SlideShare a Scribd company logo
1 of 70
GDPR for Things
Hello!
We’re Saskia Videler & Rob Heyman
What we’re going to talk about…
GDPR essentials
Data flow mapping
Privacy policies
Best practices
Disclaimer
We’re no
lawyers or legal
professionals!
Disclaimer
You could call us
“GDPR enthusiasts”
Disclaimer
Although that sounds
a bit odd as well…
Disclaimer
Anyway…
Primer Time
General Data Protection
Regulation - from May 25, 2018
• Privacy protection for European citizens

• No more boundless ‘harvesting’ of personal data 

• Only data they: 

• Need to operate their service for the customer

• Obtained with full consent of the customer

• Data must be stored in Europe and be removed after a few years

• Data subject must be able to edit, delete or transfer their data
6 principles of privacy
• Lawfulness, fairness and transparency.

• Purpose limitations.

• Data minimisation.

• Accuracy.

• Storage limitations.

• Integrity and confidentiality.
Rights of the data subject
• Right to information and transparency.

• Right of access and rectification.

• Right to erasure or “right to be forgotten”.

• Right to restriction.

• Right to data portability.
Wait, what data?
• Name, age/birthday, gender, address, etc.

• Meta data: location, device(s), frequency, networks,
connections, conversations, Mac-addresses, IP-
addresses, etc
GDPR & Things
They are in our homes.
They listen.
GDPR & Things
They are on our bodies.

They track.
GDPR & Things
They are in our
bedrooms.

They communicate.
GDPR for Things
They know stuff about us.

They know us.

Their makers know us. 

They can be hacked.
Privacy by design
How’s our
privacy literacy?
And that of our partners
and coworkers?
Privacy Literacy Survey
• It is not just a survey

It is also a FAQ applied to your area of work
• It is a manual

Through application to case, you understand what GDPR means
• It should be a living document

Like a FAQ, it should be updated with expert answers
• Ideal for company or sector wide codes of conduct

What is personal information
according to GDPR?
• Voice recording

• Mac address

• IP-address

• Number of visits

• Age ranges

• Professional email address

• Unique identifier

Summary

Personal data is any data that are able to single a (natural) person out of a crowd or a set of data AND that
allow someone to know who that person is. For example, MAC and IP-addresses are considered personal
data because they are unique per connected device and an ISP can look up these addresses and attach a
name or address to them.
What data are
we collecting?
Think about
• IP-addresses

• MAC-addresses

• Devices 

• Usage data

• Name, address, age, gender, relationships, family situation, etc.

• Recordings

• Heatmaps

• Etc.
What data do we
absolutely need to
operate our service?
How are you
acquiring this data?
?
Consent
Contract
Ask for personal data
in context
Allow them to say
NO
What happens with that
data? Who touches,
sees or processes it?
3rd parties?
Are they GDPR compliant?
Think about
• The services that you use for:

• User research

• Processing

• Analysis

• Delivery of physical products
What could go wrong?
How can we prevent that
from happening?
Think about
• Creation and management Data Flow map

• GDPR task force, feat. DPO

• Government (roles, who’s responsible for what?)

• Plan for problems, escalations, emergencies
How do we talk about
personal data
to our users?
Think about
• Being clear about your goals

• Being clear about data processing

• Use plain, easy to understand, language
How can our users
edit or delete
their data?
Think about
• Flow of this process, the usability

• The UX

• Actual editing / deletion of data everywhere in the chain

• All data you’ve collected of your users! 

That includes meta data, conversations, etc.
Ps: check out roeckoe.be for a cool case about this!
How can our users
transfer
their data?
Think about
• What does the data look like?

• What format is it?

• How are you going to deliver it to them?

• What does the flow look like?
Data Flow Mapping
Goal and focus
Focus
Accessibility before accuracy

Mapping instead of assessing

Why?
Best starting point for anything data related

Negotiations on data ‘ownership’, thinking of alternatives

Data protection impact assessment requires a mapping
Check list
• Three big white papers or (flip-over) sheets +/- A3 size.

• Two markers; one red, one green.

• At least one regular blue pen.

• Big post-its in a striking colour, e.g. yellow.

