ISO/TR 17427-7:2015
(Main)Intelligent transport systems — Cooperative ITS — Part 7: Privacy aspects
Intelligent transport systems — Cooperative ITS — Part 7: Privacy aspects
The scope of this ISO/TR 17427-7:2015 is as an informative document to identify potential critical privacy issues that C-ITS service provision may introduce; to consider strategies for how to control, limit or mitigate such privacy issues; and to give pointers, where appropriate, to standards deliverables existing that provide specifications for all or some of these aspect and to limit the risk of exposure to the financial consequences of privacy issues. The objective of ISO/TR 17427-7:2015 is to raise awareness of and consideration of such issues. This Technical Report does not provide specifications for solutions of these issues.
Systèmes intelligents de transport — Systèmes intelligents de transport coopératifs — Partie 7: Aspects relatifs à la vie privée
General Information
Relations
Standards Content (Sample)
TECHNICAL ISO/TR
REPORT 17427-7
First edition
2015-11-01
Intelligent transport systems —
Cooperative ITS —
Part 7:
Privacy aspects
Systèmes intelligents de transport — Systèmes intelligents de
transport coopératifs —
Partie 7: Aspects relatifs à la vie privée
Reference number
©
ISO 2015
© ISO 2015, Published in Switzerland
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized otherwise in any form
or by any means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior
written permission. Permission can be requested from either ISO at the address below or ISO’s member body in the country of
the requester.
ISO copyright office
Ch. de Blandonnet 8 • CP 401
CH-1214 Vernier, Geneva, Switzerland
Tel. +41 22 749 01 11
Fax +41 22 749 09 47
copyright@iso.org
www.iso.org
ii © ISO 2015 – All rights reserved
Contents Page
Foreword .iv
Introduction .vi
1 Scope . 1
2 Terms and definitions . 1
3 Abbreviations and acronyms . 2
4 How to use this Technical Report . 2
4.1 Acknowledgements . 2
4.2 Guidance . 3
4.3 ITS and ‘Privacy’ . 3
4.4 C-ITS ‘Privacy’ issues . 4
4.4.1 General C-ITS ‘Privacy’ issues . 4
4.4.2 Examples of vehicle tracking . 6
4.4.3 Anonymity . 6
4.4.4 Deployment models . 8
5 C-ITS Actors and Privacy . 9
5.1 C-ITS and jurisdictions . 9
5.1.1 United States. 9
5.1.2 Europe .10
5.1.3 Australia .12
5.1.4 Other countries .14
5.1.5 International Standards .14
5.1.6 Privacy and governments .14
5.2 C-ITS and road operators/managers .15
5.2.1 Jurisdictions .15
5.2.2 ‘Core’ systems .16
5.3 C-ITS and manufacturers .16
5.4 C-ITS information/application service providers .16
5.5 C-ITS, drivers and vehicle owners .17
5.6 Further reading .17
5.7 Aspects relating to probe vehicle information services .17
6 Policy questions and approaches .17
6.1 Is specific regulation required for C-ITS? .17
6.1.1 Option 1: Continue current approach .17
6.1.2 Option 2: Privacy code .18
6.1.3 Option 3: Provide guidance on best practice .18
6.1.4 Option 4: Legislate C-ITS governance arrangements and use of information .18
6.1.5 Option 5: Legislate technical standards to protect privacy .18
6.1.6 Option 6: Match and copy mobile phone privacy measures .18
7 Summary of findings.19
7.1 General .19
7.2 Principal opinions .20
7.3 Privacy — Private Sector .22
7.4 Privacy — Public Sector .22
Bibliography .23
Foreword
ISO (the International Organization for Standardization) is a worldwide federation of national standards
bodies (ISO member bodies). The work of preparing International Standards is normally carried out
through ISO technical committees. Each member body interested in a subject for which a technical
committee has been established has the right to be represented on that committee. International
organizations, governmental and non-governmental, in liaison with ISO, also take part in the work.
ISO collaborates closely with the International Electrotechnical Commission (IEC) on all matters of
electrotechnical standardization.
The procedures used to develop this document and those intended for its further maintenance are
described in the ISO/IEC Directives, Part 1. In particular the different approval criteria needed for the
different types of ISO documents should be noted. This document was drafted in accordance with the
editorial rules of the ISO/IEC Directives, Part 2 (see www.iso.org/directives).
