Adopt a PET! An Exploration of PETs, Policy, and Practicalities for Industry in Canada
- URL: http://arxiv.org/abs/2503.03027v1
- Date: Tue, 04 Mar 2025 22:08:56 GMT
- Title: Adopt a PET! An Exploration of PETs, Policy, and Practicalities for Industry in Canada
- Authors: Masoumeh Shafieinejad, Xi He, Bailey Kacsmar,
- Abstract summary: Privacy enhancing technologies (PETs) are technical solutions for privacy issues that exist in our digital society.<n>Despite increased privacy challenges and a corresponding increase in new regulations being proposed by governments across the globe, a low adoption rate of PETs persists.<n>We investigate the relationship that new privacy regulations have on industry's decision-making processes as well as the extent to which privacy regulations inspire the adoption of PETs.
- Score: 2.634702601759193
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: Privacy enhancing technologies (PETs) are technical solutions for privacy issues that exist in our digital society. Despite increased privacy challenges and a corresponding increase in new regulations being proposed by governments across the globe, a low adoption rate of PETs persists. In this work, we investigate the relationship that new privacy regulations have on industry's decision-making processes as well as the extent to which privacy regulations inspire the adoption of PETs. We conducted a qualitative survey study with 22 industry participants from across Canada to investigate how businesses in Canada make decisions to adopt novel technologies and how new privacy regulations impact their business processes. Through this study, we identify the breadth of approaches employed by organizations considering PETs and the challenges they face in their efforts to ensure compliance with all pertinent laws and regulations. We further identify a gap between how companies think of privacy technologies and how researchers think of privacy technologies that can contribute to low adoption of the increasingly sophisticated privacy technologies produced by researchers, such as applications of differential privacy, multiparty computation, and trusted execution environments. Informed by the results of our analysis, we make recommendations for industry, researchers, and policymakers on how to support what each of them seeks from the other when attempting to improve digital privacy protections. By advancing our understanding of what challenges industry faces in ensuring compliance with novel and existing privacy regulations, we increase the effectiveness of future privacy research that aims to help overcome these issues.
Related papers
- How Privacy-Savvy Are Large Language Models? A Case Study on Compliance and Privacy Technical Review [15.15468770348023]
We evaluate large language models' performance in privacy-related tasks such as privacy information extraction (PIE), legal and regulatory key point detection (KPD), and question answering (QA)
Through an empirical assessment, we investigate the capacity of several prominent LLMs, including BERT, GPT-3.5, GPT-4, and custom models, in executing privacy compliance checks and technical privacy reviews.
While LLMs show promise in automating privacy reviews and identifying regulatory discrepancies, significant gaps persist in their ability to fully comply with evolving legal standards.
arXiv Detail & Related papers (2024-09-04T01:51:37Z) - Privacy Risks of General-Purpose AI Systems: A Foundation for Investigating Practitioner Perspectives [47.17703009473386]
Powerful AI models have led to impressive leaps in performance across a wide range of tasks.
Privacy concerns have led to a wealth of literature covering various privacy risks and vulnerabilities of AI models.
We conduct a systematic review of these survey papers to provide a concise and usable overview of privacy risks in GPAIS.
arXiv Detail & Related papers (2024-07-02T07:49:48Z) - A Narrative Review of Identity, Data, and Location Privacy Techniques in Edge Computing and Mobile Crowdsourcing [2.5944208050492183]
This review focuses on the need for privacy protection in mobile crowdsourcing and edge computing.
We present insights and highlight advancements in privacy-preserving techniques, addressing identity, data, and location privacy.
This review also discusses the potential directions that can be useful resources for researchers, industry professionals, and policymakers.
arXiv Detail & Related papers (2024-01-20T19:32:56Z) - SoK: Demystifying Privacy Enhancing Technologies Through the Lens of
Software Developers [4.171555557592296]
In the absence of data protection measures, software applications lead to privacy breaches.
This review analyses 39 empirical studies on developers' privacy practices.
It reports the usage of six PETs in software application scenarios.
It discusses challenges developers face when integrating PETs into software.
arXiv Detail & Related papers (2023-12-30T12:24:40Z) - SoK: Technical Implementation and Human Impact of Internet Privacy
Regulations [2.797211052758564]
We analyze a set of Internet privacy and data protection regulations drawn from around the world.
We develop a taxonomy of rights granted and obligations imposed by these laws.
We then leverage this taxonomy to systematize 270 technical research papers.
arXiv Detail & Related papers (2023-12-24T01:48:07Z) - When PETs misbehave: A Contextual Integrity analysis [0.7397067779113841]
We use the theory of Contextual Integrity to explain how privacy technologies may be misused to erode privacy.
We consider three PETs and scenarios: anonymous credentials for age verification, client-side scanning for illegal content detection, and homomorphic encryption for machine learning model training.
arXiv Detail & Related papers (2023-12-05T05:27:43Z) - Advancing Differential Privacy: Where We Are Now and Future Directions for Real-World Deployment [100.1798289103163]
We present a detailed review of current practices and state-of-the-art methodologies in the field of differential privacy (DP)
Key points and high-level contents of the article were originated from the discussions from "Differential Privacy (DP): Challenges Towards the Next Frontier"
This article aims to provide a reference point for the algorithmic and design decisions within the realm of privacy, highlighting important challenges and potential research directions.
arXiv Detail & Related papers (2023-04-14T05:29:18Z) - Having your Privacy Cake and Eating it Too: Platform-supported Auditing
of Social Media Algorithms for Public Interest [70.02478301291264]
Social media platforms curate access to information and opportunities, and so play a critical role in shaping public discourse.
Prior studies have used black-box methods to show that these algorithms can lead to biased or discriminatory outcomes.
We propose a new method for platform-supported auditing that can meet the goals of the proposed legislation.
arXiv Detail & Related papers (2022-07-18T17:32:35Z) - Mitigating Sovereign Data Exchange Challenges: A Mapping to Apply
Privacy- and Authenticity-Enhancing Technologies [67.34625604583208]
Authenticity Enhancing Technologies (AETs) and Privacy-Enhancing Technologies (PETs) are considered to engage in Sovereign Data Exchange (SDE)
PETs and AETs are technically complex, which impedes their adoption.
This study empirically constructs a challenge-oriented technology mapping.
arXiv Detail & Related papers (2022-06-20T08:16:42Z) - Usage Patterns of Privacy-Enhancing Technologies [6.09170287691728]
This paper contributes to privacy research by eliciting use and perception of use across $43$ privacy methods.
Non-technology methods are among the most used methods in the US, the UK and Germany.
This research provides a broad understanding of use and perceptions across a collection of PETs, and can lead to future research for scaling use of PETs.
arXiv Detail & Related papers (2020-09-22T02:17:37Z) - A vision for global privacy bridges: Technical and legal measures for
international data markets [77.34726150561087]
Despite data protection laws and an acknowledged right to privacy, trading personal information has become a business equated with "trading oil"
An open conflict is arising between business demands for data and a desire for privacy.
We propose and test a vision of a personal information market with privacy.
arXiv Detail & Related papers (2020-05-13T13:55:50Z) - Beyond privacy regulations: an ethical approach to data usage in
transportation [64.86110095869176]
We describe how Federated Machine Learning can be applied to the transportation sector.
We see Federated Learning as a method that enables us to process privacy-sensitive data, while respecting customer's privacy.
arXiv Detail & Related papers (2020-04-01T15:10:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.