Acxiom Privacy by Design: Accountability

Size: px
Start display at page:

Download "Acxiom Privacy by Design: Accountability"

Transcription

1 Acxiom Privacy by Design: Accountability Sheila Colclasure Acxiom Global Public Policy and Privacy Officer 06/05/ Acxiom Corporation. All Rights Reserved Acxiom Corporation. All Rights Reserved.

2 Agenda Product Management Methodology Regular Assurance Reviews Other Accountability Initiatives Conclusions Acxiom Corporation. All Rights Reserved.

3 Product Management Methodology PMM Lifecycle Planning Requirements Validation Pilot General Availability Ongoing Management Retirement Privacy, Legal and Security (PLS) Risk - Risks to the business? - Risks to individuals? - How can they be addressed? Unfavorable Ranked 1 to 10 Favorable Acxiom Corporation. All Rights Reserved.

4 Regular Assurance Reviews Third Party Assurance Reviews Address - Small Changes in the Product - Legal and Regulatory Changes over Time - Opportunity for Re-education Types of Reviews - Security Reviews (SAS 70 Type I and II, client audits) - Privacy & Legal Reviews Planning Requirements Validation Pilot General Availability Ongoing Management Retirement Privacy & Legal Assurance Reviews Security Assurance Reviews Acxiom Corporation. All Rights Reserved.

5 Privacy & Legal Assurance Reviews History - Concerns about Unregulated Information Aggregation and Use in Early 90s» Included Uses of Sensitive Information - Individual Reference Services Group Self-regulatory Efforts» Information Use Guidelines» Consumer Participation Guidelines» Annual Assurance Review Validated by Third Party - FTC Agreement with Principles - Regulation Enacted in Acxiom Continued and Expanded Process Acxiom Corporation. All Rights Reserved.

6 Privacy & Legal Assurance Reviews Map Information Flows Assess Compliance with... - Legal Requirements (Regulatory and Contract) - Industry Best Practices - Acxiom Policies Assess Compliance during... - Information Collection & Retention» Direct Collection» Indirect Collection - All Internal Uses - Onward Transfer of Information» Client Reviews (for cause and random) Include Third Party Validation Value to Business Leaders Acxiom Corporation. All Rights Reserved.

7 Other Accountability Initiatives Acxiom Special Policies - Information Classification (Sensitive, Restricted, Non-Sensitive) - Information Use Requirements» Internal (Decision Making, Research)» External (Verified, Provided, Displayed) EU/US Safe Harbor Self-Certification TRUSTe Certification Direct Marketing Association Code of Conduct Digital Advertising Alliance Code of Conduct Network Advertisers Initiative Code of Conduct Mobile Marketing Association Code of Conduct Service Provider Best Practices - Code of Conduct Under Development Acxiom Corporation. All Rights Reserved.

8 Conclusions Privacy and Legal Risks Must be Assessed during PMM Lifecycle - Product Development & Deployment - Ongoing Product Management Privacy and Legal Risks Should Also be Assessed Periodically Even When Nothing Material in the Product has Changed Planning Requirements Validation Pilot General Availability Ongoing Management Retirement Privacy & Legal Assurance Reviews Security Assurance Reviews Acxiom Corporation. All Rights Reserved.

9 Acxiom Consumer Access view Acxiom core marketing data about themselves Consumer Notice Acxiom privacy policies education: Why is data about me important to companies? How do companies get data about me and what do they do with it? What types of data do companies use about me? Want to Check Out the Data About You? See and Edit Marketing Data about You Consumer Choice opt-out cookie based or pii based edit data about themselves remove select data elements update select data elements Acxiom Corporation. All Rights Reserved.

10 Acxiom Privacy Group Leadership Acxiom Corporation. All Rights Reserved.

11 Thank you! 2013 Acxiom Corporation. All Rights Reserved Acxiom Corporation. All Rights Reserved.

Privacy Risk Assessments

Privacy Risk Assessments Privacy Risk Assessments Michael Hulet Principal November 8, 2012 Agenda Privacy Review Definition Trends Privacy Program Considerations Privacy Risk Assessment Risk Assessment Tools Generally Accepted

More information

Department of the Interior Privacy Impact Assessment Template

Department of the Interior Privacy Impact Assessment Template Department of the Interior Template May 28, 2014 Name of Project: Consolidated Financial System (CFS) Bureau: Office of the Secretary Project s Unique ID: 010-000000308 A. CONTACT INFORMATION: Teri Barnett

More information

US Department of Health and Human Services. Third Party Websites and Applications Privacy Impact Assessment

US Department of Health and Human Services. Third Party Websites and Applications Privacy Impact Assessment US Department of Health and Human Services Third Party Websites and Applications Privacy Impact Assessment Date: 10/21/2015 OPDIV: CMS TPWA Unique Identifier (UID): T-8576744-722595 Tool(s) covered by

More information

Data Security and Privacy Policy

Data Security and Privacy Policy Data Security and Privacy Policy Overview TRG is a data-driven consulting company that provides arts, cultural and entertainment organizations guidance and solutions for patron-based, sustainable income.

