{"id":11,"date":"2016-01-21T17:46:43","date_gmt":"2016-01-21T17:46:43","guid":{"rendered":"http:\/\/cusjc.ca\/agingtech\/?page_id=11"},"modified":"2016-04-10T20:51:26","modified_gmt":"2016-04-10T20:51:26","slug":"chapter-four","status":"publish","type":"page","link":"https:\/\/cusjc.ca\/agingtech\/chapter-four\/","title":{"rendered":"Privacy Issues"},"content":{"rendered":"<h1>Terms and Conditions<\/h1>\n<p class=\"p1\"><span class=\"s1\">\u201cYou know the old expression, \u2018you ain\u2019t seen nothing yet\u2019? Well, we\u2019re just starting on the world of wearables,\u201d says<\/span><span class=\"s1\"> <a href=\"http:\/\/www.ryerson.ca\/pbdi\/about\/people\/cavoukian.html\">Ann Cavoukian<\/a>\u00a0<\/span><span class=\"s1\">former Privacy Commissioner of Canada. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">There are numerous privacy concerns associated with the collection, transmission and communication of data from wearable sensors. When an individual uses a wearable device, an enormous amount of data is collected and transmitted from the wearable sensor to either a computer server, or a mobile application, that collects and communicates the data. <\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">In January 2014, the Office of the Privacy Commissioner of Canada released a <a href=\"https:\/\/www.priv.gc.ca\/information\/research-recherche\/2014\/wc_201401_e.asp\">report<\/a>, <i>Wearable Computing, Challenges and opportunities for privacy protection.\u00a0<\/i><\/span><span class=\"s1\">The report was created in response to rapid technological innovation and increased consumer demand for the adoption of wearable devices.<span class=\"Apple-converted-space\">\u00a0 <\/span>The Privacy Commissioner of Canada report states that collected data can be \u201ccombined, analyzed and acted upon without adequate transparency, accountability or meaningful consent.\u201d This means that an individual\u2019s data can be taken and used for purposes that the data subject has not given consent to. In addition to challenging the existing model of consent, these devices provide new avenues for surveillance of employers, healthcare professionals and insurance companies. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">The following will elaborate on some of the concerns presented in the in the OPC <i>Wearable Computing <\/i>report, and with the assistance of Ann Cavoukian, will assess each of the associated risks. <\/span><\/p>\n<blockquote>\n<p class=\"p1\">\u201cThe purpose limitation principle, intended to limit the collection of personal information, subject to consent being given for those specific purposes is becoming increasingly difficult to apply in a world of ubiquitous computing and mobile devices.\u201d &#8211; Ann Cavoukian, Executive Director of the Privacy and Big Data Institute, Ryerson University.<\/p>\n<\/blockquote>\n<h3>Consent<\/h3>\n<p class=\"p1\"><span class=\"s1\">In a discussion about ethics and in a discussion about privacy, consent can mean different things. In ethics, consent refers to the individual consenting to<i> use <\/i>a wearable device. Do they have the cognitive ability to consent to its use? But in a discussion about privacy, consent refers to the individual\u2019s agreement to allow their data to be collected and transmitted.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Informed consent is difficult to obtain. Individuals do not often read the Terms and Conditions, and the parameters of use written in a manual are typically not composed in a manner that the individual can understand. Individuals using wearable technology simply do not know what is being done with their data. <\/span><\/p>\n<h4>Purpose limitation principle and purpose specification<\/h4>\n<p class=\"p1\"><span class=\"s1\">\u201cPrivacy is all about using information for the intended purposes that have been consented to for the data subject, and in this case, the elderly individual,\u201d Cavoukian says. This is called the \u201cpurpose limitation principle,\u201d only using the data for its intended purpose that was consented by the individual. <\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">\u201cThe consumer doesn\u2019t give you data to do whatever the heck you want to do with it,\u201d says Cavoukian. \u201cThey usually give you data for a particular purpose.\u201d This is the notion of purpose specification, the data should be used for an intended purpose. If information is going to be used for another, second purpose, then the developer should return to the individual and get their consent. \u201cObviously that doesn\u2019t happen in the world of wearables at all, and that\u2019s part of the problem.