Welcome to Privacy and Big Data Analytics by Design

Size: px
Start display at page:

Download "Welcome to Privacy and Big Data Analytics by Design"

Transcription

1 Welcome to Privacy and Big Data Analytics by Design Ann Cavoukian, Ph.D. Executive Director Privacy and Big Data Institute Ryerson University Privacy by Design Seminar January 22, 2015

2 Presentation Outline 1.Privacy = Personal Control 2.Privacy is Essential to Freedom 3. Lead with Privacy by Design 4.Big Data Analytics 5.Privacy is Good for Business 6.SmartData 7.Concluding Thoughts

3 Privacy Secrecy Privacy is not about having something to hide

4 Privacy = Control

5 Privacy = Personal Control User control is critical Freedom of choice Informational self-determination Context is key!

6 Privacy is Essential to Freedom: A Necessary Condition for Societal Prosperity and Well-Being Innovation, creativity, and the resultant prosperity of a society requires freedom; Privacy is the essence of freedom: Without privacy, individual human rights, property rights and civil liberties the conceptual engines of innovation and creativity, could not exist in a meaningful manner; Surveillance is the antithesis of privacy: A negative consequence of surveillance is the usurpation of a person s limited cognitive bandwidth, away from innovation and creativity.

7 The Decade of Privacy by Design

8 The Future of Privacy: Be Proactive Change the Paradigm to Positive-Sum, NOT Zero-Sum

9 Adoption of Privacy by Design as an International Standard Landmark Resolution Passed to Preserve the Future of Privacy By Anna Ohlden October 29th JERUSALEM, October 29, 2010 A landmark Resolution by Ontario's Information and Privacy Commissioner, Dr. Ann Cavoukian, was approved by international Data Protection and Privacy Commissioners in Jerusalem today at their annual conference. The resolution recognizes Commissioner Cavoukian's concept of Privacy by Design - which ensures that privacy is embedded into new technologies and business practices, right from the outset - as an essential component of fundamental privacy protection. Full Article:

10 1. English 2. French 3. German 4. Spanish 5. Italian 6. Czech 7. Dutch 8. Estonian 9. Hebrew 10.Hindi 11.Chinese 12.Japanese Privacy by Design: Proactive in 37 Languages! 13. Arabic 14. Armenian 15. Ukrainian 16. Korean 17. Russian 18. Romanian 19. Portuguese 20. Maltese 21. Greek 22. Macedonian 23. Bulgarian 24. Croatian 25. Polish 26. Turkish 27. Malaysian 28. Indonesian 29. Danish 30. Hungarian 31. Norwegian 32. Serbian 33. Lithuanian 34. Farsi 35. Finnish 36. Albanian 37. Catalan

11 Privacy by Design s Greatest Strength Positive-Sum: The Power of And Change the paradigm from the dated zero-sum (win/win) to a positive-sum model: Create a win/win scenario, not an either/or (vs.) involving unnecessary trade-offs and false dichotomies replace vs. with and

12 Privacy by Design: The 7 Foundational Principles 1. Proactive not Reactive: Preventative, not Remedial; 2. Privacy as the Default setting; 3. Privacy Embedded into Design; 4. Full Functionality: Positive-Sum, not Zero-Sum; 5. End-to-End Security: Full Lifecycle Protection; 6. Visibility and Transparency: Keep it Open; 7. Respect for User Privacy: Keep it User-Centric.

13 Letter from JIPDEC May 28, 2014 Privacy by Design is considered one of the most important concepts by members of the Japanese Information Processing Development Center We have heard from Japan s private sector companies that we need to insist on the principle of Positive-Sum, not Zero-Sum and become enlightened with Privacy by Design. Tamotsu Nomura, Japan Information Processing Development Center, May 28, 2014

14 Operationalizing Privacy by Design 9 PbD Application Areas CCTV/Surveillance cameras in mass transit systems; Biometrics used in casinos and gaming facilities; Smart Meters and the Smart Grid; Mobile Communications; Near Field Communications; RFIDs and sensor technologies; Redesigning IP Geolocation; Remote Home Health Care; Big Data and Data Analytics.

15 Zero-Sum Prevails: Let s Change the Paradigm Do NOT focus exclusively on the uses of personal data

16

17 Privacy Paternalism Leaving it up to companies and governments to determine the acceptable secondary uses of personal data is a flawed proposition, that will no doubt lead to greater privacy infraction. If the history of privacy has taught us anything, it is that an individual s loss of control over their personal data leads to greater privacy abuses, not fewer. Cavoukian, Dix, and El-Emam

18 The Veil of Privacy A regime that only pays attention to use erects a Potemkin Village of privacy. From a distance, it looks sound. But living within it we will find no shelter from the sun or rain. Professor Chris Hoofnagle The Potemkinism of Privacy Pragmatism Slate.com egulation_the_libertarian_push_behind_a_new_take_on_privacy.html

19 Privacy Paternalism The authors fully agree that accountability should be strengthened, but disagree with the proposal to weaken critical FIPPs and diminishing the role of the individual Diminishing limits on specified purposes, collection and uses of personal data minimizes rather than strengthens accountability. Cavoukian, Dix, and El-Emam

20 OECD Privacy Principles (Fair Information Practices) 1. Collection Limitation 2. Data Quality 3. Purpose Specification 4. Use Limitation 5. Security Safeguards 6. Openness 7. Individual Participation 8. Accountability Revised July, 2013

21 Big Data

22 Big Data 90% of all data was created within the last 2 years; Big Data analysis and data analytics promise new opportunities to gain valuable insights and benefits new predictive modes of analysis; But, it will also enable expanded surveillance, increasing the risk of unauthorized use and disclosure, on a scale previously unimaginable.

23 First, Comes the Hype

24 The Hype Phase: Big Data will rule the world! Everything else (including privacy) must step aside; Forget causality; correlation is enough.

25 Then, the Hype Doesn t Deliver

26 Big Data Technology is Not Foolproof Despite rampant interest from enterprise leaders and often sizeable investments in Big Data technologies, many programs still sputter or fail completely. Evanta Leadership Network, May 29, 2014.

