Data Responsibility on the Front Lines

Video thumbnail (Frame 0) Video thumbnail (Frame 3469) Video thumbnail (Frame 8281) Video thumbnail (Frame 10109) Video thumbnail (Frame 11531) Video thumbnail (Frame 13360) Video thumbnail (Frame 15719) Video thumbnail (Frame 18014) Video thumbnail (Frame 22169) Video thumbnail (Frame 24730) Video thumbnail (Frame 26205) Video thumbnail (Frame 29156) Video thumbnail (Frame 30504) Video thumbnail (Frame 44806) Video thumbnail (Frame 46333) Video thumbnail (Frame 48604) Video thumbnail (Frame 50025) Video thumbnail (Frame 52143) Video thumbnail (Frame 53469) Video thumbnail (Frame 54857) Video thumbnail (Frame 56058) Video thumbnail (Frame 61068) Video thumbnail (Frame 62599) Video thumbnail (Frame 65634) Video thumbnail (Frame 67133) Video thumbnail (Frame 69226) Video thumbnail (Frame 71774) Video thumbnail (Frame 73362) Video thumbnail (Frame 75316) Video thumbnail (Frame 76619) Video thumbnail (Frame 83314) Video thumbnail (Frame 84552) Video thumbnail (Frame 86525) Video thumbnail (Frame 88523) Video thumbnail (Frame 91489)
Video in TIB AV-Portal: Data Responsibility on the Front Lines

Formal Metadata

Data Responsibility on the Front Lines
Protection and Security in Humanitarian Response
Title of Series
CC Attribution - ShareAlike 3.0 Germany:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor and the work or content is shared also in adapted form only under the conditions of this license.
Release Date

Content Metadata

Subject Area
The use of data and information communication technologies (ICTs) by civil society organizations, governments, and private sector entities is now a mainstream, day-to-day part of how humanitarian and development projects happen. However, there are few real world examples of how to responsibly use these tools in ethical and effective ways that protect and respect human rights of some of the world’s most vulnerable people. What are greatest threats, harms and risks associated with using ICTs in humanitarian environments, and how might humanitarian actors mitigate these? Consequently, it is also often unclear how ICTs stand to benefit humanitarian action. The panelists will share their recent experiences trying to create best practices and design new technology for using data in extremely complex environments such as Jordan, the Palestinian Territories, and Lebanon.
Trail Goodness of fit Digital signal processing Electric generator Dependent and independent variables Line (geometry) Software developer View (database) Online help Information security Vector potential
Point (geometry) Cybersex Domain name Intranet Dependent and independent variables Information State of matter Software developer Video game Self-organization Information privacy Address space
Sensitivity analysis Projective plane Expert system Set (mathematics) Perspective (visual) Relief
Slide rule Word Group action Presentation of a group Different (Kate Ryan album) Digital media
Revision control Building Presentation of a group Arm Root Integrated development environment Multiplication sign Core dump Order (biology) Video game Self-organization Number
Point (geometry) Multiplication sign Information privacy Distance Rule of inference Wave packet Number Revision control Data management Operator (mathematics) Process (computing) Office suite Physical system Task (computing) Predictability Noise (electronics) Standard deviation Information Interactive television Code Bit Digital signal Group action Device driver Control flow Measurement Process (computing) Integrated development environment Self-organization Video game Office suite Text editor Procedural programming
Addition Algorithm Information Regulator gene Multiplication sign Heat transfer Digital signal Group action Information privacy Computer programming Information privacy Data mining Integrated development environment
Ocean current Suite (music) Addition Standard deviation Multiplication sign Decision theory Mobile Web Electronic mailing list Mathematical analysis Heat transfer Lattice (order) Group action Information privacy Arithmetic mean Internetworking Analogy Interpreter (computing) Authorization Self-organization Traffic reporting Local ring Relief
Area Collaborationism Arm Divisor Observational study Digitizing Prisoner's dilemma Multiplication sign Uniqueness quantification Archaeological field survey Theory Revision control Universe (mathematics) Series (mathematics) Information security Social class
Building Divisor State of matter Channel capacity Execution unit Field (computer science) Revision control Frequency Cross-correlation Authorization Series (mathematics) Form (programming) Addition Collaborationism Dialect Graph (mathematics) Mapping Information Channel capacity Prisoner's dilemma Physicalism Staff (military) Integrated development environment Personal digital assistant Resultant
Divisor INTEGRAL Planning Cartesian coordinate system Field (computer science) Data management Data management Process (computing) Telecommunication Telecommunication Self-organization Process (computing) Information security Information security Computing platform
Information management State of matter Decision theory Multiplication sign Set (mathematics) Shape (magazine) Client (computing) Image registration Information privacy Computer programming Mechanism design Different (Kate Ryan album) Analogy Series (mathematics) Extension (kinesiology) Physical system Area Touchscreen Channel capacity Digitizing Reflection (mathematics) Moment (mathematics) Parallel port Staff (military) Bit Instance (computer science) Complete metric space Type theory Data management Process (computing) Internet service provider Order (biology) Quicksort Procedural programming Whiteboard Asynchronous Transfer Mode Relief Service (economics) Computer file Civil engineering Information systems Branch (computer science) Menu (computing) Element (mathematics) 2 (number) Revision control Term (mathematics) Operator (mathematics) Business model Medizinische Informatik Data structure Computer architecture Addition Standard deviation Information Projective plane Database Line (geometry) System call Information Technology Infrastructure Library Word Personal digital assistant File archiver Family
Slide rule Digital photography Spring (hydrology) Multiplication sign Digital media Order (biology) Square number Video game
Validity (statistics) Digital media Moment (mathematics) Physical law Independence (probability theory) Total S.A. 3 (number) Rule of inference Moore's law Type theory Vector space Personal digital assistant Normal (geometry) Backdoor (computing) Physical system
Point (geometry) Facebook Divisor Personal digital assistant Direction (geometry) Telecommunication Matrix (mathematics) Raw image format Traffic reporting
Group action Identifiability Digital media Divisor Information Code Civil engineering Moment (mathematics) Open set Optical disc drive Digital photography Normal (geometry) Software framework Pattern language Spacetime
Point (geometry) Focus (optics) Software Code Decision theory Right angle Line (geometry) Surface of revolution Computer programming
Information Information and communications technology Multiplication sign Digital media Information privacy Symbol table Transmitter Word Word Rectifier Causality Telecommunication Self-organization Nichtlineares Gleichungssystem Right angle Transmissionskoeffizient Summierbarkeit Nichtlineares Gleichungssystem Procedural programming Physical system Physical system Self-organization
Area Complex (psychology) Context awareness Weight Chemical equation Self-organization Bit Series (mathematics) Navigation Physical system
