{"id":1633,"date":"2020-09-30T14:02:43","date_gmt":"2020-09-30T14:02:43","guid":{"rendered":"https:\/\/techpolicy.org.il\/?p=1633"},"modified":"2021-09-23T10:06:13","modified_gmt":"2021-09-23T10:06:13","slug":"privacy-protection-for-smart-mobility-organizations-in-the-digital-age","status":"publish","type":"post","link":"https:\/\/techpolicy.org.il\/he\/blog\/privacy-protection-for-smart-mobility-organizations-in-the-digital-age\/","title":{"rendered":"Privacy Protection for Smart Mobility Organizations in the Digital Age"},"content":{"rendered":"<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"680\" src=\"\/wp-content\/uploads\/2020\/09\/ipad-632394_1920-1024x680.jpg\" alt=\"\" class=\"wp-image-1639\" srcset=\"https:\/\/techpolicy.org.il\/wp-content\/uploads\/2020\/09\/ipad-632394_1920-1024x680.jpg 1024w, https:\/\/techpolicy.org.il\/wp-content\/uploads\/2020\/09\/ipad-632394_1920-300x199.jpg 300w, https:\/\/techpolicy.org.il\/wp-content\/uploads\/2020\/09\/ipad-632394_1920-768x510.jpg 768w, https:\/\/techpolicy.org.il\/wp-content\/uploads\/2020\/09\/ipad-632394_1920-1536x1020.jpg 1536w, https:\/\/techpolicy.org.il\/wp-content\/uploads\/2020\/09\/ipad-632394_1920.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>On September 16, 2020 the Israeli Privacy Protection Authority (IPPA) published a new Guide -\u201c<a href=\"https:\/\/www.gov.il\/he\/departments\/news\/guide-transportation-privacy\" target=\"_blank\" rel=\"noreferrer noopener\">Privacy Protection for Smart Mobility Organizations in the Digital Age<\/a>\u201d<\/p>\n\n\n\n<p>Herein is a summary of the guide\u2019s content.<\/p>\n\n\n\n<p>_____________________________________________________________________<\/p>\n\n\n\n<p><em>Mobility Organizations are defined as entities that provide mobility infrastructure, public mobility services, additional services to the mobility ecosystem, start-ups in the smart mobility vertical and operators of mobility vehicles in the city space.<\/em><\/p>\n\n\n\n<p><strong>Preamble<\/strong><\/p>\n\n\n\n<p>In 2017, the Israeli government passed the Government Decision 2316, aiming to promote Israel\u2019s global leadership in this sector through 2 vectors: 1\/ promoting and developing the Israeli industry and 2\/ promoting solutions to mobility challenges. The main entity in the government activity in this space is the Ministry of Transportation (MoT) that is both directly in charge of mobility services and is active in the ecosystem of the private industry.<\/p>\n\n\n\n<p>A visible trend in this regulatory space is that regulators are moving from being operators to being active enablers, promoting development of new solutions by the non-governmental entities. This is exemplified by the fact that Ministries no longer create their own databases of mobility data, but they promote different actors in the market to establish and manage these, while transferring the responsibility for the user\u2019s privacy to them.<\/p>\n\n\n\n<p>MoT is acting for the inclusion of technology and innovation in both infrastructure and vehicles. Collecting and sharing data are crucial to planning, monitoring and market development, for the \u201cMass Mobility as a service\u201d revolution in Israel. Data is required for policy makers in developing infrastructure, as well as to developers of applications for mobility.&nbsp;<\/p>\n\n\n\n<p>The IPPA states that this raises significant ethical and legal challenges to people\u2019s privacy. The guide is aimed at clarifying ways of achieving the right balance in this space.