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. ISO shall not be held responsible for identifying any or all such patent rights. Details of
any patent rights identified during the development of the document will be in the Introduction and/or
on the ISO list of patent declarations received (see www.iso.org/patents).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation on the meaning of ISO specific terms and expressions related to conformity
assessment, as well as information about ISO’s adherence to the WTO principles in the Technical
Barriers to Trade (TBT) see the following URL: Foreword - Supplementary information
The committee responsible for this document is ISO/TC 204, Intelligent transport systems.
ISO 17427 consists of the following parts, under the general title Intelligent transport systems —
Cooperative ITS:
— Part 2: Framework Overview [Technical Report]
— Part 3: Concept of operations (ConOps) for ‘core’ systems [Technical Report]
— Part 4: Minimum system requirements and behaviour for core systems [Technical Report]
— Part 6: ‘Core system’ risk assessment methodology [Technical Report]
— Part 7: Privacy aspects [Technical Report]
— Part 8: Liability aspects [Technical Report]
— Part 9: Compliance and enforcement aspects [Technical Report]
— Part 10: Driver distraction and information display [Technical Report]
The following parts are under preparation:
— Part 1: Roles and responsibilities in the context of co-operative ITS architecture(s)
— Part 5: Common approaches to security [Technical Report]
— Part 11: Compliance and enforcement aspects [Technical Report]
— Part 12: Release processes [Technical Report]
— Part 13: Use case test cases [Technical Report]
— Part 14: Maintenance requirements and processes [Technical Report]
iv © ISO 2015 – All rights reserved
Further technical reports in this series are expected to follow. Please also note that these TRs are
expected to be updated from time to time as the C-ITS evolves.
Introduction
Intelligent transport systems (ITS) are transport systems in which advanced information,
communication, sensor and control technologies, including the Internet, are applied to increase safety,
sustainability, efficiency, and comfort.
A distinguishing feature of ‘ITS’ are its communication with outside entities.
Some ITS systems operate autonomously, for example ‘adaptive cruise control’ uses radar/lidar/and/or
video to characterize the behaviour of the vehicle in front and adjust its vehicle speed accordingly.
Some ITS systems are informative, for example ‘Variable Message Signs’ at the roadside, or transmitted
into the vehicle, provide information and advice to the driver. Some ITS systems are semi-autonomous,
in that they are largely autonomous, but rely on ‘static’ or ‘broadcast’ data, for example, GNSS based
‘SatNav’ systems operate autonomously within a vehicle but are dependent on receiving data broadcast
from satellites in order to calculate the location of the vehicle.
Cooperative Intelligent Transport Systems (C-ITS) are a group of ITS technologies where service provision
is enabled by, or enhanced by, the use of ‘live’, present situation related, dynamic data/information from
other entities of similar functionality (for example from one vehicle to other vehicle(s)), and/or between
different elements of the transport network, including vehicles and infrastructure (for example from the
vehicle to an infrastructure managed system or from an infrastructure managed system to vehicle(s)).
Effectively, these systems allow vehicles to ‘talk’ to each other and to the infrastructure. These systems
have significant potential to improve the transport network.
A distinguishing feature of ‘C-ITS’ is that data are used across application/service boundaries.
It will be immediately clear to the reader that such systems present the possibility to seriously
compromise privacy, and must, and will, be strictly controlled by regulation and managed to prevent
abuse of privacy by any party. The purpose of this Technical Report is to identify potential critical
privacy issues that C-ITS service provision may introduce, to consider how to control, limit or mitigate
such privacy issues, and to limit the risk of exposure to the financial consequences of privacy issues.
This Technical Report is a ‘living document’ and as our experience with C-ITS develops, it is intended that
it will be updated from time to time, as and when we see opportunities to improve this Technical Report.
vi © ISO 2015 – All rights reserved
TECHNICAL REPORT ISO/TR 17427-7:2015(E)
Intelligent transport systems — Cooperative ITS —
Part 7:
Privacy aspects
1 Scope
The scope of this Technical Report is as an informative document to identify potential critical privacy
issues that C-ITS service provision may introduce; to consider strategies for how to control, limit or
mitigate such privacy issues; and to give pointers, where appropriate, to standards deliverables
existing that provide specifications for all or some of these aspect and to limit the risk of exposure to
the financial consequences of privacy issues.
