Information Privacy Awareness Seminar

Size: px
Start display at page:

Download "Information Privacy Awareness Seminar"

Transcription

1 Information Privacy Awareness Seminar Frank Dawson/Nokia, Director information privacy standards Ecole Polytech Nice Sophia Antipolis Nokia 2015 Information_Privacy_Awareness-Seminar-Ecole_Polytechnic_Nice_SA Author :Frank Dawson

2 Information Privacy Awareness 1. WHY The Privacy Imperative Privacy Triangle of Trust Privacy incidents Regulatory impact for businesses 2. WHAT EU GDPR and ISO Terminology Roles within the Privacy Framework Privacy Principles Essence of privacy Privacy data lifecycle Personally Identifiable Information and Identifiability 3. HOW Compliance or Accountability Elements of an ACCOUNTABLE privacy program Privacy intent of the organization Foundation principles of PbD Privacy program roles & responsibilies Privacy activities across the product life cycle 4. HOW - Privacy Engineering & Assurance simplified Applying Privacy Engineering Privacy Engineering steps Privacy Assurance steps Privacy impact assessment Privacy risk management Assessing privacy maturity Privacy related business processes 2

3 Privacy Triangle of Trust Privacy Regulatory, policy 3 Nokia Internal Use

4 No privacy without security HTC Case HTC was punished by the US govt for negligence in security engineering No security training for staff No security reviews or testing for vulnerabilities Not following well-known secure coding practices No process for receiving & addressing vulnerability reports from 3rd parties Millions of devices with vulnerabilities in so many ways (read the fine print) 4 4 Impact: HTC is required to fix all of these and to establish a comprehensive security program AND undergo independent security assessments every other year for a 20 year period

5 Keep your privacy promises to your consumers Google / DoubleClick Case Circumvented Apple privacy safeguards on Safari browsers Stanford research discovers DoubleClick over-riding cookie control Millions of consumer effected Impact: FTC imposes record fine Prompts EU investigations Google pays a record $22.5m fine to the US Federal Trade Commission (FTC) after it tracked Apple iphone, ipad and Mac computer users by circumventing privacy protections on the Safari browser for several months in end 2011 and early The fine is the largest paid by one company to FTC, which imposed added 20-year privacy order on Google in March 2010 after concerns about the launch of Google Buzz social network. Jon Lebowetz, FTC Chairman, said The record setting penalty in this matter sends a clear message to all companies under an FTC privacy order. No matter how big or small, all companies must abide by FTC orders against them and keep their privacy promises to consumer, or they will end up paying many times what it would have cost to comply in the first place. 5

6 Provide consumer fair notice and choice Facebook owned Instagram photo sharing social network site changed its Terms of Use so it could exploit members' photographs for profit - without compensating the owners Impact: Daily active users fell from almost 16.3 to about 7.6 million and some Brand damage caused ( To do a Zuckerberg and To be Instagrammed marketing term coined) 6

7 Follow data minimization & purpose specification Pentium III included a unique, retrievable, identification number, called PSN (Processor Serial Number) that could be read by software through the CPUID instruction if feature not disabled through the BIOS Impact: Product design decisions had farreaching impact on consumers' online privacy. Intel's market dominance, coupled with the lack of accurate material about the privacy implications of the PSN, and the inability of individuals to control the use of the PSN, placed consumer privacy at risk. Regulatory response: EU Parliament action to prevent chips from computer destined to EU consumers and public acquisition. Formal inquiry averted by Intel decision to remove PSN feature on Tualatin-based Pentium IIIs, and the feature was not carried through to the Pentium 4 or Pentium M. 7

8 Regulatory potential for businesses Authorities are doing joint-enforcement on major companies Example: Facebook Canadian, US, Nordic, Irish regulators investigated complaints and found violations Increasing public policy maker interest in mobile technologies Example: Positioning technologies More and more laws globally Enforcement Actions: Fines, up to 2% global revenue Penalties Cost of remediation Forced privacy program 20 year external audit Deletion of unlawfully collected data Sales stops, recalls 8

9 Information Privacy Awareness 1. WHY The Privacy Imperative Privacy Triangle of Trust Privacy incidents Regulatory impact for businesses 2. WHAT EU GDPR and ISO Terminology Roles within the Privacy Framework Privacy Principles Essence of privacy Privacy data lifecycle Personally Identifiable Information and Identifiability 3. HOW Compliance or Accountability Elements of an ACCOUNTABLE privacy program Privacy intent of the organization Foundation principles of PbD Privacy program roles & responsibilies Privacy activities across the product life cycle 4. HOW - Privacy Engineering & Assurance simplified Applying Privacy Engineering Privacy Engineering steps Privacy Assurance steps Privacy impact assessment Privacy risk management Assessing privacy maturity Privacy related business processes 9

10 Information privacy The right of an individual to control the processing of their personal data such that there is: No hidden, unwanted, uncontrolled, excessive or insecure Collection, processing and disclosure of consumer s personal data 10

11 EU GDPR and ISO TheEU data protection regulations will soon be based on the proposed General Data Protection Regulation Potential harmonizing DP effect across EU businesses ISO defines a Privacy Framework that reflects many of the proposed components of the GDPR The PDF of the standard is freely available here Privacy Framework includes: Terminology Roles and interactions Recognizing PII Privacy safeguarding requirements Privacy policy Privacy controls Privacy principles 11

12 Terminology ( ) Identifiability - condition which results in a PII principal being identified, directly or indirectly, on the basis of a given set of PII Personally Identifiable Information (PII) - any information that (a) can be used to identify the PII principal to whom such information relates, or (b) is or might be directly or indirectly linked to a PII principal PII Controller - privacy stakeholder (or privacy stakeholders) that determines the purposes and means for processing personally identifiable information (PII) other than natural persons who use data for personal purposes PII Principal - natural person to whom the personally identifiable information (PII) relates PII Processor - privacy stakeholder that processes personally identifiable information (PII) on behalf of and in accordance with the instructions of a PII controller Privacy Breach - situation where PII is processed in violation of one or more relevant privacy safeguarding requirements Privacy Safeguarding Requirements - set of requirements an organization has to take into account when processing personally identifiable information (PII) with respect to the privacy protection of PII 12

13 Roles within the privacy framework DPA, Data Privacy Authority, Information Privacy Commissioner, etc is the independent legal authority for administering privacy rules within a country The consumer is the PII Principal The PII Controller is entity that determines purposes and means of processing consumer s personal data and is RESPONSIBLE for data processing of data subject s PII The PII Processor performs information processing on behalf of the Data Controller PII Principal Data Protection Authority (DPA) PII Controller PII Processor Sometimes a reference is also made to a Third Party, which can be viewed as outside this privacy framework, but the responsibility of the Data Controller. 13

14 Privacy Principles (ISO ) # Principle Description 1 Consent and choice PII Principal has choice on and has Opt-In to PII processing 2 Purpose legitimacy and specification Processing complies with laws, giving notice before processing 3 Collection limitation Within laws and necessary for specified purposes 4 Data minimization Minimize the processing of PII 5 Use, retention and disclosure limitation Also applies to limitation on cross-border transfers 6 Accuracy and quality Measure to assure validity and correctness of PII processing 7 Openness, transparency and notice Clear, complete and accessible information on PII processing 8 Individual participation and access PII Principal access to review their PII and correct inaccuracies 9 Accountability Demonstrate care in duty toward PII Principal for PII stewardship 10 Information security Protecting PII under its authority with appropriate controls 11 Privacy compliance Verifying and demonstrating adherence to laws with internal or 3rd party audits 14

