Layertech Software Labs: TRACE.R
TRACE.R allows data subjects to track, be notified, and withdraw consent, whenever linked data is accessed or modified.
For the past few years, government data breaches have raised concern in the Philippines. In 2016, the Commission on Elections database on voters was leaked and posted online, including personally-identifiable sensitive information of affected voters. In the following years, we also encountered a number of issues involving identity theft leading to financial theft, which ultimately affected ordinary citizens.
Layertech believes that the data subject has to have control over his/her information. And for them to that they must be empowered, they must understand the implications and dangers of breaching data privacy, they must have the mechanisms that allow them to do so, and enabling policies to allow such mechanisms to be in place.
The 2012 Data Privacy act of the Philippines states that data subjects are allowed to the right of data portability, right to be informed, right to object, right to dispute inaccuracy, right to withdraw consent, and the right to indemnification should the personal data has been misused. Despite these laws however, we lack mechanisms to effectively, efficiently, and inclusively enforce these rights.
Having worked with various grassroot communities in a number of civic technology projects, Layertech is developing TRACE.R, a tracking mechanism which allows data subjects to control their personal data.
TRACE.R is a free to download mobile application in android (and soon in iOS) that allows users to track which government agency their data is being kept and how it is used using the user’s own unique ‘fingerprint’ hash code, which is generated upon submission of data to the agency. Should the government modify the data or share the data to another government agency, the user will be instantly notified about the changes and will be explicitly asked for his/her consent, if necessary.
The technical backbone of the system is actually very simple. It lies with generation of polymorphic encryption, with a unique hash code of the user. For every modification, the encryption morphs according to a corresponding function. This will not be decoded unless you have the ‘fingerprint’ hash of the owner, making the transmission secure when hijacked by hackers.
When the code of the user does not match the code of the government when the system connects, then it means that changes were made and the user’s end is updated, instantly notifying him/her of the changes, as well as the permissions the law needs the user to give.
TRACE.R empowers users to be informed, and exercise their rights of data privacy.
- Idea