The objective of this Technical Report is to raise awareness of and consideration of such issues. This
Technical Report does not provide specifications for solutions of these issues.
2 Terms and definitions
2.1
application
app
software application
2.2
application service
service provided by a service provider accessing data from the IVS (2.6) within the vehicle in the case
of C-ITS, via a wireless communications network, or provided on-board the vehicle as the result of
software (and potentially also hardware and firmware) installed by a service provider or to a service
providers instruction
2.3
cooperative ITS
C-ITS
group of ITS technologies where service provision is enabled, or enhanced by, the use of ‘live’, present
situation related, data/information from other entities of similar functionality [for example, from one
vehicle to other vehicle(s)], and/or between different elements of the transport network, including
vehicles and infrastructure
[SOURCE: for example from the vehicle to an infrastructure managed system or from an infrastructure
managed system to vehicle(s)]
2.4
core system
combination of enabling technologies and services that will provide the foundation for the support of
a distributed, diverse set of applications (2.1), and application transactions which work in conjunction
with ‘External Support Systems’ such as ‘Certificate Authorities’
Note 1 to entry: the system boundary for the core system is not defined in terms of devices or agencies or
vendors, but by the open, standardized interface specifications that govern the behaviour of all interactions
between core system users
2.5
global navigation satellite system
GNSS
comprises several networks of satellites that transmit radio signals containing time and distance data
that can be picked up by a receiver, allowing the user to identify the location of its receiver anywhere
around the globe
2.6
intelligent transport systems
IVS
hardware, firmware and software on board a vehicle that provides a platform to support C-ITS
service provision, including that of the ITS-station (2.8) (ISO 21217), the facilities layer, data pantry
and on-board ‘apps’
2.7
in-vehicle system
ITS
transport systems in which advanced information, communication, sensor and control technologies,
including the Internet, are applied to increase safety, sustainability, efficiency, and comfort
2.8
ITS-station
entity in a communication network [comprised of application (2.1), facilities, networking and access
layer components] that is capable of executing ITS-S application processes, comprised of an ITS-S
facilities layer, ITS-S networking & transport layer, ITS-S access layer, ITS-S management entity and
ITS-S security entity, which adheres to a minimum set of security principles and procedures so as to
establish a level of trust between itself and other similar ITS-stations with which it communicates
3 Abbreviations and acronyms
ANPR automatic number plate recognition
EDR electronic data recorder
C-ITS cooperative intelligent transport systems, cooperative ITS
IPP information privacy principle
ITS intelligent transport systems (2.6)
IVS in-vehicle system (2.7)
NPP National privacy principle
TR technical report
V2V vehicle to vehicle
4 How to use this Technical Report
4.1 Acknowledgements
Much of the inspiration for this Technical Report and its considerations and content originate from the
reports “Cooperative ITS Regulatory Policy Issues” and “Cooperative Intelligent Transport Systems Policy
[1][17]
Paper” National Transport Commission, Australia. And this source is acknowledged and thanked.
Contribution from various TCA (Transport Certification Australia) documents are acknowledged.
Contribution from the report of EC Project PRECIOSA is acknowledged.
2 © ISO 2015 – All rights reserved
Contribution from the US DoT document “CoreSystem_SE_SyRS_RevF” is acknowledged.
The review by the office of the European Data Protection Supervisor is acknowledged and thanked
4.2 Guidance
This Technical Report is designed to provide guidance and a direction for considering the issues
concerning privacy associated with the deployment of C-ITS service provision. It does not purport to
be a list of all potential privacy factors – which will vary according to the regime of the jurisdiction,
the location of the instantiation, and to the form of the instantiation, nor does it provide definitive
specification. Rather this TR discusses and raises awareness of the major issues to be considered, and
provides guidance and direction for considering and managing privacy in the context of future and
instantiation specific deployment of C-ITS.
4.3 ITS and ‘Privacy’
Privacy is the subject of National Regulation, but most countries have signed up to one or more of OECD,
APEC and/or European Union principles for personal privacy.
The subject of how ‘privacy’ regulations affect ITS, the variations of ‘privacy’ regulations around the
world, and general measures that ITS should adopt in respect of ‘privacy’ and ITS are dealt with in
ISO/TR 12859.
