Connected car, big data, big brother? Using geolocation in a trustworthy and compliant way [email protected] Trends that threaten trust 2 Connected cars with downloadable apps Location services, cloud, internet-of-thing, big data 3 Privacy, security, safety How it fits together 4 Topic Is about Key notions Privacy Self determination, non-interference Freedom, Liberty, Dignity, Honor Data Privacy / Data Protection Proper & fair use of information about an individual Collection & use limitation, Data quality, Purpose specification, Security safeguards, Openness, Accountability Information Security Protecting/securing information Confidentiality, Integrity, Availability Safety, physical security Being “free” from effects of errors, accidents, incidents, violence etc. Ownership, integrity, reliability, perimeter Revolutionising navigation In 4 steps 4. TomTom HD Traffic 3. IQ Routes 2. Map Share 1. Base maps 4. TomTom HD Traffic 3. IQ Routes 2. Map Share 1. Base maps 5 4. TomTom HD Traffic 3. IQ Routes 2. Map Share 1. Base maps 4. TomTom HD Traffic 3. IQ Routes 2. Map Share 1. Base maps TomToms trip archive Anonymous location and speed information from the TomTom user community 5 billion (10E9) speed measurements per day 5 trillion (10E12) speed measurements to date! by customers driving 50 billion kilometres and visiting every spot over 1,000 times Creating TomTom HD Traffic: data sources Range of high-quality real-time data sources 7 In-car location services under scrutiny 8 Main GAO findings 10 companies were questioned Disclosure: all tell, 9 in broad terms, 5 omit purposes for sharing Consent & controls: all seek consent in some way, all offer some control, none who retain allow deletion Safeguards & retention: all take steps, but in different ways at different levels of de-identification and deletion Accountability: 9 all take steps to protect location data and have accountability policies, be it internal only Main GAO findings: room for improvement 10 companies were questioned Disclosure: all tell, 9 in broad terms, 5 omit purposes for sharing Consent & controls: all seek consent in some way, all offer some control, none who retain allow deletion Safeguards & retention: all take steps, but in different ways at different levels of de-identification and deletion Accountability: 10 all take steps to protect location data and have accountability policies, be it internal only Location privacy is top of mind With bloggers, press, regulators, enforcers, legislators and many users alike 11 • TomTom investigated by leading European Data Protection Authority in 2011 • TomTom’s use of location data is in accordance with EU Data Protection Laws • Processing and delivery to third parties 100% OK • Informing users needed to be more explicit, including opt-in Drivers, police & TomTom An explosive mixture 12 Community input – with permission We profile roads, not people 13 TomTom & Privacy Vision: Principles: Community input (crowd sourcing) is strategic 1. Avoid unpleasant surprises: Privacy helps to realize business objectives by ensuring trust Privacy is integral part of business continuity above and beyond legal compliance 14 • Customer insight is paramount • Be open and explain – hesitation is an omen • Keep it simple 2. The customer remains in control of his personal data: we have it “on a license” Key elements of EU data protection laws Challenging the potential of Big Data 1. Personal data – broad(ening) definition 2. Pre-defined purposes only 3. Volume and time limitations 4. Understandable explanation 5. Consent, legal obligation or balance of legitimate interests must apply 6. Right to view, correct and object 7. Protect confidentiality, integrity & availability 15 Privacy, amongst others, is about the protection of personal data Personal data: • Contains (whatever) information relating to a natural (“real”) person • That person could be identified, directly or indirectly • Typically: data attached to unique identifiers Anonymous only: • When no reasonable way exists to identify (“single out”) a person • Even when requiring correlation with other data sources (e.g. maps and phonebooks) • By anyone with the right resources 16 But: do not forget EU “cookie law” Much broader scope than you may think Any data stored on or retrieved from a device connected to a public telecom network requires 1. Understandable explanation 2. Unambiguous consent Unless the data is strictly necessary for the services offered to the user or for a purely technical purpose. 17 Privacy Policies, Standards & Guidelines 7 key objectives 1. We assess our intended use of PD early to drive requirements 2. We document PD: purpose, legitimate ground, retention, access, jurisdiction(s) 3. We ensure we have obtained or will obtain informed user consent, if applicable 4. We minimize the amount of PD (volume and time) and who has access: we de-personalize or destroy PD as soon as possible 5. We keep ensuring adequate security measures based on risk assessment of confidentiality, integrity and availability 6. We do not expose PD to any third party, unless the third party contractually agrees to comply to our policies (or law forces us) 7. We enable the user to exercise his rights (information, access/download, correction, deletion) 18 The 6 privacy questions 1. What personal data are we processing? in categories, groups, examples 2. Why are we processing personal data? clear (multiple) purposes 3. When can we destroy the personal data? automatically or user triggered 4. Who will have access and will be accountable? including third parties 5. Where will we process and store the personal data? transfer outside of the EU requires agreements 6. Will we have a legitimate basis for processing? 19 Typical personal data misconceptions very often present in technology companies • We do not identify the user while using the data, so we have no issues with privacy law • We only use the serial number of the users device, so the data is anonymous and we have no issues with privacy law • We encrypt the data, so we are no longer using/receiving/sending personal data • We use hashes to replace all serial numbers, so the data is now anonymous and we have no issues with privacy law • We anonimize the data, so we are not using personal data • We can use the users’ data for anything we want, as long as we keep the data to ourselves • Look: big name companies are doing the same, so we are OK 20 provide a specific location-based service, such as real-time traffic information. Companies may also choose to contract with third-parties that provide all location-based services on their behalf; among our selected companies, this is most common among the auto manufacturers. 6 (See fig. 2.) Location data in a car context In the EU to be regarded as sensitive personal data Figure 2: How Location Data Are Transmitted to Provide In-Car Location-Based Services Source: GAO Requires prior, informed,telecommunications explicit consent –provide separate, not inreview T&C’s! companies that these networks from this because they were Note: While companies use cellular networks to transmit location data, we excluded included in our 2012 report on mobile devices. See GAO-12-903. 21 The in-car location-based services industry continues to change and evolve: new partnerships are emerging in the marketplace, existing Can location data be anonymous? Research indicates: hardly ever 22 Avoiding re-identification is key TomTom has a strict code of conduct to adhere to privacy laws 1 month • Historic trip archive only to be used for road, traffic and related purposes • No access to raw data outside TomTom, ever 1 day • TomTom performs processing • TomTom ensures reidentification is impossible e.g. through sufficient aggregation 23 GAO on reducing risks to privacy Step by step reducing the potential to identify the user Figure 3: Examples of De-Identification Methods and Privacy Risk Source: GAO 24 Although location data that are coupled with personal information, such as a name, pose the greatest privacy risk to consumers, company representatives told us that in some cases, they need such data to provide certain services. For example, one auto manufacturer we met Recommendations • Incorporate data protection requirements from the start • Take a multi-disciplinary approach: it is about your “license to operate in the information society” • Embed “privacy by design” into development processes • Document your data: “what, why, when, who, where” • Appoint a “privacy czar” in your organization 25
© Copyright 2026 Paperzz