UPENET (UPGRADE European NETwork) CEPIS NEWS

Size: px
Start display at page:

Download "UPENET (UPGRADE European NETwork) CEPIS NEWS"

Transcription

1 UPGRADE is the European Journal for the Informatics Professional, published bimonthly at < Publisher UPGRADE is published on behalf of CEPIS (Council of European Professional Informatics Societies, < by Novática < journal of the Spanish CEPIS society ATI (Asociación de Técnicos de Informática, < UPGRADE monographs are also published in Spanish (full version printed; summary, abstracts and some articles online) by Novática UPGRADE was created in October 2000 by CEPIS and was first published by Novática and INFORMATIK/INFORMATIQUE, bimonthly journal of SVI/FSI (Swiss Federation of Professional Informatics Societies, < UPGRADE is the anchor point for UPENET (UPGRADE European NETwork), the network of CEPIS member societies publications, that currently includes the following ones: InfoRewiew, magazine from the Serbian CEPIS society JISA Informatica, journal from the Slovenian CEPIS society SDI Informatik-Spektrum, journal published by Springer Verlag on behalf of the CEPIS societies GI, Germany, and SI, Switzerland ITNOW, magazine published by Oxford University Press on behalf of the British CEPIS society BCS Mondo Digitale, digital journal from the Italian CEPIS society AICA Novática, journal from the Spanish CEPIS society ATI OCG Journal, journal from the Austrian CEPIS society OCG Pliroforiki, journal from the Cyprus CEPIS society CCS Tölvumál, journal from the Icelandic CEPIS society ISIP Editorial TeamEditorial Team Chief Editor: Llorenç Pagés-Casas Deputy Chief Editor: Rafael Fernández Calvo Associate Editor: Fiona Fanning Editorial Board Prof. Vasile Baltac, CEPIS President Prof. Wolffried Stucky, CEPIS Former President Hans A. Frederik, CEPIS Vice President Prof. Nello Scarabottolo, CEPIS Honorary Treasurer Fernando Piera Gómez and Llorenç Pagés-Casas, ATI (Spain) François Louis Nicolet, SI (Switzerland) Roberto Carniel, ALSI Tecnoteca (Italy) UPENET Advisory Board Dubravka Dukic (inforeview, Serbia) Matjaz Gams (Informatica, Slovenia) Hermann Engesser (Informatik-Spektrum, Germany and Switzerland) Brian Runciman (ITNOW, United Kingdom) Franco Filippazzi (Mondo Digitale, Italy) Llorenç Pagés-Casas (Novática, Spain) Veith Risak (OCG Journal, Austria) Panicos Masouras (Pliroforiki, Cyprus) Thorvardur Kári Ólafsson (Tölvumál, Iceland) Rafael Fernández Calvo (Coordination) English Language Editors: Mike Andersson, David Cash, Arthur Cook, Tracey Darch, Laura Davies, Nick Dunn, Rodney Fennemore, Hilary Green, Roger Harris, Jim Holder, Pat Moody. Cover page designed by Concha Arias-Pérez "Indiscernible Identity" / CEPIS 2010 Layout Design: François Louis Nicolet Composition: Jorge Llácer-Gil de Ramales Editorial correspondence: Llorenç Pagés-Casas <pages@ati.es> Advertising correspondence: <novatica@ati.es> UPGRADE Newslist available at < Copyright Novática 2010 (for the monograph) CEPIS 2010 (for the sections UPENET and CEPIS News) All rights reserved under otherwise stated. Abstracting is permitted with credit to the source. For copying, reprint, or republication permission, contact the Editorial Team The opinions expressed by the authors are their exclusive responsibility ISSN Monograph of next issue (April 2010) "Information Technology intourism Industry" (The full schedule of UPGRADE is available at our website) Vol. XI, issue No. 1, February Editorial: Serbian Publication InfoReview joins UPENET, the Network of CEPIS Societies Journals and Magazines 2 From the Chief Editor s Desk New Deputy Chief Editor of UPGRADE Monograph: Identity and Privacy Management (published jointly with Novática*) Guest Editors: Javier Lopez-Muñoz, Miguel Soriano-Ibañez, and Fabio Martinelli 3 Presentation: Identify Yourself but Don t Reveal Your Identity Javier Lopez-Muñoz, Miguel Soriano-Ibañez, and Fabio Martinelli 6 Digital Identity and Identity Management Technologies Isaac Agudo-Ruiz 13 SWIFT Advanced Services for Identity Management Alejandro Pérez-Méndez, Elena-María Torroglosa-García, Gabriel López- Millán, Antonio F. Gómez-Skarmeta, Joao Girao, and Mario Lischka 21 A Privacy Preserving Attribute Aggregation Model for Federated Identity Managements Systems George Inman and David Chadwick 27 Anonymity in the Service of Attackers Guillermo Suarez de Tangil-Rotaeche, Esther Palomar-González, Arturo Ribagorda- Garnacho, and Benjamín Ramos-Álvarez 32 The Importance of Context-Dependent Privacy Requirements and Perceptions to the Design of Privacy-Aware Systems Aggeliki Tsohou, Costas Lambrinoudakis, Spyros Kokolakis, and Stefanos Gritzalis 38 Privacy Three Agents Protection Gemma Déler-Castro 44 Enforcing Private Policy via Security-by-Contract Gabriele Costa and Ilaria Matteucci 53 How Do we Measure Privacy? David Rebollo-Monedero and Jordi Forné 59 Privacy and Anonymity Management in Electronic Voting Jordi Puiggalí-Allepuz and Sandra Guasch-Castelló 66 Digital Identity and Privacy in some New-Generation Information and Communication Technologies Agustí Solanas, Josep Domingo-Ferrer, and Jordi Castellà-Roca 72 Authentication and Privacy in Vehicular Networks José-María de Fuentes García-Romero de Tejada, Ana-Isabel González-Tablas Ferreres, and Arturo Ribagorda-Garnacho UPENET (UPGRADE European NETwork) 79 From ITNOW (BCS, United Kingdom) ICT in Education Enthusing Students Bella Daniels 81 From InfoReview (JISA, Serbia) Information Society "Knowledge Society" is a European Educational Imperative that Should not Circumvent Serbia Marina Petrovic CEPIS NEWS 84 Selected CEPIS News Fiona Fanning 86 Privacy-Consistent Banking Acquisition CEPIS Legal and Security Special Interest Network * This monograph will be also published in Spanish (full version printed; summary, abstracts, and some articles online) by Novática, journal of the Spanish CEPIS society ATI (Asociación de Técnicos de Informática) at <

