{"id":134,"date":"2009-08-28T10:11:00","date_gmt":"2009-08-28T10:11:00","guid":{"rendered":"https:\/\/mhgoldberg.com\/blog\/?p=134"},"modified":"2009-08-28T10:11:00","modified_gmt":"2009-08-28T10:11:00","slug":"dpi-doesnt-invade-privacy","status":"publish","type":"post","link":"https:\/\/mhgoldberg.com\/blog\/?p=134","title":{"rendered":"DPI doesn&#8217;t invade privacy"},"content":{"rendered":"<p>While <a href=\"http:\/\/www.cippic.ca\/en\/\">CIPPIC<\/a> is deservedly collecting praise for its <a href=\"http:\/\/www.priv.gc.ca\/cf-dc\/2009\/2009_008_0716_e.cfm\">successful challenge<\/a> of Facebook&#8217;s privacy practices, it recently lost a challenge related to deep packet inspection (DPI).<\/p>\n<p>CIPPIC had argued that: (1) Bell uses DPI to collect and use personal information without customers&#8217; consent; (2) Bell collects more personal information than is necessary to ensure network integrity and service quality; and, (3) Bell does not adequately inform its customers of its practices.<\/p>\n<p>In a letter to CIPPIC and Bell, the Privacy Commission concluded that only the third complaint was &#8220;well-founded&#8221;:<\/p>\n<blockquote style=\"font-size: 85%; color: rgb(102, 102, 102); text-align: justify;\"><p>Accordingly, the complaint is not well-founded with regard to the two matters of consent and limiting collection, but well-founded with regard to the matters of openness. <\/p><\/blockquote>\n<p>In respect of increasing transparency, the changes sought appear relatively minor:<\/p>\n<ul>\n<li>Agreeing with Bell&#8217;s idea to add a FAQ on the <a href=\"http:\/\/www.bell.ca\/privacy\">Bell Privacy<\/a> web pages<\/li>\n<li>Adding a statement to Bell&#8217;s existing <a href=\"http:\/\/service.sympatico.ca\/index.cfm?method=content.view&amp;content_id=12119\">FAQ on network management<\/a> to state that the customer&#8217;s IP address is collected<\/li>\n<li>Adding a heading (along the lines of &#8220;Customer Service Information&#8221;) to Bell&#8217;s internet service agreements<\/li>\n<\/ul>\n<p>The Privacy Commission made some important statements in its 18 page Report of Findings.<\/p>\n<p>For example, the Privacy Commission found:<\/p>\n<ul>\n<li>Peer-to-Peer (P2P) applications are large users of bandwidth. Applications that are often used for music and movie file sharing between computers can consume a great deal of capacity and &#8220;slow down&#8221; other internet traffic;<\/li>\n<li>The investigation confirmed that the use of P2P does increase network traffic and that the widespread phenomenon of congestion is largely caused by user downloads or file sharing using P2P;<\/li>\n<li>DPI and other traffic management tools are among several means by which ISPs can optimize traffic flow.<\/li>\n<\/ul>\n<p>To what extent will these findings be consistent with the CRTC&#8217;s review of network management practices? Is this a foreshadowing?<\/p>\n<hr width=\"20%\" align=\"left\" \/><span style=\"font-size:85%;\"><b>Update<\/b> [August 28, 1:10 pm]<br \/>Here is a link to the OPC finding [<img decoding=\"async\" src=\"http:\/\/www.gstconferences.com\/pdf.gif\" \/> <a href=\"http:\/\/www.mhgoldberg.com\/OPC-DPI.pdf\">pdf<\/a>, 2.19MB] <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>While CIPPIC is deservedly collecting praise for its successful challenge of Facebook&#8217;s privacy practices, it recently lost a challenge related to deep packet inspection (DPI). CIPPIC had argued that: (1) Bell uses DPI to collect and use personal information without customers&#8217; consent; (2) Bell collects more personal information than is necessary to ensure network integrity &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/mhgoldberg.com\/blog\/?p=134\"> <span class=\"screen-reader-text\">DPI doesn&#8217;t invade privacy<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","two_page_speed":[],"footnotes":""},"categories":[1],"tags":[],"class_list":["post-134","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DPI doesn&#039;t invade privacy &#8226; Telecom Trends<\/title>\n<meta name=\"description\" content=\"While CIPPIC is deservedly collecting praise for its successful challenge of Facebook&#039;s privacy practices, it recently lost a challenge related to deep &#8226; August 28, 2009\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mhgoldberg.com\/blog\/?p=134\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DPI doesn&#039;t invade privacy &#8226; Telecom Trends\" \/>\n<meta property=\"og:description\" content=\"While CIPPIC is deservedly collecting praise for its successful challenge of Facebook&#039;s privacy practices, it recently lost a challenge related to deep &#8226; August 28, 2009\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mhgoldberg.com\/blog\/?p=134\" \/>\n<meta