<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Patrick Scolyer-Gray &#8211; Australian Privacy Foundation</title>
	<atom:link href="https://privacy.org.au/author/patrick-scolyer-gray/feed/" rel="self" type="application/rss+xml" />
	<link>https://privacy.org.au</link>
	<description>Defending your right to be free from intrusion</description>
	<lastBuildDate>Tue, 25 Aug 2020 06:48:44 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://privacy.org.au/wp-content/uploads/2021/04/cropped-logo_horizontal2-32x32.png</url>
	<title>Patrick Scolyer-Gray &#8211; Australian Privacy Foundation</title>
	<link>https://privacy.org.au</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Digging your own digital grave: how should you manage the data you leave behind?</title>
		<link>https://privacy.org.au/2020/08/25/digging-your-own-digital-grave-how-should-you-manage-the-data-you-leave-behind/</link>
		
		<dc:creator><![CDATA[Patrick Scolyer-Gray]]></dc:creator>
		<pubDate>Tue, 25 Aug 2020 06:47:34 +0000</pubDate>
				<category><![CDATA[Commentary]]></category>
		<guid isPermaLink="false">https://privacy.org.au/?p=4376</guid>

					<description><![CDATA[Throughout our lifetimes we consume, collate, curate, host and produce a staggering quantity of data – some by our own hand, some by others on our behalf, and some without our knowledge or consent.

Collectively, our “digital footprints” represent who we are and who we were. Our digital legacies are immortal and can impact those we leave behind.

Many of us take steps to secure our privacy while we’re alive, but there’s mounting evidence that we should be equally concerned about the privacy and security risks of our “data after death”. <span class="excerpt-more"><a href="https://privacy.org.au/2020/08/25/digging-your-own-digital-grave-how-should-you-manage-the-data-you-leave-behind/">Read More</a></span>]]></description>
										<content:encoded><![CDATA[<p><span><a href="https://theconversation.com/profiles/patrick-scolyer-gray-936770">Patrick Scolyer-Gray</a>, Research Fellow, Cyber Security, <em><a href="https://theconversation.com/institutions/deakin-university-757">Deakin University</a></em>; <a href="https://theconversation.com/profiles/arash-shaghaghi-1141598">Arash Shaghaghi</a>, Lecturer, Cybersecurity, <em><a href="https://theconversation.com/institutions/deakin-university-757">Deakin University</a></em>, and <a href="https://theconversation.com/profiles/debi-ashenden-1141685">Debi Ashenden</a>, Professor of Cyber Security and Human Behaviour, <em><a href="https://theconversation.com/institutions/deakin-university-757">Deakin University</a></em></span></p>

<p>Throughout our lifetimes we consume, collate, curate, host and produce a staggering quantity of data – some by our own hand, some by others on our behalf, and some without our knowledge or consent.</p>

<p>Collectively, our “digital footprints” represent who we are and who we <em>were</em>. Our digital legacies are immortal and can impact those we leave behind.</p>

<p>Many of us take steps to secure our privacy while we’re alive, but there’s mounting evidence that we should be equally concerned about the privacy and security risks of our “data after death”.</p>

<h2>Reincarnation as data</h2>

<p>It might be tempting to think of data after death as inconsequential – after all, we’ll no longer be around to worry about it. However, Facebook and Instagram both support static “memorial” <a href="https://www.facebook.com/help/1506822589577997">accounts</a> for the deceased. We also know memorial pages can play an important part of the <a href="https://www.tandfonline.com/doi/full/10.1080/07481187.2019.1626937">grieving process</a>.</p>

<p>Facebook has around 300 million accounts <a href="https://www.theloop.ca/dead-facebook-users-will-soon-outnumber-the-living/">belonging to the deceased</a>. <a href="https://journals.sagepub.com/doi/10.1177/2053951719842540">Research</a> suggests this figure could rise into the <a href="https://www.theguardian.com/technology/2019/apr/29/facebook-dead-users-2100-oxford">billions</a> within decades.</p>

