The present disclosure relates generally to data privacy control. More particularly, the present disclosure relates to systems and methods for managing data privacy with respect to building management systems.
Building management systems (BAS) are routinely used to monitor, control, and automate building controls, which may include security systems, surveillance systems, environment control systems, etc. In some systems, personally identifiable information (PII) is captured and stored within the system. An increasing level of security defense mechanisms have been needed as these systems have evolved from closed proprietary systems to convenient, connected, and open systems over the years. Open systems were adopted in a trend shift for increased convenience, improved connectivity, and improved productivity. However, these systems have become more vulnerable to exploits due to the widespread knowledge about open system vulnerabilities, leaving PII vulnerable as well. Further, privacy compliance laws have changed over the years, creating a need for updated privacy compliance management. Among other things, industrial facilities have used public-key infrastructures along with digital certificates to help increased security in their industrial control systems. However, improved techniques to help secure control systems such as building management systems, as well as PII, would be desirable.
The present disclosure relates generally to data privacy control, and more specifically to systems and methods for managing privacy data to maintain compliance with privacy regulations in association with building management systems. Generally, privacy parameters may be received regarding personal identifiable information and a building management system may operate in accordance with the received privacy parameters.
In one example, a method for managing data privacy of personal identifiable information in a building management system may include presenting a data privacy survey via a user interface of a data processing system. The data privacy survey may identify a plurality of types of personal identifiable information (PII) that may be collected by the building management system, and a plurality of data privacy settings for each of the plurality of types of PII. The method may include receiving a setting change to at least one of the plurality of data privacy settings for at least one of the plurality of types of PII, setting one or more constraints in the building management system for each of the plurality of types of PII, wherein the one or more constraints for each of the plurality of types of PII may be based at least in part on the corresponding plurality of data privacy settings. The method may further include operating the building management system in accordance with the set constraints.
In another example, a building management system may include a memory for storing a plurality of types of personal identifiable information (PII) that may be collected by the building management system, and a plurality of data privacy settings for each of the plurality of types of PII. The system may include a user interface, and a processor which may be operatively coupled to the memory and the user interface. The processor may present a data privacy survey via the user interface. The data privacy survey may identify the plurality of types of personal identifiable information (PII) that may be collected by the building management system, and the plurality of data privacy settings for each of the plurality of types of PII. The processor may further receive a setting change to at least one of the plurality of data privacy settings for at least one of the plurality of types of PII, set one or more constraints for each of the plurality of types of PII, wherein the one or more constraints for each of the plurality of types of PII may be based at least in part on the corresponding plurality of data privacy settings. The processor may operate the building management system in accordance with the set constraints.
In another example, a non-transitory computer readable medium storing instructions thereon that when executed may cause a processor to present a data privacy survey, which may identify a plurality of types of personal identifiable information (PII) that may be collected by the building management system, and a plurality of data privacy settings for each of the plurality of types of PII. The instructions may cause the processor to receive a setting change to at least one of the plurality of data privacy settings for at least one of the plurality of types of PII, set one or more constraints for each of the plurality of types of PII, wherein the one or more constraints for each of the plurality of types of PII may be based at least in part on the corresponding plurality of data privacy settings. The instructions may further cause the processor to operate a building management system in accordance with the set constraints.
The preceding summary is provided to facilitate an understanding of some of the innovative features unique to the present disclosure and is not intended to be a full description. A full appreciation of the disclosure can be gained by taking the entire specification, claims, figures, and abstract as a whole.
The disclosure may be more completely understood in consideration of the following description of various examples in connection with the accompanying drawings, in which:
While the disclosure is amenable to various modifications and alternative forms, specifics thereof have been shown by way of example in the drawings and will be described in detail. It should be understood, however, that the intention is not to limit the disclosure to the particular examples described. On the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the disclosure.
The following description should be read with reference to the drawings, in which like elements in different drawings are numbered in like fashion. The drawings, which are not necessarily to scale, depict examples that are not intended to limit the scope of the disclosure. Although examples are illustrated for the various elements, those skilled in the art will recognize that many of the examples provided have suitable alternatives that may be utilized.
All numbers are herein assumed to be modified by the term “about”, unless the content clearly dictates otherwise. The recitation of numerical ranged by endpoints includes all numbers subsumed within that range (e.g., 1 to 5 includes, 1, 1.5, 2, 2.75, 3, 3.8, 4, and 5).
As used in this specification and the appended claims, the singular forms “a”, “an”, and “the” include the plural referents unless the content clearly dictates otherwise. As used in this specification and the appended claims, the term “or” is generally employed in its sense including “and/or” unless the content clearly dictates otherwise.
