Intelligent transport systems — Cooperative ITS — Part 7: Privacy aspects

The scope of this ISO/TR 17427-7:2015 is as an informative document to identify potential critical privacy issues that C-ITS service provision may introduce; to consider strategies for how to control, limit or mitigate such privacy issues; and to give pointers, where appropriate, to standards deliverables existing that provide specifications for all or some of these aspect and to limit the risk of exposure to the financial consequences of privacy issues. The objective of ISO/TR 17427-7:2015 is to raise awareness of and consideration of such issues. This Technical Report does not provide specifications for solutions of these issues.

Systèmes intelligents de transport — Systèmes intelligents de transport coopératifs — Partie 7: Aspects relatifs à la vie privée

General Information

Status
Published
Publication Date
21-Oct-2015
Current Stage
6060 - International Standard published
Completion Date
22-Oct-2015
Ref Project

Relations

Buy Standard

Technical report
ISO/TR 17427-7:2015 - Intelligent transport systems -- Cooperative ITS
English language
25 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (Sample)

TECHNICAL ISO/TR
REPORT 17427-7
First edition
2015-11-01
Intelligent transport systems —
Cooperative ITS —
Part 7:
Privacy aspects
Systèmes intelligents de transport — Systèmes intelligents de
transport coopératifs —
Partie 7: Aspects relatifs à la vie privée
Reference number
ISO/TR 17427-7:2015(E)
©
ISO 2015

---------------------- Page: 1 ----------------------
ISO/TR 17427-7:2015(E)

COPYRIGHT PROTECTED DOCUMENT
© ISO 2015, Published in Switzerland
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized otherwise in any form
or by any means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior
written permission. Permission can be requested from either ISO at the address below or ISO’s member body in the country of
the requester.
ISO copyright office
Ch. de Blandonnet 8 • CP 401
CH-1214 Vernier, Geneva, Switzerland
Tel. +41 22 749 01 11
Fax +41 22 749 09 47
copyright@iso.org
www.iso.org
ii © ISO 2015 – All rights reserved

---------------------- Page: 2 ----------------------
ISO/TR 17427-7:2015(E)

Contents Page
Foreword .iv
Introduction .vi
1 Scope . 1
2 Terms and definitions . 1
3 Abbreviations and acronyms . 2
4 How to use this Technical Report . 2
4.1 Acknowledgements . 2
4.2 Guidance . 3
4.3 ITS and ‘Privacy’ . 3
4.4 C-ITS ‘Privacy’ issues . 4
4.4.1 General C-ITS ‘Privacy’ issues . 4
4.4.2 Examples of vehicle tracking . 6
4.4.3 Anonymity . 6
4.4.4 Deployment models . 8
5 C-ITS Actors and Privacy . 9
5.1 C-ITS and jurisdictions . 9
5.1.1 United States. 9
5.1.2 Europe .10
5.1.3 Australia .12
5.1.4 Other countries .14
5.1.5 International Standards .14
5.1.6 Privacy and governments .14
5.2 C-ITS and road operators/managers .15
5.2.1 Jurisdictions .15
5.2.2 ‘Core’ systems .16
5.3 C-ITS and manufacturers .16
5.4 C-ITS information/application service providers .16
5.5 C-ITS, drivers and vehicle owners .17
5.6 Further reading .17
5.7 Aspects relating to probe vehicle information services .17
6 Policy questions and approaches .17
6.1 Is specific regulation required for C-ITS? .17
6.1.1 Option 1: Continue current approach .17
6.1.2 Option 2: Privacy code .18
6.1.3 Option 3: Provide guidance on best practice .18
6.1.4 Option 4: Legislate C-ITS governance arrangements and use of information .18
6.1.5 Option 5: Legislate technical standards to protect privacy .18
6.1.6 Option 6: Match and copy mobile phone privacy measures .18
7 Summary of findings.19
7.1 General .19
7.2 Principal opinions .20
7.3 Privacy — Private Sector .22
7.4 Privacy — Public Sector .22
Bibliography .23
© ISO 2015 – All rights reserved iii

---------------------- Page: 3 ----------------------
ISO/TR 17427-7:2015(E)