<p>However, these platforms’ terms of service don’t address how the data of deceased users is retained, processed or shared.</p>

<p>There is now even more cause for concern with the emergence of platforms like <a href="https://theconversation.com/china-could-be-using-tiktok-to-spy-on-australians-but-banning-it-isnt-a-simple-fix-142157">TikTok</a> and Likee, which have both proven to be particularly liable to expose the personal lives of millions online.</p>

<p>This raises important <a href="http://bigdatasoc.blogspot.com/2019/05/are-we-outsourcing-curation-of-history.html">questions</a>, such as:</p>
<ul>
<li><p>what are platforms such as Facebook doing with the data after death they collect?</p></li>
<li><p>is it ever deleted?</p></li>
<li><p>could it be sold or otherwise monetised?</p></li>
<li><p>what assurances do we have our data will continue to be hosted by those providers after death?</p></li>
<li><p>if not, who will be able to access and manage our data in the future?</p></li>
</ul>

<p>In 2012, a teenage girl died after being hit by a subway train in Berlin. Her parents had her Facebook credentials and wanted to access her account to determine whether she had committed suicide. <a href="https://www.theguardian.com/world/2018/jul/12/facebook-told-grant-grieving-mother-access-daughters-account">After six years</a> of legal battles, the parents were awarded a court order and finally given access to their child’s “memorial” Facebook account data.</p>

<h2>We all have skeletons in the closet</h2>

<p>COVID-19 has completely changed our <a href="https://www.forbes.com/sites/markbeech/2020/03/25/covid-19-pushes-up-internet-use-70-streaming-more-than-12-first-figures-reveal/#54b01d483104">internet use patterns</a>. The unplanned transition to working from home has blurred the boundaries between our professional and personal lives.</p>

<p>Consequently, personal information is now more likely to be exchanged over services such as Microsoft Teams. Many users may choose to store confidential information on personal cloud services for the sake of convenience.</p>

<p><a href="https://www.nytimes.com/interactive/2020/04/07/technology/coronavirus-internet-use.html">With these changes in behaviour</a>, new vulnerabilities have emerged. When a user dies, it’s now more important than ever personal and otherwise sensitive information is automatically identified and secured.</p>

<p>Colleagues of the departed may forget to revoke access credentials, which can then be used to <a href="https://www.shrm.org/hr-today/news/hr-news/pages/ghost-employees-spirit-away-money-from-employers.aspx">steal intellectual property</a>. Embarrassing email exchanges that belonged to the dead can damage reputations, and sensitive information can negatively affect entire businesses and potentially ruin lives.</p>

<p>In 2016, a Twitter account belonging to the well-known US journalist David Carr was <a href="https://mashable.com/2016/05/19/david-carr-twitter-hack/">hacked by a sexting bot</a> a year after his death. Earlier, in 2010, 16-year-old vlogger Esther Earl died of cancer before she could cancel a tweet she had <a href="https://www.theguardian.com/tv-and-radio/2019/jun/02/digital-legacy-control-online-identities-when-we-die">scheduled for release</a> that left friends and family in shock.</p>

<h2>The need for data management after death</h2>

<p>Most Australians <a href="https://theconversation.com/facebooks-accidental-death-of-users-reminds-us-to-plan-for-digital-death-68745">don’t have a conventional will</a>, so it’s not surprising the digital equivalent hasn’t gained traction.</p>

<p>In collaboration with the <a href="https://www.aisa.org.au/">Australian Information Security Association</a> (AISA), we surveyed about 200 AISA members to assess their awareness of digital wills and associated Australian regulations that protect users’ security and privacy. Our survey results confirmed that even key decision makers in the field and cybersecurity thought leaders had not considered or prepared for posthumous data risks.</p>

