This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Summit 2011 Working Sessions/Session073"

From OWASP
Jump to: navigation, search
(Mialing list property set to http://www.owasp.org/index.php/Talk:Summit_2011_Working_Sessions/Session073)
 
(29 intermediate revisions by 11 users not shown)
Line 2: Line 2:
 
|-
 
|-
  
 +
| summit_session_attendee_name1 = Matthew Chalmers
 +
| summit_session_attendee_email1 = [email protected]
 +
| summit_session_attendee_username1 =
 +
| summit_session_attendee_company1= [http://www.rockwellautomation.com/ http://www.rockwellautomation.com/lib/images/ralogo_web.gif]
 +
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed1=
 +
 +
| summit_session_attendee_name2 = Lorna Alamri
 +
| summit_session_attendee_email2 = [email protected]
 +
| summit_session_attendee_username2 =
 +
| summit_session_attendee_company2=
 +
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed2=
 +
 +
| summit_session_attendee_name3 = Achim Hoffmann
 +
| summit_session_attendee_email3 = [email protected]
 +
| summit_session_attendee_username3 = Achim
 +
| summit_session_attendee_company3= sic[!]sec
 +
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed3= see items at [[Talk:Summit_2011_Working_Sessions/Session023#Emphasise_.22S.22_of_OWASP | Overhauling OWASP website]] session
 +
 +
| summit_session_attendee_name4 = Elke Roth-Mandutz
 +
| summit_session_attendee_email4 = [email protected]
 +
| summit_session_attendee_username4 =
 +
| summit_session_attendee_company4= GSO-University of Applied Sciences
 +
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed4= web privacy research project
 +
 +
| summit_session_attendee_name5 = David Campbell
 +
| summit_session_attendee_email5 = [email protected]
 +
| summit_session_attendee_username5 =
 +
| summit_session_attendee_company5=
 +
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed5=
 +
 +
| summit_session_attendee_name6 = Abraham Kang
 +
| summit_session_attendee_email6 =
 +
| summit_session_attendee_username6 =
 +
| summit_session_attendee_company6=
 +
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed6=
 +
 +
| summit_session_attendee_name7 =
 +
| summit_session_attendee_email7 =
 +
| summit_session_attendee_username7 =
 +
| summit_session_attendee_company7=
 +
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed7=
 +
 +
| summit_session_attendee_name8 =
 +
| summit_session_attendee_email8 =
 +
| summit_session_attendee_username8 =
 +
| summit_session_attendee_company8=
 +
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed8=
 +
 +
| summit_session_attendee_name9 =
 +
| summit_session_attendee_email9 =
 +
| summit_session_attendee_username9 =
 +
| summit_session_attendee_company9=
 +
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed9=
 +
 +
| summit_session_attendee_name10 =
 +
| summit_session_attendee_email10 =
 +
| summit_session_attendee_username10 =
 +
| summit_session_attendee_company10=
 +
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed10=
 +
 +
| summit_session_attendee_name11 =
 +
| summit_session_attendee_email11 =
 +
| summit_session_attendee_username11 =
 +
| summit_session_attendee_company11=
 +
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed11=
 +
 +
| summit_session_attendee_name12 =
 +
| summit_session_attendee_email12 =
 +
| summit_session_attendee_username12 =
 +
| summit_session_attendee_company12=
 +
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed12=
 +
 +
| summit_session_attendee_name13 =
 +
| summit_session_attendee_email13 =
 +
| summit_session_attendee_username13 =
 +
| summit_session_attendee_company13=
 +
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed13=
 +
 +
| summit_session_attendee_name14 =
 +
| summit_session_attendee_email14 =
 +
| summit_session_attendee_username14 =
 +
| summit_session_attendee_company14=
 +
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed14=
 +
 +
| summit_session_attendee_name15 =
 +
| summit_session_attendee_email15 =
 +
| summit_session_attendee_username15 =
 +
| summit_session_attendee_company15=
 +
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed15=
 +
 +
| summit_session_attendee_name16 =
 +
| summit_session_attendee_email16 =
 +
| summit_session_attendee_username16 =
 +
| summit_session_attendee_company16=
 +
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed16=
 +
 +
| summit_session_attendee_name17 =
 +
| summit_session_attendee_email17 =
 +
| summit_session_attendee_username17 =
 +
| summit_session_attendee_company17=
 +
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed17=
 +
 +
| summit_session_attendee_name18 =
 +
| summit_session_attendee_email18 =
 +
| summit_session_attendee_username18 =
 +
| summit_session_attendee_company18=
 +
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed18=
 +
 +
| summit_session_attendee_name19 =
 +
| summit_session_attendee_email19 =
 +
| summit_session_attendee_username19 =
 +
| summit_session_attendee_company19=
 +
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed19=
 +
 +
| summit_session_attendee_name20 =
 +
| summit_session_attendee_email20 =
 +
| summit_session_attendee_username20 =
 +
| summit_session_attendee_company20=
 +
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed20=
 +
 +
|-
 +
| summit_track_logo = [[Image:T._owasp.jpg]]
 +
| summit_ws_logo = [[Image:WS._owasp.jpg]]
 