More information

Privacy and Online Behavioral Advertising

Privacy and Online Behavioral Advertising Event hashtag: #truste2011 TRUSTe Research In partnership with Harris Interactive 2011 Consumer Research Results Privacy and Online Behavioral Advertising July 25, 2011 1 Welcome: TRUSTe Overview Mission:

More information

I. Introduction to Privacy: Common Principles and Approaches

I. Introduction to Privacy: Common Principles and Approaches I. Introduction to Privacy: Common Principles and Approaches A. A Modern History of Privacy a. Descriptions and definitions b. Historical and social origins c. Information types i. Personal and non-personal

More information

ITIL v3 - Service Transition Lifecycle

ITIL v3 - Service Transition Lifecycle ITIL v3 - Service Transition Lifecycle Course Course Service Transition Lifecycle - Part 01 Agenda - Overview Courseware Usage Courseware Conventions ITIL Lifecycle Exam ITIL Qualification Scheme Getting

More information

SKoolAide Privacy Policy

SKoolAide Privacy Policy SKoolAide Privacy Policy Welcome to SKoolAide. SKoolAide, LLC offers online education related services and applications that allow users to share content on the Web more easily. In addition to the sharing

More information

Policy Implications: Privacy, Security and Liability Big Data in Telecom. June 7 2012 TIA 2012: INSIDE THE NETWORK Dallas TX

Policy Implications: Privacy, Security and Liability Big Data in Telecom. June 7 2012 TIA 2012: INSIDE THE NETWORK Dallas TX Policy Implications: Privacy, Security and Liability Big Data in Telecom June 7 2012 TIA 2012: INSIDE THE NETWORK Dallas TX Who We Are Leading trade association in support of information and communications

More information

Online Interest-Based Advertising: The Road Traveled and the Road Ahead

Online Interest-Based Advertising: The Road Traveled and the Road Ahead Online Interest-Based Advertising: The Road Traveled and the Road Ahead Genie Barton VP & Director, Online Interest-Based Advertising Program Advertising Self-Regulatory Council (ASRC)/ Council of Better

More information

Speakers. Navigating Through The Legal Complexities And Cloudy Conditions To Implement A Successful Global OBA Program

Speakers. Navigating Through The Legal Complexities And Cloudy Conditions To Implement A Successful Global OBA Program Speakers Navigating Through The Legal Complexities And Cloudy Conditions To Implement A Successful Global OBA Program Speakers: Ashlen Cherry, Americas Privacy Officer, Dell, ashlen_cherry@dell.com Ruth

More information

PRIVACY POLICY. What Information Is Collected

PRIVACY POLICY. What Information Is Collected PRIVACY POLICY This Privacy Policy applies to Web.com Group, Inc. (along with all subsidiaries, affiliates, successors and assigns thereof, referred to hereinafter collectively as Web.com, "we", "our"

More information

Zubi Advertising Privacy Policy

Zubi Advertising Privacy Policy Zubi Advertising Privacy Policy This privacy policy applies to information collected by Zubi Advertising Services, Inc. ( Company, we or us ), on our Latino Emoji mobile application or via our Latino Emoji

More information

Behavioral (Interest Based) Advertising: State of the Industry going into 2014 November 7, 2013

Behavioral (Interest Based) Advertising: State of the Industry going into 2014 November 7, 2013 Behavioral (Interest Based) Advertising: State of the Industry going into 2014 November 7, 2013 SPEAKERS Todd B. Ruback, CIPP-US/E/IT, CPO of Evidon, Inc. Marc Groman, CIPP/US, Executive Director and General

More information

Information Security, Privacy and Compliance Convergence

Information Security, Privacy and Compliance Convergence Information Security, Privacy and Compliance Convergence Rebecca Herold, CIPP, CISSP, CISM, CISA, FLMI Rebecca Herold & Associates, LLC April 2009 Agenda Information lifecycles Security and privacy challenges

More information

Concepts Release Package

Concepts Release Package ITIL: Release, Control & Validation Course Course Chapter 01 - Course Lesson: Course Organization Welcome to the Course! Mentoring Community s Why Are You Here? Using Bloom's Taxonomy What do you Expect?

More information

IAPP Privacy Certification

IAPP Privacy Certification IAPP Privacy Certification Program Introduction to the Certification Foundation copyright 2011, IAPP Overview Each candidate who seeks an IAPP privacy certification for the very first time must complete

More information

The Canadian Self-Regulatory Program for Online Behavioural Advertising

The Canadian Self-Regulatory Program for Online Behavioural Advertising 1 The Canadian Self-Regulatory Program for Online Behavioural Advertising Introductory Webinar Adam Kardash Bridget McIlveen Osler, Hoskin & Harcourt LLP Counsel to the Digital Advertising Alliance of

More information

Benefits to the Quality Management System in implementing an IT Service Management Standard ISO/IEC 20000-1

