Living In a World of Data Exploitation - CPDP 2017
-
Upload
frederike-kaltheuner -
Category
Data & Analytics
-
view
292 -
download
4
Transcript of Living In a World of Data Exploitation - CPDP 2017
LIVING IN A WORLD OF DATA EXPLOITATION
CPDP 2017Frederike Kaltheuner | @fre8de8rikePolicy Officer, Privacy International
More data, intelligent machines, new paradigm?Challenges to data protection:1. Informed consent2. Blurring line between sensitive,
personal, non-personal and publicly accessible data
3. Inherent opacity of intelligent systems
The Internet of sensors
microphone
Wi-Fi
Bluetooth
3-axis load cells
accelerometer
gyroscope
conductivity sensors
DATA EXPLOITATION:
generation
collection
processing
sharing supporting technologies:
AIIoT
Big DataCloud
Computing
How to protect individuals (and groups):
devices networks
applications
aggregate
minimise excessive data generation and collection
DEVICESDATA
GENERATION
DATACOLLECTION
= we have to blindly trust companies not to do this excessively
example: The Guardian is instructed by GCHQ to destroy hardware
APPLICATION – emotion detectionNON-PERSONAL
HIGHLY SENSITIVE DATA
PERSONAL ANDHIGHLY SENSITIVE
DATA(that may be inaccurate)
= we have to blindly trustcompanies not to identifyindividuals
AGGREGATE - SOCMINTPERSONAL
NON-SENSITIVEPUBLICLY
ACCESSIBLEDATA
PERSONALHIGHLY SENSITIVE
PROPRIETARYINFORMATION(that may be inaccurate)= we have to blindly trust that
companies (and government) to not exploit/misuse this
intelligence
example: Walmart using social media to gather intelligence about union
GOVERNANCE AND ETHICS OF AI NEEDS TO ADDRESS PRIVACY!
[“automatic processing” is both too broad and too narrow]
LITMUS TEST:A changing political climate
SENSITIVE INFORMATION ALL OVER THE PLACE
VULNERABLECONNECTED DEVICES AND NETWORKS
OPAQUE DECISIONS& DISPARATE
OUTCOMES BY INTELLIGENT
SYSTEMS
example: STASI-style network analysis
How to protect individuals (and groups)Problem: imbalance of power & informational asymmetry
1. Individuals must regain control over their data!
2. Data minimisation – generation and collection!3. Rights violations are not risks that can be
assessed in a cost/benefit analysis!
Frederike KaltheunerPolicy Officer@[email protected]