\u201d Data from wearable devices is transmitted from a sensor to a computer server or mobile application. An individual will consent to their data being collected and communicated, because they want to be able to see their progress or read their own statistics. However, this data is often used for a second purpose, for example to inform business statistics or sold to research and insurance companies. <\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">There are many unintended consequences that arise from the free floating use of personally identifiable data. \u201cPeople don\u2019t think of the consequences,\u201d says Cavoukian. \u201cWhen information that is intended for one purpose, is used for a myriad of other purposes, no one is thinking of the potential horrors that could arise. That\u2019s one of the biggest problems with not limiting the use of information by design from the outset.\u201d This leads to unintended consequences of wearable surveillance. <\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-272 size-large\" src=\"http:\/\/cusjc.ca\/agingtech\/wp-content\/uploads\/2016\/01\/Three_Surveillance_cameras-1024x832.jpg\" alt=\"\" width=\"640\" height=\"520\" srcset=\"https:\/\/cusjc.ca\/agingtech\/wp-content\/uploads\/2016\/01\/Three_Surveillance_cameras-1024x832.jpg 1024w, https:\/\/cusjc.ca\/agingtech\/wp-content\/uploads\/2016\/01\/Three_Surveillance_cameras-300x244.jpg 300w, https:\/\/cusjc.ca\/agingtech\/wp-content\/uploads\/2016\/01\/Three_Surveillance_cameras-768x624.jpg 768w, https:\/\/cusjc.ca\/agingtech\/wp-content\/uploads\/2016\/01\/Three_Surveillance_cameras.jpg 1815w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/p>\n<h3>Wearable surveillance<\/h3>\n<p class=\"p1\"><span class=\"s1\">The purpose of wearable technology is to track and profile different variables, such as heart rate, number of steps walked, blood pressure, etc. Many individuals use this information for their own records, or the information is provided to a healthcare professional. But there are other stakeholders who are becoming increasingly interested in this information: health insurance providers and employers for example. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Manulife Financial, an insurance company, offers discounts to U.S. consumers that use fitness trackers. They plan to launch the same program in Canada. While an individual can be incentivized to use wearable technology to lower insurance premiums, there are also negative consequences of this data being available to insurance companies. As included in a MaRS research report,\u00a0Forrester Research concluded, \u201cAs fitness wearables track the activities of more and more employees, for-profit health care systems will both reward adherents to an active and healthy lifestyle &#8230; and punish non-adherents.\u201d <\/span><\/p>\n<p class=\"p1\"><div class=\"su-pullquote su-pullquote-align-right\">\u201cQuite frankly there&#8217;s very little in this world that people can&#8217;t find out about you.\u201d &#8211; Hugh Judges, Fitbit user. <\/div>\n<p class=\"p1\"><span class=\"s1\">Employers are also incentivizing workers to use wearable devices through corporate wellness companies. Sprout is a Canadian corporate wellness company that helps companies to keep their employees healthy and active. They have an employee tracking program that counts everything from activity levels to mental health. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">While there are many benefits to quantifying one\u2019s health and finding motivation to be active, these new means of surveillance could be detrimental to the individuals who cannot meet the health or activity levels set out by insurance companies or employers. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">\u201cThis is very very real,\u201d says Cavoukian. \u201cIn the States, you see it all the time. There are all these horror stories.\u201d She says<span class=\"Apple-converted-space\">\u00a0<\/span>insurance rates can increase and individuals can be cut off from getting certain services after their wearable data is accessed.<\/span><\/p>\n<h3>The developers<\/h3>\n<p class=\"p1\"><span class=\"s1\">The OPC report highlights the role of transparency: there must be transparency in our relationship with the private sector and between the individual and the government. The challenges that these technologies present in the form of privacy risks, while we can speculate on some,<span class=\"Apple-converted-space\">\u00a0 <\/span>are difficult to predict in the long-term, states the report. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">There are many risks associated with privacy, but wearable technology also offers a great opportunity to enhance privacy protection and user autonomy, states the report. When Cavoukian was the Privacy Commissioner, she went on a world tour, talking almost exclusively to engineers about \u201cprivacy by design.\u201d \u201cIt is something I developed many years ago, which is all about embedding the necessary protections that we need, into the design of information technologies and networks infrastructure,\u201d says Cavoukian. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Cavoukian explains that she asked engineers to proactively embed protections directly into the technology so that privacy would become an inherent part of the data architecture. \u201cEvery single engineer, and I spoke to thousands of engineers in California, and Europe, everybody said, \u2018of course we can do that.\u2019 But, they said that the biggest problem is that you have to tell us you want us to do that.\u201d <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">The development of technologies happens in silos. Engineers receive instructions and they write the code. The privacy issues go to another department, that of the Chief Information Officer or the Chief Privacy Officer. There is a disconnect in the information flow. At some point, someone would tell the engineers to implement some sort of privacy solution. \u201cThey would just shake their heads because it was way too late,\u201d says Cavoukian. \u201cYou can\u2019t bolt on a solution after the fact, you have to do it to begin with.\u201d <\/span><\/p>\n<p class=\"p1\"><div class=\"su-pullquote su-pullquote-align-right\">\u201cWe have to tell the engineers why it is important to embed privacy protections into technology,\u201d &#8211; Ann Cavoukian, Executive Director of the Privacy and Big Data Institute, Ryerson University. <\/div>\n<p class=\"p1\"><span class=\"s1\">Cavoukian co-chairs a technology committee with engineering professionals, it is called Privacy by Design for Software Engineers. The committee is attempting to develop the \u201cplaybook\u201d on how to influence and educate engineers and developers about privacy. \u201cThe reality is, that the majority of the role to be played in terms of protecting privacy and data is on the part of the company or organization or government department &#8211; whoever is doing the data collection,\u201d Cavoukian says. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">In addition to embedding privacy in the physical piece of technology, it is incumbent upon the organization to have strong data protection policies says Cavoukian. \u201cTo have policies where not only are they transparent to the consumer or the data subject about what they intend to do with the person\u2019s information, but that they themselves impose some restrictions on what they do with the information.\u201d It\u2019s not just their data, it is the consumer\u2019s data. <\/span><\/p>\n<p class=\"p1\"><div class=\"su-box su-box-style-soft\" id=\"\" style=\"border-color:#000000;border-radius:3px\"><div class=\"su-box-title\" style=\"background-color:#333333;color:#FFFFFF;border-top-left-radius:1px;border-top-right-radius:1px\">Pierre-Alexandre Fournier, CEO Hexoskin <\/div><div class=\"su-box-content su-u-clearfix su-u-trim\" style=\"border-bottom-left-radius:1px;border-bottom-right-radius:1px\">\u201cWe have always been very serious about privacy and security, which are two different things,\u201d says\u00a0Fournier. \u201cWhat happens with the data is that you\u2019re wearing the shirts and the electronic device that&#8217;s hidden in the shirt records all the data. When you have a smartphone, you can use it to look at your health information and you can use your smartphone to transmit the information in real time to your account which is on one of our servers. Then from there, if you want, you can share it with somebody, but by default, everything is private. So you always have a copy of your information in your shirt, and there&#8217;s another copy on the servers. &#8220;<\/div><\/div>\n<p class=\"p1\"><div class=\"su-box su-box-style-soft\" id=\"\" style=\"border-color:#000000;border-radius:3px\"><div class=\"su-box-title\" style=\"background-color:#333333;color:#FFFFFF;border-top-left-radius:1px;border-top-right-radius:1px\">Paul Shore, Vice President of Health Care of Tractivity <\/div><div class=\"su-box-content su-u-clearfix su-u-trim\" style=\"border-bottom-left-radius:1px;border-bottom-right-radius:1px\">\u201cPrivacy is s a big issue both in the development of the software from day one and from an ongoing basis depending on what requests we get from healthcare providers. I will give you a few examples of things that we do to ensure privacy. There are some rudimentary things, we don&#8217;t store passwords of our customers. This is becoming typical or a lot of web based software products. We do all sorts of inscriptions, we encrypt the data when it is moving across the internet, we encrypt the data when we store it on our server, we pick server suppliers, we do not use our own servers, we chose the levels of service they provide that have encryptions within. We have all sorts of policies and procedures for how we behave in our office because we have access to the data. For sure it is a big deal. The step channels of\u00a0the patients, you could argue that it\u00a0is not particularly damaging if the world saw how much walking you were doing. One day we may have your blood glucose levels and on and on we go. We could become more sensitive issues. It is good that we have spent a lot of effort setting it up for that. There are other things that we store in our database like name and email address because email address is your account name. Or in the case some of our patients in the U.S. we use medical record number which is a number issued by the provider and they need that &#8211; associated to patient name that&#8217;s an important thing to protect.