SlideShare a Scribd company logo
1 of 38
Download to read offline
Malcolm Crompton

Web 2.0 in Government:
the key issue of privacy

Web 2.0 in Government
Conference 2009

Sydney
24 June 2009
The inherent challenge for
any government: which hat?
“Government is not only a direct service
provider, of course. It also discharges
important roles including providing for
national security, law enforcement and
regulation about which individuals have
little (legal) choice even if they might
have consequences that are adverse to
their individual interests.”
      Safe to play, a trust framework for The Connected Republic
          A Point of View from the Global Public Sector Practice,
               Internet Business Solutions Group, Cisco Systems
                     www.iispartners.com/Publications/index.html
Where we‟ve been ...
Case study: Australia’s failed Access Card




                         Lost community trust
                         because of:
                         • Hidden agendas – lack of
                           transparency
                         • Centralisation of very
                           sensitive information
                         • Inadequate governance
                           and accountability
 The old website:        • De facto compulsory
 www.accesscard.gov.au     despite claims
Sun-Herald, 14 Oct 2006
This isn’t lost on the individual ...
             Broad         More    Logging &        Inadequate
             consents      EOI     Monitoring       Accountability

Unexpected
uses

Lack of
Control

                        The Great Trust deficit:
Burden
of Risk                  “You don’t trust me, so
                         why should I trust you?”
Trust
“The ongoing debate about data privacy needs to evolve into a dialogue
about consumer trust …
“The Yankelovich Consumer Trust Report clearly pointed out the need for
a new approach. „The state of mistrust is not a new problem, but it is one
that can no longer be ignored,‟ Wood said. „According to our findings,
80% of consumers believe American businesses are too concerned about
making a profit and not concerned enough about their responsibilities …‟
“Distrust has a potentially devastating impact on profitability … Almost
half (45%) of the respondents say there is at least one retail business that
they trusted at one time but no longer trust. Of those people, nearly all
(94%) say they spent less money with that company, resulting in an
average 87% decrease in spending by that group.”
Craig Rogers, Yankelovich Partners, Press Release on The State of Consumer Trust Report
                                                                           8 June 2004
Survey after survey shows the impact
 Research into Community attitudes towards Privacy in Australia
 2007, 2004 & 2001, OPC Australia
 “Poll: Americans fear ID theft but try to protect themselves”,
 CNN Money, 18 July 2005
 Attitudes and Behaviors of Online Consumers: A Study of Five
 Cities (Sydney, Singapore, Bangalore, Seoul, New York), NUS,
 2003-04
 The New e-Government Equation: Ease, Engagement, Privacy
 and Protection, Hart-Teeter Research in US, 2003
 Privacy and data-sharing: The way forward for public services,
 UK Cabinet Office, 2002
 TRUSTe-TNS 2008 Study: Consumer Attitudes about
 Behavioral Targeting
The trust deficit – Impact
• We avoid engagement
• We defend – minimise or falsify our
  responses
• We call for more law regardless of
  impact
• Opportunities missed to develop close
  relationships
• Solutions go on the scrap heap
• New security vulnerabilities – more
  information collected than needed
  creates the ID fraud honey pot
The Trust Deficit & the great risk shift:
Cloud as next instalment?
• We‟ve been doing the risk shift for decades
   – A significant contributor to the
     Global Financial Crisis
   – The life blood of many online
     service models
   – Separates risk taker from risk bearer
• Will Cloud to add to this risk, asking end user to
  discover which company did what; which jurisdiction …
• THE common thread to all discussions
• Self regulate or wait to have it imposed?
And now Govt 2.0
Governments
   are also
transforming
     www.theconnectedrepublic.org

• Network as platform
• Empower the edge
• Power of us
But is it safe?
Citizen response to Govt 2.0
informed by
• Wider world
• Government
• Digital world
• Government 1.0          www.Australia.gov.au

• Web 2.0   www.MySpace.com ......


