Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Improving the Transparency of Privacy Terms Updates

Opinion Paper

  • Conference paper
  • First Online:
Privacy Technologies and Policy (APF 2021)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 12703))

Included in the following conference series:

  • 887 Accesses

Abstract

Updates are an essential part of most information systems. However, they may also serve as a means to deploy undesired features or behaviours that potentially undermine users’ privacy. In this opinion paper, we propose a way to increase update transparency, empowering users to easily answer the question “what has changed with regards to my privacy?”, when faced with an update prompt. This is done by leveraging a formal notation of privacy terms and a set of rules that dictate when privacy-related prompts can be omitted, to reduce fatigue. A design that concisely visualizes changes between data handling practices of different software versions or configurations is also presented. We argue that it is an efficient way to display information of such nature and provide the method and calculations to support our assertion.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Art. 13 of the GDPR does not require showing information about how often the data are transferred. We include it, because increasing sampling rates can lead to privacy implications, especially when correlation with other data-sets is possible.

  2. 2.

    eiu.com/topic/democracy-index.

  3. 3.

    According the to UN un.org/en/member-states.

  4. 4.

    Here we mean it in the sense of the Greek word “kairos”, which refers to an opportune moment, not to chronology.

  5. 5.

    \(|K_{old} \varDelta K_{new}|\), i.e., the cardinality of the symmetric difference between the old and new terms.

References

  1. Anderson, B.B., et al.: How polymorphic warnings reduce habituation in the brain: insights from an fMRI study. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (2015)

    Google Scholar 

  2. Anderson, B.B., et al.: Users aren’t (necessarily) lazy: using NeuroIS to explain habituation to security warnings. In: Proceedings of the 35th International Conference on Information Systems (2014)

    Google Scholar 

  3. App privacy details on the App Store. Apple Developer. https://developer.apple.com/app-store/app-privacy-details/

  4. Bos, B.: Data Privacy Vocabulary. W3C Recommendation. W3C (2019). https://www.w3.org/ns/dpv

  5. Bösch, C., et al.: Tales from the dark side. In: Proceedings on Privacy Enhancing Technologies (2016)

    Google Scholar 

  6. Breaux, T.D., Hibshi, H., Rao, A.: Eddy, a formal language for specifying and analyzing data flow specifications for conflicting privacy requirements. Requirements Eng. 19(3), 281–307 (2013). https://doi.org/10.1007/s00766-013-0190-7

    Article  Google Scholar 

  7. Casey, S.M.: Set Phasers on Stun: And Other True Tales of Design, Technology, and Human Error (1993)

    Google Scholar 

  8. Cate, F.H.: The limits of notice and choice. IEEE Secur. Priv. Mag. 8, 59–62 (2010)

    Article  Google Scholar 

  9. Cranor, L.F.: Web Privacy with P3P (2002)

    Google Scholar 

  10. I. DIS. 9241–210: 2010. Ergonomics of Human System Interaction-Part 210: Human-Centred Design for Interactive Systems (2009)

    Google Scholar 

  11. Erickson, A.: Comparative analysis of the EU’s GDPR and Brazil’s LGPD: enforcement challenges with the LGPD. Brooklyn J. Int. Law 44, 859 (2018)

    Google Scholar 

  12. European Parliament and Council of European Union. Regulation 2016/679 of the European Parliament and of the Council. In: Official Journal of the European Union (2016)

    Google Scholar 

  13. Fagan, M., et al.: A study of users’ experiences and beliefs about software update messages. In: Computers in Human Behavior (2015)

    Google Scholar 

  14. GDPR Recital 58 - The Principle of Transparency. https://gdpr-info.eu/recitals/no-58/

  15. Greveler, U., et al.: Multimedia content identification through smart meter power usage profiles. In: Proceedings of the International Conference on Information and Knowledge Engineering (IKE) (2012)

    Google Scholar 

  16. Harkous, H., et al.: Polisis: automated analysis and presentation of privacy policies using deep learning. In: 27th USENIX Security Symposium (2018)

    Google Scholar 

  17. Harkous, H., et al.: PriBots: conversational privacy with chatbots. In: 12th Symposium on Usable Privacy and Security (2016)