• Smaller post-its, in two colours, e.g. orange and green.

• An empty ‘Information Asset Inventory’ sheet.

• Camera (phone camera will do).
Case 1: Alexa
Case 2: Tracking runners on
a running track
• Runners run over a track
with three wifi access
points that hash mac
addresses

• Unique hashes signify the
number of runners

• Returning hashes are
used to measure average
speeds
Step one: prepare your
paper
• Draw a horizontal axis representing time

• Draw a vertical axis representing data subject visibility
Datasubject
Time
Step two: adding data
points
• Add data points: Data points are places where you can
find personal data in your process

• Name or label the different data points
CV
stack
Rejected
but
interesting
Closet at
HR
Step three: connecting the
dots
As data moves through the data cycle, data points are connected by transmissions.
Use a post-it in another colour (orange, for example) for each transmission.

• Draw arrows with a marker between data points to represent the flow or
exchange of data. These flows can be one-way or two-way.

• Add a transmission post-it to each arrow or between two data points. Describe
on it:

• The medium type of the transmission, (e.g. browser; email; dropbox). 

• The encryption type of the transmission (e.g. none, end-to-end).

• Whether the transmission concerns all or partial data.

• Go through all data points and transmissions once more. Discuss if any are
missing, and if necessary, use additional post-its to add to the data flow.
step three: connecting the
dots
CV
stack
Rejected
but
interesting
Closet at
HR
Mail
none
all
Folder
none
some
Folder
none
some
Step four: Control and
access
• Draw circles with a green marker around (groupings of) data point(s),
indicating the controlling organisation for one or more data points. Name
these areas.

• Check if a transmission or data point is part of a larger system or coupled
with other systems. If so, write down the name of this system on a post-it
in a new colour (e.g. green) and find out if other parties have access to the
data. E.g. if Google Docs is used to store or move data, check if Google
has access.

• Which data points or transmissions are most likely to have an extra pair
of eyes watching, and where is a download easily made? In case of a
loose end, someone or something else has access. This can be within or
outside of your organisation. If you recognize a loose end and a risk of
data doubles, write a ‘!’ on the data point, transmission or coupled system
note and add who and what could be copied outside your process.
step four: control and
access
CV
folder on
John’s pc
Rejected
but
interesting
Folder
Closet at
HR
Email
none
all
Shared
Printer
none
some
Folder
none
some
Email
provider
Anyone
at our
company
Anyone
with a
key
?
who has
a key?
Step five: Identify the gaps
• Having a complete data flow is near impossible

• Add names to missing information and contact these
Step six: fill in your data
asset register
• Aim: have a more detailed view of the data

• Handy to discuss data minimalization, storage and
deletion
Data point name -
number
Category
Data value in
database
Personal data
category
Intended
recipients of data
Retention period
or expiery date?
Who controls this
data?
Storage location Storage medium Security measures Purpose Initial source
Consent or legal
permission
Secondary use:
goal compatibility
CV
folder on
John’s pc
Rejected
but
interesting
Folder
Closet at
HR
Email
none
all
Shared
Printer
none
some
Folder
none
some
Email
provider
Anyone
at our
company
Anyone
with a
key
?
who has
a key?
Questions for after the
mapping
• Do I collect before or after asking consent 

• Is all data processed on EU soil?

• Where do I need more access control?

• What if someone asks for the right to access, deletion,
rectification?

• Is there data I do not need at a given point?

• Are there people with access to data they don’t need?
Privacy Statements
How to fix your
privacy policy
Communicating about privacy:
account
Communicating about privacy:
in a survey
Communicating about privacy:
checkout & payment
Communicating about privacy:
privacy statement
How to fix your
privacy policy
Clear, unambiguous language.

No jargon or legalese.

Example from Age.co.uk
How to fix your
privacy policy
Use icons to communicate
the privacy policy.

Icon set from Aza Raskin at
Mozilla
How to fix your
privacy policy
What to needs to be in there?
• Data protection officer contact details

• Purposes

• Legal grounds

• Recipients

• Data transfers outside EU

• Storage times of data

• Users have a right to:

• access, port data, rectify, erase, object, withdraw consent

• Complain at data protection authority

• If there is automated decisions making

• If data is needed for a contract, what happens if a user does not provide data
We are ___________. You can contact us here ________.