property=\"og:site_name\" content=\"Telecom Trends\" \/>\n<meta property=\"article:published_time\" content=\"2009-08-28T10:11:00+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.gstconferences.com\/pdf.gif\" \/>\n<meta name=\"author\" content=\"Mark Goldberg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@mark_goldberg\" \/>\n<meta name=\"twitter:site\" content=\"@mark_goldberg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mark Goldberg\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/?p=134#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/?p=134\"},\"author\":{\"name\":\"Mark Goldberg\",\"@id\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/#\\\/schema\\\/person\\\/3fb9ac7e53dc710f23be648a3b1ab4d7\"},\"headline\":\"DPI doesn&#8217;t invade privacy\",\"datePublished\":\"2009-08-28T10:11:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/?p=134\"},\"wordCount\":317,\"commentCount\":6,\"publisher\":{\"@id\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/?p=134#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.gstconferences.com\\\/pdf.gif\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/?p=134#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/?p=134\",\"url\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/?p=134\",\"name\":\"DPI doesn't invade privacy &#8226; Telecom Trends\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/?p=134#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/?p=134#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.gstconferences.com\\\/pdf.gif\",\"datePublished\":\"2009-08-28T10:11:00+00:00\",\"description\":\"While CIPPIC is deservedly collecting praise for its successful challenge of Facebook's privacy practices, it recently lost a challenge related to deep &#8226; August 28, 2009\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/?p=134\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/?p=134#primaryimage\",\"url\":\"http:\\\/\\\/www.gstconferences.com\\\/pdf.gif\",\"contentUrl\":\"http:\\\/\\\/www.gstconferences.com\\\/pdf.gif\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/\",\"name\":\"Telecom Trends\",\"description\":\"A Canadian perspective on trends in telecom\",\"publisher\":{\"@id\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/#organization\",\"name\":\"Mark H Goldberg & Associates Inc.\",\"url\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/mark_logo_png.png\",\"contentUrl\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/mark_logo_png.png\",\"width\":3484,\"height\":1444,\"caption\":\"Mark H Goldberg & Associates Inc.\"},\"image\":{\"@id\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/mark_goldberg\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/#\\\/schema\\\/person\\\/3fb9ac7e53dc710f23be648a3b1ab4d7\",\"name\":\"Mark Goldberg\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/716530aafa7ae4ea72f4887cbcfc45304504ef5d23bb57e4cd0251e2802ada33?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/716530aafa7ae4ea72f4887cbcfc45304504ef5d23bb57e4cd0251e2802ada33?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/716530aafa7ae4ea72f4887cbcfc45304504ef5d23bb57e4cd0251e2802ada33?s=96&d=mm&r=g\",\"caption\":\"Mark Goldberg\"},\"description\":\"Mark Goldberg has more than 40 years of international experience in strategic planning, managing, designing and implementing telecommunications carrier networks.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DPI doesn't invade privacy &#8226; Telecom Trends","description":"While CIPPIC is deservedly collecting praise for its successful challenge of Facebook's privacy practices, it recently lost a challenge related to deep &#8226; August 28, 2009","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mhgoldberg.com\/blog\/?p=134","og_locale":"en_US","og_type":"article","og_title":"DPI doesn't invade privacy &#8226; Telecom Trends","og_description":"While CIPPIC is deservedly collecting praise for its successful challenge of Facebook's privacy practices, it recently lost a challenge related to deep &#8226; August 28, 2009","og_url":"https:\/\/mhgoldberg.com\/blog\/?p=134","og_site_name":"Telecom Trends","article_published_time":"2009-08-28T10:11:00+00:00","og_image":[{"url":"http:\/\/www.gstconferences.com\/pdf.gif","type":"","width":"","height":""}],"author":"Mark Goldberg","twitter_card":"summary_large_image","twitter_creator":"@mark_goldberg","twitter_site":"@mark_goldberg","twitter_misc":{"Written by":"Mark Goldberg","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mhgoldberg.com\/blog\/?p=134#article","isPartOf":{"@id":"https:\/\/mhgoldberg.com\/blog\/?p=134"},"author":{"name":"Mark Goldberg","@id":"https:\/\/mhgoldberg.com\/blog\/#\/schema\/person\/3fb9ac7e53dc710f23be648a3b1ab4d7"},"headline":"DPI