Límits del principi de privadesa pel disseny (CA-EN)

Antoni Roig Batalla

Resum


El principi de privadesa pel disseny, incorporat finalment al Reglament general de protecció de dades, forma part ara de les garanties jurídiques. Analitzem, en aquest treball, l’abast d’aquesta crida a la tecnologia garant. Concretament, ens interessa valorar els seus límits o problemes d’aplicació. Un aspecte que mereixerà especial atenció és la falta de coordinació entre les comunitats jurídiques i tècniques, i les seves conseqüències. Així, descriurem casos d’ús de tecnologies pretesament garants que a la pràctica no ho són; també veurem casos de tecnologia garant contrària a dret, i, finalment, mencionarem casos d’eines que no tenen en compte el concepte jurídic de privadesa a l’hora de dissenyar–ne la protecció. Dedicarem la part final del treball a suggerir possibles vies per redreçar la situació i treure tot el potencial corregulador de les eines tècniques garants.


Paraules clau


privadesa pel disseny; eines garants de la privadesa; corregulació; dret i tecnologia

Cites


Alsubaei, Faisal, Abuhussein, Abdullah, i Shiva, Sajjan. (2019). A framework for ranking IoMT solutions based on measuring security and privacy. Dins Kohei Arai et al. (ed.), Proceedings of the Future Technologies Conference (FTC) 2018 (p. 205-224).

Anakath, Arasan, Rajakumar, S., i Ambika, S. (2019). Privacy preserving multi factor authentication using trust management. Cluster Computing, 22.

Aved, Alexander J., i Hua, Kien A. (2012). A general framework for managing and processing live video data with privacy protection. Multimedia Systems, 18, 123-143.

Bygrave, Lee A. (2017). Data protection by design and by default: Deciphering the EU’s legislative requirements. Oslo Law Review, 4(2), 105.

Bygrave, Lee A. (2020). Article 25. Data protection by design and by default. Dins Christopher Küner, Lee A. Bygrave i Christopher Docksey, The EU General Data Protection Regulation (GDPR). A Commentary (p. 571-581). Oxford University Press.

Casas Roma, Jordi. (2019, 15 de juny). An evaluation of vertex and edge modification techniques for privacy‑preserving on graphs. Journal of Ambient Intelligence and Humanized Computing.

Casas Roma, Jordi. (2020). DUEF-GA: Data utility and privacy evaluation framework for graph anonymization. International Journal of Information Security, 19, 465-478.

Cavoukian, Ann. (2011 [2009]). Privacy by Design: The 7 Foundational Principles.

Dwork, Cynthia. (2006). Differential privacy. Dins Michele Bugliesi, Bart Preneel, Vladimiro Sassone i Ingo Wegener (ed.), Automata, Languages and Programming. ICALP 2006. Lecture Notes in Computer Science (vol. 4052). Springer. https://doi.org/10.1007/11787006_1

European Union Agency for Network and Information Security (ENISA). (2014). Privacy and data protection by design. From Policy to Engineering.

European Union Agency for Network and Information Security (ENISA). (2016). Privacy enhancing technologies: Evolution and state of the art. A community approach to PETs Maturity Assessment.

European Union Agency for Cybersecurity (ENISA). (2019). Pseudonymisation techniques and best practices. Recommendations on shaping technology according to data protection and privacy provisions.

European Union Agency for Cybersecurity (ENISA). (2021). Data pseudonymisation: Advanced techniques & use cases. Technical analysis of cybersecurity measures in data protection and privacy.

Gao, Jianliang, Wang, Jianxin, He, Jianbiao, i Yan, Fengxia. (2019). Against signed graph deanonymization attacks on social networks. International Journal of Parallel Programming, 47, 725-739.

Gu, Qiuyang, Ni, Qilian, Meng, Xiangzhao, i Yang, Zhijiao. (2019). Dynamic social privacy protection based on graph mode partition in complex social network. Personal and Ubiquitous Computing, 23, 511-519.