Suffice to say, in summary that ISO/TR 12859 recommends that the conditions under which data shall
be collected and held in support or provision of ITS services shall uphold all of the following principles:
a) Avoidance of harm Recognize the interests of the individual to legitimate expectations
of privacy, personal information protection; prevent the misuse
of such information. Further, acknowledging the risk that harm
may result; take account of such risk, and remedial measures
should be proportionate.
b) Fairly and lawfully Personal data obtained and processed fairly and lawfully.
c) Specified, explicit and legitimate purposes Personal data collected for specified, explicit and legitimate
purposes.
d) Explicit and legitimate and must be determined Purposes for which personal data are collected shall be deter-
at the time of collection of the data mined at the time of the collection of the data and shall be explicit
and legitimate at the time of collection of the data and use and
subsequent of the data limited to the fulfilment of those purposes
(or such others as are not incompatible with those purposes
specified); All personal data collected shall be adequate, relevant
and not excessive in relation to the purposes for which they are
processed.
e) Not further processed in a way incompatible Personal data shall not be further processed or used in a way
with the purposes for which it was originally collected incompatible with the purposes for which it was originally collected.
f) Not be disclosed without the consent of the data Personal data shall not be disclosed, made available or otherwise
subject used for purposes other than those specified.
g) Adequate, relevant and not excessive in relation Personal data shall be adequate, relevant and not excessive in
to the purposes for which they are collected relation to the purposes for which they are collected and/or
further processed.
h) Accurate and, where necessary, kept up to date Personal data shall be accurate and kept up to date; every rea-
sonable step must be taken to erase or rectify inaccurate or
incomplete data, having regard to the purposes for which they
were collected.
i) Identification of data subjects for no longer than Personal data shall be kept in a form which permits identification
is necessary for the purposes for which the data were of data subjects for no longer than is necessary for the purposes
collected for which the data were collected or for which they are further
processed.
j) Restricted to those who have a demonstrable The use of personal data to be restricted to those who have a
‘need to know’ genuine need to know.
k) Clear and accessible Personal information controllers shall provide clear and easily
accessible statements about their practices and policies with
respect to personal information that should include:
a) the fact that personal information is being collected;
b) the purposes for which personal information is being
collected
c) the types of persons or organizations to whom personal
information might be disclosed
d) the identity and location of the personal information
controller, including information on how to contact them about
their practices and handling of personal information.
l) Security safeguards Personal data should be protected by reasonable security
safeguards against such risks as loss or unauthorised access,
destruction, use, modification or disclosure of data.
m) Cumulative interpretation of multiple recom- In the development of ITS systems and standards, we are advised
mendations by legislators and lawyers that the recommendations cannot
just be taken individually in isolation, but the combination of
the recommendations may infer interpretations, this has sig-
nificant implications. Lawyers often refer to this as ‘cumulative
interpretation’
4.4 C-ITS ‘Privacy’ issues
NOTE General privacy requirements are not dealt with further in this document, and the reader is referred
to ISO/TR 12859 for further information on general aspects.
4.4.1 General C-ITS ‘Privacy’ issues
This Technical Report refers to the specific issues of privacy and privacy protection introduced by
C-ITS service provision, the C-ITS environment, C-ITS data exchanges, and the date storage, mining and
consolidation made possible by C-ITS.
In the introduction it was stated that a distinguishing feature of ‘ITS’ are its communication with
outside entities, and that a distinguishing feature of ‘C-ITS’, is that data is used across application
(2.1)/service boundaries. One can see that while ITS itself has to be very privacy aware, C-ITS has
particular opportunity to compromise that privacy if not managed in a way to protect personal privacy.
Furthermore, the use of data ‘across application/service boundaries‘ runs the risk to conflict with the
privacy regulations requirement “Not further processed in a way incompatible with the purposes for
which it was originally collected ”.
C-ITS applications rely on vehicles broadcasting signals to indicate their location, signals which are
intended to be received and understood by a range of other devices. This raises a significant privacy
issue: should C-ITS enable persons or organisations — either governments or private-sector companies
— be able to locate and track specific vehicles? Clearly, without knowledge of the exact location and
direction of movement of a vehicle, applications such as ‘collision avoidance’ nor even collision risk
warnings’, nor ‘ice alerts’ and other ‘road obstacle’ alerts would be possible. The risk for C-ITS consumers
is that this information will be ‘personal information’ if their identity can be acquired or construed or is
otherwise apparent. This is feasible if those that have access to location data can link the unique vehicle
identifier (or series of identifiers) of the C-ITS signal to a registered vehicle and, in turn, to an individual
(a registered owner). This information could be in real time (where the vehicle is presently located) or
historic (where the vehicle was at a certain time on a certain day).