It is noted that references in the specification to “an embodiment”, “some embodiments”, “other embodiments”, etc., indicate that the embodiment described may include a particular feature, structure, or characteristic, but every embodiment may not necessarily include the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same embodiment. Further, when a particular feature, structure, or characteristic is described in connection with an embodiment, it is contemplated that the feature, structure, or characteristic may be applied to other embodiments whether or not explicitly described unless clearly stated to the contrary.
The present disclosure relates generally to data privacy control, and more specifically to systems and methods for managing privacy data to maintain compliance with privacy regulations in association with building management systems. Building management systems can include, for example, surveillance systems, environment control systems, security systems, and/or any other suitable building control system. Typical components of building management systems include, but are not limited to, heating units, air conditioning units (e.g., cooling units), blowers/fans, control panels, dampers, humidifiers, dehumidifiers, thermostats, occupancy sensors, access control devices, cameras, video recorders (e.g., video cameras, digital video recorders (DVRs), network video recorders (NVRs), video servers, streaming servers, database servers), network communication components, modems, routers, etc. Building management systems may include 10s, 100s, or even 1000s or more of components, where one or more of the components may be internet protocol (IP) enabled (e.g., IP enabled components) and are configured to communicate over one or more public and/or private networks. Since the building management system 10 may include one or more components connected to one or more networks, it is often desirable for the data (e.g., PII) of the building management system 10 to be secured from unauthorized access, unauthorized deletion, and/or unauthorized modification.
The one or more networks on which the devices of the building management system 10 may communicate may be any suitable type of network that facilitates interaction (e.g., transfer of data, information, actions, requests, and/or other suitable communication) between the building management devices, the one or more building management clients, the user accounts, and/or other suitable components of the building management system 10. For example, networks include, but are not limited to, an Ethernet network, an electrical signal network, a pneumatic control signal network, and/or other suitable additional or alternative networks. The one or more networks may be or may include a local or private network (e.g., a local area network (LAN)) and/or global or public network (e.g., a wide area network (WAN)).
The building management devices may be any suitable type of device configured to facilitate management of a building. In some cases, the building management devices may include a computing device having a processor, a memory, an input/output (I/O) unit (e.g., which may include a communications unit), and/or other suitable computing components. In some cases, the I/O units may include a single I/O component or more than one I/O component each working individually or with one another. Example I/O units may be any type of communication ort configured to communicate with other components of the respective building management devices and building management clients, and/or other components of the building management system 10. Example types of I/O units may include wired ports, wireless ports, radio frequency (RF) ports, Low-Energy Bluetooth ports, Bluetooth ports, Near-Field Communication (NFC) ports, HDMI ports, Wi-Fi ports, Ethernet ports, VGA ports, serial ports, parallel ports, component video ports, S-video ports, composite audio/video ports, DVI ports, USB ports, optical ports, and/or other suitable ports. Example building management devices may include, but are not limited to, cameras, data recorders, database servers, streaming servers, video servers, thermostats, heating, ventilation, and air conditioning (HVAC) equipment, sensors, actuators, controllers, and/or other suitable devices. One example building management system 10 may include a surveillance system that has one or more building management devices.
In some cases, as shown in
The data privacy configurator 20 may include the processor 14, the memory 16, and the user interface 12. In some cases, the processor 14 may include a single processor or more than one processor working individually or with one another. The processor 14 may be configured to execute instructions, including instructions that may be loaded into the memory 16 and/or other suitable memory. Example processor components may include, but are not limited to, microprocessors, microcontrollers, multi-core processors, graphical processing units, digital signal processors, application specific integrated circuits (ASICs), field programmable gate arrays (FGAs), discrete circuitry, and/or other suitable types of data processing devices.
The memory 16 of the data privacy configurator 20 may include a single memory component or more than one memory component each working individually or with one another. Example types of memory 16 may include random access memory (RAM), EEPROM, FLASH, suitable volatile storage devices, suitable non-volatile storage devices, persistent memory (e.g., read only memory (ROM), hard drive, Flash memory, optical disc memory, and/or other persistent memory), and/or other suitable types of memory. The memory 16 may be or may include a non-transitory computer readable medium.