    Google Scholar 

  18. Human, S., Cech, F.: A human-centric perspective on digital consenting: the case of GAFAM. In: Zimmermann, A., Howlett, R.J., Jain, L.C. (eds.) Human Centred Intelligent Systems. SIST, vol. 189, pp. 139–159. Springer, Singapore (2021). https://doi.org/10.1007/978-981-15-5784-2_12

    Chapter  Google Scholar 

  19. Mcdonald, A.M., et al.: The cost of reading privacy policies. J. Law Policy Inf. Soc. 4, 543–568 (2008)

    Google Scholar 

  20. Miller, G.A.: The magical number 7\(\pm \)2. In: Psychological Review (1956)

    Google Scholar 

  21. Morgner, P., et al.: Opinion: security lifetime labels - overcoming information asymmetry in security of IoT consumer products. In: Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks (2018)

    Google Scholar 

  22. Morgner, P., et al.: Privacy implications of room climate data. In: Foley, S.N., Gollmann, D., Snekkenes, E. (eds.) ESORICS 2017. LNCS, vol. 10493, pp. 324–343. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-66399-9_18

    Chapter  Google Scholar 

  23. Nielsen, J.: Jakob’s Law of Internet User Experience. https://www.nngroup.com/videos/jakobs-law-internet-ux/

  24. Nielsen, N.: EU warns Romania not to abuse GDPR against press. EUobserver (2018). https://euobserver.com/justice/143356

  25. Nokhbeh Zaeem, R., et al.: PrivacyCheck v2: a tool that recaps privacy policies for you. In: Proceedings of the 29th ACM International Conference on Information & Knowledge Management (2020)

    Google Scholar 

  26. Okoyomon, E., et al.: On the ridiculousness of notice and consent: contradictions in app privacy policies. In: Workshop on Technology and Consumer Protection (2019)

    Google Scholar 

  27. Railean, A., Reinhardt, D.: OnLITE: on-line label for IoT transparency enhancement. In: Asplund, M., Nadjm-Tehrani, S. (eds.) NordSec 2020. LNCS, vol. 12556, pp. 229–245. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-70852-8_14

    Chapter  Google Scholar 

  28. Raskin, J.: The Humane Interface: New Directions for Designing Interactive Systems (2011)

    Google Scholar 

  29. Lederman, N.G., Lederman, J.S.: The elephant in the room. J. Sci. Teacher Educ. 26(8), 669–672 (2016). https://doi.org/10.1007/s10972-015-9446-z

    Article  Google Scholar 

  30. Sadeh, N., et al.: Towards usable privacy policies: semi-automatically extracting data practices from websites’ privacy policies’. In: Poster Proceedings of the 10th Symposium On Usable Privacy and Security (2014)

    Google Scholar 

  31. Schaub, F., et al.: A design space for effective privacy notices. In: Proceedings of the 11th Symposium On Usable Privacy and Security (2015)

    Google Scholar 

  32. Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27, 379–423 (1948)

    Article  MathSciNet  Google Scholar 

  33. Su, J., et al.: One pixel attack for fooling deep neural networks. IEEE Trans. Evol. Comput. 23, 828–841 (2019)

    Article  Google Scholar 

  34. Vaniea, K., et al.: Betrayed by updates. In: Proceedings of the CHI Conference on Human Factors in Computing Systems (2014)

    Google Scholar 

  35. Vaniea, K., et al.: Tales of software updates. In: Proceedings of the CHI Conference on Human Factors in Computing Systems (2016)

    Google Scholar 

  36. Voss, W.G.G.: The CCPA and the GDPR are not the same: why you should understand both. In: CPI Antitrust Chronicle (2021)

    Google Scholar 

Download references

Acknowledgments

This research is a continuation of an activity that has originally received funding from the H2020 Marie Skłodowska-Curie EU project “Privacy&Us” under the grant agreement No. 675730.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alexandr Railean .

Editor information

Editors and Affiliations

Appendices

Appendix A Information Efficiency Calculation Example

We extend the material from Sect. 5 by providing another example. Consider the last term of the tuple, \(\varPhi \), which represents the frequency with which data are sent. Suppose that in this case we express it as a choice among these options: \(\{\)multiple times per second, every second, every minute, hourly, daily, weekly, monthly, on-demand\(\}\). Given that the set has 8 options to choose from, it means that a choice of a specific element yields \(\lceil log_2 8\rceil =3\) bits of useful information.