While the opportunities for improved road safety, traffic management and law enforcement are
considerable, many individuals would not expect the movement of their private vehicle, and by
extension themselves, to be plotted across the network by a government or a third party. This is a valid
and legitimate concern and will require both government and industry to practice in good faith the
privacy principles based on legal requirements, particularly in respect to the purpose of collection,
data storage disclosure, and sharing of data.
4 © ISO 2015 – All rights reserved
The likelihood and significance of the privacy risk will depend on the extent to which the data is/are
anonymised and the nature of the controls in place with respect to collecting the data and linking
information to individuals. It will also depend on which bodies hold relevant data, (such as certificate
information).
C-ITS is intrinsically linked to the movement and exchange of data, and cooperation among the various
entities acquiring the information is often expected. In this situation, responsibilities need to be assessed
in terms of security risks and possible threats to privacy, as some of the data will be purely situational
or anonymous, while other data, either by itself or as part of multiple data sets, which independently
can be purely situational or anonymous, taken together can provide personal information.
The definition of personal information is sufficiently broad to include location information if that
information is about an individual whose identity is apparent or can be reasonably ascertained from
that information. Australia, for example, succinctly defines personal information as “Information or an
opinion (including information or an opinion forming part of a database), whether true or not, and whether
recorded in a material form or not, about an individual whose identity is apparent, or can reasonably be
[28]
ascertained, from the information or opinion.’ (Privacy Act.1988).
Location information can be a very personal matter worthy of privacy protection, even if the movements
and activities of an individual are within the law. In a report regarding surveillance activities; an
Australian body, the Victorian Law Reform Commission, reflected on location information:
“The need to retain privacy in public places is sometimes concerned with the desire to keep particular
information private. This information may relate to a person’s political views, medical issues (such as
attendance at an abortion clinic or a drug and alcohol treatment centre), and social matters (such as
attendance at a gay bar). It is strongly arguable that people ought to be able to restrict access to information
about themselves of this nature.”
Consumers make choices that impact upon their privacy in many ways. For example, most people accept
that certain location information can already be tracked, particularly through their mobile phone and
location-based applications. They do so because of the advantages that these applications afford them,
and – implicitly – because they trust the service providers to handle their personal information securely
and responsibly. However, the ability for individuals to make this choice is important.
These privacy issues mirror a bundle of technology innovations that pose comparable risks, from ANPR
to facial recognition technology. Privacy issues are also becoming increasingly cross-border in nature,
due to the move towards cloud computing where personal information may be held anywhere in the
world (or in multiple places).
In order to do responsibly manage these risks, and to avoid or minimize the risk of transgressing privacy
and data security regulations, three general rules should ideally be observed regarding C-ITS data.
— With the exception of imminent safety of life applications (collision avoidance, ramp access, etc.),
data should be anonymised before being sent to any third party.
— Data collected for imminent safety of life applications should be stored for only a very short period
of time ,— the minimum necessary to achieve its task, and in any event no longer than 24 hours may
be suggested.
— Unless determined by the jurisdiction to be for ‘safety of life of others’, those wishing to benefit
from service provision where their personal data may be required for the provision of such service
should specifically need to ‘opt-in’ to such services, acknowledge the use of their personal data in
such service provision, and be advised how long such data are stored, and how to opt-out of such
service provision.
Regardless of good intent, failure to observe these tenets is likely to cause friction with privacy
regulators in most jurisdictions and may well result in the C-ITS application being prevented.
However, in order to achieve the life saving benefits of safety systems such as collision avoidance,
ramp access, grade crossing warnings/control etc., some jurisdictions may want to require use of the
C-ITS safety systems, as the lives, not only of the specific vehicle driver, but other road users, may be
compromised/risked if a driver can chose to opt-out of the C-ITS service provision. For example, in the
US, NHTSA 05-14. “……NHTSA will then begin working on a regulatory proposal that would require V2V
devices in new vehicles in a future year, consistent with applicable legal requirements, Executive Orders,
and guidance.”
This places difficult dilemmas to the jurisdiction (that will be a matter of National decision, not an ISO TR).
