Making Identity Use Predictable. UNCITRAL Colloquium on Identity Management and Trust Services 21 April, 2016
|
|
- Abner Dean
- 5 years ago
- Views:
Transcription
1 Making Identity Use Predictable UNCITRAL Colloquium on Identity Management and Trust Services 21 April, 2016
2 Why Am I Here CertiPath High Assurance Identity Trust Framework Supports Aerospace and Defense Product Maker Attempting to make online identities easier and safer to use everywhere While I am not a lawyer There is a legal problem in digital identity First hand experience with the problem There is a legal solution(s) Co-wrote a digital identity law Enacted in the Commonwealth of Virginia in the USA
3 Cyber Security Today Without the identity problem solved we can only hope for honest people to be honest. The Internet was not created with Identity in mind Virtually every attack in Cyberspace leverages an identity exploit 1. Password Compromise 2. Spear phishing
4 The Devolution of Identity: Anonymity Breeds Crime 5 July,1993 Every day since (or at least just this week) Half a billion identities were stolen or exposed online in 2015 It s cheaper than ever to buy someone s stolen identity off the internet Online dating fraudsters: Why are we still falling for them? Fraudulent Tax Return Total could soar to $21B this year [US]
5 What Makes an Identity Valuable? 1. How strongly does it represent me? 2. What can I do with it? Number of relying parties Number and diversity of applications Everything else is a derivative of 1, 2 or both A US DoD badge is more valuable than a corporate badge because of mostly 1 and some of 2 The UID/PWD to Warren Buffet s bank account is more valuable than a US DoD Badge
6 Where are we with Identity Today? Identity Transactions online are overwhelmingly commercial Governments represents <1% worldwide Governments do not make the technology Governments do not take liability BUT they are often a key breeder document provider Most people want eid based on government issued ID Gets confusing when looking at requirements for B2B, B2C, G2B, G2C There is not likely to be a one size fits all identity approach What does this mean for legal mechanisms supporting eid? Physical identity has been refined for literally centuries
7 Federation As a verb, to share identity information across system and organizational boundaries Essentially attributes about employees, suppliers and customers Security and privacy are critical to this capability Users perceive this as Single Sign-On Leverages authoritative identity data across all systems Vast security improvement and vast cost savings this is RARE There are legal ramifications My company (A) is relying on another company s (B) personnel records and hiring processes Or a commercial process from a third party (C) identity provider under contract to (B)
8 Federation Hallmarks Virtually all federations have: Common Operating Rule Sets Technical Interoperability Requirements Legal Frameworks A commercial model that sustains it Minimally one or more use cases Often business cost reduction is cited Larger and/or more mature federations utilize service providers Operational Service Levels Security
9 Why we Need Identity Laws In effect with respect to liability - we don t know what we don t know You will not win the hearts and minds of CFOs with this We have 10 years of slow, random adoption as a result Virginia Law intends to make the distribution of liability predictable It is mostly analogous to the distribution in the credit card model Identities, like credit cards, are not used solely in one geo-politically defined area If the incentives line up with the behavior you want, you get compliance. Ideally we reward good behavior.
10 Why are Federations Central to Digital Identity? Scale Bilateral relationships are described by: OR Where n is the number of entities in the federation For n = 5, 10, 50, 100 5, 45, 1225, 4950 = Contractual Bilateral Agreements respectively We should aim to minimize the proliferation of bilateral agreements: Virginia Law uses Federations as an aggregation which can be evaluated Virginia Law does not contemplate the agreements a federation may require with its members or those who rely upon it Watch this space carefully
11
12 What are the Major Issues? Risk transference enables business Insurance underwriters Bilateral contracts are not a given Ubiquitous usage likely means a lack of underpinning bilateral agreement Credential itself as a means to put some limited obligations on relying party What is a wrong in identity? Where does it take place? The individual transaction with a mis-issued credential? The original credential issuance?