| summit_session_name = Privacy - Personal Data/PII, Legislation and OWASP
 
| summit_session_name = Privacy - Personal Data/PII, Legislation and OWASP
 
| summit_session_url = http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session073
 
| summit_session_url = http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session073
 +
| mailing_list = Please use discussion page http://www.owasp.org/index.php/Talk:Summit_2011_Working_Sessions/Session073
  
 
|-
 
|-
  
| short_working_session_description= Privacy is a growing area of concern in the US, and might have greater awareness & understanding in the EU than security.  Should OWASP say more about protecting personal data? Security is just one aspect of data protection, but many data breaches have been the result of web vulnerabilities.
+
| short_working_session_description=  
 +
 
 +
[[File:Banner-privacypush-1.png]]
 +
 
 +
Privacy is a growing area of concern in the US, and might have greater awareness & understanding in the EU than security.  Should OWASP say more about protecting personal data? Security is just one aspect of data protection, but many data breaches have been the result of application vulnerabilities.
 +
 
 +
This session will begin by working through [http://www.owasp.org/index.php/Industry:FTC_Protecting_Consumer_Privacy#Draft_Text_version_2 OWASP's draft response] to the FTC's staff report "Protecting Consumer Privacy in an Era of Rapid Change - A Framework for Businesses and Policymakers" to complete it and use this as a way to draw out ideas.
 +
 
 +
This session will be useful for project leaders, as well as anyone in sectors collecting, processing or storing personal data (e.g. of consumers, citizens and employees).
  
 
|-
 
|-
  
| related_project_name1 =  
+
| related_project_name1 = Application Security Verification Standard - V9 Data Protection
| related_project_url_1 =  
+
| related_project_url_1 = http://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project
  
| related_project_name2 =  
+
| related_project_name2 = Application Security Desk Reference (ASDR) - Vulnerabilities - Privacy Violation
| related_project_url_2 =  
+
| related_project_url_2 = http://www.owasp.org/index.php/Privacy_Violation
  
 
| related_project_name3 =  
 
| related_project_name3 =  
Line 28: Line 160:
 
|-
 
|-
  
| summit_session_objective_name1= Agree whether OWASP needs to be more proactive about privacy
+
| summit_session_objective_name1= Identify privacy enhancing & verification aspects of existing tools and documents
  
| summit_session_objective_name2 = Brief participants on the issues and recent legislation/regulation
+
| summit_session_objective_name2 = Create a one-page OWASP projects-to-privacy cross reference factsheet
  
| summit_session_objective_name3 = Define how we build PII/data protection into existing tools and resources
+
| summit_session_objective_name3 =  
  
| summit_session_objective_name4 = Identify gaps
+
| summit_session_objective_name4 =  
  
 
| summit_session_objective_name5 =   
 
| summit_session_objective_name5 =   
Line 52: Line 184:
 