(Past regulated analogies include things like the use of direction indicators, brake lights, safety belts,
traction control systems, etc.)
4.4.2 Examples of vehicle tracking
Vehicle tracking technology is widely utilized around the world today. Many telematics systems
include a level of tracking, for example, to provide emergency assistance or to track stolen vehicles.
Vehicle tracking technology is also a common component of commercial freight management systems,
and many modern ‘SatNav’ systems provide traffic information based on data submitted from other
vehicles, and recipient vehicles therefore also provide their location data so that the service company
can analyse traffic conditions and advise those in or approaching problem spots.
Telematics are increasingly used for insurance and crash-liability purposes. Systems may record
information regarding driving style, including speeds, distances, time of day and harsh braking events.
While offering safety benefits for drivers, and cost benefits (lower insurance premiums etc.), telematics
devices are also capturing driver behaviour and vehicle location information.
Infrastructure providers also utilize vehicle-tracking technology in a range of circumstances.
Enforcement agencies have applied ANPR technology for many years to track vehicles through point-
to-point systems or mobile units, while tolling systems record certain vehicle information for the
purposes of road user charging. In some countries (such as Australia), vehicle tracking technology is
also required for certain types of commercial vehicles in return for access to the transport network and
management of vehicles using the transport network. These systems typically have stringent controls
in place to govern the collection, use, access and disposal of information.
Some stakeholders have suggested that, due to the significant vehicle tracking which already takes
place, and because most vehicle users carry cell phones that either enable them to be tracked, or at the
least identify which communications cell they are linked to, additional information collection through
C-ITS is likely to have a minimal impact. However, all technologies that have an impact on privacy
require a risk assessment and systems appraisal to ensure compliance with the privacy principles, and
as has been seen above, the law, though it may vary to some extent from jurisdiction to jurisdiction, is
demanding in most countries of the world in respect of personal privacy protection.
To consider any potential threat to privacy caused by C-ITS, it is necessary to consider two aspects in a
little more detail:
— the extent to which C-ITS data will be anonymous;
— the deployment model for C-ITS.
4.4.3 Anonymity
While this paper is intended to focus on the policy principles and not specific technologies, the privacy
issues will to some extent be framed by the technology solutions implemented and in particular the
extent to which C-ITS signals generated by vehicles can be anonymised. This is critical given that the
surest way to protect privacy is not to gather the personal information in the first instance.
International standards for C-ITS are in development. A focus of these standards needs to be that
intelligent transport systems (2.6) will be developed with a ‘privacy by design’ objective. There may,
however, be limitations on whether true anonymity can be achieved. For security purposes, vehicles are
likely to be required to have a form of security certificate (similar to those for secure websites) in order to
ensure that signals are legitimate and prevent false signals being generated. While security certificates
6 © ISO 2015 – All rights reserved
for drivers or vehicles are still under development, it is expected that these will need to be authenticated
by a certification authority to ensure that false signals are not recognized within the system.
Further, many safety of life C-ITS applications (such as collision avoidance, ramp access, etc.) require
timely and precise positional, directional and speed data in order to perform their critical safety of
life objectives; other systems (such as obstacle and road condition alerts) work efficiently if they are
targeted only to vehicles in or approaching specific locations/direction of travel. Both of these examples
and others require location and positioning data, and that former group of services needs to target
messages to specific (therefore identified) vehicles.
This means that, much like providing details to purchase a mobile phone, individuals – personally
or through vehicle registration – will likely need to identify themselves in some way to gain access
to the system. This creates a unique identifier, or collection of identifiers, that can potentially link a
vehicle’s activity to a vehicle registration number or individual license number. Whilst the intention
is to make the signals generated by vehicles anonymous, there may remain the ability to trace, via the
certification authority, these identity numbers back to an individual. In fact there may be a need to do
so, if individuals within the system need to be penalised for misuse of devices (for example, hacking
a device so that it broadcast an incorrect signal). These issues will also feed into decisions around
governance, such as which body should act as the certification authority and whether this needs to be
separated from road authorities.
Indeed the C-ITS paradigm may be compared to mobile telecommunication services. Private mobile
telecommunication network providers collect personal information from subscribers (customers) to
establish accounts. These providers link communications data (calls, SMS, Internet access for third
party applications) from subscriber devices to the individual subscriber accounts for billing purposes.