<p>But raising awareness is only part of the battle. There are no national regulatory bodies, rules or standards for service providers to follow when managing the data of the deceased. And in Australia there are no laws or regulations <a href="https://hallandwilcox.com.au/thinking/what-happens-to-your-digital-wealth-on-death-and-incapacity/">imposing requirements to minimise the risks of data after death</a>.</p>

<p>We need a solution that can resolve issues ranging from moral quandaries about <a href="https://theconversation.com/our-healthcare-records-outlive-us-its-time-to-decide-what-happens-to-the-data-once-were-gone-81325">posthumous medical data</a>, to privacy concerns about accessing past digital correspondences.</p>

<p>To be effective, such a solution will require legal and policy recommendations, guidelines and technological adaptations for providers, decision-makers and users. Each aspect will need to be sensitive to context and accommodate for grief and mourning among individuals and organisations. For example, there is often a period of compassionate leave available for employees when members of their immediate family pass away.</p>

<p>Some processes meant to manage data after death already exist, but they need more development. Technological solutions for data after death proposed thus far fall into the category known as <a href="http://www.rogerclarke.com/DV/PITsPETs.html">privacy-enhancing technologies</a> &#8211; tools meant to protect users’ privacy.</p>

<p>Users have been reluctant and slow to adopt privacy enhancing technologies. In part, this is because they don’t allow individuals the ability to control how they manage their privacy risks.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img decoding="async" src="https://counter.theconversation.com/content/143755/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important; text-shadow: none !important;" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p>

<p>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/digging-your-own-digital-grave-how-should-you-manage-the-data-you-leave-behind-143755">original article</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Australia&#8217;s National Digital ID is here, but the government&#8217;s not talking about it</title>
		<link>https://privacy.org.au/2020/01/28/australias-national-digital-id-is-here-but-the-governments-not-talking-about-it/</link>
		
		<dc:creator><![CDATA[Patrick Scolyer-Gray]]></dc:creator>
		<pubDate>Tue, 28 Jan 2020 00:21:59 +0000</pubDate>
				<category><![CDATA[Commentary]]></category>
		<guid isPermaLink="false">https://privacy.org.au/?p=4201</guid>

					<description><![CDATA[Dr Patrick Scolyer-Gray, Deakin University The Australian government’s Digital Transformation Agency (DTA) has spent more than A$200 million over the past five years developing a National Digital ID platform. If successful, the project could streamline commerce, resolve bureaucratic quagmires, and improve national security. The emerging results of the project may give the Australian public cause&#8230; <span class="excerpt-more"><a href="https://privacy.org.au/2020/01/28/australias-national-digital-id-is-here-but-the-governments-not-talking-about-it/">Read More</a></span>]]></description>
										<content:encoded><![CDATA[<span><a href="https://theconversation.com/profiles/dr-patrick-scolyer-gray-936770">Dr Patrick Scolyer-Gray</a>, <em><a href="https://theconversation.com/institutions/deakin-university-757">Deakin University</a></em></span>

<p>The Australian government’s Digital Transformation Agency (DTA) has <a href="https://www.itnews.com.au/news/australias-digital-identity-bill-tops-200m-535700">spent more than A$200 million</a> over the past five years developing a National Digital ID platform. If successful, the project could streamline commerce, resolve bureaucratic quagmires, and improve national security.</p>

<p>The emerging results of the project may give the Australian public cause for concern.</p>

<p>Two mobile apps built on the DTA’s Trusted Digital Identification Framework (TDIF) have <a href="https://www.itnews.com.au/news/ato-set-to-launch-mygovid-on-android-devices-531544">recently</a> been <a href="https://www.itnews.com.au/news/ausposts-digital-id-accredited-by-government-528637">released</a> to consumers. The apps, <a href="https://www.mygovid.gov.au">myGovID</a> and <a href="https://www.digitalid.com">Digital ID</a>, were developed by the Australian Taxation Office (ATO) and Australia Post, respectively.</p>