13 Timeline of the Virginia Law A&D companies have their own corporate identity credentials 2006 offer identity credential to their supply chains for a fee and offset their own costs 2007 all companies, save Airbus, dropped those plans for legal concerns TSCP opened a work stream to research these issues Open vs. closed model Law Review article Contacted by Virginia s Attorney General s office Virginia is known for passing forward looking internet-centric legislation. In the US, liability cases are first brought at the State level 3.5 years of lobbying for law Legislative answers to technology market failures are not for the faint of heart Law enacted mid 2015 as SB 814
14 SB 814 Reduces the legal ambiguity of 3 rd parties relying on identity credentials Outlines specific liability across a number of scenarios Prohibits shotgun lawsuits These plague the medical community in the US Specifically: Issuers who follow the rules of their federation are not liable Issuers who did not are Seeks to enforce FO/IdP contracts that describe specific liability per their community rules Provides a gross negligence backstop failing all else
Executive Summary Industry s Responsibility in Promoting Responsible Development and Use:
Executive Summary Artificial Intelligence (AI) is a suite of technologies capable of learning, reasoning, adapting, and performing tasks in ways inspired by the human mind. With access to data and the
More informationPan-Canadian Trust Framework Overview
Pan-Canadian Trust Framework Overview A collaborative approach to developing a Pan- Canadian Trust Framework Authors: DIACC Trust Framework Expert Committee August 2016 Abstract: The purpose of this document
More informationLegal Aspects of Identity Management and Trust Services
Legal Aspects of Identity Management and Trust Services Anna Joubin-Bret Secretary What is Identity Management (IdM)? Fundamental issue for the use of electronic means Answers the basic questions: Who
More informationLawyers sued over advice to board
Lawyers sued over advice to board Misrepresentation, negligence Publicly held company Number of employees Over 1,000 Approximately $2 billion A large public company misstated its revenue during three quarters
More informationPrivacy Policy SOP-031
SOP-031 Version: 2.0 Effective Date: 18-Nov-2013 Table of Contents 1. DOCUMENT HISTORY...3 2. APPROVAL STATEMENT...3 3. PURPOSE...4 4. SCOPE...4 5. ABBREVIATIONS...5 6. PROCEDURES...5 6.1 COLLECTION OF
More informationCODE OF CONDUCT. STATUS : December 1, 2015 DES C R I P T I O N. Internal Document Date : 01/12/2015. Revision : 02
STATUS : December 1, 2015 DES C R I P T I O N Type : Internal Document Date : 01/12/2015 Revision : 02 CODE OF CONDUCT. Page 2/7 MESSAGE FROM THE CHAIRMAN AND THE CEO Dear all, The world is continually
More informationHow to Prevent the Home Remodeling Nightmare
How to Prevent One thing is certain when starting a home remodeling project: you don t want to get burned in the process! So how do you avoid becoming a victim? If you follow some basic guidelines and
More informationEthical and social aspects of management information systems
Ethical and social aspects of management Marcos Sanches Commerce Électronique The challenge Why are contemporary and the Internet a challenge for the protection of privacy and intellectual property? How
More informationMitchell E. Herr. May 5, 2011
The Florida Bar City, County and Local Government Law Section SEC Enforcement Against Municipal Issuers and Public Officials by Mitchell E. Herr May 5, 2011 Copyright 2011 Holland & Knight LLP All Rights
More informationFujitsu Technology and Service Vision Copyright 2014 FUJITSU LIMITED
Fujitsu Technology and Service Vision 2014 Table of Contents 1 People An emerging new world A Hyperconnected World and the things around us, all linked together, sharing information. More connectivity
More informationITI Comment Submission to USTR Negotiating Objectives for a U.S.-Japan Trade Agreement
ITI Comment Submission to USTR-2018-0034 Negotiating Objectives for a U.S.-Japan Trade Agreement DECEMBER 3, 2018 Introduction The Information Technology Industry Council (ITI) welcomes the opportunity
More informationWould the REAL President & CEO of TempWorks Please Stand Up?
