Security And Privacy Autonomous Vehicles Software

2y ago
42 Views
2 Downloads
6.50 MB
61 Pages
Last View : 1m ago
Last Download : 3m ago
Upload by : Brady Himes
Transcription

Security andPrivacyMachine LearningAutonomousVehiclesSoftwareAPRIL 2021www.computer.org

IEEE COMPUTER SOCIETY JOBS BOARDEvolving CareerOpportunitiesNeed Your SkillsExplore new options—upload your resume todaywww.computer.org/jobsChanges in the marketplace shift demands for vital skillsand talent. The IEEE Computer Society Jobs Board is avaluable resource tool to keep job seekers up to date onthe dynamic career opportunities offered by employers.Take advantage of these special resources for job seekers:JOB ALERTSTEMPLATESCAREERADVICERESUMES VIEWEDBY TOP EMPLOYERSWEBINARSNo matter what your career level, the IEEE ComputerSociety Jobs Board keeps you connected toworkplace trends and exciting career prospects.

IEEE COMPUTER SOCIETY computer.orgSTAFFEditorCathy MartinPublications Portfolio ManagersCarrie Clark, Kimberly SperkaPublications Operations Project SpecialistChristine AnthonyPublisherRobin BaldwinProduction & Design ArtistCarmen Flores-GarveySenior Advertising CoordinatorDebbie SimsCirculation: ComputingEdge (ISSN 2469-7087) is published monthly by the IEEE Computer Society. IEEE Headquarters, Three Park Avenue, 17thFloor, New York, NY 10016-5997; IEEE Computer Society Publications Office, 10662 Los Vaqueros Circle, Los Alamitos, CA 90720; voice 1 714 821 8380;fax 1 714 821 4010; IEEE Computer Society Headquarters, 2001 L Street NW, Suite 700, Washington, DC 20036.Postmaster: Send address changes to ComputingEdge-IEEE Membership Processing Dept., 445 Hoes Lane, Piscataway, NJ 08855. Periodicals PostagePaid at New York, New York, and at additional mailing offices. Printed in USA.Editorial: Unless otherwise stated, bylined articles, as well as product and service descriptions, reflect the author’s or firm’s opinion. Inclusion inComputingEdge does not necessarily constitute endorsement by the IEEE or the Computer Society. All submissions are subject to editing for style,clarity, and space.Reuse Rights and Reprint Permissions: Educational or personal use of this material is permitted without fee, provided such use: 1) is not made forprofit; 2) includes this notice and a full citation to the original work on the first page of the copy; and 3) does not imply IEEE endorsement of any thirdparty products or services. Authors and their companies are permitted to post the accepted version of IEEE-copyrighted material on their own Webservers without permission, provided that the IEEE copyright notice and a full citation to the original work appear on the first screen of the posted copy.An accepted manuscript is a version which has been revised by the author to incorporate review suggestions, but not the published version with copyediting, proofreading, and formatting added by IEEE. For more information, please go to: http://www.ieee.org/publications tml. Permission to reprint/republish this material for commercial, advertising, or promotional purposes or for creating newcollective works for resale or redistribution must be obtained from IEEE by writing to the IEEE Intellectual Property Rights Office, 445 Hoes Lane,Piscataway, NJ 08854-4141 or pubs-permissions@ieee.org. Copyright 2021 IEEE. All rights reserved.Abstracting and Library Use: Abstracting is permitted with credit to the source. Libraries are permitted to photocopy for private use of patrons,provided the per-copy fee indicated in the code at the bottom of the first page is paid through the Copyright Clearance Center, 222 Rosewood Drive,Danvers, MA 01923.Unsubscribe: If you no longer wish to receive this ComputingEdge mailing, please email IEEE Computer Society Customer Service at help@computer.org and type “unsubscribe ComputingEdge” in your subject line.IEEE prohibits discrimination, harassment, and bullying. For more information, visit l.IEEE Computer Society Magazine Editors in ChiefComputerJeff Voas, NISTComputing in Science& EngineeringLorena A. Barba, GeorgeWashington UniversityIEEE Annals of the Historyof ComputingGerardo Con Diaz, Universityof California, DavisIEEE Computer Graphicsand ApplicationsTorsten Möller,Universität Wien2469-7087/21 2021 IEEEIEEE Intelligent SystemsV.S. Subrahmanian,Dartmouth CollegeIEEE Pervasive ComputingMarc Langheinrich, Universitàdella Svizzera italianaIEEE Internet ComputingGeorge Pallis, Universityof CyprusIEEE Security & PrivacySean Peisert, LawrenceBerkeley NationalLaboratory and Universityof California, DavisIEEE MicroLizy Kurian John, Universityof Texas at AustinIEEE MultiMediaShu-Ching Chen, FloridaInternational UniversityPublished by the IEEE Computer SocietyIEEE SoftwareIpek Ozkaya, SoftwareEngineering InstituteIT ProfessionalIrena Bojanova, NISTApril 2021 1