Following the same principle, we quantify each component of a privacy term \(\varTheta \), using terminology adapted from several sources: Platform for Privacy Preferences (P3P) [9], Data Privacy Vocabulary (DPV) [4], and Apple developer guidelines [3], summarized in Table 3. Note that different vocabularies provide a different level of granularity, for example, DPV distinguishes between 161 types of data, while P3P only 16. Since devising a vocabulary is outside the scope of this paper, we err on the safe side and take the maximum values (highlighted in bold) among the considered examples.

Table 3. Summary of discrete choices to indicate the type of collected data, purpose of collection and retention period, using notation proposed by DPV, P3P and Apple developer guidelines.

After substituting each component, we get: \(\varTheta = 8 + 5 + 20\times 6 + 8 + 11 + 3 = 155\) bits. Therefore, the pure information required to express a term is 155 bits, this is how much we would transmit, if we could upload it directly into the conscience of a person. However, some overhead is added because the information is encoded into words, or other forms that have to be perceived by end users.

Fig. 7.
figure 7

Annotated calculations that explains how the amount of information in each privacy term is computed, yielding a total of 155 bits.

We argue that the tabular representation is a highly efficient way of encoding privacy terms. This assertion is supported by the following calculation. Suppose that the notation consists of 26 small letters of the Latin alphabet, 10 digits, the , and symbols. The notation has a total of 39 characters, which means that a single character is worth \(\lceil log_2 39\rceil =6\) bits. In addition, the following conventions apply: a company name is assumed to be a string of 20 characters, thus it is worth up to \(20 \times 6=120\) bits.

We now apply this encoding to Fig. 7, ignoring the data type icons and the country flags for simplicity. Each line is 49 characters long, yielding \(49 \times 6=294\) bits. At this stage we can compute the efficiency of this representation: \(\eta =\frac{{info}_{useful}}{{info}_{total}}\times 100= \frac{155\times 2}{294\times 2} \times 100\approx 53\%\).

Armed with this number, we can consider various ways to improve efficiency and measure their impact. For example, we can remove the country names and leave only their flags, or use two-letter ISO codes instead of full names. Entries can also be grouped, e.g., all terms related to temperature can skip the word “temperature” in all but the first entry. In addition, search and filter functionality can be used to hide all the rows except the ones the user wants to focus on, thus reducing the total amount of displayed information. With such an efficiency metric at hand, one can argue in favour of one design over another, supporting the choice with hard data.

In addition, we can use the same metric to compare entirely different notations. For example, consider this hypothetical prose version of the terms expressed in Fig. 1: “We care about your privacy, therefore our smart indoor temperature and humidity meter only collects and shares your data with 2 companies. Temperature data are shared on a daily basis with Minerva LTD, located in Canada. The data are retained for a period of 1 year and are used for research purposes. Humidity is shared on an hourly basis with ThirstFirst LTD, and retained by them for 1 year, in the USA. Humidity data are used for marketing purposes”. It is 453 characters long, and for the sake of simplicity let us assume that it also uses an alphabet of 39 symbols: 26 lower case Latin letters, 10 digits, space, comma, period. As in the previous case, each symbol is worth 6 bits, therefore \(\eta =\frac{{info}_{useful}}{{info}_{total}}\times 100= \frac{155\times 2}{453\times 6} \times 100\approx 11\%\).

The prose version is clearly a step down from an efficiency of 53%! While we acknowledge that this synthetic version of a prose policy could have been shorter, such laconic policies are not the norm [18, 19, 26].

Appendix B When to Display Consent Prompts

The following pseudo-code illustrates the logic defined in Sect. 4 in action:

figure d

A more granular approach enables us to tell whether a primary or a secondary filter matched, allowing more control (e.g. the GUI can display different prompts, depending on the magnitude of the difference):

figure e

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Railean, A., Reinhardt, D. (2021). Improving the Transparency of Privacy Terms Updates. In: Gruschka, N., Antunes, L.F.C., Rannenberg, K., Drogkaris, P. (eds) Privacy Technologies and Policy. APF 2021. Lecture Notes in Computer Science(), vol 12703. Springer, Cham. https://doi.org/10.1007/978-3-030-76663-4_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-76663-4_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-76662-7

  • Online ISBN: 978-3-030-76663-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics