Dismantling the Twelve Privacy Purposes
Transcript of Dismantling the Twelve Privacy Purposes
Dismantling the Twelve Privacy Purposes
Sabah S. Al-Fedaghi
Department of Computer Engineering
Kuwait University
IFIP 2007
Agenda
• Contribution: Focusing fundamental terms of informational privacy
• Problems with Purpose
• Definitions
• Purposes and P3P
• Framework for replacing Purpose
• Dismantling “CURRENT”
• Dismantling “ADMIN”
ContributionThe Platform for Privacy Preferences (P3P)EPAL XACMLHippocratic databases In spite of these impressive systems, insufficient attention
is directed to fundamental terms of informational privacy.
P3P is singled out since it is the oldest of these projects that is supposed to reach a mature foundation of specification ; however, the implication applies similarly to other projects..
I direct my efforts on the most important notion in P3P and other systems: purpose.
Purpose appears in all privacy guidelines, codes, policies, and legislations. It plays a central role in many privacy-related systems.
Purpose commonly is defined in general terms as how the collected data can be used, or the intended use of the data element, or a description of the reason(s) for data collection and data access.
Purpose appears as uses (e.g., delivery of purchase) of personal information and acts (e.g., research) on personal information
• Claim: P3P 12 standard purposes mix uses of personal information (PI) with acts on personal information and mix uses of personal information privacy with other states of affairs that have several interpretations. Some purposes are not even strongly privacy-related purposes.
• Proposal: to use chains of information handling that let the user exercise more control on the use of his/her PI and allow the personal information (PI) gatherer to excise more control on the processing and accessing of information in its procession.
Problems with Purpose
Purpose is defined in the 2006 W3C Working P3P Draft as
“The reason(s) for data collection and use.”
Reasons are given in response to
why questions.
REASON
?
Why do you collect my personal information?
Because I want to use it in
“telemarketing”
Why do you want to take my money?”
Because I want to use it in
investment
(1) I need to know how
However, there remains the equally important: How do you utilize my money? Acts on PI?
To answer this question, you don’t give me reasons but actions. For example,
- I will use it to buy and sell stocks, or - I will buy with it old houses to renovate and sell for
profit. • I would be foolish if I were satisfied with only the
answer to the why question.This is approximately the logic of personal information
exchange in P3P. We will propose a mechanism to specify the answer to the how and why questions concurrently.
Why do you want to take my money?”
Because I want to use it in
investment
OK, here it is.
(2) Separating the why from the howThe P3P 12 purposes specifications sometimes reflect
the answer to the how question rather than reasons that answer the why question.
Example, the P3P purpose: ‘to determine the habits, interests, or other characteristics of individuals and combine it with identified data to make a decision that directly affects that individual’”
An answer to the how question (act on PI), An answer to the why question (use of PI) This separation is important because there are a limited
number (19 acts) of ways of how to act on personal information; hence, the answer to the why question can be specified in a precise manner.
(3) Several interpretations of the same purpose• The interpretation of the 12 P3P purposes is overly
verbose. According to Thibadeau,
We could have hundreds of very specific purposes. For people who know about the science of human intentionality, it makes sense to be able to list many specific purposes…and the writers of the 1.0 working draft specification…understand that a purpose or intent is actually a simple thing to state and evaluate [15].
Answering the how question uncovers multiple interpretations of the answer to the question “Why are you collecting and using my personal information?”
(4) Is this a privacy-related purpose?
The 12 P3P purposes sometimes sway away from privacy-related situations. A P3P purpose, “Information may be used to…without tying identified data,” doesn’t deal with personal information defined as personally-identifying information. If these purposes are necessary, then they should not be mixed in the same basket with personal information use purposes.
Definitions
Personal information is information that
refers
to uniquely identifiable individuals.
Privacy Other types of Privacy
E.g.,
Physical privacy
Communication privacy
“Non-personal information“ privacy
Personal Information Privacy
What is Personal Information Privacy?