APRIL 2021 VOLUME 7 NUMBER 48Buying YourGenetic SelfOnline: Pitfallsand PotentialReforms inDNA Testing16KnowledgeGraph SemanticEnhancementof Input Data forImproving AI23TowardsExplainabilityin MachineLearning:The FormalMethods Way

Security and Privacy8Buying Your Genetic Self Online: Pitfalls and PotentialReforms in DNA TestingANDELKA M. PHILLIPS14Policies on PrivacySTEVEN M. BELLOVINMachine Learning16Knowledge Graph Semantic Enhancement of Input Datafor Improving AISHREYANSH BHATT, AMIT SHETH, VALERIE SHALIN, AND JINJIN ZHAO23Towards Explainability in Machine Learning:The Formal Methods WayFREDERIK GOSSEN, TIZIANA MARGARIA, AND BERNHARD STEFFENAutonomous Vehicles28Disruptive Innovations and Disruptive Assurance:Assuring Machine Learning and AutonomyROBIN BLOOMFIELD, HEIDY KHLAAF, PHILIPPA RYAN CONMY, ANDGARETH FLETCHER37Validation of Autonomous SystemsCHRISTOF EBERT AND MICHAEL WEYRICHSoftware46Queens of CodeEILEEN BUCKHOLTZ54Mom, Where Are the Girls?IPEK OZKAYADepartments4757Magazine RoundupEditor’s Note: Who’s Doing What with Your Data?Conference CalendarSubscribe to ComputingEdge for free atwww.computer.org/computingedge.

Magazine RoundupThe IEEE Computer Society’s lineup of 12 peer-reviewed technical magazines covers cutting-edge topics ranging from software design and computer graphics to Internet computing and security, from scientific appli-cations and machine intelligence to visualization and microchip design. Here are highlights from recent issues.Dynamic AssuranceCases: A Pathway toTrusted Autonomyfirst-order finite-element methodSottsass Jr. (1917–2007) along with(FEM) approximation are selectedAndries van Onck (1928–2018)for code design, but the tech-at the end of the 1950s. Aimingniques are also applicable to theto launch the ELEA computer onCUDA programming model andthe international market, Olivettiother types of finite-element dis-developed the idea of a visual lan-The authors of this article from thecretizations (including discontin-guage for human–computer inter-December 2020 issue of Computeruous Galerkin and isogeometric).action that could be learned by anypropose a system architectureThe auto-tuning optimization isoperator, regardless of their nativethat facilitates dynamic assuranceperformed for four example graph-language. The task of designingof autonomous systems embed-ics processors and the obtainedthis sign system was assigned toding machine learning-based com-results are 018).introduceTogether with Gui Bonsiepe (b.dynamic assurance cases as a1934), Maldonado designed a visualgeneric framework to provide jus-language that incorporated gram-tified confidence in these systems.Olivetti ELEA Sign System:Interfaces Before the Adventof HCImatical and syntactic reasoning.Later discarded, the sign system forELEA prefigured the contemporaryuse of icons in computer interfaces.Optimal Kernel Design forFinite-Element NumericalIntegration on GPUsThis article from the October–December 2020 issue of IEEEAnnals of the History of Computing uses the case of ELEA 9000,4Move&Find: The Value ofKinaesthetic Experience in aCasual Data RepresentationThis article from the November/the first Olivetti computer series, toDecember 2020 issue of Comput-demonstrate the close relationshiping in Science & Engineering pres-between industrial design, semiot-ents the design and optimizationics, ergonomics, and the history ofThe value of a data representationof the GPU kernels for numericalcomputing. A focus on the Olivettiis traditionally judged based onintegration, as it is applied in theELEA series invites scholars toaspects like effectiveness and effi-standard form in finite-elementreconsider the history of computerciency that are important in util-codes. The optimization processinterface design well before theitarian or work-related contexts.employs auto-tuning, with theemergence of HCI as a widely rec-Most multisensory data represen-main emphasis on the placementognized field of research. The con-tations, however, are employed inof variables in the shared mem-sole and racks of the mainframecasual contexts where creative,ory or registers. OpenCL and thecomputer were designed by Ettoreaffective,April 2021Published by the IEEE Computer Societyphysical,intellectual,2469-7087/21 2021 IEEE

