SlideShare uma empresa Scribd logo
1 de 2
Main
Category
Four main categories of data
3.
Derived
4.
Inferred
1.
Provided
2.
Observed
Provided data are data which originate from direct actions taken by an individual, whereby he or she is fully aware of the
actions that lead to data origination. Examples include: data disclosed by individuals in the context of a loan application
(“initiated data”), data created when buying a product with a credit card (“transactional data”), or data shared (actively) via
an online social network (“posted data”). While the individuals concerned may be unaware of the implications of providing
these data, the fact that these data are being created should be obvious – or at least intuitive.
Observed data are data which have been observed by others and recorded in a digital format. These data can be recorded
either at the moment of their creation, or transmitted to a digital carrier after observation. Examples include: data
originating from online cookies, data generated by sensors, and passively created observational data (e.g., data captured
by CCTV cameras combined with facial recognition). While individuals may be made aware of the creation of observed
data (e.g., due to active engagement), much of the creation of observed data may go unnoticed.
Derived data are data generated from other data, after which they become new data elements related to a particular
individual. Derived data are said to be created in a fairly “mechanical” fashion using simple reasoning and basic
mathematics to detect patterns within a data set and create classifications. While these classifications may later be used
for predictive purposes, they are not themselves based on probabilistic reasoning. Examples include: computational data
(e.g. a calculation of customer profitability based on the ratio between number of visits and the items bought) and
notational data (e.g. the detection of common attributes among “profitable” customers which are then used to classify
potential customers).
Inferred data are the product of probability-based analytic processes. They are a result of the detection of correlations
which are used to create predictions of behaviour. These predictions are then used to categorise individuals. Examples of
include: statistical data (e.g., credit risk scores, life expectancy scores) and advanced analytical data (e.g., likelihood of
future health outcomes based on an analysis of large and diverse medical data sets). Typically, the individuals to whom
these data relate are not involved in their creation and may remain unaware of any inferences made.
Based on: “The Origins of Personal Data and its Implications for Governance” By Martin Abrams, The Information Accountability Foundation, 21 March 2014”
A taxonomy of personal data by origin
RichardClaassens
Sub
Category
Example Level of Individual
Awareness
A taxonomy of personal data by origin
3.1.
Computational
3.3.
Notational
4.1.
Statistical
4.2.
Advanced Analytical
o Credit ratios
o Average purchase per visit
o Risk of developing a disease based on a single genetic variation
o Classification based on common attributes of buyers
o Medical condition based on diagnostic tests
o Credit score
o Response score
o Fraud scores
o Life expectancy
o Risk of developing a disease based multi-factor analysis
o College success score based on multi-variable Big Data analysis at age 9
1.1.
Initiated
o Applications
o Registrations
o Public records such as licenses
o Credit card purchases
o Medical history as provided by individual
High
1.2.
Transactional
1.3.
Posted
o Bills paid
o Inquiries responded to
o Blood pressure or weight as recorded in clinical care setting
o Public records such as court proceedings
o Speeches in public settings
o Social network postings
o Photo services
o Video sites
High
High
2.1.
Engaged
2.2.
Not Anticipated
2.3.
Passive
o Cookies on a website
o Loyalty card
o Enabled location sensors on personal devices
o Fitness tracking using wearable device
o Data from sensor technology on my Car
o Time paused over a pixel on the screen of a tablet
o Facial images from CCTV
o Obscured web technologies
o Wi-Fi readers in buildings that establish location
Medium
Low
Low
Medium to Low
Medium to Low
Low
Low
Based on: “The Origins of Personal Data and its Implications for Governance” By Martin Abrams, The Information Accountability Foundation, 21 March 2014”
Main
Category
3.
Derived
4.
Inferred
1.
Provided
2.
Observed
RichardClaassens

Mais conteúdo relacionado

Semelhante a A taxonomy of personal data by origin

Behavioral Big Data & Healthcare Research: Talk at WiDS Taipei
Behavioral Big Data & Healthcare Research: Talk at WiDS TaipeiBehavioral Big Data & Healthcare Research: Talk at WiDS Taipei
Behavioral Big Data & Healthcare Research: Talk at WiDS TaipeiGalit Shmueli
 