Point (geometry) Complex (psychology) Context awareness Functional (mathematics) Decision theory Multiplication sign Execution unit Information privacy Information technology consulting Field (computer science) Element (mathematics) Operator (mathematics) Touch typing Software framework Data structure Information Prisoner's dilemma Reflection (mathematics) 3 (number) Staff (military) Bit Information Technology Infrastructure Library Arithmetic mean Data management Process (computing) Integrated development environment Personal digital assistant Internet service provider Self-organization Whiteboard Table (information) Resultant
Area Complex (psychology) Context awareness Service (economics) Electric generator Digital media Key (cryptography) Observational study Bit Database transaction Line (geometry) Heat transfer Information privacy Metadata Revision control Process (computing) Internet service provider Operator (mathematics) Order (biology) Procedural programming Series (mathematics)
Dependent and independent variables Mobile app Context awareness Electric generator Key (cryptography) Digital media Channel capacity Bit Information privacy Rule of inference Computer programming Metadata Message passing Mechanism design Personal digital assistant Term (mathematics) Self-organization Extension (kinesiology)
Server (computing) Constraint (mathematics) Moment (mathematics) Combinational logic Information privacy Flow separation Metadata Data management Process (computing) Software Internetworking Different (Kate Ryan album) Telecommunication Order (biology) Encryption Information security Proxy server
Point (geometry) Dependent and independent variables Mapping Directory service Measurement Wave packet Latent heat Commitment scheme Term (mathematics) Operator (mathematics) Self-organization Right angle Information security
Type theory Sign (mathematics) Information Personal digital assistant Code Core dump Self-organization Incidence algebra Information privacy Traffic reporting Biostatistics
Group action Software Amenable group Identity management
Pairwise comparison Term (mathematics) Self-organization Computing platform Fundamental theorem of algebra
Point (geometry) Suite (music) Service (economics) Multiplication sign Source code Public domain Heat transfer Computer programming Element (mathematics) Frequency Term (mathematics) Operator (mathematics) Physical system Constraint (mathematics) Information Sound effect Staff (military) Measurement Cache (computing) Proof theory Type theory Personal digital assistant Network topology File archiver Right angle Family Row (database)
Point (geometry) Type theory Latent heat Theory of relativity Authorization Information privacy Perspective (visual) Computer programming Physical system
Covering space Revision control Area Category of being Type theory Theory of relativity Information Personal digital assistant Authorization Endliche Modelltheorie Pressure Condition number
Server (computing) Data management Context awareness Vector space Personal digital assistant Self-organization Physical system Exception handling Spacetime
Curve Dependent and independent variables Code Moment (mathematics) Shared memory Independence (probability theory) Basis <Mathematik> Revision control Type theory Arithmetic mean Personal digital assistant Thermal conductivity Fundamental theorem of algebra Computing platform Spacetime
Trail Mereology Pretzel Number
better if we the
best I thank you very much for
coming despite the 1 better outside in the cold drinks be here with us for
gist of a panel discussion within the track tech for good my name is Dana Branham with the German Federal Ministry for development cooperation and so on before we start this panel let me just give you an idea of what we are doing why we are here the just like in the previous years the German Development Ministry supported 1 and supports republic was several sessions this year something special we're really proud that we can be 1 of the main partners of Republican and they have this track take for goods as 1 of the main tracks here at ProPublica so things to all those of people had Republic of for making this happen this gives us a nice opportunity we want to bring in the views the ideas from the developing world to the panels here to the debate to the discussion and we want to also have in way of debates for us for development development community to ask ourselves question how can be used the potential off the digital world of the digital transformation father for example can he held help us in humanitarian situations can you learning help us to not lose whole generations of the have refugees can we use blockchain for transparency in developing countries so we have a common interest with Republican and of fully with you to but seize the opportunity of the digital transformation and that's combined in our trekked to for good but on the other hand we really have to increasingly discussed and
address also the downsides the risks the bike sides off the digital world and that brings me to this panel here is there not a dark side that a good points but we have to ask us several questions and we can draw lessons from
things that happened recently for example data scandals an idle name a very special social network or cyber attacks by domain a very special the German government Intranet which was attacked summer terrorists so the main lesson we draw from this is is data is a target definitely and the 2nd lesson is data can be us personal data is us so personal data can reveal I hope was noted our interests Our likes our needs our dreams Our whole personal data Our whole personality so why we are concerned about our private data the international community the development community the humanitarian community also has a responsibility for the date of others for the data are often the most vulnerable people on the US people refugees people in war situations the people in problematic situations with come from climate change and this gives us a Catch-22 situation on the 1 hand data from these people have to be conquered have to be collected by our partners from the humanitarian sides red cross 1 run etc. to be able to deliver ates to these people and the recipients of aid I don't have any other chance to give away their personal data to these organizations so what should we do the problem is if we lose our data of personal private data it can be a problem of losing information about if every movies using of information about your tax returns but for D.'s people if we expose their personal data we put their life at risk sometimes is enough if you reveal and name of a refugee that he or she can be connected to a tried to a region to add this city and we put the lights and risk if we remove revealed their personal data to 3rd parties who have other interests than us so the question to these panelists what's the state
of play what can we do to secure and protect these highly sensitive sets of data of millions and millions of people and we as an industry really proud to support not only this panel but also a project behind it and we're really happy to have 1 of the most knowledgeable experts here with us on the 1 hand Our diary project partners Nathaniel and Stewart from the signal team off the Harvard Humanitarian Initiative and
Dorothy you will see later on this green from 1 the United Nations work some relief agency in the Middle East and also Stevens LeBlond from the Ecole Polytechnique for that handles and must automatically from our friends from guys here see the International Committee of direct cross to give us their perspective on this really important issues so I'm looking forward as well do this panel thank you
