SlideShare uma empresa Scribd logo
1 de 14
STEPPING UP TO NEW
DATA PROTECTION CHALLENGES
USER-MANAGED ACCESS FOR GENUINE CONSENT
Eve Maler (@xmlgrrl)
Hard truths about the business of data privacy
Copyright © Identity Summit 2015, all rights reserved.
From the web
to the IoT,
the “fear/greed”
tension around
data sharing is
only going to
grow
Copyright © Identity Summit 2015, all rights reserved.
“In order to ensure free consent, it
should be clarified that consent does
not provide a valid legal ground
where the individual has no genuine
and free choice and is subsequently
not able to refuse to withdraw
consent without detriment. …. The
data subject shall have the right to
withdraw his or her consent at any
time.”
The Chief Privacy Officer and Chief
Digital Officer need to meet in the middle
Copyright © Identity Summit 2015, all rights reserved.
1. We value personal data as an asset
2. We value our customers’ wishes
3. Our customers have their own
reasons to share, not share, and
mash up data
4. Privacy can never simply be secrecy
5. Privacy is, fundamentally:
a. Context
b. Control
c. Choice
d. Respect
Digital consent tools through time
Copyright © Identity Summit 2015, all rights reserved.
Web
API
economy
IoT
economy
• Browse-wrap
• Click-notice
• Opt-in
• Opt-out
• Cookies
• “Share”
• API-wrap
• Mobile app store
download opt-in
• OAuth
• Consent receipts
• UMA
• …
The two most familiar “emerging” consent tools
only take us so far
Standard, constrainable consent for app
access…but run-time and point-to-point
Constrainable “consented delegation” to
other parties…but proprietary and limited
Copyright © Identity Summit 2015, all rights reserved.
“Share” OAuth
The new
Venn of
access
control and
consent
Copyright © Identity Summit 2015, all rights reserved.
The
mechanism:
federated
authorization
on top of
OAuth
Loosely coupled to enable
centralized authorization-as-
a-service and a central
sharing management hub
Enables party-to-party
sharing – without credential
sharing – driven by fine-
grained policy rather than
run-time opt-in consent
The requesting party is tested for
authorization suitability through trust
elevation, e.g. step-up authentication or
“claims-based access control”
Copyright © Identity Summit 2015, all rights reserved.
Why is it valuable to use a standard for
next-generation digital consent?
Copyright © Identity Summit 2015, all rights reserved.
This isn’t just slideware – see our live
demo in the CTO Technology
Preview!
Copyright © Identity Summit 2015, all rights reserved.
ForgeRock is
delivering two key
UMA components
not long from now
(client)
OpenAM 13-based
UMA Provider
OpenIG 4-based
UMA Protector
Copyright © Identity Summit 2015, all rights reserved.
resource server
authorization
server
ForgeRock helps you deliver
customer consent and delegation
capabilities for successful
digital transformation in a
privacy-sensitive world
Copyright © Identity Summit 2015, all rights reserved.
THANKS!
Eve Maler (@xmlgrrl)

Mais conteúdo relacionado

Mais procurados

2015 Identity Summit - OpenAM: Friends with benefits
2015 Identity Summit - OpenAM: Friends with benefits2015 Identity Summit - OpenAM: Friends with benefits
2015 Identity Summit - OpenAM: Friends with benefits
ForgeRock
 

Mais procurados (20)

2015 Identity Summit - CTO Innovation Center
2015 Identity Summit - CTO Innovation Center2015 Identity Summit - CTO Innovation Center
2015 Identity Summit - CTO Innovation Center
 
Identity Summit 2015: Connect.gov and Identity Management Systems
Identity Summit 2015: Connect.gov and Identity Management SystemsIdentity Summit 2015: Connect.gov and Identity Management Systems
Identity Summit 2015: Connect.gov and Identity Management Systems
 
2015 Identity Summit - OpenAM: Friends with benefits
2015 Identity Summit - OpenAM: Friends with benefits2015 Identity Summit - OpenAM: Friends with benefits
2015 Identity Summit - OpenAM: Friends with benefits
 
2015 Identity Summit - The Identity Broker as Driver for Growth
2015 Identity Summit - The Identity Broker as Driver for Growth2015 Identity Summit - The Identity Broker as Driver for Growth
2015 Identity Summit - The Identity Broker as Driver for Growth
 
Identity Summit 2015: 2Keys Canadian Digital Identity
Identity Summit 2015: 2Keys Canadian Digital Identity Identity Summit 2015: 2Keys Canadian Digital Identity
Identity Summit 2015: 2Keys Canadian Digital Identity
 
Digital Consent: Taking UMA from Concept to Reality
Digital Consent: Taking UMA from Concept to RealityDigital Consent: Taking UMA from Concept to Reality
Digital Consent: Taking UMA from Concept to Reality
 
