You are on page 1of 4

Newsletter on Innovation and Foresight

N°03 / July 2012

Innovation
& prospective

Follow us on the website How can we control


our personal data
[www.cnil.fr/ip] by scanning
the QR Code or on

­online?
IP - EvEnt

A
The first Privacy Camp in Europe t a time when personal data has
The digital community and CNIL come together to share become a highly marketable
views on personal data control online. commodity, finding an answer
to this question is no simple task.
Panorama of privacy protection Even so, no one can question the need for
tools tools that will allow Internet users to regain
More and more ‘privacy protection’ tools are becoming control of their data and help build up trust in the digital economy.
available for the general public, but what are the aims of Last March, CNIL organized its first Privacy Camp on just this issue,
those developing and promoting them? A general survey.
with participants attempting to answer this difficult but crucial
question.
Three questions to Jean-Marc Manach For CNIL, the event was a real innovation in terms of both form
OWNI journalist and Le Monde blogger (Bug Brother)
Jean-Marc Manach is a specialist on digital liberties and
and content. Jointly coordinated by the Department of Studies,
issues relating to surveillance and privacy protection. He is Innovation and Foresight and the Communication Department,
the author of "La vie privée, un problème de vieux cons ?" its success proves that CNIL is on the right track with its open,
and "Au pays de Candy : enquête sur les marchands d’armes collaborative approach.
de surveillance numérique".
The Privacy Camp provided a forum for enthusiastic debate as well
as criticism. A number of novel and imaginative proposals emerged,
IP - FOCUS including some put forward by CNIL's innovation laboratory.
Discussions focused on tools, practices, and services aimed at
Service robots – at the center of helping users learn more about online personal data flows and ‘leaks’
future ethical and legal debate? and control privacy online.
A report submitted to the Ministry of Industry considers
the future of service robots in France. Assisting the elderly The event was also an opportunity for CNIL to embark on an
or disabled, companions or domestic robots, security and initiative based on sharing and collaboration that is part of its plan
surveillance – these are the most likely emerging markets. to develop an open approach to innovation, in favor of privacy and
However, ethical and legal issues remain unclear, and
"privacy" will be the focus of increasing attention as these personal data control. Other events and initiatives are planned.
robots become part of our daily lives.

Sophie VULLIET-TAVERNIER,
According to Symantec, the cost Head of Studies, Innovation and Foresight
of data breach incidents for French
companies is constantly rising
The Symantec study published in March 2012 on the cost
of data breaches reveals that the cost has risen by 16% to
reach an average cost per compromised record of e122.