all for coming here and let's hope we cannot only use tech 4
groups but also use tech and policies to prevent it from happening about things thanks a lot and I give 2 words to you think you all right thank you all for
coming we realize that there are more compelling
places to be and perhaps more comfortable ways to be spending the evening but very briefly it is
widely howard around the session were have quick 5 minute ignites from each of the speakers that will include door will be more and as soon as the slides are gone and then we'll move into a discussion in the discussion is as much about us on stage as it is about you in the audience so thank you for for being here and please keep questions that come up during the different presentations in mind take note and be ready to engage we're gonna see if I can manage to switch the slides
and then we'll get started with Massimo must by German is limited I think build Schumer much presentation in the environment where we wanna be you got 5 minutes must thank you the 1st question is anybody here familiar with International Committee of the Red cross quick raise hands why everybody already familiar with the International Committee of the across that's a very pleasant surprise so would not have to spend too much time explaining what it is that we do but just as a quick reminder because it's really important stays at the at the roots of why we care so much about this kind of issues the International Committee of the Red Cross is a neutral impartial independent exclusively humanitarian organization that is the mission to protect the life and the dignity of people that are affected by comScore armed conflict in other situations of violence and to provide assistance so that of a mouthful but really the core is the protection of the life and the dignity of the most vulnerable of of honorable people as I mentioned earlier this means that we're actually taken to work in places like this to
work in places like this as you can see there's no what'd Europe number received but there is no best good there's no armored vehicles Prodi the colleagues in the car there are being watched by snipers on the on the roof of the building and their access to the most vulnerable people is based on the fact that the people accept the International Committee of the Red Cross as a neutral organization and trust it so it is in order to ensure that we can have
a have a have access to those places that the International Committee of the Red Cross is acknowledged to have international legal personality and privileges and immunities to ensure as as a basic 1st measure of protection of the the people that were there to protect and assist so that no party to the conflict can interfere with the with the the the distance these people there's a bit of a background noise and the train it to train OK good and so this is the point that my friend Steve as we'll be touching on later which is very important also when we look at new technologies because there are some implications and look at technology and when we look at situations where we need to engage third-party processes but will look into this in a minute so as an interaction organization we have our own system of rules and compliance with personal data protection would not spend much time because time is running fast but just to to mention the rules on personal data protection the creation of a Data Protection Officer and Editor prediction commission that as the the the task of providing an effective remedy to people that might have complaints about the way in which their personal it is being handled why do we
do this I mentioned earlier because our mandate is to protect the life and the dignity of people protecting the life and the dignity of people in very sensitive environment means protecting their information would been doing this for a long time and a number of rules and measures of data protection are integrated for a long time in our ways of standard operating procedures guidelines and policies it's about doing no harm and this becomes increasingly
important when we look at new technology and was he why perhaps also I would have a little more time in the discussion to be beneficiary centric and and so on so this has been integrated for a long time and the way in which you do things why is it that is so important today and why is it that everybody's talking about data protection in the humanitarian sector but also outside well it's because technology has been developing ever since the beginning of humanity but what is very peculiar about the last few years is the fact that technology enables us to generate enormous quantity of the quantity of information to collect it to store it is becoming cheaper to store at what we had you speak here what we have on a USB gives that today's 40 what we could have in a in a hard arrive at a couple years ago and and and not only that but we can make sense of that information while you probably couldn't even make sense of so much information with millions of people going through documents and now we can with an algorithm so this has
brought many technologies and 2 to be of relevance for the Humanitarian sector to enable the humanitarian sector to be more efficient and effective in the work that it does at the same time it brings a lot of risks a lot of additional risks that the regulators outside are trying to regulate in the in in the non-humanitarian world but that we need to progress as well and the privacy
internationally 2013 published a report that was really a very critical of the humanitarian sector and highlighted how actually by adopting certain new technologies without understanding the implications of it and to many characters we're actually enabling additional surveillance and potentially causing harm to people in the International Conference of prize in data protection commissioners also looked at the challenges that are faced by the humanitarian sector and the importance of additional guidance when it comes to adopting new technologies and so together with private international with the data protection authorities in a number of other humanitarian we are engaged in at work in series to look at certain new technologies in the humanitarian sector to look at how they could be adopted in a way that does not cause a harm to people and that is respectful of data protection step the data that is if you have to pretend that I'm going to have to look at how this is going to have do good and that is concludes includes a decision sir International Committee of the Red Cross and into the personal privacy of that particular meeting at a particular to produce and the issues of peace and humanitarian localization of the current interpretation in monitoring in the last 2 weeks away as this this material organizations any human being can only have data protection standards lingering rooms and as you know the meaning of this agreement and the tools to the monitoring relief in the in the in thing remains the analysis of in analogies and here in the real world these independent the internet and it's a true some of the same arrangements with learning and communicating so this is a listing of the the suit my time is up now but I just wanted to highlight a couple of things and I will not do it now but I hope there will be opportunity afterward to discuss about what can what what are the next steps it's not sufficient to just have some guidance what what is it that were planning to do to put the guidance in practice thank you must know and
all kidding aside if you read 1 handbook on data protection in the humanitarian sector this year this