2 Privacy Three Agents Protection Gemma Déler-Castro Web 2.0 and its manifestations have given rise to an increase in the number of content providers. Now it is the individuals themselves who prepare and publish content. The implementation of e-government procedures requires the fluid exchange of information between parties although it is not always easy to know beforehand who will participate in such procedures. Privacy protection laws were prepared in a different environment. They are now under review to adapt them to the new scenarios. Within the current framework, government and organizations are the two agents involved in the protection of individuals. Due to changes in the use of the Internet and networks, it has become necessary to include a third agent: the individual. Thus, individuals should play a more active role in effective privacy protection. Keywords: Identity management, Privacy, Social Networks, Trusted Domains. 1 Introduction The uses of information technology have changed substantially since the European Directive and Spanish Law on Personal Data Protection were developed and passed. In the new century the Information and Knowledge Society has become a reality. There is a new, virtual world parallel to the physical one that does not belong exclusively to businesses. It is popular and reaches individuals. Today, a part of our lives and relationships takes place on the Internet. It is no longer possible to keep data in one place. Data is combined and merged to create and deploy new, increasingly more attractive services. Privacy is a right that is still just as important as it is in the physical world. But the laws established to protect this right have lost effectiveness. Laws were prepared for a different environment in which data was collected by organizations (public and private) to run their processes. Therefore, it may be difficult to apply them in the current situation (characterized by the flow of information, distributed computing, e-applications, social networks, and more recently, cloud computing). In some cases it is not enough to protect people s privacy. This article discusses two cases, one related to e-government and the other to social networks. In both cases protection is only possible through the combined efforts of three agents: the government, social network managers, and individuals. 2 Transformation over Time Privacy protection laws were created in the pre-internet era and therefore need to be updated to adapt to the new reality. The World Wide Web was born in the 90s and the number of servers and user connections has grown exponentially ever since. In the first decade of the new century, the introduction of Web 2.0 has brought about a significant change. Now any individual can be a content provider. The determined entry of public authorities into the In- Author Gemma Déler-Castro is a Computer Engineer by the Universitat Politècnica de Catalunya, Spain, and holds a Master in Information and Knowledge Society. Since 1988 she has pursued her professional career in Applus+, heading its Information Technology Dept., where she has developed testing, certification, technical assistance and consulting services. She has worked in standardization since 1988 as a permanent member of the Spanish National Information Technology Committee. She has also chaired several committees and groups. She is a member of various technology platforms and runs the DNIe (Spanish Electronic Identity Card) group at esec (Spanish Technologic Platform for Security and Trust). Her most recent areas of activity include identity management and privacy. <gdeler@appluscorp.com> formation Society (development of the eeurope initiative) has shown that compliance with current legislation gives rise to problems that will need to be addressed in order to provide quality services to citizens. There is a need to create new concepts such as "trusted domains" or "shared areas" (the "aires de partage" proposed by French researcher Pierre Trudel) that facilitate information sharing while maintaining safeguards to protect people s privacy. Briefly: 2.1 The 90s In the 90s, computing and communications networks developed rapidly so it was necessary to set rules for data processing and transfer. Several countries started to prepare and draft such regulations. Spain was one of the first countries to have privacy regulations: the LORTAD, the Spanish statutory law of data protection (Ley Orgánica 5/ 92). The LORTAD regulated the automated processing of personal data and predated the Data Privacy Directive 95/ 46/EC, the European law created to harmonize national regulations. The Directive applies to data processed by automated means (e.g. a customer s database in a computer) and to 38 UPGRADE Vol. XI, No. 1, February 2010 Novática