The user interface 12 of the data privacy configurator 20 may include a display and/or a data input device such as a keyboard, a keypad, a joystick, a touch pad, and the like, but this is not required. In some cases, the data privacy configurator 20 may additionally or alternatively include a remote user interface that facilitates a user's interactions with the data privacy configurator 20. The user interface may be provided by a number of remote internet devices, including a smart phone, a tablet computer, a laptop computer, or a desktop computer. In some cases, the user interface may communicate with the data privacy configurator 20 via a router such as, for example, a Wi-Fi or internet router. In other cases, the user interface may be provided at the data privacy configurator 20, as indicated by the user interface 12.
Since the building management system 10 may include one or more components connected to one or more networks, it is often desirable for the data (e.g., PII) of the building management system 10 to be secured from unauthorized access, unauthorized deletion, and/or unauthorized modification. In some cases, components of the building management system 10 may require user authentication via a username and password, biometrics, and/or other suitable user identifying techniques. The system may store user information such as, for example, the user's name, the user's phone number, the user's gender, the user's nationality, the user's Visa number, the user's passport number, the user's driver's license number, the user's photograph, the user's badge number, the user's government identification number, the user's license plate number, and the user's location. In some cases, such information may be stored in a central database to confirm the identity of the user, which may allow and provide appropriate access to the building management system 10. However, storing personally identifiable information (PII) in a central database may allow unauthorized access to and/or manipulation of data by inside threats (e.g., approved users) and/or outside threats (e.g., users that have not been approved for access). The user may be concerned about the security and privacy of their PII, thus it would be desirable to provide data privacy policies to enhance security and protection of the user's PII.
As discussed further below, the data privacy configurator 20 may be a component of the building management system 10, and may authenticate users and devices of and/or interacting with the building management system 10 and to secure the data, such as PII, stored within a memory (e.g., memory 16) of the building management system 10. The data privacy configurator 20 may be configured to manage data privacy of PII in the building management system 10. Managing the data privacy of PII may include the data privacy configurator 20 presenting a data privacy survey to a user (e.g. administrator or manager), via a user interface (e.g., user interface 12) of a data processing system. The data privacy survey may identify a plurality of types of personal identifiable information (PII) that will be collected by the building management system 10. In some cases, the system itself may help the user identify the types of PPI that will be collected by the system, depending on the configuration of the particular building management system (e.g. see
The data privacy survey may also identify a plurality of data privacy settings for each of the plurality of types of collected PII. The user may update a setting change to at least one of the plurality of data privacy settings for at least one of the plurality of types of PII, which may be received by the data privacy configurator 20. The data privacy configurator 20 may then set one or more constraints in the building management system 10 for each of the plurality of types of PII, wherein the one or more constraints for each of the plurality of types of PII may be based at least in part on the corresponding plurality of data privacy settings, and then may operate the building management system 10 in accordance with the set constraints.
The site location data 25b may include a geographic location of the building management system 10 (and/or the location/country that the PPI will be stored), which may include a country, a city, a site, and a site address in which the building management system 10 is located. Further, a set of rules to be applied based on the geographic location of the building management system 10, may be received by the data privacy configurator 20. For example, if the building management system 10 is located in Europe, the set of rules may include the General Data Protection Regulation (GDRP), whereas if the building management system 10 is located in the United Stated, a different set of rules may apply. The defined rules 25c may include subject types, access level rights, consent requirements, and a retention period for data stored.
Role-based access 25d may include the type of role the user holds as a user of the building management system 10. For example, user roles may include, a system administrator, a system operator, a facilities manager, an end user, a human resources employee, and/or any other suitable role. The role-based access 25d may be used to determine the PII data fields that can be viewed by a particular user, depending on the role of the particular user to help enforce access to PII on a need-to-know basis.
The legal requirements 25e may include contractual requirements, regulatory requirements, consumption requirements, operations requirements, and/or any other suitable legal requirements. The legal requirements 25e may determine the business purpose for capturing the PII, and may determine what data elements are eligible for inclusion under the data subject rights 25f. The data subject rights 25f, which reflect the privacy rights granted to the individual users of the building management system, may include the right to be forgotten, the right to data portability, the right to object, the right to access, the right to define restrictions, the right to corrections, and/or any other suitable privacy rights. The data subject rights 25f may determine which data fields will be available for viewing and enforce the processing of PII. For example, requests for data portability by a user may be handled via a secure portal in which the user may provide a one-time passcode to access the his/her information and download the information. In some cases, once accessed, the information is no longer available for viewing. In some cases, data subject requests may be processed automatically, while in other cases, a human resources employee or a facilities manager may need to access the system to process the request from the user.