Benefits to the Quality Management System in implementing an IT Service Management Standard ISO/IEC 20000-1 Benefits to the Quality System in implementing an IT Standard ISO/IEC 20000-1 Presentation to: ASQ North Jersey September 15, 2010 Subrata Guha Director IT s UL DQS Inc. A New Global Alliance for Systems

More information

Legal Notices. Purpose and Scope of Website. StanCorp Financial Group, Inc. Contact Us. Public Affairs. Special Investigations Unit

Legal Notices. Purpose and Scope of Website. StanCorp Financial Group, Inc. Contact Us. Public Affairs. Special Investigations Unit Legal Notices The following describes the policies and practices of StanCorp Financial Group, Inc ( StanCorp Financial ) and its affiliates, vendors, and licensors with regards to the collection and use

More information

ITIL: Release, Control & Validation (RCV) (Revision 1.6)

ITIL: Release, Control & Validation (RCV) (Revision 1.6) ITIL: Release, Control & Validation (RCV) (Revision 1.6) Course Overview This program leads to a Certificate in ITIL Service Capability Management - Release, Control & Validation. The Service Capability

More information

Privacy Governance and Compliance Framework Accountability

Privacy Governance and Compliance Framework Accountability Privacy Governance and Framework Accountability Agenda Global Data Protection and Privacy (DPP) Organization Structure Privacy The 3 Lines of Defense (LOD) Model: Overview Privacy The 3 Lines of Defense

More information

TOY INDUSTRY CHECKLIST FOR MOBILE APPS AND PROMOTIONS

TOY INDUSTRY CHECKLIST FOR MOBILE APPS AND PROMOTIONS TOY INDUSTRY CHECKLIST FOR MOBILE APPS AND PROMOTIONS JULY 2012 Overview Members of the toy industry are fast embracing the world of mobile applications ( apps ). Apps offer a new world of engaging content

More information

TPS Corporate Services Personal Data Protection Policy

TPS Corporate Services Personal Data Protection Policy TPS Corporate Services Personal Data Protection Policy In this policy, we, us, our means and all its related companies (collectively known as TPS ), you, your or yours means the persons to whom this policy

More information

Real Life Minority Report? Life Insurers Grapple With Big Data s Implications

Real Life Minority Report? Life Insurers Grapple With Big Data s Implications Eric Arnold, Sutherland Doug Morrin, Prudential Eric Myers, AIG Consumer Insurance Mary Jane Wilson-Bilik, Sutherland October 13, 2015 Real Life Minority Report? Life Insurers Grapple With Big Data s Implications

More information

Managing a Comprehensive Program: Building Accountability Measuring Effectiveness

Managing a Comprehensive Program: Building Accountability Measuring Effectiveness Managing a Comprehensive Program: Building Accountability Measuring Effectiveness Sheila Colclasure Acxiom, Global Public Policy and Privacy Officer 06-06-14 Introduction Acxiom - information services

More information

QUESTIONS FOR COMMENT ON PROPOSED FRAMEWORK

QUESTIONS FOR COMMENT ON PROPOSED FRAMEWORK QUESTIONS FOR COMMENT ON PROPOSED FRAMEWORK Scope Are there practical considerations that support excluding certain types of companies or businesses from the framework for example, businesses that collect,

More information

Data, Privacy, Cookies and the FTC in 2013. Kevin Stark - ExactTarget Maltie Maraj - ExactTarget Nicholas Merker - Ice Miller

Data, Privacy, Cookies and the FTC in 2013. Kevin Stark - ExactTarget Maltie Maraj - ExactTarget Nicholas Merker - Ice Miller Data, Privacy, Cookies and the FTC in 2013 Kevin Stark - ExactTarget Maltie Maraj - ExactTarget Nicholas Merker - Ice Miller BIOS Kevin Stark: Product Manager at ExactTarget. Focused on data security,

More information

Information Technology: This Year s Hot Issue - Cloud Computing

Information Technology: This Year s Hot Issue - Cloud Computing Information Technology: This Year s Hot Issue - Cloud Computing Presented by: Alan Sutin Global IP & Technology Practice Group GREENBERG TRAURIG, LLP ATTORNEYS AT LAW WWW.GTLAW.COM 2011. All rights reserved.

More information

OWASP Chapter Meeting June 2010. Presented by: Brayton Rider, SecureState Chief Architect

OWASP Chapter Meeting June 2010. Presented by: Brayton Rider, SecureState Chief Architect OWASP Chapter Meeting June 2010 Presented by: Brayton Rider, SecureState Chief Architect Agenda What is Cloud Computing? Cloud Service Models Cloud Deployment Models Cloud Computing Security Security Cloud

More information

Privacy Statement. What Personal Information We Collect. Australia

Privacy Statement. What Personal Information We Collect. Australia Privacy Statement Kelly Services, Inc. and its subsidiaries ("Kelly Services" or Kelly ) respect your privacy and we acknowledge that you have certain rights related to any personal information we collect

More information

Leading Practices in Behavioral Advertising & Consumer Privacy Study of Internet Marketers and Advertisers