27 Some People are Now Asking: Is Big Data a Big Mistake? The Big Data that interests many companies is what we might call found data the digital exhaust of web searches, credit card payments and mobiles pinging the nearest phone mast; Such data sets are cheap to collect relative to their size a messy collage of data-points, collected for disparate purposes; But, how good is the data? April 7, 2014

28 Big Data is moving from its inflated expectations phase to a trough of disillusionment. Gartner Hype Cycle, April, 2014

29 MIT Big Data Expert Calls for Privacy MIT Professor Alex Pentland has proposed a New Deal on Data, which calls for individuals to own their data and control how it is used and distributed. Measuring Idea Flows to Accelerate Innovation, New York Times, April 15, 2014.

30 Quantity Does Not Equal Quality But while big data promise much to scientists, entrepreneurs and governments, they are doomed to disappoint us if we ignore some very familiar statistical lessons. There are a lot of small data problems that occur in big data. They don t disappear because you ve got lots of the stuff they get worse! David Spiegelhalter, Winton Professor, Cambridge University Big data: are we making a big mistake? FT Magazine, March 2014.

31 Forget Big Data what is needed is Good Data Barrie McKenna, The serious economic cost of Canada's data deficit, Globe and Mail, May 12, 2014

32 2013 Data Scientists Conference 88% of the Data Scientists surveyed said that consumers should worry about the privacy issues associated with Big Data - JSM 2013 Conference

33 Context is Key Performing data analytics on context-free data will only yield correlations (which at times, will be spurious); By adding context as a feature in the analytics, we may be able to impute causality which has the potential to be invaluable in our analyses.

34 Privacy Breeds Innovation: It Does NOT Stifle It! The argument that privacy stifles innovation reflects a dated, zero-sum mindset; The notion that privacy must be sacrificed for innovation is a false win/lose dichotomy, consisting of unnecessary trade-offs; The opposite is true privacy drives innovation it forces innovators to think creatively to find solutions that will serve multiple functionalities; We need to abandon zero-sum thinking and adopt a positive-sum paradigm where both innovation and privacy may be achieved we need a new playbook!

35 Privacy by Design and the Internet Engineering Task Force (IETF) The concept of Privacy by Design has gotten a lot of attention over the past few years and within the IETF we have tried to investigate how we can consider privacy in the design of protocols and architectural designs in a more systematic way. Privacy Considerations for Internet Protocols, Internet Engineering Task Force (IETF),

36 Carnegie Mellon University Privacy By Design Master's degree program for privacy engineers to be offered by Carnegie Mellon University, School of Computer Science; The Master of Science in Information Technology-Privacy (MSIT-Privacy) is a 12-month program that began in the fall of 2013; The program will emphasize the concept of Privacy by Design, in which safeguards are incorporated into the design of systems and products from the very beginning of the development process.

37 OASIS Technical Committee Privacy by Design for Software Engineers Commissioner Cavoukian and Professor Jutla are the Co-Chairs of a new technical committee (TC) of OASIS PbD-SE (software engineers) TC; The purpose of PbD-SE is to provide PbD governance and documentation for software engineers; and The PbD standards developed will pave the way for software engineers to code for Privacy, by Design.

38 OASIS and Privacy by Design 2014 the OASIS PbD-SE Technical Committee (TC) approved the Privacy by Design Documentation for Software Engineers Version 1.0 as a Committee Specification Draft (CSD), and the Annex Guide to Privacy by Design Documentation for Software Engineers Version 1.0 as a Committee Note Draft (CND); This vote represents a milestone for the PbD-SE TC, acknowledging the substantial progress that has been made over the last year; The PbD-SE TC will undertake another review cycle before submitting the CSD and CND to public review.

39

40 Privacy is just as Big as Big Data. The tools exist to systemically protect personal information and bring about the benefits of Big Data. Together we can ensure that Big Data and Big Privacy can both be accomplished to enable win-win scenario. Commissioner Cavoukian

41 There are considerable risks in abandoning de-identification efforts, including the fact that individuals and organizations may simply cease disclosing deidentified information for secondary purposes, even those seen to be in the public interest. Commissioner Cavoukian

42 Privacy and Security by Design

43 Proposed Approach to Internet of Things 1. Security by Design Data Security Build security into devices from the outset; 2. Data Minimization Data which isn t collected can t fall into the wrong hands; 3. Notice and choice for unexpected uses Consumers should be given clear, simple notices of how their data will be used, along with a consent mechanism. Edith Ramirez US FTC chairwoman CES 2015

44 Privacy is Good for Business

45 Consumer Choice and Privacy There is a strong competitive advantage for businesses to invest in good data privacy and security practices; A significant portion of the population is becoming concerned about identity theft, and it is influencing their purchasing decisions. Rena Mears, Deloitte & Touche, Survey Reports An Increase in ID Theft and Decrease in Consumer Confidence.

46 The Bottom Line Privacy should be viewed as a business issue, not a compliance issue Think strategically and transform privacy into a competitive business advantage

47 Cost of Taking the Reactive Approach Proactive to Privacy Breaches Class-Action Lawsuits Damage to One s Brand Reactive Loss of Consumer Confidence and Trust

48 First Privacy Marketplace at the International Consumer Electronics Show in Vegas Privacy is a hot issue right now. It s on everyone s radar Consumers asking about privacy that was the big takeaway. These companies in the privacy marketplace, in large part aren t advocates. They re entrepreneurs looking to capitalize on market opportunity. They expect a larger privacy marketplace next year and for brands to incorporate privacy into their marketing Anyone, everyone, can understand the need for privacy. Victor Cocchia CEO, Vysk Speaking at CES: Jan, 2015

49 Success in the Future will Require Positive-Sum Paradigms 1. Big Data and privacy are not mutually exclusive: Data is one of the most valuable assets of any organization ; Privacy is about personally identifiable information; Consumer demands are creating additional pressures; 2. Proactive privacy drives innovation: It is entirely possible to achieve privacy in the Big Data era, while also using data analytics to unlock new insights and innovations to move an organization forward; 3. Innovation and privacy: You can have it all: Organizations will continue to apply data analytics to Big Data in order to advance their strategic goals and better serve their customers. Commissioner Cavoukian, Using Privacy by Design to achieve Big Data Innovation Without Compromising Privacy

50 Let s Banish Zero-Sum!

51 SmartData: Privacy by Design 2.0 Context is Key

52 The Next Evolution in Data Protection: SmartData Developed by Dr. George Tomko, at the Identity, Privacy and Security Institute, University of Toronto, SmartData represents privacy in the future with greater control of personal information. Intelligent smart agents to be introduced into IT systems virtually thereby creating SmartData, a new approach to Artificial Intelligence, bottom-up, that will contextualize the field of AI.