Govt different by only
a matter of degree
The internet continues to
change the rules
• Privacy principles ineffective in the
  face of the tidal wave of new
  technology
• Capacity to range through vast
  amounts of information
• Digital footprints allow behavioural
  targeting
• Not just individuals who can
  pretend they are someone else
Facebook
• 700,000 protest “Facebook and the Politics of Privacy”
                                              MotherJones.com, 14 September 2006
                                         www.motherjones.com/interview/2006/09/facebook.html

• Disable but NOT delete accounts
• “Facebook privacy row hits Oxford University”
                                               The Daily Telegraph UK, 18 July 2007
  www.telegraph.co.uk/core/Content/displayPrintable.jhtml?xml=/news/2007/07/18/noxford118.xml&
                                                                                site=5&page=0

• Opened up to Google Search
• “Facebook fiasco: Zuckerberg says sorry”
                                                            The Age, 6 December 2007
                     www.theage.com.au/news/web/bfacebookb-privacy-fiasco-forces-founder-to-
                                                 apologise/2007/12/06/1196812874843.html

• Terms & Conditions backdown & rewrite
                                          http://blog.facebook.com/blog.php?post=79146552130
How to make it safe
“Layered Defence”

              ► Control ► Trust ► Risk ► Accountability

Education

Law          Privacy?
Technology

Governance
                                 We can reduce the
Safety Net                       Trust Deficit
Layered Defence tools
• “Business as usual” – good practice & culture change
  for staff & citizen users;
• Law – maybe more, where risks particularly high (eg
  specific use and disclosure limitations, criminal
  penalties, special measures to ensure review before
  critical changes made); NOT just compliance;
• Technology – design limits information collected, what
  can be connected and who can see what;
• Governance – including transparency and
  accountability;
• Safety mechanisms for citizens when failure or
  mistakes occur.
Culture & History
also important
• Why are many of the countries based
  on Anglo cultures so fussed about
                                            “Use Cases for
  IDM?                                      Identity Management
                                            in E-Government”
• Take Scandinavia
                                            Robin McKenzie, Malcolm
• Citizens appear more willing to trust     Crompton, Colin Wallis,
                                            IEEE Security and Privacy,
  government with their identity            vol. 6, no. 2, pp. 51-57,
                                            Mar/Apr, 2008

• High levels of trust through history of   http://doi.ieeecomputersoci
  openness – FOI & stronger                 ety.org/10.1109/MSP.2008.51

  accountability?
The key: three dynamically
related elements


                            Fair risk
Accountability             allocation




                                             www.TheConnectedRepublic.org
                 Control     Now www.iispartners.com/Publications/index.html
Guidelines
TG.1: Education – Enabling
better informed risk decision
making
TG.2: Experimentation –
learning through doing
TG.3: Restitution Measures –
provide a positive impact on
personal perceived risk
TG.4: Guarantees – Provide
assurance and improve
confidence in whether to enter
into a transaction
TG.5: Control – Increased
transparency brings increased
confidence
TG.6: Openness – honesty
signifies and engenders trust
www.trustguide.org.uk
Swire’s recommendations
• The Obama administration should begin to work on a more long-
  term solution on persistent cookies that addresses the complexity of
  the issue, the conflicting views of privacy and new media advocates,
  and the public policy debates about online advertising...
• WhiteHouse.gov and all other federal websites should provide a
  disclaimer making it clear to users when they leave an official
  federal website...
• Privacy should be one of the factors that the federal government
  considers when it selects thirdparty Web 2.0 services...
• If a social networking or other Web 2.0 application allows more
  access to personal information than is appropriate, the agency can
  announce in its own privacy policy that it will not access that
  information.
Jason Ryan’s recommendations
• Data web – who owns the data?
• Personalisation – Users across the web expect to be able
  to tailor their experience to their own requirements
• Open source government – build web applications that
  allow the people who have funded to them to build,
  deploy and access their own APIs
• Search – information must be discoverable ... be able to
  be repackaged according to user interests
• Authentication – ability to establish identity with an
  agency and be sure that the party receiving that
  information to is who they claim to be
Some more strategies and principles
• Use Web 2.0 capabilities to solve Web 2.0 problems
• Make sure you address citizen risk (not just yours)
• Give citizens as much control as possible
• Recognise that sometimes citizens can‟t choose, and
  compensate by strengthening accountability and fair
  risk allocation
• Be transparent, accountable and have strong
  governance
• Take responsibility for fixing failures
Questions for governments
• Which hat are you wearing? What is
  your agenda?
• Are you willing to be transparent about
  your agendas?
• If you cannot be fully transparent are
  you prepared to be highly accountable?
• How will you gain citizen trust where
  choice not an option?
• Are you willing to take responsibility for
  fixing failures?
Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009

