0% found this document useful (0 votes)
522 views16 pages

Presentation Hong Kong 2021

The document discusses Italy's COVID-19 tracking app called Immuni, which uses a decentralized approach to contact tracing that stores data locally on users' devices rather than a centralized server. It summarizes the app's characteristics including how it collects anonymized data about proximity contacts and exchanges encrypted metadata between smartphones. The document also examines privacy issues, the balance between public health and individual rights, and debates around technology's role and potential biases in pandemic response.

Uploaded by

elena_fa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
522 views16 pages

Presentation Hong Kong 2021

The document discusses Italy's COVID-19 tracking app called Immuni, which uses a decentralized approach to contact tracing that stores data locally on users' devices rather than a centralized server. It summarizes the app's characteristics including how it collects anonymized data about proximity contacts and exchanges encrypted metadata between smartphones. The document also examines privacy issues, the balance between public health and individual rights, and debates around technology's role and potential biases in pandemic response.

Uploaded by

elena_fa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

Privacy Protection, big data gathering and

public health issues:


COVID-19 tracking app use in Italy

Elena Falletti, Carlo Cattaneo University, Italy

Human Sovereignty and Machine Efficiency in the Law


January 14-16, 2021, The Chinese University of Hong Kong
The Italian tracking app Immuni
● The emergency regarding the containment of
COVID-19 outbreak
● Two different approaches
– The centralised model (in which anonymised data
gathered are uploaded to a single national remote server)
– The decentralised model (that keeps personal information
on the users’ device)
● Role of Google/Apple infrastructure
● Italian choice: the Immuni app
The Italian regulation
● Italian Constitution: Article no. 13 (Right to freedom) and Article
no. 16 (Freedom of movement)
● Article no. 7 and no. 8 of the Charter of Fundamental Rights of
the European Union
● Article no. 5 GDPR
● Article no. 28 GDPR
● Article No. 9 E-privacy Directive
● Article No. 15 E-privacy Directive
● Article n. 6 Law-Decree 28/2020 (Decree-Law, amended and
converted by L. 25 June 2020, n. 70)
Characteristics of Immuni/1
● Collection of big data and management through a black box
● National platform system management alert
● The “Immuni app” is intended for recording only contacts
between subjects who have also downloaded the application
● Privacy protection, individual consent, and local data
management are considered preferable to mandatory
traceability
● Explicit and informed consent given by the interested party
who has downloaded the app on his/her smart device
Characteristics of Immuni/2
● The processed data collected regards proximity
contacts
● Data retention is limited to the stricly necessary
time
● According to the Italian Government, privacy
protection, individual consent, and local data
management were considered preferable to
mandatory traceability and centralised
management of the same data
Characteristics of Immuni/3
● Why is this so?
- privacy by design
- preventing third party access to personal data
collected on the smartphones by sending a package of
personal information linked to a double exchange of
anonymised code
● The aim of this process is to prevent the recombination
of the anonymised data with the decoding keys that
could be able to reconstruct user identity
Immuni tracking process
● The starting point regards contact tracing, which identifies
contacts between smartphones and exchanges encrypted
metadata stored in each smartphones.
● It is possible through random, pseudo-anonymised and dynamic
identifiers such as:
- The RIP (Rolling Proximity Identifier) to them once processed
by secondary and random keys
- i.e. the RPIK (Rolling proximity Identifier Key).
● These keys are produced by primary keys such as the TEK
(Temporary Exposure Key) which have a longer duration than
the RPI.
Inferential re-identification