3 Figure 1: Use of ICT in Spain since 2004 until (Source: Spain s National Institute of Statistics.) other media such as paper if the data is sorted (with some kind of index) for retrieval purposes. The Directive does not apply to data processed in the performance of purely personal or household activities. Later on the Spanish LOPD: (Ley Orgánica 15/1999) transposes the 1995 Directive and replaces the LORTAD. The situation in the late 90s was quite different. In this decade the global hypertext system initiated by the British physicist Timothy John Berners-Lee was publicly presented. This was the starting point of the Internet we know today. A new era of communication came and humankind became globally interconnected. HTML became standard in 1993; Yahoo and Netscape were in place in 1994; the first version of Explorer came out in 1995 and in 1998 W3C published the first version of XML. This decade clearly marks a transition: at the beginning of the 90s applications were in the hands of organizations. Only organizations had computers powerful enough to process data needed for the development of their activities and businesses. In this situation it was possible to identify where 1 Term defined in 2004 when Dale Dougherty from O Reilly Media used it in a lecture in which he spoke about the rebirth and evolution of the web (after the technological bubble burst in early 2000). 2 The area can be defined as the shared information space in which personal data required for the provision of a package of services is available to different entities. Such entities are only entitled to access data if it is necessary to perform the service for which the shared area was intended. Also, measures and safeguards are designed to ensure that personal data will be used for lawful purposes rather than to prevent its circulation. Rules are established to designate who is responsible for the dissemination of information over the network. the data was and who was responsible for it and for the measures intended to protect it. This environment explains the principles of the Directive. 2.2 Since 2000 This has been the time when the masses have had access to the Internet. The number of Internet users has grown rapidly. Governments have launched policies to reduce the digital divide. The network has appeared as a new relationship space. The network is too important to be excluded from; exclusion limits one s capacity for personal development. According to Eurostat, the European body for statistics, in Spain 40% of individuals between 16 and 74 accessed the Internet in In 2008 the figure increased to 59.8% (see Figure 1). The use of Information Technologies among 10 to 15 year olds is very high. Thus, computer usage among children is almost universal (94.5%), while 85.1% use the Internet. The so-called Web and its various expressions such as social networking were born in recent years. Anyone can be a content and information provider in Web 2.0, therefore the number of agents is growing. Now, it is not only businesses or governments who collect and process data. National Data Protection Agencies, whose functions include (but are not limited to) the review of practices, preparation of reports, and the application of sanctions to companies, have no authority in the case of content generated by individuals. Novática UPGRADE Vol. XI, No. 1, February