and social engagement might becenter control and decision units.transactions. The evaluation of theof greater value. The authors ofThe computational experimentsarchitecture reference model is pro-this article from the November/are performed on the artificial sys-vided through the design of a block-December 2020 issue of IEEE Com-tem to analyze and evaluate emer-chain-based trusted public serviceputer Graphics and Applicationsgencystrategies.and a use-case scenario example.introduce Move&Find, a multisen-The mechanism of parallel execu-The proposed architecture refer-sory data representation in whichtion between the actual systemence model is based on the CEFpeople pedaled on a bicycle toand artificial system is presentedbuilding blocks EBSI, eSignature,exert the energy required to powerto manage and optimize the emer-and eID compliant with eIDAS.a search query on Google’s serv-gency strategy, which is capableers. To evaluate Move&Find, theyof guiding the actual URTS systemoperationalized a framework suit-through real-time online supervi-able to evaluate the value of datasion and adjustment and of provid-representations in casual con-ing an active optimization of pas-texts and experimentally com-senger emergency management.managementHistory of IBM ZMainframe Processorspared Move&Find to a correspond-IBM Z is both the oldest and amonging visualization. With Move&Find,the most modern of computingparticipants achieved a higherplatforms. Launched as S/360 inunderstanding of the data.Signing BlockchainTransactions UsingQualified Certificates1964, the mainframe became synonymous with large-scale computing for business and remains theworkhorse of enterprise comput-Parallel Urban Rail TransitStations for PassengerEmergency ManagementBlockchain technology is increas-ing for businesses worldwide. Mostingly being considered among bothof the world’s largest banks, insur-private enterprises and public ser-ers, retailers, airlines, and enter-vices. However, it poses a challengeprises from many other industriesIn this article from the November/with regard to aligning its identityhave IBM Z at the center of their ITDecember 2020 issue of IEEE Intel-management scheme with the pub-infrastructure. This article from theligent Systems, a parallel urbanlic key infrastructure and the qual-November/December 2020 issuerail transit station (URTS) systemified digital certificates issued byof IEEE Micro presents an over-for passenger emergency man-qualified trust service providers.view of the evolution of the IBMagement is presented based onTo solve this challenge, the authorsZ microprocessors over the pastthe artificial systems, computa-of this article from the November/six generations. It discusses sometional experiments, and parallelDecember 2020 issue of IEEE Inter-of the underlying workload char-execution (ACP) approach. Thenet Computing present an architec-acteristics and how these haveagent-based modeling technol-ture reference model that enablesinfluenced the microarchitectureogy is applied to build the artifi-enterprises and public servicesenhancements driving the per-cial URTS system, which containsto leverage blockchain technol-formance and capacity improve-the models of people, trains, facil-ogy by integrating qualified elec-ments. The article then describesities, events, environments, andtronic signatures with blockchainhow the focus shifted over timewww.computer.org/computingedge 5