McKesson Case Study: Pharmacy Systems & Automation
McKesson Case Study: Pharmacy Systems & AutomationMcKesson Case Study: Pharmacy Systems & Automation
McKesson Case Study: Pharmacy Systems & Automation
 
Extending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAExtending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMA
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
 
Intelligent Authentication (Identity Live Berlin 2018)
Intelligent Authentication  (Identity Live Berlin 2018)Intelligent Authentication  (Identity Live Berlin 2018)
Intelligent Authentication (Identity Live Berlin 2018)
 
Identity Summit 2015: Aol Case Study. Multi-Tenancy in the Enterprise.
Identity Summit 2015: Aol Case Study. Multi-Tenancy in the Enterprise.Identity Summit 2015: Aol Case Study. Multi-Tenancy in the Enterprise.
Identity Summit 2015: Aol Case Study. Multi-Tenancy in the Enterprise.
 
Identity Summit 2015: EnerNOC Case Study: The Transformation of IAM for EnerN...
Identity Summit 2015: EnerNOC Case Study: The Transformation of IAM for EnerN...Identity Summit 2015: EnerNOC Case Study: The Transformation of IAM for EnerN...
Identity Summit 2015: EnerNOC Case Study: The Transformation of IAM for EnerN...
 
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
 
Winning with GDPR: How to Win Customer Loyalty and Trust
Winning with GDPR: How to Win Customer Loyalty and TrustWinning with GDPR: How to Win Customer Loyalty and Trust
Winning with GDPR: How to Win Customer Loyalty and Trust
 
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 ReleaseThe ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
 
Kantara - Digital Identity in 2018
Kantara - Digital Identity in 2018Kantara - Digital Identity in 2018
Kantara - Digital Identity in 2018
 
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
 
Identity Live Sydney 2017 - Tim Sheedy
Identity Live Sydney 2017 - Tim SheedyIdentity Live Sydney 2017 - Tim Sheedy
Identity Live Sydney 2017 - Tim Sheedy
 
Using Identity to Empower the Enterprise: Identity Relationship Management
Using Identity to Empower the Enterprise: Identity Relationship ManagementUsing Identity to Empower the Enterprise: Identity Relationship Management
Using Identity to Empower the Enterprise: Identity Relationship Management
 

Semelhante a Identity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGES

Data Con LA 2019 - One (Key) Ring to Rule Them All: Unified Identity Manageme...
Data Con LA 2019 - One (Key) Ring to Rule Them All: Unified Identity Manageme...Data Con LA 2019 - One (Key) Ring to Rule Them All: Unified Identity Manageme...
Data Con LA 2019 - One (Key) Ring to Rule Them All: Unified Identity Manageme...
Data Con LA
 
AY - Adaptive Access Control
AY - Adaptive Access ControlAY - Adaptive Access Control
AY - Adaptive Access Control
Adrian Young
 
How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023
Search Engine Journal
 

Semelhante a Identity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGES (20)

Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
 
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT ChallengeDigital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
 
Data Con LA 2019 - One (Key) Ring to Rule Them All: Unified Identity Manageme...
Data Con LA 2019 - One (Key) Ring to Rule Them All: Unified Identity Manageme...Data Con LA 2019 - One (Key) Ring to Rule Them All: Unified Identity Manageme...
Data Con LA 2019 - One (Key) Ring to Rule Them All: Unified Identity Manageme...
 
The Road to Intelligent Authentication Journeys
The Road to Intelligent Authentication JourneysThe Road to Intelligent Authentication Journeys
The Road to Intelligent Authentication Journeys
 
Cyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementCyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access management
 
AY - Adaptive Access Control
AY - Adaptive Access ControlAY - Adaptive Access Control
AY - Adaptive Access Control
 
[WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computi...
[WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computi...[WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computi...
[WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computi...
 
2015 Identity Summit: How to Maximize Return on Identity in a Brave New World
2015 Identity Summit: How to Maximize Return on Identity in a Brave New World2015 Identity Summit: How to Maximize Return on Identity in a Brave New World
2015 Identity Summit: How to Maximize Return on Identity in a Brave New World
 
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication
 
How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023
 
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
 
E-Lock AdaptAuth.pptx
E-Lock AdaptAuth.pptxE-Lock AdaptAuth.pptx
E-Lock AdaptAuth.pptx
 
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
 
TruMe the story
TruMe the storyTruMe the story
TruMe the story
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for value
 
Incorporate, don't alieante, Shadow IT
Incorporate, don't alieante, Shadow ITIncorporate, don't alieante, Shadow IT
Incorporate, don't alieante, Shadow IT
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)
 
Single Sign On IDM Value
Single Sign On IDM ValueSingle Sign On IDM Value
Single Sign On IDM Value
 