<p>Both apps were released without fanfare or glossy marketing campaigns to entice users. This is in keeping with more than five years of stealthy administrative decision-making and policy development in the National Digital ID project.</p>

<p>Now, it seems, we are set to hear more about it. An existing digital identity scheme for businesses called <a href="https://www.abr.gov.au/auskey">AUSkey</a> will be retired and replaced with the new National Digital ID in March, and the DTA has <a href="https://www.innovationaus.com/digital-id-gets-a-pr-makeover/">recently</a> put out a contract for a “Digital Identity Communication and Engagement Strategy”.</p>

<p>The DTA’s renewed investment in public communications is a welcome change of pace, but instead of top-down decision-making, why not try consultation and conversation?</p>

<h2>We fear what we don’t understand</h2>

<p>Ever since the Hawke government’s ill-fated Australia Card proposal in the 1980s, Australians have consistently viewed national identification schemes with contempt. <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3224115">Some</a> have suggested that the DTA’s silence comes from fear of a backlash.</p>

<p>History provides insight into some, but not all, of the numerous potential reasons for the DTA’s strategic opacity.</p>

<p>For example, people do not respond positively to what they do not understand. Surveys suggest that <a href="https://www.innovationaus.com/2019/11/Digital-ID-gets-a-poor-focus-reception">fewer than one in four Australians</a> have a strong understanding of digital identification.</p>

<p>The National Digital ID project was launched more than five years ago. Why hasn’t the public become familiar with these technologies?</p>

<h2>What is the TDIF?</h2>

<figure class="align-center zoomable">
            <a href="https://images.theconversation.com/files/311035/original/file-20200121-145026-iufjxx.jpg?ixlib=rb-1.1.0&#038;q=45&#038;auto=format&#038;w=1000&#038;fit=clip"><img decoding="async" alt="" src="https://images.theconversation.com/files/311035/original/file-20200121-145026-iufjxx.jpg?ixlib=rb-1.1.0&#038;q=45&#038;auto=format&#038;w=754&#038;fit=clip" srcset="https://images.theconversation.com/files/311035/original/file-20200121-145026-iufjxx.jpg?ixlib=rb-1.1.0&#038;q=45&#038;auto=format&#038;w=600&#038;h=365&#038;fit=crop&#038;dpr=1 600w, https://images.theconversation.com/files/311035/original/file-20200121-145026-iufjxx.jpg?ixlib=rb-1.1.0&#038;q=30&#038;auto=format&#038;w=600&#038;h=365&#038;fit=crop&#038;dpr=2 1200w, https://images.theconversation.com/files/311035/original/file-20200121-145026-iufjxx.jpg?ixlib=rb-1.1.0&#038;q=15&#038;auto=format&#038;w=600&#038;h=365&#038;fit=crop&#038;dpr=3 1800w, https://images.theconversation.com/files/311035/original/file-20200121-145026-iufjxx.jpg?ixlib=rb-1.1.0&#038;q=45&#038;auto=format&#038;w=754&#038;h=459&#038;fit=crop&#038;dpr=1 754w, https://images.theconversation.com/files/311035/original/file-20200121-145026-iufjxx.jpg?ixlib=rb-1.1.0&#038;q=30&#038;auto=format&#038;w=754&#038;h=459&#038;fit=crop&#038;dpr=2 1508w, https://images.theconversation.com/files/311035/original/file-20200121-145026-iufjxx.jpg?ixlib=rb-1.1.0&#038;q=15&#038;auto=format&#038;w=754&#038;h=459&#038;fit=crop&#038;dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px" /></a>
            <figcaption>
             <span class="caption">Part of an overview of the TDIF available on the DTA website.</span>
             <span class="attribution"><a class="source" href="https://www.dta.gov.au/our-projects/digital-identity/trusted-digital-identity-framework/public-consultation-4th-release-tdif">Trusted Digital Identity Framework (TDIF)™: 02 &#8211; Overview © Commonwealth of Australia (Digital Transformation Agency) 2019.</a>, <a class="license" href="http://creativecommons.org/licenses/by/4.0/">CC BY</a></span>
            </figcaption>
        </figure>