15 Essence of privacy Privacy emerges from personally identifiable data Personal data or information Any information relating to an identified or identifiable natural person, an individual + Identifiability (Nymity) The measure of the degree that personal data can be associated with an individual 15

16 Privacy data lifecycle Also called the Consumer Data Lifecycle, it is a fundamental component of the privacy knowledge base Define the actions related to personal data within the privacy framework When analyzing the data flow in your specifications, you should also consider the complete lifecycle for the associated PII Within the EU, collection, itself is considered to be an act of processing! x Deletion Transfer Collection Processing Storage 16

17 Personal data/information Relates to information about a natural person When the data can be associated with an individual, it is referred to as Personally Identifiable Information (PII) Criteria for linkability of data to an individual is a hot-topic within the privacy community Sensitive PII must be treated specially Generally, if PII is of a racial, religious, political, sexual orientation, medical nature, it is characterized as Sensitive; but other categories should also be consisted Also commonly referred to as Personal Data 17 Basic data (E.G. first name, last name, mobile number) Address data (E.G. postal code, address) Restricted categories of data (E.G. racial or ethnic origin, religion, trade union membership if allowed by applicable law) Social networking related data (E.G.. metadata of pictures uploaded, site activity information) Location data (E.G. GPS coordinates or mobile network base station ID) Identifiers (E.G. IMEI, device identifiers, IPaddress) System data is information about how individual users are using the system (E.G. log files) Monetary data transactions (E.G. credit card number, account information) These are some of the categories of personal data to consider when identifying the PII in your particular project

18 Information Privacy Awareness 1. WHY The Privacy Imperative Privacy Triangle of Trust Privacy incidents Regulatory impact for businesses 2. WHAT EU GDPR and ISO Terminology Roles within the Privacy Framework Privacy Principles Essence of privacy Privacy data lifecycle Personally Identifiable Information and Identifiability 3. HOW Compliance or Accountability Elements of an ACCOUNTABLE privacy program Privacy intent of the organization Foundation principles of PbD Privacy program roles & responsibilies Privacy activities across the product life cycle 4. HOW - Privacy Engineering & Assurance simplified Applying Privacy Engineering Privacy Engineering steps Privacy Assurance steps Privacy impact assessment Privacy risk management Assessing privacy maturity Privacy related business processes 18

19 Compliance or Accountability Goal of being privacy compliance may not be sufficient for avoiding regulatory actions against your company Data protection authorities (DPA) now expect organizations to demonstrate their good intentions Accountability has roots in 1980 OECD privacy guidelines Accountability framework builds trust between DPA and organizations for the handling of personal data Accountability means being able to show how your company has holistically integrated privacy best practices Centre for Information & Policy Leadership (CIPL) has defined a global DPA endorsed approach to Accountability Data Protection Accountability: The Essential Elements 19

20 Elements of an Accountable privacy program 1. Executive accountability and oversight Internal senior executive oversight and responsibility for data privacy and data protection 2. Policies and processes to implement them Binding and enforceable written policies and procedures that reflect applicable laws, regulations and industry standards, including procedures to put those policies into effect 3. Staffing and delegation Allocation of resources to ensure that the organization's privacy program is appropriately staffed by adequately trained personnel 4. Education and awareness Existence of up-to-date education and awareness programs to keep employees and on-site contractors aware of data protection obligations 5. Risk assessment and mitigation Ongoing risk assessment and mitigation planning for new products, services, technologies and business models. Periodic Program risk assessment to review the totality of the accountability program 6. Event management and complaint handling Procedures for responding to inquiries, complaints and data protection breaches 7. Internal enforcement Internal enforcement of the organization's policies and discipline for non-compliance 8. Redress Provision of remedies for those whose privacy has been put risk 20 Not just compliant but accountable

21 Privacy intent of the organization Vision: Organization articulates the high level aspirations towards protection of the personal data of individuals using their products and services e.g., Consumers trust us to meet their privacy expectations Principles: Identify which privacy principles apply to the product e.g.., select from those codified in ISO, OECD, FIPP, EU frameworks Objectives and activities: Define concrete objectives and related activities to achieve the objectives e.g., Industry leading privacy controls built into our software by adopting Privacy by Design, e.g., Mature privacy aware culture through training and effective governance and processes 21

22 Foundation principles of PbD Privacy by Design 7-Foundation Principles 1. Proactive not Reactive; Preventative not Remedial 2. Privacy as the Default Setting 3. Privacy Embedded into Design 4. Full Functionality Positive-Sum, not Zero-Sum 5. End-to-End Security Full Lifecycle Protection 6. Visibility and Transparency Keep it Open 7. Respect for User Privacy Keep it User-Centric Concept of baking-in privacy into products from the beginning, rather than a retro-fit to existing products Privacy by Re-Design (PbRD) is inevitable for legacy specifications Is now globally included into regulations 22

23 Privacy program roles & responsibilities Executive privacy owner The senior executive with oversight and responsibility for data privacy and data protection in the organization Chief privacy officer The senior manager with responsibility for the implementation and operation of the privacy program in the organization Privacy officer The privacy professional responsible for implementation and operation of the privacy program within an organizational unit Privacy champ The program or product member with sufficient privacy competence to be responsible for transposing privacy requirements into product requirements 23 These are minimal privacy program roles

24 Privacy activities across the product life cycle 24

25 Information Privacy Awareness 1. WHY The Privacy Imperative Privacy Triangle of Trust Privacy incidents Regulatory impact for businesses 2. WHAT EU GDPR and ISO Terminology Roles within the Privacy Framework Privacy Principles Essence of privacy Privacy data lifecycle Personally Identifiable Information and Identifiability 3. HOW Compliance or Accountability Elements of an ACCOUNTABLE privacy program Privacy intent of the organization Foundation principles of PbD Privacy program roles & responsibilies Privacy activities across the product life cycle 4. HOW - Privacy Engineering & Assurance simplified Applying Privacy Engineering Privacy Engineering steps Privacy Assurance steps Privacy impact assessment Privacy risk management Assessing privacy maturity Privacy related business processes 25

26 Privacy Engineering & Assurance simplified Privacy Knowledge Base Principles, Policies, Requirements, Procedures, Guidelines, Patterns Privacy Engineering Planning & Concepting Threat Assessment and Mitigation Privacy requirements identification Design, Implement, Test Map privacy requirements into product features Select guidelines, patterns Privacy Assurance Review Against requirements Can be standalone Evidence Evidence Evidence Release Assessment Sign-off 26

27 Applying Privacy Engineering Principles Requirements Privacy Principles Privacy Requirements & Guidelines Threats Privacy & Security Threats & Vulnerabilities Controls Residual Risk Privacy & Security Safeguards Business Acceptable Risk 27