53 SmartData: It s All About User Control It s All About Context: Evolving virtual cognitive agents that can act as your proxy to protect your personally identifiable data; Intelligent agents will be evolved to: Protect and secure your personal information; Disclose your information only when your personal criteria for release have been met; Put the user firmly in control Big Privacy, Radical Control!

54 Methods of Creating Intelligent Agents Top-down, rule-based design (traditional AI); Bottom-up evolutionary robotics design; The combination of a top-down and bottom-up hybrid will yield the most dynamic results.

55 Southern Ontario Smart Computing Innovation Platform (SOSCIP) SOSCIP is a groundbreaking research collaboration involving seven leading southern Ontario universities, IBM Canada, and small- and medium-sized enterprises (SMEs) across the province. Ryerson s Privacy & Big Data Institute proposal involving SmartData received SOSCIP approval to explore the feasibility of privacy-protective monitoring of health-related outbreaks, using a foundation of intelligent virtual agents as envisioned in SmartData.

56 A New Approach: Applying Privacy by Design to Surveillance

57 Privacy-Protective Surveillance As long as the threat of terrorism exists and the global conditions that instantiate those threats continue, effective measures will be needed to counteract terrorism. At the same time, in order for a free and open society to function properly, privacy and civil liberties must be strongly protected.

58 Introducing PPS: Privacy-Protective Surveillance A new system of surveillance, which enables effective counter-terrorism measures to be pursued in a privacy-protective manner; The underlying technology builds on Artificial Intelligence, advances in cryptography involving Homomorphic Encryption, and Probabilistic Graphical Models (involving Bayesian Networks).

59 Summary of PPS Privacy Protective Surveillance is a positive-sum, win-win alternative to current counter-terrorism surveillance systems. It incorporates two primary objectives in its design: 1. An AI system consisting of feature detection that scans the Web and related databases using a blind-sight procedure to detect digital evidence relating to potentially suspicious terrorist activity by some, without infringing on the privacy of unrelated individuals; 2. A technological infrastructure to ensure that any personally identifying information ( PII ) on unsuspected individuals is not collected and, in those associated with targeted activity, encrypted PII will only be divulged with judicial authorization (a warrant issued by the court).

60 Concluding Thoughts Privacy risks are best managed by proactively embedding the principles of Privacy by Design prevent the harm from arising avoid the data breach; Focus on prevention: It is much easier and far more cost-effective to build in privacy, up-front, rather than after-the-fact; Abandon zero-sum thinking embrace doubly-enabling systems: Big Data and Big Privacy; Get smart lead with Privacy by Design, not privacy by chance or, worse, Privacy by Disaster!

61 Contact Information Ann Cavoukian, Ph.D. Executive Director Privacy and Big Data Institute Ryerson University 285 Victoria Street Toronto, Ontario M5B 2K3 Phone: (416) ext twitter.com/privacybigdata

Maximize the Value of Your Data and the Ability to Protect Privacy, by Design

Maximize the Value of Your Data and the Ability to Protect Privacy, by Design Maximize the Value of Your Data and the Ability to Protect Privacy, by Design Ann Cavoukian, Ph.D. Executive Director Privacy and Big Data Institute Ryerson University Ontario University Registrar s Association

More information

Brave New World or Old Problems? Privacy, Security and Big Data: Beware of Unintended Consequences

Brave New World or Old Problems? Privacy, Security and Big Data: Beware of Unintended Consequences Brave New World or Old Problems? Privacy, Security and Big Data: Beware of Unintended Consequences A nn C avouk ian, P h.d. E x ecut ive D ir ect or P r ivacy and B ig D at a Inst it ut e R yer son U niver

More information

Ann Cavoukian, Ph.D.

Ann Cavoukian, Ph.D. Data, Data Everywhere The Need for BIG Privacy in a World of Big Data Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario, Canada Future of Consumer Intelligence Universal City, California

More information

Leveraging Privacy by Design to Achieve your Business Needs through Big Data, without Compromising Privacy

Leveraging Privacy by Design to Achieve your Business Needs through Big Data, without Compromising Privacy Leveraging Privacy by Design to Achieve your Business Needs through Big Data, without Compromising Privacy Big Data & Analytics Summit Canada Old Mill, Toronto February 10, 2015 Let s Dispel Some Myths

More information

Ann Cavoukian, Ph.D.

Ann Cavoukian, Ph.D. Data, Data Everywhere The Need for Big Privacy in a World of Big Data Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario, Canada 15 th Annual Privacy and Security Conference February 6,

More information

Privacy by Design: What s Been Happening? Ken Anderson

Privacy by Design: What s Been Happening? Ken Anderson Privacy by Design: What s Been Happening? Ken Anderson Assistant Commissioner (Privacy) Ontario Hong Kong June 13, 2012 Key Definitions Information privacy refers to the right or ability of individuals

More information

A Q&A with the Commissioner: Big Data and Privacy Health Research: Big Data, Health Research Yes! Personal Data No!

A Q&A with the Commissioner: Big Data and Privacy Health Research: Big Data, Health Research Yes! Personal Data No! A Q&A with the Commissioner: Big Data and Privacy Health Research: Big Data, Health Research Yes! Personal Data No! Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario, Canada THE AGE OF

More information

BEFORE THE DEPARTMENT OF COMMERCE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY. Request for Comments Docket # 120214135-2135-01

BEFORE THE DEPARTMENT OF COMMERCE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY. Request for Comments Docket # 120214135-2135-01 BEFORE THE DEPARTMENT OF COMMERCE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Request for Comments Docket # 120214135-2135-01 Multistakeholder Process to Develop Consumer Privacy Codes of Conduct COMMENTS

More information

The 7 Foundational Principles. Implementation and Mapping of Fair Information Practices. Ann Cavoukian, Ph.D.