More Related Content

What's hot

Cookies and Data Protection - a Practitioner's perspective
Cookies and Data Protection - a Practitioner's perspectiveCookies and Data Protection - a Practitioner's perspective
Cookies and Data Protection - a Practitioner's perspectiveCastlebridge Associates
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533Hubbamar
 
10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy Challenges10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy ChallengesJonathan Ezor
 
Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...anthonywong
 
Managing Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Managing Privacy Maximizing Data In Affiliate Marketing Gary KibelManaging Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Managing Privacy Maximizing Data In Affiliate Marketing Gary KibelAffiliate Summit
 
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...gallowayandcollens
 
Proof of immunity and the demise of privacy 2020 world in 2030
Proof of immunity and the demise of privacy 2020   world in 2030Proof of immunity and the demise of privacy 2020   world in 2030
Proof of immunity and the demise of privacy 2020 world in 2030Future Agenda
 
Rebooting digital identity: how the social web is transforming citizen behavi...
Rebooting digital identity: how the social web is transforming citizen behavi...Rebooting digital identity: how the social web is transforming citizen behavi...
Rebooting digital identity: how the social web is transforming citizen behavi...Patrick McCormick
 
Net Neutrality in Education
Net Neutrality in EducationNet Neutrality in Education
Net Neutrality in EducationCraig Geffre
 
Module 5 - Legislation - Online
Module 5 - Legislation - OnlineModule 5 - Legislation - Online
Module 5 - Legislation - Onlinecaniceconsulting
 
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Ted Myerson
 
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...gallowayandcollens
 
Student Data and Its Discontents: How FUD undermined an education reform agenda
Student Data and Its Discontents: How FUD undermined an education reform agendaStudent Data and Its Discontents: How FUD undermined an education reform agenda
Student Data and Its Discontents: How FUD undermined an education reform agendaPatrick McCormick
 
Social government: a platform for online collaboration
Social government:  a platform for online collaborationSocial government:  a platform for online collaboration
Social government: a platform for online collaborationPatrick McCormick
 
Trust Factory Slides (2015)
Trust Factory Slides (2015)Trust Factory Slides (2015)
Trust Factory Slides (2015)Timothy Holborn
 
Big data privacy security regulation
 Big data privacy security regulation Big data privacy security regulation
Big data privacy security regulationcjw119
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)naveen p
 

What's hot (20)

Cookies and Data Protection - a Practitioner's perspective
Cookies and Data Protection - a Practitioner's perspectiveCookies and Data Protection - a Practitioner's perspective
Cookies and Data Protection - a Practitioner's perspective
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533
 
10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy Challenges10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy Challenges
 
Digital Fault-Lines
Digital Fault-LinesDigital Fault-Lines
Digital Fault-Lines
 
Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...
 
Managing Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Managing Privacy Maximizing Data In Affiliate Marketing Gary KibelManaging Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Managing Privacy Maximizing Data In Affiliate Marketing Gary Kibel
 
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
 
Proof of immunity and the demise of privacy 2020 world in 2030
Proof of immunity and the demise of privacy 2020   world in 2030Proof of immunity and the demise of privacy 2020   world in 2030
Proof of immunity and the demise of privacy 2020 world in 2030
 
Rebooting digital identity: how the social web is transforming citizen behavi...
Rebooting digital identity: how the social web is transforming citizen behavi...Rebooting digital identity: how the social web is transforming citizen behavi...
Rebooting digital identity: how the social web is transforming citizen behavi...
 
Net Neutrality in Education
Net Neutrality in EducationNet Neutrality in Education
Net Neutrality in Education
 
Module 5 - Legislation - Online
Module 5 - Legislation - OnlineModule 5 - Legislation - Online
Module 5 - Legislation - Online
 
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
 
The Internet of Things and Future Shock: Too Much Change Too Fast?
The Internet of Things and Future Shock: Too Much Change Too Fast?The Internet of Things and Future Shock: Too Much Change Too Fast?
The Internet of Things and Future Shock: Too Much Change Too Fast?
 
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...
 