Would the REAL President & CEO of TempWorks Please Stand Up? The internet and social media are funny. Sometimes in both the literal and figurative sense. Such was the case as I happened upon a post penned
More informationDigital Forensics Lecture 11. Evidence, Reporting, and Action
Digital Forensics Lecture 11 Evidence, Reporting, and Action This Week s Presentations Certifications Risk Analysis Normal (non-it) Parents Keeping Their Children Safe and Happy Encase Sleuth Kit Next
More informationBloomberg BNA Professional Learning Legal Course Catalog OnDemand Programs
Bloomberg BNA Professional Learning Legal Course Catalog OnDemand Programs Antitrust 1. Anti-Counterfeiting for Licensed Products: What You Don't Know Can Hurt Your Business 2. Antitrust Investigations:
More information2013 IT Risk/Reward Barometer: Asia-Pacific Results. October Unless otherwise noted, n = 343
2013 IT Risk/Reward Barometer: Asia-Pacific Results October 2013 www.isaca.org/risk-reward-barometer Unless otherwise noted, n = 343 Respondents are business and IT professionals from the Asia-Pacific
More informationRECOMMENDATIONS. COMMISSION RECOMMENDATION (EU) 2018/790 of 25 April 2018 on access to and preservation of scientific information
L 134/12 RECOMMDATIONS COMMISSION RECOMMDATION (EU) 2018/790 of 25 April 2018 on access to and preservation of scientific information THE EUROPEAN COMMISSION, Having regard to the Treaty on the Functioning
More informationTERMS AND CONDITIONS. for the use of the IMDS Advanced Interface by IMDS-AI using companies
TERMS AND CONDITIONS for the use of the IMDS Advanced Interface by IMDS-AI using companies Introduction The IMDS Advanced Interface Service (hereinafter also referred to as the IMDS-AI ) was developed
More informationThird Party Certification Agents
Third Party Certification Agents June 2018 Introduction In December 2017, the new STS Regulation became European law. The regulation introduced a new category of securitisations: simple, transparent and
More informationDecentralized Protocol for Self-Sovereign Identities with Embedded Compliance
Decentralized Protocol for Self-Sovereign Identities with Embedded Compliance A self-sovereign identity portal for regulated industries and the Internet of Everything guy.davies@blockpass.org www.blockpass.org
More informationVolume 4, Number 2 Government and Defense September 2011
Volume 4, Number 2 Government and Defense September 2011 Editor-in-Chief Managing Editor Guest Editors Jeremiah Spence Yesha Sivan Paulette Robinson, National Defense University, USA Michael Pillar, National
More informationIS STANDARDIZATION FOR AUTONOMOUS CARS AROUND THE CORNER? By Shervin Pishevar
IS STANDARDIZATION FOR AUTONOMOUS CARS AROUND THE CORNER? By Shervin Pishevar Given the recent focus on self-driving cars, it is only a matter of time before the industry begins to consider setting technical
More informationInnovation and Technology Law Curriculum
Innovation and Technology Law Curriculum Core Courses FOUNDATIONS OF PRIVACY LAW (FALL 2016) This course explores the principles of privacy law in relation to the affairs of government, non-government
More informationChapter 6: Finding and Working with Professionals
Chapter 6: Finding and Working with Professionals Christopher D. Clark, Associate Professor, Department of Agricultural Economics Jane Howell Starnes, Research Associate, Department of Agricultural Economics
More informationIntellectual Property& Technology Law Journal
Intellectual Property& Technology Law Journal Edited by the Technology and Proprietary Rights Group of Weil, Gotshal & Manges LLP VOLUME 30 NUMBER 11 NOVEMBER 2018 Let s Make a Deal: Buying or Selling
More informationKryptonite Authorized Seller Program
Kryptonite Authorized Seller Program Program Effective Date: January 1, 2018 until discontinued or suspended A Kryptonite Authorized Seller is one that purchases Kryptonite offered products directly from
More informationADDENDUM D COMERICA WEB INVOICING TERMS AND CONDITIONS
Effective 08/15/2013 ADDENDUM D COMERICA WEB INVOICING TERMS AND CONDITIONS This Addendum D is incorporated by this reference into the Comerica Web Banking Terms and Conditions ( Terms ). Capitalized terms
More informationPickens Savings and Loan Association, F.A. Online Banking Agreement
Pickens Savings and Loan Association, F.A. Online Banking Agreement INTERNET BANKING TERMS AND CONDITIONS AGREEMENT This Agreement describes your rights and obligations as a user of the Online Banking
More informationVeteran Institute for Procurement (VIP)