The 7 Foundational Principles. Implementation and Mapping of Fair Information Practices. Ann Cavoukian, Ph.D. Privacy by Design The 7 Foundational Principles Implementation and Mapping of Fair Information Practices Ann Cavoukian, Ph.D. Information & Privacy Commissioner Ontario, Canada Purpose: This document provides

More information

Privacy by Design The 7 Foundational Principles Implementation and Mapping of Fair Information Practices

Privacy by Design The 7 Foundational Principles Implementation and Mapping of Fair Information Practices Privacy by Design The 7 Foundational Principles Implementation and Mapping of Fair Information Practices Ann Cavoukian, Ph.D. Information & Privacy Commissioner, Ontario, Canada Purpose: This document

More information

Privacy by Design Setting a new standard for privacy certification

Privacy by Design Setting a new standard for privacy certification Privacy by Design Setting a new standard for privacy certification Privacy by Design is a framework based on proactively embedding privacy into the design and operation of IT systems, networked infrastructure,

More information

Ann Cavoukian, Ph.D.

Ann Cavoukian, Ph.D. Protecting Privacy in an Era of Electronic Health Records Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario Barrie and Community Family Health Team Royal Victoria Hospital Georgian College

More information

How To Build Privacy Into Information Technology

How To Build Privacy Into Information Technology Transformative Technologies Deliver Both Security and Privacy: Think Positive-Sum, Not Zero-Sum March 2009 Transformative Technologies Deliver Both Security and Privacy Transformative Technologies Deliver

More information

Privacy by Design. Ian Brown, Prof. of Information Security and Privacy Oxford Internet Institute, University of Oxford @IanBrownOII

Privacy by Design. Ian Brown, Prof. of Information Security and Privacy Oxford Internet Institute, University of Oxford @IanBrownOII Privacy by Design Ian Brown, Prof. of Information Security and Privacy Oxford Internet Institute, University of Oxford @IanBrownOII Privacy by Design principles 1. Proactive not Reactive; Preventative

More information

PRICE LIST. ALPHA TRANSLATION AGENCY www.biuro-tlumaczen.tv info@biuro-tlumaczen.tv

PRICE LIST. ALPHA TRANSLATION AGENCY www.biuro-tlumaczen.tv info@biuro-tlumaczen.tv We encourage you to get to know the prices of the services provided by Alpha Translation Agency in the range of standard and certified written translations of common and rare languages, as well as interpretation

More information

LANGUAGE CONNECTIONS YOUR LINGUISTIC GATEWAY

LANGUAGE CONNECTIONS YOUR LINGUISTIC GATEWAY 2001 Beacon Street Suite 105 Brighton, MA 02135 Tel: (617) 731-3510 Fax: (617) 731-3700 www.languageconnections.com service@languageconnections.com GSA CONTRACT #GS-10F-0126K DUNS #11-218-1040 CAGE #1

More information

Have it all Protecting privacy in the age of analytics

Have it all Protecting privacy in the age of analytics Have it all Protecting privacy in the age of analytics Acknowledgements: The authors wish to acknowledge Megan Brister, National Privacy Leader, Deloitte and Michelle Chibba, Director, Policy & Special

More information

Quality Data for Your Information Infrastructure

Quality Data for Your Information Infrastructure SAP Product Brief SAP s for Small Businesses and Midsize Companies SAP Data Quality Management, Edge Edition Objectives Quality Data for Your Information Infrastructure Data quality management for confident

More information

Languages Supported. SpeechGear s products are being used to remove communications barriers throughout the world.

Languages Supported. SpeechGear s products are being used to remove communications barriers throughout the world. Languages Supported SpeechGear s products are being used to remove communications barriers throughout the world. Each of the following pages lists the languages that we currently support for that product.

More information

Who We Are. Services We Offer

Who We Are. Services We Offer Who We Are Atkins Translation Services is a professional language agency providing cost effective and rapid language services. Our network of over 70 native language professionals ensures we are able to

More information

Yandex.Translate API Developer's guide

Yandex.Translate API Developer's guide 5.08.2015 .. Version 1.5 Document build date: 5.08.2015. This volume is a part of Yandex technical documentation. Yandex helpdesk site: http://help.yandex.ru 2008 2015 Yandex LLC. All rights reserved.

More information

Tel: +971 4 266 3517 Fax: +971 4 268 9615 P.O. Box: 22392, Dubai - UAE info@communicationdubai.com comm123@emirates.net.ae www.communicationdubai.

Tel: +971 4 266 3517 Fax: +971 4 268 9615 P.O. Box: 22392, Dubai - UAE info@communicationdubai.com comm123@emirates.net.ae www.communicationdubai. Tel: +971 4 266 3517 Fax: +971 4 268 9615 P.O. Box: 22392, Dubai - UAE info@communicationdubai.com comm123@emirates.net.ae www.communicationdubai.com ALL ABOUT TRANSLATION Arabic English Online Human Translation

More information

The Ontario Health Study s Assessment Centres: A Case Study for Privacy by Design

The Ontario Health Study s Assessment Centres: A Case Study for Privacy by Design The Ontario Health Study s Assessment Centres: A Case Study for Privacy by Design Ann Cavoukian, Ph.D. Information & Privacy Commissioner Ontario, Canada and Pamela C. Spencer Cancer Care Ontario VP Corporate

More information

Table 1: TSQM Version 1.4 Available Translations

Table 1: TSQM Version 1.4 Available Translations Quintiles, Inc. 1 Tables 1, 2, & 3 below list the existing and available translations for the TSQM v1.4, TSQM vii, TSQM v9. If Quintiles does not have a translation that your Company needs, the Company

More information

How To Respond To The Nti'S Request For Comment On Big Data And Privacy

How To Respond To The Nti'S Request For Comment On Big Data And Privacy Submission to the National Telecommunications and Information Administration (NTIA), U.S. Department of Commerce Docket No. 140514424 4424 01 RIN 0660 XC010 Comments of the Information Technology Industry

More information

Remote Desktop Services Guide

Remote Desktop Services Guide Remote Desktop Services Guide Mac OS X V 1.1 27/03/2014 i Contents Introduction... 1 Install and connect with Mac... 1 1. Download and install Citrix Receiver... 2 2. Installing Citrix Receiver... 4 3.