28 Privacy Engineering steps Define the product context Mitigation Define product in terms of main Selection of privacy & security functions, assets, stakeholders, safeguarding controls business model, sales estimates, Identification of key test causes deployment target countries, and test tools to verify control release schedule(s), strategic fidelity importance, risk summary Identification of residual risk Document the data flows Analyze the threats and and classify the data risks Inventory of all the personal data Identification of applicable & data clusters privacy principles and underlying Classification of each data requirements element Definie inherent threats to key User story/epic based diagram privacy & security principles of the flow of data through Analysis of attack surface and product components, minimization interactors Identification of root cause or vulnerability Implementing Privacy by Design 28

29 Privacy Assurance steps Purpose of assurance is to verify that Privacy Engineering activities have been implemented as agreed, operational, as well as any required staffing is in place Kick-off the assessment process with Privacy Officer early to understand what will be needed for final sign-off Privacy & security assessment is based on a thorough assessment of the Product Team evidence that Privacy Engineering activities has been implemented and is operational Final sign-off recommendation is made by Privacy Officer with approval by Product Management & Chief Privacy Officer Escallation process may be needed to address disagreements over findings between Privacy Officer and Product Management Non-compliance with privacy regulations SHOULD NOT be approved 29 A final assessment of all product or service that have a privacy impact is a necessity

30 Privacy impact assessment EU GDPR Article 33 promulgates PIA for public/privacy orgs Produces evidence of implementation of Privacy by Design Conducted by staff when personal data is collected, used or disclosed in a product or service Re-conducted if material changes made to product or service ISO (WD) will standardize methodology 30 Identify Analyze Verify Simplify Secure Remediate Attest describe the project, including the aims, whether any personal information will be handled, inherent privacy principles identify the personal information flows, classify data, identify relevant regulations, privacy requirements, privacy impact validate that only essential data is collected and processed for legitimate purposes required by the product or service change system and processes to only collect/store/process essential data for minimum period with a data deletion plan use industry best practices for safeguarding personal data through life cycle, providing consumer control over their data identify remaining risk, level of harm and mitigation plan to eliminate or reduce risk to acceptable level record findings, gain sponsor commitment to implement any needed changes, report results to management

31 Privacy risk assessment Produces evidence of minimization of possible privacy risk Conducted by business team with input from PIA evidence Re-conducted if material changes made to product or service ISO defines an applicable risk management framework When applicable, should include assessment of 3rd party risk Product management will need to accept any residual risk 31 Context Identify Analyze Evaluate Treat Monitor & Review Improve establish external, internal context for risk, risk management process and risk assessment criteria to be used identify sources of risk, areas of impact, events and causes, potential consequences consider causes and sources of risk, positive & negative consequences, both tangible and intangible make decisions based on risk analysis, which risks need treatment and the priority for treatment implementation select remediation based on avoiding, taking on, removing, changing potential for, changing harm of, sharing of risk assures controls effective, learn and improve, detect context changes, identify new risks, measure KPI commit to constant improvement of the overall risk footprint

32 Privacy capability assessment Provides a method for advancement of your privacy program Conducted to measure baseline and incremental changes Part of a commitment to accountability, constant improvement ISO (new IS) will standardize a methodology Plan Assess Review Report Improve agree on privacy capability assessment model (e.g., context or business process based) and assessment scale to be used rate the current capability against target capability identify sub-optimal capabilities to be improved and overall improvement plan communicate to management the assessment activity, results, improvement actions and next scheduled assessment implement improvement plan 32

33 Privacy related business processes Quality management process Risk management process Assessment process Security engineering process Business continuity process Customer care process Incident response management process External communications process Authority request/lawful intercept process 33

34 5. References 34 34

35 References OECD Privacy Principles EU Data Protection Directive 95/46/EC EU Proposed General Data Protection Regulation ISO from ISO (PDF version is freely available) CIPL Implementing Accountability CIPL Accountability Self-Assessment Tool 35

36 36 What did you learn?

37 Q1: The Triangle of Trust is a model to show the three primary forces influencing Privacy. Which one is not one of the three primary forces? a. Technology / Industry b. Advocacy / Consumers c. Legal / Intelligence d. Policy / Regulatory 37

38 Q2: Sensitive Personal Data or PII needs to be protected with additional privacy safeguards. Which personal data is not in this category of PII? a. Sexual orientation b. address c. Financial account credentials d. Professional memberships e. None of these 38

39 Q3: Which factoid about privacy framework roles and responsiblities is not correct? a. PII Principle is the owner of the personal data being processed b. PII Processor is not ultimately responsible for privacy breaches in their processing of personal data on behalf of the PII Controller c. PII Controller is the privacy stakeholder that determines the purposes and means for processing personally identifiable information (PII) d. Data Protection Authority is the independent legal authority for administering privacy rules within a country 39

40 Q4: What is the essence of privacy? a. Personal data b. Privacy data lifecycle c. Identifiability of personal data d. a and c e. Nymity f. a and c and e 40

41 Q5: Which statement about Privacy Engineering and Privacy Assurance is not correct? a. Privacy Engineering involves implementation of Privacy by Design b. Privacy Assurance involves the acceptance of any residual product privacy risk c. Privacy Engineering includes activities at all stages of the product life cycle and should begin as early as feasible d. Privacy Assurance should include a final verification that the findings from the Privacy Engineering have been implemented and are operational in the product e. Privacy Engineering is an emerging discipline 41

42 Q6: Which Privacy Engineering evidence is not always needed to demonstrate Privacy by Design? a. Product description documented b. 3rd party risk assessment documented c. Personal data flows documented d. Classified personal data inventory documented e. List of applicable privacy principles, requirements, threats and mitigation documented 42

43 Quiz Answers 1. c 2. b 3. a 4. f 5. b 6. b 43

44 Policy Question for Discussion 44

45 Policy topic for discussion Question: Which principle trumps when there seemingly are equal, two competing privacy principles? Background: PbD Foundation Principles include Privacy as the Default Setting, as well as Respect for User Privacy Keep it User-Centric. Within the context of the standardization of a Do Not Track mechanism for Web Browsers within the W3C Tracking Protection Working Group, the question of whether the consumer Do-Not-Track preference is raised by MSFT IE setting default to DNT:YES. But this removes consumer participation, as no informed-explicit-active consent is given on FUE. Debate: Pro/Con what should W3C TPWG set the default value for DNT preference to? A) DNT:YES, B) DNT:NO, C) Not defaultable. 45

EXIN Privacy and Data Protection Foundation. Preparation Guide. Edition

EXIN Privacy and Data Protection Foundation. Preparation Guide. Edition EXIN Privacy and Data Protection Foundation Preparation Guide Edition 201701 Content 1. Overview 3 2. Exam requirements 5 3. List of Basic Concepts 9 4. Literature 15 2 1. Overview EXIN Privacy and Data

More information

Protection of Privacy Policy

Protection of Privacy Policy Protection of Privacy Policy Policy No. CIMS 006 Version No. 1.0 City Clerk's Office An Information Management Policy Subject: Protection of Privacy Policy Keywords: Information management, privacy, breach,