is the 1 to read genuinely the best resource out there and there are many you'd be surprised we love documents instant classes alright is to be the they think let's not add another layer of Technology here VN theory of times of the Hi Republic my name is Terence Rome and this is my great pleasure to address you today to prison this ongoing collaboration between the a Series C and D P of my university so the initially puff of this of this work is that the mandate of it the a Series C and in particular its global presence with an emphasis on the areas of armed conflict and other situations of violence and privileges and immunities can I that Massimo mentioned is that they create and own unique needs for security that is addressed by existing technology and the promise of all work is that if we can characterize those needs sufficiently well then perhaps we can of proposed better technology to address them so essentially to our work is the motion of digital immunity which is compares security combined where's all is therefore factors as well as privileges and immunity and so if we can combined of
3 then the hope is that we can propose better designs to carry out our study we used and that approach which means that we started with a set of various that refined throughout the course of our studies to acquire the data we used a quantitative approach Our comprising some isotope interviews survey review of internal
documents as well as a visit in a nice here's delegation bordering on armed conflict we acquired data on through 27 interviews and Hinrich topic exhaustion and pretty much or interviews covered all the operational units of the C as against here the combined experience of 4 interview amounted to over in a quarter of a million in the field the and in addition to this
extensive experience you can see on this map the hour regions of the a Series C were all participants period so pretty much all of them are covered here a writing to results so
we identified 4 main practical factors that constrain the use of technology by as you see few workers today the first one is the reliability of beneficiaries and so in prison environments for example of technology is banned which means that pretty much the best that you can do in this environment is to use a paper form and to sodomize the name of the detainee out to prevent him from a from hormones 2nd capacity building is of supreme attic and as well as collaborations with is on national Red Cross Societies because they lead to origin as well as physical attacks so correlation lies in sensitive information that might be disclosed to our staff that may not be covered by privileges and immunities or be more susceptible to being costs and this is particularly Primera problematic in state owned facilities such as hospitals for example and so there is a need there to provide technology that mitigates the cost of staff or the unauthorized disclosure of data with respect to physical attacks technology may be placed in anthracene and foresee environments so that is susceptible again to physical attacks I in that case there is a need for our technology that resists Portual compromise you this graph illustrates
that the impact of this over 4 factors and others on the satisfaction of I C a C employers respect to communication data management and processing what you see here is that there is a gap between the needs of secure technology I'd satisfaction by receipt stuff worker so to summarize we
identified a strong need for secure technology that is currently not satisfied due due to the practicality of the field work and we're planning to close this gap by collaborating with the seriously and all other humanitarian organizations to integrates those secure applications into a usable technological platform and finally I believe that there is a
gap sorry there is a lack of of the call to implement and deploy such technology today and in that and we're working on the foundation that combines the neutrality of academia where is the industrial capacity in order to hopefully our create such a vehicle and thank you for it to your attention this is the end of my talk also not
in a kid in the corner for a little bit longer netting shifted Dorothy and this is when the technology males so let's say want to get you on the screen here that's meaning some money speaks German had I go into full screen mode the on this menu though yeah full but notice alright were in good shape I have Dorothy what's going the word were on it would with Hi Dorothy can you hear me absolutely perfect so Daugherty's giving us from among the them Jordan Courrant's the have branch from the headquarters well I'm very happy to be with you despite the distance so that me tell you a little bit about our experience here Edwin when maybe I do need to explain briefly who were we and what do we do arrest stands for the United Nations Relief and Works Agency for Palestine Refugees in the Near East we've been created in 1949 and given a mandate from the UN General Assembly to support the populations that were displaced unaffected by the Arab Israeli conflict of 1948 and ever since for the past 70 years we've been operating in Jordan the West Bank Gaza Lebanon as well as in Syria untilled today we're catering for 1 of the probably most ENDFOR disenfranchised populations in the Middle East in the absence of a Palestinian state until today at the moment we're providing about 500 thousand children with basic education we see 2 million persons coming to a whole centers and 1 comma decimal 7 million people are actually relying on our food assistance as well as cash assistance that we provide all of this is done through about 30 thousand staff most of which 90 percent palestine Refugees themselves and this creates a very specific at dynamic across the agency which is 100 50 % service delivery oriented every single penny of which we don't have too many goes into the front line staff and the front services now how does the set up relates to our ability to manage and govern data because we do have quite a lot since 1958 we basically collected information documentation civil registration information about the people we serve so right now we hold 5 comma decimal 4 million active data files of refugees in our system but in addition of course we've also in creating databases and management information systems to support the education health systems as well as vast relief operations how does that work we have an information management department and full of very kid Metten enthusiastic staff that come to the program departments and say hey guys we've got your our technical business solutions ready to support you make your programs more effective and efficient so just imagine here is the medical doctors says great we want to digitize patient and our health information management system can you help us and the information guys say OK great where onto it now what probably the people on the program side the medical doctors have underestimated is actually the need for them to engage in these processes to make sure that the business solutions through the technology and don't don't come into problems with the way they actually carry out their services on the ground and they may also have overestimated the ability of the I. T. guys to actually understand the business processes so that the worst of all worlds we end up with something like a patient coming to 1 of our health centers and here he has to come and give all the information for the patient panel and it takes some about 2 and a half minutes just to get in place the basic data just to get everything going now in our health centers I usually