Risks, Harms and Benefits Assessment Tool (Updated as of Jan 2019)
Risks, Harms and Benefits Assessment Tool (Updated as of Jan 2019)Risks, Harms and Benefits Assessment Tool (Updated as of Jan 2019)
Risks, Harms and Benefits Assessment Tool (Updated as of Jan 2019)UN Global Pulse
 
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONPranav Godse
 
2010 report data security survey
2010 report  data security survey2010 report  data security survey
2010 report data security surveyCarlo Del Bo
 
Behavioral Big Data & Healthcare Research
Behavioral Big Data & Healthcare ResearchBehavioral Big Data & Healthcare Research
Behavioral Big Data & Healthcare ResearchGalit Shmueli
 
Privacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin NeviasPrivacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin NeviasKevin Nevias
 
Surveillance Systems And Studies That Should Be...
Surveillance Systems And Studies That Should Be...Surveillance Systems And Studies That Should Be...
Surveillance Systems And Studies That Should Be...Ann Johnson
 
Evidence Based Healthcare Design
Evidence Based Healthcare DesignEvidence Based Healthcare Design
Evidence Based Healthcare DesignCarmen Martin
 
DATA PRIVACY IN AN AGE OF INCREASINGLY SPECIFIC AND PUBLICLY AVAILABLE DATA: ...
DATA PRIVACY IN AN AGE OF INCREASINGLY SPECIFIC AND PUBLICLY AVAILABLE DATA: ...DATA PRIVACY IN AN AGE OF INCREASINGLY SPECIFIC AND PUBLICLY AVAILABLE DATA: ...
DATA PRIVACY IN AN AGE OF INCREASINGLY SPECIFIC AND PUBLICLY AVAILABLE DATA: ...Ted Myerson
 
Big data analytics for life insurers
Big data analytics for life insurersBig data analytics for life insurers
Big data analytics for life insurersdipak sahoo
 
Big_data_analytics_for_life_insurers_published
Big_data_analytics_for_life_insurers_publishedBig_data_analytics_for_life_insurers_published
Big_data_analytics_for_life_insurers_publishedShradha Verma
 
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Ted Myerson
 
Data Collection Tool Used For Information About Individuals
Data Collection Tool Used For Information About IndividualsData Collection Tool Used For Information About Individuals
Data Collection Tool Used For Information About IndividualsChristy Hunt
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggonermihinpr
 
wp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industrywp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industryNumaan Huq
 
Data mining by_ashok
Data mining by_ashokData mining by_ashok
Data mining by_ashokAshok Kumar
 
Trust & Predictive Technologies 2016
Trust & Predictive Technologies 2016Trust & Predictive Technologies 2016
Trust & Predictive Technologies 2016Edelman
 
Your Supply Chain partner for electronic components.pdf
Your Supply Chain partner for electronic components.pdfYour Supply Chain partner for electronic components.pdf
Your Supply Chain partner for electronic components.pdfJakir30
 

Semelhante a A taxonomy of personal data by origin (20)

Behavioral Big Data & Healthcare Research: Talk at WiDS Taipei
Behavioral Big Data & Healthcare Research: Talk at WiDS TaipeiBehavioral Big Data & Healthcare Research: Talk at WiDS Taipei
Behavioral Big Data & Healthcare Research: Talk at WiDS Taipei
 
Risks, Harms and Benefits Assessment Tool (Updated as of Jan 2019)
Risks, Harms and Benefits Assessment Tool (Updated as of Jan 2019)Risks, Harms and Benefits Assessment Tool (Updated as of Jan 2019)
Risks, Harms and Benefits Assessment Tool (Updated as of Jan 2019)
 
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
 
2010 report data security survey
2010 report  data security survey2010 report  data security survey
2010 report data security survey
 
Data mining
Data miningData mining
Data mining
 
Behavioral Big Data & Healthcare Research
Behavioral Big Data & Healthcare ResearchBehavioral Big Data & Healthcare Research
Behavioral Big Data & Healthcare Research
 
Privacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin NeviasPrivacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin Nevias
 
Surveillance Systems And Studies That Should Be...
Surveillance Systems And Studies That Should Be...Surveillance Systems And Studies That Should Be...
Surveillance Systems And Studies That Should Be...
 