We collect the following data from you _______,________,_______,_________.

We use __________ for _________. 

We use __________ for _________. 

We use __________ for _________. 

This data is being collected by / through ______________________.

Your data is automatically removed from all of our records after _______. 

Who has access to your data: (third parties) _______,________,_______,_________.

How secure is your information? (encryption, SSL, disclaimers)
________________________________. 

If you want to view, edit or remove your data, you can go here and do so ________________ /
contact us here __________________.
How to fix your
privacy policy
More info
The official text of the regulation: 

http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32016R0679

The regulation explained by the European Commission: http://
ec.europa.eu/justice/data-protection/index_en.htm

The podcasts we’ve made about GDPR, UX and content:

https://www.efficientlyeffective.fm

Privacy by Design guidelines:

https://www.enisa.europa.eu/topics/data-protection/privacy-by-design?
tab=publications 

Remember to check with privacy experts and legal professionals for your
specific situation.
Do I know enough?
Do they know enough?
• RTFM! 99 Articles, 88 pages, not exactly a best seller

If you have not read it, can you expect your partners/employees to do
so?
• Thinking you know something

Is sometimes not good enough
• Personal information, what is it?

Forget mapping data flows if you are not sure
• ‘Privacy literacy survey’ to the rescue

Check your literacy level and see what’s needed
• Click here for the current prototype
• Ask for consent and data in context. 

Be clear, transparent and fair.
• Handle personal data with care.

Allow for viewing, editing and deleting by data subject.
• Know your dataflows! 

Risk assessments need to be done regularly.
• Fix your privacy policy. 

Make it easy to understand, no legalese allowed!
• GDPR is actually good for UX 

It will guide design and content towards transparent, clear
communication and trust.
5 key takeaways
Efficiently
Effective Podcast
efficientlyeffective.fm
Thank
you!

More Related Content

Similar to GDPR for Things - ThingsCon Amsterdam 2017

Data science.chapter-1,2,3
Data science.chapter-1,2,3Data science.chapter-1,2,3
Data science.chapter-1,2,3varshakumar21
 
GDPR: Leverage the Power of Graphs
GDPR: Leverage the Power of GraphsGDPR: Leverage the Power of Graphs
GDPR: Leverage the Power of GraphsNeo4j
 
Your AI and ML Projects Are Failing – Key Steps to Get Them Back on Track
Your AI and ML Projects Are Failing – Key Steps to Get Them Back on TrackYour AI and ML Projects Are Failing – Key Steps to Get Them Back on Track
Your AI and ML Projects Are Failing – Key Steps to Get Them Back on TrackPrecisely
 
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital MarketersOne North
 
10 commandments in rdm funder compliancy
10 commandments in rdm funder compliancy10 commandments in rdm funder compliancy
10 commandments in rdm funder compliancyHannelore Vanhaverbeke
 
Data Profiling: The First Step to Big Data Quality
Data Profiling: The First Step to Big Data QualityData Profiling: The First Step to Big Data Quality
Data Profiling: The First Step to Big Data QualityPrecisely
 
Webinar: An EU regulation affecting companies worldwide - GDPR
Webinar: An EU regulation affecting companies worldwide - GDPRWebinar: An EU regulation affecting companies worldwide - GDPR
Webinar: An EU regulation affecting companies worldwide - GDPRpanagenda
 
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...emermell
 
Bda assignment can also be used for BDA notes and concept understanding.
Bda assignment can also be used for BDA notes and concept understanding.Bda assignment can also be used for BDA notes and concept understanding.
Bda assignment can also be used for BDA notes and concept understanding.Aditya205306
 
Writing a successful data management plan with the DMPTool
Writing a successful data management plan with the DMPToolWriting a successful data management plan with the DMPTool
Writing a successful data management plan with the DMPToolkfear
 
SMS and GDPR - what you need to know to be compliant
SMS and GDPR - what you need to know to be compliantSMS and GDPR - what you need to know to be compliant
SMS and GDPR - what you need to know to be compliantEsendex
 
classIX_DS_Teacher_Presentation.pptx
classIX_DS_Teacher_Presentation.pptxclassIX_DS_Teacher_Presentation.pptx
classIX_DS_Teacher_Presentation.pptxXICSStudents
 