Veteran Institute for Procurement (VIP) Business training program for veteran-owned companies who sell to the Federal Government. Trains service-disabled and veteran-owned small business government contractors
More informationApril, 2014 GameAccount Network
April, 2014 Disclaimer Certain statements included in this Presentation contain forward-looking information concerning GameAccount Network's strategy, operations, financial performance or condition, outlook,
More informationStephen A. Fuchs. Focus Areas. Overview
Shareholder 900 Third Avenue 10022 main: (212) 583-9600 direct: (212) 497-6845 fax: (212) 832-2719 sfuchs@littler.com Focus Areas Discrimination and Harassment Wage and Hour Class Actions Overview Stephen
More informationESSENTIAL RECIPES FOR THE DIGITAL JOURNEY OF ENTERPRISES
DIRK KRAFZIG MANAS DEB MARTIN FRICK DIGITAL COOKBOOK ESSENTIAL RECIPES FOR THE DIGITAL JOURNEY OF ENTERPRISES For more details visit: https://digital-cookbook.com/ GRAPHIC DESIGN BY KNUT JUNKER AND DIETMAR
More informationWorking Party on Information Security and Privacy
Unclassified DSTI/ICCP/REG(2005)4/FINAL DSTI/ICCP/REG(2005)4/FINAL Unclassified Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development 24-Nov-2005
More informationA CALL TO (H)ARMS: THE CRY FOR HARMONIZATION OF SECURITY AND PRIVACY LAWS
SESSION ID: LAW-R12 A CALL TO (H)ARMS: THE CRY FOR HARMONIZATION OF SECURITY AND PRIVACY LAWS MODERATOR: William S. Rogers, Jr. Partner, Prince Lobel Tye LLP @wsrogers26 @PrinceLobel PANELISTS: Charles
More informationStandards and privacy engineering ISO, OASIS, PRIPARE and Other Important Developments
Standards and privacy engineering ISO, OASIS, PRIPARE and Other Important Developments Antonio Kung, CTO 25 rue du Général Foy, 75008 Paris www.trialog.com 9 May 2017 1 Introduction Speaker Engineering
More informationGPM TechLaw 1.0: WARNING: Technology and the Law can be a Dangerous Mix. Agenda. TechLaw Quarterly Programs
GPM TechLaw 1.0: WARNING: Technology and the Law can be a Dangerous Mix Doug Ramler doug.ramler@gpmlaw.com Kate Nilan kate.nilan@gpmlaw.com Agenda Introduction Launching Your Business (Doug) Policies No
More informationIs Transparency a useful Paradigm for Privacy?
Is Transparency a useful Paradigm for Privacy? Shonan Seminar, August 6 th, 2013 Japan Prof. Dr. Dr. h.c. Günter Müller Institute of Computer Science and Social Studies Department of Telematics Outline
More informationThe global leader in trusted identities for an increasingly digital world. Press kit September, 28 th 2017
The global leader in trusted identities for an increasingly digital world Press kit September, 28 th 2017 2 FOREWORD Foreword by Didier Lamouche, Chief Executive Officer I am pleased and proud to present
More informationDigital Identity Innovation Canada s Opportunity to Lead the World. Digital ID and Authentication Council of Canada Pre-Budget Submission
Digital Identity Innovation Canada s Opportunity to Lead the World Digital ID and Authentication Council of Canada Pre-Budget Submission August 4, 2017 Canadian governments, banks, telcos, healthcare providers
More informationForeword The Internet of Things Threats and Opportunities of Improved Visibility
Foreword The Internet of Things Threats and Opportunities of Improved Visibility The Internet has changed our business and private lives in the past years and continues to do so. The Web 2.0, social networks
More informationAcademic Year
2017-2018 Academic Year Note: The research questions and topics listed below are offered for consideration by faculty and students. If you have other ideas for possible research, the Academic Alliance
More informationOpinion Poll. Illinois Small Business Owners Support Legislation Reforming Patent System. April 29, 2014
Opinion Poll Illinois Small Business Owners Support Legislation Reforming Patent System April 29, 2014 Small Business Majority 1101 14 th Street, NW, Suite 1001 Washington, DC 20005 (202) 828-8357 www.smallbusinessmajority.org
More informationRisky Business: New Compliance Challenges for FDA-Regulated Industry
Risky Business: New Compliance Challenges for FDA-Regulated Industry Cathy Burgess, Counsel Steve Niedelman, Senior Consultant May 19, 2010 Crowell & Moring LLP 2010. All Rights Reserved. Risky Business:
More information10 1/2 Secrets to Drastically Reducing Your Telecom Costs
Whitepaper: 10 1/2 Secrets to Drastically Reducing Your Telecom Costs In today s competitive business environment, every penny counts. Smart businesses stretch every dollar to maximum capacity, and your
More informationA comprehensive guide to digital badges.