Evidence Based Healthcare Design
Evidence Based Healthcare DesignEvidence Based Healthcare Design
Evidence Based Healthcare Design
 
DATA PRIVACY IN AN AGE OF INCREASINGLY SPECIFIC AND PUBLICLY AVAILABLE DATA: ...
DATA PRIVACY IN AN AGE OF INCREASINGLY SPECIFIC AND PUBLICLY AVAILABLE DATA: ...DATA PRIVACY IN AN AGE OF INCREASINGLY SPECIFIC AND PUBLICLY AVAILABLE DATA: ...
DATA PRIVACY IN AN AGE OF INCREASINGLY SPECIFIC AND PUBLICLY AVAILABLE DATA: ...
 
Big data analytics for life insurers
Big data analytics for life insurersBig data analytics for life insurers
Big data analytics for life insurers
 
Big_data_analytics_for_life_insurers_published
Big_data_analytics_for_life_insurers_publishedBig_data_analytics_for_life_insurers_published
Big_data_analytics_for_life_insurers_published
 
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
 
Data Collection Tool Used For Information About Individuals
Data Collection Tool Used For Information About IndividualsData Collection Tool Used For Information About Individuals
Data Collection Tool Used For Information About Individuals
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggoner
 
wp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industrywp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industry
 
Data mining by_ashok
Data mining by_ashokData mining by_ashok
Data mining by_ashok
 
Cp34550555
Cp34550555Cp34550555
Cp34550555
 
Trust & Predictive Technologies 2016
Trust & Predictive Technologies 2016Trust & Predictive Technologies 2016
Trust & Predictive Technologies 2016
 
Your Supply Chain partner for electronic components.pdf
Your Supply Chain partner for electronic components.pdfYour Supply Chain partner for electronic components.pdf
Your Supply Chain partner for electronic components.pdf
 

Mais de Richard Claassens CIPPE

Privacy het nieuwe groen | KNVI afdeling IT-audit | definitief
Privacy het nieuwe groen | KNVI afdeling IT-audit | definitiefPrivacy het nieuwe groen | KNVI afdeling IT-audit | definitief
Privacy het nieuwe groen | KNVI afdeling IT-audit | definitiefRichard Claassens CIPPE
 
Is privacywetgeving een blokkade voor technologisch gedreven innovatie?
Is privacywetgeving een blokkade voor technologisch gedreven innovatie?Is privacywetgeving een blokkade voor technologisch gedreven innovatie?
Is privacywetgeving een blokkade voor technologisch gedreven innovatie?Richard Claassens CIPPE
 
Data Masking | waar in het IT-systeemlandschap? ...
Data Masking | waar in het IT-systeemlandschap?                              ...Data Masking | waar in het IT-systeemlandschap?                              ...
Data Masking | waar in het IT-systeemlandschap? ...Richard Claassens CIPPE
 
Taken van de functionaris voor gegevensbescherming
Taken van de functionaris voor gegevensbescherming Taken van de functionaris voor gegevensbescherming
Taken van de functionaris voor gegevensbescherming Richard Claassens CIPPE
 
Positie van de functionaris voor gegevensbescherming (FG)
Positie van de functionaris voor gegevensbescherming (FG)Positie van de functionaris voor gegevensbescherming (FG)
Positie van de functionaris voor gegevensbescherming (FG)Richard Claassens CIPPE
 
Pripare methodology-handbook-final-feb-24-2016
Pripare methodology-handbook-final-feb-24-2016Pripare methodology-handbook-final-feb-24-2016
Pripare methodology-handbook-final-feb-24-2016Richard Claassens CIPPE
 
Benoeming van een functionaris voor gegevensbescherming (FG)
Benoeming van een functionaris voor gegevensbescherming (FG)Benoeming van een functionaris voor gegevensbescherming (FG)
Benoeming van een functionaris voor gegevensbescherming (FG)Richard Claassens CIPPE
 
Privacy het nieuwe groen KNVI definitief
Privacy het nieuwe groen KNVI definitiefPrivacy het nieuwe groen KNVI definitief
Privacy het nieuwe groen KNVI definitiefRichard Claassens CIPPE
 
Establishing SOA and SOA Governance 23032010 Amsterdam
Establishing SOA and SOA Governance 23032010 AmsterdamEstablishing SOA and SOA Governance 23032010 Amsterdam
Establishing SOA and SOA Governance 23032010 AmsterdamRichard Claassens CIPPE
 
