Privacy sometimes means secrets

IPSWITCH survey results infographicA recent survey (Sep 2015) for IPSWITCH was broadly picked up by the tech press and highlighted the concerns of IT professionals with the looming EU General Data Protection Regulation (GDPR); 69% say their business will need to invest in new technologies or services to help prepare the business for the impact of GDPR including:
  • 62%: encryption
  • 61%: analytic and reporting
  • 53%: perimeter security
  • 42%: file sharing
This was shortly followed by the European Court of Justice ruling on the Schrems case concerning the Safe Harbour arrangements (Oct 2015).This has variously provoked doom laden stories and more measured pieces pointing out that many large companies have seen it coming and taken steps to put in place other legal means to ensure continued operations.

That said these two stories relate to only two of the eight principles (also see below) of the Data Protection Act in the UK, the remaining six presenting us with a whole series of further challenges to compliance. And that's the 1998 act, not even the pending GDPR.

Perhaps the increasing costs and complications of processing Personal Data might lead us to ask some questions about how we design at least some of our future IT systems to avoid the issue in the first place. In particular within the domain of the Internet of Things, there is a widespread presumption that the value in the data that the things communicate is only realised when simultaneously the data is shared (with a 2nd, possibly 3rd party) and the person identified.  We need to challenge this assumption from the perspectives of both the technology and the business model.

Projects such as the hoax drug testing toilet and the IoT toilet roll holder raise plenty of questions around sharing data that we would do well to keep in mind before building technology that at its heart presumes sharing is a good idea (*).

So IoT developing folks ask yourselves some questions:
  • Does this heating control accessible from a roaming mobile phone need to pass unencrypted data through a middle man, or should we take a leaf out of iMessage's book and just encrypt it end-to-end?
  • Ditto baby monitors.
  • Does this thermostat really need to know who I am, with name, address, etc or could it simply operate anonymously?
  • Smart washing machine doing condition monitoring - yes supply anonymous statistics of operation to the manufacturer, but maybe a monthly digest rather than a second by second stream of washing machine consciousness... in fact why not use email to send it and bcc me?
  • What value do you derive from data fusion across users - or is it simply that you wanted to obtain an even more detailed profile of me to sell to marketeers?
Fundamentally, is the majority of the value in IoT really in sharing data or in providing an enhanced product and value add to customers? And like the scorpion in the fable, is your desire to slurp data simply "In your nature...", but ultimately a bad choice for many IoT products.

(*) If you need a daily reminder of some of the lunacy out there, follow @internetofshit (too much toilet humour. ed.).



From the ICO website...

Schedule 1 to the Data Protection Act lists the data protection principles in the following terms:
  1. Personal data shall be processed fairly and lawfully and, in particular, shall not be processed unless:(a) at least one of the conditions in Schedule 2 is met, and (b) in the case of sensitive personal data, at least one of the conditions in Schedule 3 is also met.
  2. Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes.
  3. Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed.
  4. Personal data shall be accurate and, where necessary, kept up to date.
  5. Personal data processed for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes.
  6. Personal data shall be processed in accordance with the rights of data subjects under this Act.
  7. Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.
  8. Personal data shall not be transferred to a country or territory outside the European Economic Area unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data.
Written on October 8, 2015