News in brief…
Key figures.
IP - EvEnt

Europe's first Privacy Camp: technical solutions needed for their large-
scale use, such as the WebID protocol, a
the digital community gathers universal standard for identity and login
that is being developed by a W3C group3.
to share views on personal data control Participants also explored anonymity and
pseudonymity in their various forms, as
online well as the tools designed to preserve them.
For example, although the free software
On March 30, 2012, the digital community Privacy Commissioner of Canada. Shaun and open network TOR enables browsing
took over La Cantine (see box), for a half-day Dakin mentioned in particular the ongoing to be anonymous, it can also make it slower.
event initiated by CNIL to address the issue debates on the White House's “Consumer As with encryption, tools must be adapted
of “how to control personal data online”. Privacy Bill of Rights”2. to meet real requirements without starting
The event was organized as a BarCamp or an ‘arms race’. Another workshop attemp-
“unconference”, open to anyone wishing ted to clarify the directly related issue of
to attend its participant-driven workshops. managing several identities, considering
The agenda is created by attendees, who how it could be achieved and why it was
Participants proposed and led
must all contribute, in one way or another, useful. Identity segmentation springs from
11 workshops on the following
based on the “no spectators, only partici- a desire to adapt to different contexts but
topics:
pants” principle. 1. Anonymous or not?
can be difficult to achieve in technical
Jointly organized by CNIL, Mozilla, Owni 2. Distributed or decentralized social and practical terms. It can even have the
and Silicon Sentier, the event was a great networks. ­opposite effect to that intended.
success, drawing a hundred or so attendees 3. Cell phones and privacy. A long debate ensued on educational
from a wide range of backgrounds (ordi- 4. All our personal data exposed aspects and the need for concrete demons-
nary Internet users, experts, developers, online: why we can't control our data
journalists specializing in the digital world, once it's online (demo).
researchers and academics, students, 5. Free economic models versus
digital liberties activists, designers, and Privacy.
business people) to talk about tools, prac- 6. Tracking tools: cookies, chip card
tices, and services designed to help control readers (demo).
privacy online, and learn more about 7. The WebID concept.
online person­al data flows and ‘leaks’. 8. Online awareness and reputation.
CNIL's Expertise Department presented 9. Anonymity tools (demo).
a tool designed by the CNIL Innovation 10. Is it possible to manage several
­Laboratory for real-time visual representa- identities?
tion of cookies. 11. Hack the CNIL? How to go on from
there...
A videoconference on data protection
in America was organized with Shaun
Dakin, the promoter of PrivacyCamps
in the United States 1. PrivacyCamps The workshops addressed a very wide range tration tools to make people more aware
were organized in Washington and San of topics, asking questions such as what of tracking. Efforts in this area should
Francisco in 2010 and 2011 to coincide with Facebook will be like twenty years from now not stop at heightening risk awareness,
the Privacy Identity Innovation conference. after a long period of data ­accumulation. however, but also offer concrete solutions,
Another such event was held in Canada in Two workshops looked into the concepts taking care to avoid messages that serve
June 2010, supported by the Office of the of decentralized social networks and the no purpose other than to increase anxiety.
In this respect, CNIL should not only show
how we are tracked, but also how we can
protect ourselves and choose the right level
of protection.
La Cantine : a coworking venue for everyone in For CNIL, the event was a pool of new
the digital community ideas, confirming the advantages of the
open approach to innovation it wishes to
promote. A collaborative report (available
on cnil.fr/ip) testifies to the quality of the
discussions. Many different opinions were
expressed on currently available tools, their
advantages and their ease of use. Partici-
pants also discussed what tools they would
like to have available in the future.
La Cantine, located in the Passage des Panoramas in Paris, is run by Silicon Sentier, an asso-
ciation that brings together 170 start-ups and SMEs. It is a place where people can work – it is Anne-Sophie Jacquot
the first coworking space in Paris – and organize events for the digital community. La Cantine Geoffrey Delcroix
sees itself as a place where “programmers, developers, technology enthusiasts, innovators,
business people and users can meet and exchange views”. 1. http://twitter.com/privacycamp
2. http://www.whitehouse.gov/sites/default/files/privacy-final.pdf
http://lacantine.org/
3. http://www.w3.org/wiki/WebID
4. https://www.torproject.org/
Three questions to… a public space, and that any information we
‘share’ is no longer ‘private’. On the contrary,
us how to lead a public life. And that is
what the future of the Internet is all about:
Jean-Marc Manach the concept of 100% security does not exist in we are all becoming public figures. In my
physical space any more than it does on the opinion, that's a good thing for democracy.
Internet, and that is true whether we consi- The sexual revolution allowed us to contem-
der our computers (and therefore our private plate (and teach) sexuality in ways other
correspondence, identifiers and passwords) than just in terms of ­reproduction and
or the personal data that e-commerce and sexually transmitted diseases. Similarly,
administrative websites demand that we the development of the Internet should
give them. Which explains the importance of help us understand (and therefore teach)
notions such as data minimization (keeping freedom of expression as a supplement to
OWNI journalist and Le Monde blogger shared data to a minimum), privacy by design democracy.
(Bug Brother) Jean-Marc Manach is (i.e. designing privacy protection into services
a specialist on digital liberties and issues and applications) and, of course, observing the What do you say when someone
relating to surveillance and privacy protection.
law. As it happens, very few websites have been asks for your advice on personal data
He is the author of “La vie privée, un problème
de vieux cons?” and “Au pays de Candy: sued, let alone sanctioned, for having failed to control?
enquête sur les marchands d’armes provide adequate protection for their users' We need to be clear about one thing: we
de surveillance numérique”. personal data. can no more make our computers 100%
secure than we can make our homes 100%
What can be done to incite people to secure from burglars. Which doesn't mean
Do you think we can still protect take greater care of their personal data, we can't take some precautions. American
our personal data online or is the without resorting to complex, technical researcher Danah Boyd7 has frequently
battle over before it has begun? explanations or generating unnecessary explained that young Internet users are
Following the Google portrait of an ‘ano- anxiety? better at managing their private lives
nymous’ Internet user, published by the We need to trust users and treat them like online than their parents are. Paradoxically,
magazine Le Tigre and based on photos, intelligent, responsible beings. We need to the best way to protect our personal data is
videos and information that the user had stop being afraid of them and stop frightening to express ourselves, which means having
shared on the web and social networks, them. Messages relating to computer security a public life online. Because the more we
a journalist decided to draw ‘my’ Google and online privacy are usually put over in ways use the Internet, the more we learn about
portrait6. Although I have been an active that generate anxiety. Unfortunately, the ten- how to master its uses, services and tools
Internet user, journalist and defender of dency is to make Internet users feel guilty and and thus to control machines. Letting
liberties and privacy for more than ten explain to them that the Internet is compli- the machine control us and dictate to us
years, he didn't find any ‘sensitive’ infor- cated and fraught with danger. That is both what we can and cannot do means giving
mation about me, which goes to show that condescending and counterproductive. There's someone else responsibility for protecting
it's quite possible for us to ‘protect’ our data nothing intrinsically wrong in using the Inter- our data. And we can only protect what we
once we have understood that the Web is net to run our private lives, in fact it can teach can control8. 

