11u45-12u30: De nieuwe rol van de DPO in de praktijk Deel 1 12 april 2016 Bavo Van den Heuvel Thomas More Mechelen
|
|
- Arline Phelps
- 8 years ago
- Views:
Transcription
1 11u45-12u30: De nieuwe rol van de DPO in de praktijk Deel 1 12 april 2016 Bavo Van den Heuvel Thomas More Mechelen 1 GDPR 6 april 2016: h3p://eur- lex.europa.eu/legal- content/en/ TXT/?uri=consil:ST_5419_2016_INIT Versus 15 december 2015: h3ps://insideprivacy.com/wp- content/ uploads/sites/6/2016/04/gdpr- comparison- Dec vs- Apr pdf 2 1
2 DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on the protection of natural persons with regard to the processing of personal data by competent authorities for the purposes of the prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties, and on the free movement of such data, and repealing Council Framework Decision 2008/977/JHA Source: h3p://eur- lex.europa.eu/legal- content/en/txt/? qid= &uri=consil:st_5418_2016_init 3 Directive vs GDPR Direc[ve Ar#cle 1 Subject- ma1er and objec#ves This Direc[ve lays down the rules rela[ng to the protec[on of natural persons with regard to the processing of personal data by competent authori[es for the purposes of the preven[on, inves[ga[on, detec[on or prosecu[on of criminal offences or the execu[on of criminal penal[es, including the safeguarding against and the preven[on of threats to public security. Ar[cle 9 Specific processing condi#ons Personal data collected by competent authori[es for the purposes set out in Ar[cle 1(1) shall not be processed for purposes other than those set out in Ar[cle 1(1) unless such processing is authorised by Union or Member State law. Where personal data are processed for such other purposes, Regula[on (EU) 2016/... (=GDPR) shall apply unless the processing is carried out in an ac[vity which falls outside the scope of Union law. 4 2
3 Art 37 Designa.on of the data protec.on officer 1. The controller and the processor shall designate a data protec[on officer in any case where: (a) the processing is carried out by a public authority or body, except for courts ac[ng in their judicial capacity; or (b) the core ac[vi[es of the controller or the processor consist of processing opera[ons which, by virtue of their nature, their scope and/or their purposes, require regular and systema[c monitoring of data subjects on a large scale; or (c) the core ac[vi[es of the controller or the processor consist of processing on a large scale of special categories of data pursuant to Ar[cle 9 and personal data rela[ng to criminal convic[ons and offences referred to in Ar[cle Art 37 Designa.on of the data protec.on officer a) Overheid, ruim begrip overheidsinstan[e uit decreet op openbaarheid van bestuur b) Verwerkingen die vanwege hun aard, hun omvang en/of hun doeleinden regelma[ge en stelselma[ge observa[e op grote schaal van betrokkenen vereisen, groo3e is niet vermeld! c) Grootschalige verwerking van bijzondere categorieën van gegevens: persoonsgegevens waaruit ras of etnische alomst, poli[eke opvamngen, religieuze of levensbeschouwelijke overtuigingen, of het lidmaatschap van een vakbond blijken, en verwerking van gene[sche gegevens, biometrische gegevens met het oog op de unieke iden[fica[e van een persoon, of gegevens over gezondheid, of gegevens met betrekking tot iemands seksueel gedrag of seksuele gerichtheid (=vroegere art 6 en 7 WVP) Verwerking van persoonsgegevens betreffende strafrechtelijke veroordelingen en straoare feiten (= ca vroeger art 8) 6 3
4 Art 37 Designa.on of the data protec.on officer 2. A group of undertakings may appoint a single data protec[on officer provided that a data protec[on officer is easily accessible from each establishment. 3. Where the controller or the processor is a public authority or body, a single data protec[on officer may be designated for several such authori[es or bodies, taking account of their organisa[onal structure and size. 4. In cases other than those referred to in paragraph 1, the controller or processor or associa[ons and other bodies represen[ng categories of controllers or processors may or, where required by Union or Member State law shall, designate a data protec[on officer. The data protec[on officer may act for such associa[ons and other bodies represen[ng controllers or processors. 7 Designa.on of the data protec.on officer 5. The data protec[on officer shall be designated on the basis of professional quali[es and, in par[cular, expert knowledge of data protec[on law and prac[ces and the ability to fulfil the tasks referred to in Ar[cle The data protec[on officer may be a staff member of the controller or processor, or fulfil the tasks on the basis of a service contract. 7. The controller or the processor shall publish the contact details of the data protec[on officer and communicate them to the supervisory authority. 8 4
5 5. DPO training kan nodig zijn, cer[fica[e van de DPO is niet verplicht, onze opleiding is impliciet erkend 6. Tip: slecht idee om de DPO bij je processor te gaan huren, dat geep conflict of intrest 7. Contactgegevens is nieuw: op website en gewoon laten weten aan privacycommissie, het kan zijn dat men in Belgie nog een bijkomende goedkeuring van de DPO zal vereisen 9 Art 38 Posi.on of the data protec.on officer 1. The controller and the processor shall ensure that the data protec[on officer is involved properly and in a [mely manner in all issues which relate to the protec[on of personal data. 2. The controller and processor shall support the data protec[on officer in performing the tasks referred to in Ar[cle 39 by providing resources necessary to carry out those tasks and access to personal data and processing opera[ons, and to maintain his or her expert knowledge. 10 5