More information

Cisco Unified Presence Server 1.0

Cisco Unified Presence Server 1.0 Cisco Unified Presence Server 1.0 The Cisco Unified Presence Server is a critical component for delivering the full value of a Cisco Unified Communications environment. It collects information about a

More information

LSI TRANSLATION PLUG-IN FOR RELATIVITY. within

LSI TRANSLATION PLUG-IN FOR RELATIVITY. within within LSI Translation Plug-in (LTP) for Relativity is a free plug-in that allows the Relativity user to access the STS system 201 Broadway, Cambridge, MA 02139 Contact: Mark Ettinger Tel: 800-654-5006

More information

INTERC O MBASE. Global Language Solution WWW.INTERCOMBASE.COM

INTERC O MBASE. Global Language Solution WWW.INTERCOMBASE.COM INTERC O MBASE Global Language Solution Tel.: (UK) +44 20 360 86157 E-mail: info@intercombase.com Skype ID: intercombase.translations WWW.INTERCOMBASE.COM Services Credentials Expertise Document Translation

More information

Privacy by Design: Effective Privacy Management in the Victorian Public Sector

Privacy by Design: Effective Privacy Management in the Victorian Public Sector Privacy by Design: Effective Privacy Management in the Victorian public sector Release date: October 2014 The Commissioner for Privacy and Data Protection (CPDP) has formally adopted Privacy by Design

More information

Introductory Guide to the Common European Framework of Reference (CEFR) for English Language Teachers

Introductory Guide to the Common European Framework of Reference (CEFR) for English Language Teachers Introductory Guide to the Common European Framework of Reference (CEFR) for English Language Teachers What is the Common European Framework of Reference? The Common European Framework of Reference gives

More information

Jan Philipp Albrecht Rapporteur, Committee on Civil Liberties, Justice and Home Affairs European Parliament

Jan Philipp Albrecht Rapporteur, Committee on Civil Liberties, Justice and Home Affairs European Parliament September 5, 2012 Jan Philipp Albrecht Rapporteur, Committee on Civil Liberties, Justice and Home Affairs European Parliament Lara Comi Rapporteur, Committee on Internal market and Consumer Protection

More information

TABLE OF CONTENTS. Maintaining the Quality and Integrity of Information. Notification of an Information Security Incident

TABLE OF CONTENTS. Maintaining the Quality and Integrity of Information. Notification of an Information Security Incident AGREEMENT BETWEEN THE UNITED STATES OF AMERICA AND THE EUROPEAN UNION ON THE PROTECTION OF PERSONAL INFORMATION RELATING TO THE PREVENTION, INVESTIGATION, DETECTION, AND PROSECUTION OF CRIMINAL OFFENSES

More information

About CRC? What is Email Link?

About CRC? What is Email Link? About CRC? The Community Relations Commission for a multicultural NSW (CRC) was established by Parliament to implement a new approach to protecting and promoting community harmony in our unique culturally

More information

Liquid OS X User Guide

Liquid OS X User Guide Basic Use To use Liquid on selected text: Liquid OS X User Guide Select the text CMD-shift-2 Now Liquid appears with your selected text inserted, ready for you to choose a command. Choose a command by

More information

Safe Harbor Statement

Safe Harbor Statement Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment

More information

Interactive product brochure :: Nina TM Mobile: The Virtual Assistant for Mobile Customer Service Apps

Interactive product brochure :: Nina TM Mobile: The Virtual Assistant for Mobile Customer Service Apps TM Interactive product brochure :: Nina TM Mobile: The Virtual Assistant for Mobile Customer Service Apps This PDF contains embedded interactive features. Make sure to download and save the file to your

More information

List of Higher School Certificate Board Developed Courses

List of Higher School Certificate Board Developed Courses List of Higher School Certificate Board Developed Courses ACE 6002 Last Updated: 27 February 2013 Subjects Courses Extension Courses Aboriginal Studies Aboriginal Studies Agriculture Agriculture Ancient

More information

2011 Census: Language

2011 Census: Language October 25, 2012 2011 Census: Language The 2011 Census Day was May 9, 2011. Today, Statistics Canada released its fourth set of data from this Census on the language characteristics of Canadians. The population

More information

Linking the world through professional language services

Linking the world through professional language services ProLINK Linking the world through professional language services ProLINK is strategically located in Hong Kong, Asia world city and gateway to China, where the East meets the West. The economy of China

More information

2015 Population Office figures for October to December and year to date

2015 Population Office figures for October to December and year to date 2015 Population Office figures for October to December and year to date Business Licencing figures The below tables show the number of applications for registered and licensed permissions, and how many

More information

Professional. Accurate. Fast.

Professional. Accurate. Fast. Professional. Accurate. Fast. Lingvo House is one of the UK's leading translation service providers. We offer highest quality linguistic solutions to most demanding clients using best professionals with

More information

ivms-4500 HD (ios) Mobile Client Software User Manual (V3.4)

ivms-4500 HD (ios) Mobile Client Software User Manual (V3.4) ivms-4500 HD (ios) Mobile Client Software User Manual (V3.4) UD.6L0202D1587A01 Thank you for purchasing our product. This manual applies to ivms-4500 HD (ios) mobile client software; please read it carefully

More information

Poliscript Installation Guide

Poliscript Installation Guide Poliscript Installation Guide Version 4.0 Current Poliscript Build: Version 2.7 Build 23 Please note this document is correct up to 27 th July 2010 Important Information: - Please note that Poliscript

More information

A global leader in document translations

A global leader in document translations Since 1993, Northwest Translations has been a global leader in providing exceptional high quality document translations with emphasis in the MEDICAL/LIFE SCIENCES, LEGAL, ENGINEERING, MARKETING/ADVERTISING

More information

MT Search Elastic Search for Magento

MT Search Elastic Search for Magento Web Site: If you have any questions, please contact us. MT Search Elastic Search for Magento Version 1.0.0 for Magento 1.9.x Download: http:///elasticsearch 2014 1 Table of Contents 1. Introduction...