4 3 Privacy, not just a Social Networking Problem The e-government applications currently being deployed require information to be shared among various public and private organizations if they are to be effective. There are several approaches to address the loss of data privacy. Perhaps one of the most prominent is Pierre Trudel s "aires de partage" approach mentioned above, which could be translated as "trusted domains" or "shared areas" 2. The development of this idea allows Government to be presented as a network in which administrative boundaries are increasingly irrelevant. To ensure services to citizens, the information held by various government agencies must be made accessible, but the requirement to obtain the "free and explicit consent" for each movement of personal information makes this difficult to implement. The legal framework should be adapted for the characteristics of networks and the Internet in particular. It is necessary to rethink the legal framework to ensure the protection of privacy in the context of e-government. The fundamentals of personal data protection need to be re-interpreted so as to provide guarantees and measures to ensure the protection of privacy. Protection at data access level requires a much higher level of protection than that found in the current measures used to protect deposited data. The purpose principle (need to know) is essential in data access. Data should only be used for purposes which are consistent with the original purposes for which it was acquired. Transparency is a prerequisite for both credibility and trust in networks. Respect of the purpose principle means that the user is aware of the family of purposes for which information was collected and will be used. The concept allows the flow of information and defines its uses. 4 Privacy in Social Networks The term Web 2.0 is a recent one; it first appeared in It makes reference to a new way of working and interacting. There is even a new business model, "long tail", successfully used by Amazon and other companies. Social networks are services on the Web offering a virtual space to share personal or professional information to its users. They may include text, photos, videos and links. Users are interconnected through an associated network of contacts that meet the six degrees rule (everyone is at most six steps away from any other person in the world). 72.9% of Internet users in Spain are members of a social network million Internet users visit a social network at least once a month. Spain is the second country in Europe in the use of social networks. Personal information has been populating the network since the appearance of the first examples of Web 2.0. Bloggers were the first to offer their visitors some information about their private lives: where they were going, what they did, how they felt, or what personal or professional events they would attend. There is a gradual and voluntary loss of privacy of the individual who, in return, expects to be well positioned in the resulting social framework of interpersonal relationships. Examples are easy to find: personal blogs have given prestige and helped improve professionals curriculums and reputation, or have given the place and opportunity to singers and other artists to disseminate their work. Web 2.0 courses emphasize the benefits of networking using LinkedIn, Xing or others. Students continue social relationships after school hours using instant messaging and/or sites like Facebook. Social networks offer great opportunities to all but, at the same time, there is loss of privacy when sharing data of an intimate nature. Other uses of the data left in these networks for purposes different from the original are: Human resources departments or search and comparison by head hunters Publication of information and comments for the purpose of harming others ("cyber-bullying", or couples who break up and make data belonging to their ex available for a variety of purposes). To obtain people s profiles for later use (generally linked to e-crime activities). Tools facilitate publication, making it attractive even for people with limited computer skills. In addition, some search engines make the results from blogs and other 2.0 sites appear first in the list. If an individual wishing to remain private stops providing this information, other users can publish content that belongs to that private area without telling the individual (e.g. photo tagging). The Internet makes it easy to create new content through the combination and merging of previous information. The ownership of this new information changes. There is no barrier to the transfer of data such as this, which might be of a personal or sensitive nature in many cases. Current legislation does not protect in such cases as it is not applicable to data processed in the exercise of purely personal or household activities. The issue is now in its preliminary stage. Although actions are in place to study and contain the effects, we are still a long way from finding a solution. In his 2007 article Tudel recognizes that there is much still to be done to characterize the different types of online spaces under the control of the citizen. 5 A New Model, Three Agents There are several difficulties. The network knows no borders whereas regulations are territorial. However, the first steps have been taken and we can refer to two recent documents that express the concern of several governments and even of the managers of some social networks in this regard: "The Safer Social Networking Principles for the EU" The APD (Spanish Data Protection) - Inteco report on Data Privacy and Information Security in online social networks Although users of social networks do not seem to be 40 UPGRADE Vol. XI, No. 1, February 2010 Novática