The New Venn of Access Control in the API-Mobile-IOT Era
The New Venn of Access Control in the API-Mobile-IOT EraThe New Venn of Access Control in the API-Mobile-IOT Era
The New Venn of Access Control in the API-Mobile-IOT Era
 
Implementing eGov
Implementing eGovImplementing eGov
Implementing eGov
 

Mais de ForgeRock

Mais de ForgeRock (20)

Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondGet the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
 
Identity Live Sydney: Identity Management - A Strategic Opportunity
Identity Live Sydney: Identity Management  - A Strategic OpportunityIdentity Live Sydney: Identity Management  - A Strategic Opportunity
Identity Live Sydney: Identity Management - A Strategic Opportunity
 
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityIdentity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity Capability
 
Identity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationIdentity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote Presentation
 
Identity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote PresentationIdentity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote Presentation
 
Identity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'EmIdentity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'Em
 
Identity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected SocietyIdentity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected Society
 
Identity Live Sydney: Building Trust and Privacy in a Connected Society
Identity Live  Sydney:  Building Trust and Privacy in a Connected SocietyIdentity Live  Sydney:  Building Trust and Privacy in a Connected Society
Identity Live Sydney: Building Trust and Privacy in a Connected Society
 
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep DiveGet the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
 
Get the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - OverviewGet the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - Overview
 
Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)
 
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
 
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
 
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
 
Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...
 
Customer Safeguarding, Fraud and GDPR: Manah Khalil
Customer Safeguarding, Fraud and GDPR: Manah KhalilCustomer Safeguarding, Fraud and GDPR: Manah Khalil
Customer Safeguarding, Fraud and GDPR: Manah Khalil
 
Applying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR SuccessApplying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR Success
 
What the Internet of Things Means for Consumer Privacy: Veronica Lara
What the Internet of Things Means for Consumer Privacy: Veronica LaraWhat the Internet of Things Means for Consumer Privacy: Veronica Lara
What the Internet of Things Means for Consumer Privacy: Veronica Lara
 
Identity Live in Austin Keynote
Identity Live in Austin Keynote Identity Live in Austin Keynote
Identity Live in Austin Keynote
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
 

Último

%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
masabamasaba
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
masabamasaba
 

Último (20)

%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptx
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 

Identity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGES

  • 1. STEPPING UP TO NEW DATA PROTECTION CHALLENGES USER-MANAGED ACCESS FOR GENUINE CONSENT Eve Maler (@xmlgrrl)
  • 2.
  • 3. Hard truths about the business of data privacy Copyright © Identity Summit 2015, all rights reserved.
  • 4. From the web to the IoT, the “fear/greed” tension around data sharing is only going to grow Copyright © Identity Summit 2015, all rights reserved.
  • 5. “In order to ensure free consent, it should be clarified that consent does not provide a valid legal ground where the individual has no genuine and free choice and is subsequently not able to refuse to withdraw consent without detriment. …. The data subject shall have the right to withdraw his or her consent at any time.” The Chief Privacy Officer and Chief Digital Officer need to meet in the middle Copyright © Identity Summit 2015, all rights reserved. 1. We value personal data as an asset 2. We value our customers’ wishes 3. Our customers have their own reasons to share, not share, and mash up data 4. Privacy can never simply be secrecy 5. Privacy is, fundamentally: a. Context b. Control c. Choice d. Respect
  • 6. Digital consent tools through time Copyright © Identity Summit 2015, all rights reserved. Web API economy IoT economy • Browse-wrap • Click-notice • Opt-in • Opt-out • Cookies • “Share” • API-wrap • Mobile app store download opt-in • OAuth • Consent receipts • UMA • …
  • 7. The two most familiar “emerging” consent tools only take us so far Standard, constrainable consent for app access…but run-time and point-to-point Constrainable “consented delegation” to other parties…but proprietary and limited Copyright © Identity Summit 2015, all rights reserved. “Share” OAuth
  • 8. The new Venn of access control and consent Copyright © Identity Summit 2015, all rights reserved.
  • 9. The mechanism: federated authorization on top of OAuth Loosely coupled to enable centralized authorization-as- a-service and a central sharing management hub Enables party-to-party sharing – without credential sharing – driven by fine- grained policy rather than run-time opt-in consent The requesting party is tested for authorization suitability through trust elevation, e.g. step-up authentication or “claims-based access control” Copyright © Identity Summit 2015, all rights reserved.
  • 10. Why is it valuable to use a standard for next-generation digital consent? Copyright © Identity Summit 2015, all rights reserved.
  • 11. This isn’t just slideware – see our live demo in the CTO Technology Preview! Copyright © Identity Summit 2015, all rights reserved.
  • 12. ForgeRock is delivering two key UMA components not long from now (client) OpenAM 13-based UMA Provider OpenIG 4-based UMA Protector Copyright © Identity Summit 2015, all rights reserved. resource server authorization server
  • 13. ForgeRock helps you deliver customer consent and delegation capabilities for successful digital transformation in a privacy-sensitive world Copyright © Identity Summit 2015, all rights reserved.