More information

ivms-4500 HD (Android) Mobile Client Software User Manual (V3.4)

ivms-4500 HD (Android) Mobile Client Software User Manual (V3.4) ivms-4500 HD (Android) Mobile Client Software User Manual (V3.4) UD.6L0202D1597A01 Thank you for purchasing our product. This manual applies to ivms-4500 HD (Android) mobile client software; please read

More information

Ann Cavoukian, Ph.D.

Ann Cavoukian, Ph.D. School Psychologists: What You Should Know about the Personal Health Information Protection Act Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario Psychological Services Northeast Toronto

More information

February 17, 2011. Federal Trade Commission 600 Pennsylvania Avenue, NW Washington, DC 20580

February 17, 2011. Federal Trade Commission 600 Pennsylvania Avenue, NW Washington, DC 20580 February 17, 2011 Federal Trade Commission 600 Pennsylvania Avenue, NW Washington, DC 20580 Re: A Preliminary FTC Staff Report on Protecting Consumer Privacy in an Era of Rapid Change: A Proposed Framework

More information

GET YOUR START MENU BACK IN MICROSOFT WINDOWS SERVER 2012

GET YOUR START MENU BACK IN MICROSOFT WINDOWS SERVER 2012 Products To make your life better Simple to Install Easy, non-technical setup. GET YOUR START MENU BACK IN MICROSOFT WINDOWS SERVER 2012 Easy to Use The start menu design is familiar and comfortable to

More information

3/17/2015. Overview HIPAA. Who s Covered? Who s Not Covered? PRIVACY & SECURITY. Regulatory Patchwork: Mobile Health

3/17/2015. Overview HIPAA. Who s Covered? Who s Not Covered? PRIVACY & SECURITY. Regulatory Patchwork: Mobile Health PRIVACY & SECURITY Regulatory Patchwork: Mobile Health Anna Watterson, Davis Wright Tremaine, LLP Overview When HIPAA applies to mobile apps When FTC has jurisdiction over mobile apps Other considerations:

More information

Translution Price List GBP

Translution Price List GBP Translution Price List GBP TABLE OF CONTENTS Services AD HOC MACHINE TRANSLATION... LIGHT POST EDITED TRANSLATION... PROFESSIONAL TRANSLATION... 3 TRANSLATE, EDIT, REVIEW TRANSLATION (TWICE TRANSLATED)...3

More information

We Answer To All Your Localization Needs!

We Answer To All Your Localization Needs! We Answer To All Your Localization Needs! Str. Traian Nr. 2, Bucharest, Romania 8950 W Olympic Blvd, California, U.S.A (RO) +40.740.182.777 / (US) +1.213.248.2367 www.i-t-local.com; alex@i-t-local.com

More information

AccuRead OCR. Administrator's Guide

AccuRead OCR. Administrator's Guide AccuRead OCR Administrator's Guide July 2016 www.lexmark.com Contents 2 Contents Change history... 3 Overview... 4 System requirements...4 Supported applications... 4 Supported formats and languages...

More information

Seizing Opportunity: Good Privacy Practices for Developing Mobile Apps

Seizing Opportunity: Good Privacy Practices for Developing Mobile Apps Seizing Opportunity: Good Privacy Practices for Developing Mobile Apps 1 2 Introduction Canada s privacy laws require all businesses to balance innovation and entrepreneurialism with effective privacy

More information

OLAT Online Learning and Training

OLAT Online Learning and Training OLAT Online Learning and Training November 29, 2007 Marion Weber, University of Zurich marion.weber@id.uzh.ch 2007 Multimedia & E-Learning Services, IT Services, University of Zurich OLAT 2 1999 Department

More information

We Answer All Your Localization Needs!

We Answer All Your Localization Needs! partner We Answer All Your Localization Needs! Version: 2.0 23.05.2014 California, U.S.A Bucharest, Romania (US) +1.714.408.8094 (RO) +40.740.182.777 www.i-t-local.com info@i-t-local.com 1 of 13 Our Company

More information

2014 HIGHER SCHOOL CERTIFICATE EXAMINATION TIMETABLE Monday 13 October to Wednesday 5 November

2014 HIGHER SCHOOL CERTIFICATE EXAMINATION TIMETABLE Monday 13 October to Wednesday 5 November 2014 HIGHER SCHOOL CERTIFICATE EXINATION TIMETABLE Monday 13 October to Wednesday 5 November Important information for students The following pages list information about all the written examinations for

More information

THE MOBILE MAJORITY: BUILDING PRIVACY BY DESIGN INTO MOBILE APPS

THE MOBILE MAJORITY: BUILDING PRIVACY BY DESIGN INTO MOBILE APPS THE MOBILE MAJORITY: BUILDING PRIVACY BY DESIGN INTO MOBILE APPS Clarissa Cerda, EVP, Chief Legal Officer and Secretary, LifeLock Kimberly Cilke, CIPP/US Deputy General Counsel, GoDaddy.com Timothy Sparapani

More information

Australian Embassy, Seoul List of Translators and Interpreters 2013 Seoul, Busan and Daejeon

Australian Embassy, Seoul List of Translators and Interpreters 2013 Seoul, Busan and Daejeon Australian Embassy, Seoul List of Translators and Interpreters 2013 Seoul, Busan and Daejeon This list is provided for the information of Australian Travellers and those needing assistance in South Korea.

More information

Rebuilding Trust Through Privacy by Design. by Alexander Hanff alexander.hanff@startmail.com

Rebuilding Trust Through Privacy by Design. by Alexander Hanff alexander.hanff@startmail.com Rebuilding Trust Through Privacy by Design by Alexander Hanff alexander.hanff@startmail.com The Principles of Privacy by Design (You all know this stuff right?) o Proactive not Reactive; Preventative not

More information

Xerox Easy Translator Service User Guide

Xerox Easy Translator Service User Guide Xerox Easy Translator Service User Guide Table of Contents Xerox Easy Translator 2 Service Overview Creating an Account 3 via our Web Portal Logging In to the Web Portal 4 Utilizing the Web Portal 4 Creating

More information

Formatting Custom List Information

Formatting Custom List Information Hello. MailChimp has a lot of great merge tags that can help you customize your email campaigns. You can use these merge tags to dynamically add content to your email. With merge tags, you can include

More information

SWOT Assessment: BMC Remedy v9

SWOT Assessment: BMC Remedy v9 SWOT Assessment: BMC Remedy v9 Analyzing the strengths, weaknesses, opportunities, and threats Publication Date: 17 Aug 2015 Product code: IT0022-000489 Adam Holtby Summary Catalyst BMC Software is an

More information

Media labels and their contents

Media labels and their contents Media labels and their contents This information lists the optical media that you receive with your IBM i order. Refer to the Customer Notices and information Web page (www.ibm.com/systems/support/planning/

More information

Derby Translations. Translation for all languages. Active Knowledge. Team of Experts. Quality Is Our Priority. Competitive Prices.

