantling the Twelve Privacy Purposes

(1) I need to know how

However, there remains the equally important: How do you utilize my money? Acts on PI?

To answer this question, you don’t give me reasons but actions. For example,

- I will use it to buy and sell stocks, or - I will buy with it old houses to renovate and sell for

profit. • I would be foolish if I were satisfied with only the

answer to the why question.This is approximately the logic of personal information

exchange in P3P. We will propose a mechanism to specify the answer to the how and why questions concurrently.

Page 11: Dismantling the Twelve Privacy Purposes

(2) Separating the why from the howThe P3P 12 purposes specifications sometimes reflect

the answer to the how question rather than reasons that answer the why question.

Example, the P3P purpose: ‘to determine the habits, interests, or other characteristics of individuals and combine it with identified data to make a decision that directly affects that individual’”

An answer to the how question (act on PI), An answer to the why question (use of PI) This separation is important because there are a limited

number (19 acts) of ways of how to act on personal information; hence, the answer to the why question can be specified in a precise manner.

Page 12: Dismantling the Twelve Privacy Purposes

(3) Several interpretations of the same purpose• The interpretation of the 12 P3P purposes is overly

verbose. According to Thibadeau,

We could have hundreds of very specific purposes. For people who know about the science of human intentionality, it makes sense to be able to list many specific purposes…and the writers of the 1.0 working draft specification…understand that a purpose or intent is actually a simple thing to state and evaluate [15].

Answering the how question uncovers multiple interpretations of the answer to the question “Why are you collecting and using my personal information?”

Page 13: Dismantling the Twelve Privacy Purposes

(4) Is this a privacy-related purpose?

The 12 P3P purposes sometimes sway away from privacy-related situations. A P3P purpose, “Information may be used to…without tying identified data,” doesn’t deal with personal information defined as personally-identifying information. If these purposes are necessary, then they should not be mixed in the same basket with personal information use purposes.

Page 14: Dismantling the Twelve Privacy Purposes

Definitions

Personal information is information that

refers

to uniquely identifiable individuals.

Page 15: Dismantling the Twelve Privacy Purposes

 

 

Privacy Other types of Privacy

E.g.,

Physical privacy

Communication privacy

“Non-personal information“ privacy

Personal Information Privacy

Page 16: Dismantling the Twelve Privacy Purposes

What is Personal Information Privacy?

What is personal Information?

Two fundamental types of entit ies:

Persons (natural persons)

Non-persons (e.g., company, government agency, etc.)

Page 17: Dismantling the Twelve Privacy Purposes

Information is of two types:

(i) Non-personal information: Information that has no referent that signifies persons

i i) Personal information: Information that refers to persons.

(a) Atomic: Information that has a single referent that signif ies a single person.

(b) Compound: Information that has more than one referent that signif ies persons.

Page 18: Dismantling the Twelve Privacy Purposes

Spare part x2345 is in store B5 Non-personal information

John is tall and handsome

John, Alice, and Robert hate each other

Proprietors

Theorem: Any compound personal information is privacy-reducible to a set of atomic personal information.

(Al-Fedaghi PST 2005)

E.g., John hates someone, Someone hates John, …

Page 19: Dismantling the Twelve Privacy Purposes

 

 

“Non-personal information“ privacy

Non-personal information:

E.g., architectural sketches

Informational privacy but not personal information privacy

Page 20: Dismantling the Twelve Privacy Purposes

 

 

Types of Personal Information Privacy

Personal information of Jane Jane

John

Personal information of Jane’s friend Alice

Personal information of John

(he is unaware of it)

Who’s privacy is this?

