Skip to content
Permalink
master
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Go to file
 
 
Cannot retrieve contributors at this time

Data for Good and Evil

Before considering the legal aspects of data collection and processing, consider the power of data. Below are two cases where data has had a large impact on society. They are just examples and we could easily find many more.

Saving Lives

"A clinical trial looked at the potential for a new type of bowel screening to save lives. Following 170,432 people for an average of 11 years, the trial showed that this one off screening could save thousands of lives, through early diagnosis and prevention, and led to it being adopted by the NHS in England. Patient data was used to identify appropriate people for the trial and then to monitor what happened to them after screening."

https://understandingpatientdata.org.uk/case-study/screening-bowel-cancer

Subverting Democracy

"We have found evidence of formally organized social media manipulation campaigns in 48 countries, up from 28 countries last year. In each country there is at least one political party or government agency using social media to manipulate public opinion domestically."

http://comprop.oii.ox.ac.uk/research/cybertroops2018/

General Data Protection Regulation (GDPR)

The GDPR is a Europe-wide regulation.

The GDPR deals with the security and confidentiality of personal information. In short, it demands that anyone who collects, stores or processes personal information does so securely.

The regulations state that data is required to be ‘processed in a manner that ensures appropriate security of the personal data, including protection against unauthorised or unlawful processing and against accidental loss, destruction or damage, using appropriate technical or organisational measures’

Rather than just expect "best efforts", GDPR demands that at the design stage and during execution, any data collection or processing will be combined with appropriate technical and procedural controls that ensure that personal data is secure. This is known as "data protection by design".

In the UK, the GDPR is implemented as the Data Protection Act 2018.

Requirements

GDPR requires:

  • That no more personal data is collected than necessary
  • Access to personal data is managed and minimised
  • Confidentiality, Integrity and Availability (known as the CIA triangle) of the data are protected
  • Resilience and usable back-ups in case of incident
  • Regular testing of the effectiveness of measures implemented

Rights

The GDP gives the public a set of rights concerning their data:

The Right to be Informed

Simply put, when data is collected about an individual, they should be informed clearly.

The Right of Access

Individuals about whom data is collected have the right to access that data.

The Right to Rectification

Individuals have the right to have their data corrected if it is inaccurate or incomplete.

The Right to Erasure

Individuals have the right to request that their data is removed from a system. The request may be denied if it is required for valid and legal reasons.

The Right to Restrict Processing

Individuals have the right to request that rocessing of their personal data is halted if they believe their it is inaccurate and not have it resume until the issue is resolved.

The Right to Data Portability

For electronic records, users of a system can request their data to be made available in a portable format. For example, you should be able to request all of your e-mails from your e-mail provider in a format that you can then import into another e-mail service.

The Right to Object

Individuals have the right to object to their data being used in some circumstances. This includes automated decision making and profiling, which an individual might feel will result in detrimental outcomes if there is not a human making the decision.

Exemptions

These rights can sometimes be restricted. For example, in legal investigations, journalism, confidentiality of references, and so on, there are legitimate reasons to restrict the rights of individuals for a greater good.

GDPR and Security

GDPR requires that whoever is responsible for data collection, the Data Controller, is accountable for the security of that data and appropriate technical and organisational measures are in place to ensure, and be able to demonstrate, that processing of personal data is performed in accordance with the regulations.

Four Aims

The data security aspects of the GDPR are intended to lead to an organisation being capable of the following:

  1. Manage security risk
  2. Protect personal data against cyber attack
  3. Detect security events
  4. Minimise the impact

The specifics of each depend on the type and volume of data collected and the scale of the organisation. That is, all controls should be "appropriate", based on:

  • the state of the art of the technology
  • cost of implementation
  • the nature, scope, context and purpose of processing’, and
  • the severity and likelihood of the risk being realised.

The National Cyber Security Centre (NCSC) give some examples of security measures:

  • Tracking and recording of all assets that process personal data, including end user devices and removable media.
  • Minimising the opportunity for attack by configuring technology appropriately, minimising available services and controlling connectivity.
  • Actively managing software vulnerabilities, including using in-support software and the application of software update policies (patching) and taking other mitigating steps, where patches can’t be applied.
  • Managing end user devices (laptops and smartphones etc) so that you can apply organisational controls over software or applications that interact with or access personal data.
  • Encrypting personal data at rest on devices (laptops, smartphones, and removable media) that are not subject to strong physical controls.
  • Encrypting personal data when transmitted electronically.
  • Ensuring that web services are protected from common security vulnerabilities such as SQL injection and others described in widely-used publications such as the OWASP Top 10.
  • Ensuring your processing environment remains secure throughout its lifecycle.

Impact

In the particular case of minimising impact, you should consider:

  • minimising the impact of a personal data breach
  • capability to restore systems and services (backups, backup sites, backup schedules)
  • how to manage the incident appropriately
  • ensuring you have enough information to learn lessons for the future