Derby Translations. Translation for all languages. Active Knowledge. Team of Experts. Quality Is Our Priority. Competitive Prices. Active Knowledge Team of Experts Quality Is Our Priority Competitive Prices 100% Performance Fast Delivery Derby Translations is one of the UAE leading translation and language services providers, has

More information

Privacy Risk Management Building privacy protection into a Risk Management Framework to ensure that privacy risks are managed, by default

Privacy Risk Management Building privacy protection into a Risk Management Framework to ensure that privacy risks are managed, by default Privacy Risk Management Building privacy protection into a Risk Management Framework to ensure that privacy risks are managed, by default Information and Privacy Commissioner Ontario, Canada April 2010

More information

Your total solution for direct hire staffing. Legal staffing and training solutions

Your total solution for direct hire staffing. Legal staffing and training solutions Your total solution for direct hire staffing Legal staffing and training solutions LEGAL TRAINING BY INDUSTRY EXPERTS Training Advantages Classes taught by attorneys and paralegals with proven industry

More information

What to do When Faced With a Privacy Breach: Guidelines for the Health Sector ANN CAVOUKIAN, PH.D. COMMISSIONER

What to do When Faced With a Privacy Breach: Guidelines for the Health Sector ANN CAVOUKIAN, PH.D. COMMISSIONER What to do When Faced With a Privacy Breach: Guidelines for the Health Sector ANN CAVOUKIAN, PH.D. COMMISSIONER INFORMATION AND PRIVACY COMMISSIONER/ONTARIO Table of Contents What is a privacy breach?...1

More information

Speaking your language...

Speaking your language... 1 About us: Cuttingedge Translation Services Pvt. Ltd. (Cuttingedge) has its corporate headquarters in Noida, India and an office in Glasgow, UK. Over the time we have serviced clients from various backgrounds

More information

webcertain Recruitment pack Ceri Wright [Pick the date]

webcertain Recruitment pack Ceri Wright [Pick the date] Recruitment pack Ceri Wright [Pick the date] SEO Executive Have you recently caught the SEO bug and looking to develop your skills and career in a rapidly growing agency? If your answer is YES then Webcertain

More information

Release Notes MimioStudio 11.30 Software

Release Notes MimioStudio 11.30 Software Release Notes MimioStudio 11.30 Software Copyright Notice 2014 Mimio. All rights reserved. About MimioStudio MimioStudio classroom software is the unifying software solution for MimioClassroom products

More information

Using Privacy by Design to Achieve Big Data Innovation Without Compromising Privacy

Using Privacy by Design to Achieve Big Data Innovation Without Compromising Privacy Using Privacy by Design to Achieve Big Data Innovation Without Compromising Privacy Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario, Canada David Stewart National Advanced Analytics Leader

More information

GCE/GCSE subjects recognised for NUI matriculation purposes

GCE/GCSE subjects recognised for NUI matriculation purposes Subjects listed below are recognised for the purpose of NUI matriculation. See NUI Matriculation Regulations pp.11 and 14. Unless otherwise indicated only one subject from each group may be presented.

More information

HP Backup and Recovery Manager

HP Backup and Recovery Manager HP Backup and Recovery Manager User Guide Version 1.0 Table of Contents Introduction Installation How to Install Language Support HP Backup and Recovery Manager Reminders Scheduled Backups What Can Be

More information

EMC SourceOne. Products Compatibility Guide 300-008-041 REV 54

EMC SourceOne. Products Compatibility Guide 300-008-041 REV 54 EMC SourceOne Products Compatibility Guide 300-008-041 REV 54 Copyright 2005-2016 EMC Corporation. All rights reserved. Published in the USA. Published February 23, 2016 EMC believes the information in

More information

Privacy by Design Protecting privacy in the age of analytics

Privacy by Design Protecting privacy in the age of analytics Privacy by Design Protecting privacy in the age of analytics The era of Big Data is here, and it isn t going away. The ability to use data to connect information, identify patterns and personalise interactions

More information

netfusion Data Guardian Online Backup

netfusion Data Guardian Online Backup netfusion Data Guardian Online Backup Guarantee Your Business Continuity joining business with technology Web Hosting Made Easy Data loss is a nightmare Your data is worth US$10,000 per MB! Causes of data

More information

Helping Companies with Globalization

Helping Companies with Globalization Universal Translation Services www.universal-translation-services.com Helping Companies with Globalization universal Translation Services Brochure 2015 universal Translation services workflow 2 3 We are

More information

Helping Companies with Globalization

Helping Companies with Globalization Universal Translation Services www.universal-translation-services.com Universal Translation Services www.universal-translation-services.com Helping Companies with Globalization universal Translation Services

More information

Voice Mail. Service & Operations

Voice Mail. Service & Operations ervice Service & Operations Your customers and clients expect their calls to be handled quickly or routed to the appropriate person or department. This is where ITS Telecom and Systems can offer valuable

More information

Data First Framework. How to Build Your Enterprise Data Hub. Luis Campos Big Data Solutions Director Oracle Europe, Middle East and Africa

Data First Framework. How to Build Your Enterprise Data Hub. Luis Campos Big Data Solutions Director Oracle Europe, Middle East and Africa Data First Framework How to Build Your Enterprise Data Hub Luis Campos Big Data Solutions Director Oracle Europe, Middle East and Africa @luigicampos June 2014 Copyright 2015 Oracle and/or its affiliates.