6 1. Zeer goede zaak: 1. de verantwoordelijkheid wordt daar gelegd 2. vraag ernaar en wijs je verantwoordelijke(n) hierop: degelijk en [jdige info krijgen, 3. plaats het ook in projectmethodologie, 4. geef aan dat er doorloop[jden zijn mochten er mach[gingen nodig zijn of dpia s 2. Resources: [jd en middelen voor je taken, ook toegang tot de persoonsgegevens zelf en bijscholing: bv een studiedag over GDPR J 11 Posi.on of the data protec.on officer 3. The controller and processor shall ensure that the data protec[on officer does not receive any instruc[ons regarding the exercise of those tasks. He or she shall not be dismissed or penalised by the controller or the processor for performing his tasks. The data protec[on officer shall directly report to the highest management level of the controller or the processor. 4. Data subjects may contact the data protec[on officer with regard to all issues related to processing of their personal data and to the exercise of their rights under this Regula[on. 5. The data protec[on officer shall be bound by secrecy or confiden[ality concerning the performance of his or her tasks, in accordance with Union or Member State law. 6. The data protec[on officer may fulfil other tasks and du[es. The controller or processor shall ensure that any such tasks and du[es do not result in a conflict of interests. 12 6
7 Posi.on of the data protec.on officer 3. Autonoom adviezen geven, kan wel taken krijgen van vvdv en verwerker. Geef advies steeds zo hoog mogelijk, zie ook dat je als dpo in organogram als adviseur aan hoogste in rang staat 4. Tip: gebruik generiek adres: denk aan inzage en verbeterrecht (best via portaal zelf te regelen door betrokkene), data portabili[y, 5. Was reeds zo 6. Belangenvermening Voorbeelden: it manager, hr manager, ingehuurd van bij je verwerker, beter: bij legal, bij compliancy, bij interne audit 13 Art 39 Tasks of the data protec.on officer 1. The data protec[on officer shall have at least the following tasks: (a) to inform and advise the controller or the processor and the employees who are carry out processing of their obliga[ons pursuant to this Regula[on and to other Union or Member State data protec[on provisions; (b) to monitor compliance with this Regula[on, with other Union or Member State data protec[on provisions and with the policies of the controller or processor in rela[on to the protec[on of personal data, including the assignment of responsibili[es, awareness- raising and training of staff involved in the processing opera[ons, and the related audits; 14 7
8 (a) to inform and advise the controller or the processor and the employees! (a) Best door formele adviezen via (tov vvdv en verw): wat moet waarom hoe verwerkt worden (b) Tov personeel: , intranet, elearning (b) to monitor compliance with this Regula[on De veiligheidsrichtlijnen, taken en verantwoordelijkheden, sensibiliseren van betrokkenen die verwerken, en ook audit hierop!: controle logs, random bevraging, ids/ips, siem of andere tools. Denk ook aan social engineering en mystery shopping. 15 Tasks of the data protec.on officer (c) to provide advice where requested as regards the data protec[on impact assessment and monitor its performance pursuant to Ar[cle 35; (d) to cooperate with the supervisory authority; (e) to act as the contact point for the supervisory authority on issues rela[ng to processing, including the prior consulta[on referred to in Ar[cle 36, and to consult, where appropriate, with regard to any other ma3er. 2. The data protec[on officer shall in the performance of his or her tasks have due regard to the risk associated with the processing opera[ons, taking into account the nature, scope, context and purposes of the processing. 16 8
9 Tasks of the data protec.on officer (c) DPIA; Zie verder (d) Samenwerking dpa & (e) to act as the contact point for the supervisory authority on issues rela[ng to processing, including the prior consulta[on referred to in Ar[cle 36, and to consult, where appropriate, with regard to any other ma3er. Goede zaak: nu ook al vaak, samenwerken geep een andere posi[e aan de DPO 2. due regard to the risk associated with the processing opera[ons.! Als je de materie niet kent: vraag externe hulp: bv db encryp[e, bv sta[s[ek, bv juridisch, bv IT audit, bv support voor DPO 17 Ar9cle 35 Data protec9on impact assessment 1. Where a type of processing in par[cular using new technologies, and taking into account the nature, scope, context and purposes of the processing, is likely to result in a high risk to the rights and freedoms of natural persons, the controller shall, prior to the processing, carry out an assessment of the impact of the envisaged processing opera[ons on the protec[on of personal data. A single assessment may address a set of similar processing opera[ons that present similar high risks. 2. The controller shall seek the advice of the data protec[on officer, where designated, when carrying out a data protec[on impact assessment. ( ) Gegevensbeschermingseffectbeoordeling 18 9