Leading Practices in Behavioral Advertising & Consumer Privacy Study of Internet Marketers and Advertisers Leading Practices in Behavioral Advertising & Consumer Privacy Study of Internet Marketers and Advertisers Independently Conducted by Ponemon Institute LLC February 2012 Leading Practices in Behavioral

More information

The Importance of Privacy and Consumer Accountability

The Importance of Privacy and Consumer Accountability Innovations in Online Privacy Solutions for Small Businesses New Scanning Technologies Improved Disclosures Enhanced Consumer Participation 4 November 2009 Consumers Today Want to Participate 1 New Consumer

More information

The FTC Proposed Principles are focused around four core issues. 6

The FTC Proposed Principles are focused around four core issues. 6 FEDERAL TRADE COMMISSION PROPOSES PRINCIPLES children online, 4 and numerous enforcement actions regarding a wide variety of deceptive practices online, including those related to the failure to adequately

More information

Tribal Triple Play. Compliance Solutions

Tribal Triple Play. Compliance Solutions Tribal Triple Play Compliance Solutions Tribal Triple Play Service Automation Solutions Compliance Solutions IT Services Management Agenda World of Compliance Is Compliance Relevant to Me? How To Simply

More information

Briefly summarised, SURFmarket has submitted the following questions to the Dutch DPA:

Briefly summarised, SURFmarket has submitted the following questions to the Dutch DPA: UNOFFICIAL TRANSLATION Written opinion on the application of the Wet bescherming persoonsgegevens [Dutch Data Protection Act] in the case of a contract for cloud computing services from an American provider

More information

Cloud e-mail services: Security, Compliance and Privacy. Nasos Kladakis Solutions Specialist Microsoft Hellas

Cloud e-mail services: Security, Compliance and Privacy. Nasos Kladakis Solutions Specialist Microsoft Hellas Cloud e-mail services: Security, Compliance and Privacy Nasos Kladakis Solutions Specialist Microsoft Hellas Risk Management Program Overview Information Security Policy Security Privacy & Regulatory Service

More information

DAA Mobile Guidance Enforcement Preparation: September 1, 2015. June 23, 2015

DAA Mobile Guidance Enforcement Preparation: September 1, 2015. June 23, 2015 DAA Mobile Guidance Enforcement Preparation: September 1, 2015 June 23, 2015 DAA Mobile Accountability September 1, 2015 U.S. enforcement date for DAA Mobile Guidance Council of Better Business Bureaus

More information

The Value Proposition of Marketing Data Governance Course Type Duration CEUs

The Value Proposition of Marketing Data Governance Course Type Duration CEUs The Value Proposition of Marketing Data Governance Course Type Duration CEUs In-Person Course 2 Days 4 Credits Course Overview Learn to leverage BIG Marketing Data across social, mobile, on and off-line

More information

US Department of Health and Human Services. Third Party Websites and Applications Privacy Impact Assessment

US Department of Health and Human Services. Third Party Websites and Applications Privacy Impact Assessment US Department of Health and Human Services Third Party Websites and Applications Privacy Impact Assessment Date: 10/21/2015 OPDIV: CMS TPWA Unique Identifier (UID): T-5775483-419703 Tool(s) covered by

More information

Personal Information - How Do We Collect?

Personal Information - How Do We Collect? PRIVACY POLICY This policy was last modified on March 25, 2015. The web site you have entered (CheeseRank.com, its sub-domains and any services available therefrom, including any mobile versions of the

More information

Melissa M. Wolf, CPA (570) 820.0186 Melissa.Wolf@ParenteBeard.com. Employee Benefit Plan Auditing and Regulatory Update 2012

Melissa M. Wolf, CPA (570) 820.0186 Melissa.Wolf@ParenteBeard.com. Employee Benefit Plan Auditing and Regulatory Update 2012 Melissa M. Wolf, CPA (570) 820.0186 Melissa.Wolf@ParenteBeard.com Employee Benefit Plan Auditing and Regulatory Update 2012 Agenda ASU 2010-06 SOC1 (Formerly SAS 70), SOC2 and SOC3 Department of Labor

More information

Privacy Policy. February, 2015 Page: 1

Privacy Policy. February, 2015 Page: 1 February, 2015 Page: 1 Revision History Revision # Date Author Sections Altered Approval/Date Rev 1.0 02/15/15 Ben Price New Document Rev 1.1 07/24/15 Ben Price Verify Privacy Grid Requirements are met

More information

IAPP PRIVACY ACADEMY

IAPP PRIVACY ACADEMY IAPP PRIVACY ACADEMY KEEPING UP WITH EMERGING STANDARDS FOR MOBILE PRIVACY Joanne McNabb Julie Mayer Tim Tobin Director of Privacy Staff Attorney Partner Education & Policy Northwest Regional Office Hogan

More information

CONSENT TO PROCESSING IN THE UNITED STATES AND ELSEWHERE.

