Extensible Consent Management Architectures for Data Trusts
- URL: http://arxiv.org/abs/2309.16789v1
- Date: Thu, 28 Sep 2023 18:28:50 GMT
- Title: Extensible Consent Management Architectures for Data Trusts
- Authors: Balambiga Ayappane, Rohith Vaidyanathan, Srinath Srinivasa, Jayati
Deshmukh
- Abstract summary: This paper proposes a framework for consent management in Data Trusts.
Data can flow across a network through "role tunnels" established based on corresponding legal capacities.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Sensitive personal information of individuals and non-personal information of
organizations or communities often needs to be legitimately exchanged among
different stakeholders, to provide services, maintain public health, law and
order, and so on. While such exchanges are necessary, they also impose enormous
privacy and security challenges. Data protection laws like GDPR for personal
data and Indian Non-personal data protection draft specify conditions and the
\textit{legal capacity} in which personal and non-personal information can be
solicited and disseminated further. But there is a dearth of formalisms for
specifying legal capacities and jurisdictional boundaries, so that open-ended
exchange of such data can be implemented. This paper proposes an extensible
framework for consent management in Data Trusts in which data can flow across a
network through "role tunnels" established based on corresponding legal
capacities.
Related papers
- Collection, usage and privacy of mobility data in the enterprise and public administrations [55.2480439325792]
Security measures such as anonymization are needed to protect individuals' privacy.
Within our study, we conducted expert interviews to gain insights into practices in the field.
We survey privacy-enhancing methods in use, which generally do not comply with state-of-the-art standards of differential privacy.
arXiv Detail & Related papers (2024-07-04T08:29:27Z) - Auditing and Generating Synthetic Data with Controllable Trust Trade-offs [54.262044436203965]
We introduce a holistic auditing framework that comprehensively evaluates synthetic datasets and AI models.
It focuses on preventing bias and discrimination, ensures fidelity to the source data, assesses utility, robustness, and privacy preservation.
We demonstrate the framework's effectiveness by auditing various generative models across diverse use cases.
arXiv Detail & Related papers (2023-04-21T09:03:18Z) - Generative AI and the Digital Commons [0.0]
GFMs are trained on publicly available data and use public infrastructure.
We outline the risks posed by GFMs and why they are relevant to the digital commons.
We propose numerous governance-based solutions.
arXiv Detail & Related papers (2023-03-20T13:01:48Z) - Advanced Data Protection Control (ADPC): An Interdisciplinary Overview [0.0]
The Advanced Data Protection Control (ADPC) is a technical specification that can change the practice of Internet-based personal data protection and consenting.
The ADPC supports humans in practicing their rights to privacy and agency by giving them more human-centric control over the processing of their personal data and consent.
arXiv Detail & Related papers (2022-09-20T13:57:49Z) - An Example of Privacy and Data Protection Best Practices for Biometrics
Data Processing in Border Control: Lesson Learned from SMILE [0.9442139459221784]
Misuse of data, compromising the privacy of individuals and/or authorized processing of data may be irreversible.
This is partly due to the lack of methods and guidance for the integration of data protection and privacy by design in the system development process.
We present an example of privacy and data protection best practices to provide more guidance for data controllers and developers.
arXiv Detail & Related papers (2022-01-10T15:34:43Z) - Distributed Machine Learning and the Semblance of Trust [66.1227776348216]
Federated Learning (FL) allows the data owner to maintain data governance and perform model training locally without having to share their data.
FL and related techniques are often described as privacy-preserving.
We explain why this term is not appropriate and outline the risks associated with over-reliance on protocols that were not designed with formal definitions of privacy in mind.
arXiv Detail & Related papers (2021-12-21T08:44:05Z) - Second layer data governance for permissioned blockchains: the privacy
management challenge [58.720142291102135]
In pandemic situations, such as the COVID-19 and Ebola outbreak, the action related to sharing health data is crucial to avoid the massive infection and decrease the number of deaths.
In this sense, permissioned blockchain technology emerges to empower users to get their rights providing data ownership, transparency, and security through an immutable, unified, and distributed database ruled by smart contracts.
arXiv Detail & Related papers (2020-10-22T13:19:38Z) - A vision for global privacy bridges: Technical and legal measures for
international data markets [77.34726150561087]
Despite data protection laws and an acknowledged right to privacy, trading personal information has become a business equated with "trading oil"
An open conflict is arising between business demands for data and a desire for privacy.
We propose and test a vision of a personal information market with privacy.
arXiv Detail & Related papers (2020-05-13T13:55:50Z) - Beyond privacy regulations: an ethical approach to data usage in
transportation [64.86110095869176]
We describe how Federated Machine Learning can be applied to the transportation sector.
We see Federated Learning as a method that enables us to process privacy-sensitive data, while respecting customer's privacy.
arXiv Detail & Related papers (2020-04-01T15:10:12Z) - The SPECIAL-K Personal Data Processing Transparency and Compliance
Platform [0.1385411134620987]
SPECIAL EU H 2020 project can be used to represent data policies and data and events sharing.
System can verify that data processing and sharing complies with the data subjects consent.
arXiv Detail & Related papers (2020-01-26T14:30:09Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.