SlideShare uma empresa Scribd logo
1 de 13
Baixar para ler offline
Data Privacy Issues Concerning
Automated and Connected Vehicles
Karlyn D. Stanley and Jason Wagner
April 2016
Key Questions
• Is there a need for new policies to manage vehicular
and transportation data collected and used by the
state as connected and automated vehicles are
deployed?
• Should there be a state or federal approach to
managing vehicular data issues from connected and
automated vehicles?
Report Explains How New
Technologies May Challenge
Existing Data Privacy Protections
• The debate about data de-
identification
• The auto industry lacks
consensus concerning how to
protect drivers’ data privacy
Report Explains How New
Technologies May Challenge
Existing Data Privacy Protections
• Consumers are willing to trade
their personal data to obtain a
benefit
• Eighty-six percent of adults
surveyed by AAA think there
should be laws and policies to
protect their vehicle data
Privacy Protection is Segmented in
U.S. Law and Regulation
• U.S. federal statutes cover different aspects of
privacy protection—financial, medical, children’s use
of the Internet—in contrast to the Canadian
approach
• There is not a consistent statutory definition of
“personal identifying information” (PII)
Interviews of State DOTs, SMEs,
Industry Stakeholders, and Privacy
Experts Addressed Key Issues
• How are vehicular data being
collected in Texas and other
states?
• How are transportation data
being used?
• Who owns or can access and use
the data?
• What is the value of vehicular
data?
Who Owns or Can Use the Data?
• Drivers may think that they own or control their
car’s data, but this is not what we found in research
• There are telematic devices being installed in many
new cars that transmit PII whether the driver likes it
or not
• Calls for a “bill of rights” to control automakers’
collection of data
States and Private Entities are
Planning to Use and Monetize
AV/CV Data
• OEMs, telematics, and
insurance companies, among
other stakeholders, plan to
monetize and use AV/CV data
• States plan to monetize and
use data for traffic control and
management
States will Face a “Tsunami”
of Data from AVs/CVs
• State agencies have made few
preparations to deal with the
extremely large volume of
vehicular data that experts
predict will be produced by
automated and connected
vehicle technologies
States will Face a “Tsunami”
of Data from AVs/CVs
• States may need third parties
to handle the volume of AV/CV
data and analyze it for state
transportation purposes
• States will need to control use
of AV/CV data by third parties,
so need clear regulations or
guidelines
Data De-Identification is Not the
Perfect Solution for Concerns About
AV/CV Data Privacy
• Experts disagree about whether data de-
identification works
• Recent MIT study puts current PII protection
framework into question
• Currently, no standards for how AV/CV data should
be de-identified
There is No Consensus About a
State or Federal Approach for U.S.
AV/CV Regulation
• OEMs, insurance companies
fear a patchwork of state
legislation
• Advocates say states can take
leadership role
• States may resist imposition of
federal guidelines and delay
deployment of AVs/CVs
Link to Report
• http://tti.tamu.edu/documents/PRC-15-49-
F.pdf
Karlyn D. Stanley
Kstanley@rand.org
202-746-0111

Mais conteúdo relacionado

Mais procurados

ODDC Context - The quality of civic data in India and the implications on the...
ODDC Context - The quality of civic data in India and the implications on the...ODDC Context - The quality of civic data in India and the implications on the...
ODDC Context - The quality of civic data in India and the implications on the...Open Data Research Network
 
Young people's policy recommendations on algorithm fairness web sci17
Young people's policy recommendations on algorithm fairness web sci17Young people's policy recommendations on algorithm fairness web sci17
Young people's policy recommendations on algorithm fairness web sci17Ansgar Koene
 
Mobile Health Symposium #HIMSS15 Session Mh5
Mobile Health Symposium #HIMSS15 Session Mh5Mobile Health Symposium #HIMSS15 Session Mh5
Mobile Health Symposium #HIMSS15 Session Mh53GDR
 
Diversity and Inclusion: Opening address by Tony Simons
Diversity and Inclusion: Opening address by Tony SimonsDiversity and Inclusion: Opening address by Tony Simons
Diversity and Inclusion: Opening address by Tony SimonsCGIAR
 
David Winickoff, Session 1
David Winickoff, Session 1David Winickoff, Session 1
David Winickoff, Session 1OECD Governance
 
ODDC Context - An Investigation of the use of the Online National Budget of N...
ODDC Context - An Investigation of the use of the Online National Budget of N...ODDC Context - An Investigation of the use of the Online National Budget of N...
ODDC Context - An Investigation of the use of the Online National Budget of N...Open Data Research Network
 