In some cases, the one or more inputs 25 may include a plurality of data privacy settings for each of the plurality of types of PII 25a, such as, for example, a sensitivity setting relating to the sensitivity of the corresponding PII 25a, a legal requirement (e.g., legal requirements 25e) setting relating to whether the corresponding type of PII must be retained for legal reasons, a role access (e.g., role-based access 25d) setting relating to which user account types can access the corresponding type of PII, a user rights (e.g., data subject rights 25f) setting relating to the user rights granted to the user for corresponding types of PII, a location (site location data 25b) setting relating to the location that the corresponding type of PII was collected and/or stored, and rules (e.g., defined rules 25c) setting relating which of a plurality of rules apply to the corresponding type of PII.
The user may indicate via the customer survey 22 one or more setting changes for each of the plurality of data privacy settings for one or more of the one or more inputs 25. The data privacy configurator 20 may receive the setting changes from the customer survey 22, and may produce one or more outputs 26. The one or more outputs 26 may include a privacy impact assessment (PIA) 26a, configuration data for products 26b, a log of all transactions 26c, and a system alert 26d (collectively one or more outputs 26), in which an alert is sent to the user if and when any edits to the building management system 10 and/or the settings for the plurality of data privacy settings that are not compliant with the user defined data privacy settings are found.
The data privacy configurator 30, at the determine block 46, may receive a plurality of data privacy settings, such as, for example, a set of defined rules 32 (e.g., define rules 25c) and site location data 37 (e.g., site location data 25b). The data privacy configurator 30 may use the data privacy settings received at block 46, to determine when consent is required by the user to access and/or change the PII 31, a data retention period which determines how long the PII 31 may be stored, and the access level required to access the PII 31.
The data privacy configurator 30 may generate a privacy impact assessment report (PIA) 41 that documents the plurality of data privacy settings for each of the plurality of the types of PII 31. The PIA 41 may further include one or more constraints. The one or more constraints may be set in the building management system 10 for each of the plurality of types of PII 31, based at least in part on the corresponding plurality of data privacy settings. The one or more constraints may include one or more of: use constraints, access constraints, and retention constraints. In some cases, the one or more constraints may include constraints on where at least some of the plurality of types of PII 31 may be geographically processed and/or stored. In some cases, the building management system 10 may be subsequently operated in accordance with the set constraints.
The data privacy configurator 30 may further generate configuration data for products used with the building management system 10, as referenced at block 42, and a log of all transactions 43. For example, the log of all transactions 43 may include one or more requests submitted to exercise one or more of the data subject rights 36 (e.g., a user's rights) associated with the type of PII 31 and the corresponding responses to the requests. In some cases, the data privacy configurator 30 may be configured to monitor the data privacy process, at block 44, and when necessary, create a system alert 45, in which an alert is sent to a user (e.g. administrator or manager) if and when any edits to the building management system 10 and/or the settings for the plurality of data privacy settings that are not compliant with the user defined data privacy settings are found.
At block 64, the user may set the data retention setting. This allows the administrator to determine how long certain information is stored within the memory of the building management system 10. For example, if an employee is terminated, the protocol for data retention on the terminated employee may be six months. In this case, six months after the employee has been terminated, all PII for that employee will be deleted from the memory of the building management system 10. Upon completion of the data privacy survey, the administrator may review and submit the survey, which then alerts an installer of the building management system product that is going to be installed at the administrator's site that the survey is complete.
In some cases, the user (e.g. administrator) is made aware of a privacy data breach, at block 53. The privacy data breach may include a change made to the operation of the building management system 10 that is not in compliance with the plurality of data privacy settings for each of the various types of PII, as set by the user (e.g. administrator). When the user is made aware of the data breach, the user may determine what triggered the breach, at block 54. In some cases, an alarm indicating a breach may occur when an unauthorized user (e.g., an employee without proper authority) makes an attempt to delete privacy data from the memory. In such cases, the user (e.g. administrator) may request for an action to be raised against the breach, and a human resources user may respond to the request for an action, at block 55. In the example of an unauthorized user attempting to delete privacy data from the memory, the human resources user may respond by contacting the unauthorized user and revoking privileges within the building management system 10. This is just an example. Further examples will be discussed with reference to
In the example shown, upon clicking tab 106, the user is brought to screen 110, which illustrates a “collected data” tab 107b from the menu 107, as shown in
In the example shown, upon clicking tab 112, the user is brought to screen 115, which illustrates a “data access setting” tab 107c from the menu 107, as shown in
In the example shown, upon clicking tab 117, the user is brought to screen 120, which illustrates a “data storage setting” tab 107d from the menu 107, as shown in
Upon clicking tab 121, the user may be brought to screen 125, which illustrates a “review and submit” tab 107e from the menu 107, as shown in
Upon clicking tab 132, the installer is brought to screen 135, which illustrates an “edit collected data” tab 131b of the menu 131, as shown in
Upon clicking tab 137, the installer may be brought to screen 140, which illustrates a “data access settings” tab 131c from the menu 131, as shown in
In the example shown, upon clicking tab 143, the installer is brought to screen 145, which illustrates a “data retention settings” tab 131d from the menu 131, as shown in
Upon clicking tab 147, the installer is brought to screen 150, which illustrates a “review and submit” tab 131e from the menu 131, as shown in
Once complete, the installer may select the “submit” tab 152, which will then submit the data privacy configuration for the purchased product for the building management system 10. The customer may then be notified that the product with the data privacy configurator (e.g., data privacy configurator 20 or data privacy configurator 30) has been commissioned, and the employees of the customer, “Doe Enterprises”, may be notified about their privacy rights pertaining to the product implemented in the building management system 10. In some cases, the user may choose to go to the previous screen by selecting the “previous” tab 126.