A comprehensive guide to digital badges. This is your in-depth guide to what digital badges are and how they are used. A FREE RESOURCE FROM ACCREDIBLE.COM A Comprehensive Guide to Digital Badges 2 Introduction
More informationIndustrial and Regional Benefits (IRB s)
Industry Canada Opportunities for Collaboration Jim Castellano - Sector Development Officer, Aerospace, Defence and Marine Branch Government of Canada Ottawa, Ontario Jim.Castellano@ic.gc.ca - 613-954-3747
More informationThe KashFlow Guide to. Getting Paid Faster
The KashFlow Guide to Getting Paid Faster From first-time freelancers to booming business directors, late payments are the bane of every business s existence. In fact, the Federation of Small Businesses
More informationHow to Find and Select a General Contractor
How to Find and Select a General Contractor Introduction Now that you have decided to build your own garage, you need to determine whether you want to take on the project yourself or hire someone to do
More informationIMPLEMENTING HSPD-12: A PROGRAM MANAGER S PERSPECTIVE
IMPLEMENTING HSPD-12: A PROGRAM MANAGER S PERSPECTIVE Smart Card Alliance 2005 Fall Annual Conference Presented by Mike Butler Director of Smart Card Programs and Operations Defense Manpower Data Center
More informationInteroperable systems that are trusted and secure
Government managers have critical needs for models and tools to shape, manage, and evaluate 21st century services. These needs present research opportunties for both information and social scientists,
More informationCDFA / / BNY MELLON DEVELOPMENT FINANCE WEBCAST SERIES Publicly Supported Seed & Venture Capital
CDFA / / BNY MELLON DEVELOPMENT FINANCE WEBCAST SERIES Publicly Supported Seed & Venture Capital The Broadcast will Begin at 1:00pm EST Submit your questions in advance using the GoToWebinar control panel
More informationWhat is BIM and why should construction lawyers care about it? Dr. Carrie Sturts Dossick, P.E. Bita Astaneh Asl
What is BIM and why should construction lawyers care about it? Dr. Carrie Sturts Dossick, P.E. Bita Astaneh Asl Learning Objectives What is BIM? > BIM definition > BIM history > Common current uses (3D
More informationProtection of Privacy Policy
Protection of Privacy Policy Policy No. CIMS 006 Version No. 1.0 City Clerk's Office An Information Management Policy Subject: Protection of Privacy Policy Keywords: Information management, privacy, breach,
More informationUN-GGIM Future Trends in Geospatial Information Management 1
UNITED NATIONS SECRETARIAT ESA/STAT/AC.279/P5 Department of Economic and Social Affairs October 2013 Statistics Division English only United Nations Expert Group on the Integration of Statistical and Geospatial
More informationTrade Secret Protection of Inventions
Trade Secret Protection of Inventions Phil Marcoux & Kevin Roe Inventions - Trade Secret or Patent? Theft by employees, executives, partners Theft by contract Note - this class does not create an attorney-client
More informationLAW. SERVICE. YOU. Join the FH+H team LAW. SERVICE.
YOU. Join the FH+H team FH+H is actively recruiting exceptional, experienced attorneys to join our firm as counsels or partners. We seek individuals who share our passion for the practice of law, our legal
More informationMr Hans Hoogervorst International Accounting Standards Board 1 st Floor 30 Cannon Street London EC4M 6XH. MV/288 Mark Vaessen.