Ever more tools for privacy protection and control


Recent months have seen the arrival of a PrivacyChoice has adopted a different Free or more specialized tools are also
growing number of tools aimed at helping approach. Using its own criteria, it assigns available. CNIL will soon be posting a video
Internet users understand more about sites a score out of 100 according to their tutorial on its website explaining how to
the tracks they leave behind them on the privacy policy and the presence of trackers. limit the tracks we leave on the Internet
Web and how they are followed. These This assessment is accessible via a browser and taking a look at the AdBlockPlus and
tools, which are often very well designed add-on (see illustration below). While the ShareMeNote browser extensions and the
and ­practical to use, could at last appeal approaches adopted by these companies DuckDuckGo search engine.
to a wider audience, and not just to geeks Geoffrey Delcroix
who either use more complex encryption
and anonymity tools, or solutions that call
for long parameter settings or advanced
­technical knowledge. Example: “PrivacyScore” of
the Wall Street Journal website
Most new tools in this area are used with according to PrivacyChoice.
very widespread products, usually as web
browser add-ons. One of the most famous
is called Collusion5, an add-on for Firefox
developed by Mozilla that allows users to would seem to have their advantages,
see all the cookies and trackers encountered the assessment ­criteria they use imply 5. http://www.mozilla.org/en-US/collusion/
during a browsing session. Mozilla is a subjective choices that may be related to 6. “ Tout ce que vous avez toujours voulu savoir sur moi mais
que vous aviez la flemme d’aller chercher sur l’internet…”
non-profit organization, but several private their economic model. And that brings us http://bugbrother.blog.lemonde.fr/2009/01/16/tout-ce-que-
companies have also entered the personal to what could be the big question tomor- vous-avez-toujours-voulu-savoir-sur-moi-mais-que-vous-aviez-
la-flemme-daller-chercher-sur-linternet/
data protection market. Two such examples row (setting aside problems of daily use): 7. “ Vers une vie privée en réseau ” : http://www.internetactu.
are Abine and Evidon, which have how far can we trust these economic net/2010/03/18/vers-une-vie-privee-en-reseau/
8. See “ Vie privée : le point de vue des ‘petits cons’ ” : http://www.
developed their own tracker blocking tools, stakeholders and how do they determine internetactu.net/2010/01/04/vie-privee-le-point-de-vue-des-
respectively “Do Not Track +” and “Ghostery”. whether a cookie is ‘good’ or ‘bad’? petits-cons/
IP - FOCUS