Digital Marketing Analytics Certification - Session One
Digital Marketing Analytics Certification - Session OneDigital Marketing Analytics Certification - Session One
Digital Marketing Analytics Certification - Session OneBrand Digital, Inc
 
[Webinar Slides] 3 Steps to Organizing, Finding, and Governing Your Information
[Webinar Slides] 3 Steps to Organizing, Finding, and Governing Your Information[Webinar Slides] 3 Steps to Organizing, Finding, and Governing Your Information
[Webinar Slides] 3 Steps to Organizing, Finding, and Governing Your InformationAIIM International
 
GDPR - Why it matters and how to make it Easy
GDPR - Why it matters and how to make it EasyGDPR - Why it matters and how to make it Easy
GDPR - Why it matters and how to make it EasyPaul McQuillan
 
Fueling Your Growth With Smart Data Management
Fueling Your Growth With Smart Data ManagementFueling Your Growth With Smart Data Management
Fueling Your Growth With Smart Data ManagementMDR
 
Dark data by Worapol Alex Pongpech
Dark data by Worapol Alex PongpechDark data by Worapol Alex Pongpech
Dark data by Worapol Alex PongpechBAINIDA
 
From Asset to Impact - Presentation to ICS Data Protection Conference 2011
From Asset to Impact - Presentation to ICS Data Protection Conference 2011From Asset to Impact - Presentation to ICS Data Protection Conference 2011
From Asset to Impact - Presentation to ICS Data Protection Conference 2011Castlebridge Associates
 

Similar to GDPR for Things - ThingsCon Amsterdam 2017 (20)

Data science.chapter-1,2,3
Data science.chapter-1,2,3Data science.chapter-1,2,3
Data science.chapter-1,2,3
 
GDPR: Leverage the Power of Graphs
GDPR: Leverage the Power of GraphsGDPR: Leverage the Power of Graphs
GDPR: Leverage the Power of Graphs
 
Your AI and ML Projects Are Failing – Key Steps to Get Them Back on Track
Your AI and ML Projects Are Failing – Key Steps to Get Them Back on TrackYour AI and ML Projects Are Failing – Key Steps to Get Them Back on Track
Your AI and ML Projects Are Failing – Key Steps to Get Them Back on Track
 
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
 
10 commandments in rdm funder compliancy
10 commandments in rdm funder compliancy10 commandments in rdm funder compliancy
10 commandments in rdm funder compliancy
 
Data science unit1
Data science unit1Data science unit1
Data science unit1
 
Data Profiling: The First Step to Big Data Quality
Data Profiling: The First Step to Big Data QualityData Profiling: The First Step to Big Data Quality
Data Profiling: The First Step to Big Data Quality
 
Webinar: An EU regulation affecting companies worldwide - GDPR
Webinar: An EU regulation affecting companies worldwide - GDPRWebinar: An EU regulation affecting companies worldwide - GDPR
Webinar: An EU regulation affecting companies worldwide - GDPR
 
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
 
Bda assignment can also be used for BDA notes and concept understanding.
Bda assignment can also be used for BDA notes and concept understanding.Bda assignment can also be used for BDA notes and concept understanding.
Bda assignment can also be used for BDA notes and concept understanding.
 
Writing a successful data management plan with the DMPTool
Writing a successful data management plan with the DMPToolWriting a successful data management plan with the DMPTool
Writing a successful data management plan with the DMPTool
 
SMS and GDPR - what you need to know to be compliant
SMS and GDPR - what you need to know to be compliantSMS and GDPR - what you need to know to be compliant
SMS and GDPR - what you need to know to be compliant
 
classIX_DS_Teacher_Presentation.pptx
classIX_DS_Teacher_Presentation.pptxclassIX_DS_Teacher_Presentation.pptx
classIX_DS_Teacher_Presentation.pptx
 
Digital Marketing Analytics Certification - Session One
Digital Marketing Analytics Certification - Session OneDigital Marketing Analytics Certification - Session One
Digital Marketing Analytics Certification - Session One
 