doesn&#8217;t invade privacy","datePublished":"2009-08-28T10:11:00+00:00","mainEntityOfPage":{"@id":"https:\/\/mhgoldberg.com\/blog\/?p=134"},"wordCount":317,"commentCount":6,"publisher":{"@id":"https:\/\/mhgoldberg.com\/blog\/#organization"},"image":{"@id":"https:\/\/mhgoldberg.com\/blog\/?p=134#primaryimage"},"thumbnailUrl":"http:\/\/www.gstconferences.com\/pdf.gif","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/mhgoldberg.com\/blog\/?p=134#respond"]}]},{"@type":"WebPage","@id":"https:\/\/mhgoldberg.com\/blog\/?p=134","url":"https:\/\/mhgoldberg.com\/blog\/?p=134","name":"DPI doesn't invade privacy &#8226; Telecom Trends","isPartOf":{"@id":"https:\/\/mhgoldberg.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mhgoldberg.com\/blog\/?p=134#primaryimage"},"image":{"@id":"https:\/\/mhgoldberg.com\/blog\/?p=134#primaryimage"},"thumbnailUrl":"http:\/\/www.gstconferences.com\/pdf.gif","datePublished":"2009-08-28T10:11:00+00:00","description":"While CIPPIC is deservedly collecting praise for its successful challenge of Facebook's privacy practices, it recently lost a challenge related to deep &#8226; August 28, 2009","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mhgoldberg.com\/blog\/?p=134"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mhgoldberg.com\/blog\/?p=134#primaryimage","url":"http:\/\/www.gstconferences.com\/pdf.gif","contentUrl":"http:\/\/www.gstconferences.com\/pdf.gif"},{"@type":"WebSite","@id":"https:\/\/mhgoldberg.com\/blog\/#website","url":"https:\/\/mhgoldberg.com\/blog\/","name":"Telecom Trends","description":"A Canadian perspective on trends in telecom","publisher":{"@id":"https:\/\/mhgoldberg.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mhgoldberg.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mhgoldberg.com\/blog\/#organization","name":"Mark H Goldberg & Associates Inc.","url":"https:\/\/mhgoldberg.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mhgoldberg.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/mhgoldberg.com\/blog\/wp-content\/uploads\/2021\/02\/mark_logo_png.png","contentUrl":"https:\/\/mhgoldberg.com\/blog\/wp-content\/uploads\/2021\/02\/mark_logo_png.png","width":3484,"height":1444,"caption":"Mark H Goldberg & Associates Inc."},"image":{"@id":"https:\/\/mhgoldberg.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/mark_goldberg"]},{"@type":"Person","@id":"https:\/\/mhgoldberg.com\/blog\/#\/schema\/person\/3fb9ac7e53dc710f23be648a3b1ab4d7","name":"Mark Goldberg","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/716530aafa7ae4ea72f4887cbcfc45304504ef5d23bb57e4cd0251e2802ada33?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/716530aafa7ae4ea72f4887cbcfc45304504ef5d23bb57e4cd0251e2802ada33?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/716530aafa7ae4ea72f4887cbcfc45304504ef5d23bb57e4cd0251e2802ada33?s=96&d=mm&r=g","caption":"Mark Goldberg"},"description":"Mark Goldberg has more than 40 years of international experience in strategic planning, managing, designing and implementing telecommunications carrier networks."}]}},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"tenweb_optimizer_mobile":false,"tenweb_optimizer_tablet":false},"uagb_author_info":{"display_name":"Mark Goldberg","author_link":"https:\/\/mhgoldberg.com\/blog\/?author=2"},"uagb_comment_info":6,"uagb_excerpt":"While CIPPIC is deservedly collecting praise for its successful challenge of Facebook&#8217;s privacy practices, it recently lost a challenge related to deep packet inspection (DPI). CIPPIC had argued that: (1) Bell uses DPI to collect and use personal information without customers&#8217; consent; (2) Bell collects more personal information than is necessary to ensure network integrity&hellip;","_links":{"self":[{"href":"https:\/\/mhgoldberg.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/134","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mhgoldberg.com\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mhgoldberg.com\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mhgoldberg.com\/blog\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/mhgoldberg.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=134"}],"version-history":[{"count":0,"href":"https:\/\/mhgoldberg.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/134\/revisions"}],"wp:attachment":[{"href":"https:\/\/mhgoldberg.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=134"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mhgoldberg.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=134"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mhgoldberg.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=134"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}