quite overloaded a doctor is about 3 minutes time to serve as a patient so that leaves you with about 30 seconds for the doctor to engage with the patient whereby the should look a little bit more into the family history of health a look maybe at there a psycho social issues that possibly affect the morbidity of the patient all that won't be possible what happens the doctor probably goes and prescribe the drug an antibiotic and off the patient goes who loses out and as a refugee it is a client why is that Because our program side probably interested too much on the IT side to actually provide business solutions which look like we're providing more effective services but in the end were losing out because we have a disconnect between the service providers and the clients and the Business Solutions side and here we haven't even spoken about data protection issues and how we take care of that no 1 has certainly has a whole series of policies in standard operating procedures for data and protection but what we did realize is that all of these were largely framed in an era where we were still working around an analog business model not a digital business model so what we did last year when we saw a proliferation of databases and IT architecture that was managing and parallel refugee information we said we need to we need to just put the foot on the brake in and do a little bit of a reflection exercise and we identified 3 main risks 1 of course is related to the situation that I've just described where we said on we have to update our policies of course and make them more adjusted to a digital world and at the same time the processes were why we develop business solutions IT solutions in support of the programs need to be battered step by step from the data collection through the processing the docking the archiving of it and as well as the disclosure but we need to put in place a mechanism a system with in the staffing structure in the accountability structure to make that happen secondly another risk area was research and disclosure of data because on hold such vast data across different programs where quite interesting to all sorts of research institutions but also other humanitarian partners and sometimes even the governments that would like to get hold of the data that we host and we realize that we're not prepared to actually make informed decisions under which circumstances and to what extent we support research which could contribute to public good and to what extent in some instances we actually might put the refugees at risk by the type of information that we disclose so thirdly we identified another element for improvement in the way we operate that is the transparency of a data is very difficult for refugees to actually access the information that we store including the historical family archives that date back to 1948 and sometimes even before what did we decide to do it 1 on the research element we've instituted a complete research moratorium until we have in place an updated data protection access policy a research review board that will better according to predefined criteria their research in light of the protection needs of our refugees as well as a basic research at that guidelines and secondly and we are in the process now of reviewing our operations in terms of its of providing business solutions IT-based is the solutions to our programs so that were actually able to that again against a set of risks the entire process and that is ongoing thirdly in terms of enabling the refugees to access the data that we store around them that is a larger project that will take probably a year or 2 or 3 even to come and for which we will have to find the necessary resources to make sure that a refugees have access to the data that they've entrusted us with thank you Dorothy I give
you a few extra minutes his life's not fair gentlemen so I had us but were just put Nathaniel slides of Dorothy and then will bring you back for the discussion so bear with us has a writer are you awake but and it's so in order to be here who on stage with people who I consider to be heroes at a
time when heroes are in short supply so I anyone know what this is this history a square back in 2011 during the Halcion days of the arab spring when I saw this photo I thought of a quote from a book I read in college by gunning down below who said the future belongs to crowds I used to believe that I don't believe that any more I believe the future
belongs to those of the computing power to predict think about that the future belongs to those who can predict crowds it doesn't belong to the crowds themselves anymore Conner Ahrendts anyone know who answers case some
people still read good in the origins of total terrorism she said that basically totality Arianism attacks on freedom began with dictators undermining the validity of facts and if we
look at the history of how freedom dies it dies facts are under attack when trust itself is under attack and I would say now we are at a moment where we entered a 3rd world war in the wars on trust trust in systems trusting data trust in institutions for humanitarian actors trust is only currency the humanitarian principles of independence neutrality humanity impartiality depend on the trust that we have with affected populations with governments and that trust is baked in the norms and the rule of law the technology we thought would liberate us however the that was set us free is in fact the vector for a new type of threat this is Picasso's Guanica fun an iPhone ladies and gentlemen this is where we live now the wary
because of today are happening on social networks they're happening on devices as much as they're happening on battlefields and welcome to the great oppression these liberating tools or the pathway by which now through things such as misinformation in some cases direct cyberattacks we have entered a new threat matrix quickly the raw anger Indiana mark have been displaced in an act of ethnic cleansing Facebook we now know has been in inflammatory factor in the attacks on this population once
again Facebook São Sudan Yuan is put out a report on the role of Facebook is playing in communal violence is trip over the speaker on the wall Facebook is played has even gotten in some points to evidence of communicant troll of attacks and you all know this
1 of the 2016 election the United States social Media Misinformation was a critical factor in how that played out
so another example misinformation the White Helmets in Syria so we're looking at the decline and fall of normative frameworks and that's bad for humanitarians but meanwhile what are we all doing in the civil society space this is the opening of Epcot Center 1982 I find this photo to be ridiculous I also find the way that civil society has responded to this moment ridiculous as well because we have focused on the TAC is if code can save us when really the odds were not
about building the world of tomorrow we should be about preventing jurassic park so PII you heard from Masimo personal identifiable information stop PII anymore it's the II demographically identifiable information information about communities in its ABI action based information about the movement patterns of populations to close up here at the this is the plumb-line data is people only handle data were handling the lives of people these are the pictures of the world we live in
now we now have a network to the OS the largest in history the Syrian refugee population using mobile devices to make decisions about finding data about receiving assistance and at this point we're not equipped for this