10 Ar9cle 36 Prior consulta9on 1. The controller shall consult the supervisory authority prior to processing where a data protec[on impact assessment under Ar[cle 35 indicates that the processing would result in a high risk in the absence of measures taken by the controller to mi[gate the risk. 2. Where the supervisory authority is of the opinion that the intended processing referred to in paragraph 1 would infringe this Regula[on, in par[cular where the controller has insufficiently iden[fied or mi[gated the risk, the supervisory authority shall within a period of up to eight weeks of receipt of the request for consulta[on provide wri3en advice to the controller, and where applicable to processor, and may use any of its powers referred to in Ar[cle 58. That period may be extended by six weeks, taking into account the complexity of the intended processing. The supervisory authority shall inform the controller, and where applicable the processor of any such extension within one month of receipt of the request for consulta[on together with the reasons for the delay. Those periods may be suspended un[l the supervisory authority has obtained any informa[on it may have requested for the purposes of the consulta[on. 3. When consul[ng the supervisory authority pursuant to paragraph 1, the controller shall provide the supervisory authority with ; (a) where applicable, the respec[ve responsibili[es of the controller, joint controllers and processors involved in the processing, in par[cular for processing within a group of undertakings; (b) the purposes and means of the intended processing; (c) the measures and safeguards provided to protect the rights and freedoms of data subjects pursuant to this Regula[on; (d) where applicable, the contact details of the data protec[on officer; (e) the data protec[on impact assessment provided for in Ar[cle 35; and (f) any other informa[on requested by the supervisory authority. Voorafgaande raadpleging 19 Art 83 General condi.ons for imposing administra.ve fines 4. Infringments of the following provisions shall, in acccordance with paragraph 2, be subject to administra[ve fines up to EUR, or in the case of an undertaking, up to 2% of the total worlwideworldwide annual turnover of the preceding financial year, whichever is higher: (a) the obliga[ons of the controller and the processor pursuant to Ar[cles 8, 10, 23, 24,11, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 42 and 43; 20 10
Ons privacybier. Derde privacycafé Data Protection Institute 13 januari 2016 Thomas More Mechelen 21/01/16
21/01/16 Derde privacycafé Data Protection Institute 13 januari 2016 Thomas More Mechelen 1 Privacycafé copyright 2016 Data Protec7on Ins7tute BVBA Ons privacybier 2 Privacycafé copyright 2016 Data Protec7on
More informationIP-NBM. Copyright Capgemini 2012. All Rights Reserved
IP-NBM 1 De bescheidenheid van een schaker 2 Maar wat betekent dat nu 3 De drie elementen richting onsterfelijkheid Genomics Artifical Intelligence (nano)robotics 4 De impact van automatisering en robotisering
More informationThe information in this report is confidential. So keep this report in a safe place!
Bram Voorbeeld About this Bridge 360 report 2 CONTENT About this Bridge 360 report... 2 Introduction to the Bridge 360... 3 About the Bridge 360 Profile...4 Bridge Behaviour Profile-Directing...6 Bridge
More informationExamen Software Engineering 2010-2011 05/09/2011
Belangrijk: Schrijf je antwoorden kort en bondig in de daartoe voorziene velden. Elke theorie-vraag staat op 2 punten (totaal op 24). De oefening staan in totaal op 16 punten. Het geheel staat op 40 punten.
More informationThe Biometric Evaluation And Testing (BEAT) platform
TWENTE. Faculty of Electrical Engineering, Mathematics and Computer Science The Biometric Evaluation And Testing A solution for a data privacy and open data policy Principal scientist, NFI Forensic biometrics
More informationGMP-Z Annex 15: Kwalificatie en validatie
-Z Annex 15: Kwalificatie en validatie item Gewijzigd richtsnoer -Z Toelichting Principle 1. This Annex describes the principles of qualification and validation which are applicable to the manufacture
More informationThe Importance of Collaboration
Welkom in de wereld van EDI en de zakelijke kansen op langer termijn Sectorsessie mode 23 maart 2016 ISRID VAN GEUNS IS WORKS IS BOUTIQUES Let s get connected! Triumph Without EDI Triumph Let s get connected
More informationemployager 1.0 design challenge
employager 1.0 design challenge a voyage to employ(ment) EMPLOYAGER 1.0 On the initiative of the City of Eindhoven, the Red Bluejay Foundation organizes a new design challenge around people with a distance
More informationLinux Network Server: Firewalls
Linux Network Server: Firewalls Dr. A.R. (Tom) Peters HvA/HI gastdocent Hogeschool van Amsterdam, afd. Hogere Informatica tpeters@xs4all.nl 0204080204 Leerdoelen Firewalls Wees in staat om de betekenis
More information101 Inspirerende Quotes - Eelco de boer - winst.nl/ebooks/ Inleiding
Inleiding Elke keer dat ik een uitspraak of een inspirerende quote hoor of zie dan noteer ik deze (iets wat ik iedereen aanraad om te doen). Ik ben hier even doorheen gegaan en het leek me een leuk idee
More informationMAYORGAME (BURGEMEESTERGAME)
GATE Pilot Safety MAYORGAME (BURGEMEESTERGAME) Twan Boerenkamp Who is it about? Local council Beleidsteam = GBT or Regional Beleidsteam = RBT Mayor = Chairman Advisors now = Voorlichting? Official context
More informationMaximizer Synergy. info@adafi.be BE 0415.642.030. Houwaartstraat 200/1 BE 3270 Scherpenheuvel. Tel: +32 495 300612 Fax: +32 13 777372
Maximizer Synergy Adafi Software is een samenwerking gestart met Advoco Solutions, een Maximizer Business Partner uit Groot Brittannië. Advoco Solutions heeft een technologie ontwikkeld, genaamd Synergy,
More informationMAKING A COMPLAINT. Problem with a Health or Mental Health care provider?