Semantische interoperabiliteit met behulp van een bedrijfsbrede taxonomie
Semantische interoperabiliteit met behulp van een bedrijfsbrede taxonomieSemantische interoperabiliteit met behulp van een bedrijfsbrede taxonomie
Semantische interoperabiliteit met behulp van een bedrijfsbrede taxonomieRichard Claassens CIPPE
 
Heidag Architectuur | presentatie van verkenningen
Heidag Architectuur | presentatie van verkenningenHeidag Architectuur | presentatie van verkenningen
Heidag Architectuur | presentatie van verkenningenRichard Claassens CIPPE
 
Ontwerpmodel Internet Of Things Diensten
Ontwerpmodel  Internet Of Things  DienstenOntwerpmodel  Internet Of Things  Diensten
Ontwerpmodel Internet Of Things DienstenRichard Claassens CIPPE
 
Software packaged software principles publiek
Software packaged software principles publiekSoftware packaged software principles publiek
Software packaged software principles publiekRichard Claassens CIPPE
 

Mais de Richard Claassens CIPPE (20)

Privacy het nieuwe groen | KNVI afdeling IT-audit | definitief
Privacy het nieuwe groen | KNVI afdeling IT-audit | definitiefPrivacy het nieuwe groen | KNVI afdeling IT-audit | definitief
Privacy het nieuwe groen | KNVI afdeling IT-audit | definitief
 
Is privacywetgeving een blokkade voor technologisch gedreven innovatie?
Is privacywetgeving een blokkade voor technologisch gedreven innovatie?Is privacywetgeving een blokkade voor technologisch gedreven innovatie?
Is privacywetgeving een blokkade voor technologisch gedreven innovatie?
 
Data Masking | waar in het IT-systeemlandschap? ...
Data Masking | waar in het IT-systeemlandschap?                              ...Data Masking | waar in het IT-systeemlandschap?                              ...
Data Masking | waar in het IT-systeemlandschap? ...
 
Taken van de functionaris voor gegevensbescherming
Taken van de functionaris voor gegevensbescherming Taken van de functionaris voor gegevensbescherming
Taken van de functionaris voor gegevensbescherming
 
Positie van de functionaris voor gegevensbescherming (FG)
Positie van de functionaris voor gegevensbescherming (FG)Positie van de functionaris voor gegevensbescherming (FG)
Positie van de functionaris voor gegevensbescherming (FG)
 
Pripare methodology-handbook-final-feb-24-2016
Pripare methodology-handbook-final-feb-24-2016Pripare methodology-handbook-final-feb-24-2016
Pripare methodology-handbook-final-feb-24-2016
 
Benoeming van een functionaris voor gegevensbescherming (FG)
Benoeming van een functionaris voor gegevensbescherming (FG)Benoeming van een functionaris voor gegevensbescherming (FG)
Benoeming van een functionaris voor gegevensbescherming (FG)
 
Privacy het nieuwe groen KNVI definitief
Privacy het nieuwe groen KNVI definitiefPrivacy het nieuwe groen KNVI definitief
Privacy het nieuwe groen KNVI definitief
 
Establishing SOA and SOA Governance 23032010 Amsterdam
Establishing SOA and SOA Governance 23032010 AmsterdamEstablishing SOA and SOA Governance 23032010 Amsterdam
Establishing SOA and SOA Governance 23032010 Amsterdam
 
Verkenning internet of things
Verkenning internet of thingsVerkenning internet of things
Verkenning internet of things
 
Semantische interoperabiliteit met behulp van een bedrijfsbrede taxonomie
Semantische interoperabiliteit met behulp van een bedrijfsbrede taxonomieSemantische interoperabiliteit met behulp van een bedrijfsbrede taxonomie
Semantische interoperabiliteit met behulp van een bedrijfsbrede taxonomie
 
Heidag Architectuur | presentatie van verkenningen
Heidag Architectuur | presentatie van verkenningenHeidag Architectuur | presentatie van verkenningen
Heidag Architectuur | presentatie van verkenningen
 
Verkenning geo services
Verkenning geo services Verkenning geo services
Verkenning geo services
 
Ontwerpmodel Internet Of Things Diensten
Ontwerpmodel  Internet Of Things  DienstenOntwerpmodel  Internet Of Things  Diensten
Ontwerpmodel Internet Of Things Diensten
 