|-
 
|-
  
| working_session_additional_details =  
+
| working_session_additional_details = The protection of personal data has been an important concern of organisations, especuially in Europe where European legislation has driven continent-wide adoption.  In North America, the US HIPAA and Canadian Privacy Act have driven privacy initiatives.  With the adoption of principles and processes such as "privacy by design", "privacy impact assessments" and "building privacy in", backed with strong regulation, organizations are having to make privacy a central part of their business practices.  Growing public concern about use of their personal data, mis-use by organizations and personal data breaches are leading to increased, rather than decreased government intervention in this area.  Individuals themselves are more aware of their powers and there are growing trends such as vendor relationship management, where organisations need to take an external, rather than internal, viewpoint.  Privacy issues are nothing new, but some more recent examples are:
 +
 
 +
* [http://www.ftc.gov/opa/2010/12/privacyreport.shtm US Federal Trade Commission (FTC) Preliminary Staff Report on Privacy], 12 December 2010
 +
* [http://www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//TEXT+TA+P7-TA-2010-0484+0+DOC+XML+V0//EN&language=EN European Parliament Asks the European Commission to Protect Online Users from Advertising], 15 December 2010
 +
* [http://news.cnet.com/8301-31921_3-20025950-281.html?part=rss&subj=news&tag=2547-1_3-0-20  Members Appointed to US Privacy and Civil Liberties Oversight Board], 16 December 2010
 +
* [http://www.commerce.gov/news/press-releases/2010/12/16/commerce-department-unveils-policy-framework-protecting-consumer-privUS Department of Commerce Publishes Green Paper Recommending Creation of a Privacy 'Bill of Rights' for Internet Users], 16 December 2010 
 +
* [http://www.huntonprivacyblog.com/2011/01/articles/european-union-1/department-of-commerce-official-holds-briefing-on-eu-data-protection-forum/index.html Department of Commerce Official Holds Briefing on EU Data Protection Forum], 11 January 2011
 +
 
 +
Can we map projects (tools and sections in resources) to business drivers such as "privacy"?
 +
 
 +
Privacy aspects are referred to through the OWASP wiki (including projects):
 +
 
 +
[[File:Owasp-org-privacy-counts.png]]
 +
 
 +
But there is not any central guide, and perhaps what there is, does not have enough depth.  ASVS includes a whole verification topic about data protection and the ASDR has a page on privacy as a "vulnerability".  The OWASP Top ten 2010 mentions personal data in the context of insecure cryptographic storage, but privacy protection is of course much wider than encrypting data.  It is of course much wider than application security:
 +
 
 +
[[File:Privacy-context.png]]
 +
 
 +
But is OWASP offering the correct guidance in this area?  Should OWASP be doing more?
  
 
|-
 
|-
  
|summit_session_deliverable_name1 =  
+
|summit_session_deliverable_name1 = Complete and approve OWASP's response to the FTC's staff report "Protecting Consumer Privacy in an Era of Rapid Change - A Framework for Businesses and Policymakers"
|summit_session_deliverable_url_1 =
 
  
|summit_session_deliverable_name2 =  
+
|summit_session_deliverable_name2 = A white paper discussing how the privacy ecosystem overlaps with the OWASP ecosystem and whether there should be more bridges built between them.
|summit_session_deliverable_url_2 =
 
  
 
|summit_session_deliverable_name3 =  
 
|summit_session_deliverable_name3 =  
|summit_session_deliverable_url_3 =
 
  
 
|summit_session_deliverable_name4 =  
 
|summit_session_deliverable_name4 =  
|summit_session_deliverable_url_4 =
 
  
 
|summit_session_deliverable_name5 =  
 
|summit_session_deliverable_name5 =  
|summit_session_deliverable_url_5 =  
+
 
 +
|summit_session_deliverable_name6 =
 +
 
 +
|summit_session_deliverable_name7 =
 +
 
 +
|summit_session_deliverable_name8 =
  
 
|-
 
|-
  
 
| summit_session_leader_name1 = Colin Watson
 
| summit_session_leader_name1 = Colin Watson
| summit_session_leader_email1 = [email protected]
+
| summit_session_leader_email1 =  
| summit_session_leader_wiki_username1 = Clerkendweller
 