Lorenzo Allio, Session 3
Lorenzo Allio, Session 3Lorenzo Allio, Session 3
Lorenzo Allio, Session 3OECD Governance
 
Nick Malyshev, Session 1
Nick Malyshev, Session 1Nick Malyshev, Session 1
Nick Malyshev, Session 1OECD Governance
 
Preventing Corruption: a Toolking For Parliamentarians
Preventing Corruption: a Toolking For ParliamentariansPreventing Corruption: a Toolking For Parliamentarians
Preventing Corruption: a Toolking For ParliamentariansGovernance Asssessment Portal
 

Mais procurados (12)

ODDC Context - The quality of civic data in India and the implications on the...
ODDC Context - The quality of civic data in India and the implications on the...ODDC Context - The quality of civic data in India and the implications on the...
ODDC Context - The quality of civic data in India and the implications on the...
 
Young people's policy recommendations on algorithm fairness web sci17
Young people's policy recommendations on algorithm fairness web sci17Young people's policy recommendations on algorithm fairness web sci17
Young people's policy recommendations on algorithm fairness web sci17
 
Mobile Health Symposium #HIMSS15 Session Mh5
Mobile Health Symposium #HIMSS15 Session Mh5Mobile Health Symposium #HIMSS15 Session Mh5
Mobile Health Symposium #HIMSS15 Session Mh5
 
Diversity and Inclusion: Opening address by Tony Simons
Diversity and Inclusion: Opening address by Tony SimonsDiversity and Inclusion: Opening address by Tony Simons
Diversity and Inclusion: Opening address by Tony Simons
 
Manchester Conference 1.11.11 - Select Committees
Manchester Conference 1.11.11 - Select CommitteesManchester Conference 1.11.11 - Select Committees
Manchester Conference 1.11.11 - Select Committees
 
Revised presentation
Revised presentationRevised presentation
Revised presentation
 
David Winickoff, Session 1
David Winickoff, Session 1David Winickoff, Session 1
David Winickoff, Session 1
 
ODDC Context - An Investigation of the use of the Online National Budget of N...
ODDC Context - An Investigation of the use of the Online National Budget of N...ODDC Context - An Investigation of the use of the Online National Budget of N...
ODDC Context - An Investigation of the use of the Online National Budget of N...
 
Mining for Sustainable Development Programme
Mining for Sustainable Development ProgrammeMining for Sustainable Development Programme
Mining for Sustainable Development Programme
 
Lorenzo Allio, Session 3
Lorenzo Allio, Session 3Lorenzo Allio, Session 3
Lorenzo Allio, Session 3
 
Nick Malyshev, Session 1
Nick Malyshev, Session 1Nick Malyshev, Session 1
Nick Malyshev, Session 1
 
Preventing Corruption: a Toolking For Parliamentarians
Preventing Corruption: a Toolking For ParliamentariansPreventing Corruption: a Toolking For Parliamentarians
Preventing Corruption: a Toolking For Parliamentarians
 

Semelhante a Automated Vehicles: Planning the Next Disruptive Technology

Pli workplace privacy in the year 2013 2013-6-13
Pli workplace privacy in the year 2013   2013-6-13Pli workplace privacy in the year 2013   2013-6-13
Pli workplace privacy in the year 2013 2013-6-13mkeane
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analyticsshekharkanodia
 
Artificial intelligence main features of the law
Artificial intelligence main features of the lawArtificial intelligence main features of the law
Artificial intelligence main features of the lawDharmendra919733
 
Getting to Know Open Government Data: Who's done it, how did they do, and so ...
Getting to Know Open Government Data: Who's done it, how did they do, and so ...Getting to Know Open Government Data: Who's done it, how did they do, and so ...
Getting to Know Open Government Data: Who's done it, how did they do, and so ...jimduncan4
 
07 KENYA EXPECTION ON THE OBSERVATORY.pptx
07 KENYA EXPECTION ON THE OBSERVATORY.pptx07 KENYA EXPECTION ON THE OBSERVATORY.pptx
07 KENYA EXPECTION ON THE OBSERVATORY.pptxFaayAbdiaziz
 
Discoverable Client Issues Using Public Big Data
Discoverable Client Issues Using Public Big DataDiscoverable Client Issues Using Public Big Data
Discoverable Client Issues Using Public Big DataMatthew Stubenberg
 
Chinoy Paper 2016 - WDQC-MakingtheMostofWorkforceData-web
Chinoy Paper 2016 - WDQC-MakingtheMostofWorkforceData-webChinoy Paper 2016 - WDQC-MakingtheMostofWorkforceData-web
Chinoy Paper 2016 - WDQC-MakingtheMostofWorkforceData-webMala Chinoy
 