Foreword
ISO (the International Organization for Standardization) is a worldwide federation of national standards
bodies (ISO member bodies). The work of preparing International Standards is normally carried out
through ISO technical committees. Each member body interested in a subject for which a technical
committee has been established has the right to be represented on that committee. International
organizations, governmental and non-governmental, in liaison with ISO, also take part in the work.
ISO collaborates closely with the International Electrotechnical Commission (IEC) on all matters of
electrotechnical standardization.
The procedures used to develop this document and those intended for its further maintenance are
described in the ISO/IEC Directives, Part 1. In particular the different approval criteria needed for the
different types of ISO documents should be noted. This document was drafted in accordance with the
editorial rules of the ISO/IEC Directives, Part 2 (see www.iso.org/directives).
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. ISO shall not be held responsible for identifying any or all such patent rights. Details of
any patent rights identified during the development of the document will be in the Introduction and/or
on the ISO list of patent declarations received (see www.iso.org/patents).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation on the meaning of ISO specific terms and expressions related to conformity
assessment, as well as information about ISO’s adherence to the WTO principles in the Technical
Barriers to Trade (TBT) see the following URL: Foreword - Supplementary information
The committee responsible for this document is ISO/TC 204, Intelligent transport systems.
ISO 17427 consists of the following parts, under the general title Intelligent transport systems —
Cooperative ITS:
— Part 2: Framework Overview [Technical Report]
— Part 3: Concept of operations (ConOps) for ‘core’ systems [Technical Report]
— Part 4: Minimum system requirements and behaviour for core systems [Technical Report]
— Part 6: ‘Core system’ risk assessment methodology [Technical Report]
— Part 7: Privacy aspects [Technical Report]
— Part 8: Liability aspects [Technical Report]
— Part 9: Compliance and enforcement aspects [Technical Report]
— Part 10: Driver distraction and information display [Technical Report]
The following parts are under preparation:
— Part 1: Roles and responsibilities in the context of co-operative ITS architecture(s)
— Part 5: Common approaches to security [Technical Report]
— Part 11: Compliance and enforcement aspects [Technical Report]
— Part 12: Release processes [Technical Report]
— Part 13: Use case test cases [Technical Report]
— Part 14: Maintenance requirements and processes [Technical Report]
iv © ISO 2015 – All rights reserved

---------------------- Page: 4 ----------------------
ISO/TR 17427-7:2015(E)

Further technical reports in this series are expected to follow. Please also note that these TRs are
expected to be updated from time to time as the C-ITS evolves.
© ISO 2015 – All rights reserved v

---------------------- Page: 5 ----------------------
ISO/TR 17427-7:2015(E)

Introduction
Intelligent transport systems (ITS) are transport systems in which advanced information,
communication, sensor and control technologies, including the Internet, are applied to increase safety,
sustainability, efficiency, and comfort.
A distinguishing feature of ‘ITS’ are its communication with outside entities.
Some ITS systems operate autonomously, for example ‘adaptive cruise control’ uses radar/lidar/and/or
video to characterize the behaviour of the vehicle in front and adjust its vehicle speed accordingly.
Some ITS systems are informative, for example ‘Variable Message Signs’ at the roadside, or transmitted
into the vehicle, provide information and advice to the driver. Some ITS systems are semi-autonomous,
in that they are largely autonomous, but rely on ‘static’ or ‘broadcast’ data, for example, GNSS based
‘SatNav’ systems operate autonomously within a vehicle but are dependent on receiving data broadcast
from satellites in order to calculate the location of the vehicle.
Cooperative Intelligent Transport Systems (C-ITS) are a group of ITS technologies where service provision
is enabled by, or enhanced by, the use of ‘live’, present situation related, dynamic data/information from
other entities of similar functionality (for example from one vehicle to other vehicle(s)), and/or between
different elements of the transport network, including vehicles and infrastructure (for example from the
vehicle to an infrastructure managed system or from an infrastructure managed system to vehicle(s)).
Effectively, these systems allow vehicles to ‘talk’ to each other and to the infrastructure. These systems
have significant potential to improve the transport network.
A distinguishing feature of ‘C-ITS’ is that data are used across application/service boundaries.
It will be immediately clear to the reader that such systems present the possibility to seriously
compromise privacy, and must, and will, be strictly controlled by regulation and managed to prevent
abuse of privacy by any party. The purpose of this Technical Report is to identify potential critical
privacy issues that C-ITS service provision may introduce, to consider how to control, limit or mitigate
such privacy issues, and to limit the risk of exposure to the financial consequences of privacy issues.
This Technical Report is a ‘living document’ and as our experience with C-ITS develops, it is intended that
it will be updated from time to time, as and when we see opportunities to improve this Technical Report.
vi © ISO 2015 – All rights reserved