Service robots - at the center of future News in brief…


ethical and legal debate?
In June 2012, the consultancy firm Erdyn Two-thirds of British consumers responding
to a survey stated that their definition of
submitted its report on the future industrial
privacy had changed since the arrival of the
development of personal and service robots Internet and social media, while four-fifths
in France to the Ministry of Industry. The considered that disclosing personal infor-
study, available in French on the website mation was increasingly part of modern life.
of PIPAME9, an interministerial taskforce (Data privacy: What the consumer really thinks
on foresight and anticipation of economic 2012, The UK Direct Marketing Association,
June 2012).
change, focuses particularly on three
emerging markets for service robot appli- 300 million photos are published on Face-
cations: robots for assisting elderly and book every day (First-quarter results 2012,
disabled people, companion or domestic Facebook).
robots, and security and surveillance robots. According to a survey by market research
The study defines the robot as a mechan­ company GfK, 3 million tablets will be sold in
i­cal device that can perform tasks with France in 2012, a 50% increase on 2011 sales.
independent decision-making capability with the ability to sense, process, and record the In France, 61% of students at junior high
on all or some of the elementary actions world around them.” This means that privacy school (collège) and 49% at senior high
making up the tasks in question. It sets out will be a major issue over the coming years, ­(lycée) spend more than one hour a day
to assess the strong and weak points of the for if service robots come to be regarded posting photos and videos on Facebook.
scientific and industrial fabric and of the as permanent domestic spies they will no (“Enfants et­­­Internet, Baromètre 2011 de l’opé-
ration nationale de sensibilisation” Calysto -
French robotics ecosystem at the interna- longer be accepted by consumers. If the
La voix de l’enfant).
tional level. According to the Erdyn report, government comes out strongly in favor
legal and ethical issues are often raised of developing service ­robotics in France, Two-thirds of French cell phone users accept
in the debate on service robots and their as the authors of the Erdyn report hope, the idea of geolocation (the same proportion
as in the rest of the world). 31% of them
applications (respect for human dignity, then the ethical and regulatory framework use geolocation-related services (compared
privacy, individual liberties, confidentia- - and privacy in ­particular - will definitely with 19% worldwide) and 64% wish to use
lity, social responsibility, etc.), but seldom be one of the keys to large-scale deployment ­geolocation services in the future (Mobile Life
resolved. The usual position adopted by of ­service robots. 2012 – TNS Sofres, Avril 2012).
market players is that although such ethi- Geoffrey Delcroix In France, 25% of women and 16% of men
cal questions should be raised, they should admit to spying on their husband's/wife's/
not hinder the deployment of robots. In partner's telephone, computer, mailbox or Fa-
actual fact, it would be better to go a step 9. http://www.industrie.gouv.fr/p3e/etudes-prospectives/
cebook account (Yahoo ! survey, June 2012).
further and make robots socially, ethically robotique/
According to a survey by Cisco, the Internet
10. M. Ryan Calo, “Robots and Privacy,” in Robot Ethics : The Ethical
and legally acceptable. But as Ryan Calo and Social Implications of Robotics (Patrick Lin, George Bekey, and should produce around one zettabyte of data
points out10 “by definition, robots are equipped Keith Abney, eds.) Cambridge: MIT Press, décembre 2011. every year as of 2015 (a zettabyte is roughly
equivalent to 250 billion DVDs).
1.8 billion terabytes of data was created in
According to Symantec, the cost 2011, of which 90% was unstructured (Cloud
and Big Data survey, IDATE, May 2012).
of data breach incidents for French
companies is constantly rising
A recent survey carried out by the Ponemon e783,000 for the companies concerned.
Institute for Symantec11 analyzing data The study also shows that French compa- Commission Nationale de
breach incidents at 23 companies from ten nies were in favor of preventive measures l'Informatique et des Libertés
different sectors of industry shows that the to respond to data breaches: encryption
Department of Studies, Innovation
cost of such incidents to French companies was up 9%, security monitoring system and Foresight
increased for the third year running, rising increased by 15%, while terminal security 8, rue Vivienne - CS 30223 - 75083 Paris CEDEX 02
Tel. : +331 53 73 22 22 - Fax : +331 53 73 22 00
from €2.2 million in 2010 to e2.55 million solutions saw a 7% rise. deip@cnil.fr
in 2011. Forty-three percent of personal In the United States, total costs incurred Quarterly publication
data breaches are the result of malicious in connection with data loss fell by 24% in Publication Director: Yann Padova
or criminal attacks involving malware, a year, amounting to $5.5 million, the first Editor in Chief: Sophie Vulliet-Tavernier
malicious or criminal insiders, theft of drop observed in seven years. Although the Graphic design: EFIL Communication
02 47 47 03 20 - www.efil.fr
data-bearing devices, etc. The cost of such average cost per compromised record drop- Printing: Imprimplus
breaches is far higher than that connected ped by 10% to e146.25 in 2011, it remains Photo credits: CNIL, Silicon Sentier,
with negligence (30% of incidents) or com- higher than in France. Ophelia Noor - OWNI
puter system glitches (26%). Olivier Coutor ISSN : 2118-9102
Legal registration: Date of publication
The average cost per compromised record
©2012
rose from e98 to e122. Indirect costs, such
The views expressed
as customer loss, account for 57% of this in this publication do not
Source: “2011 Cost of a Data Breach Study”, March 2012 necessarily reflect CNIL's
average cost. The total cost related to lost 11. http://www.symantec.com/fr/fr/about/news/release/article. standpoint.
business or contracts amounts to nearly jsp?prid=20120321_01

www.cnil.fr

You might also like