Tel +44 (0)20 7694 8871 15 Canada Square mark.vaessen@kpmgifrg.com London E14 5GL United Kingdom Mr Hans Hoogervorst International Accounting Standards Board 1 st Floor 30 Cannon Street London EC4M 6XH
More informationBiography. Brian E. Klein Century Park East Sixteenth Floor Los Angeles CA t
Biography Brian Klein is an accomplished trial attorney who has successfully litigated in federal and state court. His practice focuses on highstakes criminal and regulatory defense matters and civil litigation,
More informationSection 1: Internet Governance Principles
Internet Governance Principles and Roadmap for the Further Evolution of the Internet Governance Ecosystem Submission to the NetMundial Global Meeting on the Future of Internet Governance Sao Paolo, Brazil,
More informationUNCITRAL Third International Colloquium on Secured Transactions Session on Contractual Guide on IP Licensing (Vienna, March 3, 2010)
UNCITRAL Third International Colloquium on Secured Transactions Session on Contractual Guide on IP Licensing (Vienna, March 3, 2010) Basic contractual requirements on PATENT LICENSING Laurent Manderieux
More informationPublic Art Network Best Practice Goals and Guidelines
Public Art Network Best Practice Goals and Guidelines The Public Art Network (PAN) Council of Americans for the Arts appreciates the need to identify best practice goals and guidelines for the field. The
More informationTOKEN SALE AGREEMENT
TOKEN SALE AGREEMENT SwiftDemand Last Updated: March 30, 2018 This Token Sale Agreement is a legally binding contract between you and SwiftDemand Inc. (hereinafter Company ) regarding your rights and responsibilities
More informationDori K. Stibolt Partner
Dori K. Stibolt Partner West Palm Beach, FL Tel: 561.804.4417 Fax: 561.835.9602 dstibolt@foxrothschild.com Dori is a skilled litigator whose practice centers on labor and employment claims, trust and estate
More informationHuman Centered Production in Cyber- Physical Production Systems. Case study Croatia
Human Centered Production in Cyber- Physical Production Systems Case study Croatia Prof. Ivica Veža Faculty of Electrical Engineering, Mechnical Engineering and Naval Architecture FESB, University of Split,
More informationBut Now I See - a Vulnerability Disclosure Maturity Model
SESSION ID: HT-R04F But Now I See - a Vulnerability Disclosure Maturity Model Who the FSCK Are You? What is it you do here? Chief Policy Officer, HackerOne Former Microsoft Security Strategist Former Hacker
More informationStanford Institute for Theoretical Economics
Stanford Institute for Theoretical Economics Application Procedure The Stanford Institute for Theoretical Economics (SITE) is organizing a nine-session conference on economic theory and applications. There
More informationKKR Credit Advisors (Ireland) Unlimited Company PILLAR 3 DISCLOSURES
KKR Credit Advisors (Ireland) Unlimited Company KKR Credit Advisors (Ireland) Unlimited Company PILLAR 3 DISCLOSURES JUNE 2017 1 1. Background The European Union Capital Requirements Directive ( CRD or
More informationIdentity Management and its impact on the Digital Economy
Identity Management and its impact on the Digital Economy Alejandro Barros 1, Alejandro Pareja 2 October 2016 Contents Introduction... 2 Identity Management... 3 Enrolment in the National Identity System...
More informationWhat does the revision of the OECD Privacy Guidelines mean for businesses?
m lex A B E X T R A What does the revision of the OECD Privacy Guidelines mean for businesses? The Organization for Economic Cooperation and Development ( OECD ) has long recognized the importance of privacy
More informationUNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD)
UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD) Contribution to the CSTD ten-year review of the implementation of WSIS outcomes Submitted by PAKISTAN DISCLAIMER: The views presented
More informationThe Canadian Navigable Waters Act
The Canadian Navigable Waters Act RESTORING LOST PROTECTIONS AND KEEPING CANADA S NAVIGABLE WATERS OPEN FOR PUBLIC USE FOR YEARS TO COME CANADA.CA/ENVIRONMENTALREVIEWS OVERVIEW 2 What we are doing In the
More informationITAC RESPONSE: Modernizing Consent and Privacy in PIPEDA
August 5, 2016 ITAC RESPONSE: Modernizing Consent and Privacy in PIPEDA The Information Technology Association of Canada (ITAC) appreciates the opportunity to participate in the Office of the Privacy Commissioner
More informationA PERSPECTIVE IN COMPUTER ETHICS. Pattarasinee Bhattarakosol 1. Abstract. Introduction. What is computer ethics?