CFPB Hot Topics in 2016
CFPB Hot Topics in 2016 CFPB Hot Topics in 2016
CFPB Hot Topics in 2016 Experian
 
Web Analytics and Privacy
Web Analytics and Privacy Web Analytics and Privacy
Web Analytics and Privacy Piwik PRO
 
IT risk discusion qustion.pdf
IT risk discusion qustion.pdfIT risk discusion qustion.pdf
IT risk discusion qustion.pdfstirlingvwriters
 
Glantus Presentation Slides - Ethical Data Science - BoI Analytics Connect 2018
Glantus Presentation Slides - Ethical Data Science - BoI Analytics Connect 2018Glantus Presentation Slides - Ethical Data Science - BoI Analytics Connect 2018
Glantus Presentation Slides - Ethical Data Science - BoI Analytics Connect 2018Joe Keating
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Shawn Tuma
 
The Impact Of Web Scraping On Government Sites And Public Sector Data.pdf
The Impact Of Web Scraping On Government Sites And Public Sector Data.pdfThe Impact Of Web Scraping On Government Sites And Public Sector Data.pdf
The Impact Of Web Scraping On Government Sites And Public Sector Data.pdfData Scraping and Data Extraction
 
Glantus Presentation: Ethical Data Science - BoI Analytics Connect 2018
Glantus Presentation: Ethical Data Science - BoI Analytics Connect 2018Glantus Presentation: Ethical Data Science - BoI Analytics Connect 2018
Glantus Presentation: Ethical Data Science - BoI Analytics Connect 2018Joe Keating
 
Legal issues of domain names & trademarks
Legal issues of domain names & trademarksLegal issues of domain names & trademarks
Legal issues of domain names & trademarksMatt Siltala
 
Applications of Artificial Intelligence for government
Applications of Artificial Intelligence for government Applications of Artificial Intelligence for government
Applications of Artificial Intelligence for government HarshMishraMUSIC
 
How Our Cities Can Plan for Driverless Cars
How Our Cities Can Plan for Driverless CarsHow Our Cities Can Plan for Driverless Cars
How Our Cities Can Plan for Driverless CarsWSP
 
Privacy Issues in Networked Economy
Privacy Issues in Networked EconomyPrivacy Issues in Networked Economy
Privacy Issues in Networked EconomySonia Kaul Takoo
 
Autonomous-Vehicles.pdf
Autonomous-Vehicles.pdfAutonomous-Vehicles.pdf
Autonomous-Vehicles.pdfRavi262874
 

Semelhante a Automated Vehicles: Planning the Next Disruptive Technology (20)

Pli workplace privacy in the year 2013 2013-6-13
Pli workplace privacy in the year 2013   2013-6-13Pli workplace privacy in the year 2013   2013-6-13
Pli workplace privacy in the year 2013 2013-6-13
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analytics
 
Artificial intelligence main features of the law
Artificial intelligence main features of the lawArtificial intelligence main features of the law
Artificial intelligence main features of the law
 
Getting to Know Open Government Data: Who's done it, how did they do, and so ...
Getting to Know Open Government Data: Who's done it, how did they do, and so ...Getting to Know Open Government Data: Who's done it, how did they do, and so ...
Getting to Know Open Government Data: Who's done it, how did they do, and so ...
 
07 KENYA EXPECTION ON THE OBSERVATORY.pptx
07 KENYA EXPECTION ON THE OBSERVATORY.pptx07 KENYA EXPECTION ON THE OBSERVATORY.pptx
07 KENYA EXPECTION ON THE OBSERVATORY.pptx
 
Discoverable Client Issues Using Public Big Data
Discoverable Client Issues Using Public Big DataDiscoverable Client Issues Using Public Big Data
Discoverable Client Issues Using Public Big Data
 
Chinoy Paper 2016 - WDQC-MakingtheMostofWorkforceData-web
Chinoy Paper 2016 - WDQC-MakingtheMostofWorkforceData-webChinoy Paper 2016 - WDQC-MakingtheMostofWorkforceData-web
Chinoy Paper 2016 - WDQC-MakingtheMostofWorkforceData-web
 
CFPB Hot Topics in 2016
CFPB Hot Topics in 2016 CFPB Hot Topics in 2016
CFPB Hot Topics in 2016
 
Marcus Comiter, "Data Policy for Internet of Things Healthcare Devices: Align...
Marcus Comiter, "Data Policy for Internet of Things Healthcare Devices: Align...Marcus Comiter, "Data Policy for Internet of Things Healthcare Devices: Align...
Marcus Comiter, "Data Policy for Internet of Things Healthcare Devices: Align...
 