MAGAZINE ROUNDUPfrom speeds and feeds to new fea-applications that are compute-the important lessons emergingtures, functions, and accelerators.intensive, bandwidth-hungry, andfrom studies of programming andlatency-sensitive.the new programming tools theyTheauthorsof this article from the October–motivate.December 2020 issue of IEEE Per-WarpClothingOut: A StepwiseFramework for ClothesTranslation From the HumanBody to Tiled ImagesvasiveComputingshowhowinfrastructure deployed for suchfuturistic applications can alsobenefit virtual machine (VM)encapsulated Windows or LinuxWiththeincreasingThe IT Challenges in DisasterRelief: What We Learned FromHurricane Harveypopular-closed-source legacy applications.ity of online shopping, searchingThey present a new capability forThis article from the November/for products with images for itemlegacy applications called edge-December 2020 issue of IT Profes-retrieval has gradually become anbased virtual desktop infrastruc-sional explores the informationeffective approach. This trend isture (EdgeVDI) and discuss exam-systems involved in disaster reliefespecially evident in the fashionple use cases that it enables.supply chain for Hurricane Har-industry. In common media, cloth-vey survivors. The authors inter-ing items are usually worn on theviewed three organizations—theUnited Way, the BakerRipley, andhuman body. They can be straightforwardly segmented from thesource media by utilizing detectionor parsing algorithms. However,End-to-End VerifiableE-Voting Trial for PollingStation Votingthe American Red Cross—on howinformation systems were used inthis concerted effort of long-termrecovery. They found that datathis may be deleterious to retrievalperformance due to distortion,On 2 May 2019, during the Unitedsharing is the major challenge, andocclusion,back-Kingdom’s local elections, an e-vot-it is further constrained and com-grounds. In this article from theing trial was conducted in Gates-plicated by legal concerns. TheyOctober–December 2020 issue ofhead using a touchscreen, end-to-also observed that organizationsIEEE MultiMedia, a stepwise trans-end verifiable system. This was theused ad hoc technology solutionslation framework using a genera-first test of its kind in the Unitedto accommodate different relieftive adversarial network and thinKingdom, and it presented a caseproject needs; an integrated open-plate spline is developed to transferstudy to envisage the future ofsource system would not onlyhuman body images to tiled cloth-e-voting. Read more in this articlesave cost but also improve overalling images, which can be directlyfrom the November/December 2020productivity.used for clothing retrieval. Exper-issue of IEEE Security & Privacy.anddifferentimental results demonstrate theeffectiveness of the resultant tiledInformation Needs: Lessonsfor Programming ToolsJoin the IEEEComputerSocietyWhycomputer.org/joinimages produced from the framework compared to other methods.Edge Computing forLegacy Applicationsisprogrammingsome-times so frustrating and annoying and other times so fast andpainless? This article from the6Edge computing was motivatedNovember/December 2020 issueby the vision of new edge-nativeof IEEE Software surveys a few ofComputingEdge April 2021

Editor’s NoteWho’s Doing What withYour Data?he Internet and Internet-T“Policies on Privacy,” invites read-Autonomy” presents a frameworkconnected devices enhanceers to consider the ethical impli-for better dependability in auton-our lives in myriad ways, but theycations of various types of dataomous systems such as self-driv-can also expose us to surveillancecollection and use. The authoring cars. The authors of IEEE Soft-and data collection that put ourasserts that societies should cre-ware’s “Validation of Autonomousprivacy at risk. While some govern-ate privacy regulations to reflectSystems” argue that employingments have enacted privacy-pro-their values.intelligent validation and testingtecting regulations—most notablyAnother ethical issue in tech-the European Union’s General Datanology today is explainability inProtection Regulation—policymak-machine learning (ML). IEEE Inter-ers can do more to safeguard pri-net“KnowledgeComputingEdge issue celebratevacy in the digital age. Two articlesGraph Semantic Enhancement ofwomen in software engineeringfrom IEEE Security & Privacy takeInput Data for Improving AI” dis-and encourage gender diversity inon contemporary privacy concernscusses an iterative-optimizationthe field. “Queens of Code,” fromand recommend related policies.approach to knowledge graphsIEEE Annals of the History of Com-Computing’swill help build public trust in autonomous vehicles.The final two articles in thisThe first article, “Buying Yourthat helps improve ML explain-puting, highlights 12 female pro-Genetic Self Online: Pitfalls andability. IT Professional’s “Towardsgrammers who worked for the USPotential Reforms in DNA Testing,”Explainability in Machine Learning:National Security Agency in thediscusses privacy issues related toThe Formal Methods Way” argues1950s through the 1980s. In “Mom,direct-to-consumer genetic test-for using formal methods in ML toWhere Are the Girls?,” from IEEEing, a popular service provided bydiscover precise reasons behindSoftware, the author describescompanies such as Ancestry andalgorithmic decisions and actions.how she came to recognize the23andMe. The article proposesML-based systems are impor-gender diversity problem in soft-regulations and standardizationtant parts of autonomous vehi-ware engineering and encouragesthat could help mitigate the riskscles. Computer’s “Disruptive Inno-individuals and organizations inof companies obtaining geneticvations and Disruptive Assurance:the software community to advo-information. The second article,Assuring Machine Learning andcate for diversity.2469-7087/21 2021 IEEEPublished by the IEEE Computer SocietyApril 20217