MAKING A COMPLAINT Problem with a Health or Mental Health care provider? (e.g. Hospital, Nurse, Psychiatrist, Chiropractor, Physio, Den'st, Doctor, Psychologist, etc) HOW THE HEALTH CONSUMERS COUNCIL CAN
More informationIT-waardeketen management op basis van eeuwenoude supply chain kennis
IT-waardeketen management op basis van eeuwenoude supply chain kennis Hans van Aken / November 28, 2012 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject
More informationOGH: : 11g in de praktijk
OGH: : 11g in de praktijk Real Application Testing SPREKER : E-MAIL : PATRICK MUNNE PMUNNE@TRANSFER-SOLUTIONS.COM DATUM : 14-09-2010 WWW.TRANSFER-SOLUTIONS.COM Real Application Testing Uitleg Real Application
More informationThe Impact of EU Data Protection Legislation. Thomas Rivera Hitachi Data Systems
Privacy PRESENTATION vs Data TITLE Protection: GOES HERE The Impact of EU Data Protection Legislation Thomas Rivera Hitachi Data Systems SNIA Legal Notice The material contained in this tutorial is copyrighted
More informationResearch Report. Ingelien Poutsma Marnienke van der Maal Sabina Idler
Research Report Ingelien Poutsma Marnienke van der Maal Sabina Idler Research report ABSTRACT This research investigates what the ideal bank for adolescents (10 16 years) looks like. The research was initiated
More information(Optioneel: We will include the review report and the financial statements reviewed by us in an overall report that will be conveyed to you.
1.2 Example of an Engagement Letter for a Review Engagement N.B.: Dit voorbeeld van een opdrachtbevestiging voor een beoordelingsopdracht is gebaseerd op de tekst uit Standaard 2400, Opdrachten tot het
More informationCitrix Access Gateway: Implementing Enterprise Edition Feature 9.0
coursemonstercom/uk Citrix Access Gateway: Implementing Enterprise Edition Feature 90 View training dates» Overview Nederlands Deze cursus behandelt informatie die beheerders en andere IT-professionals
More informationIs het nodig risico s te beheersen op basis van een aanname..
Is het nodig risico s te beheersen op basis van een aanname.. De mens en IT in de Zorg Ngi 19 april 2011 René van Koppen Agenda Er zijn geen feiten, slechts interpretaties. Nietzsche Geen enkele interpretatie
More informationwhat can we do with botnet data?
what can we do with botnet data? prof.dr. Ronald Leenes r.e.leenes@uvt.nl TILT - Tilburg Institute for Law, Technology, and Society background SURFnet (Dutch NREN) was offered 700 GB of data obtained from
More informationRelationele Databases 2002/2003
1 Relationele Databases 2002/2003 Hoorcollege 5 22 mei 2003 Jaap Kamps & Maarten de Rijke April Juli 2003 Plan voor Vandaag Praktische dingen 3.8, 3.9, 3.10, 4.1, 4.4 en 4.5 SQL Aantekeningen 3 Meer Queries.
More informationIMPLEMENTING AN EFFECTIVE INFORMATION SECURITY AWARENESS PROGRAM
IMPLEMENTING AN EFFECTIVE INFORMATION SECURITY AWARENESS PROGRAM by AMANDA WOLMARANS DISSERTATION Submitted in fulfilment of the requirements for the degree MASTER OF SCIENCE in COMPUTER SCIENCE in the
More informationHoorcollege marketing 5 de uitgebreide marketingmix. Sunday, December 9, 12
Hoorcollege marketing 5 de uitgebreide marketingmix Sunday, December 9, 12 De traditionele marketing mix Sunday, December 9, 12 Waarom was dat niet genoeg dan? Sunday, December 9, 12 Omdat er vooruitgang
More informationLoad Balancing Lync 2013. Jaap Wesselius
Load Balancing Lync 2013 Jaap Wesselius Agenda Introductie Interne Load Balancing Externe Load Balancing Reverse Proxy Samenvatting & Best Practices Introductie Load Balancing Lync 2013 Waarom Load Balancing?