revolution we do not yet have an agreed duty of care the duty of care for how we handle data as people very quickly were looking down the wrong end of the 10 telescope we focused on the promise of technology and that's actually made the population very small but when we look at rights
is the 1st lines down the telescope the population comes into focus the signal program we wrote something called a signal code published January last year we said there's 5 rights that already exist a
right information during crisis or right to protection and how that information is provided a right to privacy or right to data agency in a right to rectification redress when information communication technologies in their use cause harm day and
I'm just gonna end with this wise woman let's look at a a gamble greater so
Franklin she said technology is not the sum of the artifacts of the wheels and years in rails electronic transmitter for me Technologies' System technology involves organization procedures symbols new words equations and most of all involves a mind set what I wanna leave you with it is time for our mind set to change were doing it
wrong it's not about what tech can do it's about a rights-based approach to ensure that we prevent what tech should not to thank you all right Dorothy or back up here there
we go fluent in German right Net is always the light hearted and through a series of talks about is where we left until the end but it segued almost like we planned so now I have a few questions for the panel and we'll start with Dorothy Dorothy dishonor make sure you still hear me can you there were audio can we hear Dorsey say something yes I can hear you refer to so thinking about technology as a system and this provocation that we need to really look at the mind set both
individually institutionally Israel's culturally 1 of the big areas for international organizations thinking about how to mitigate risks relates to finding a balance between policy and practice and figuring out where to intervene to have an impact as well as how to find a balance between my own alarm between policy practice and culture so Dorothy in the context of an rock you share a bit more about how your navigating that pretty complex landscape yeah thanks for the question
certainly is extremely relevant unit hits actually at what we're currently struggling with Serre at the point where we realized that the existing policies that we have to govern are data management pre-match outdated as they do not respond to actually the day-to-day issues that we're being faced in the sense that a staff don't even relate to these policies anymore and are doing ad hoc decisions and as they are very in genuine of doing an UNRWA in any case says we're in that situation we said OK we need to go back to the drawing board and we're going to rewrite a data protection and activate access policy thing then of course we have our lawyers sitting around the table in drafting something then everybody common sonnet which may to sometimes of optimal results that we did agree that we have a better engagement process then between the lawyers that drafting thus and the practice side which is very important at the same time it's very clear that no policy given also the speed with which technologies are developing and the complexities of our operational environment that give us challenges every day from our operations in Syria down and to Gaza city no policy will be able to actually capture all of the situations and provide sufficient guidance to make decisions so I guess what we're going to settle on is a broad policy that definitely highlights non-negotiable principles but also might highlight some of the ethical dilemmas we might be faced and this shall then the a sounding board to for decision making so I guess what we're looking at is that we're going to create a policy layer which is a reference document for us to rely on but then we also need to put in place structures for consultation for reflection and for accountable and informed decision making as we move along and and making sure that the technologies we use and the data that we host is not going to become a risk to the vulnerable refugees that we serve and as a 3rd element of course we need to spread the awareness across the agency of what Nathaniel just mentioned data is people because we are so very much focused on the service delivery and get things done that sometimes the protection elements no fall a little bit too short so that is something that we increasingly are communicating through various various means of how we actually operate and do things really thank you many organizations haven't yet
established the function for data protection and so in many ways I C a C is unique in having a Data Protection Office established in that's the team that leads the handbook that we rushed him through showing you is seriously a tremendous resource and it falls between policy and practice it looks at providing a framework for how decisions can be made in the field making that a reality is complex so maybe from things you might have shared in your talk of you a few more minutes you wanna touch briefly on how now that the books in place and launched you're planning to socialize it across the ICRC so they search for a
given the opportunity to expand a little bit on the next steps in and certainly the it helps nobody to have a good resource on the shelf to gather dust so why is it that sometimes principles and policies do not translate into practice well it's because they remain on the shelves and the only way to translate them in practice is really to ensure that the principles that are in there I
really declined and drill down and drill down into the operating procedures the guidelines and policies so that people that are having to do with emergency don't need to look very far they just need apply their own practical policies and guidelines and they will know that they're in line with the with the with that with a policy data protection impact assessments this is Atle privacy conferences whenever there is a complex question and nobody knows the answer of that's the answer that you can give and everybody will be nodding but it is also the right answer because actually dead is the process that enables you to really go through all the principles and all the questions that you need to ask yourself and to make sure that you're clear as to what the rest that year generating of in a B and that you're accountable if you're taking them and that the media gave them as much as possible it knowing what they are so awareness of risks is really key and it's particularly with this technologies and new technologies that awareness of risk is is becoming so important people in human internalization are actually good people and the want to do the right thing the problem is that sometimes it's not easy to understand what the right thing is that it's a cash for a cash transfer a voucher that pops up on your phone might look like selecting innocuous cash voucher the pops up on your phone you don't actually realize necessarily that in order to get to somebody's phone it has to go through a whole series of sub processes and processes and stakeholders a financial institution the financial service provider and mobile phone operator in the process of those stakeholders might actually be generating a lot more data and metadata about the transaction that you actually aware and so it's important awareness is the key and so what we're doing now with there were International is a study on the possible implications of a humanitarian metadata generation famous former director of intelligence agency declared we kill people based Italy's publicly well they do that in conflict areas which is where work it is our