Web Analytics and Privacy
Web Analytics and Privacy Web Analytics and Privacy
Web Analytics and Privacy
 
IT risk discusion qustion.pdf
IT risk discusion qustion.pdfIT risk discusion qustion.pdf
IT risk discusion qustion.pdf
 
Glantus Presentation Slides - Ethical Data Science - BoI Analytics Connect 2018
Glantus Presentation Slides - Ethical Data Science - BoI Analytics Connect 2018Glantus Presentation Slides - Ethical Data Science - BoI Analytics Connect 2018
Glantus Presentation Slides - Ethical Data Science - BoI Analytics Connect 2018
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
 
The Impact Of Web Scraping On Government Sites And Public Sector Data.pdf
The Impact Of Web Scraping On Government Sites And Public Sector Data.pdfThe Impact Of Web Scraping On Government Sites And Public Sector Data.pdf
The Impact Of Web Scraping On Government Sites And Public Sector Data.pdf
 
Glantus Presentation: Ethical Data Science - BoI Analytics Connect 2018
Glantus Presentation: Ethical Data Science - BoI Analytics Connect 2018Glantus Presentation: Ethical Data Science - BoI Analytics Connect 2018
Glantus Presentation: Ethical Data Science - BoI Analytics Connect 2018
 
Legal issues of domain names & trademarks
Legal issues of domain names & trademarksLegal issues of domain names & trademarks
Legal issues of domain names & trademarks
 
Applications of Artificial Intelligence for government
Applications of Artificial Intelligence for government Applications of Artificial Intelligence for government
Applications of Artificial Intelligence for government
 
How Our Cities Can Plan for Driverless Cars
How Our Cities Can Plan for Driverless CarsHow Our Cities Can Plan for Driverless Cars
How Our Cities Can Plan for Driverless Cars
 
Privacy Issues in Networked Economy
Privacy Issues in Networked EconomyPrivacy Issues in Networked Economy
Privacy Issues in Networked Economy
 
Autonomous-Vehicles.pdf
Autonomous-Vehicles.pdfAutonomous-Vehicles.pdf
Autonomous-Vehicles.pdf
 

Mais de Texas A&M Transportation Institute

The Transportation Revenue Estimator and Needs Determination System
The Transportation Revenue Estimator and Needs Determination SystemThe Transportation Revenue Estimator and Needs Determination System
The Transportation Revenue Estimator and Needs Determination SystemTexas A&M Transportation Institute
 
Texas A&M Transportation Institute - 60th Anniversary Brochure
Texas A&M Transportation Institute - 60th Anniversary BrochureTexas A&M Transportation Institute - 60th Anniversary Brochure
Texas A&M Transportation Institute - 60th Anniversary BrochureTexas A&M Transportation Institute
 

Mais de Texas A&M Transportation Institute (20)

When Your Urban Core Arrives
When Your Urban Core Arrives When Your Urban Core Arrives
When Your Urban Core Arrives
 
Methods to Measure & Monitor Pedestrian Travel
Methods to Measure & Monitor Pedestrian TravelMethods to Measure & Monitor Pedestrian Travel
Methods to Measure & Monitor Pedestrian Travel
 
Pedestrian Safety in North Texas
Pedestrian Safety in North Texas Pedestrian Safety in North Texas
Pedestrian Safety in North Texas
 
TTI's Visibility Laboratory
TTI's Visibility LaboratoryTTI's Visibility Laboratory
TTI's Visibility Laboratory
 
Truck Platooning at TTI
Truck Platooning at TTI Truck Platooning at TTI
Truck Platooning at TTI
 
The Transportation Revenue Estimator and Needs Determination System
The Transportation Revenue Estimator and Needs Determination SystemThe Transportation Revenue Estimator and Needs Determination System
The Transportation Revenue Estimator and Needs Determination System
 
Travel Forecasting Program
Travel Forecasting Program Travel Forecasting Program
Travel Forecasting Program
 
Transportation Planning
Transportation Planning Transportation Planning
Transportation Planning
 
Transit Mobility Program at TTI
Transit Mobility Program at TTI Transit Mobility Program at TTI
Transit Mobility Program at TTI
 
Driving Simulator Facilities at TTI
Driving Simulator Facilities at TTI Driving Simulator Facilities at TTI
Driving Simulator Facilities at TTI
 
Sediment and Erosion Control (SEC) Laboratory
Sediment and Erosion Control (SEC) Laboratory Sediment and Erosion Control (SEC) Laboratory
Sediment and Erosion Control (SEC) Laboratory
 