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Privacy framework

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Privacy framework INTERNATIONAL STANDARD ISO/IEC 29100 First edition 2011-12-15 Information technology Security techniques Privacy framework Technologies de l'information Techniques de sécurité Cadre privé Reference number

More information

Privacy Policy SOP-031

Privacy Policy SOP-031 SOP-031 Version: 2.0 Effective Date: 18-Nov-2013 Table of Contents 1. DOCUMENT HISTORY...3 2. APPROVAL STATEMENT...3 3. PURPOSE...4 4. SCOPE...4 5. ABBREVIATIONS...5 6. PROCEDURES...5 6.1 COLLECTION OF

More information

A Guide for Structuring and Implementing PIAs

A Guide for Structuring and Implementing PIAs WHITEPAPER A Guide for Structuring and Implementing PIAs Six steps for your next Privacy Impact Assessment TRUSTe Inc. US: 1-888-878-7830 www.truste.com EU: +44 (0) 203 078 6495 www.truste.eu 2 CONTENTS

More information

CCTV Policy. Policy reviewed by Academy Transformation Trust on June This policy links to: T:Drive. Safeguarding Policy Data Protection Policy

CCTV Policy. Policy reviewed by Academy Transformation Trust on June This policy links to: T:Drive. Safeguarding Policy Data Protection Policy CCTV Policy Policy reviewed by Academy Transformation Trust on June 2018 This policy links to: Safeguarding Policy Data Protection Policy Located: T:Drive Review Date May 2019 Our Mission To provide the

More information

Privacy engineering, privacy by design, and privacy governance

Privacy engineering, privacy by design, and privacy governance CyLab Lorrie Faith Cranor" Engineering & Public Policy acy & Secur ity Priv e l HT TP ratory bo La 8-533 / 8-733 / 19-608 / 95-818:! Privacy Policy, Law, and Technology CyLab U sab November 17, 2015 ://

More information

Our position. ICDPPC declaration on ethics and data protection in artificial intelligence

Our position. ICDPPC declaration on ethics and data protection in artificial intelligence ICDPPC declaration on ethics and data protection in artificial intelligence AmCham EU speaks for American companies committed to Europe on trade, investment and competitiveness issues. It aims to ensure

More information

End-to-End Privacy Accountability

End-to-End Privacy Accountability End-to-End Privacy Accountability Denis Butin 1 and Daniel Le Métayer 2 1 TU Darmstadt 2 Inria, Université de Lyon TELERISE, 18 May 2015 1 / 17 Defining Accountability 2 / 17 Is Accountability Needed?

More information

CCTV Policy. Policy reviewed by Academy Transformation Trust on June This policy links to: Safeguarding Policy Data Protection Policy

CCTV Policy. Policy reviewed by Academy Transformation Trust on June This policy links to: Safeguarding Policy Data Protection Policy CCTV Policy Policy reviewed by Academy Transformation Trust on June 2018 This policy links to: Located: Safeguarding Policy Data Protection Policy Review Date May 2019 Our Mission To provide the very best

More information

Privacy Procedure SOP-031. Version: 04.01

Privacy Procedure SOP-031. Version: 04.01 SOP-031 Version: 04.01 Effective Date: 01-Mar-2017 Table of Contents 1. DOCUMENT HISTORY... 3 2. APPROVAL STATEMENT... 3 3. PURPOSE... 4 4. SCOPE... 4 5. ABBREVIATIONS... 4 6. PROCEDURES... 5 6.1 COLLECTION

More information

Pan-Canadian Trust Framework Overview

Pan-Canadian Trust Framework Overview Pan-Canadian Trust Framework Overview A collaborative approach to developing a Pan- Canadian Trust Framework Authors: DIACC Trust Framework Expert Committee August 2016 Abstract: The purpose of this document

More information

Standards and privacy engineering ISO, OASIS, PRIPARE and Other Important Developments

Standards and privacy engineering ISO, OASIS, PRIPARE and Other Important Developments Standards and privacy engineering ISO, OASIS, PRIPARE and Other Important Developments Antonio Kung, CTO 25 rue du Général Foy, 75008 Paris www.trialog.com 9 May 2017 1 Introduction Speaker Engineering

More information

Nymity Demonstrating Compliance Manual: A Structured Approach to Privacy Management Accountability

Nymity Demonstrating Compliance Manual: A Structured Approach to Privacy Management Accountability A Structured Approach to Privacy Management Accountability Copyright 2016 by Nymity Inc. All rights reserved. All text, images, logos, trademarks and information contained in this document are the intellectual

More information

This policy sets out how Legacy Foresight and its Associates will seek to ensure compliance with the legislation.

This policy sets out how Legacy Foresight and its Associates will seek to ensure compliance with the legislation. Privacy Notice August 2018 Introduction The General Data Protection Regulation (GDPR) is European wide data protection legislation that requires organisations working with individuals based in the European

More information

Guidelines for the Stage of Implementation - Self-Assessment Activity

Guidelines for the Stage of Implementation - Self-Assessment Activity GUIDELINES FOR PRIVACY AND INFORMATION MANAGEMENT (PIM) PROGRAM SELF-ASSESSMENT ACTIVITY Guidelines for the Stage of Implementation - Self-Assessment Activity PURPOSE This tool is for the use of school

More information

What We Heard Report Inspection Modernization: The Case for Change Consultation from June 1 to July 31, 2012

What We Heard Report Inspection Modernization: The Case for Change Consultation from June 1 to July 31, 2012 What We Heard Report Inspection Modernization: The Case for Change Consultation from June 1 to July 31, 2012 What We Heard Report: The Case for Change 1 Report of What We Heard: The Case for Change Consultation

More information

Hong Kong Personal Data Protection Regulatory Framework From Compliance to Accountability

Hong Kong Personal Data Protection Regulatory Framework From Compliance to Accountability Legal Week s Corporate Counsel Forum 2016 Renaissance Harbour View Hotel 23 June 2016 Hong Kong Personal Data Protection Regulatory Framework From Compliance to Accountability Stephen Kai-yi Wong Privacy

More information

Privacy by Design: essential for organizational accountability and strong business practices

Privacy by Design: essential for organizational accountability and strong business practices IDIS (2010) 3:405 413 DOI 10.1007/s12394-010-0053-z Privacy by Design: essential for organizational accountability and strong business practices Ann Cavoukian & Scott Taylor & Martin E. Abrams Received:

More information

Privacy Management in Smart Cities

Privacy Management in Smart Cities Privacy Management in Smart Cities Antonio Kung 26/04/2017 Data management and citizens privacy in smart cities open governance 1 Introduction Speaker Antonio Kung, Trialog (www.trialog.com,fr) Engineering

More information

Privacy by Design Assessment and Certification. For discussion purposes only

Privacy by Design Assessment and Certification. For discussion purposes only Privacy by Design Assessment and Certification For discussion purposes only Privacy by Design The Framework Privacy by Design 2 Adoption of Privacy by Design as an International Standard Landmark Resolution

More information

ARTICLE 29 Data Protection Working Party

ARTICLE 29 Data Protection Working Party ARTICLE 29 Data Protection Working Party Brussels, 10 April 2017 Hans Graux Project editor of the draft Code of Conduct on privacy for mobile health applications By e-mail: hans.graux@timelex.eu Dear Mr

