PRISE - privacy & security

Project descriptions and presentations

One-page project descriptions in English and the national languages of the PRISE partners

Project deliverables

WP2 – Identifying relevant security technologies and measures

This report has been produced in Work Package 2 on Security Technologies. It the presents the technology model used in the PRISE project. It shows that security applications draw on many different basic technologies and in doing so they also inherit the risks to privacy intrinsic to those technologies. The identified basic technologies are: Communication technology, Sensors, Biometric technology, Data storage and Analysis and Decision support. A number of System examples are given to illustrate some of the application areas.

WP3 – Mapping of privacy impacts and options for privacy enhancing shaping

This report presents an overview of legal requirements which lay down the scope of security technology use (national powers of investigation of a number of Member States are summarized) and of provisions which deal with information sharing among Member States. The level of privacy impact also depends on legal provisions, a product which might enable privacy compliant use may therefore according to national police law still be used in a far more infringing way than intended or foreseen by its developers.

The use of Privacy Enhancing Technologies (PETs) as part of security technologies and security measures has not been discussed on a large scale and research in this field is scarce. This report maps known PETs to the basic technologies identified in D 2.2 Overview of Security Technologies as well as the general privacy principles derived in D 3.2 Legal Evaluation Report. While it is technically possible to apply all known PETs to security technologies, some of them contradict the underlying aim of law enforcement and criminal investigations. This conclusion, however, does not exempt developers of security technologies from closely scrutinizing applicability of PETs to their research as implementation of PETs generally is also in the interest of the technologies’ users.

WP4 – Development of implementation scenarios

This document presents some scenarios showing how security technologies and surveillance may be used in everyday situations in the near future. In the scenario text we introduce some facts about the different technologies, to help you understand how they work today and their potential for the future. The purpose of these scenarios has not been to try to tell what the future will look like. They try to describe some appealing and some discomforting aspects related to the use of security technology and means.

The scenarios were a major input for the participatory Technology Assessment activities in six European countries. For this purpose they were translated into the languages of the countries comprised by the interview meetings (Austria, Denmark, Germany, Hungary, Norway and Spain). In additions, illustrations were produced to supplement the scenarios.

WP5 – Participatory Technology Assessment

This deliverable is the English version of the questionnaire and the interview guidelines used for the participatory activities, the six national interview meetings. For each meeting the questionnaire and the interview guidelines have been translated into the national languages of the involved countries. This English version has been the basis version that has been translated into Norwegian, German (for both Germany and Austria with slight adjustments to take into consideration language differences), Hungarian, Spanish and Danish. The six versions of the questionnaire in national languages are made available in the annexes to the reports from the national interview meetings.

National reports on Interview Meetings

These documents summarise the results of the interview meetings in six European countries. The interview meetings are the core element of the participatory activities within the PRISE project involving citizens of different nations. For the interested reader more details on the interview meetings are made available in the Annexes to these reports, containing information on Demographic data of the participants, Program of the interview meeting, Material sent to the participants, Questionnaire and interview guide, Transcript of group interviews, Frequency tables and Comments on the questionnaire by the participants; most of this information is provided in the original language of the involved country.

Annexes to the national reports

Synthesis report on Interview Meetings

The draft synthesis report combines the results of the national reports and gives an overview of the participants’ attitudes towards new security technology and privacy issues and points out the national differences.The annexes contain the Method handbook, data on the overall composition of participants, the Scenarios, the Questionnaire and interview guide and the overall Frequency tables.

WP6 – Criteria for privacy enhancing security technologies

This document presents criteria for data protection compliant and privacy enhancing security technologies. As a background for the discussion on privacy and security technologies this paper provides some input on the theoretical discussion on why privacy is a necessity to liberal democracies as well as an overview of the ongoing security discourse by analysing different security policies. Another part addresses the question whether more surveillance provides more security and whether this is necessarily always accompanied by a loss of privacy. PRISE argues that in some cases more security is possible with the same or even a higher level of privacy.

PRISE created the “PRISE Matrix”. It is a step-by-step approach that leads to privacy-compliant or privacy-enhancing systems-design of new security technologies. A core part of this report is the presentation of the matrix and of techno-organisational measures to achieve data protection compliance and privacy-enhancing solutions.

WP7 – Dissemination and implementation

The purpose of the PRISE conference “Towards privacy enhancing security technologies – the next steps” was to discuss in an open and broad forum PRISE results as well as further steps required for a balanced approach on privacy and security. This report contains the contributions to the workshops conducted within the final PRISE Conference, it consists of 9 full text papers and 10 abstracts or external links to the presented research reports.

The Statement Paper summarises what the PRISE team and the Advisory Panel members think needs to be done to protect privacy in a security-focussed world.It was presented and discussed at the PRISE Concluding Conference.