  
 
| summit_session_leader_name2 =  
 
| summit_session_leader_name2 =  
 
| summit_session_leader_email2 =  
 
| summit_session_leader_email2 =  
| summit_session_leader_wiki_username2 =
+
| summit_session_leader_username2 =  
  
 
| summit_session_leader_name3 =  
 
| summit_session_leader_name3 =  
 
| summit_session_leader_email3 =  
 
| summit_session_leader_email3 =  
| summit_session_leader_wiki_username3 =
+
| summit_session_leader_username3 =  
 
 
 
|-
 
|-
  
 
| operational_leader_name1 =
 
| operational_leader_name1 =
 
| operational_leader_email1 =
 
| operational_leader_email1 =
| operational_leader_wiki_username1 =
+
| operational_leader_username1 =  
 
 
|-
 
 
 
| summit_session_attendee_name1 =  Colin Watson
 
| summit_session_attendee_email1 =
 
| summit_session_attendee_wiki_username1 =
 
 
 
| summit_session_attendee_name2 =
 
| summit_session_attendee_email2 =
 
| summit_session_attendee_wiki_username2 =
 
 
 
| summit_session_attendee_name3 =
 
| summit_session_attendee_email3 =
 
| summit_session_attendee_wiki_username3 =
 
 
 
| summit_session_attendee_name4 =
 
| summit_session_attendee_email4 =
 
| summit_session_attendee_wiki_username4 =
 
 
 
| summit_session_attendee_name5 =
 
| summit_session_attendee_email5 =
 
| summit_session_attendee_wiki_username5 =
 
 
 
| summit_session_attendee_name6 =
 
| summit_session_attendee_email6 =
 
| summit_session_attendee_wiki_username6 =
 
 
 
| summit_session_attendee_name7 =
 
| summit_session_attendee_email7 =
 
| summit_session_attendee_wiki_username7 =
 
 
 
| summit_session_attendee_name8 =
 
| summit_session_attendee_email8 =
 
| summit_session_attendee_wiki_username8 =
 
 
 
| summit_session_attendee_name9 =
 
| summit_session_attendee_email9 =
 
| summit_session_attendee_wiki_username9 =
 
 
 
| summit_session_attendee_name10 =
 
| summit_session_attendee_email10 =
 
| summit_session_attendee_wiki_username10 =
 
 
 
| summit_session_attendee_name11 =
 
| summit_session_attendee_email11 =
 
| summit_session_attendee_wiki_username11 =
 
 
 
| summit_session_attendee_name12 =
 
| summit_session_attendee_email12 =
 
| summit_session_attendee_wiki_username12 =
 
 
 
| summit_session_attendee_name13 =
 
| summit_session_attendee_email13 =
 
| summit_session_attendee_wiki_username13 =
 
 
 
| summit_session_attendee_name14 =
 
| summit_session_attendee_email14 =
 
| summit_session_attendee_wiki_username14 =
 
 
 
| summit_session_attendee_name15 =
 
| summit_session_attendee_email15 =
 
| summit_session_attendee_wiki_username15 =
 
 
 
| summit_session_attendee_name16 =
 
| summit_session_attendee_email16 =
 
| summit_session_attendee_wiki_username16 =
 
 
 
| summit_session_attendee_name17 =
 
| summit_session_attendee_email17 =
 
| summit_session_attendee_wiki_username17=
 
 
 
| summit_session_attendee_name18 =
 
| summit_session_attendee_email18 =
 
| summit_session_attendee_wiki_username18 =
 
 
 
| summit_session_attendee_name19 =
 
| summit_session_attendee_email19 =
 
| summit_session_attendee_wiki_username19 =
 
 
 
| summit_session_attendee_name20 =
 
| summit_session_attendee_email20 =
 
| summit_session_attendee_wiki_username20 =  
 
  
 
|-
 
|-

Latest revision as of 12:06, 5 March 2011

Global Summit 2011 Home Page
Global Summit 2011 Tracks

WS. owasp.jpg Privacy - Personal Data/PII, Legislation and OWASP
Please see/use the 'discussion' page for more details about this Working Session
Working Sessions Operational Rules - Please see here the general frame of rules.
WORKING SESSION IDENTIFICATION
Short Work Session Description Banner-privacypush-1.png

Privacy is a growing area of concern in the US, and might have greater awareness & understanding in the EU than security. Should OWASP say more about protecting personal data? Security is just one aspect of data protection, but many data breaches have been the result of application vulnerabilities.