\u201d<\/div><\/div>\n<p>Adrian Chan is a professor at Carleton University in the Department of Computer systems and Engineering. Here, he describes the role of the developer to protect and establish privacy.<\/p>\n<div class=\"su-youtube su-u-responsive-media-no\"><iframe loading=\"lazy\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/t7JO4RCoKWA?autohide=1&amp;autoplay=0&amp;mute=0&amp;controls=0&amp;fs=0&amp;loop=0&amp;modestbranding=1&amp;rel=0&amp;showinfo=0&amp;theme=light&amp;wmode=&amp;playsinline=0\" frameborder=\"0\" allowfullscreen allow=\"autoplay; encrypted-media; picture-in-picture\" title=\"\"><\/iframe><\/div>\n<h3>The individual data subject<\/h3>\n<p class=\"p1\"><span class=\"s1\">\u201cI never absolve the individual of some role,\u201d says Cavoukian. Individuals should have an awareness and take responsibility to the best of their knowledge when they use a new wearable technology. \u201cRegardless of what the user does, it\u2019s going to be limited in terms of their ability to influence the technology. The biggest thing an individual can decide to do is not use a wearable technology device because it is bleeding their data. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Cavoukian contends that individuals should not give up on technologies that they want to pursue because they are worried about privacy. They should want their privacy protected and they should ask the developer, how is that going to happen? The minute that question is posed to the developer, they will come back to you with an answer. \u201cThe problem most of the time is people don\u2019t ask the question,\u201d explains Cavoukian. \u201cSo it\u2019s just given that people don\u2019t care about privacy so they just do whatever they want with it. That\u2019s what we have to reject.\u201d <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Individuals who use wearable technology and the companies that develop wearable technology should be restricting the use of the information the devices obtain and limiting the information for the purposes intended for data collection. \u201cThere has got to be far greater transparency on the uses of the information obtained, usually the personal information obtained from the individual and some consent mechanism if\u00a0the individual wants the information used widely,\u201d says Cavoukian. <\/span><\/p>\n<p class=\"p1\">\u00a0Here, Adrian Chan he interprets the role of the individual to protect their own privacy.<\/p>\n<p class=\"p1\"><div class=\"su-youtube su-u-responsive-media-no\"><iframe loading=\"lazy\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/iwRqbu50_cM?autohide=1&amp;autoplay=0&amp;mute=0&amp;controls=0&amp;fs=0&amp;loop=0&amp;modestbranding=1&amp;rel=0&amp;showinfo=0&amp;theme=light&amp;wmode=&amp;playsinline=0\" frameborder=\"0\" allowfullscreen allow=\"autoplay; encrypted-media; picture-in-picture\" title=\"\"><\/iframe><\/div>\n<p>&nbsp;<\/p>\n<h3>A win-win model<\/h3>\n<p class=\"p1\"><span class=\"s1\">Cavoukian says the greatest misconception about wearables and privacy is that individuals think they live in a world of zero sums. \u201cZero sum means you can either have privacy or efficiency, or privacy or security. It\u2019s always one versus the other,\u201d says Cavoukian.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">The zero sum model is deeply engrained in society explains Cavoukian. But Cavoukian wants people to abandon the model of zero sums and substitute for what\u2019s called a positive sum model, \u201cwhich is just win-win,\u201d says Cavoukian. \u201cYou can in fact have privacy and data utility, privacy and efficiency.\u201d To achieve the positive sum model, individuals have to think proactivity and developers must design systems in a way that they can achieve privacy, data utility, and efficiency. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">You do not have to give up privacy in order to have the benefits of technologies and wearable devices. An individual can avail themselves of technology and protect their privacy. \u201cHow do you do both? The minute you say that it gets in the minds of the engineers and the designers,\u201d says Cavoukian.<\/span><\/p>\n<blockquote>\n<p class=\"p1\"><span class=\"s1\">\u201cThis is the objective we have to strive for. And I know here, I\u2019m like the David versus goliath, but we can do this.