[Webinar Slides] 3 Steps to Organizing, Finding, and Governing Your Information
[Webinar Slides] 3 Steps to Organizing, Finding, and Governing Your Information[Webinar Slides] 3 Steps to Organizing, Finding, and Governing Your Information
[Webinar Slides] 3 Steps to Organizing, Finding, and Governing Your Information
 
GDPR - Why it matters and how to make it Easy
GDPR - Why it matters and how to make it EasyGDPR - Why it matters and how to make it Easy
GDPR - Why it matters and how to make it Easy
 
Balancing Privacy and Digitization
Balancing Privacy and DigitizationBalancing Privacy and Digitization
Balancing Privacy and Digitization
 
Fueling Your Growth With Smart Data Management
Fueling Your Growth With Smart Data ManagementFueling Your Growth With Smart Data Management
Fueling Your Growth With Smart Data Management
 
Dark data by Worapol Alex Pongpech
Dark data by Worapol Alex PongpechDark data by Worapol Alex Pongpech
Dark data by Worapol Alex Pongpech
 
From Asset to Impact - Presentation to ICS Data Protection Conference 2011
From Asset to Impact - Presentation to ICS Data Protection Conference 2011From Asset to Impact - Presentation to ICS Data Protection Conference 2011
From Asset to Impact - Presentation to ICS Data Protection Conference 2011
 

More from Saskia Videler

Creatief en ethisch verantwoord schrijven - Presidia 2017
Creatief en ethisch verantwoord schrijven - Presidia 2017Creatief en ethisch verantwoord schrijven - Presidia 2017
Creatief en ethisch verantwoord schrijven - Presidia 2017Saskia Videler
 
A World Class Website for a Small Town
A World Class Website for a Small Town A World Class Website for a Small Town
A World Class Website for a Small Town Saskia Videler
 
Content Strategy at Brussels Drupal Meetup
Content Strategy at Brussels Drupal Meetup Content Strategy at Brussels Drupal Meetup
Content Strategy at Brussels Drupal Meetup Saskia Videler
 
Why your next BFF is probably a Content Strategist
Why your next BFF is probably a Content StrategistWhy your next BFF is probably a Content Strategist
Why your next BFF is probably a Content StrategistSaskia Videler
 
Content Strategy & Content Marketing
Content Strategy & Content Marketing Content Strategy & Content Marketing
Content Strategy & Content Marketing Saskia Videler
 
Content Creatie & Content Strategie voor Mediaraven
Content Creatie & Content Strategie voor MediaravenContent Creatie & Content Strategie voor Mediaraven
Content Creatie & Content Strategie voor MediaravenSaskia Videler
 
Your big break with Social Media
Your big break with Social MediaYour big break with Social Media
Your big break with Social MediaSaskia Videler
 
Social Media Shit Happens
Social Media Shit HappensSocial Media Shit Happens
Social Media Shit HappensSaskia Videler
 

More from Saskia Videler (8)

Creatief en ethisch verantwoord schrijven - Presidia 2017
Creatief en ethisch verantwoord schrijven - Presidia 2017Creatief en ethisch verantwoord schrijven - Presidia 2017
Creatief en ethisch verantwoord schrijven - Presidia 2017
 
A World Class Website for a Small Town
A World Class Website for a Small Town A World Class Website for a Small Town
A World Class Website for a Small Town
 
Content Strategy at Brussels Drupal Meetup
Content Strategy at Brussels Drupal Meetup Content Strategy at Brussels Drupal Meetup
Content Strategy at Brussels Drupal Meetup
 
Why your next BFF is probably a Content Strategist
Why your next BFF is probably a Content StrategistWhy your next BFF is probably a Content Strategist
Why your next BFF is probably a Content Strategist
 
Content Strategy & Content Marketing
Content Strategy & Content Marketing Content Strategy & Content Marketing
Content Strategy & Content Marketing
 
Content Creatie & Content Strategie voor Mediaraven
Content Creatie & Content Strategie voor MediaravenContent Creatie & Content Strategie voor Mediaraven
Content Creatie & Content Strategie voor Mediaraven
 