CONSENT TO PROCESSING IN THE UNITED STATES AND ELSEWHERE. Privacy Statement Elanco, a division of Eli Lilly and Company (Lilly), (referred to as Elanco or Lilly in this Privacy Statement) respects the privacy of visitors to our websites, and as a result, we have

More information

Web Beacons Guidelines for Notice and Choice

Web Beacons Guidelines for Notice and Choice Web Beacons Guidelines for Notice and Choice The following statement was developed by a coalition of companies 1 in an effort to guide the appropriate use of Web Beacons. 2 The coalition is made up of

More information

LIDL PRIVACY POLICY. Effective Date: June 11, 2015

LIDL PRIVACY POLICY. Effective Date: June 11, 2015 LIDL PRIVACY POLICY Effective Date: June 11, 2015 Thank you for visiting Lidl US, LLC's (3500 S. Clark Street, Arlington, VA 22202) website (collectively, "Lidl," "we," or "us"). We are committed to providing

More information

Master Data Management and Data Governance Second Edition

Master Data Management and Data Governance Second Edition Master Data Management and Data Governance Second Edition Alex Berson Larry Dubov Mc Grauu Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore

More information

COMMENTARY Scope & Purpose Definitions I. Education. II. Transparency III. Consumer Control

COMMENTARY Scope & Purpose Definitions I. Education. II. Transparency III. Consumer Control CONTENTS: SUMMARY SELF REGULATORY PRINCIPLES FOR ONLINE BEHAVIORAL ADVERTISING Introduction Definitions I. Education II. Transparency III. Consumer Control IV. Data Security V. Material Changes to Existing

More information

TECH TALK. September 25, 2014

TECH TALK. September 25, 2014 TECH TALK September 25, 2014 Cloud Services Guidance for Campus Tech Talk UAB IT is offering interim guidance to members of the UAB campus community who wish to use 'cloud' applications & services available

More information

WEBSITE PRIVACY POLICY. Last modified 10/20/11

WEBSITE PRIVACY POLICY. Last modified 10/20/11 WEBSITE PRIVACY POLICY Last modified 10/20/11 1. Introduction 1.1 Questions. This website is owned and operated by. If you have any questions or concerns about our Privacy Policy, feel free to email us

More information

Privacy Policy for Data Collected by Blue State Digital s Clients

Privacy Policy for Data Collected by Blue State Digital s Clients Privacy Policy for Data Collected by Blue State Digital s Clients Blue State Digital LLC. ("Blue State Digital", BSD or "we") provides various services to nonprofits and business entities ("Clients"),

More information

New York Privacy Officers Forum. Online Behavioral Advertising: Emerging Legal and Business Issues

New York Privacy Officers Forum. Online Behavioral Advertising: Emerging Legal and Business Issues 2010 New York Privacy Officers Forum Online Behavioral Advertising: Emerging Legal and Business Issues Aaron P. Simpson Partner, Hunton & Williams LLP (212) 309-1126 Peter Weingard SVP, Marketing, Collective

More information

WRITTEN TESTIMONY OF JENNIFER BARRETT-GLASGOW GLOBAL PRIVACY OFFICER ACXIOM CORPORATION

WRITTEN TESTIMONY OF JENNIFER BARRETT-GLASGOW GLOBAL PRIVACY OFFICER ACXIOM CORPORATION WRITTEN TESTIMONY OF JENNIFER BARRETT-GLASGOW GLOBAL PRIVACY OFFICER ACXIOM CORPORATION BEFORE THE UNITED STATES HOUSE COMMITTEE ON ENERGY AND COMMERCE SUBCOMMITTEE ON COMMERCE, MANUFACTURING AND TRADE

More information

Data governance in the connected enterprise Simon Wright. Star Wars: The Empire Strikes Back

Data governance in the connected enterprise Simon Wright. Star Wars: The Empire Strikes Back Data governance in the connected enterprise Simon Wright Star Wars: The Empire Strikes Back 1 1 2 2 Our data governance framework has some core areas of focus Sky Customer s 3 3 Interacting with customers

More information

Best Practices at Research Level

Best Practices at Research Level PReparing Industry to Privacy-by-design by supporting its Application in REsearch Best Practices at Research Level Hisain Elshaafi Telecommunications Software and Systems Group (TSSG) Waterford Institute

More information

Mobile Location Analytics Code of Conduct

Mobile Location Analytics Code of Conduct Mobile Location Analytics Code of Conduct Preamble Mobile Location Analytics (MLA) provides technological solutions for Retailers by developing aggregate reports used to reduce waiting times at check-out,

More information

PII Compliance Guidelines

PII Compliance Guidelines Personally Identifiable Information (PII): Individually identifiable information from or about an individual customer including, but not limited to: (a) a first and last name or first initial and last

More information

Threat and Vulnerability Management (TVM) Protecting IT assets through a comprehensive program. Chicago IIA/ISACA

Threat and Vulnerability Management (TVM) Protecting IT assets through a comprehensive program. Chicago IIA/ISACA www.pwc.com Vulnerability Management (TVM) Protecting IT assets through a comprehensive program Chicago IIA/ISACA 2 nd Annual Hacking Conference Introductions Paul Hinds Managing Director Cybersecurity