Gupta, Keshav, Walia, Gurjit Singh, i Sharma, Kapil. (2021). Novel approach for multimodal feature fusion to generate cancelable biometric. The Visual Computer, 37, 1401-1413.

Klitou, Demetrius. (2014). A solution but not a panacea for defending privacy: The challenges, criticism and limitations of privacy by design. Dins Bart Preneel i Demosthenes Ikonomou (ed.), Privacy Technologies and Policy (p. 86-110). First Annual Privacy Forum, APF 2012. Springer.

Manisha Kumar, Nitin. (2020). Cancelable biometrics: a comprehensive survey. Artificial Intelligence Review, 53, 3403-3446.

Purohit, Himanshu, i Ajmera, Pawan K. (2021). Optimal feature level fusion for secured human authentication in multimodal biometric System. Machine Vision and Applications, 32(24).

Rajabzadeh, Sara, Shahsaf, Pedram, i Khoramnejadi, Mostafa. (2020). A graph modification approach for k‑anonymity in social networks using the genetic algorithm. Social Network Analysis and Mining, 10(38).

Rebollo, David, Parra, Javier, Díaz, Claudia, i Forné, Jordi. (2013). On the measurement of privacy as an attacker’s estimation error. International Journal of Information Security, 12, 129-149.

Roig, Antoni. (2018). Nanotechnology governance: From risk regulation to informal platforms. NanoEthics, 12(2), 115-121.

Roig, Antoni. (2020). Las garantías frente a las decisiones automatizadas. Del reglamento general de protección de datos a la gobernanza algorítmica. Bosch Editor.

Rubinstein, Ira S. (2012). Regulating privacy by design. Berkeley Technology Law Journal, 26 (3), 1409-1456.

Schaar, Peter. (2010). Privacy by design. Identity in the Information Society, 3(2), 267-274.

Schartum, Dag Wiese. (2016). Making privacy by design operative. International Journal of Law & Information Technology, 24(2), 151-175.

Sheikhalishahi, Mina, Saracino, Andrea, Martinelli, Fabio, i La Marra, Antonio. (2021). Privacy preserving data sharing and analysis for edge-based architectures. International Journal of Information Security.

Shen, Jie, Cai, Ying-Jue, i Luo, Lei. (2015). A context-aware mobile web middleware for service of surveillance video with privacy. Multimedia Tools and Applications, 74, 8025-8051.

Tamò-Larrieux, Aurelia. (2018). Designing for privacy and its legal framework: Data protection by design and default for the Internet of Things. Springer.

Torra, Vicenç. (2017). Data privacy: foundations, new developments and the big data challenge. Springer.

Werner, Jorge, Westphall, Carla Merkle, Azevedo Vargas, Andre, i Westphall, Carlos Becker. (2019). Privacy Policies Model in Access Control. IEEE International Systems Conference. Orlando, Florida, EUA.

Yang, Liu, Yong, Zeng, Zhihong, Liu, i Jianfeng, Ma. (2021). Spectrum privacy preserving for social networks: A Personalized Differential privacy approach. Dins Yongdong Wu i Moti Yung (ed.), Inscrypt 2020, Lecture Notes in Computer Science, 12612 (p. 277-287).

Yiping, Yin, Qing, Liao, Yang, Liu, i Ruifeng, Xu (2019). Structural-based graph publishing under differential privacy. Dins Ruifeng Xu et al. (ed.), Cognitive Computing – ICCC 2019. Third International Conference (p. 67-78). (Lecture Notes in Computer Science, 11518).

Zhang, Cheng, Jiang, Honglu, Cheng, Xiuzhen, Zhao, Feng, Cai, Zhipeng, i Tian, Zhi. (2019). Utility analysis on privacy-preservation algorithms for online social networks: an empirical study. Springer.




DOI: http://dx.doi.org/10.2436/rcdp.i64.2022.3717



 Reconeixement - NoComercial - SenseObraDerivada (by-nc-nd): No es permet un ús comercial de l'obra original ni la generació d'obres derivades.