Your big break with Social Media
Your big break with Social MediaYour big break with Social Media
Your big break with Social Media
 
Social Media Shit Happens
Social Media Shit HappensSocial Media Shit Happens
Social Media Shit Happens
 

Recently uploaded

SMOTE and K-Fold Cross Validation-Presentation.pptx
SMOTE and K-Fold Cross Validation-Presentation.pptxSMOTE and K-Fold Cross Validation-Presentation.pptx
SMOTE and K-Fold Cross Validation-Presentation.pptxHaritikaChhatwal1
 
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Thomas Poetter
 
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...Boston Institute of Analytics
 
why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...
why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...
why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...Jack Cole
 
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdfEnglish-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdfblazblazml
 
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Boston Institute of Analytics
 
Digital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing worksDigital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing worksdeepakthakur548787
 
Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)Cathrine Wilhelmsen
 
IBEF report on the Insurance market in India
IBEF report on the Insurance market in IndiaIBEF report on the Insurance market in India
IBEF report on the Insurance market in IndiaManalVerma4
 
Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBoston Institute of Analytics
 
Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Seán Kennedy
 
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...Amil Baba Dawood bangali
 
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...Dr Arash Najmaei ( Phd., MBA, BSc)
 
Learn How Data Science Changes Our World
Learn How Data Science Changes Our WorldLearn How Data Science Changes Our World
Learn How Data Science Changes Our WorldEduminds Learning
 
Cyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded dataCyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded dataTecnoIncentive
 
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Boston Institute of Analytics
 
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024Susanna-Assunta Sansone
 
Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Seán Kennedy
 

Recently uploaded (20)

SMOTE and K-Fold Cross Validation-Presentation.pptx
SMOTE and K-Fold Cross Validation-Presentation.pptxSMOTE and K-Fold Cross Validation-Presentation.pptx
SMOTE and K-Fold Cross Validation-Presentation.pptx
 
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
 
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
 
Insurance Churn Prediction Data Analysis Project
Insurance Churn Prediction Data Analysis ProjectInsurance Churn Prediction Data Analysis Project
Insurance Churn Prediction Data Analysis Project
 
why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...
why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...
why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...
 
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdfEnglish-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
 
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
 
Digital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing worksDigital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing works
 
Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)
 
IBEF report on the Insurance market in India
IBEF report on the Insurance market in IndiaIBEF report on the Insurance market in India
IBEF report on the Insurance market in India
 
Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
 
Data Analysis Project: Stroke Prediction
Data Analysis Project: Stroke PredictionData Analysis Project: Stroke Prediction
Data Analysis Project: Stroke Prediction
 
Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...
 
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
 
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
 
Learn How Data Science Changes Our World
Learn How Data Science Changes Our WorldLearn How Data Science Changes Our World
Learn How Data Science Changes Our World
 
Cyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded dataCyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded data
 
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
 
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024
 
Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...
 

GDPR for Things - ThingsCon Amsterdam 2017

  • 3. What we’re going to talk about… GDPR essentials Data flow mapping Privacy policies Best practices
  • 4. Disclaimer We’re no lawyers or legal professionals!
  • 5. Disclaimer You could call us “GDPR enthusiasts”
  • 9. General Data Protection Regulation - from May 25, 2018 • Privacy protection for European citizens • No more boundless ‘harvesting’ of personal data • Only data they: • Need to operate their service for the customer • Obtained with full consent of the customer • Data must be stored in Europe and be removed after a few years • Data subject must be able to edit, delete or transfer their data
  • 10. 6 principles of privacy • Lawfulness, fairness and transparency. • Purpose limitations. • Data minimisation. • Accuracy. • Storage limitations. • Integrity and confidentiality.
  • 11. Rights of the data subject • Right to information and transparency. • Right of access and rectification. • Right to erasure or “right to be forgotten”. • Right to restriction. • Right to data portability.
  • 12. Wait, what data? • Name, age/birthday, gender, address, etc. • Meta data: location, device(s), frequency, networks, connections, conversations, Mac-addresses, IP- addresses, etc
  • 13. GDPR & Things They are in our homes. They listen.
  • 14. GDPR & Things They are on our bodies.
 They track.
  • 15. GDPR & Things They are in our bedrooms.
 They communicate.
  • 16. GDPR for Things They know stuff about us. They know us. Their makers know us. They can be hacked.
  • 18. How’s our privacy literacy? And that of our partners and coworkers?
  • 19. Privacy Literacy Survey • It is not just a survey
 It is also a FAQ applied to your area of work • It is a manual
 Through application to case, you understand what GDPR means • It should be a living document
 Like a FAQ, it should be updated with expert answers • Ideal for company or sector wide codes of conduct