In linking the communications data to an individual, the communications data becomes “personal
information” and hence its collection, use, disclosure and handling are governed by Privacy Principles
[38]
under existing privacy regulations. Specific privacy legislation is therefore not required.
This is the approach that has already been taken in a number of C-ITS initiatives to date, namely to
acknowledge the privacy implications and build the initiative within them rather than re-inventing for
each initiative. Indeed, it is quite dangerous to even ask this question without the context of the specific
C-ITS application defined. It is the data to be collected and the underlying policy intent that will define
[38]
the use and disclosure of personal information not simply a ‘cross-cutting’ technology such as C-ITS.
In 2011, the Canadian Information and Privacy Commissioner of Ontario published a paper that
considered the privacy implications of Wifi and MAC addresses. The discussion paper discusses the
privacy challenges associated with MAC addresses and makes the following suggestions:
— privacy is predicated on providing individual mobile device users with personal control, alongside
openness and transparency on the part of the provider;
— in no case should the MAC address of an individual’s mobile device be collected or recorded without
the individual’s consent;
— privacy by design is now the international standard for privacy and should be used by engineers to
ensure privacy is embedded in the systems architecture; the potential for possible unintended uses
should form part of the privacy risk analysis;
— Wifi protocols should seek to randomize MAC addresses or ensure privacy through a proxy-like
method of assigning addresses; innovative solutions will be required to change the existing model
of using persistent MAC addresses that remain uniquely bound to a mobile device.
Industry does not necessarily agree that an IP or MAC address will always constitute personal
information, and it has been observed that:
A MAC address or an IP address information is rarely going to be in and of itself information about
an identifiable individual in the sense of having a precise connection and being directly related to an
identifiable individual. But it is the context of how the MAC address or IP address is combined with
other information (or could be reasonably be combined with other information) that has privacy
advocates concerned.
Further work needs to be undertaken to establish whether communications media such as Wifi or
Bluetooth can provide C-ITS functionality without it being possible for an entity to link the unique
address to the identity of the owner.
In the event that the individual ‘owner’ of a C-ITS signal can be reasonably identifiable, the privacy
principles outlined in this report will always apply.
As stated above, the issues are not just the choice and privacy of the driver. Some jurisdictions may want
to require use of the C-ITS safety systems, as the lives, not only of the specific vehicle driver, but other
road users, may be compromised/risked if a driver can chose to opt-out of the C-ITS service provision,
depriving others of vital, life-saving information, and this places difficult dilemmas to the jurisdiction
(that will be a matter of National decision, not the advice of an ISO TR).
As with ANPR technology, the privacy regulators of many jurisdictions rule that vehicle registration
numbers, when collected by government authorities with the means to link those numbers to
individuals’ names and addresses, are likely to be personal information. This principle extends to
C-ITS and regulators around the world are likely to come to the same opinion. The question will be
whether the broadcast identity number can be linked back to an individual, either directly or through
a process or data mining or matching. At the same time, if a service provider collects a vehicle’s unique
number but has no method to match that number to a vehicle registration or individual, then it is not
the collection of personal information.
At issue is how easily, if at all, a C-ITS vehicle signal can be linked to a particular individual. In the
event that genuine anonymity is not attainable, consideration should be given as to how privacy can
otherwise be ensured.
4.4.4 Deployment models
The privacy impact of C-ITS applications will vary depending on the deployment model introduced for
C-ITS. At a broad level, three options are available.
— Opt-in model – where consumers must explicitly purchase, or opt for C-ITS applications and, as part
of this consumer choice, they accept the consequent privacy implications as part of the contract
or access terms and conditions. While this approach may result in a lower take-up of C-ITS, and a
smaller realization of the safety benefits of the technology, the opt-in model is the most privacy-
friendly option.
— Opt-out model – where consumers purchase a vehicle and C-ITS would be operational by default,
but with the ability to be switched off. Whilst this approach is likely to result in a higher uptake
of C-ITS and consumers are still empowered to make decisions, they may not be as aware of their
available choices and the resultant privacy implications.
— Mandatory model – where all new vehicles in the future are built with C-ITS and, potentially, all
older vehicles are required to be retrofitted with C-ITS. This approach would provide the greatest
safety benefits, but the privacy implications of C-ITS would become of much greater significance for
the community, and the implementati
...








Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.
Loading comments...