---------------------- Page: 6 ----------------------
TECHNICAL REPORT ISO/TR 17427-7:2015(E)
Intelligent transport systems — Cooperative ITS —
Part 7:
Privacy aspects
1 Scope
The scope of this Technical Report is as an informative document to identify potential critical privacy
issues that C-ITS service provision may introduce; to consider strategies for how to control, limit or
mitigate such privacy issues; and to give pointers, where appropriate, to standards deliverables
existing that provide specifications for all or some of these aspect and to limit the risk of exposure to
the financial consequences of privacy issues.
The objective of this Technical Report is to raise awareness of and consideration of such issues. This
Technical Report does not provide specifications for solutions of these issues.
2 Terms and definitions
2.1
application
app
software application
2.2
application service
service provided by a service provider accessing data from the IVS (2.6) within the vehicle in the case
of C-ITS, via a wireless communications network, or provided on-board the vehicle as the result of
software (and potentially also hardware and firmware) installed by a service provider or to a service
providers instruction
2.3
cooperative ITS
C-ITS
group of ITS technologies where service provision is enabled, or enhanced by, the use of ‘live’, present
situation related, data/information from other entities of similar functionality [for example, from one
vehicle to other vehicle(s)], and/or between different elements of the transport network, including
vehicles and infrastructure
[SOURCE: for example from the vehicle to an infrastructure managed system or from an infrastructure
managed system to vehicle(s)]
2.4
core system
combination of enabling technologies and services that will provide the foundation for the support of
a distributed, diverse set of applications (2.1), and application transactions which work in conjunction
with ‘External Support Systems’ such as ‘Certificate Authorities’
Note 1 to entry: the system boundary for the core system is not defined in terms of devices or agencies or
vendors, but by the open, standardized interface specifications that govern the behaviour of all interactions
between core system users
© ISO 2015 – All rights reserved 1

---------------------- Page: 7 ----------------------
ISO/TR 17427-7:2015(E)

2.5
global navigation satellite system
GNSS
comprises several networks of satellites that transmit radio signals containing time and distance data
that can be picked up by a receiver, allowing the user to identify the location of its receiver anywhere
around the globe
2.6
intelligent transport systems
IVS
hardware, firmware and software on board a vehicle that provides a platform to support C-ITS
service provision, including that of the ITS-station (2.8) (ISO 21217), the facilities layer, data pantry
and on-board ‘apps’
2.7
in-vehicle system
ITS
transport systems in which advanced information, communication, sensor and control technologies,
including the Internet, are applied to increase safety, sustainability, efficiency, and comfort
2.8
ITS-station
entity in a communication network [comprised of application (2.1), facilities, networking and access
layer components] that is capable of executing ITS-S application processes, comprised of an ITS-S
facilities layer, ITS-S networking & transport layer, ITS-S access layer, ITS-S management entity and
ITS-S security entity, which adheres to a minimum set of security principles and procedures so as to
establish a level of trust between itself and other similar ITS-stations with which it communicates
3 Abbreviations and acronyms
ANPR automatic number plate recognition
EDR electronic data recorder
C-ITS cooperative intelligent transport systems, cooperative ITS
IPP information privacy principle
ITS intelligent transport systems (2.6)
IVS in-vehicle system (2.7)
NPP National privacy principle
TR technical report
V2V vehicle to vehicle
4 How to use this Technical Report
4.1 Acknowledgements
Much of the inspiration for this Technical Report and its considerations and content originate from the
reports “Cooperative ITS Regulatory Policy Issues” and “Cooperative Intelligent Transport Systems Policy
[1][17]
Paper” National Transport Commission, Australia. And this source is acknowledged and thanked.
Contribution from various TCA (Transport Certification Australia) documents are acknowledged.
Contribution from the report of EC Project PRECIOSA is acknowledged.
2 © ISO 2015 – All rights reserved