More information

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst Clouds on the Horizon Cloud Security in Today s DoD Environment Bill Musson Security Analyst Agenda O Overview of Cloud architectures O Essential characteristics O Cloud service models O Cloud deployment

More information

AlixPartners, LLP. General Data Protection Statement

AlixPartners, LLP. General Data Protection Statement AlixPartners, LLP General Data Protection Statement GENERAL DATA PROTECTION STATEMENT 1. INTRODUCTION 1.1 AlixPartners, LLP ( AlixPartners ) is committed to fulfilling its obligations under the data protection

More information

A TechTarget Global Marketer Services White Paper: Global Technology Marketing and the Law

A TechTarget Global Marketer Services White Paper: Global Technology Marketing and the Law A TechTarget Global Marketer Services White Paper: Global Technology Marketing and the Law Making Sense of Regional & Country-Specific Requirements for Online Marketing Gina Perini, GTC Law Group LLP,

More information

YOUR PRIVACY IS IMPORTANT TO SANDERSONS ARCHIVING SOLUTIONS LIMITED

YOUR PRIVACY IS IMPORTANT TO SANDERSONS ARCHIVING SOLUTIONS LIMITED YOUR PRIVACY IS IMPORTANT TO SANDERSONS ARCHIVING SOLUTIONS LIMITED SANDERSONS ARCHIVING SOLUTIONS LIMITED WEB SITE PRIVACY POLICY Policy last updated: 22 nd December 2014 This Policy is adopted by Sandersons

More information

We will not collect, use or disclose your personal information without your consent, except where required or permitted by law.

We will not collect, use or disclose your personal information without your consent, except where required or permitted by law. HSBC Privacy Notice HSBC's Privacy Principles HSBC Bank Canada is a subsidiary of HSBC Holdings plc which, together with its subsidiaries and affiliates, is one of the world s largest banking and financial

More information

Recruitment Tracking System (R-TRAK) Privacy Impact Assessment

Recruitment Tracking System (R-TRAK) Privacy Impact Assessment Recruitment Tracking System (R-TRAK) Privacy Impact Assessment PIA Approval Date Dec. 16, 2008 Requested Operational Date January 2009 System Overview The R-TRAK Proof of Concept (POC) is a recruitment

More information

Trust in the Cloud Legal and Regulatory Framework

Trust in the Cloud Legal and Regulatory Framework Trust in the Cloud Legal and Regulatory Framework Cloud Security Alliance San Francisco, CA February 26, 2014 Francoise Gilbert, JD, CIPP Managing Director IT Law Group 2014 IT Law Group All Rights Reserved

More information

Please read this Policy carefully. Your continued use of our sites means that you understand and consent to the terms of this Policy.

Please read this Policy carefully. Your continued use of our sites means that you understand and consent to the terms of this Policy. EFFECTIVE: February 2016 Version 1.2 CHECK 'N GO PRIVACY POLICY This Privacy Policy ("Policy") applies to the use of Check 'n Go (the "Company") online sites and any Company affiliate or subsidiary sites.

More information

How Microsoft is taking Privacy by Design to Work. Alan Chan National Technology Officer Microsoft Hong Kong 7 May 2015

How Microsoft is taking Privacy by Design to Work. Alan Chan National Technology Officer Microsoft Hong Kong 7 May 2015 How Microsoft is taking Privacy by Design to Work Alan Chan National Technology Officer Microsoft Hong Kong 7 May 2015 Agenda Introducing the New Microsoft Microsoft privacy principle Protecting privacy

More information

Talen Energy Corporation Website Privacy Notice

Talen Energy Corporation Website Privacy Notice Talen Energy Corporation Website Privacy Notice Talen Energy Corporation and its affiliates (collectively referred to in this notice as Talen Energy, we, us, our and other similar pronouns), have developed

More information

Cloud Computing Security Audit

Cloud Computing Security Audit Cloud Computing Security Audit Teddy Sukardi tedsuka@indo.net.id Indonesia IT Consultant Association IKTII Chairman Agenda The data center and the cloud Concerns with cloud implementation The role of cloud

More information

The RFID agenda of the European Commission. Florent Frederix European Commission Directorate General Information Society and Media

The RFID agenda of the European Commission. Florent Frederix European Commission Directorate General Information Society and Media The RFID agenda of the European Commission RFID i Danmark 2011 May 3, 2011, IT-University in Copenhagen Florent Frederix European Commission Directorate General Information Society and Media This document

More information

Market Research / Audience Measurement

Market Research / Audience Measurement Market Research / Audience Measurement This document begins with the options discussed for aggregate reporting in the working group in October 2012. It then provides links and key text on audience measurement

More information

Abilities Centre collects personal information for the following purposes:

Abilities Centre collects personal information for the following purposes: Privacy Policy Accountability Abilities Centre is responsible for your personal information under its control. We have appointed a Privacy Officer who is accountable for our compliance with this Privacy

More information

MIS Privacy Statement. Our Privacy Commitments

MIS Privacy Statement. Our Privacy Commitments MIS Privacy Statement Our Privacy Commitments MIS Training Institute Holdings, Inc. (together "we") respect the privacy of every person who visits or registers with our websites ("you"), and are committed

More information

PRIVACY POLICY. Your Personal Information will be processed by Whistle Sports in the United States.

