You are on page 1of 2

BY Saadi Lahlou, Marc Langheinrich, AND

Carsten Röcker

Privacy and Trust Issues


with Invisible Computers
W
hen 59-year-old Robert tems very different from today’s data
Rivera slipped on spilled collections [2]: First, the unprecedented
yogurt and injured his coverage of smart environments and
kneecap in a Los Angeles objects present in homes, offices, cars,
supermarket, he sued the store’s man- schools, and elderly care facilities. Sec-
agement to recover hospitalization costs ond, the data collection will be practi-
and lost wages. While the case was ulti- cally invisible: no more card swiping or
mately dismissed for lack of evidence, form signing, as sensors in walls, doors,
Rivera claims a mediator contacted him and shirts silently collect information.
before the verdict and encouraged him Third, data will be more intimate than
to settle; if he didn’t the store would ever before: not only what we do, where
reveal records of his (substantial) alcohol we do it, and when we do it, but also
purchases [6]. Rivera was a card-club how we feel while doing so (as expressed
member of that supermarket, as such by our heart rate, perspiration, or walk-
A set of designer authorizing the tracking of his shopping ing pattern). A fourth difference con-
guidelines from the habits in exchange for a small discount. cerns the underlying motivation for the
While Rivera’s version might ultimately data collection—after all, smart objects
European Union be impossible to verify, the story never- are dependent on as much information
offers the first step in theless shows how recording seemingly as they can possibly collect in order to
innocuous data about daily activities can best serve us. Lastly, the increasing
building privacy- have significant consequences on our interconnectivity allowing smart
aware systems. lives. devices to cooperatively help us means
In the era of disappearing computers, an unprecedented level of data sharing;
shopping habits would not be the only making unwanted information flows
data collected in an unnoticeable fash- much more likely. Together, these char-
ion. Smart objects and environments acteristics indicate that data collections
that support us unobtrusively and intel- in the age of ubiquitous computing
ligently will gather large amounts of would not only be a quantitative
information about every aspect of our change from today, but a qualitative
lives—our past preferences, current change: Never before has so much
activities, and future plans—in order to information about us been instantly
better serve us. available to so many others in such a
Five characteristics make such sys- detailed and intimate fashion.

COMMUNICATIONS OF THE ACM March 2005/Vol. 48, No. 3 59


Fear of Filing world collection practices with which users are already
Surveys since the 1970s show that loss of privacy is familiar. Applying the “Privacy razor” (rule Number
associated with the quantity of personal information Four) in design means listing everything the system
collected, and that fear of privacy infringements con- knows about the human user, and cutting out what is
stantly increases with the integration of computers in not “absolutely necessary” to provide the service; for
everyday life [5]. When boundaries between public and example, personal identification.
private spaces blur, users feel uneasy because they do Other rules are more fundamental in scope, such as
not know what information they actually share with rule Number One, “Think before doing,” which
whom, often triggering substantial privacy and security encourages designers to carefully consider the very phi-
concerns about the technology. Making technology losophy of a system’s functionality and its implication
invisible means that sensory borders disappear and for the privacy of its users—a thought experiment
common principles like “if I can see you, you can see often ignored when designers build applications
me” no longer hold. Because collecting and processing around newly available technology. The guidelines are
of personal information is a core function of smart available at www.rufae.net/privacy.html.
environments, privacy and ubiquity seem to be in con- While these rules still require more feedback from
stant conflict real-world deployments, they nevertheless present an
But what keeps the public stirring has hardly pene- important first step for building privacy-aware ubiqui-
trated the laboratories. A 2002 survey found a disturb- tous computing systems that European citizens can
ing lack of concern among the Disappearing trust. It is imperative that designers of such systems use
Computer Project designers [3]. Privacy was either an these guidelines as a starting point when creating dis-
abstract problem; not a problem yet (they are “only appearing computer applications, evaluate their useful-
prototypes”); not a problem at all (firewalls and cryp- ness for their design process, and fold back their
tography would take care of it); not their problem (but experiences into the guidelines, allowing them to
one for politicians, lawmakers, or, more vaguely, soci- evolve together with the applications that define the
ety); or simply not part of the project deliverables. field of ubiquitous and pervasive computing. After a
While many companies might have an explicit com- number of iterations, such guidelines could form the
pany privacy policy, few do so at the design level. This basis for a social dialogue that brings together develop-
is a significant issue, especially in the early stages of ers, service providers, legal experts, and social scientists
technological development, as design decisions have in order to update existing privacy legislation; and con-
far-reaching consequences for the future costs of pri- struct together with users a sustainable future with
vacy protection within the system. Hence, the design of invisible computers. c
adequate solutions will only succeed if privacy-related
problems are methodically approached from the initi- References
ial stages of development. 1. Lahlou, S. and Jegou, F. European Disappearing Computer Privacy Design
Guidelines V1.0. Ambient Agoras Report D15.4. Disappearing Computer
Initiative (Oct. 2003).
Privacy Enhancing Guidelines 2. Langheinrich, M. Privacy by design—Principles of privacy-aware ubiquitous
systems In Proceedings of Ubicomp 2001 (Atlanta, GA, Oct. 2, 2001).
The European Union Information Society Technolo- 3. Langheinrich, M. and Lahlou, S.A Troubadour Approach to Privacy. Ambi-
gies Programme funded a collective initiative that, in ent Agoras report 15.3.1. Disappearing Computer Initiative (Nov. 2003).
response to the findings noted here, produced the 4. Organization for Economic Co-operation and Development (OECD).
Guidelines on the Protection of Privacy and Transborder Flows of Personal
European Privacy Design Guidelines for the Disap- Data. (1980); www.junkbusters.com/fip.html for excerpt.
pearing Computer [1]. These guidelines are meant to 5. Robbin, A. The loss of personal privacy and its consequences for social
research. J. Government Information 28 (2001), 493–527.
help system designers implement privacy within the 6. Vogel, J. When cards come collecting—How Safeway’s new discount cards
core of ubiquitous computing systems. Designing for can be used against you. Seattle Weekly (Sept. 24–30, 1998).
privacy is difficult because privacy is often a trade-off
with usability. The guidelines state nine rules that not Saadi Lahlou (saadi.lahlou@edf.fr) heads the Laboratory of Design
only reinterpret some of the well-known fair informa- for Cognition at Electricité de France (EDF) R&D, Clamart, France.
tion practices [4] in light of disappearing computers, Marc Langheinrich (langhein@inf.ethz.ch) is a research assistant
such as openness and collection limitation, but also add in the Distributed Systems Group at the Institute for Pervasive
Computing, ETH Zurich, Switzerland.
new rules that specifically deal with the privacy chal- Carsten Röcker (roecker@ipsi.fraunhofer.de) is a scientific staff
lenges introduced by such invisible and comprehensive member of the research division AMBIENTE at the Fraunhofer
data collection. For example, rule Number Two, Institute IPSI in Darmstadt, Germany.
“Revisit classic solutions,” challenges designers to
incorporate existing socially constructed solutions
whenever possible, to be more compatible with real- © 2005 ACM 0001-0782/05/0300 $5.00

60 March 2005/Vol. 48, No. 3 COMMUNICATIONS OF THE ACM

You might also like