More informationWord -Introduction. Contents
Introduction Everything about tables Mail merge and labels Refreshment of the basics of Word Increasing my efficiency : tips & tricks New in Word 2007 Standard - corporate documents What is new in Word
More informationData Driven Strategy. BlinkLane Consul.ng Amsterdam, 10 december 2013. Ralph Hofman Arent van t Spijker
Data Driven Strategy BlinkLane Consul.ng Amsterdam, 10 december 2013 Ralph Hofman Arent van t Spijker 1 Data Driven Strategy 08.00 08.05 Welkom 08:05 08.20 Data Driven Strategy 08.20 08.30 Het Business
More informationINSIDER TRADING POLICY ZIGGO N.V. EFFECTIVE AS OF 18.07.2013. Declaration of agreement with the Insider Trading Policy
INSIDER TRADING POLICY ZIGGO N.V. EFFECTIVE AS OF 18.07.2013 CONTENTS (1) Definitions (2) General rules applicable to all Employees (3) Additional rules for Insiders (4) Compliance Officer APPENDICES (I)
More informationDutch Mortgage Market Pricing On the NMa report. Marco Haan University of Groningen November 18, 2011
Dutch Mortgage Market Pricing On the NMa report Marco Haan University of Groningen November 18, 2011 Introductory remarks My comments are complementary: I do not focus so much on this market as such, more
More informationSample test Secretaries/administrative. Secretarial Staff Administrative Staff
English Language Assessment Paper 3: Writing Time: 1¼ hour Secretarial Staff Administrative Staff Questions 1 17 Text 1 (questions 1 8) Assessment Paper 3 Writing Part 1 For questions 1-8, read the text
More informationDaan & Rembrandt Research Wendelien Daan By Willemijn Jongbloed Group D October 2009
Daan & Rembrandt Research Wendelien Daan By Willemijn Jongbloed Group D October 2009 Doing Dutch Often, the work of many Dutch artist; photographers, designers, and painters is easy to recognize among
More informationA Comparative Case Study on the Relationship between EU Unity and its Effectiveness in Multilateral Negotiations
Is the Sum More than its Parts? A Comparative Case Study on the Relationship between EU Unity and its Effectiveness in Multilateral Negotiations PhD thesis by: Louise van Schaik, July 2010 Promoter/ PhD
More informationAssuring the Cloud. Hans Bootsma Deloitte Risk Services hbootsma@deloitte.nl +31 (0)6 1098 0182
Assuring the Cloud Hans Bootsma Deloitte Risk Services hbootsma@deloitte.nl +31 (0)6 1098 0182 Need for Assurance in Cloud Computing Demand Fast go to market Support innovation Lower costs Access everywhere
More informationBusiness Rules Management. Martijn Zoet Universiteit Utrecht - 2012
Business Rules Management Martijn Zoet Universiteit Utrecht - 2012 Today s lesson A introduc+on should be like a lady's skirt: long enough to cover the essen+als but short enough to keep it interes+ng
More informationHIPAA Breaches, Security Risk Analysis, and Audits
HIPAA Breaches, Security Risk Analysis, and Audits Derrick Hill Senior Health IT Advisor Kentucky REC What cons?tutes PHI? HIPAA provides a list of 18 iden?fiers that cons?tute PHI. Any one of these iden?fiers
More informationCO-BRANDING RICHTLIJNEN
A minimum margin surrounding the logo keeps CO-BRANDING RICHTLIJNEN 22 Last mei revised, 2013 30 April 2013 The preferred version of the co-branding logo is white on a Magenta background. Depending on
More informationPrivacy vs Data Protection. PRESENTATION TITLE GOES HERE Eric A. Hibbard, CISSP, CISA Hitachi Data Systems
Privacy vs Data Protection PRESENTATION TITLE GOES HERE Eric A. Hibbard, CISSP, CISA Hitachi Data Systems Introduction The terms privacy and data protection are often used interchangeable In reality they
More informationSUPPLEMENTARY INTERNAL RULES IMPLEMENTING REGULATION (EC) N 45/2001 IN RELATION TO THE DATA PROTECTION OFFICER
SUPPLEMENTARY INTERNAL RULES IMPLEMENTING REGULATION (EC) N 45/2001 IN RELATION TO THE DATA PROTECTION OFFICER 10 September 2009 page 1 / 8 SUPPLEMENTARY INTERNAL RULES IMPLEMENTING REGULATION (EC) N 45/2001
More informationThe state of DIY. Mix Express DIY event Maarssen 14 mei 2014
The state of DIY!! Mix Express DIY event Maarssen 14 mei 2014 Inleiding Mix press DIY sessie Maarssen 14 mei 2014 Deze presentatie is gemaakt voor het Mix DIY congres en gebaseerd op onze analyse van de
More informationMarket Intelligence & Research Services. CRM Trends Overview. MarketCap International BV Januari 2011
Market Intelligence & Research Services CRM Trends Overview MarketCap International BV Januari 2011 Index 1. CRM Trends generiek 2. CRM & IT 3. CRM in Nederland 2011 2 Index 1. CRM Trends generiek 2. CRM
More informationPresentation about Worknets on the Bridge-IT conference. Barcelona, March 2011
Presentation about Worknets on the Bridge-IT conference Barcelona, March 2011 Networks (Gaining new relations) Worknets (Making relations beneficial) to help organizations work together for common good
More informationDesign Document. Developing a Recruitment campaign for IKEA. Solve-
Design Document Developing a Recruitment campaign for IKEA. Solve- 02 00 Chapter Index 01. INTRODUCTION 02. GENERAL INFORMATION Informational architecture Sitemap Use case Why use or not use Flash Flowchart
More informationHIPAA Privacy Policy (Revised Feb. 4, 2015)
Valley Bone & Joint Clinic HIPAA Privacy Policy (Revised Feb. 4, 2015) 1. PURPOSE Valley Bone & Joint Clinic is commi2ed to protec6ng the rights of our pa6ents. In compliance with the Health Insurance
More informationHelp! Financiële planning PDF
Help! Financiële planning PDF ==>Download: Help! Financiële planning PDF ebook Help! Financiële planning PDF - Are you searching for Help! Financiële planning Books? Now, you will be happy that at this
More informationITCulinair Cisco InterCloud
ITCulinair Cisco InterCloud Uw Rijstleiders : Harald de Wilde & Niels van den Berg Strategic Partner Business Development Data Center Virtualizatie & Cloud Cisco Confidential 2 Waarom Hybride? Controle
More informationCorporate Security & Identity
ir. Yvan De Mesmaeker Secretary general ir. Yvan De Mesmaeker Secretary general of the European Corporate Security Association - ECSA Education: MSc in Engineering Professional responsibilities: Secretary
More informationIBK Scholingsdag. Created with Haiku Deck, presentation software that's simple, beautiful and fun. page 1 of 44
page 1 of 44 page 2 of 44 page 7 of 44 page 8 of 44 page 9 of 44 page 10 of 44 Gratis studieboeken via Volkskrant.nl: Accountancy & Financieel management Accounting Carrière & Studieadvies Carrièremanagement
More informationEthical Issues in Tax Prac2ce and Procedure. Thursday, June 25, 2015 12:20 P.M. 1:50 P.M.
