Privacy policy/IT guidelines: Difference between revisions

From Wikimedia UK
Jump to navigation Jump to search
 
(16 intermediate revisions by 5 users not shown)
Line 1: Line 1:
{{draft}}
'''People interacting with Wikimedia UK (members, board members, donors, staff and partners in general) deserve absolute privacy in their exchange with Wikimedia UK'''. As long as the contrary is not clearly announced, the data are private and should not be communicated to a third party. This principle, which is mandatory to achieve trustful relationships, is supported by a few legal texts<ref>[[:en:Secrecy of correspondence]]</ref> and [[Privacy policy|policies]]. Wikimedia UK wants to be exemplary and does its best to have high privacy protection standards.


'''People interacting with Wikimedia UK (members, board members, donators, staff and partners in general) deserve an absolute privacy in their exchange with Wikimedia UK'''. As long as the contrary is not clearly announced, the data are private and should not be communicated to a third party. This principle which is mandatory to achieve trustfully relationships is supported by a few legal texts<ref>[[:en:Secrecy of correspondence]]</ref> and [[Privacy policy|policies]]. Wikimedia UK wants to be exemplary and does its best to have high privacy standards.
As most of our communications and data are digitized, the IT is in the middle of the privacy challenges. Our data have a high value. Recent history has shown us private companies and states trying to gather as much information as possible in a pro-active and systematic manner. Although it would be presumptuous to pretend fighting efficiently against intelligence services targeted actions, there are a lot of things which can be done to guaranty a high level of protection. Therefore, our information solutions need to be thoughtfully architectured to support our privacy standards.


As most of our communications and data are digitized, the IT are in the middle of the privacy challenges. Our data have a high value. The recent history has shown us private companies and states trying to gather as much information as possible in a pro-active and systematic manner. Although it would be presumptuous to pretend fighting efficiently again intelligence services targeted actions, there is a lot of things which can be done to guaranty high level of protection. Our information solutions need therefore to be thoughtfully architectured to support our privacy standards.
We are aware that data protection has a cost in term of resources and that our resources are limited. Moreover, we are conscious of the fact that all the data do not have the same value and that differentiated approaches may be needed. We are also aware that we face a fundamental dilemma between security and usability. Nevertheless, Wikimedia UK is  involved in a continuous improvement process to belong to a modern and as secure as possible IT infrastructure.
 
We are aware that data protection has a cost in term of resources and that our resources are limited. We are aware that all the data doesn't have the same value and that differentiated approached may be needed. We are also aware that we have a fundamental dilemma between security and usability. Nevertheless, Wikimedia UK is  engaged in a continuous improvement process to belong a modern and as secure as possible IT infrastructure.


== Dangers ==
== Dangers ==
; Curiosity of simple users
; Curiosity of simple users
: Data which are private are for a reason on an other available publicly. A lot of common sense a few low tech solution are enough to fight him.
:Private data are available to a broader audience. A lot of common sense and a few low tech solutions are enough to fight it.


; Malicious computer attacks
; Malicious computer attacks
: Attacks of computer experts. This is certainly the most complicated to fight, this needs pretty much work and skills.
: Attacks of computer experts. This is certainly the most complicated incident to fight, usually requiring the response of security experts.


; Network surveillance
; Network surveillance
: Monitoring and surveillance of the networks. Well encrypting our exchanges is the first and most common measure to fight this. Using free software is an other one.
: Monitoring and surveillance of the networks. Using strong encryption for our exchanges is the first and most common measure to fight this. Using open-source software is another one.


; Activity surveillance
; Activity surveillance
: The most common source of data leak. This is mostly operated by (Web) services operating "free" services. To fight this we should as much as possible try to replace them (or provide an alternative) by our own services, pay services offering high privacy protection. In the worth case, we should well inform our users.
: The most common source of data leak. This is mostly operated by services, including websites, that do not charge. To fight this, we should try to replace them (or provide an alternative) as much as possible by our own services or pay services offering high privacy protection. In the worst case, we should well inform our users.


; Stored data leaks
; Stored data leaks
: Storage providers copy/analyze the data for their own usage or sell/communicate them to third parties. This is a big problem with US based services, especially the free one. To fight this, prefer use in this order our infrastructure/UK based servers. Encrypting the data is also a good approach.
: Storage providers copy/analyse the data for their own usage or sell/communicate them to third parties. This is a big problem with US based services, especially the free one. To fight this, preferably use (in this order) our infrastructure/UK based/paid servers. Encrypting the data is also a good approach.