---------------------- Page: 8 ----------------------
ISO/TR 17427-7:2015(E)

Contribution from the US DoT document “CoreSystem_SE_SyRS_RevF” is acknowledged.
The review by the office of the European Data Protection Supervisor is acknowledged and thanked
4.2 Guidance
This Technical Report is designed to provide guidance and a direction for considering the issues
concerning privacy associated with the deployment of C-ITS service provision. It does not purport to
be a list of all potential privacy factors – which will vary according to the regime of the jurisdiction,
the location of the instantiation, and to the form of the instantiation, nor does it provide definitive
specification. Rather this TR discusses and raises awareness of the major issues to be considered, and
provides guidance and direction for considering and managing privacy in the context of future and
instantiation specific deployment of C-ITS.
4.3 ITS and ‘Privacy’
Privacy is the subject of National Regulation, but most countries have signed up to one or more of OECD,
APEC and/or European Union principles for personal privacy.
The subject of how ‘privacy’ regulations affect ITS, the variations of ‘privacy’ regulations around the
world, and general measures that ITS should adopt in respect of ‘privacy’ and ITS are dealt with in
ISO/TR 12859.
Suffice to say, in summary that ISO/TR 12859 recommends that the conditions under which data shall
be collected and held in support or provision of ITS services shall uphold all of the following principles:
a) Avoidance of harm Recognize the interests of the individual to legitimate expectations
of privacy, personal information protection; prevent the misuse
of such information. Further, acknowledging the risk that harm
may result; take account of such risk, and remedial measures
should be proportionate.
b) Fairly and lawfully Personal data obtained and processed fairly and lawfully.
c) Specified, explicit and legitimate purposes Personal data collected for specified, explicit and legitimate
purposes.
d) Explicit and legitimate and must be determined Purposes for which personal data are collected shall be deter-
at the time of collection of the data mined at the time of the collection of the data and shall be explicit
and legitimate at the time of collection of the data and use and
subsequent of the data limited to the fulfilment of those purposes
(or such others as are not incompatible with those purposes
specified); All personal data collected shall be adequate, relevant
and not excessive in relation to the purposes for which they are
processed.
e) Not further processed in a way incompatible Personal data shall not be further processed or used in a way
with the purposes for which it was originally collected incompatible with the purposes for which it was originally collected.
f) Not be disclosed without the consent of the data Personal data shall not be disclosed, made available or otherwise
subject used for purposes other than those specified.
g) Adequate, relevant and not excessive in relation Personal data shall be adequate, relevant and not excessive in
to the purposes for which they are collected relation to the purposes for which they are collected and/or
further processed.
h) Accurate and, where necessary, kept up to date Personal data shall be accurate and kept up to date; every rea-
sonable step must be taken to erase or rectify inaccurate or
incomplete data, having regard to the purposes for which they
were collected.
i) Identification of data subjects for no longer than Personal data shall be kept in a form which permits identification
is necessary for the purposes for which the data were of data subjects for no longer than is necessary for the purposes
collected for which the data were collected or for which they are further
processed.
j) Restricted to those who have a demonstrable The use of personal data to be restricted to those who have a
‘need to know’ genuine need to know.
© ISO 2015 – All rights reserved 3

