Data Protection Goals
The Pros and Cons of Formalising Privacy Requirements for technical Systems
martin.degeling@ruhr-uni-bochum.de
München/Munich, 1.11.2013
Information and Technology Tanagement
Institute for Work Science
Ruhr-University Bochum
Data Protection deals with informational Privacy

Privacy and Data Protection
Coined by lawyers to regulate IT systems
in contrast to e.g. Rössler, B. (2005). The value of privacy. (R. D. V. Glasgow, Trans.)
(English ed.). Cambridge, UK ; Malden, MA: Polity.
the individual (fundamental but negotiable) right for 
informational self-determination
BverfG. (1983). Urteil vom 15. Dezember 1983.
Referes to
A Model of §3 Abs. 1 BDSG (Federal Data Protection Law in Germany)
--
From a lecture on "Data Protection" for students of computer science
Quest: Translating Laws to Models for IT
Privacy Breach: Improper Access
My university could use the data
to verify my traveling an call Andreas
Privacy Breach: Use for secondary purpose
A commercial mail provider could 
send Andreas product information about 
alternative mail clients. 
Privacy Breach: Use group information for
secondary purpose 
Google could invite all recipients to connect to
each other in their new google+scholar
The General Privacy Problem in there
I have no control about how information about me is processed by the 
service providers of my recipients. Technically they could do anything described.

1. Rost, M. (2013). Zur Soziologie des Datenschutzes.
Datenschutz und Datensicherheit, 37(2), 85–91.

Data Protection should reduce power asymmetries 
between individuals and organisations¹
The Requirement to IT from Data Protection
How can misuse of personal 
information be prevented?
  • How much information flow should still be possible?
  • How can misuse be detected?
  • What defines un-authorised access?
  • Who should have control about each part of the system?
  • What data is necessary for operation?
  • ...

Guidlines for informational privacy problems were first developed from a
juristic perspective

Bizer, J. (2007). Sieben Goldene Regeln des Datenschutzes.
Datenschutz und Datensicherheit - DuD, 31(5), 350–356.
doi:10.1007/s11623-007-0133-x

Definig Data Protection Guidelines
Reidenberg, J. R. (1994). Setting Standards for Fair Information
 Practice
in the US Private Sector. Iowa L. Rev., 80, 497

  1. Notice/Awareness
  2. Choice/Consent
  3. Access/Participation
  4. Integrity/Security
  5. Enforcement/Redress
Fair Information Practices
Golden Rules Of Data Protection
  1. Lawfulness
  2. Consent
  3. Purpose
  4. Minimization/Deletion
  5. Transparency
  6. Security
  7. Control
The Problem with the guidelines
following Rost this is a problem of different
spheres in a functional differentiated society
translation from guidelines to principles 
lead to ambiguities
How to ensure that the legal requirements are technically implemented?
following: Rost, M., & Storf, K. (2013). Zur Konditionierung von Technik und Recht
mittels Schutzzielen. In M. Horbach (Ed.), Proceedings (Vol. 220, pp. 2149–2166). Koblenz: Springer.
It is only allowed to store data as long
as it is needed for the purpose it is 
collected for
Deletion = removing access (moving to
trash folder) THEN wiping it from a hard disk 
THEN proceed with deletion in
all backups and copies on redundant devices

Legal Perspective on Purpose
Translation in to technical Context
Operationalize Data Protection Guidelines
Data Protection Goals
Rost, M., & Pfitzmann, A. (2009). Datenschutz-Schutzziele — revisited.
Datenschutz und Datensicherheit - DuD, 33(6), 353–358.
 doi:10.1007/s11623-009-0072-9

Datenschutz-Schutzziele
focus on keeping an organisational
infrastructure in tact
the CIA triade
New Data Protection Goals
  • Transparency
  • Unlinkability
  • Ability to intervene

focus on the data and the processing workflows.

Integrity
Ability to Intervene
make sure everything
works correct

allow data subjects to
intervene in the data processing
of their data

design workflows that are capable
of changing data sets e.g. delete 
data on all clients; or offer choice for
ad programms
- protect against cyber attacks
 (or spam)
- log access
Unlinkability
Transparency
prevent secondary use
allow data subjects
to know which data is processed
for which purpose

- physcially separated data storages e.g.
  mail-serverdata and other data
- usage of different accounts for different
   services
- privacy dashboards e.g. showing
how much you mailed to whom
Availability
Confidentiality
- use redundant systems to prevent
  data loss 
- allow access from mulitple interfaces
  (web, mail-client)
data should be (easily) accessible
- implement access control
  to limit access (e.g. do not allow 
  admins to read mails)
- use encryption (on all levels)
reduce access rigts
as much as possible

Conclusions
The Pros and Cons of DPGs
The Goal of Data Protection Goals
  • support communication between legal and technical experts
    by building a common language
  • can be used to normalize an understanding of privacy
    in technical processes and make measures comparable
  • supporting a proactive, privacy-aware technology
    development 
The Standard Data Protection Model
Image Source: http://www.datenschutzziele.de/sdm/work.html
Activities developed from Data Protection Goals
For : Data, Systems and Processes
Probst, T. (2012). Generische Schutzmaßnahmen für Datenschutz-Schutzziele.
Datenschutz und Datensicherheit - DuD, 36(6), 439–444.

Changing the game
DPGs are more proactive (like PrivacyByDesign and PETs)
 
It is no longer necessary to evaluate what is technically
possible and remove features,
but to include data protective features from the beginnen

Rost, M., & Bock, K. (2011). Privacy By Design und die Neuen Schutzziele.
Datenschutz und Datensicherheit, 35(1), 30–35.


  1. .. only indirectly help reducing power asymmetries
  2. .. do not support a broader undestanding of privacy
    besides the known invidual and information focussed

DPGs
Although conceptualized with a broader focus
DPGs are more a meachnism of regulating 
information flows to achieve 
the optimized balance between 
privacy and interestes of data processors
Privacy is not just an information
flow that has to be regulated

checklists offer backdoors for service providers
to be able to avoid discussions about
the influence of their practices on privacy
DPGs make it easy to avoid discussions
although the data protection discussions and its
 normative definition of privacy are not purely focus 
on the  individual (data-subject) DPGs do not
allow broader notions of privacy
The Assumption of the
Autonomous Data Subjects
That's it
thanks
although there are detailed measurements those 
do not support individual autonomy but a design 
for a 'one size fits all' understanding of privacy
DPGs can be 'one size fits all'