Student Data and Its Discontents: How FUD undermined an education reform agenda
Student Data and Its Discontents: How FUD undermined an education reform agendaStudent Data and Its Discontents: How FUD undermined an education reform agenda
Student Data and Its Discontents: How FUD undermined an education reform agenda
 
Social government: a platform for online collaboration
Social government:  a platform for online collaborationSocial government:  a platform for online collaboration
Social government: a platform for online collaboration
 
Trust Factory Slides (2015)
Trust Factory Slides (2015)Trust Factory Slides (2015)
Trust Factory Slides (2015)
 
Big data privacy security regulation
 Big data privacy security regulation Big data privacy security regulation
Big data privacy security regulation
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 

Viewers also liked

Business System Presentation 10.4.10
Business System Presentation 10.4.10Business System Presentation 10.4.10
Business System Presentation 10.4.10marcijo
 
1120+emma web 2.0 presentation
1120+emma web 2.0 presentation1120+emma web 2.0 presentation
1120+emma web 2.0 presentationFrocomm Australia
 
русское наследие 2009 4
русское наследие 2009 4русское наследие 2009 4
русское наследие 2009 4locnt
 
Дивограй 2006
Дивограй 2006Дивограй 2006
Дивограй 2006locnt
 
Marci Skincare Business Opportunity
Marci Skincare Business OpportunityMarci Skincare Business Opportunity
Marci Skincare Business Opportunitymarcijo
 
русское наследие 2009 3
русское наследие 2009 3русское наследие 2009 3
русское наследие 2009 3locnt
 
JHL Enterprises Presentation
JHL Enterprises PresentationJHL Enterprises Presentation
JHL Enterprises Presentationjleibsly2002
 
公開用「Session.01 喋りだけじゃない!IT講師というお仕事」エフスタ!! in Aizu ~IT業界はエンジニアだけじゃない!~
公開用「Session.01 喋りだけじゃない!IT講師というお仕事」エフスタ!! in Aizu ~IT業界はエンジニアだけじゃない!~ 公開用「Session.01 喋りだけじゃない!IT講師というお仕事」エフスタ!! in Aizu ~IT業界はエンジニアだけじゃない!~
公開用「Session.01 喋りだけじゃない!IT講師というお仕事」エフスタ!! in Aizu ~IT業界はエンジニアだけじゃない!~ haru_435
 
Marci Skincare Compensation Plan At A Glance
Marci Skincare Compensation Plan At A GlanceMarci Skincare Compensation Plan At A Glance
Marci Skincare Compensation Plan At A Glancemarcijo
 
Клубна вітальня 2006
Клубна вітальня 2006Клубна вітальня 2006
Клубна вітальня 2006locnt
 
новий рік 2008 частина 2
новий рік 2008 частина  2новий рік 2008 частина  2
новий рік 2008 частина 2locnt
 
Lymphatic Terms
Lymphatic TermsLymphatic Terms
Lymphatic Termsabilby
 
Державні свята 2009
Державні свята 2009Державні свята 2009
Державні свята 2009locnt
 
The pr report top 20 trends for 2012 high res
The pr report top 20 trends for 2012 high resThe pr report top 20 trends for 2012 high res
The pr report top 20 trends for 2012 high resFrocomm Australia
 
10 Nick Baker Pr And Media Pres June 09
10 Nick Baker Pr And Media Pres June 0910 Nick Baker Pr And Media Pres June 09
10 Nick Baker Pr And Media Pres June 09Frocomm Australia
 

Viewers also liked (18)

Business System Presentation 10.4.10
Business System Presentation 10.4.10Business System Presentation 10.4.10
Business System Presentation 10.4.10
 
1120+emma web 2.0 presentation
1120+emma web 2.0 presentation1120+emma web 2.0 presentation
1120+emma web 2.0 presentation
 
01 Pia Waugh Gov2 Syd
01 Pia Waugh Gov2 Syd01 Pia Waugh Gov2 Syd
01 Pia Waugh Gov2 Syd
 
русское наследие 2009 4
русское наследие 2009 4русское наследие 2009 4
русское наследие 2009 4
 
Дивограй 2006
Дивограй 2006Дивограй 2006
Дивограй 2006
 
Marci Skincare Business Opportunity
Marci Skincare Business OpportunityMarci Skincare Business Opportunity
Marci Skincare Business Opportunity
 
русское наследие 2009 3
русское наследие 2009 3русское наследие 2009 3
русское наследие 2009 3
 
JHL Enterprises Presentation
JHL Enterprises PresentationJHL Enterprises Presentation
JHL Enterprises Presentation
 