<\/p>\n\n\n\n<p><strong>Chapter 1: Smart Mobility Ecosystem<\/strong><\/p>\n\n\n\n<p>In this chapter the guide lists the variety of participants in the mobility ecosystem: public sector; vehicle services; infrastructure; business-technology including tech giants like Google and Facebook; public and shared mobility.<\/p>\n\n\n\n<p>The guide lists major technologies of importance in this ecosystem: 5G Cellular networks, Big Data analytics and Internet of Things.<\/p>\n\n\n\n<p>The guide also lists major developments in the ecosystem: Mobility as a Service which includes Car Sharing, Ride Sharing, Carpooling, Ride Hailing; P2P decentralized on demand services; Last Mile solutions including Micro Mobility; ACES (Autonomous, Connected, Electric, Shared); Shared Data Hubs; Traffic Management and Control Optimization Systems.<\/p>\n\n\n\n<p><strong>Chapter 2: Includes general information about the IPPA<\/strong><\/p>\n\n\n\n<p><strong>Chapter 3: Privacy Challenges in Smart Mobility<\/strong><\/p>\n\n\n\n<p>The guide describes that a user will be subject to constant surveillance by cameras and sensors connected to control centers. It will be possible to analyze the data, profile, learn preferences and statistics of specific people and the public in general. Though users will be sharing data for better service and personalized service, their privacy will be infringed upon.<\/p>\n\n\n\n<p><strong>Potential privacy challenges include:&nbsp;<\/strong><\/p>\n\n\n\n<p>1. Preventing the expansion of the data use purposes<\/p>\n\n\n\n<p>2. Collection of excessive data<\/p>\n\n\n\n<p>3. Data Security<\/p>\n\n\n\n<p>4. Targeted advertising<\/p>\n\n\n\n<p>5. Privacy regulation restricting innovation<\/p>\n\n\n\n<p>6. Privacy by Design Implementation<\/p>\n\n\n\n<p>7. Implementation of privacy requirements in procurement contracts and tenders<\/p>\n\n\n\n<p>8. Abundance of entities involved in data sharing<\/p>\n\n\n\n<p>9. Lack of sufficient knowledge of privacy protection methodologies and implementation in organizations<\/p>\n\n\n\n<p><strong>August 2019 Survey Findings:<\/strong><\/p>\n\n\n\n<p>1. 62% of surveyed users are very concerned about privacy protection when using mobility applications and sites<\/p>\n\n\n\n<p>2. Over 60% of surveyed users think that privacy is not protected well enough and mobility organizations should seek consent from them for data processing<\/p>\n\n\n\n<p>3. 85% of users are worried and 84% don\u2019t trust mobility organizations<\/p>\n\n\n\n<p>4. 1\/3 of users don\u2019t wish to share personal data for targeted services and over 40% partially agree to share<\/p>\n\n\n\n<p>5. Over 50% of smart mobility services believe there is danger of personal data breach. A 1\/3 believe there is danger of breach of personal habits and preferences, payment details or location data<\/p>\n\n\n\n<p>6. 17% are worried of harassment, extortion or harm as a result of the improper use of personal data<\/p>\n\n\n\n<p>7. The vast majority are interested in advice on better protecting their data and think the government should provide them with that&nbsp;<\/p>\n\n\n\n<p><strong>Chapter 4: Privacy Challenges in Smart Mobility<\/strong><\/p>\n\n\n\n<p>Describes general duties of all controllers and processors according to&nbsp;<a href=\"https:\/\/www.gov.il\/BlobFolder\/legalinfo\/legislation\/en\/ProtectionofPrivacyLaw57411981unofficialtranslatio.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Israeli Privacy protection law<\/a>&nbsp;and regulations, specifically describing the&nbsp;<a href=\"https:\/\/www.gov.il\/en\/Departments\/legalInfo\/data_security_regulation\" target=\"_blank\" rel=\"noreferrer noopener\">Data Security Regulations<\/a>.