More information

Robert Bond Partner, Commercial/IP/IT

Robert Bond Partner, Commercial/IP/IT Using Privacy Impact Assessments Effectively robert.bond@bristows.com Robert Bond Partner, Commercial/IP/IT BA (Hons) Law, Wolverhampton University Qualified as a Solicitor 1979 Qualified as a Notary Public

More information

FIPPs Fair Information Practice Principles

FIPPs Fair Information Practice Principles FIPPs Fair Information Practice Principles T H E G O L D S TA N DA R D F O R P R OT EC T I N G P E R S O N A L I N F O R M AT I O N Learning Objectives Recognize the Fair Information Practice Principles

More information

First Components Ltd, Savigny Oddie Ltd, & Datum Engineering Ltd. is pleased to provide the following

First Components Ltd, Savigny Oddie Ltd, & Datum Engineering Ltd. is pleased to provide the following Privacy Notice Introduction This document refers to personal data, which is defined as information concerning any living person (a natural person who hereafter will be called the Data Subject) that is

More information

What does the revision of the OECD Privacy Guidelines mean for businesses?

What does the revision of the OECD Privacy Guidelines mean for businesses? m lex A B E X T R A What does the revision of the OECD Privacy Guidelines mean for businesses? The Organization for Economic Cooperation and Development ( OECD ) has long recognized the importance of privacy

More information

Biometric Data, Deidentification. E. Kindt Cost1206 Training school 2017

Biometric Data, Deidentification. E. Kindt Cost1206 Training school 2017 Biometric Data, Deidentification and the GDPR E. Kindt Cost1206 Training school 2017 Overview Introduction 1. Definition of biometric data 2. Biometric data as a new category of sensitive data 3. De-identification

More information

DNVGL-CG-0214 Edition September 2016

DNVGL-CG-0214 Edition September 2016 CLASS GUIDELINE DNVGL-CG-0214 Edition September 2016 The content of this service document is the subject of intellectual property rights reserved by ("DNV GL"). The user accepts that it is prohibited by

More information

GDPR Awareness. Kevin Styles. Certified Information Privacy Professional - Europe Member of International Association of Privacy professionals

GDPR Awareness. Kevin Styles. Certified Information Privacy Professional - Europe Member of International Association of Privacy professionals GDPR Awareness Kevin Styles Certified Information Privacy Professional - Europe Member of International Association of Privacy professionals Introduction Privacy and data protection are fundamental rights

More information

ISO/TR TECHNICAL REPORT. Intelligent transport systems System architecture Privacy aspects in ITS standards and systems

ISO/TR TECHNICAL REPORT. Intelligent transport systems System architecture Privacy aspects in ITS standards and systems TECHNICAL REPORT ISO/TR 12859 First edition 2009-06-01 Intelligent transport systems System architecture Privacy aspects in ITS standards and systems Systèmes intelligents de transport Architecture de

More information

Ocean Energy Europe Privacy Policy

Ocean Energy Europe Privacy Policy Ocean Energy Europe Privacy Policy 1. General 1.1 This is the privacy policy of Ocean Energy Europe AISBL, a non-profit association with registered offices in Belgium at 1040 Brussels, Rue d Arlon 63,

More information

The EU's new data protection regime Key implications for marketers and adtech service providers Nick Johnson and Stephen Groom 11 February 2016

The EU's new data protection regime Key implications for marketers and adtech service providers Nick Johnson and Stephen Groom 11 February 2016 The EU's new data protection regime Key implications for marketers and adtech service providers Nick Johnson and Stephen Groom 11 February 2016 General Data Protection Regulation ("GDPR") timeline 24.10.95

More information

HL7 Standards and Components to Support Implementation of the European General Data Protection Regulation (GDPR)

HL7 Standards and Components to Support Implementation of the European General Data Protection Regulation (GDPR) HL7 Standards and Components to Support Implementation of the European General Data Protection Regulation (GDPR) Alexander Mense - University of Applied Sciences Vienna Bernd Blobel - Medical Faculty,

More information

Whatever Happened to the. Fair Information Practices?

Whatever Happened to the. Fair Information Practices? Whatever Happened to the Fair Information Practices? Beth Givens Director Privacy Rights Clearinghouse Privacy Symposium August 22, 2007 Cambridge, MA Topics Definition and origins of FIPs Overview of

More information

EXPLORATION DEVELOPMENT OPERATION CLOSURE

EXPLORATION DEVELOPMENT OPERATION CLOSURE i ABOUT THE INFOGRAPHIC THE MINERAL DEVELOPMENT CYCLE This is an interactive infographic that highlights key findings regarding risks and opportunities for building public confidence through the mineral

More information

ICO submission to the inquiry of the House of Lords Select Committee on Communications - The Internet : To Regulate or not to Regulate?

ICO submission to the inquiry of the House of Lords Select Committee on Communications - The Internet : To Regulate or not to Regulate? Information Commissioner s Office ICO submission to the inquiry of the House of Lords Select Committee on Communications - The Internet : To Regulate or not to Regulate? 16 May 2018 V. 1.0 Final 1 Contents

More information

Fiscal 2007 Environmental Technology Verification Pilot Program Implementation Guidelines

Fiscal 2007 Environmental Technology Verification Pilot Program Implementation Guidelines Fifth Edition Fiscal 2007 Environmental Technology Verification Pilot Program Implementation Guidelines April 2007 Ministry of the Environment, Japan First Edition: June 2003 Second Edition: May 2004 Third

More information

COMMUNICATIONS POLICY

COMMUNICATIONS POLICY COMMUNICATIONS POLICY This policy was approved by the Board of Trustees on June 14, 2016 TABLE OF CONTENTS 1. INTRODUCTION 1 2. PURPOSE 1 3. APPLICATION 1 4. POLICY STATEMENT 1 5. ROLES AND RESPONSIBILITIES

More information

ISACA Privacy Principles and Program Management Guide. Yves LE ROUX CISM, CISSP ISACA Privacy TF Chairman. Insert Date Here

ISACA Privacy Principles and Program Management Guide. Yves LE ROUX CISM, CISSP ISACA Privacy TF Chairman. Insert Date Here ISACA Privacy Principles and Program Management Guide Yves LE ROUX CISM, CISSP ISACA Privacy TF Chairman Insert Date Here PRIVACY GUIDANCE TASK FORCE Established in June 2014, in order to develop a series

More information

Submission of the Information & Privacy Commissioner, Ontario, Canada

Submission of the Information & Privacy Commissioner, Ontario, Canada Information and Privacy Commissioner of Ontario Commissaire à l information et à la protection de la vie privée de l Ontario Submission of the Information & Privacy Commissioner, Ontario, Canada Response

More information

IAB Europe Guidance THE DEFINITION OF PERSONAL DATA. IAB Europe GDPR Implementation Working Group WHITE PAPER

IAB Europe Guidance THE DEFINITION OF PERSONAL DATA. IAB Europe GDPR Implementation Working Group WHITE PAPER IAB Europe Guidance WHITE PAPER THE DEFINITION OF PERSONAL DATA Five Practical Steps to help companies comply with the E-Privacy Working Directive Paper 02/2017 IAB Europe GDPR Implementation Working Group