responsibility to understand to what extent the generation of metadata into many term programs including cash including using social media message in their apps might actually be contributing to that so awareness integrating the rules in the day-to-day practices and policies and data protection practices and key and cooperation with stakeholders like in this case our friends of the year Polytechnic University of on that actually have very sophisticated technological knowledge that can share with us and can help us out always certain technical problems It's a great segue masking onset hope while obviously culture and governance and a mechanisms
are are critical there is of course a role for technology to play so Stevens can you tell us a bit more about that technological interventions that you and your team exploring the context the research and how you see an organization like the ice here see having the capacity competency and capability to actually introduce more robust technological safeguards yes of course
so as I mentioned we identify that there was a need for secure communication data management and and processing and to look at the intersection of those technologies where's the organizational constraints of very seriously as well as the specific PNI so they have in certain
countries and so at the moment we're starting to work on something it is called an anonymity network of that prevents the creation of metadata but as opposed to networks like toward at work over the internet what we're trying to do is to see whether we could deploy such a network with the I seriously for example in the secure server rooms that exist within delegations and some delegations in order to enforce the physical security that I brought up during my talk so that as long as 1 server room in in a in a country or the combination of different server rooms in several countries and all are legitimate as long as there's secured is not been violated then we can and force privacy saying communications as well as an to encryption wizard and the in a 1st step and perhaps extend this to the ACM beneficiaries in the 2nd step great know natty we talk a lot
about the importance of having 1 again we refer to as the the company to give passing
capability to understand not just technologies using but also the risks that they pose what are some other ways you're seeing that the measures that Dorothy
Massimo and Stevens have mentioned are effectively being absorbed starting to be absorbed into humanitarian organizations and perhaps also the community at large well
1 piece of evidence is the fact that we're here today the support of GI Z and our colleagues here in Germany on the commitment of Fonda's ought to be the professionalization of not just the tax side but of the
broader data responsibility as a profession side on is starting to happen we're still a long way away but if you look at where we were say 10 years ago during the great who she he crisis map explosion of 2007 2008 we've now moved to a point where I think a lot of the fetish about volunteer organizations being the tip of the spear they're important but now we're seeing on in terms of actual the beginning of professional training that in terms of training we do a Harvard on remote sensing response just as an example we're seeing the beginning of professional level staff who are responsible for these operations from not just tech Cybernetics in right side some organizations they're doing that really well to be specific World Food Programme they
recently released an audit of their privacy policies and found that they didn't live up to them on that type of transparency what we call critical incident reporting on is essential we haven't wanted to tell the truth about when things went bump in the night or when the wheels came off on but if we don't have the negative examples if we don't have the courage to tell the truth when it doesn't work we can't develop an evidence-based approach to professionalization countermeasures so another organization just end here by the
International Organization for Migration IOM of been working with them on a forthcoming core obligations off for he may enter information activities the 1st attempt an ethics code for this work in the C organizations like IOM which handles biometric data in many cases of refugees crossing borders are internally displaced to see that I O AMS the IWF taking that lead that's a great sign it's not enough but it's significantly better than where we were a decade ago absolutely I wanna
gage how many questions there might be in the audience as I have plenty but 1 of turn to you all and see what questions you might have I realize it's warm we've got about 10 minutes left unlocking this Heidi and I would like to ask how all if you're looking to ledger
technologies and it in like did so identities will footage when and then diesel blockchain-based cash flows if that's relevant and it's 1 question and like other tech motion and and non amenities networks and the the I you able actions protected data from countries where you work on mean if somebody comes and has a legal warrant I don't I shouldn't talk about this but how is that a shared maybe dossier deny she's that's an issue that Jordan was the hand comes up to you and says like actually we would like to look into your daytime we wanted for we have reason are you able to protect the dates on hold door thank you will will take a few more and
then turn back to the Panel any other questions out there
yes over here I'd say thanks all of you really interesting and love commercial organizations tries to address some of the humanitarian issues we've seen this was used
to in the can a blockchain-based platforms and and and otherwise interested to know whether a have you considered there's organizations become a fundamentals driven along the comparison of the research you're doing all where there may be the kind of drive to achieve profitability might craig platforms that whilst kind of work in the short term a maybe not what you're looking for for long-term but that we have the benefit to the toxin thank you maybe 1 more there's 1
over here and just a question on caches systems so I would imagine you do an assessment is for refugees who
qualify for caches the systems whether they have sources of income and then obviously you gather data on that so do you give them the right to be forgotten by some to have the data erased after a certain period of time for example when the cash assistance finishes thank
