• No results found

Privacy of fingermarks data in forensic science: forensic evaluation and individual data protection

N/A
N/A
Protected

Academic year: 2021

Share "Privacy of fingermarks data in forensic science: forensic evaluation and individual data protection"

Copied!
1
0
0

Bezig met laden.... (Bekijk nu de volledige tekst)

Hele tekst

(1)

Selected References

1. United States Department of Homeland Security, Privacy Impact Assessment for the Automated Biometric Identification System(IDENT) (2006–2012), available via http:// www.dhs.gov/

2. Information Commissioners Office (ICO) of the United Kingdom, Privacy Impact Assessment Handbook (2009), available via http://ico.org.uk/

3. New Zealand Ministry of Business, Innovation and Employment, Privacy Impact Assessment: collection and handling of biometrics at the Ministry of Business, Innovation and Employment (2012), available via www.immigration.govt.nz

4. NOREA de beroepsorganisatie van IT-auditoren, Privacy Impact Assessment: intro-ductie, handreiking en vragenlijst (2013), available via www.norea.nl

5. Ministerie van Binnenlandse Zaken en Koninkrijksrelaties, Toetsmodel Privacy Impact Assessment Rijksdienst (2013), available via www.rijksoverheid.nl

6. C.M. Baartmans, Data Protection of Fingermarks or Prints in Forensic Science: how fingermarks or prints for purposes of forensic research & development and casework should be processed by public forensic service providers (masters of law thesis

Tilburg University), 2014

Recommendations

Processing fingermark/print data is part of the core business of a forensic service provider. It is important that they are processed in an environment and manner that respects informational privacy. At the same time it should not adversely effect the validity and reliability of the forensic fingermark/print evaluation methods.

The forensic service provider must simultaneously ensure protection of the data processed, chain of evidence, transparency of forensic evaluation methods used and confidentiality of casework handled. As the PIA aims at finding the right balance between all interests, there are a few issues that stand out.

It starts with accepting the inherent risks of computing the strength of evidence of fingermarks of limited quality using possibly very large amounts of fingerprints. At the same time these data can be pseudonymized, metadata can be limited and access to facilities, processes and data can be systematically controlled and logged to ensure accountability in case of breach. This balance can only be achieved if internal and external awareness and responsibility is promoted on both individual and collective levels.

After documentation of the PIA, it is up to the forensic service provider to implement the recommendations the PIA exposes. In addition, a periodic review and reassessment of the PIA helps ensure privacy and data protection throughout the entire lifecycle of the fingermark/print data, whenever changes or additions in processes occur.

Apparently the recommendations for casework and R&D processes can be dealt with concurrently. Nevertheless, it is still desirable to assess them separately, not only because the forensic service provider carries different levels of responsibility (as a processor for casework and controller for R&D), but also because the purposes for processing relate to different legislation. Casework and R&D are carried out by different people and require different systems for collecting, processing and retaining data.

Conclusion

We think this contribution provides a better understanding of the interaction between the three disciplines of law, forensic science and statistics regarding the issue of privacy and protection of the fingerprint/mark data used for forensic evaluation.

This study could constitute a basis for the data protection policy of other biometric modalities. Although one must remain cautious to apply it considering the substantial privacy infringing difference between fingerprints and other biometric modalities [6].

a) By checking periodically the practical implementation b) Whenever changes or additions in processes occur

Applications to forensic evaluation processes

1. Define the contextual information:

2. Determine the potential risks related to:

3. Analyze and categorize the effects and risks, their

impact and likelihood of occurence on:

4. Manage (analyze necessity and relevance of) risk

through:

5. Document and implement the PIA by:

6. Review and audit throughout the entire personal

data lifecycle:

Introduction

Expert-based methods are used from the beginning of the 20th

century for forensic evaluation of fingermarks (trace specimens) and fingerprints (reference specimens). Currently semi-automatic systems using biometric data, biometric technology and statistical models are developed to support the experts in providing a more objective evaluation to the court, in terms of strength of evidence. At the same time growing data privacy concerns have enacted further legislation protecting personal data.

This study applies to the Dutch and European Union privacy and data protection legal framework. It focuses on and is limited to fingerprint data (images and features) and contingent metadata (e.g. name, date of birth, gender, nationality code) used for the forensic evaluation processes (R&D and casework).

It has 3 aims:

1. To raise awareness within the forensic community regarding the potential privacy issues related to the use of fingerprint/ mark data

2. To make explicit the data protection and informational privacy issues related to the biometric data themselves and the contingent metadata

3. To provide law, forensic science and statistics with key conditions under which they can use the biometric data necessary.

Problem description

The current statistical models developed for the forensic evaluation of fingermarks and fingerprints are data-driven, meaning they require the use of biometric data and metadata of a large amount of data subjects (those of whom the personal data are processed), in order to compute the strength of evidence.

The study analyzes privacy and data protection issues beyond a mere compliance check in line with contemporary legislation. In addition to compliance it includes a wider understanding of privacy concerns arising when personal data are being processed for any given reason. This is performed by means of a Privacy Impact Assessment (PIA).

Privacy Impact Assessment (PIA) Methods

The PIA is a risk-analysis instrument with which privacy issues can be identified and localized. It has been designed to assist and further promote the default privacy setting of all systems used to process personal data. It fosters a win-win situation between data subjects, controllers and processors (those who need the data to perform their processing operations). It creates an environment in which processes can be operated optimally while minimizing privacy or data protection concerns.

Several Privacy Impact Assessment methods have been developed [1-5], which all have in common a number of steps:

1. Definition of contextual information regarding the particular processing operations

2. Determination of potential risks (threats and vulnerabilities) in the system or during processing regarding privacy and data protection specifically

3. Analysis and categorization of effects and risks, their impact and likelihood of occurence

4. Risk management (necessity and relevance analysis) 5. Documentation and implementation of the PIA

6. Review and audit throughout the entire personal data lifecycle.

Privacy of fingermark/print data in forensic science:

forensic evaluation and individual data protection

Chloë Baartmans

*

, Didier Meuwly

*

(d.meuwly@nfi.minvenj.nl) and Eleni Kosta

**

,

*

Netherlands Forensic Institute,

**

University of Tillburg

a) Type, quality and amount of data

Real and simulated fingermarks, rolled inked fingerprints (the amount of data depends on the magnitude of the strength of evidence to be computed)

b) Type of technology

Computer system embedding automatic fingermark/print feature extraction, feature comparison and forensic statistical evaluation methods

c) Security (technical and organizational)

Access control to facilities, processes and data of the controller and processor, users responsibility and duties

d) Purpose for processing

Specifications and limits for the purpose of processing fingermark/print data, in terms of necessity, proportionality and subsidiarity

e) Way of processing

Consent or legal basis to collect, disseminate, exchange,

retain, link and destroy data

f) Further processing for other purposes

Consent or legal basis to use fingermark/print data initially

collected for law enforcement purpose

a) Mitigation

To avoid risks completely b) Minimization

To minimizing the effects of risks c) Acceptance

To accept that certain risks are inherent to the nature of

the processing operations

a) Project specification

Fingermark evaluation R&D and casework processes

b) Personal data

Fingermark/print data (biometric data)

c) Controller, processor and stakeholders

In the casework process the requester is the controller and the forensic science provider is the processor

In the R&D process the forensic science provider is both the controller and the processor

d) Purpose for processing

Compute the strength of evidence of fingermarks

a) People

Adverse and side effects for the controller, processor, data

subjects and other stakeholders

b) Systems and processes

Potential threats and vulnerabilities for the computer system

and the forensic evaluation processes (casework and R&D)

a) Publishing a descriptive document of all the steps

performed above (without disclosing security-sensitive information)

b) Communicating the PIA to all stakeholders and Data

Protection Authority (DPA) / Data Protection Officer (DPO)

c) Using a PIA to install privacy consistent processing

operations

Referenties

GERELATEERDE DOCUMENTEN

Achteruitgang van de Global Living Planet Index van 58 procent tussen 1970 and

In this protocol paper, we propose the protocol of an economic evaluation study for the assessment of (cost-) effectiveness of early APM versus conservative treatment with

Due to their explicit dependence on only the period of the structure, such lines might be used in the analysis of experimental data as a reference, to determine the lateral period

Cluster 3 contained 32 words (10.7%) with an average mean score on the lexical decision task and above aver- age mean-corrected task scores on the context decision and

The factor with which the extracted analyte can be concen- trated is tuneable. A steady extracted concentration factor is achieved when the extracted analyte flux matches the

Disregarding the speed of real 'harmonisation' or `compatibilisation' in the field known as forensic expertise, a likely effect of this study will be a growing awareness of

In those countries where there is a body of legal experts three different systems exist: that where the expert testimony may be challenged where the accused and the judge each

The number of CSs attended by forensic assistants is proven to have doubled in the period 2009-2011, so we conclude firstly that forces have taken on sufficient capacity to attend