<p>The TDIF is what’s known as a federated digital identification system. This means it relies on multiple organisations called Identity Providers, who act as central repositories for identification.</p>

<p>In essence, you identify yourself to the Identity Provider, which then vouches for you to third parties in much the same way you might use a Google or Facebook account to log in to a news website.</p>

<p>The difference in this case is that Identity Providers will control, store and manage all user information – which is likely to include birth certificates, marriage certificates, tax returns, medical histories, and perhaps eventually biometrics and behavioural information too.</p>

<p>There are currently two government organisations offering Identity Service Providers: the Australian Tax Office (ATO) and Australia Post. By their nature, Identity Providers consolidate information in one place and risk becoming a single point of failure. This exposes users to harms associated with the possibility of stolen or compromised personal information.</p>

<p>Another weakness of the TDIF is that it doesn’t allow for releasing only partial information about a person. For example, people might be willing to share practically all their personal information with a large bank.</p>

<p>However, few will voluntarily disclose such a large amount of personal information indiscriminately – and the TDIF doesn’t give the option to control what is disclosed.</p>

<h2>Securing sovereignty over identity</h2>

<p>It might have been reasonable to keep the National Digital ID project quiet when it launched, but a lot has changed in the past five years.</p>

<p>For example, some localities in <a href="https://digitalcanada.io/bc-orgbook-tell-us-once/">Canada</a> and <a href="https://procivis.ch/about-us/">Switzerland</a>, faced with similar challenges, chose an alternative to the federated model for their Digital ID systems. Instead, they used the principles of what is called Self Sovereign Identity (SSI).</p>

<p>Self-sovereign systems offer the same functions and capabilities as the DTA’s federated system. And they do so without funnelling users through government-controlled Identity Providers.</p>

<p>Instead, self-sovereign systems let users create, manage and use multiple discrete digital identities. Each identity can be tailored to its function, with different attributes attached according to necessity.</p>

<p>Authentication systems like this offer control over the disclosure of personal information. This is a feature that may considerably enhance the privacy, security and usability of digital identification.</p>

<h2>Moving forward</h2>

<p>Based on the idea of giving control to users, self-sovereign digital identification puts its users ahead of any institution, organisation or state. Incorporating elements from the self-sovereign approach might make the Australian system more appealing by addressing public concerns.</p>

<p>And self-sovereign identity is just one example of many technologies already available to the DTA. The possibilities are vast.</p>

<p>However, those possibilities can only be explored if the DTA starts engaging directly with the general public, industry and academia. Keeping Australia’s Digital National ID scheme cloaked will only increase negative sentiment towards digital identity schemes.</p>

<p>Even if self-sovereign identity proved appealing to the public, there would still be plenty of need for dialogue. For example, people would need to enrol into the identification program by physically visiting a white-listed facility (such as a post office). That alone poses several technological, economic, social and political challenges.</p>

<p>Regardless of the direction Australia takes for the Digital National ID, there will be problems that need to be solved – and these will require dialogue and transparency.</p>

<p>Government and other organisations may not support a self-sovereign identity initiative, as it would give them less information about and administrative control over their constituents or clients.</p>

<p>Nonetheless, the implementation of a national identity scheme by stealth will only give the Australian public good reason for outrage, and it might culminate in intensified and unwanted scrutiny.</p>

<p>To prevent this from occurring, the DTA’s project needs to be brought out of hiding. It is only with transparency and a dialogue open to all Australians that the public’s concerns can be addressed in full.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img decoding="async" src="https://counter.theconversation.com/content/130200/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important; text-shadow: none !important;" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p>

<p>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/australias-national-digital-id-is-here-but-the-governments-not-talking-about-it-130200">original article</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