Page 21: Dismantling the Twelve Privacy Purposes

Personal Information Flow Model (PIFM)

The personal information flow model divides the functionality of handling PI in five stages:

● creating

● collecting

● processing

● disclosing

● communicating

Some stages includes sub-stages

Page 22: Dismantling the Twelve Privacy Purposes

Utilize Store Creating

Processing

Collecting

Store

StoreUse

Use

Mining

Store Use

Disclosing

Communicating

Non-Repudiation Authentication

IFIP 2007

Page 23: Dismantling the Twelve Privacy Purposes

Proprietor’s Region Agent’s Region

N

K L M

F

A

F

O E

I P

J

Non-proprietor

Creating

Processing

Collecting

Store

Store

Utilize

Utilize

Mining

Store

Utilize

Disclosing

Disclosing

Figure 3. Architecture of Proprietor/Agent PI flow

Proprietor’s Region Agent’s Region

Non-proprietorCreating

Processing

Collecting

Store

StoreUse

Mining

Store Use

Disclosing

Disclosing

Use

Collecting

Page 24: Dismantling the Twelve Privacy Purposes

Proprietor’s Region Agent’s Region

N

K L M

F

A

F

O E

I P

J

Non-proprietor

Creating

Processing

Collecting

Store

Store

Utilize

Utilize

Mining

Store

Utilize

Disclosing

Disclosing

Figure 3. Architecture of Proprietor/Agent PI flow

Proprietor’s Region Agents’ Regions

Agent 1 Agent 2 Agent 3

Collecting

Disclosing

Collected PI

Collecting

Collecting

Processing

Disclosing processed PI

Mining

Disclosing

Created PI

Disclosing

By

proprietor

Collecting

Creating

Processing

Page 25: Dismantling the Twelve Privacy Purposes

Purposes and P3PIn P3P, we find 12 declared standard purposes: current,

admin, develop, tailoring, pseudo-analysis, pseudo-decision, individual-analysis, individual-decision, contact, historical, telemarketing, and other-purpose. The purpose element in P3P contains one or more of these pre-defined values and can be qualified with values such as opt-in, opt-out, and always.

• Not specific, since it is possible to produce an infinite number of these purposes.

• Mixing uses of personal information with acts on personal information.

• Mixing uses of personal information privacy with other states of affairs that have several interpretations.

In order to dismantle these purposes, we need to construct a framework for the semantics of acts and uses.

Page 26: Dismantling the Twelve Privacy Purposes

Framework for replacing PurposeActs: performing an action on somethingUses: putting something to a particular purpose.Consider the case of acts and uses with respect to

grapes: (5) Acts on grape: Plant it; Eat it; Collect it,

Store it, Dry it …(6) (2) Uses of grape: Medical treatment of a

person, Decorating cakes (eyes in a face), Celebrating [I/others], Teaching students addition and subtraction, Fueling cars (bioethanol fuel).

Page 27: Dismantling the Twelve Privacy Purposes

To distinguish between acts and uses, utilize the structure of agent/action/patient shown in the Figure . It includes an agent who acts on a patient. “Patient” is the object that receives the action.

• For acts: actor/acts-on/patient.

• For uses, the model involves a third entity: the usee.

The usee is the one used by the agent to act on a patient. For example, a physician uses personal information to treat a patient.

Page 28: Dismantling the Twelve Privacy Purposes

act

Agent Patient

use

agent usee

act

patient

Page 29: Dismantling the Twelve Privacy Purposes

Dismantling “CURRENT”According to P3P, the purpose “current” refers

to:• Completion and Support of Activity For

Which Data Was Provided: Information may be used by the service provider to complete the activity for which it was provided, whether a one-time activity such as returning the results from a Web search, forwarding an email message, or placing an order; or a recurring activity such as providing a subscription service; or allowing access to an online address book or electronic wallet.

Page 30: Dismantling the Twelve Privacy Purposes

We show that this purpose:

• Mixes (infinite) uses and (limited number of) acts

• Displays uses that have several interpretations (several possible chains)

• Displays acts that have several interpretations (several possible chains)

Page 31: Dismantling the Twelve Privacy Purposes

Mixing Uses and Acts

The definition of P3P purposes mixes acts and uses,

Examples given by P3P

act Forwarding an email message (PI)

use Providing a subscription service

Page 32: Dismantling the Twelve Privacy Purposes

Example: Consider the phrase

“Completion and Support of Activity For Which Data Was Provided.”