More information

The GDPR and Upcoming mhealth Code of Conduct. Dr Etain Quigley Postdoctoral Research Fellow (ARCH, UCD)

The GDPR and Upcoming mhealth Code of Conduct. Dr Etain Quigley Postdoctoral Research Fellow (ARCH, UCD) The GDPR and Upcoming mhealth Code of Conduct Dr Etain Quigley Postdoctoral Research Fellow (ARCH, UCD) EU General Data Protection Regulation (May 2018) First major reform in 20 years 25 th May 2018 no

More information

Photography and Videos at School Policy

Photography and Videos at School Policy Photography and Videos at School Policy Last updated: 25 May 2018 Contents: Statement of intent 1. Legal framework 2. Definitions 3. Roles and responsibilities 4. Parental consent 5. General procedures

More information

Should privacy impact assessments be mandatory? David Wright Trilateral Research & Consulting 17 Sept 2009

Should privacy impact assessments be mandatory? David Wright Trilateral Research & Consulting 17 Sept 2009 Should privacy impact assessments be mandatory? David Wright Trilateral Research & Consulting 17 Sept 2009 1 Today s presentation Databases solving one problem & creating another What is a privacy impact

More information

Violent Intent Modeling System

Violent Intent Modeling System for the Violent Intent Modeling System April 25, 2008 Contact Point Dr. Jennifer O Connor Science Advisor, Human Factors Division Science and Technology Directorate Department of Homeland Security 202.254.6716

More information

GDPR Implications for ediscovery from a legal and technical point of view

GDPR Implications for ediscovery from a legal and technical point of view GDPR Implications for ediscovery from a legal and technical point of view Friday Paul Lavery, Partner, McCann FitzGerald Ireland Meribeth Banaschik, Partner, Ernst & Young Germany mccannfitzgerald.com

More information

Ten Principles for a Revised US Privacy Framework

Ten Principles for a Revised US Privacy Framework Ten Principles for a Revised US Privacy Framework Our economies and societies are in the midst of the 4 th industrial revolution, with digitalization and datafication transforming the way we live, work

More information

Personal Data Protection Competency Framework for School Students. Intended to help Educators

Personal Data Protection Competency Framework for School Students. Intended to help Educators Conférence INTERNATIONAL internationale CONFERENCE des OF PRIVACY commissaires AND DATA à la protection PROTECTION des données COMMISSIONERS et à la vie privée Personal Data Protection Competency Framework

More information

ITAC RESPONSE: Modernizing Consent and Privacy in PIPEDA

ITAC RESPONSE: Modernizing Consent and Privacy in PIPEDA August 5, 2016 ITAC RESPONSE: Modernizing Consent and Privacy in PIPEDA The Information Technology Association of Canada (ITAC) appreciates the opportunity to participate in the Office of the Privacy Commissioner

More information

Toward Objective Global Privacy Standards. Ari Schwartz Senior Internet Policy Advisor

Toward Objective Global Privacy Standards. Ari Schwartz Senior Internet Policy Advisor Toward Objective Global Privacy Standards Ari Schwartz Senior Internet Policy Advisor Summary Technical standards offer a new ability to support the important public policy goal of better protecting privacy.

More information

An Introduction to a Taxonomy of Information Privacy in Collaborative Environments

An Introduction to a Taxonomy of Information Privacy in Collaborative Environments An Introduction to a Taxonomy of Information Privacy in Collaborative Environments GEOFF SKINNER, SONG HAN, and ELIZABETH CHANG Centre for Extended Enterprises and Business Intelligence Curtin University

More information

Information & Communication Technology Strategy

Information & Communication Technology Strategy Information & Communication Technology Strategy 2012-18 Information & Communication Technology (ICT) 2 Our Vision To provide a contemporary and integrated technological environment, which sustains and

More information

LLOYDS BANKING GROUP MATTERS RESERVED TO THE BOARDS (LLOYDS BANKING GROUP PLC, LLOYDS BANK PLC, BANK OF SCOTLAND PLC & HBOS PLC)

LLOYDS BANKING GROUP MATTERS RESERVED TO THE BOARDS (LLOYDS BANKING GROUP PLC, LLOYDS BANK PLC, BANK OF SCOTLAND PLC & HBOS PLC) LLOYDS BANKING GROUP MATTERS RESERVED TO THE BOARDS (LLOYDS BANKING GROUP PLC, LLOYDS BANK PLC, BANK OF SCOTLAND PLC & HBOS PLC) LLOYDS BANKING GROUP PLC, LLOYDS BANK PLC, BANK OF SCOTLAND PLC & HBOS PLC

More information

University of Massachusetts Amherst Libraries. Digital Preservation Policy, Version 1.3

University of Massachusetts Amherst Libraries. Digital Preservation Policy, Version 1.3 University of Massachusetts Amherst Libraries Digital Preservation Policy, Version 1.3 Purpose: The University of Massachusetts Amherst Libraries Digital Preservation Policy establishes a framework to

More information

ONR Strategy 2015 to 2020

ONR Strategy 2015 to 2020 Title of publication ONR Strategy 2015 to 2020 Office for Nuclear Regulation Page 1 of 5 Introduction Nick Baldwin, Chair The Energy Act 2013 provided for the creation of ONR as an independent, statutory

More information

IET Guidelines for Volunteers: Data Protection

IET Guidelines for Volunteers: Data Protection SERIAL NO: Issue No: 3.0 IET Guidelines for Volunteers: Protection Effective Date Approved by Author February 2012 Executive Committee Richard Best Date of Last Review Reviewed By Date of Next Review February

More information

1 SERVICE DESCRIPTION

1 SERVICE DESCRIPTION DNV GL management system ICP Product Certification ICP 4-6-3-5-CR Document number: ICP 4-6-3-5-CR Valid for: All in DNV GL Revision: 2 Date: 2017-05-05 Resp. unit/author: Torgny Segerstedt Reviewed by:

More information

Legislative and Regulatory Update. Diane Bowers, CASRO President CASRO Data Collection Conference November 19, 2009

Legislative and Regulatory Update. Diane Bowers, CASRO President CASRO Data Collection Conference November 19, 2009 Legislative and Regulatory Update Diane Bowers, CASRO President CASRO Data Collection Conference November 19, 2009 2009 Pharma market research state and Federal Massachusetts Vermont Minnesota Proposed

More information

Applying Privacy by Design in Software Engineering - An European Perspective

Applying Privacy by Design in Software Engineering - An European Perspective Applying Privacy by Design in Software Engineering - An European Perspective Karin Bernsmed Department of software engineering, safety and security SINTEF ICT Trondheim, rway karin.bernsmed@sintef.no Abstract

More information

Effective Data Protection Governance An Approach to Information Governance in an Information Age. OECD Expert Consultation Boston October 2016

Effective Data Protection Governance An Approach to Information Governance in an Information Age. OECD Expert Consultation Boston October 2016 Effective Protection Governance An Approach to Information Governance in an Information Age OECD Expert Consultation Boston October 2016 Today s Objectives Are the Same, But the Challenges Are Different

More information

Seminar on Consultation on. Review of the Personal Data (Privacy) Ordinance. Why the review is being conducted and what this means to you