  • 20. What is personal information according to GDPR? • Voice recording • Mac address • IP-address • Number of visits • Age ranges • Professional email address • Unique identifier Summary Personal data is any data that are able to single a (natural) person out of a crowd or a set of data AND that allow someone to know who that person is. For example, MAC and IP-addresses are considered personal data because they are unique per connected device and an ISP can look up these addresses and attach a name or address to them.
  • 21. What data are we collecting?
  • 22. Think about • IP-addresses • MAC-addresses • Devices • Usage data • Name, address, age, gender, relationships, family situation, etc. • Recordings • Heatmaps • Etc.
  • 23. What data do we absolutely need to operate our service?
  • 24. How are you acquiring this data? ?
  • 26. Ask for personal data in context
  • 27. Allow them to say NO
  • 28. What happens with that data? Who touches, sees or processes it? 3rd parties? Are they GDPR compliant?
  • 29. Think about • The services that you use for: • User research • Processing • Analysis • Delivery of physical products
  • 30. What could go wrong? How can we prevent that from happening?
  • 31. Think about • Creation and management Data Flow map • GDPR task force, feat. DPO • Government (roles, who’s responsible for what?) • Plan for problems, escalations, emergencies
  • 32. How do we talk about personal data to our users?
  • 33. Think about • Being clear about your goals • Being clear about data processing • Use plain, easy to understand, language
  • 34.
  • 35. How can our users edit or delete their data?
  • 36. Think about • Flow of this process, the usability • The UX • Actual editing / deletion of data everywhere in the chain • All data you’ve collected of your users! 
 That includes meta data, conversations, etc.
  • 37. Ps: check out roeckoe.be for a cool case about this!
  • 38. How can our users transfer their data?
  • 39. Think about • What does the data look like? • What format is it? • How are you going to deliver it to them? • What does the flow look like?
  • 40.
  • 42. Goal and focus Focus Accessibility before accuracy Mapping instead of assessing Why? Best starting point for anything data related Negotiations on data ‘ownership’, thinking of alternatives Data protection impact assessment requires a mapping
  • 43. Check list • Three big white papers or (flip-over) sheets +/- A3 size. • Two markers; one red, one green. • At least one regular blue pen. • Big post-its in a striking colour, e.g. yellow. • Smaller post-its, in two colours, e.g. orange and green. • An empty ‘Information Asset Inventory’ sheet. • Camera (phone camera will do).
  • 45. Case 2: Tracking runners on a running track • Runners run over a track with three wifi access points that hash mac addresses • Unique hashes signify the number of runners • Returning hashes are used to measure average speeds
  • 46. Step one: prepare your paper • Draw a horizontal axis representing time • Draw a vertical axis representing data subject visibility Datasubject Time
  • 47. Step two: adding data points • Add data points: Data points are places where you can find personal data in your process • Name or label the different data points CV stack Rejected but interesting Closet at HR
  • 48. Step three: connecting the dots As data moves through the data cycle, data points are connected by transmissions. Use a post-it in another colour (orange, for example) for each transmission. • Draw arrows with a marker between data points to represent the flow or exchange of data. These flows can be one-way or two-way. • Add a transmission post-it to each arrow or between two data points. Describe on it: • The medium type of the transmission, (e.g. browser; email; dropbox). • The encryption type of the transmission (e.g. none, end-to-end). • Whether the transmission concerns all or partial data. • Go through all data points and transmissions once more. Discuss if any are missing, and if necessary, use additional post-its to add to the data flow.
  • 49. step three: connecting the dots CV stack Rejected but interesting Closet at HR Mail none all Folder none some Folder none some
  • 50. Step four: Control and access • Draw circles with a green marker around (groupings of) data point(s), indicating the controlling organisation for one or more data points. Name these areas. • Check if a transmission or data point is part of a larger system or coupled with other systems. If so, write down the name of this system on a post-it in a new colour (e.g. green) and find out if other parties have access to the data. E.g. if Google Docs is used to store or move data, check if Google has access. • Which data points or transmissions are most likely to have an extra pair of eyes watching, and where is a download easily made? In case of a loose end, someone or something else has access. This can be within or outside of your organisation. If you recognize a loose end and a risk of data doubles, write a ‘!’ on the data point, transmission or coupled system note and add who and what could be copied outside your process.