More information

THE MOBlLE APP. REVOLUTlON. 8 STEPS TO BUlLDING MOBlLE APPS FAST ln THE CLOUD

THE MOBlLE APP. REVOLUTlON. 8 STEPS TO BUlLDING MOBlLE APPS FAST ln THE CLOUD THE MOBlLE APP REVOLUTlON 8 STEPS TO BUlLDING MOBlLE APPS FAST ln THE CLOUD People use hand-held devices for everything from communicating and playing games to shopping and surfing the Internet. In fact,

More information

ViewSync ViewSync Wireless Presentation Gateway Dongle

ViewSync ViewSync Wireless Presentation Gateway Dongle ViewSync ViewSync Wireless Presentation Gateway Dongle ViewSync WPG300 The ViewSonic WPG-300 is a powerful and secure wireless dongle with an HDMI-MHL (Media High-Definition Link) interface. The WPG-300

More information

Similar to basic pricing, usage cost is added in specified time intervals. Example: Each 15 minutes, add $1.00. Overtime option is optional.

Similar to basic pricing, usage cost is added in specified time intervals. Example: Each 15 minutes, add $1.00. Overtime option is optional. World Leading Internet Cafe Software and WiFi HotSpot Billing Software Security Restrict access to Ctrl+Alt+Del and other system keys, local drives, Internet Explorer settings, Control Panel, and ANY window

More information

PUBLISHING TRANSLATIONS IN EUROPE SURVEY OF PUBLISHERS

PUBLISHING TRANSLATIONS IN EUROPE SURVEY OF PUBLISHERS PUBLISHING TRANSLATIONS IN EUROPE SURVEY OF PUBLISHERS prepared by Budapest Observatory January 2011 Making Literature Travel series of reports on literary exchange, translation and publishing Series editor:

More information

Cyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc.

Cyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc. Cyber Security Presentation Ontario Energy Board Smart Grid Advisory Committee Doug Westlund CEO, N-Dimension Solutions Inc. October 1, 2013 Cyber Security Protection for Critical Infrastructure Assets

More information

Survey of University of Michigan Graduate-level Area Studies Alumni/ae & FLAS Recipients from 1996-2006: Selected Findings

Survey of University of Michigan Graduate-level Area Studies Alumni/ae & FLAS Recipients from 1996-2006: Selected Findings Survey of University of Michigan Graduate-level Area Studies Alumni/ae & FLAS Recipients from 1996-2006: Selected Findings Azumi Ann Takata, Center for Japanese Studies, International Institute Donna Parmelee,

More information

Microsoft Office 2010 via Windows 7 (Word, Excel, Access, One Note, Outlook, PowerPoint and Publisher) Microsoft Exchange 2007, Visio, Project.

Microsoft Office 2010 via Windows 7 (Word, Excel, Access, One Note, Outlook, PowerPoint and Publisher) Microsoft Exchange 2007, Visio, Project. UNCLASSIFIED 16/02/2015 v2.2 Cobweb Hosted Desktop Service Description Cobweb Hosted Desktop provides businesses with a Cloud based service which enables end users to access a Virtual Windows Desktop with

More information

Information Technology Law in 2035: Where are we headed?

Information Technology Law in 2035: Where are we headed? Information Technology Law in 2035: Where are we headed? September 16, 2015 Information Technology Law in 2035: Where are we headed? Information Technology Law in 2035 The Future of IT: DEVICE DEMOCRACY

More information

Cyclope Internet Filtering Proxy. - User Guide -

Cyclope Internet Filtering Proxy. - User Guide - Cyclope Internet Filtering Proxy - User Guide - 1. Overview 3 2. Cyclope Internet Filtering Proxy User Interface 4 2.1 Login 4 2.2 Logout 4 3. Administration 5 3.1 IP Management 5 3.2 Proxy Forwarding

More information

Cross-Language Instant Messaging with Automatic Translation

Cross-Language Instant Messaging with Automatic Translation Cross-Language Instant Messaging with Automatic Translation Che-Yu Yang Department of Information Management China University of Technology Taipei, Taiwan e-mail: cyyang@cute.edu.tw Abstract Along with

More information

Microsoft stores badge guidelines. February 2016

Microsoft stores badge guidelines. February 2016 Microsoft stores badge guidelines February 2016 Welcome Together we can do amazing things. Millions of fans, thousands of partners and developers across the world empower people and organizations do great

More information

A CRITICAL ANALYSIS OF THE WEB-PRESENTATIONS OF FLAGSHIP UNIVERSITIES

A CRITICAL ANALYSIS OF THE WEB-PRESENTATIONS OF FLAGSHIP UNIVERSITIES A CRITICAL ANALYSIS OF THE WEB-PRESENTATIONS OF FLAGSHIP UNIVERSITIES KASSEL) (SOURCE: A MAHE THESIS 2012, INCHER - Queenie K.H. Lam Changing conditions and changing approaches of academic work International

More information

Reference Guide: Approved Vendors for Translation and In-Person Interpretation Services

Reference Guide: Approved Vendors for Translation and In-Person Interpretation Services Reference Guide: Approved Vendors for Translation and In-Person Interpretation Services What you need to know The government of D.C. has identified, vetted, and engaged four vendors in a citywide contract

More information

How do I translate...?

How do I translate...? How do I translate...? Professional Translation Hybrid Translation Machine Translation Certified Translation Supported Formats Language Codes Toll Free: (800)790-3680 Professional Translation Hybrid Translation

More information

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming

More information

Process Automation Overview Process Automation Overview

Process Automation Overview Process Automation Overview Process Automation Overview Process Automation Business Overview Presented By: Skype: dom.fernandez Dominic Fernandez Principal Consultant dscf@computants.org http://www.computants.org/ 1 http://www.computants.org/

More information

How To Protect Your Network From Attack From A Network Security Threat

How To Protect Your Network From Attack From A Network Security Threat Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your

More information

CAPTURING THE VALUE OF UNSTRUCTURED DATA: INTRODUCTION TO TEXT MINING

CAPTURING THE VALUE OF UNSTRUCTURED DATA: INTRODUCTION TO TEXT MINING CAPTURING THE VALUE OF UNSTRUCTURED DATA: INTRODUCTION TO TEXT MINING Mary-Elizabeth ( M-E ) Eddlestone Principal Systems Engineer, Analytics SAS Customer Loyalty, SAS Institute, Inc. Is there valuable

More information