Seminar on Consultation on. Review of the Personal Data (Privacy) Ordinance. Why the review is being conducted and what this means to you Seminar on Consultation on Review of the Personal Data (Privacy) Ordinance Why the review is being conducted and what this means to you On 28 August 2009, the Government released the Consultation Document

More information

Responsible Data Use Policy Framework

Responsible Data Use Policy Framework 1 May 2018 Sidewalk Toronto is a joint effort by Waterfront Toronto and Sidewalk Labs to create a new kind of complete community on Toronto s waterfront that combines cutting-edge technology and forward-thinking

More information

Details of the Proposal

Details of the Proposal Details of the Proposal Draft Model to Address the GDPR submitted by Coalition for Online Accountability This document addresses how the proposed model submitted by the Coalition for Online Accountability

More information

Interest Balancing Test Assessment on the processing of the copies of data subjects driving licences for the MOL Limo service

Interest Balancing Test Assessment on the processing of the copies of data subjects driving licences for the MOL Limo service 1 Legitimate interest of the controller or a third party: General description of the processing environment Users can commence the registration required for using the MOL LIMO service in the Mobile Application

More information

The Information Commissioner s response to the Draft AI Ethics Guidelines of the High-Level Expert Group on Artificial Intelligence

The Information Commissioner s response to the Draft AI Ethics Guidelines of the High-Level Expert Group on Artificial Intelligence Wycliffe House, Water Lane, Wilmslow, Cheshire, SK9 5AF T. 0303 123 1113 F. 01625 524510 www.ico.org.uk The Information Commissioner s response to the Draft AI Ethics Guidelines of the High-Level Expert

More information

https://www.icann.org/en/system/files/files/interim-models-gdpr-compliance-12jan18-en.pdf 2

https://www.icann.org/en/system/files/files/interim-models-gdpr-compliance-12jan18-en.pdf 2 ARTICLE 29 Data Protection Working Party Brussels, 11 April 2018 Mr Göran Marby President and CEO of the Board of Directors Internet Corporation for Assigned Names and Numbers (ICANN) 12025 Waterfront

More information

FY 2008 (October 1, 2007 September 30, 2008) NIMS Compliance Objectives and Metrics for Local Governments

FY 2008 (October 1, 2007 September 30, 2008) NIMS Compliance Objectives and Metrics for Local Governments FY 2008 (October 1, 2007 September 30, 2008) NIMS Compliance Objectives and Metrics for Local Governments Introduction Homeland Security Presidential Directive (HSPD)- 5 Management of Domestic Incidents

More information

Privacy by Design: Research and Action. Deirdre K. Mulligan

Privacy by Design: Research and Action. Deirdre K. Mulligan Privacy by Design: Research and Action Deirdre K. Mulligan Privacy by Design: Legal Drivers E- Government Act of 2002 and OMB Guidance for Implementing the Privacy Provisions of the E-Government Act of

More information

The Sustainable Tourism Programme of the 10-Year Framework of Programmes on Sustainable Consumption and Production

The Sustainable Tourism Programme of the 10-Year Framework of Programmes on Sustainable Consumption and Production The Sustainable Tourism Programme of the 10-Year Framework of Programmes on Sustainable Consumption and Production Generating collective impact Scaling up and replicating Programmatic implementation Helena

More information

Privacy by Design: Integrating Technology into Global Privacy Practices

Privacy by Design: Integrating Technology into Global Privacy Practices Privacy by Design: Integrating Technology into Global Privacy Practices Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario, Canada Harvard Privacy Symposium August 23, 2007 Role of the IPC

More information

March 27, The Information Technology Industry Council (ITI) appreciates this opportunity

March 27, The Information Technology Industry Council (ITI) appreciates this opportunity Submission to the White House Office of Science and Technology Policy Response to the Big Data Request for Information Comments of the Information Technology Industry Council I. Introduction March 27,

More information

Enhancing Audit Quality and Transparency Supplement Additional information required by Article 13 of EU Regulation 537/2014

Enhancing Audit Quality and Transparency Supplement Additional information required by Article 13 of EU Regulation 537/2014 Enhancing Audit Quality and Transparency Supplement Additional information required by Article 13 of EU Regulation 537/2014 December 2017 kpmg.com Contents 1. Network arrangement 1 1.1 Legal structure

More information

Analysis of Privacy and Data Protection Laws and Directives Around the World

Analysis of Privacy and Data Protection Laws and Directives Around the World Analysis of Privacy and Data Protection Laws and Directives Around the World Michael Willett (Seagate) ISTPA Board and Framework Chair Track IIB: Global Privacy Policy The Privacy Symposium: Boston, 23

More information

Ethics Guideline for the Intelligent Information Society

Ethics Guideline for the Intelligent Information Society Ethics Guideline for the Intelligent Information Society April 2018 Digital Culture Forum CONTENTS 1. Background and Rationale 2. Purpose and Strategies 3. Definition of Terms 4. Common Principles 5. Guidelines

More information

Office for Nuclear Regulation Strategy

Office for Nuclear Regulation Strategy Office for Nuclear Regulation Strategy 2015 to 2020 Office for Nuclear Regulation page 1 of 12 Office for Nuclear Regulation page 2 of 12 Office for Nuclear Regulation Strategy 2015 to 2020 Presented to

More information

SAFEGUARDING ADULTS FRAMEWORK. Prevention and effective responses to neglect, harm and abuse is a basic requirement of modern health care services.

SAFEGUARDING ADULTS FRAMEWORK. Prevention and effective responses to neglect, harm and abuse is a basic requirement of modern health care services. SAFEGUARDING ADULTS FRAMEWORK Introduction Prevention and effective responses to neglect, harm and abuse is a basic requirement of modern health care services. Safeguarding adults involves a range of additional

More information

BSA COMMENTS ON DRAFT PERSONAL DATA PROTECTION ACT

BSA COMMENTS ON DRAFT PERSONAL DATA PROTECTION ACT Permanent Secretary The Ministry of Digital Economy and Society 120 Moo 3, 6-9 floor, The Government Complex Commemorating His Majesty, Chaeng Watthana, Thung Song Hong, Laksi, Bangkok 10210 February 6,

More information

BUREAU OF LAND MANAGEMENT INFORMATION QUALITY GUIDELINES

BUREAU OF LAND MANAGEMENT INFORMATION QUALITY GUIDELINES BUREAU OF LAND MANAGEMENT INFORMATION QUALITY GUIDELINES Draft Guidelines for Ensuring and Maximizing the Quality, Objectivity, Utility, and Integrity of Information Disseminated by the Bureau of Land

More information

Identifying and Managing Joint Inventions

Identifying and Managing Joint Inventions Page 1, is a licensing manager at the Wisconsin Alumni Research Foundation in Madison, Wisconsin. Introduction Joint inventorship is defined by patent law and occurs when the outcome of a collaborative

More information

10246/10 EV/ek 1 DG C II

10246/10 EV/ek 1 DG C II COUNCIL OF THE EUROPEAN UNION Brussels, 28 May 2010 10246/10 RECH 203 COMPET 177 OUTCOME OF PROCEEDINGS from: General Secretariat of the Council to: Delegations No. prev. doc.: 9451/10 RECH 173 COMPET