Texas A&M University System - RELLIS Campus
Texas A&M University System - RELLIS CampusTexas A&M University System - RELLIS Campus
Texas A&M University System - RELLIS Campus
 
Multimodal Freight Program
Multimodal Freight Program Multimodal Freight Program
Multimodal Freight Program
 
Public Engagement Planning
Public Engagement PlanningPublic Engagement Planning
Public Engagement Planning
 
I-35 Corridor Project in Texas
I-35 Corridor Project in Texas I-35 Corridor Project in Texas
I-35 Corridor Project in Texas
 
Intelligent Transportation Systems (ITS) Research at TTI
Intelligent Transportation Systems (ITS) Research at TTIIntelligent Transportation Systems (ITS) Research at TTI
Intelligent Transportation Systems (ITS) Research at TTI
 
TTI Facilities for Human Factors Research
TTI Facilities for Human Factors ResearchTTI Facilities for Human Factors Research
TTI Facilities for Human Factors Research
 
Human Factors at TTI
Human Factors at TTIHuman Factors at TTI
Human Factors at TTI
 
Texas A&M Transportation Institute - 60th Anniversary Brochure
Texas A&M Transportation Institute - 60th Anniversary BrochureTexas A&M Transportation Institute - 60th Anniversary Brochure
Texas A&M Transportation Institute - 60th Anniversary Brochure
 
TTI Aviation Research and Planning
TTI Aviation Research and PlanningTTI Aviation Research and Planning
TTI Aviation Research and Planning
 

Último

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Último (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Automated Vehicles: Planning the Next Disruptive Technology

  • 1. Data Privacy Issues Concerning Automated and Connected Vehicles Karlyn D. Stanley and Jason Wagner April 2016
  • 2. Key Questions • Is there a need for new policies to manage vehicular and transportation data collected and used by the state as connected and automated vehicles are deployed? • Should there be a state or federal approach to managing vehicular data issues from connected and automated vehicles?
  • 3. Report Explains How New Technologies May Challenge Existing Data Privacy Protections • The debate about data de- identification • The auto industry lacks consensus concerning how to protect drivers’ data privacy
  • 4. Report Explains How New Technologies May Challenge Existing Data Privacy Protections • Consumers are willing to trade their personal data to obtain a benefit • Eighty-six percent of adults surveyed by AAA think there should be laws and policies to protect their vehicle data
  • 5. Privacy Protection is Segmented in U.S. Law and Regulation • U.S. federal statutes cover different aspects of privacy protection—financial, medical, children’s use of the Internet—in contrast to the Canadian approach • There is not a consistent statutory definition of “personal identifying information” (PII)
  • 6. Interviews of State DOTs, SMEs, Industry Stakeholders, and Privacy Experts Addressed Key Issues • How are vehicular data being collected in Texas and other states? • How are transportation data being used? • Who owns or can access and use the data? • What is the value of vehicular data?
  • 7. Who Owns or Can Use the Data? • Drivers may think that they own or control their car’s data, but this is not what we found in research • There are telematic devices being installed in many new cars that transmit PII whether the driver likes it or not • Calls for a “bill of rights” to control automakers’ collection of data
  • 8. States and Private Entities are Planning to Use and Monetize AV/CV Data • OEMs, telematics, and insurance companies, among other stakeholders, plan to monetize and use AV/CV data • States plan to monetize and use data for traffic control and management
  • 9. States will Face a “Tsunami” of Data from AVs/CVs • State agencies have made few preparations to deal with the extremely large volume of vehicular data that experts predict will be produced by automated and connected vehicle technologies
  • 10. States will Face a “Tsunami” of Data from AVs/CVs • States may need third parties to handle the volume of AV/CV data and analyze it for state transportation purposes • States will need to control use of AV/CV data by third parties, so need clear regulations or guidelines
  • 11. Data De-Identification is Not the Perfect Solution for Concerns About AV/CV Data Privacy • Experts disagree about whether data de- identification works • Recent MIT study puts current PII protection framework into question • Currently, no standards for how AV/CV data should be de-identified
  • 12. There is No Consensus About a State or Federal Approach for U.S. AV/CV Regulation • OEMs, insurance companies fear a patchwork of state legislation • Advocates say states can take leadership role • States may resist imposition of federal guidelines and delay deployment of AVs/CVs
  • 13. Link to Report • http://tti.tamu.edu/documents/PRC-15-49- F.pdf Karlyn D. Stanley Kstanley@rand.org 202-746-0111