\u201d &#8211; Ann Cavoukian\u00a0<\/span><\/p>\n<\/blockquote>\n<h3>Legislation<\/h3>\n<p class=\"p1\"><span class=\"s1\">In Canada, there is a federal privacy commissioner and provincial commissioners. The role of the commissioner is to ensure that the nation and provinces have regulatory compliance with privacy laws in respective jurisdictions. Privacy commissioners are independent, which means they oversee the activities of government. <\/span><\/p>\n<p class=\"p2\"><div class=\"su-pullquote su-pullquote-align-right\">\u201cThe government should theoretically be leading the charge. I think we do a decent job.\u201d &#8211; Ann Cavoukian<\/div>\n<p class=\"p2\"><strong>How are you protected by the government?\u00a0<\/strong><\/p>\n<p class=\"p2\"><strong>Click below to find out.\u00a0<\/strong><\/p>\n<p class=\"p2\"><div class=\"su-spoiler su-spoiler-style-default su-spoiler-icon-plus su-spoiler-closed\" data-scroll-offset=\"0\" data-anchor-in-url=\"no\"><div class=\"su-spoiler-title\" tabindex=\"0\" role=\"button\"><span class=\"su-spoiler-icon\"><\/span>The Privacy Act <\/div><div class=\"su-spoiler-content su-u-clearfix su-u-trim\">Wearable devices used for medical and healthcare purposes are monitored by the Privacy Act. Wearable devices used for healthcare purposes sold in Canada must have a medical device license. These devices are under the regulation of the Medical Devices Regulations, part of the Food and Drugs Act monitored by Health Canada. Under current law, the federal government can only collect information if it directly relates to an operating program of activity. The Privacy Act states that government institutions can only use personal information if it was collected for a use consistent with that purpose. The individual must consent to any other use of the information collected by a wearable device. This is an example of the purpose specification and limitation principle. \u201cWherever federal departments intend to make use of wearable computing devices to collect personal information, they will need to ensure that their program activities are carried out in accordance with the Privacy Act, undertake Privacy Impact Assessments (PIAs) and establish privacy protocols for conducting research, audits and evaluations, in accordance with Treasury Board directives and policies,\u201d states the OPC report. <\/div><\/div>\n<p class=\"p2\"><div class=\"su-spoiler su-spoiler-style-default su-spoiler-icon-plus su-spoiler-closed\" data-scroll-offset=\"0\" data-anchor-in-url=\"no\"><div class=\"su-spoiler-title\" tabindex=\"0\" role=\"button\"><span class=\"su-spoiler-icon\"><\/span>Personal Information Protection and Electronic Documents Act <\/div><div class=\"su-spoiler-content su-u-clearfix su-u-trim\">The report by the OPC highlights that Personal Information Protection and Electronic Documents Act, PIPEDA, does not apply to \u201cany individual in respect of personal information that the individual collects, uses or discloses for personal or domestic purposes and does not collect, use or disclose for any other purpose.\u201d However, PIPEDA can be engaged where personal information from one device is sent to the organization that collects information. <\/div><\/div>\n<p class=\"p2\"><em><a href=\"http:\/\/cusjc.ca\/agingtech\/chapter-three\/\">PREVIOUS: Ethical issues.\u00a0<\/a><\/em><\/p>\n<p><em><a href=\"http:\/\/cusjc.ca\/agingtech\/conclusion\/\">NEXT: In Conclusion&#8230;\u00a0<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Terms and Conditions \u201cYou know the old expression, \u2018you ain\u2019t seen nothing yet\u2019? Well, we\u2019re just starting on the world of wearables,\u201d says Ann Cavoukian\u00a0former Privacy Commissioner of Canada. There are numerous privacy concerns associated with the collection, transmission and communication of data from wearable sensors. When an individual uses a wearable device, an enormous [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":331,"parent":0,"menu_order":5,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-11","page","type-page","status-publish","has-post-thumbnail","hentry","post-thumb"],"acf":[],"_links":{"self":[{"href":"https:\/\/cusjc.ca\/agingtech\/wp-json\/wp\/v2\/pages\/11","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cusjc.ca\/agingtech\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cusjc.ca\/agingtech\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cusjc.ca\/agingtech\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cusjc.ca\/agingtech\/wp-json\/wp\/v2\/comments?post=11"}],"version-history":[{"count":33,"href":"https:\/\/cusjc.ca\/agingtech\/wp-json\/wp\/v2\/pages\/11\/revisions"}],"predecessor-version":[{"id":486,"href":"https:\/\/cusjc.ca\/agingtech\/wp-json\/wp\/v2\/pages\/11\/revisions\/486"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cusjc.ca\/agingtech\/wp-json\/wp\/v2\/media\/331"}],"wp:attachment":[{"href":"https:\/\/cusjc.ca\/agingtech\/wp-json\/wp\/v2\/media?parent=11"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}