<\/p>\n\n\n\n<p><strong>Chapter 5: Principles of implementing new technologies<\/strong><\/p>\n\n\n\n<p>Accountability \u2013 It\u2019s&nbsp;<strong>recommended<\/strong>&nbsp;a mobility organization adopts accountability measures that will support its commitment to minimizing the consequences of technology on users\u2019 privacy. The guide mentions this is mandatory in other jurisdictions, for example when subject to the GDPR.&nbsp;<\/p>\n\n\n\n<p>It\u2019s&nbsp;<strong>recommended<\/strong>&nbsp;to appoint a responsible senior manager of a privacy protection program. It can be a Data Protection Officer if the organization has one, but not the Chief Information Security Officer, which has different responsibilities. It is also optional to appoint a Privacy steering committee or senior staff team.<\/p>\n\n\n\n<p>It\u2019s&nbsp;<strong>recommended<\/strong><strong>&nbsp;<\/strong>to conduct a Privacy Impact Assessment and adopt Privacy by Design principles when designing and implementing personal data processing activities.&nbsp;<\/p>\n\n\n\n<p>Ex. Is a toll road fee charging system based on face recognition or body heat to conduct passengers count for statistical purposes.&nbsp;<\/p>\n\n\n\n<p>It\u2019s&nbsp;<strong>required<\/strong>&nbsp;by law to be transparent and give notice to data subjects.<\/p>\n\n\n\n<p>Contracts and tenders for outsourcing partners&nbsp;<strong>must<\/strong>&nbsp;include detailed provisions for privacy protection (this is according to&nbsp;<a href=\"https:\/\/www.gov.il\/en\/Departments\/policies\/outsourcing\" target=\"_blank\" rel=\"noreferrer noopener\">IPPA Guidelines on the use of Outsourcing Services for personal Data Processing<\/a>&nbsp;). It\u2019s advisable that these decisions receive senior management attention.<\/p>\n\n\n\n<p><strong>Chapter 6: Focal Topics<\/strong><\/p>\n\n\n\n<p>1. Privacy Impact Assessment General Questionnaire (based on a previously published IPPA template).<\/p>\n\n\n\n<p>2. General description of de-identification tools for Big Data governance.<\/p>\n\n\n\n<p>3. General tools for using CCTV in a privacy considerate manner (based on previous IPPA guidelines).<\/p>\n\n\n\n<p>4. Mobility in the Municipal sphere \u2013 general description noting implementing smart mobility projects in municipalities entails privacy risks.&nbsp;<strong>Pages 36-37 provide a Table mapping privacy risk levels in smart mobility applications (see below).<\/strong><\/p>\n\n\n\n<p>5. Privacy in Payment Apps for public transportation &#8211;&nbsp;<\/p>\n\n\n\n<p>The IPPA stresses that when it comes to public transportation, it is a public infrastructure and essential to citizen\u2019s freedom of movement in the public space. It is especially important to populations with limited power such as minors, elderly, low income people or people with disabilities who do not own cars. Therefore, using apps as payment methods in this space is allowed, but should be done in a way that is reasonable, transparent and while balancing the purpose of using the personal data and the protection of privacy. Special emphasis should be given to the issue of consent and to the availability of an anonymous alternative. The chapter offers a detailed analysis of the privacy risks in this context and recommendations on mitigating them.&nbsp;<\/p>\n\n\n\n<p>6. Description of data points and types in the smart mobility ecosystem.