Notas do Editor

  1. Abstract: Existing notice-and-consent paradigms of privacy have begun to fail dramatically – and the EU Data Protection regulatory regime is shifting in response. Providing genuine and free choice in consented personal data sharing will no longer be optional – but fortunately, enabling consumer-controlled data sharing from cloud, mobile, and IoT sources is also good for your digitally transformed business. In this session, learn about how ForgeRock’s new solution based on the User-Managed Access (UMA) standard builds trust and strengthens privacy in the digital world.
  2. Great, your organization is ready for digital transformation so you can achieve breakthrough growth or other key metrics. Even if you manufacture outdoor clothing, it’s not a world solely of atoms anymore. Bits matter. Your customers want to know how you can enable smart tracking of fitness and location through your products. Your supply chain partners increasingly connect through APIs. Your IT processes shifted off paper long ago. So: Are you ready for all of the implications of digital transformation on your handling of personal data and how this affects both your customer relationships and your mitigation of risk? ---- Image source: https://www.flickr.com/photos/48746111@N04/4466093934 | CC BY-SA 2.0
  3. With thanks to Jon Neiditz: The Safe Harbor provision just died, demonstrating that… Surveillance – which we can no longer deny exists – overrides traditional permitted bases for data transfer, leaving us to conclude that… Individual consent, in the sense signaled by the forthcoming EU GDPR, will become the only bulletproof basis for international data transfer Image sources: http://www.abigailsconcierge.com/visitors-to-gig-harbor http://odditymall.com/scary-peeper-a-peeping-tom-figurine-to-scare-people http://www.zfi-inc.com/media/catalog/product/cache/1/image/9df78eab33525d08d6e5fb8d27136e95/0/0/0000763_executive-bulletproof-vest-protection-level-iii-a-made-by-marom-dolphin.jpeg
  4. It’s not just about websites and web and mobile apps scraping personal information. Especially when it comes to the Internet of things, It’s also about the sheer number of data sources, the inability to limit collection, and the inability to manage consenting to collection one by one. You can’t keep clicking “I agree” every time your smart socks want to record a heel strike. People will have to get ahead of the curve – and they might actually want to share that data, but only with personal trainers, doctors, and third-party marathon training apps. But then we have the problem of interoperability. The smarthomedb.com site currently lists reviews of OVER A HUNDRED different companies serving the consumer IoT market already, in 36 product categories.
  5. It’s emerging technology that mitigates risk of consent and data protection regulation like nothing else can
  6. If you’re trying to deliver online financial services, to support small businesses or tax reporting, these scenarios are filled with requirements and opportunities for delegating access to others. An employee wants to give her accountant access to her last year’s earnings statement, or a sole proprietor wants to give his contract bookkeeper selective access to some accounts. Recently we saw a story in the news about Audi enabling package delivery to parked unattended cars. Any car with an API could have that, if car owners could selectively enable access by others. Citizens traveling across borders and those trying to access government services often have reason to authorize access by others to attributes about them, such as their financial status, to enable access to government services. This shouldn’t just be a matter of passive consent; it could be a matter of a long-running relationship. Why is the AirBnB logo here? Imagine that you have a house chock-full of smart light bulbs and kitchen appliances made by different manufacturers. You’ve set them all up to work the way you want. Now you leave for a week, and you rent your place out through AirBnB. You want to give partial access to a partially trusted stranger, but only for a week! And then you want all the entitlements to expire. You’d better be able to do this conveniently from a single console. Patient-centric, RESTful health data sharing is the focus of the demonstration we’ll show next.
  7. Show recorded video (can be downloaded from here: https://drive.google.com/open?id=0B5Q4evmm_OOCN050RWtGSFhnV3c&authuser=0 )
  8. The UMA architecture has these three pieces. ForgeRock will deliver the two key pieces on the top in order to help you protect your API/application (policy enforcement points) and let your users set up sharing preferences (policy decision point).
  9. ForgeRock leads the industry in identity research, development, and solutions that put the customer at the center of your business. We have been moving aggressively to build innovative consumer-focused access management and privacy solutions based on the newly completed User-Managed Access (UMA) Version 1.0 standard, an effort led by our own Eve Maler, VP of Innovation and Emerging Technology in the ForgeRock office of the CTO. UMA was designed to give an individual a unified control point for authorizing who and what can get access to his or her personal data (such as contact information), content (such as health records), and services (such as access to a fitness API), no matter where the data lives online.