PRIVACY POLICY. Your Personal Information will be processed by Whistle Sports in the United States. PRIVACY POLICY This Policy was last changed on March 31, 2015. Kids Sports Entertainment, Inc. d/b/a The Whistle ( Whistle Sports ) and its affiliates operate this website, and any and all Whistle Sports

More information

2015 Luxury & Fashion Industry Conference

2015 Luxury & Fashion Industry Conference 2015 Luxury & Fashion Industry Conference 16 October 2015 Baker & McKenzie New York 2015 Baker & McKenzie 2015 Luxury & Fashion Industry Conference Online Distribution / E-Commerce / Luxury and Fashion

More information

ARRIS WHOLE HOME SOLUTION PRIVACY POLICY AND CALIFORNIA PRIVACY RIGHTS STATEMENT

ARRIS WHOLE HOME SOLUTION PRIVACY POLICY AND CALIFORNIA PRIVACY RIGHTS STATEMENT ARRIS WHOLE HOME SOLUTION PRIVACY POLICY AND CALIFORNIA PRIVACY RIGHTS STATEMENT INTRODUCTION ARRIS may collect and receive information from you through its websites 1 as well as through the Moxi User

More information

At Cambrian, Your Privacy is Our Priority. Regardless of how you deal with us on the phone, online, or in person we have strict security measures

At Cambrian, Your Privacy is Our Priority. Regardless of how you deal with us on the phone, online, or in person we have strict security measures Privacy Policy At Cambrian, Your Privacy is Our Priority At Cambrian Credit Union, we know our members are concerned about the confidentiality and security of their personal information. This Policy ensures

More information

HOW TO COMPLY WITH THE GRAMM-LEACH-BLILEY ACT

HOW TO COMPLY WITH THE GRAMM-LEACH-BLILEY ACT HOW TO COMPLY WITH THE GRAMM-LEACH-BLILEY ACT The information contained herein has been provided by Keith E. Whann and Deanna L. Stockamp of the law firm Whann & Associates and is for general information

More information

AIG INSURANCE COMPANY OF CANADA Privacy Principles

AIG INSURANCE COMPANY OF CANADA Privacy Principles AIG and Individual Privacy We at AIG Insurance Company of Canada (referred to as AIG, we, our, or us ) abide by these and want you, our applicants, policyholders, insureds, claimants, and any other individuals

More information

Regulation P Privacy of Consumer Financial Information

Regulation P Privacy of Consumer Financial Information Regulation P Privacy of Consumer Financial Information BACKGROUND AND OVERVIEW Title V, Subtitle A of the Gramm-Leach-Bliley Act ( GLBA ) governs the treatment of nonpublic personal information about consumers

More information

Economic impact of privacy on online behavioral advertising

Economic impact of privacy on online behavioral advertising Benchmark study of Internet marketers and advertisers Independently Conducted by Ponemon Institute LLC April 30, 2010 Ponemon Institute Research Report Economic impact of privacy on online behavioral advertising

More information

24 Highbury Crescent London N5 1RX UK Tel: + 44 (0) 207 563 9170 Fax: +44 (0) 207 563 9171

24 Highbury Crescent London N5 1RX UK Tel: + 44 (0) 207 563 9170 Fax: +44 (0) 207 563 9171 September 10, 2015 ICRT International Consumer Research & Testing 24 Highbury Crescent London N5 1RX UK Tel: + 44 (0) 207 563 9170 Fax: +44 (0) 207 563 9171 Dear Mr. Spiezle. As comments are invited before

More information

Department of the Interior Privacy Impact Assessment Template

Department of the Interior Privacy Impact Assessment Template Department of the Interior Privacy Impact Assessment Template Name of Project: Reclamation Electronic Document System (REDS) Bureau: Bureau of Reclamation Project s Unique ID: 010-10-01-07-1011-00-404-142

More information

Improving Unstructured Data Governance. Ryan Jancaitis Product Management Symantec

Improving Unstructured Data Governance. Ryan Jancaitis Product Management Symantec Improving Unstructured Data Governance Ryan Jancaitis Product Management Symantec Agenda 1 2 3 4 Overview Data Management Data Protection and Compliance Summary Unstructured Information Growth Leads to

More information

Program, you consent to the data practices described in this Privacy Policy.

Program, you consent to the data practices described in this Privacy Policy. Privacy Policy. To the extent Gramm-Leach-Bliley Act, 15 U.S.C. 6802 (the GLB Act ) may apply to our services, this Privacy Policy shall serve as your initial Privacy Notice as defined under the GLB Act.