---------------------- Page: 9 ----------------------
ISO/TR 17427-7:2015(E)

k) Clear and accessible Personal information controllers shall provide clear and easily
accessible statements about their practices and policies with
respect to personal information that should include:
a) the fact that personal information is being collected;
b) the purposes for which personal information is being
collected
c) the types of persons or organizations to whom personal
information might be disclosed
d) the identity and location of the personal information
controller, including information on how to contact them about
their practices and handling of personal information.
l) Security safeguards Personal data should be protected by reasonable security
safeguards against such risks as loss or unauthorised access,
destruction, use, modification or disclosure of data.
m) Cumulative interpretation of multiple recom- In the development of ITS systems and standards, we are advised
mendations by legislators and lawyers that the recommendations cannot
just be taken individually in isolation, but the combination of
the recommendations may infer interpretations, this has sig-
nificant implications. Lawyers often refer to this as ‘cumulative
interpretation’
4.4 C-ITS ‘Privacy’ issues
NOTE General privacy requirements are not dealt with further in this document, and the reader is referred
to ISO/TR 12859 for further information on general aspects.
4.4.1 General C-ITS ‘Privacy’ issues
This Technical Report refers to the specific issues of privacy and privacy protection introduced by
C-ITS service provision, the C-ITS environment, C-ITS data exchanges, and the date storage, mining and
consolidation made possible by C-ITS.
In the introduction it was stated that a distinguishing feature of ‘ITS’ are its communication with
outside entities, and that a distinguishing feature of ‘C-ITS’, is that data is used across application
(2.1)/service boundaries. One can see that while ITS itself has to be very privacy aware, C-ITS has
particular opportunity to compromise that privacy if not managed in a way to protect personal privacy.
Furthermore, the use of data ‘across application/service boundaries‘ runs the risk to conflict with the
privacy regulations requirement “Not further processed in a way incompatible with the purposes for
which it was originally collected ”.
C-ITS applications rely on vehicles broadcasting signals to indicate their location, signals which are
intended to be received and understood by a range of other devices. This raises a significant privacy
issue: should C-ITS enable persons or organisations — either governments or private-sector companies
— be able to locate and track specific vehicles? Clearly, without knowledge of the exact location and
direction of movement of a vehicle, applications such as ‘collision avoidance’ nor even collision risk
warnings’, nor ‘ice alerts’ and other ‘road obstacle’ alerts would be possible. The risk for C-ITS consumers
is that this information will be ‘personal information’ if their identity can be acquired or construed or is
otherwise apparent. This is feasible if those that have access to location data can link the unique vehicle
identifier (or series of identifiers) of the C-ITS signal to a registered vehicle and, in turn, to an individual
(a registered owner). This information could be in real time (where the vehicle is presently located) or
historic (where the vehicle was at a certain time on a certain day).
While the opportunities for improved road safety, traffic management and law enforcement are
considerable, many individuals would not expect the movement of their private vehicle, and by
extension themselves, to be plotted across the network by a government or a third party. This is a valid
and legitimate concern and will require both government and industry to practice in good faith the
privacy principles based on legal requirements, particularly in respect to the purpose of collection,
data storage disclosure, and sharing of data.
4 © ISO 2015 – All rights reserved

---------------------- Page: 10 ----------------------
ISO/TR 17427-7:2015(E)

The likelihood and significance of the privacy risk will depend on the extent to which the data is/are
anonymised and the nature of the controls in place with respect to collecting the data and linking
information to individuals. It will also depend on which bodies hold relevant data, (such as certificate
information).
C-ITS is intrinsically linked to the movement and exchange of data, and cooperation among the various
entities acquiring the information is often expected. In this situation, responsibilities need to be assessed
in terms of security risks and possible threats to privacy, as some of the data will be purely situational
or anonymous, while other data, either by itself or as part of multiple data sets, which independently
can be purely situational or anonymous, taken together can provide personal information.
The definition of personal information is sufficiently broad to include location information if that
information is about an individual whose identity is apparent or can be reasonably ascertained from
that information. Australia, for example, succinctly defines personal information as “Information or an
opinion (including information or an opinion forming part of a database), whether true or not, and whether
recorded in a material form or not, about an individual whose identity is apparent, or can reasonably be
[28]
ascertained, from the information or opinion.’ (Privacy Act.1988).
Location information can be a very personal matter worthy of privacy protection, even if the movements
and activities of an individual are within the law. In a report regarding surveillance activities; an
Australian body, the Victorian Law Reform Commission, reflected on location information:
“The need to retain privacy in public places is sometimes concerned with the desire to keep particular
i
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.