公開用「Session.01 喋りだけじゃない!IT講師というお仕事」エフスタ!! in Aizu ~IT業界はエンジニアだけじゃない!~
公開用「Session.01 喋りだけじゃない!IT講師というお仕事」エフスタ!! in Aizu ~IT業界はエンジニアだけじゃない!~ 公開用「Session.01 喋りだけじゃない!IT講師というお仕事」エフスタ!! in Aizu ~IT業界はエンジニアだけじゃない!~
公開用「Session.01 喋りだけじゃない!IT講師というお仕事」エフスタ!! in Aizu ~IT業界はエンジニアだけじゃない!~
 
Marci Skincare Compensation Plan At A Glance
Marci Skincare Compensation Plan At A GlanceMarci Skincare Compensation Plan At A Glance
Marci Skincare Compensation Plan At A Glance
 
Клубна вітальня 2006
Клубна вітальня 2006Клубна вітальня 2006
Клубна вітальня 2006
 
новий рік 2008 частина 2
новий рік 2008 частина  2новий рік 2008 частина  2
новий рік 2008 частина 2
 
Lymphatic Terms
Lymphatic TermsLymphatic Terms
Lymphatic Terms
 
Державні свята 2009
Державні свята 2009Державні свята 2009
Державні свята 2009
 
The pr report top 20 trends for 2012 high res
The pr report top 20 trends for 2012 high resThe pr report top 20 trends for 2012 high res
The pr report top 20 trends for 2012 high res
 
Presentation1
Presentation1Presentation1
Presentation1
 
Sydney conf presentation
Sydney conf presentationSydney conf presentation
Sydney conf presentation
 
10 Nick Baker Pr And Media Pres June 09
10 Nick Baker Pr And Media Pres June 0910 Nick Baker Pr And Media Pres June 09
10 Nick Baker Pr And Media Pres June 09
 

Similar to Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009

NSTIC and IDESG Update
NSTIC and IDESG UpdateNSTIC and IDESG Update
NSTIC and IDESG UpdateIan Glazer
 
IT risk discusion qustion.pdf
IT risk discusion qustion.pdfIT risk discusion qustion.pdf
IT risk discusion qustion.pdfstirlingvwriters
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016Melissa Krasnow
 
GCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxGCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxMuhammadAbdullah311866
 
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014
 
Big Data's Big Paradox_Dr. Nita Rollins
Big Data's Big Paradox_Dr. Nita RollinsBig Data's Big Paradox_Dr. Nita Rollins
Big Data's Big Paradox_Dr. Nita RollinsNita Rollins, Ph.D.
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Chris Hails
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analyticsshekharkanodia
 
Privacy & Data Ethics
Privacy & Data EthicsPrivacy & Data Ethics
Privacy & Data EthicsErik Kokkonen
 
Cyber Security Agenda for 45th President
Cyber Security Agenda for 45th PresidentCyber Security Agenda for 45th President
Cyber Security Agenda for 45th PresidentInternet Law Center
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Fullgloriakt
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Robert Stribley
 
The Privacy Advantage 2016 - Amit Pau
The Privacy Advantage 2016 - Amit PauThe Privacy Advantage 2016 - Amit Pau
The Privacy Advantage 2016 - Amit PauKrowdthink
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation Data-Set
 

Similar to Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009 (20)

NSTIC and IDESG Update
NSTIC and IDESG UpdateNSTIC and IDESG Update
NSTIC and IDESG Update
 
IT risk discusion qustion.pdf
IT risk discusion qustion.pdfIT risk discusion qustion.pdf
IT risk discusion qustion.pdf
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016
 
GCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxGCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptx
 
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
 
Big Data's Big Paradox_Dr. Nita Rollins
Big Data's Big Paradox_Dr. Nita RollinsBig Data's Big Paradox_Dr. Nita Rollins
Big Data's Big Paradox_Dr. Nita Rollins
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
 
Longhash the end game of blockchain
Longhash the end game of blockchainLonghash the end game of blockchain
Longhash the end game of blockchain
 
Longhash - the end game of blockchain
Longhash - the end game of blockchainLonghash - the end game of blockchain
Longhash - the end game of blockchain
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analytics
 
Privacy & Data Ethics
Privacy & Data EthicsPrivacy & Data Ethics
Privacy & Data Ethics
 
Chris hankin tril_presentation_pdf.pptx
Chris hankin tril_presentation_pdf.pptxChris hankin tril_presentation_pdf.pptx
Chris hankin tril_presentation_pdf.pptx
 