<\/p>\n\n\n\n<p><strong>Mapping of Privacy Risk Levels in Smart Mobility Applications<\/strong><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"634\" height=\"366\" src=\"https:\/\/techpolicy.org.il\/wp-content\/uploads\/2020\/10\/blog-table-1-2.png\" alt=\"\" class=\"wp-image-1641\" srcset=\"https:\/\/techpolicy.org.il\/wp-content\/uploads\/2020\/10\/blog-table-1-2.png 634w, https:\/\/techpolicy.org.il\/wp-content\/uploads\/2020\/10\/blog-table-1-2-300x173.png 300w\" sizes=\"auto, (max-width: 634px) 100vw, 634px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"634\" height=\"745\" src=\"\/wp-content\/uploads\/2020\/10\/blog-table-2-1.png\" alt=\"\" class=\"wp-image-1642\" srcset=\"https:\/\/techpolicy.org.il\/wp-content\/uploads\/2020\/10\/blog-table-2-1.png 634w, https:\/\/techpolicy.org.il\/wp-content\/uploads\/2020\/10\/blog-table-2-1-255x300.png 255w\" sizes=\"auto, (max-width: 634px) 100vw, 634px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"631\" height=\"524\" src=\"\/wp-content\/uploads\/2020\/10\/blog-table-3.png\" alt=\"\" class=\"wp-image-1643\" srcset=\"https:\/\/techpolicy.org.il\/wp-content\/uploads\/2020\/10\/blog-table-3.png 631w, https:\/\/techpolicy.org.il\/wp-content\/uploads\/2020\/10\/blog-table-3-300x249.png 300w\" sizes=\"auto, (max-width: 631px) 100vw, 631px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"632\" height=\"309\" src=\"\/wp-content\/uploads\/2020\/10\/blog-table-4.png\" alt=\"\" class=\"wp-image-1644\" srcset=\"https:\/\/techpolicy.org.il\/wp-content\/uploads\/2020\/10\/blog-table-4.png 632w, https:\/\/techpolicy.org.il\/wp-content\/uploads\/2020\/10\/blog-table-4-300x147.png 300w\" sizes=\"auto, (max-width: 632px) 100vw, 632px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"631\" height=\"213\" src=\"https:\/\/techpolicy.org.il\/wp-content\/uploads\/2020\/10\/blog-table-6.png\" alt=\"\" class=\"wp-image-1645\" srcset=\"https:\/\/techpolicy.org.il\/wp-content\/uploads\/2020\/10\/blog-table-6.png 631w, https:\/\/techpolicy.org.il\/wp-content\/uploads\/2020\/10\/blog-table-6-300x101.png 300w\" sizes=\"auto, (max-width: 631px) 100vw, 631px\" \/><\/figure><\/div>","protected":false},"excerpt":{"rendered":"<p>In 2017, the Israeli government passed the Government Decision 2316, aiming to promote Israel\u2019s global leadership in this sector through 2 vectors: 1\/ promoting and developing the Israeli industry and 2\/ promoting solutions to mobility challenges. <\/p>","protected":false},"author":2,"featured_media":1639,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"none","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","inline_featured_image":false,"footnotes":""},"categories":[9],"tags":[38,28,12],"publication_type":[],"class_list":["post-1633","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-digital-society","tag-privacy","tag-smart-mobility"],"acf":[],"_links":{"self":[{"href":"https:\/\/techpolicy.org.il\/he\/wp-json\/wp\/v2\/posts\/1633","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techpolicy.org.il\/he\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techpolicy.org.il\/he\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techpolicy.org.il\/he\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techpolicy.org.il\/he\/wp-json\/wp\/v2\/comments?post=1633"}],"version-history":[{"count":18,"href":"https:\/\/techpolicy.org.il\/he\/wp-json\/wp\/v2\/posts\/1633\/revisions"}],"predecessor-version":[{"id":3357,"href":"https:\/\/techpolicy.org.il\/he\/wp-json\/wp\/v2\/posts\/1633\/revisions\/3357"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techpolicy.org.il\/he\/wp-json\/wp\/v2\/media\/1639"}],"wp:attachment":[{"href":"https:\/\/techpolicy.org.il\/he\/wp-json\/wp\/v2\/media?parent=1633"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techpolicy.org.il\/he\/wp-json\/wp\/v2\/categories?post=1633"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techpolicy.org.il\/he\/wp-json\/wp\/v2\/tags?post=1633"},{"taxonomy":"publication_type","embeddable":true,"href":"https:\/\/techpolicy.org.il\/he\/wp-json\/wp\/v2\/publication_type?post=1633"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}