What is personal Information?
Two fundamental types of entit ies:
Persons (natural persons)
Non-persons (e.g., company, government agency, etc.)
Information is of two types:
(i) Non-personal information: Information that has no referent that signifies persons
i i) Personal information: Information that refers to persons.
(a) Atomic: Information that has a single referent that signif ies a single person.
(b) Compound: Information that has more than one referent that signif ies persons.
Spare part x2345 is in store B5 Non-personal information
John is tall and handsome
John, Alice, and Robert hate each other
Proprietors
Theorem: Any compound personal information is privacy-reducible to a set of atomic personal information.
(Al-Fedaghi PST 2005)
E.g., John hates someone, Someone hates John, …
“Non-personal information“ privacy
Non-personal information:
E.g., architectural sketches
Informational privacy but not personal information privacy
Types of Personal Information Privacy
Personal information of Jane Jane
John
Personal information of Jane’s friend Alice
Personal information of John
(he is unaware of it)
Who’s privacy is this?
Personal Information Flow Model (PIFM)
The personal information flow model divides the functionality of handling PI in five stages:
● creating
● collecting
● processing
● disclosing
● communicating
Some stages includes sub-stages
Utilize Store Creating
Processing
Collecting
Store
StoreUse
Use
Mining
Store Use
Disclosing
Communicating
Non-Repudiation Authentication
IFIP 2007
Proprietor’s Region Agent’s Region
N
K L M
F
A
F
O E
I P
J
Non-proprietor
Creating
Processing
Collecting
Store
Store
Utilize
Utilize
Mining
Store
Utilize
Disclosing
Disclosing
Figure 3. Architecture of Proprietor/Agent PI flow
Proprietor’s Region Agent’s Region
Non-proprietorCreating
Processing
Collecting
Store
StoreUse
Mining
Store Use
Disclosing
Disclosing
Use
Collecting
Proprietor’s Region Agent’s Region
N
K L M
F
A
F
O E
I P
J
Non-proprietor
Creating
Processing
Collecting
Store
Store
Utilize
Utilize
Mining
Store
Utilize
Disclosing
Disclosing
Figure 3. Architecture of Proprietor/Agent PI flow
Proprietor’s Region Agents’ Regions
Agent 1 Agent 2 Agent 3
Collecting
Disclosing
Collected PI
Collecting
Collecting
Processing
Disclosing processed PI
Mining
Disclosing
Created PI
Disclosing
By
proprietor
Collecting
Creating
Processing
Purposes and P3PIn P3P, we find 12 declared standard purposes: current,
admin, develop, tailoring, pseudo-analysis, pseudo-decision, individual-analysis, individual-decision, contact, historical, telemarketing, and other-purpose. The purpose element in P3P contains one or more of these pre-defined values and can be qualified with values such as opt-in, opt-out, and always.
• Not specific, since it is possible to produce an infinite number of these purposes.
• Mixing uses of personal information with acts on personal information.
• Mixing uses of personal information privacy with other states of affairs that have several interpretations.
In order to dismantle these purposes, we need to construct a framework for the semantics of acts and uses.
Framework for replacing PurposeActs: performing an action on somethingUses: putting something to a particular purpose.Consider the case of acts and uses with respect to
grapes: (5) Acts on grape: Plant it; Eat it; Collect it,
Store it, Dry it …(6) (2) Uses of grape: Medical treatment of a
person, Decorating cakes (eyes in a face), Celebrating [I/others], Teaching students addition and subtraction, Fueling cars (bioethanol fuel).
To distinguish between acts and uses, utilize the structure of agent/action/patient shown in the Figure . It includes an agent who acts on a patient. “Patient” is the object that receives the action.
• For acts: actor/acts-on/patient.
• For uses, the model involves a third entity: the usee.