Analogously,

Taking money to complete and support activities for which you give me your money.

- Taking money to sell laptop.

Purpose: I am taking your money to complete and support delivering the laptop to you (use).

Acts on money can include paying money to my employees, paying money for others (DHL, manufacturer), charging money, converting money …

Page 33: Dismantling the Twelve Privacy Purposes

Delivering laptop Returning the results from a Web search

Money examples P3P Examples

Allowing access to workshop Allowing access to an online address book or electronic wallet

Providing a maintenance service for laptop

Providing a subscription service

Placing an order for laptopPlacing an order

Transferring money Forwarding an email message

Page 34: Dismantling the Twelve Privacy Purposes

• Uses have several interpretations

In P3P’s purpose “current”: uses have several interpretations. Figure 5 shows one possible interpretation. PI is collected and then used without processing it or disclosing it. Yet, another interpretation is possible in another stage.

Proprietor

Disclosing Collecting

Uses:

• Returning the results from a Web search

• Placing an order

• Providing a subscription service

• Allowing access to an

online address

Page 35: Dismantling the Twelve Privacy Purposes

Proprietor’s Region Agent’s Region

N

K L M

F

A

F

O E

I P

J

Non-proprietor

Creating

Processing

Collecting

Store

Store

Utilize

Utilize

Mining

Store

Utilize

Disclosing

Disclosing

Figure 3. Architecture of Proprietor/Agent PI flow

Proprietor’s Region Agent’s Region

Non-proprietorCreating

Processing

Collecting

Store

StoreUse

Mining

Store

Use

Disclosing

Disclosing

Use

Collecting

Page 36: Dismantling the Twelve Privacy Purposes

DISMANTLING “ADMIN”

P3P “Admin” purpose refers to:

Web Site and System Administration: Information may be used for the technical support of the Web site and its computer system. This would include processing computer account information, information used in the course of securing and maintaining the site, and verification of Web site activity by the site or its agents. This would include

(1) Processing computer account information,

(2) Information used in the course of securing and maintaining the site,

(3) Verification of Web site activity by the site or its agents.

Page 37: Dismantling the Twelve Privacy Purposes

This method of description juxtaposes acts and uses. In our method, it can be written (or graphed) systematically as:

PI is gathered, processed and used [acts on PI] for [uses of PI]:

• The technical support of the Web site and its computer system

• Securing and maintaining the site

Page 38: Dismantling the Twelve Privacy Purposes

Notice how such a statement reflects the sub-graph in the PIFM:

gathering processing using different types of usage.

Gather Process Use:

1.The technical support of the Web site and its computer system

2. Securing and maintaining the site

Page 39: Dismantling the Twelve Privacy Purposes

Processing Using?

Page 40: Dismantling the Twelve Privacy Purposes

Proprietor’s Region Agent’s Region

N

K L M

F

A

F

O E

I P

J

Non-proprietor

Creating

Processing

Collecting

Store

Store

Utilize

Utilize

Mining

Store

Utilize

Disclosing

Disclosing

Figure 3. Architecture of Proprietor/Agent PI flow

Proprietor’s Region Agent’s Region

Creating

Processing

Collecting

Store

StoreUse

Mining

StoreUse

Disclosing

Disclosing

Use

Page 41: Dismantling the Twelve Privacy Purposes

Conclusion

● The concept of purpose is a central notion in informational privacy.

● It can be formalized based on the notions of:

Acts on personal information

Uses of personal information

Flow model with specific number of acts on personal information

● Purpose = Acts on PI (sub-graphs) + Uses of PI

Page 42: Dismantling the Twelve Privacy Purposes

THANK YOU