EDITORS: Khaled El Emam, kelemam@cheo.on.caKatrine Evans, k.evans@haymanlawyers.co.nzThis article originallyappeared inDEPARTMENT: PRIVACY INTERESTSvol. 17, no. 3, 2019Buying Your Genetic Self Online:Pitfalls and Potential Reforms in DNA TestingAndelka M. Phillips, University of WaikatoToday’s world is one of constant monitoring andtracking—sometimes driven by us, sometimesdriven by others. Developments in the field ofhealth and identity are no exception. New technologies, such as wearable devices, and other technologiesin consumer-centered health care allow us to trackour fitness and health data, and they connect us withothers.Similarly, the rise in direct-to-consumer (DTC)genetic testing services, sometimes known as personal genomics or commercial genomics, can beviewed both as an example of emerging technologyand also as disruptive innovation. These services havecreated a commercial market for genetic tests, allowing people to buy their own DNA tests online without amedical intermediary.However, as with wearable health devices, DTCpotentially affords opportunities for other entitiesto access and compile those data and subject us toprofiling. Consumers, therefore, need to understandwhat’s involved when we buy our so-called genetic selfonline.This article provides a brief introduction to theworld of DTC and its potential traps for the unwary.It discusses some short- and longer-term regulatorymeasures that may help to iron out the most seriousrisks to consumer privacy. In particular, it concludesthat the industry needs more oversight and consumers need more control of their genetic data and personal data in the DTC context.THE GROWTH OF DTCGENETIC TESTINGThe market for DTC has experienced significantgrowth in the last couple of years with some prominent DTC companies having databases with severalmillion consumers’ samples.8April 2021Ancestry testing is particularly popular, but theindustry varies widely with a broad spectrum of available services. The best-known ancestry and healthtests are provided by prominent companies, such as23andMe, AncestryDNA, Orig3n, MyHeritage, andFamilyTreeDNA. However, there are also companiesoffering lesser-known tests that are often more dubious, including assessing child talent, peace-of-mindpaternity, and infidelity (often dubbed surreptitioustesting). Several of these tests raise privacy and ethical concerns.The proliferation and variety of services offeredare increasingly attracting attention from researchers. My own research (due to be published as a booklater this year) included a review of the online contracts of 71 DTC companies providing tests for healthpurposes. It found that a number of terms commonlyincluded in these contracts were problematic from aconsumer protection standpoint. Some companies,such as Soccer Genomics, have also raised concernfrom research scientists, with Stephen Montgomeryat Stanford University launching a parody Yes or NoGenomics website in response. Another parody website, DNA Friend, is a useful resource to highlight thesensitive nature of these services. However, theseparodies do, to some extent, assume a level of knowledge about genetics, and we really need more effortsto assist the public in understanding the risks here.While there is increasing public awareness ofancestry and health tests, what is less well understoodis that these tests are generally not standardized andthat any entity collecting genetic data could potentially use that data for secondary research or share itDigital Object Identifier 10.1109/MSEC.2019.2904128Date of publication: 14 May 2019Published by the IEEE Computer Society 2469-7087/21 2021 IEEE

