Resources
Identity Use Cases & Scenarios.
FIDIS Deliverables.
Identity of Identity.
Interoperability.
Profiling.
D7.2: Descriptive analysis and inventory of profiling practices.
D7.3: Report on Actual and Possible Profiling Techniques in the Field of Ambient Intelligence.
D7.4: Implications of profiling practices on democracy.
D7.6 Workshop on AmI, Profiling and RFID.
D7.7: RFID, Profiling, and AmI.
D7.8: Workshop on Ambient Law.
D7.9: A Vision of Ambient Law.
D7.10: Multidisciplinary literature selection, with Wiki discussion forum on Profiling, AmI, RFID, Biometrics and Identity.
D7.11: Kick-off Workshop on biometric behavioural profiling and Transparency Enhancing Technologies.
Forensic Implications.
HighTechID.
Privacy and legal-social content.
Mobility and Identity.
Other.
IDIS Journal.
FIDIS Interactive.
Press & Events.
In-House Journal.
Booklets
Identity in a Networked World.
Identity R/Evolution.
Processing of so-called sensitive data is prohibited, unless the data subject has given explicit consent or other conditions such as the vital interest of the data subject are fulfilled (article 8).
The list of sensitive data is a restrictive list. In an AmI world, any kind of data could become sensitive: Your food purchases may provide information concerning your health or religious belief ; when you program your PDA to look for single people in the neighbourhood, it may provide sexual preferences etc. In fact, profiling enables ‘masking’. ‘Masking’ is a practice whereby data that is in itself insignificant, is correlated with sensitive information. By using the insignificant information, the protection of sensitive data can be avoided.
39 / 62 |