Adler nurani
Adler nurani Adler nurani
Adler nurani
 
Adler nurani
Adler nurani Adler nurani
Adler nurani
 
Cyber Security Agenda for 45th President
Cyber Security Agenda for 45th PresidentCyber Security Agenda for 45th President
Cyber Security Agenda for 45th President
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21
 
The Privacy Advantage 2016 - Amit Pau
The Privacy Advantage 2016 - Amit PauThe Privacy Advantage 2016 - Amit Pau
The Privacy Advantage 2016 - Amit Pau
 
Data Privacy Compliance
Data Privacy ComplianceData Privacy Compliance
Data Privacy Compliance
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
 

More from Frocomm Australia

1140 matt frocomm2011-aerin's copy
1140 matt frocomm2011-aerin's copy1140 matt frocomm2011-aerin's copy
1140 matt frocomm2011-aerin's copyFrocomm Australia
 
0900 brad argent 2011 government 2 point 0 conference - 2
0900 brad argent 2011 government 2 point 0 conference - 20900 brad argent 2011 government 2 point 0 conference - 2
0900 brad argent 2011 government 2 point 0 conference - 2Frocomm Australia
 
Gov 2.0 public 2.0 bad guys 2.0 v3
Gov 2.0 public 2.0 bad guys 2.0 v3Gov 2.0 public 2.0 bad guys 2.0 v3
Gov 2.0 public 2.0 bad guys 2.0 v3Frocomm Australia
 
Gov 2.0 public 2.0 bad guys 2.0 v3
Gov 2.0 public 2.0 bad guys 2.0 v3Gov 2.0 public 2.0 bad guys 2.0 v3
Gov 2.0 public 2.0 bad guys 2.0 v3Frocomm Australia
 
1150 tom acmasocmediaroadmap2011
1150 tom acmasocmediaroadmap20111150 tom acmasocmediaroadmap2011
1150 tom acmasocmediaroadmap2011Frocomm Australia
 
Frocomm Social Media Bootcamp 2009 Ogilvy 360 DI
Frocomm Social Media Bootcamp 2009 Ogilvy 360 DIFrocomm Social Media Bootcamp 2009 Ogilvy 360 DI
Frocomm Social Media Bootcamp 2009 Ogilvy 360 DIFrocomm Australia
 
Afternoon 2a Darren Whitelaw Web 2
Afternoon 2a  Darren  Whitelaw  Web 2Afternoon 2a  Darren  Whitelaw  Web 2
Afternoon 2a Darren Whitelaw Web 2Frocomm Australia
 
04 Brian Giesen Pandemic Flu Case
04 Brian Giesen Pandemic Flu Case04 Brian Giesen Pandemic Flu Case
04 Brian Giesen Pandemic Flu CaseFrocomm Australia
 

More from Frocomm Australia (11)

1140 matt frocomm2011-aerin's copy
1140 matt frocomm2011-aerin's copy1140 matt frocomm2011-aerin's copy
1140 matt frocomm2011-aerin's copy
 
0900 brad argent 2011 government 2 point 0 conference - 2
0900 brad argent 2011 government 2 point 0 conference - 20900 brad argent 2011 government 2 point 0 conference - 2
0900 brad argent 2011 government 2 point 0 conference - 2
 
Welcome slide day 1
Welcome slide day 1Welcome slide day 1
Welcome slide day 1
 
Gov 2.0 public 2.0 bad guys 2.0 v3
Gov 2.0 public 2.0 bad guys 2.0 v3Gov 2.0 public 2.0 bad guys 2.0 v3
Gov 2.0 public 2.0 bad guys 2.0 v3
 
Gov 2.0 public 2.0 bad guys 2.0 v3
Gov 2.0 public 2.0 bad guys 2.0 v3Gov 2.0 public 2.0 bad guys 2.0 v3
Gov 2.0 public 2.0 bad guys 2.0 v3
 
1150 tom acmasocmediaroadmap2011
1150 tom acmasocmediaroadmap20111150 tom acmasocmediaroadmap2011
1150 tom acmasocmediaroadmap2011
 
Frocomm Social Media Bootcamp 2009 Ogilvy 360 DI
Frocomm Social Media Bootcamp 2009 Ogilvy 360 DIFrocomm Social Media Bootcamp 2009 Ogilvy 360 DI
Frocomm Social Media Bootcamp 2009 Ogilvy 360 DI
 