Ethical Issues in Tax Prac2ce and Procedure Thursday, June 25, 2015 12:20 P.M. 1:50 P.M. Presenters Brian Katusian Seltzer Caplan McMahon Vitek 750 B Street, Suite 2100 San Diego, CA 92101 Tel. 619.685.3186
More informationVerticale tuin maken van een pallet
Daar krijg je dan je groendakmaterialen geleverd op een pallet. Waar moet je naar toe met zo'n pallet. Retour brengen? Gebruiken in de open haard? Maar je kunt creatiever zijn met pallets. Zo kun je er
More informationAuteur. Onderwerp. Datum
Auteur DLA PIPER Be Aware Employment, Pensions and Benefits www.dlapiper.com Onderwerp Does the employee who uses a company car (even only occasionally) to transport a colleague have to possess a certificate
More informationPOWER OF ATTORNEY FOR EXTRAORDINARY SHAREHOLDERS MEETING OF OCTOBER 5, 2011
RealDolmen Naamloze vennootschap/public Limited Company A. Vaucampslaan 42, 1654 Huizingen RPR/Legal entities register /BTW-VAT no. BE 0429.037.235 Brussel/Brussels VOLMACHT VOOR DE BUITENEWONE ALEMENE
More informationUvA college Governance and Portfolio Management
UvA college Han Verniers Principal Consultant Han.Verniers@LogicaCMG.com Programma Governance IT Governance, wat is dat? Governance: structuren, processen, instrumenten Portfolio Management Portfolio Management,
More informationStorage in Microsoft Azure Wat moet ik daarmee? Bert Wolters @bertwolters
Storage in Microsoft Azure Wat moet ik daarmee? Bert Wolters @bertwolters Welk deel van het platform hebben we nu behandeld? Agenda Recap: Storage Account Nieuw! Premium Storage Nieuw! Native backup voor
More informationInterna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES
Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES Agenda Importance of Common Cloud Standards Outline current work undertaken Define
More informationEEN HUIS BESTUREN ALS EEN FABRIEK,
EEN HUIS BESTUREN ALS EEN FABRIEK, HOE DOE JE DAT? Henk Akkermans World Class Maintenance & Tilburg University Lezing HomeLab 2050, KIVI, 6 oktober, 2015 The opportunity: an industrial revolution is happening
More informationFTC Data Security Standard
FTC Data Security Standard The FTC takes the posi6on (Being tested now in li6ga6on) that Sec6on 5 of the FTC Act requires Reasonable Security under the circumstances: that companies have reasonable controls
More informationTHE EMOTIONAL VALUE OF PAID FOR MAGAZINES. Intomart GfK 2013 Emotionele Waarde Betaald vs. Gratis Tijdschrift April 2013 1
THE EMOTIONAL VALUE OF PAID FOR MAGAZINES Intomart GfK 2013 Emotionele Waarde Betaald vs. Gratis Tijdschrift April 2013 1 CONTENT 1. CONCLUSIONS 2. RESULTS Reading behaviour Appreciation Engagement Advertising
More informationCMMI version 1.3. How agile is CMMI?
CMMI version 1.3 How agile is CMMI? A small poll Who uses CMMI without Agile? Who uses Agile without CMMI? Who combines both? Who is interested in SCAMPI? 2 Agenda Big Picture of CMMI changes Details for
More informationAdvanced Metering Infrastructure
Advanced Metering Infrastructure Research Project 2 Vic Ding SNE, UvA February 8th 2012 Agenda Background Research motivation and questions Research methods Research findings Stakeholders Legislation Smart
More informationPrivate Equity Survey 2011
Private Equity Survey 2011 Success of portfolio companies through quality of management and organization. Herman D. Koning Ron Jansen February 9, 2011 1 This afternoon 14.30 Reception 15.00 Welcome by
More informationEnd User Computing. Applications. Application Fabric / Data Fabric / PaaS. Software Defined Data Center
Storage Enterprise Data Center End User Computing Content-Aware Applications Security Analytics Application Fabric / Data Fabric / PaaS Software Defined Data Center Partners Service Provider vchs + Hans
More informationAANMELDING. Zorg ervoor dat je alle velden van het aanmeldingsformulier invult. Lees de onderstaande tips voordat je het formulier invult:
AANMELDING Study Abroad Hawaii Pacific University KILROY education helpt je met de aanmelding aan de Hawaii Pacific University. Onze studieadviseurs informeren je over opleidingen, toelatingseisen, collegegelden,
More informationInformaon Governance eassessment FACT SHEET
Based on the Core Skills Framework Informaon Governance eassessment FACT SHEET Wrien by Developed in collaboraon with Information Governance and Health Records Audit and Compliance Manager Data protecon
More informationThe Chinese market for environmental and water technology. Kansendossier China
The Chinese market for environmental and water technology Kansendossier China Kansendossier The Chinese market for environmental and water Technology Datum 2 5 2013 Agentschap NL is een agentschap van
More informationTuesday, February 26, 2008. Unit testen in de praktijk
Unit testen in de praktijk Indeling Algemene theorie van unit testing PHPunit Wat is het doel van testen? Controleren of software correct werkt. Voldoet software aan vooraf gegeven specificaties? Blijft
More informationRetail Logistics; Let Fresh Rule!