● This tracking methodology falls down on the the


“disconnection” of the tracing data from the
identity of the users
● This is the so-called the “inferential re-
identification” by users to reconstruct the
contact chain backwards up to the person at
the origin of the infection
A crossroad opens up
● It may be asked whether “an act of trust” is enough to
implement a tracking infrastructure that is extraneous to
European jurisdiction proposed by Google/Apple approach.
- This should be prevented in favour of EU member states’
jurisdiction.
● On the other hand, considering whether releasing an open
source programme code is a proper solution, enhancing the
retention of data on personal devices, instead on a platform,
although the law itself allows such data to be used in
aggregate or anoymous for for public health or scientific
purposes.
The Italian case
● In the Italian case, this platform is managed by the
Ministry of the Health which, through a “Diagnosis
Server”, exchanges the daily TEK identification data
associated with positive cases, verified with the list of
RPIs stored on the same smartphone during a specific
time.
● In this procedure the Apple/Google software acts like a
bridge, permitting the verification of the steps backwards
by reconstructng the data collected (TEK, RPIK, RIP) in
order to trace the reference device from which the
contagion alert was sent.
A matter of worthiness choices?
● Two alternatives could be kept in mind:
1) it might be wondered whether turning to an
assumed redemptive power of technology is
acceptable, since technology should be
capable of “bypassing” and resolving
autonomously such legal issues trought an
autoritative power of Government
A matter of worthiness
choices?/2
2) the second option regards the decisions to whether
complying with the traditional hierarchy of legal sources,
starting from source of protection of inviolable rights, should
be preferable.
● In anycase the juridical form of the technological tool (i.e.
Immuni) is important, and legitimates the scaffolding that for
reasons of protection of public health imposes very invasive
restrictive measures on personal freedom of each person
Nevertheless, the tracking app should be adopted within the
limits set by the Constitution, which in these serious
circumstances seem weak.
Neutrality and blindness
● The app architecture should be detailed with the prior
assessment of the effects and possible impacts on the rights
and freedoms of the persons concerned
● Technology is not neutral even if it is blind (C. Schmitt)
● On the contrary blindess can lead to serious discrimination in
its use
● The sensitive issue regards the fact that these data do not
concern only protection of health, but also other fundamental
personal goods and rights involved in data proceedings, such
as personal freedoms or the right of movement and assembly
Some final remarks
● As of 11 January 2021 Immuni has been downloaded
10.139.326 times, with a strong increase in recent
weeks, sending 84.460 notifications and reporting 8.469
positive users (source: Immuni website).
● These data suggest that the rate of utilization (and of
feedback in the tracing of positives) was scarce
● Indeed, it reveals a serious problem concerning the
ability to trace, and thus isolate, the contacts of positive
persons.
Short Bibliography
● Calderini, B., Covid-19, tra diritto alla salute e tutela della privacy: la scelta che l’Italia deve fare, https://agendadigitale.eu,
24.3.2020
● Cosgriff, C. V., Ebner, D. K., Celi, L. A., Data sharing in the era of COVID-19, The Lancet, Digital Health, 2020, 2, E22,
https://doi.org/10.1016/S2589-7500(20)30082-0
● Degeling, C. Carter, S. M., van Oijen, A. M., McAnulty, J., Sintchenko, V., Braunack-Mayer, A., Yarwood, T., Johnson, J., Gilbert,
G. L., Community perspectives on the benefits and risks of technologically enhanced communicable disease surveillance
systems: a report on four community juries, BMC Med Ethics 21, 31 (2020)
● Edwards, L., Tracking the debate on COVID-19 surveillance tools, Nature Machine Intelligence, 2, June 2020, 301
● Ferretti, L., Wymant, C., Kendall, M., Zhao, L., Nurtay, A., Abeler-Dörner, L., Parker M., Bonsall, D., Fraser, C., Quantifying
SARS-CoV-2 transmission suggests epidemic control with digital contact tracing, Science, (2020), 10.1126/science.abb6936;
● Frosini, T. E., Anonimato, privacy, niente obbligo: le salvaguardie ora ci sono, 5.5.2020,
https://www.ildubbio.news/2020/05/05/anonimato-privacy-niente-obbligo-le-salvaguardie-ora-ci-sono/
● Gibney, E., Whose coronavirus strategy worked best? Scientists hunt most effective policies, Nature 581, 15-16 (2020)
● Harari, Y. N., The World After Coronavirus, Financial Times, 20.3.2020;
● Lu, N., Cheng, K. W., Nafees Qamar, P., Huang, K. C., Johnson, J. A., Weathering COVID-19 Storm: Successful Control
Measures of Five Asian Countries, AJIC: American Journal of Infection Control (2020), doi:
https://doi.org/10.1016/j.ajic.2020.04.021
● Shu Wei Ting, D., Carin, L.. Dzau, V., Wong, T. Y., Digital technology and COVID-19, Nature Medicine volume 26, pages459–
461(2020);
● Trucco, L., App. Immuni una storia stran(ier) e incompiuta, 25.5.2020, www.giustiziainsieme.it

You might also like