Afternoon 2a Darren Whitelaw Web 2
Afternoon 2a  Darren  Whitelaw  Web 2Afternoon 2a  Darren  Whitelaw  Web 2
Afternoon 2a Darren Whitelaw Web 2
 
Web2 0 Holding Slide
Web2 0 Holding SlideWeb2 0 Holding Slide
Web2 0 Holding Slide
 
04 Brian Giesen Pandemic Flu Case
04 Brian Giesen Pandemic Flu Case04 Brian Giesen Pandemic Flu Case
04 Brian Giesen Pandemic Flu Case
 
02 Peter Williams
02 Peter Williams02 Peter Williams
02 Peter Williams
 

Recently uploaded

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Recently uploaded (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 

Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009

  • 1. Malcolm Crompton Web 2.0 in Government: the key issue of privacy Web 2.0 in Government Conference 2009 Sydney 24 June 2009
  • 2. The inherent challenge for any government: which hat? “Government is not only a direct service provider, of course. It also discharges important roles including providing for national security, law enforcement and regulation about which individuals have little (legal) choice even if they might have consequences that are adverse to their individual interests.” Safe to play, a trust framework for The Connected Republic A Point of View from the Global Public Sector Practice, Internet Business Solutions Group, Cisco Systems www.iispartners.com/Publications/index.html
  • 4.
  • 5.
  • 6.
  • 7. Case study: Australia’s failed Access Card Lost community trust because of: • Hidden agendas – lack of transparency • Centralisation of very sensitive information • Inadequate governance and accountability The old website: • De facto compulsory www.accesscard.gov.au despite claims
  • 9. This isn’t lost on the individual ... Broad More Logging & Inadequate consents EOI Monitoring Accountability Unexpected uses Lack of Control The Great Trust deficit: Burden of Risk “You don’t trust me, so why should I trust you?”
  • 10. Trust “The ongoing debate about data privacy needs to evolve into a dialogue about consumer trust … “The Yankelovich Consumer Trust Report clearly pointed out the need for a new approach. „The state of mistrust is not a new problem, but it is one that can no longer be ignored,‟ Wood said. „According to our findings, 80% of consumers believe American businesses are too concerned about making a profit and not concerned enough about their responsibilities …‟ “Distrust has a potentially devastating impact on profitability … Almost half (45%) of the respondents say there is at least one retail business that they trusted at one time but no longer trust. Of those people, nearly all (94%) say they spent less money with that company, resulting in an average 87% decrease in spending by that group.” Craig Rogers, Yankelovich Partners, Press Release on The State of Consumer Trust Report 8 June 2004
  • 11. Survey after survey shows the impact Research into Community attitudes towards Privacy in Australia 2007, 2004 & 2001, OPC Australia “Poll: Americans fear ID theft but try to protect themselves”, CNN Money, 18 July 2005 Attitudes and Behaviors of Online Consumers: A Study of Five Cities (Sydney, Singapore, Bangalore, Seoul, New York), NUS, 2003-04 The New e-Government Equation: Ease, Engagement, Privacy and Protection, Hart-Teeter Research in US, 2003 Privacy and data-sharing: The way forward for public services, UK Cabinet Office, 2002 TRUSTe-TNS 2008 Study: Consumer Attitudes about Behavioral Targeting
  • 12. The trust deficit – Impact • We avoid engagement • We defend – minimise or falsify our responses • We call for more law regardless of impact • Opportunities missed to develop close relationships • Solutions go on the scrap heap • New security vulnerabilities – more information collected than needed creates the ID fraud honey pot
  • 13. The Trust Deficit & the great risk shift: Cloud as next instalment? • We‟ve been doing the risk shift for decades – A significant contributor to the Global Financial Crisis – The life blood of many online service models – Separates risk taker from risk bearer • Will Cloud to add to this risk, asking end user to discover which company did what; which jurisdiction … • THE common thread to all discussions • Self regulate or wait to have it imposed?
  • 15. Governments are also transforming www.theconnectedrepublic.org • Network as platform • Empower the edge • Power of us
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. But is it safe?
  • 22. Citizen response to Govt 2.0 informed by • Wider world • Government • Digital world • Government 1.0 www.Australia.gov.au • Web 2.0 www.MySpace.com ...... Govt different by only a matter of degree
  • 23. The internet continues to change the rules • Privacy principles ineffective in the face of the tidal wave of new technology • Capacity to range through vast amounts of information • Digital footprints allow behavioural targeting • Not just individuals who can pretend they are someone else
