Skip to end of metadata
Go to start of metadata

Project Description: Understanding, Discovering and Asserting Personal Privacy Preferences (UDAPPP)

Funded by a grant from the Office of the Privacy Commissioner of Canada (OPC)

Background

  • Systems that request personal information typically ask the individual to accept a fixed privacy policy
  • If options are available, they are often presented in a complex and confusing way
  • Persons with disabilities, persons who are aging and others who face discrimination, stereotyping, marginalization or exclusion have the most to gain from smart services that respond to personal data, but are also the most vulnerable to the misuse of private information (e.g. denial of insurance, jobs or services, fraud, etc)

Goals of the Project

  • Design an interface exemplar for discovering, exploring and choosing privacy and identity management preferences
  • Leverage ISO 24751* (Access for All) to discover, assert, match and evaluate personal privacy and identity management preferences
    • engage relevant stakeholders in developing a proposed privacy and identity management preference application profile as a New Work Item

*ISO 24751: a standard to support processes that match unique individual needs and preferences with resources that meet those needs and preferences

How it Will Work

  • a single, personalized interface to understand and determine a privacy agreement that suits the function, risk level and personal preferences
  • private sector companies would have a standardized process for communicating or translating privacy options to a diversity of consumers

Action Items

  • implement a transparent online workspace to recruit input from stakeholders
  • hold facilitated group discussions, co-design sessions and test scenarios to map out potential plans and evaluate feasibility of the plans
  • draft a New Work Item (NWI) proposal to attach to ISO 24751
  • create a prototype user experience exemplar

Deliverables

Working Documents

Inclusive Design for Privacy - Working Doc (Google Doc)

Key Points for Tool Introduction/Animation

DEEP 2016 Privacy Discussion Summary (Google Doc)

Privacy and Sharing Preferences List (Google Doc)

Brainstorming a Personal Privacy Policy (Google Doc)

Examples of Misuse of Personal Data (Google Doc)

PIPEDA and Privacy Preferences Design

Privacy Preferences Information Model (Google Doc)

PIPEDA Audit

Meetings

Mar 28, 2017 Design Crit Notes (Privacy), based on the interactive prototype

Feb 17, 2017 Accessible Prototyping

Jan 31, 2017 Design Crit Notes (Privacy), based on these wireframes

Dec 21, 2016 Privacy Preferences Meeting

Dec 6, 2016 Design Crit Notes (Privacy), based on these wireframes

Nov 29, 2016 Design Crit Notes (Privacy), based on these wireframes

Sept 28, 2016 Privacy and Sharing Preferences Brainstorm

Sept 8 2016 Privacy Discussion Meeting Minutes

August 25, 2016 Brainstorm Session Notes

Research and Resources

Privacy by Design

Your Smartphone is a Civil Rights Issues - TED Talk

The Electronic Frontier Foundation

Me and My Shadow Project - Take Control of Your Data

Me and My Shadow - Tracking, So What?

Me and My Shadow - The 8-Day Data Detox Kit

The Glass Room NYC - Looking into Your Online Life

Office of the Privacy Commisioner of Canada - Web Tracking with Cookies

Understanding Cookies (Microsoft)

The Watchers augmented board game

http://uxmag.com/articles/privacy-and-personalization-can-coexist-through-good-design 

http://catalogue.projectsbyif.com/

The Platform for Privacy Preferences Project (W3C)

Designing a Privacy Preference Specification Interface - A Case Study. Cranor, L.F.

User Interfaces for Privacy Agents. Cranor, L.F., Guduru, P. and Arjula, M.

Usable Privacy Policy Project

The Privacy Bird !

https://privacy.google.com/#

Anne Cavoukian U of T Alumni Presentation - Joseph's notes and link to Anne's slide deck

International Council on Global Privacy and Security by Design

Online security tips from Y Combinator

The Internet of Things - Examples

Leon's - Project Smart Furniture

Examples of "Best Practices" for Protecting Users' Privacy

http://blog.easy-designs.net/archives/dont-sell-out-your-users/

Questions (from initial brainstorming session)

We want to address the following three questions: 

  1. What are the possible privacy preferences someone might have? 
  2. How is private information being used currently? 
  3. Who are vulnerable in this context? 

As part of answering these questions, we want to discuss: 

  • what constitutes private information, 
  • what is being gathered and for what purpose, 
  • what are the conflicts between privacy requirements and what is actually being done today, and 
  • are there constraints in fulfilling privacy wishes.
  • No labels