The usee is the one used by the agent to act on a patient. For example, a physician uses personal information to treat a patient.
act
Agent Patient
use
agent usee
act
patient
Dismantling “CURRENT”According to P3P, the purpose “current” refers
to:• Completion and Support of Activity For
Which Data Was Provided: Information may be used by the service provider to complete the activity for which it was provided, whether a one-time activity such as returning the results from a Web search, forwarding an email message, or placing an order; or a recurring activity such as providing a subscription service; or allowing access to an online address book or electronic wallet.
We show that this purpose:
• Mixes (infinite) uses and (limited number of) acts
• Displays uses that have several interpretations (several possible chains)
• Displays acts that have several interpretations (several possible chains)
Mixing Uses and Acts
The definition of P3P purposes mixes acts and uses,
Examples given by P3P
act Forwarding an email message (PI)
use Providing a subscription service
Example: Consider the phrase
“Completion and Support of Activity For Which Data Was Provided.”
Analogously,
Taking money to complete and support activities for which you give me your money.
- Taking money to sell laptop.
Purpose: I am taking your money to complete and support delivering the laptop to you (use).
Acts on money can include paying money to my employees, paying money for others (DHL, manufacturer), charging money, converting money …
Delivering laptop Returning the results from a Web search
Money examples P3P Examples
Allowing access to workshop Allowing access to an online address book or electronic wallet
Providing a maintenance service for laptop
Providing a subscription service
Placing an order for laptopPlacing an order
Transferring money Forwarding an email message
• Uses have several interpretations
In P3P’s purpose “current”: uses have several interpretations. Figure 5 shows one possible interpretation. PI is collected and then used without processing it or disclosing it. Yet, another interpretation is possible in another stage.
Proprietor
Disclosing Collecting
Uses:
• Returning the results from a Web search
• Placing an order
• Providing a subscription service
• Allowing access to an
online address
Proprietor’s Region Agent’s Region
N
K L M
F
A
F
O E
I P
J
Non-proprietor
Creating
Processing
Collecting
Store
Store
Utilize
Utilize
Mining
Store
Utilize
Disclosing
Disclosing
Figure 3. Architecture of Proprietor/Agent PI flow
Proprietor’s Region Agent’s Region
Non-proprietorCreating
Processing
Collecting
Store
StoreUse
Mining
Store
Use
Disclosing
Disclosing
Use
Collecting
DISMANTLING “ADMIN”
P3P “Admin” purpose refers to:
Web Site and System Administration: Information may be used for the technical support of the Web site and its computer system. This would include processing computer account information, information used in the course of securing and maintaining the site, and verification of Web site activity by the site or its agents. This would include
(1) Processing computer account information,
(2) Information used in the course of securing and maintaining the site,
(3) Verification of Web site activity by the site or its agents.
This method of description juxtaposes acts and uses. In our method, it can be written (or graphed) systematically as:
PI is gathered, processed and used [acts on PI] for [uses of PI]:
• The technical support of the Web site and its computer system
• Securing and maintaining the site
Notice how such a statement reflects the sub-graph in the PIFM:
gathering processing using different types of usage.
Gather Process Use:
1.The technical support of the Web site and its computer system
2. Securing and maintaining the site
Processing Using?
Proprietor’s Region Agent’s Region
N
K L M
F
A
F
O E
I P
J
Non-proprietor
Creating
Processing
Collecting
Store
Store
Utilize
Utilize
Mining
Store
Utilize
Disclosing
Disclosing
Figure 3. Architecture of Proprietor/Agent PI flow
Proprietor’s Region Agent’s Region
Creating
Processing
Collecting
Store
StoreUse
Mining
StoreUse
Disclosing
Disclosing
Use
Conclusion
● The concept of purpose is a central notion in informational privacy.
● It can be formalized based on the notions of:
Acts on personal information
Uses of personal information
Flow model with specific number of acts on personal information
● Purpose = Acts on PI (sub-graphs) + Uses of PI
THANK YOU