The Need to Embed Privacy, by Design, into Big Data and IoT

Presented at Data Privacy Asia 2016 conference

Privacy is under siege. With the growth of ubiquitous computing, online connectivity, social media, and wireless and wearable devices, people are being led to believe they have no choice but to give up on privacy. Not so! Dr. Cavoukian will outline a privacy framework called Privacy by Design that will enable our privacy and our freedom, to live well into the future.

While some believe that fundamental privacy protections will be challenged by the operation of Big Data and the Internet of Things, Dr. Cavoukian dispels the notion that privacy acts as a barrier to data analytics and the innovations they can spark. She argues that the limiting paradigm of “zero-sum” – that you can either have privacy or innovation, but not both – is an outdated, win/lose model of approaching the question of privacy in the age of Big Data and IoT. Instead, a “positive-sum” solution is needed in which the interests of both sides may be met, in a doubly-enabling, “win-win” manner through Privacy by Design (PbD). PbD is predicated on the rejection of zero-sum propositions by proactively identifying the risks and embedding the necessary protective measures into the IT and data architecture involved. Dr. Cavoukian will demonstrate how you can embed privacy into virtually any system or operation to achieve positive-sum outcomes, enabling both privacy and data utility – not one at the expense of the other.

During her unprecedented three terms as Information and Privacy Commissioner of Ontario, Dr. Ann Cavoukian created Privacy by Design. Privacy by Design is a framework that seeks to proactively embed privacy into the design specifications of information technologies, networked infrastructure and business practices, thereby achieving the strongest protection possible.

See all Data Privacy Asia conference videos

 

Watch full video

Only registered members have access to the full video. Please register or login below.

1
Leave a Reply

Please Login to comment
1 Comment threads
0 Thread replies
0 Followers
 
Most reacted comment
Hottest comment thread
1 Comment authors
Mark Sitkowski Recent comment authors
  Subscribe  
newest oldest most voted
Notify of
Mark Sitkowski
Guest
Mark Sitkowski

It seems there’s a dichotomy between privacy and security. Our main area of interest is user authentication, whose aim is to unequivocally identify a person. The techniques we use to do so are not far removed from those employed by unscrupulous marketing companies to track potential customers. However, there’s a world of difference between wanting to stay anonymous while surfing the net, and needing to guarantee that you’re the only person able to access your bank account. It isn’t necessary to give up your privacy to do so. We believe that a password, the signature of the device you use… Read more »

Enjoyed the article?

Get notified of new articles and relevant events.

Thank you for being a part of the CPO Magazine community.

Something went wrong.

Before you go ...

How about giving us a follow?

Or let us notify you of new articles and relevant events.

Thank you for being a part of the CPO Magazine community.

Something went wrong.

Follow CPO Magazine