A PERSPECTIVE IN COMPUTER ETHICS Pattarasinee Bhattarakosol 1 Abstract Since computers are counted as a part of life, the issue of computer-related ethics has been considered seriously. Although there
More informationLLOYDS BANKING GROUP MATTERS RESERVED TO THE BOARDS (LLOYDS BANKING GROUP PLC, LLOYDS BANK PLC, BANK OF SCOTLAND PLC & HBOS PLC)
LLOYDS BANKING GROUP MATTERS RESERVED TO THE BOARDS (LLOYDS BANKING GROUP PLC, LLOYDS BANK PLC, BANK OF SCOTLAND PLC & HBOS PLC) LLOYDS BANKING GROUP PLC, LLOYDS BANK PLC, BANK OF SCOTLAND PLC & HBOS PLC
More informationPrivacy and Security in an On Demand World
Privacy and Security in an On Demand World Harriet Pearson, V.P. Workforce & Chief Privacy Officer IBM Corporation Almaden Institute Symposium on Privacy April 9, 2003 2002 IBM Corporation Outline Where
More informationUtility Patents. New and useful inventions and configurations of useful articles
COMPARATIVE INTELLECTUAL PROPERTY LAW CHART (Except as otherwise indicated, citations refer to U.S. Federal Law) (Intellectual Property Advisory No. 4) Intellectual Property has become important to many
More informationInternet 2020: The Next Billion Users
Internet 2020: The Next Billion Users Lawrence E. Strickling I. INTRODUCTION I am honored to have the opportunity to preface this edition of CommLaw Conspectus and discuss the Internet policy priorities
More informationCommonwealth Data Forum. Giovanni Buttarelli
21 February 2018 Commonwealth Data Forum Giovanni Buttarelli Thank you, Michael, for your kind introduction. Thank you also to the Commonwealth Telecommunications Organisation and the Government of Gibraltar
More informationMalcolm Crompton. Future trends in consumer credit and privacy. Cockle Bay Wharf Sydney
Malcolm Crompton Future trends in consumer credit and privacy Cockle Bay Wharf Sydney 3 March 2010 International Trends in privacy protection Australia s credit reporting law changes now + more Managing
More informationTestimony of Professor Lance J. Hoffman Computer Science Department The George Washington University Washington, D.C. Before the
Testimony of Professor Lance J. Hoffman Computer Science Department The George Washington University Washington, D.C. Before the U. S. Senate Committee on Commerce, Science, and Transportation Subcommittee
More informationEXECUTIVE SUMMARY. Investment Opportunity. Paradox Financial Solutions Inc.
An innovative new system for Supply Chain Financing that is so disruptive that it will revolutionize the way in which practices in B2B trading relationships occur. has invented a system that revolutionizes
More informationEnabling Trust in e-business: Research in Enterprise Privacy Technologies
Enabling Trust in e-business: Research in Enterprise Privacy Technologies Dr. Michael Waidner IBM Zurich Research Lab http://www.zurich.ibm.com / wmi@zurich.ibm.com Outline Motivation Privacy-enhancing
More informationSmarter Defense, an IBM Perspective IBM Corporation
1 Smarter Defense, an IBM perspective, Tom Hawk, IBM General Manager, Nordics Integrated Market Team Agenda Smarter Planet : What s New? Transformation: IBM lessons SPADE: One Year On 3 As the digital
More informationSecond The Current LineState of UX
Presentation People as the Title Digital Presentation Differentiator Title Second The Current LineState of UX Steve Weinswig Author Title Managing Director, Fjord Jennifer Spinosa Senior Manager, Accenture
More informationViolent Intent Modeling System
for the Violent Intent Modeling System April 25, 2008 Contact Point Dr. Jennifer O Connor Science Advisor, Human Factors Division Science and Technology Directorate Department of Homeland Security 202.254.6716
More informationIDENTITY REPAIR IN THE GOV.UK VERIFY FEDERATION
IDENTITY REPAIR IN THE GOV.UK VERIFY FEDERATION DISCOVERY PROJECT REPORT EDITED BY PENNY NEWTON MARCH 2017 Contents Executive summary 3 Introduction and Project Background 5 Research focus 7 Research findings
More informationTextron Reports Second Quarter 2014 Income from Continuing Operations of $0.51 per Share, up 27.5%; Revenues up 23.5%