Retail Logistics; Let Fresh Rule! April 10 th 2014, Joost Snels Surprise Wageningen UR Food & Biobased Research 1 Consumer trends: healthy Consumer trend: luxury life style Wageningen UR Food & Biobased
More informationSURFfederatie - edugain. Opt-in Metadata Management for a Hub & Spoke Federation
SURFfederatie - edugain Opt-in Metadata Management for a Hub & Spoke Federation Content - History of SURFfederatie - Federation models - Functional view - Consequences of hub & spoke - edugain - Future
More informationNew EU Data Protection legislation comes into force today. What does this mean for your business?
24 th May 2016 New EU Data Protection legislation comes into force today. What does this mean for your business? After years of discussion and proposals, the General Data Protection Regulation ( GDPR )
More informationtotal dutch speak Dutch instantly no books no writing absolute confi dence
total dutch speak Dutch instantly no books no writing absolute confi dence d To find out more, please get in touch with us. For general enquiries and for information on Michel Thomas: Call: 020 7873 6400
More informationT h e N e x t G e n e r a t i o n of C o n s u m e r i z a t i o n KIXS. Leading Edge Forum Study Tour 20-25 October 2013
T h e N e x t G e n e r a t i o n of C o n s u m e r i z a t i o n Teus ir. van T. der Plaat der Plaat KIXS Leading Edge Forum Study Tour 20-25 October 2013 November 2013 De reis Inleiding S-curve End
More informationMemorandum. Zie bijlage. Behavioural and Societal Sciences Kampweg 5 3769 DE Soesterberg Postbus 23 3769 ZG Soesterberg. Van Dr. J.B.F.
Memorandum Van Dr. J.B.F. van Erp Onderwerp epartner architecture workshops 'The Results' Behavioural and Societal Sciences Kampweg 5 3769 DE Soesterberg Postbus 23 3769 ZG Soesterberg www.tno.nl T +31
More informationKantoor of Koffiebar. Alain Swolfs Market Unit Leader Banking & Insurance alain.swolfs@capgemini.com
Kantoor of Koffiebar Alain Swolfs Market Unit Leader Banking & Insurance alain.swolfs@capgemini.com Bessenveldstraat Brussels, Belgium Mobile:+32 (0)494 32 13 85 North America 10,384 UK & Ireland 8,766
More informationSan Francisco Chapter. Presented by Mike O. Villegas, CISA, CISSP
Presented by Mike O. Villegas, CISA, CISSP Agenda Information Security (IS) Vision at Newegg.com Typical Issues at Most Organizations Information Security Governance Four Inter-related CoBIT Domains ISO
More informationUw partner in system management oplossingen
Uw partner in system management oplossingen User Centric IT Bring your Own - Corporate Owned Onderzoek Forrester Welke applicatie gebruik je het meest op mobiele devices? Email 76% SMS 67% IM / Chat 48%
More informationInhoud. Xclusief Verzekeringen 4. Xclusief Auto 7. Xclusief Wonen 8. Xclusief Jacht 11. Xclusief Evenementen 12. Contact 15
Inhoud Xclusief Verzekeringen 4 Xclusief Auto 7 Xclusief Wonen 8 Xclusief Jacht 11 Xclusief Evenementen 12 Contact 15 Xclusief Verzekeringen Hebt u exclusief bezit? Dan komt de productlijn Xclusief Verzekeringen
More informationRequirements Lifecycle Management succes in de breedte. Plenaire sessie SPIder 25 april 2006 Tinus Vellekoop
Requirements Lifecycle Management succes in de breedte Plenaire sessie SPIder 25 april 2006 Tinus Vellekoop Focus op de breedte Samenwerking business en IT Deelnemers development RLcM en het voortbrengingsproces
More informationABN AMRO Bank N.V. The Royal Bank of Scotland N.V. ABN AMRO Holding N.V. RBS Holdings N.V. ABN AMRO Bank N.V.