More information

1. Verzeichnis der ITIL V3 Service Strategy Prozesse

1. Verzeichnis der ITIL V3 Service Strategy Prozesse 1. Verzeichnis der ITIL V3 Service Strategy Prozesse Service Strategy Service Portfolio Financial Conception of IT Strategy IT Financial Organization Maintenance of the Service Portfolio IT Budgeting Demand

More information

Online Lead Generation: Data Security Best Practices

Online Lead Generation: Data Security Best Practices Online Lead Generation: Data Security Best Practices Released September 2009 The IAB Online Lead Generation Committee has developed these Best Practices. About the IAB Online Lead Generation Committee:

More information

YOUR COMPANY 401(k) PLAN

YOUR COMPANY 401(k) PLAN YOUR COMPANY 401(k) PLAN Paychex... Your Essential Partner We are pleased to offer this brochure as an overview to your company-sponsored 401(k) plan. The following pages outline your roles and responsibilities

More information

Standard CIP 003 1 Cyber Security Security Management Controls

Standard CIP 003 1 Cyber Security Security Management Controls A. Introduction 1. Title: Cyber Security Security Management Controls 2. Number: CIP-003-1 3. Purpose: Standard CIP-003 requires that Responsible Entities have minimum security management controls in place

More information

Cloud security: A matter of trust? Dr Mark Ian Williams CEO, Muon Consulting

Cloud security: A matter of trust? Dr Mark Ian Williams CEO, Muon Consulting Cloud security: A matter of trust? Dr Mark Ian Williams CEO, Muon Consulting I wandered lonely as a cloud... The academic, globe-trotting years: 1992 1993: Parallel software for PET scanner images in Geneva

More information

Protecting your privacy

Protecting your privacy Protecting your privacy Table of Contents Answering your questions about privacy Your privacy... 1 Your consent... 1 Answering your questions about privacy... 2 About cookies... 9 Behavioural Advertising/Online

More information

Security & Privacy Friends, Foes or Partners?

Security & Privacy Friends, Foes or Partners? Security & Privacy Friends, Foes or Partners? How To Develop a Global Privacy Compliance Strategy and Implementation Program Thursday, February 12 Rebecca Whitener, EDS Fellow (919) 645-1902 rebecca.whitener@eds.com

More information

Introduction to Data Privacy & ediscovery Intersection of Data Privacy & ediscovery

Introduction to Data Privacy & ediscovery Intersection of Data Privacy & ediscovery Today s Topics Introduction to Data Privacy & ediscovery General Overview Data Privacy in the United States Data Privacy in Foreign Countries Intersection of Data Privacy & ediscovery Preservation of Data

More information

IBM Rational AppScan: enhancing Web application security and regulatory compliance.

IBM Rational AppScan: enhancing Web application security and regulatory compliance. Strategic protection for Web applications To support your business objectives IBM Rational AppScan: enhancing Web application security and regulatory compliance. Are untested Web applications putting your

More information

Insights into Cloud Computing

Insights into Cloud Computing This article was originally published in the November 2010 issue of the Intellectual Property & Technology Law Journal. ARTICLE Insights into Cloud Computing The basic point of cloud computing is to avoid

More information

WHAT DOES CREDIT ONE BANK, N.A. DO WITH YOUR PERSONAL INFORMATION?

WHAT DOES CREDIT ONE BANK, N.A. DO WITH YOUR PERSONAL INFORMATION? M-112997 Rev 07/2015 FACTS Why? What? How? WHAT DOES CREDIT ONE BANK, N.A. DO WITH YOUR PERSONAL INFORMATION? Financial companies choose how they share your personal information. Federal law gives consumers

More information

SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology

SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology SaaS at Pfizer Challenges, Solutions, Recommendations Agenda How are Cloud and SaaS different in practice? What does Pfizer s SaaS footprint look like? Identity is the Issue: Federation (SSO) and Provisioning/De-provisioning

More information

2008 NAI PRINCIPLES THE NETWORK ADVERTISING INITIATIVE S SELF-REGULATORY CODE OF CONDUCT

2008 NAI PRINCIPLES THE NETWORK ADVERTISING INITIATIVE S SELF-REGULATORY CODE OF CONDUCT THE NETWORK ADVERTISING INITIATIVE S SELF-REGULATORY CODE OF CONDUCT The Network Advertising Initiative s Self-Regulatory Code of Conduct CONTENTS: Section I: Introduction 2 Section II: Terminology 4 Section

More information

Senate Subcommittee Hearing and Report Regarding Online Advertising and Hidden Hazards to Consumer Security and Data Privacy

Senate Subcommittee Hearing and Report Regarding Online Advertising and Hidden Hazards to Consumer Security and Data Privacy MORRISON & FOERSTER LLP MEMORANDUM TO: FROM: ESPC Reed Freeman Patrick Bernhardt DATE: May 16, 2014 RE: Senate Subcommittee Hearing and Report Regarding Online Advertising and Hidden Hazards to Consumer

More information