with third parties, such as law enforcement. This article explores the problems that can arise as a result. Italso discusses the existing and potential mechanismsthat might help to resolve those problems.A LACK OF STANDARDIZATIONIn relation to DTC tests for health purposes, many testsfor common complex diseases are not harmonized,and the validity of their findings is open to dispute.In particular, DTC companies often do not providewhole genome scans and instead focus on portionsof an individual’s genome. Also, they can focus ondifferent genetic variants and also frame their populations differently. As a result, it is possible to getcontradictory disease-risk estimates from differentcompanies.The more common ancestry tests have also notbeen standardized, and it is similarly possible toobtain contradictory ethnicity estimates from different companies. There have even been instancesof DTC companies providing DNA test reports oncanine samples without distinguishing them fromhuman samples. For example, in their article “Heredity or Hoax?” Barrera and Fox 1 discussed an examplewhere a man had sent a dog DNA sample to a company (under a human name) and received an estimateof 20% First Nations ancestry.This means that consumers need to be cautiousabout these services. At the very least, the publicneeds to be provided with more information about thelimitations of testing because the utility of the servicebeing sold may be less than expected.SECONDARY USE OFGENETIC DATAThe potential for genetic data to be used in ongoing research is high. A number of the most prominent DTC companies have begun to partner with thepharmaceutical industry, and we have also begun tosee investment by the insurance industry from thesewww.computer.org/computingedge companies. One challenge here is that it is not possible to truly anonymize genetic data. (See, for example, the works by Erlich and Narayanan2 and Gymreket al. 3). If something goes wrong, we cannot changeour stored genetic data in the same way that wecould change our bank password. So, it is particularlyimportant that where DTC companies engage in suchresearch, they implement strong security practicesand infrastructure.IN RELATION TO DTC TESTS FORHEALTH PURPOSES, MANY TESTS FORCOMMON COMPLEX DISEASES ARENOT HARMONIZED, AND THE VALIDITYOF THEIR FINDINGS IS OPEN TODISPUTE.It is important for consumers to understand thepotential for secondary use here. The source of profitfor DTC companies will often be partnerships andmergers with other entities, and there is a significantlevel of uncertainty here in relation to the varietyof ways in which genetic data could be used in thefuture.Use for law enforcement is also attractingincreasing attention. In the last year, there was muchmedia coverage of the genetic genealogy databaseGEDmatch’s involvement in the investigation of theGolden State Killer case, where law enforcementaccessed its database to find a potential suspect,through the process of familial DNA matching.4Since this revelation, it has emerged that morethan 100 other DNA profiles from cold cases havebeen uploaded to GEDmatch. 5 In early 2019, it alsoemerged that the DTC company FamilyTreeDNA hasbeen working with the U.S. Federal Bureau of Investigation to investigate violent crime (see, for instance,the work by Haag6).9

PRIVACY INTERESTSGENETIC DATA ARE SENSITIVEIN NATUREGenetic data are generally viewed as sensitive andcan do real harm in the wrong hands. It is also muchmore than a method of identification in criminal proceedings. Genetic data have certain characteristics,which means that it can pose long-term privacy risksfor individuals and their relatives.Once you have a genetic test, your genetic codeis digitized and that digital data can be stored potentially indefinitely and used for purposes beyond theprimary purpose for which you gave it. It can alsoserve as a unique identifier for you, and since youshare much of your DNA with your genetic relatives, itcan also be used to trace those relatives. The impactof a data leak may be substantial, and it does notdecrease over time.The industry also operates internationally. Typically, consumers can purchase a test through a website, and then they will receive a sample collection kitUNDER BOTH THE GDPR ANDEU CONSUMER PROTECTIONLEGISLATION, THERE AREREQUIREMENTS FOR THESEDOCUMENTS TO BE IN PLAIN ANDINTELLIGIBLE LANGUAGE.in the mail. This is normally used for the collection of asaliva sample or a cheek swab, which is then sent backto the company for processing. Although servicesvary, companies will generally provide results througha web interface.From a regulatory perspective, the internationalnature of the industry creates complexity. The physical sample may be sent overseas and processed andstored by a company in a different country from wherethe consumer resides. The sequenced genetic datagenerated from this physical sample may or maynot be stored in that same country. Also, DTC companies may collect other forms of personal datafrom their consumers through surveys and otherresearch activities. Where this is stored may alsovary, and again, it may be different from where theconsumer resides.10ComputingEdge These features, among others, affect how we needto think about regulation of businesses that handlegenetic data.THE IMPACT OF THEGENERAL DATA PROTECTIONREGULATION ON DTCEurope’s data protection law, the General Data Protection Regulation (GDPR), is supposed to put users back incontrol of their data. It has direct relevance to the DTCindustry: any company that sells or provides servicesdirectly to consumers based in the European Union(EU) needs to ensure that it complies with the GDPR.Genetic data are included in the prohibition onprocessing of special categories of data in article 9 ofthe GDPR. Consequently, to comply with the GDPR,companies should be obtaining explicit and informedconsent from their consumers for a DNA test. A moretraditional notice-and-choice model is insufficient. Inmy research to date on the regulation of DTC, it seemslikely that many businesses will need to alter their consent mechanisms to meet this higher standard.Part of the problem is that e-commerce-based services have relied on their online information (includingcontracts and privacy policies) to govern relationshipswith consumers. However, providing clear online information about complex subjects can be a challenge.Also, we have all grown accustomed to ignoring termsand conditions and privacy policies on websites. This isdue to a number of factors. One of the most significantproblems is that people often lack the time to readthese documents, and even where they do take thetime, they may struggle to understand the contents.Many businesses have created longer contracts andprivacy policies that are heavily skewed in favor of theirinterests, rather than those of their consumers. Therehas also been a lack of oversight of these documents.Consumers are deterred from reading them and maybelieve that they are not capable of challenging orchanging the use of their information in any case.However, under the GDPR, a high standard of consent is required for data processing, and it is not goingto be acceptable to bury consent in a lengthy contractor to only make company policies accessible after aconsumer has registered for a service. Under boththe GDPR and EU consumer protection legislation,there are requirements for these documents to be inApril 2021