you so let's let's turn back and Dorothy maybe we can we can start with the questions directly you if you're happy to answer a completely hypothetical question about the potentially asking for data so the question was how can we ensure that you're able to protect data from countries in theaters where you're working do such requests occur and if so what type of measures might organizations like and already as here see take to ensure that they can hold and protect the data that they are the custodians of right suit you want me to respond yes please how can I guess and and the 1st question I didn't completely understand it but I I guess it relates to how we see the relevance or a effectiveness of applying blockchain in terms of our operations specifically to cash assistance Italy and we did look at the possibility of introducing blockchain and and we continue doing so w P is so somehow leading the heard on this I again I mean that apart from the fact of course that other right now is in its most of severe financial crisis is an ever since 70 years we don't even know how to mark the schools as of September is so there is a resource constraint here to introducing a very sophisticated new technologies now having staff available to really run I must admit on 1 side but we are nevertheless following up and exploring whether it makes sense but I just want to highlight that again this is a case in point where and the question of is blockchain the right way of collecting and storing the data is it is it the right thing and it seems to be obliterating some of the much more pressing issues that we have when we look at the way we design cash assistance programs which is a really really targeting the right people in and it is the value of their transfer is is it is it accurate and how do we access the populations in know all of all of these much more pressing issues and are obliterated them by the fact you know this is blockchain the right the right wages to to process the data in itself on and we're right now more concerned you know with with other with other elements of in terms of the you know huge humanitarian crisis in Syria running out of funds Gaza where we provide a million people with food and we don't have the money for the US said the blockchain issue so that on the back burner do we erase data up and the way unwrap operates is that you need to prove your Service eligibility we do not indiscriminately provide services and 2 populations on people have to come and register with us so they either proof there and Palestine refugee status according to cross the criteria that are available on the public domain war I might otherwise being service legible and their records remained with us and sometimes we have records as mentioned that go back down the family trees some 70 years on and we maintain them we keep them and if you wish and this also constitutes something light like a like a national archive for an archive of the Palestine refugee population are refugees are very much interested that we preserve these archives and that we preserve their information which in some cases now this was a very handy to them we have a lot of requests from governments in Europe I'm asking us and to basically document weather and person X or Y is actually registered with an rock and is a Palestine refugee because they're claiming asylum thanks to the on the the question of privileges
immunities very briefly cause we've got about 2 and a half minutes left Massimo and Stevens so from the more strategic approach and then the technological side this question of if the government's request for data of beneficiaries who you have registered in your system's how the privileges and immunities apply from a data protection perspective and then in turn harry thinking about the technological safeguards that should be in place for that so that's that's a very complex
question actually because it depends on a lawyer so that's the answer that they're gonna hear from a lawyer it depends depends on the specific type of activity depends on the level of fat and the type of writer depends on the type of request done many programs in relation to which there's a fact the whole point of the program is to enable the authorities to perform their duties to
protect and to order and or to to provide assistance to certain categories of people so they must be informed about certain things when there are facts however and this is where this is where the privileges and immunities become key and so the fact that for example in relation to certain types of activities that are particularly sensitive we don't work with partners it is us going directly in conflict areas in places of detention to collect and to document the conditions of detention that's because we can be cover represent if authorities come and seek to have access we can say we have immunity from jurisdiction you know it very well this is why you have accepted us being here because we're a neutral impartial independent actor and you have accepted this models brandy the year the main I don't want to paint an ideal scenario we also know that in some cases that is not sufficient and this is why it's not something you it's something that dates back here to were very early guidelines all of our protection work if we fear that the pressure that can be put in relation to some cases is too high and that the danger for the individual concerned is too high then actually the guidelines is not to collect information very briefly Stevens on the
technological side then we'll close that with the comment on the question about commercial actors and the role of the place of Stevens and the thing here so again a singer isn't an important distinction to make between the technology that is customer or beneficiary facing as opposed to the internal technology that that would be used only by ICAC on for years on end with
respect to all the P and I as singer there is an advantage to to leverage 1 deploying infrastructure over a method to news system of jurisdiction some delegations and so perhaps some delegations some more trusted and others for example the ISI his headquarters of based ingenue our and they have a strong relationship between the organization and the Swiss government and this is where perhaps there is there would be an opportunity to deploy a blockchain system of for example for access management of a for data on so that as long as the a server is not compromise that participates in was blockchain system down the entire system can remains from legitimate thank you Daniel so when
I was but a young aid worker in the early 2 thousands the big issue then was civil-military space in the context of a rock in Afghanistan but meaning how much should aid workers except protection from engage with vectors in many cases the debate was around whether we should receive U.S. and NATO protection in the field in
very complex contentious issue but now we have it this curve moment a new type of space question which I we call on civil corporate space and we haven't it's been the exact opposite we is the imagined community have been so excited to hop into bed with large corporations and large platforms on sharing data in an often experiment away and that kid there are moments of that can be really important in good but we haven't had the broader question about how do you put a red cross on a server and if so how do you impartially share data how do you have independence from a corporate agenda which is not about in the case of a needs based ethic and needs code of conduct that we follow as humanitarians but is about shareholder value that those fundamental conflicts in many ways we haven't had that conversation and so it doesn't mean don't work with corporations we have corpora partners that we work with art constantly but it means how do we maintain the people and their dignity and their needs which is the basis of the humanitarian response rather than get co-opted by corporate agenda thank you it all
comes back to trust and and this is really about understanding how we continue to build and maintain trust so that as we introduce
technology and data more and more into the way we deliver aid we were protecting the people that were trying to search for 1 thing the panel and our colleagues at the ends and use that for organizing this track were really excited to
be a part of it I suspect the next panel about blockchain given the increasing number of people in the room so next year I will think about the title of the talk including something about foresight and blockchain but thank you all for coming really appreciate and were around if you wanna continue the discussion Daugherty will send you a beer a pretzel in our mind they have hint-it how if we may