Op 6 februari 2010 is de naam ABN AMRO Bank N.V. (geregistreerd bij de Kamer van Koophandel onder nummer 33002587) gewijzigd in The Royal Bank of Scotland N.V. Op 1 april 2010 is de naam van ABN AMRO Holding
More informationIJkdijk: June 24 2007 04:33:06
IJkdijk: June 24 2007 04:33:06 IJkdijk tens of thousends kilometers of dike, next generation internet, Grid & business Robert Meijer De IJkdijk: De samenhang tussen tienduizenden kilometers dijkproblemen,
More informationThe Role and Function of a Data Protection Officer in the European Commission s Proposed General Data Protection Regulation. Initial Discussion Paper
The Role and Function of a Data Protection Officer in the European Commission s Proposed General Data Protection Regulation 1. Introduction Initial Discussion Paper The data protection officer ( DPO )
More informationLogging en Monitoring - privacy, beveiliging en compliance Enkele praktijkvoorbeelden
Logging en Monitoring - privacy, beveiliging en compliance Enkele praktijkvoorbeelden Pascal Oetiker Security Management Solutions Novell EMEA poetiker@novell.com Privacy- en compliance-druk PCI-DSS NEN
More informationHow To Design A 3D Model In A Computer Program
Concept Design Gert Landheer Mark van den Brink Koen van Boerdonk Content Richness of Data Concept Design Fast creation of rich data which eventually can be used to create a final model Creo Product Family
More informationMaking, Moving and Shaking a Community of Young Global Citizens Resultaten Nulmeting GET IT DONE
Making, Moving and Shaking a Community of Young Global Citizens Resultaten Nulmeting GET IT DONE Rianne Verwijs Freek Hermens Inhoud Summary 5 1 Introductie en leeswijzer 7 2 Achtergrond en onderzoeksopzet
More informationPolice and gendarmerie reform in Belgium: from force to service
Police and gendarmerie reform in Belgium: from force to service 1 RIJKSWACHT Summary part 1 : the concept failure of the traditional methods the answer : community policing part 2 : the conditions for
More informationCOOLS COOLS. Cools is nominated for the Brains Award! www.brainseindhoven.nl/nl/top_10/&id=507. www.cools-tools.nl. Coen Danckmer Voordouw
Name Nationality Department Email Address Website Coen Danckmer Voordouw Dutch / Nederlands Man and Activity info@danckmer.nl www.danckmer.nl Project: Image: Photographer: Other images: COOLS CoenDVoordouw
More information~ We are all goddesses, the only problem is that we forget that when we grow up ~
~ We are all goddesses, the only problem is that we forget that when we grow up ~ This brochure is Deze brochure is in in English and Dutch het Engels en Nederlands Come and re-discover your divine self
More informationLAND/COUNTRY:UNITED STATES
Deel I: Gegevens betreffende de zending LAND/COUNTRY:UNITED STATES Veterinair certificaat voor EU/Veterinary certificate to EU I.1. Verzender/Consignor Naam/Name Adres/Address I.2. I.2.a. I.3. Bevoegde
More informationHIPAA Basics. Health Insurance Portability and Accountability Act of 1996
HIPAA Basics Health Insurance Portability and Accountability Act of 1996 HIPAA: What Is HIPAA? Protects the privacy of healthcare informa@on for all Americans, including the individuals you support Protects
More informationIT Works check. December 12th, 2012
IT Works check December 12th, 2012 RESOC RESOC-SERR Gent en rondom Gent RESOC Gent en rondom Gent = Committee for regional social-economic consultation Representatives of: City of Ghent + 9 municipalities
More informationPoliticalMashup. Make implicit structure and information explicit. Content
1 2 Content Connecting promises and actions of politicians and how the society reacts on them Maarten Marx Universiteit van Amsterdam Overview project Zooming in on one cultural heritage dataset A few
More informationSuriname Tourist visa Application
Suriname Tourist visa Application Please enter your contact information Name: Email: Tel: Mobile: The latest date you need your passport returned in time for your travel: Suriname tourist visa checklist
More informationHR Transformation and Future of HR Brussel, 25 april 2013 Material part 1/2
HR Transformation and Future of HR Brussel, 25 april 2013 Material part 1/2 Doelstellingen Ideeën uitwisselen over hoe een HR transformatie te starten Ervaringen delen over hoe HR toegevoegde waarde kan
More informationSpread. B&R Beurs. March 2010
B&R Beurs March 2010 Spread Find out about the latest investment proposals of B&R's investment groups. Check the agenda, and the upcoming activities we organized for you! B&R Beurs Website: www.bnrbeurs.nl
More informationCampaigns and actions: some recent Dutch experiences. Gerjan Huis in t Veld november 15 2013
Campaigns and actions: some recent Dutch experiences Gerjan Huis in t Veld november 15 2013 Stop Prijsmisleiding! Action Travel Prices 17-21 june 2013 What s the problem? Research February 2013: none of
More informationISACA Roundtable. Cobit and Grab@Pizza 7 september 2015
1 ISACA Roundtable 7 september 2015 ISACA Roundtable Cobit and Grab@Pizza 7 september 2015 2015 KPN Corporate Market B.V. ISACA, is a registered trademark of the Information Systems Audit and Control Association
More informationVirtualisatie. voor desktop en beginners. Gert Schepens Slides & Notities op gertschepens.be
Virtualisatie voor desktop en beginners Gert Schepens Slides & Notities op gertschepens.be Op deze teksten is de Creative Commons Naamsvermelding- Niet-commercieel-Gelijk delen 2.0 van toepassing. Wat
More informationVoorbeeld. Preview ISO 14518 INTERNATIONAL STANDARD. Cranes Requirements for test loads
INTERNATIONAL STANDARD ISO 14518 First edition 2005-02-01 Cranes Requirements for test loads Dit document mag slechts op een stand-alone PC worden geinstalleerd. Gebruik op een netwerk is alleen. toestaan
More informationEMERGENCIES IVAO BE 28 OCT. 2006. by Bob van der Flier IVAO-TA12 & PATCO
De afbeelding kan niet worden weergegeven. Het is mogelijk dat er onvoldoende geheugen beschikbaar is op de computer om de afbeelding te openen of dat de afbeelding beschadigd is. Start de computer opnieuw
More information