PRIVACY INTERESTSplain and intelligible language. Because contracts andprivacy policies are often linked together, problematicterms in contracts, which could be challenged onconsumer protection grounds, may also be found tobe problematic from a data protection perspective aswell. EU consumer protection legislation also restrictsthe inclusion of terms that may be deemed to be unfairand limits their enforceability.As the GDPR beds in, consumers are also

Need Your Skills Explore new options—upload your resume today IEEE COMPUTER SOCIETY JOBS BOARD Changes in the marketplace shift demands for vital skills and talent. The IEEE Computer Society Jobs Board is a valuable resource tool to keep job seekers up to date

Related Documents:

Page 2 Autonomous Systems Working Group Charter n Autonomous systems are here today.How do we envision autonomous systems of the future? n Our purpose is to explore the 'what ifs' of future autonomous systems'. - 10 years from now what are the emerging applications / autonomous platform of interest? - What are common needs/requirements across different autonomous

Automobile Insurance in the Era of Autonomous Vehicles Presentation Overview Autonomous Vehicles Ecosystem Update Notable happenings over the last year KPMG Autonomous Vehicles and Insurance Survey Results Feedback from carrier executives Implications for Insurers Potential impact on losses, pr emium and profitability Future State

Florida Statutes - Autonomous Vehicles (2016) HB 7027, signed April 4. th. 2016 - updates: F.S. 316.85 -Autonomous Vehicles; Operation (1) "A person who possesses a valid driver license may operate an autonomous vehicle in autonomous mode on roads in this state if the vehicle is equipped with autonomous technology, as defined in s. 316. .

Fraunhofer CML Autonomous Vehicles’ Impact on Port Infrastructure Requirements Hamburg Port Authority AöR 10 78 Management Summary 1 Management Summary Autonomous solutions are developed for road, rail and waterborne transport. Autonomous driving describes the independent locomotion of vehicles and is a

Lessons from the City of Boston. June 2018. In collaboration with The Boston Consulting Group . Contents . Foreword 3 Executive summary 4 Chapter 1: Understanding consumer adoption of autonomous vehicles 6 Chapter 2: Quantifying the impact of autonomous vehicles 14 Chapter 3: Scaling up an autonomous vehicle pilot in Boston 22 .

Jul 10, 2014 · Vehicles 2040 Vision, with researchers at Carnegie Mellon University (CMU) to assess the implications of connected and autonomous vehicles on the management and operation of the state’s surface transportation system. This report explores the impacts of connected and autonomous vehicles

with security issues. Engoulou et al. [3] present the most recent survey of various security issues in VANETs including security requirements, attacks, and privacy protection. Faults in software components can potentially lead to devastating effects for autonomous vehicles and other vehicles sharing the roadway.

Model Year 2015 Fuel Economy Leaders / 5 2015 Model Year Vehicles / 6 Diesel Vehicles / 29 Electric Vehicles / 31 Plug-in Hybrid Electric Vehicles / 33 Compressed Natural Gas Vehicles / 35 Fuel Cell Vehicles / 35 Hybrid Electric Vehicles / 36 Ethanol Flexible Fuel Vehicles / 38