Textron Reports Second Quarter 2014 Income from Continuing Operations of $0.51 per Share, up 27.5%; Revenues up 23.5% 07/16/2014 PROVIDENCE, R.I.--(BUSINESS WIRE)-- Textron Inc. (NYSE: TXT) today reported
More informationStakeholder and process alignment in Navy installation technology transitions
Calhoun: The NPS Institutional Archive DSpace Repository Faculty and Researchers Faculty and Researchers Collection 2017 Stakeholder and process alignment in Navy installation technology transitions Regnier,
More informationPrivacy Procedure SOP-031. Version: 04.01
SOP-031 Version: 04.01 Effective Date: 01-Mar-2017 Table of Contents 1. DOCUMENT HISTORY... 3 2. APPROVAL STATEMENT... 3 3. PURPOSE... 4 4. SCOPE... 4 5. ABBREVIATIONS... 4 6. PROCEDURES... 5 6.1 COLLECTION
More informationIN THE CIRCUIT COURT FOR THE STATE OF OREGON FOR THE COUNTY OF MULTNOMAH. Case No. COMPLAINT
8/31/2015 4:34:54 PM 15CV23200 1 2 3 4 IN THE CIRCUIT COURT FOR THE STATE OF OREGON FOR THE COUNTY OF MULTNOMAH 5 6 7 8 9 10 11 12 Capacity Commercial Group, LLC, an Oregon limited liability company, vs.
More informationIf These Crawls Could Talk: Studying and Documenting Web Archives Provenance
If These Crawls Could Talk: Studying and Documenting Web Archives Provenance Emily Maemura, PhD Candidate Faculty of Information, University of Toronto NetLab Forum February 27, 2018 The Team Nich Worby
More informationEuropean Charter for Access to Research Infrastructures - DRAFT
13 May 2014 European Charter for Access to Research Infrastructures PREAMBLE - DRAFT Research Infrastructures are at the heart of the knowledge triangle of research, education and innovation and therefore
More informationA Knowledge-Centric Approach for Complex Systems. Chris R. Powell 1/29/2015
A Knowledge-Centric Approach for Complex Systems Chris R. Powell 1/29/2015 Dr. Chris R. Powell, MBA 31 years experience in systems, hardware, and software engineering 17 years in commercial development
More informationAIMICT.ORG AIMICT Newsletter
SEPTEMBER 2018 AIMICT.ORG 1 IN THIS ISSUE AIMICT Conducts ISO 9001 Lead Auditor Course AIMICT Conducts ILM s Training of Trainers Program in Irbid AIMICT Organizes Professional Quality Manager Program
More informationThe 9 Sources of Innovation: Which to Use?
The 9 Sources of Innovation: Which to Use? By Kevin Closson, Nerac Analyst Innovation is a topic fraught with controversy and conflicting viewpoints. Is innovation slowing? Is it as strong as ever? Is
More informationWith you from the spark
With you from the spark Specialist legal advice and support for start-ups and high growth businesses M re than just law The advisors you choose will get to know the ins and outs of your business and we
More informationMoney How to Make It Keep It Grow It! By DC Cordova Excellerated Business Schools/Money & You Program
Special Report Habits For Success Money How to Make It Keep It Grow It! By DC Cordova Excellerated Business Schools/Money & You Program http:// Personal Habits Money Habits (including Financial Stewardship
More informationClifford M. Gross, Ph. D. Expert Crowdsourcing sm innovations with university technology transfer
Clifford M. Gross, Ph. D. Expert Crowdsourcing sm innovations with university technology transfer There are approximately 15,000 universities in 160 countries creating approximately 100,000 new technologies
More informationGlobal citizenship at HP. Corporate accountability and governance. Overarching message
Global citizenship at HP Overarching message With HP s global reach comes global responsibility. We take our role seriously by being an economic, intellectual and social asset to the communities in which
More informationTen Principles for a Revised US Privacy Framework
Ten Principles for a Revised US Privacy Framework Our economies and societies are in the midst of the 4 th industrial revolution, with digitalization and datafication transforming the way we live, work
More information39 Years of Learning the Hard Way. Mark A Etrheim, Mastercraft Homes Inc
39 Years of Learning the Hard Way Mark A Etrheim, Mastercraft Homes Inc Marketing- You need to tell the world how good you are! Clear and consistent message. What makes you unique? Sales- You must be able
More information