This session will begin by working through OWASP's draft response to the FTC's staff report "Protecting Consumer Privacy in an Era of Rapid Change - A Framework for Businesses and Policymakers" to complete it and use this as a way to draw out ideas.

This session will be useful for project leaders, as well as anyone in sectors collecting, processing or storing personal data (e.g. of consumers, citizens and employees).

Related Projects (if any)


Email Contacts & Roles Chair
Colin Watson

Operational Manager
Mailing list
Please use discussion page http://www.owasp.org/index.php/Talk:Summit_2011_Working_Sessions/Session073
WORKING SESSION SPECIFICS
Objectives
  1. Identify privacy enhancing & verification aspects of existing tools and documents
  2. Create a one-page OWASP projects-to-privacy cross reference factsheet

Venue/Date&Time/Model Venue/Room
OWASP Global Summit Portugal 2011
Date & Time


Discussion Model
participants and attendees

WORKING SESSION OPERATIONAL RESOURCES
Projector, whiteboards, markers, Internet connectivity, power

WORKING SESSION ADDITIONAL DETAILS
The protection of personal data has been an important concern of organisations, especuially in Europe where European legislation has driven continent-wide adoption. In North America, the US HIPAA and Canadian Privacy Act have driven privacy initiatives. With the adoption of principles and processes such as "privacy by design", "privacy impact assessments" and "building privacy in", backed with strong regulation, organizations are having to make privacy a central part of their business practices. Growing public concern about use of their personal data, mis-use by organizations and personal data breaches are leading to increased, rather than decreased government intervention in this area. Individuals themselves are more aware of their powers and there are growing trends such as vendor relationship management, where organisations need to take an external, rather than internal, viewpoint. Privacy issues are nothing new, but some more recent examples are:

Can we map projects (tools and sections in resources) to business drivers such as "privacy"?

Privacy aspects are referred to through the OWASP wiki (including projects):

Owasp-org-privacy-counts.png

But there is not any central guide, and perhaps what there is, does not have enough depth. ASVS includes a whole verification topic about data protection and the ASDR has a page on privacy as a "vulnerability". The OWASP Top ten 2010 mentions personal data in the context of insecure cryptographic storage, but privacy protection is of course much wider than encrypting data. It is of course much wider than application security:

Privacy-context.png

But is OWASP offering the correct guidance in this area? Should OWASP be doing more?

WORKING SESSION OUTCOMES / DELIVERABLES
Proposed by Working Group Approved by OWASP Board

Complete and approve OWASP's response to the FTC's staff report "Protecting Consumer Privacy in an Era of Rapid Change - A Framework for Businesses and Policymakers"

After the Board Meeting - fill in here.

A white paper discussing how the privacy ecosystem overlaps with the OWASP ecosystem and whether there should be more bridges built between them.

After the Board Meeting - fill in here.

After the Board Meeting - fill in here.

After the Board Meeting - fill in here.

After the Board Meeting - fill in here.

After the Board Meeting - fill in here.

After the Board Meeting - fill in here.

After the Board Meeting - fill in here.

Working Session Participants

(Add you name by clicking "edit" on the tab on the upper left side of this page)

WORKING SESSION PARTICIPANTS
Name Company Notes & reason for participating, issues to be discussed/addressed
Matthew Chalmers @
ralogo_web.gif

Lorna Alamri @


Achim Hoffmann @
sic[!]sec
see items at Overhauling OWASP website session
Elke Roth-Mandutz @
GSO-University of Applied Sciences
web privacy research project
David Campbell @


Abraham Kang