Upon selecting tab 166b, the user may be brought to screen 170, as shown in
Upon clicking the link 181, the user is brought to screen 185, as shown in
Upon selecting the tab 189, the user may be brought to screen 190, as shown in
Upon selecting the tab 192, the user is brought the screen 195, as shown in
As shown in
Upon clicking on the link 216 in the email, the HR user may be brought to a screen 220 of the privacy manager, as shown in
In the example show, upon selecting the “respond” tab 222, the HR user is brought to a screen 225, as shown in
In the example shown, when the HR user selects the “next” tab 232, the HR user is brought to a screen 235, as shown in
The illustrative method 300 may include receiving a setting change to at least one of the plurality of data privacy settings for at least one of the plurality of types of PII, as referenced at block 320. In some cases, the plurality of data privacy settings for each of the types of PII may include one or more of, a sensitivity setting relating to a sensitivity of the corresponding type of PII, a legal requirement setting relating to whether the corresponding type of PII must be retained for legal reasons, a role access setting relating to which user account types can access the corresponding type of PII, a user rights setting relating to the user rights granted to the user for the corresponding type of PII, a location setting relating to the location that the corresponding type of PII was collected, and rules setting relating which of a plurality of rules apply to the corresponding type of PII. These are just examples. The plurality of data privacy settings may define one or more user rights for each of the plurality of types of PII, wherein the user rights may include one or more of a right to be forgotten, a right to data portability, a right to object, a right to rectification, and a right to access control. These are just examples. In cases when the requested user right is a right to be forgotten, the building management system, in response, may delete the user's data associated with the type of PII.
The illustrative method 300 may include setting one or more constraints in the building management system for each of the plurality of types of PII, wherein the one or more constraints for each of the plurality of types of PII are based at least in part on the corresponding plurality of data privacy settings, as referenced at block 330, and operating the building management system in accordance with the set of constraints, as referenced at block 340. In some cases, the one or more constraints may include one or more of use constraints, access constraints, and retention constraints. Further, the one more constraints may include one or more constraints on where at least some of the plurality of types of PII can be geographically processed or stored.
In some cases, the method 300 may include informing users of the building management system of their user rights for each of the plurality of types of PII, as referenced at block 350. In some cases, the method 300 may include accepting a request from a user at the building management system to exercise one or more of the user rights associated with a type of PII, and in response, the building management system may automatically exercise the requested user right associated with the type of PII, as referenced at block 360, and logging all requests to exercise one or more of the user rights associated with a type of PII and the corresponding responses to the requests, as referenced at block 370. The method 300 may include generating a privacy impact assessment report that documents the plurality of data privacy settings for each of the plurality of types of PII, as referenced at block 380, and generating a privacy impact assessment report that documents the one or more constraints, as referenced at block 390. The method 300 may further include sending an alert when a change is made to the operation of the building management system that is not in compliance with the plurality of data privacy settings for each of the plurality of types of PII, as referenced at block 400.
Having thus described several illustrative embodiments of the present disclosure, those of skill in the art will readily appreciate that yet other embodiments may be made and used within the scope of the claims hereto attached. It will be understood, however, that this disclosure is, in many respects, only illustrative. Changes may be made in details, particularly in matters of shape, size, arrangement of parts, and exclusion and order of steps, without exceeding the scope of the disclosure. The disclosure's scope is, of course, defined in the language in which the appended claims are expressed.