  • 51. step four: control and access CV folder on John’s pc Rejected but interesting Folder Closet at HR Email none all Shared Printer none some Folder none some Email provider Anyone at our company Anyone with a key ? who has a key?
  • 52. Step five: Identify the gaps • Having a complete data flow is near impossible • Add names to missing information and contact these
  • 53. Step six: fill in your data asset register • Aim: have a more detailed view of the data • Handy to discuss data minimalization, storage and deletion Data point name - number Category Data value in database Personal data category Intended recipients of data Retention period or expiery date? Who controls this data? Storage location Storage medium Security measures Purpose Initial source Consent or legal permission Secondary use: goal compatibility
  • 54. CV folder on John’s pc Rejected but interesting Folder Closet at HR Email none all Shared Printer none some Folder none some Email provider Anyone at our company Anyone with a key ? who has a key?
  • 55. Questions for after the mapping • Do I collect before or after asking consent • Is all data processed on EU soil? • Where do I need more access control? • What if someone asks for the right to access, deletion, rectification? • Is there data I do not need at a given point? • Are there people with access to data they don’t need?
  • 57. How to fix your privacy policy
  • 62. How to fix your privacy policy Clear, unambiguous language.
 No jargon or legalese. Example from Age.co.uk
  • 63. How to fix your privacy policy Use icons to communicate the privacy policy. Icon set from Aza Raskin at Mozilla
  • 64. How to fix your privacy policy
  • 65. What to needs to be in there? • Data protection officer contact details • Purposes • Legal grounds • Recipients • Data transfers outside EU • Storage times of data • Users have a right to: • access, port data, rectify, erase, object, withdraw consent • Complain at data protection authority • If there is automated decisions making • If data is needed for a contract, what happens if a user does not provide data
  • 66. We are ___________. You can contact us here ________. We collect the following data from you _______,________,_______,_________. We use __________ for _________. 
 We use __________ for _________. 
 We use __________ for _________. This data is being collected by / through ______________________. Your data is automatically removed from all of our records after _______. Who has access to your data: (third parties) _______,________,_______,_________. How secure is your information? (encryption, SSL, disclaimers) ________________________________. If you want to view, edit or remove your data, you can go here and do so ________________ / contact us here __________________. How to fix your privacy policy
  • 67. More info The official text of the regulation: 
 http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32016R0679 The regulation explained by the European Commission: http:// ec.europa.eu/justice/data-protection/index_en.htm The podcasts we’ve made about GDPR, UX and content:
 https://www.efficientlyeffective.fm Privacy by Design guidelines:
 https://www.enisa.europa.eu/topics/data-protection/privacy-by-design? tab=publications Remember to check with privacy experts and legal professionals for your specific situation.
  • 68. Do I know enough? Do they know enough? • RTFM! 99 Articles, 88 pages, not exactly a best seller
 If you have not read it, can you expect your partners/employees to do so? • Thinking you know something
 Is sometimes not good enough • Personal information, what is it?
 Forget mapping data flows if you are not sure • ‘Privacy literacy survey’ to the rescue
 Check your literacy level and see what’s needed • Click here for the current prototype
  • 69. • Ask for consent and data in context. 
 Be clear, transparent and fair. • Handle personal data with care.
 Allow for viewing, editing and deleting by data subject. • Know your dataflows! 
 Risk assessments need to be done regularly. • Fix your privacy policy. 
 Make it easy to understand, no legalese allowed! • GDPR is actually good for UX 
 It will guide design and content towards transparent, clear communication and trust. 5 key takeaways