Software packaged software principles publiek
Software packaged software principles publiekSoftware packaged software principles publiek
Software packaged software principles publiek
 
Kennismaking sfdc v1
Kennismaking sfdc v1Kennismaking sfdc v1
Kennismaking sfdc v1
 
Authenticatie
AuthenticatieAuthenticatie
Authenticatie
 
Cloud computing lunchsessie (v2)
Cloud computing lunchsessie (v2)Cloud computing lunchsessie (v2)
Cloud computing lunchsessie (v2)
 
Cloud computing overzicht
Cloud computing overzichtCloud computing overzicht
Cloud computing overzicht
 
Establishing Soa And Soa Governance Hsa
Establishing Soa And Soa Governance HsaEstablishing Soa And Soa Governance Hsa
Establishing Soa And Soa Governance Hsa
 

Último

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 

Último (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 

A taxonomy of personal data by origin

  • 1. Main Category Four main categories of data 3. Derived 4. Inferred 1. Provided 2. Observed Provided data are data which originate from direct actions taken by an individual, whereby he or she is fully aware of the actions that lead to data origination. Examples include: data disclosed by individuals in the context of a loan application (“initiated data”), data created when buying a product with a credit card (“transactional data”), or data shared (actively) via an online social network (“posted data”). While the individuals concerned may be unaware of the implications of providing these data, the fact that these data are being created should be obvious – or at least intuitive. Observed data are data which have been observed by others and recorded in a digital format. These data can be recorded either at the moment of their creation, or transmitted to a digital carrier after observation. Examples include: data originating from online cookies, data generated by sensors, and passively created observational data (e.g., data captured by CCTV cameras combined with facial recognition). While individuals may be made aware of the creation of observed data (e.g., due to active engagement), much of the creation of observed data may go unnoticed. Derived data are data generated from other data, after which they become new data elements related to a particular individual. Derived data are said to be created in a fairly “mechanical” fashion using simple reasoning and basic mathematics to detect patterns within a data set and create classifications. While these classifications may later be used for predictive purposes, they are not themselves based on probabilistic reasoning. Examples include: computational data (e.g. a calculation of customer profitability based on the ratio between number of visits and the items bought) and notational data (e.g. the detection of common attributes among “profitable” customers which are then used to classify potential customers). Inferred data are the product of probability-based analytic processes. They are a result of the detection of correlations which are used to create predictions of behaviour. These predictions are then used to categorise individuals. Examples of include: statistical data (e.g., credit risk scores, life expectancy scores) and advanced analytical data (e.g., likelihood of future health outcomes based on an analysis of large and diverse medical data sets). Typically, the individuals to whom these data relate are not involved in their creation and may remain unaware of any inferences made. Based on: “The Origins of Personal Data and its Implications for Governance” By Martin Abrams, The Information Accountability Foundation, 21 March 2014” A taxonomy of personal data by origin RichardClaassens
  • 2. Sub Category Example Level of Individual Awareness A taxonomy of personal data by origin 3.1. Computational 3.3. Notational 4.1. Statistical 4.2. Advanced Analytical o Credit ratios o Average purchase per visit o Risk of developing a disease based on a single genetic variation o Classification based on common attributes of buyers o Medical condition based on diagnostic tests o Credit score o Response score o Fraud scores o Life expectancy o Risk of developing a disease based multi-factor analysis o College success score based on multi-variable Big Data analysis at age 9 1.1. Initiated o Applications o Registrations o Public records such as licenses o Credit card purchases o Medical history as provided by individual High 1.2. Transactional 1.3. Posted o Bills paid o Inquiries responded to o Blood pressure or weight as recorded in clinical care setting o Public records such as court proceedings o Speeches in public settings o Social network postings o Photo services o Video sites High High 2.1. Engaged 2.2. Not Anticipated 2.3. Passive o Cookies on a website o Loyalty card o Enabled location sensors on personal devices o Fitness tracking using wearable device o Data from sensor technology on my Car o Time paused over a pixel on the screen of a tablet o Facial images from CCTV o Obscured web technologies o Wi-Fi readers in buildings that establish location Medium Low Low Medium to Low Medium to Low Low Low Based on: “The Origins of Personal Data and its Implications for Governance” By Martin Abrams, The Information Accountability Foundation, 21 March 2014” Main Category 3. Derived 4. Inferred 1. Provided 2. Observed RichardClaassens