== Solution guidelines ==
== Solutions ==
We are facing many dangers and data might leak in a lot of different manners. The goal is not there to provide a solution able to fix all the potential issues, but to have some tools/guidelines to improve the overall infrastructure and assure at middle term a good level of privacy protection. Here are the recommendation:
We are facing many dangers and data might leak in a lot of different manners. The goal is not to provide a solution able to fix all the potential issues, but to have some tools/guidelines to improve the overall infrastructure and assure at middle term a good level of privacy protection. Here are the recommendations:
* Push communication encryption
* Push communication encryption
* Brake "free" services usage
* Reduce use of "free" services
* Brake US based services usage
* Reduce use of US based services
* Push free software
* Push free software
* Push storage encryption
* Push storage encryption


== Improvement process ==
== Continous improvement process ==


This process will be driven within the [[Technology Committee]] and based on dialogue between users and solution providers.
The process of improving the overall privacy protection by adapting/rethinking our IT solutions is a long term and ongoing process. This process will be driven within the [[Technology Committee]] and based on dialogue between users and solution providers. The tech community coordinator is responsible for driving this effort. Service providers are responsible to make improvement propositions, provide the tech community and users with all the  information necessary to make a decision.


== Notes and references ==
== Notes and references ==
<references/>
<references/>
[[Category:IT Development]]

Latest revision as of 11:11, 9 March 2014

People interacting with Wikimedia UK (members, board members, donors, staff and partners in general) deserve absolute privacy in their exchange with Wikimedia UK. As long as the contrary is not clearly announced, the data are private and should not be communicated to a third party. This principle, which is mandatory to achieve trustful relationships, is supported by a few legal texts[1] and policies. Wikimedia UK wants to be exemplary and does its best to have high privacy protection standards.

As most of our communications and data are digitized, the IT is in the middle of the privacy challenges. Our data have a high value. Recent history has shown us private companies and states trying to gather as much information as possible in a pro-active and systematic manner. Although it would be presumptuous to pretend fighting efficiently against intelligence services targeted actions, there are a lot of things which can be done to guaranty a high level of protection. Therefore, our information solutions need to be thoughtfully architectured to support our privacy standards.

We are aware that data protection has a cost in term of resources and that our resources are limited. Moreover, we are conscious of the fact that all the data do not have the same value and that differentiated approaches may be needed. We are also aware that we face a fundamental dilemma between security and usability. Nevertheless, Wikimedia UK is involved in a continuous improvement process to belong to a modern and as secure as possible IT infrastructure.

Dangers

Curiosity of simple users
Private data are available to a broader audience. A lot of common sense and a few low tech solutions are enough to fight it.
Malicious computer attacks
Attacks of computer experts. This is certainly the most complicated incident to fight, usually requiring the response of security experts.
Network surveillance
Monitoring and surveillance of the networks. Using strong encryption for our exchanges is the first and most common measure to fight this. Using open-source software is another one.
Activity surveillance
The most common source of data leak. This is mostly operated by services, including websites, that do not charge. To fight this, we should try to replace them (or provide an alternative) as much as possible by our own services or pay services offering high privacy protection. In the worst case, we should well inform our users.
Stored data leaks
Storage providers copy/analyse the data for their own usage or sell/communicate them to third parties. This is a big problem with US based services, especially the free one. To fight this, preferably use (in this order) our infrastructure/UK based/paid servers. Encrypting the data is also a good approach.

Solutions

We are facing many dangers and data might leak in a lot of different manners. The goal is not to provide a solution able to fix all the potential issues, but to have some tools/guidelines to improve the overall infrastructure and assure at middle term a good level of privacy protection. Here are the recommendations:

  • Push communication encryption
  • Reduce use of "free" services
  • Reduce use of US based services
  • Push free software
  • Push storage encryption

Continous improvement process

The process of improving the overall privacy protection by adapting/rethinking our IT solutions is a long term and ongoing process. This process will be driven within the Technology Committee and based on dialogue between users and solution providers. The tech community coordinator is responsible for driving this effort. Service providers are responsible to make improvement propositions, provide the tech community and users with all the information necessary to make a decision.

Notes and references