More information

KKR Credit Advisors (Ireland) Unlimited Company PILLAR 3 DISCLOSURES

KKR Credit Advisors (Ireland) Unlimited Company PILLAR 3 DISCLOSURES KKR Credit Advisors (Ireland) Unlimited Company KKR Credit Advisors (Ireland) Unlimited Company PILLAR 3 DISCLOSURES JUNE 2017 1 1. Background The European Union Capital Requirements Directive ( CRD or

More information

Strategy for a Digital Preservation Program. Library and Archives Canada

Strategy for a Digital Preservation Program. Library and Archives Canada Strategy for a Digital Preservation Program Library and Archives Canada November 2017 Table of Contents 1. Introduction... 3 2. Definition and scope... 3 3. Vision for digital preservation... 4 3.1 Phase

More information

GUIDELINES ON PRIVACY BY DESIGN AND PRIVACY IMPACT ASSESSMENT

GUIDELINES ON PRIVACY BY DESIGN AND PRIVACY IMPACT ASSESSMENT Document 2.1.4-7 GUIDELINES ON PRIVACY BY DESIGN AND PRIVACY IMPACT ASSESSMENT Component 2 Activity 2.1.4-4 Draft version - November 2011 The content of this report is the sole responsibility of Human

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Privacy framework

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Privacy framework INTERNATIONAL STANDARD ISO/IEC 29100 First edition 2011-12-15 Information technology Security techniques Privacy framework Technologies de l'information Techniques de sécurité Cadre privé Reference number

More information

I hope you will find these comments constructive and helpful.

I hope you will find these comments constructive and helpful. Delayed Office Opening for Employee Training This office will be closed from 8.45am - 11.00am on the first Thursday of each month. Services for Children, Young People & Families Head of Service: Jacquie

More information

Diana Gordick, Ph.D. 150 E Ponce de Leon, Suite 350 Decatur, GA Health Insurance Portability and Accountability Act (HIPAA)

Diana Gordick, Ph.D. 150 E Ponce de Leon, Suite 350 Decatur, GA Health Insurance Portability and Accountability Act (HIPAA) Diana Gordick, Ph.D. 150 E Ponce de Leon, Suite 350 Decatur, GA 30030 Health Insurance Portability and Accountability Act (HIPAA) NOTICE OF PRIVACY PRACTICES I. COMMITMENT TO YOUR PRIVACY: DIANA GORDICK,

More information

GAMING POLICY FRAMEWORK

GAMING POLICY FRAMEWORK GAMING POLICY FRAMEWORK Legislative Authority The Minister of Gaming is responsible for the Alberta Gaming and Liquor Commission and its Board. The Commission is governed by the Criminal Code (Canada),

More information

Privacy, Technology and Economics in the 5G Environment

Privacy, Technology and Economics in the 5G Environment Privacy, Technology and Economics in the 5G Environment S A M A N T K H A J U R I A A S S I S T P R O F E S S O R, C M I K N U D E R I K S K O U B Y P R O F E S S O R, D I R E C T O R C M I S K O U B Y

More information

Before the National Telecommunications & Information Administration Department of Commerce Washington, DC

Before the National Telecommunications & Information Administration Department of Commerce Washington, DC Before the National Telecommunications & Information Administration Department of Commerce Washington, DC In re Request for Comments on Big Data and Dkt. No. 140514424-4424-01 and Consumer Privacy in the

More information

Building DIGITAL TRUST People s Plan for Digital: A discussion paper

Building DIGITAL TRUST People s Plan for Digital: A discussion paper Building DIGITAL TRUST People s Plan for Digital: A discussion paper We want Britain to be the world s most advanced digital society. But that won t happen unless the digital world is a world of trust.

More information

Efese, ethics in research

Efese, ethics in research faculty of law staatsrecht, bestuursrecht & bestuurskunde 02-06-2017 1 Efese, ethics in research Spetses, June 2017 Dr. Aline Klingenberg faculty of law staatsrecht, bestuursrecht & bestuurskunde 02-06-2017

More information

Wireless Sensor Networks and Privacy

Wireless Sensor Networks and Privacy Wireless Sensor Networks and Privacy UbiSec & Sens Workshop Aachen 7.2.2008 Agenda ULD who we are and what we do Privacy and Data Protection concept and terminology Privacy and Security technologies a

More information

responsiveness. Report. Our sole Scope of work period; Activities outside the Statements of future Methodology site level); Newmont; 3.

responsiveness. Report. Our sole Scope of work period; Activities outside the Statements of future Methodology site level); Newmont; 3. INDEPENDENT ASSURANCE STATEMENT Introduction and objectives of work Bureau Veritas North America, Inc. (Bureau Veritas) was engaged by Newmont Mining Corporation (Newmont) to conduct an independent assurance

More information

2018 / Photography & Video Bell Lane Primary School & Children s Centre

2018 / Photography & Video Bell Lane Primary School & Children s Centre 2018 / 2019 Photography & Video Use @ Bell Lane Primary School & Children s Centre Bell Lane Primary School & Children s Centre Responsible: Headteacher & Governing Body Last reviewed: Summer 2018 Review

More information

Upstream Oil and Gas. Spill Prevention, Preparedness, Response, and Recovery. March 2013

Upstream Oil and Gas. Spill Prevention, Preparedness, Response, and Recovery. March 2013 Upstream Oil and Gas Spill Prevention, Preparedness, Response, and Recovery March 2013 Canadian Association of Petroleum Producers (CAPP) Members explore for, develop and produce natural gas, natural gas

More information

510 Data Responsibility Policy

510 Data Responsibility Policy 510 Data Responsibility Policy Rationale behind this policy For more than 150 years, the Red Cross has been guided by principles to provide impartial humanitarian help. The seven fundamental principles

More information

Media Literacy Policy

Media Literacy Policy Media Literacy Policy ACCESS DEMOCRATIC PARTICIPATE www.bai.ie Media literacy is the key to empowering people with the skills and knowledge to understand how media works in this changing environment PUBLIC

More information

clarification to bring legal certainty to these issues have been voiced in various position papers and statements.

clarification to bring legal certainty to these issues have been voiced in various position papers and statements. ESR Statement on the European Commission s proposal for a Regulation on the protection of individuals with regard to the processing of personal data on the free movement of such data (General Data Protection

More information

Presentation to NAS Committee on IP Management in Standards-Setting Processes. Dan Bart President and CEO Valley View Corporation November 4, 2011

Presentation to NAS Committee on IP Management in Standards-Setting Processes. Dan Bart President and CEO Valley View Corporation November 4, 2011 Presentation to NAS Committee on IP Management in Standards-Setting Processes Dan Bart President and CEO Valley View Corporation November 4, 2011 Who is Dan Bart? Current Chairman of the ANSI IPR Policy

More information

The new GDPR legislative changes & solutions for online marketing

The new GDPR legislative changes & solutions for online marketing TRUSTED PRIVACY The new GDPR legislative changes & solutions for online marketing IAB Forum 2016 29/30th of November 2016, Milano Prof. Dr. Christoph Bauer, GmbH Who we are and what we do Your partner

More information