  • 24. Facebook • 700,000 protest “Facebook and the Politics of Privacy” MotherJones.com, 14 September 2006 www.motherjones.com/interview/2006/09/facebook.html • Disable but NOT delete accounts • “Facebook privacy row hits Oxford University” The Daily Telegraph UK, 18 July 2007 www.telegraph.co.uk/core/Content/displayPrintable.jhtml?xml=/news/2007/07/18/noxford118.xml& site=5&page=0 • Opened up to Google Search • “Facebook fiasco: Zuckerberg says sorry” The Age, 6 December 2007 www.theage.com.au/news/web/bfacebookb-privacy-fiasco-forces-founder-to- apologise/2007/12/06/1196812874843.html • Terms & Conditions backdown & rewrite http://blog.facebook.com/blog.php?post=79146552130
  • 25. How to make it safe
  • 26. “Layered Defence” ► Control ► Trust ► Risk ► Accountability Education Law Privacy? Technology Governance We can reduce the Safety Net Trust Deficit
  • 27. Layered Defence tools • “Business as usual” – good practice & culture change for staff & citizen users; • Law – maybe more, where risks particularly high (eg specific use and disclosure limitations, criminal penalties, special measures to ensure review before critical changes made); NOT just compliance; • Technology – design limits information collected, what can be connected and who can see what; • Governance – including transparency and accountability; • Safety mechanisms for citizens when failure or mistakes occur.
  • 28. Culture & History also important • Why are many of the countries based on Anglo cultures so fussed about “Use Cases for IDM? Identity Management in E-Government” • Take Scandinavia Robin McKenzie, Malcolm • Citizens appear more willing to trust Crompton, Colin Wallis, IEEE Security and Privacy, government with their identity vol. 6, no. 2, pp. 51-57, Mar/Apr, 2008 • High levels of trust through history of http://doi.ieeecomputersoci openness – FOI & stronger ety.org/10.1109/MSP.2008.51 accountability?
  • 29. The key: three dynamically related elements Fair risk Accountability allocation www.TheConnectedRepublic.org Control Now www.iispartners.com/Publications/index.html
  • 30. Guidelines TG.1: Education – Enabling better informed risk decision making TG.2: Experimentation – learning through doing TG.3: Restitution Measures – provide a positive impact on personal perceived risk TG.4: Guarantees – Provide assurance and improve confidence in whether to enter into a transaction TG.5: Control – Increased transparency brings increased confidence TG.6: Openness – honesty signifies and engenders trust www.trustguide.org.uk
  • 31.
  • 32. Swire’s recommendations • The Obama administration should begin to work on a more long- term solution on persistent cookies that addresses the complexity of the issue, the conflicting views of privacy and new media advocates, and the public policy debates about online advertising... • WhiteHouse.gov and all other federal websites should provide a disclaimer making it clear to users when they leave an official federal website... • Privacy should be one of the factors that the federal government considers when it selects thirdparty Web 2.0 services... • If a social networking or other Web 2.0 application allows more access to personal information than is appropriate, the agency can announce in its own privacy policy that it will not access that information.
  • 33.
  • 34. Jason Ryan’s recommendations • Data web – who owns the data? • Personalisation – Users across the web expect to be able to tailor their experience to their own requirements • Open source government – build web applications that allow the people who have funded to them to build, deploy and access their own APIs • Search – information must be discoverable ... be able to be repackaged according to user interests • Authentication – ability to establish identity with an agency and be sure that the party receiving that information to is who they claim to be
  • 35.
  • 36. Some more strategies and principles • Use Web 2.0 capabilities to solve Web 2.0 problems • Make sure you address citizen risk (not just yours) • Give citizens as much control as possible • Recognise that sometimes citizens can‟t choose, and compensate by strengthening accountability and fair risk allocation • Be transparent, accountable and have strong governance • Take responsibility for fixing failures
  • 37. Questions for governments • Which hat are you wearing? What is your agenda? • Are you willing to be transparent about your agendas? • If you cannot be fully transparent are you prepared to be highly accountable? • How will you gain citizen trust where choice not an option? • Are you willing to take responsibility for fixing failures?