5 Figure 2: A New Privacy Model: The Three Agents. concerned about what information they reveal and the consequent loss of intimacy and privacy, many national and international agencies have sounded the alarm. Data Protection Agencies are proactive in providing social network managers and citizens with recommendations regarding these services. These recommendations focus on preventing potential unlawful interference and to minimize the disclosure of intimate personal information by users. Social networks can be seen as repositories of content from individuals; anyone can process this data using tools that are provided for free. In social networking, data protection is also a matter for the individual, who must play an active role in data protection (see Figure 2). 5.1 Public Administrations Public Administrations are gradually becoming aware of the problem and taking the first steps towards addressing them. While laws are still local, social networks based in 3 Continuing with the driving simile, apart from the various measures in place to prevent road accidents (the good state of roads, the highway code, safety measures in cars ), all passengers (not just the driver) must wear their seat belt. Drivers must comply with additional rules such as avoiding alcohol or drug use which can impair driving. And regardless of the existence of traffic lights, pedestrian crossings, the highway code pedestrians must still look both ways before crossing. 4 On the date of publication of this article, the 31st International Data Protection and Privacy Authorities Conference will have been held in Madrid (from November 4 to 6). One of the main objectives is to analyse in depth the rapid development of Information Technology and the Internet. The Internet has become an indispensable tool in today s society, but we need to think about the proliferation of new services such as social networks - because of their impact on the field of data protection and privacy. European countries (such as Tuenti) are friendlier with their users privacy than those in the USA (Facebook). A similar effort to that made for the preparation of the Directive has recently been made to revise current legislation. Education efforts are gradually increasing and becoming more important: e.g. publications by ENISA (European Network and Information Security Agency) or by the newly created "Office for the security of Internet users" OSI, an Agency of the Spanish Government directly involved in maintaining users privacy and identity management (see < They include tips for users of social networks. Under the heading "You re the one who sets the limits of your privacy" some clear advice is given: Think before you post Manage your contact list Comply with privacy policies and terms of use to prevent abuse And under the heading "Protect yourself from identity theft", several tips are given to minimize the risk of such fraud. 5.2 Social Network Managers Those responsible for social networks have an important role: their cooperation is needed to implement mechanisms to fight against impunity when using their platforms to harm the privacy of individuals. It is important that they understand the different national concepts of privacy to implement appropriate measures. They should also take an active supportive role, especially in training and dissemination tasks. 5.3 Individuals I recently heard people wondering if individuals are Novática UPGRADE Vol. XI, No. 1, February

6 ready to live in a world without privacy. Citizens are players, active agents and therefore, have responsibilities 3. Once their responsibilities are set out in new legislation, individuals should know and respect them. However, in the meantime, individuals must be well trained and must develop an awareness of the limits: Users should be required to have sufficient knowledge to assess how much data they wish to reveal. They should be aware that an increasing share of their reputation is on the Internet, that they may not necessarily have generated that content, and they should bear in mind that "the Internet does not forget". Content about users may be circulating in Networks without their consent. Individuals must manage their own reputation and help manage the reputation of others. The Spanish Data Protection Law (LOPD) so far only penalizes companies, but the times we live in require new legislation so that individuals who do not comply with it can also be punished. Implementation of such legislation requires clear ideas, time and resources. Everybody needs to know / rediscover their rights and duties. Thus, it will be necessary to comply with a new code to take advantage of Web 2.0 without causing or suffering any harm. To draw a simple parallel, as drivers we must respect the highway code if we are going to share the roads. If the code is not respected, sanctions are imposed: from fines to imprisonment. To be effective, several mechanisms are needed: Traceability of subsequent events and actions so that privacy violations do not go unpunished. Channels to ensure that people who are referred to, who first provided the content, or who are tagged, are warned that their privacy is being violated. Actions of a regulatory nature have been initiated at an international level. The Article 29 Working Group of the European Commission has made public its intention to regulate data protection in social networks and in other Web 2.0 applications in general. During the 30th International Conference of Data Protection and Privacy a proposal for regulatory provisions in these networks was agreed. The first draft will be discussed at the conference scheduled to take place in Madrid in November Conclusions Current legislation, developed in the early 90s, is not sufficient to protect personal data and privacy in the current environment. The situation has changed since that legislation was approved. Data is no longer kept in files and databases owned by companies or government agencies which also generate, capture, record and process personal data. E-government applications bring new requirements. Data should be shared and available for government agencies and also for private companies to provide effective and efficient quality services. To require consent for each act of transmission would be unmanageable as services need to be provided without delay. What is still unknown is the kind of data that will be needed and who will ensure that the data owners give their consent. The solution proposed by Pierre Trudel is as follows: his trusted domains or shared areas seems to have inspired the implementation and deployment of the Shared Medical Record. Hence, you can recognize the information space (the set of data on the citizen/patient kept in various hospitals, welfare centres, laboratories...), find out who is entitled to access the information if it is necessary for the provision of a service (either the healthcare professionals involved, or the citizen/patient as the data owner), and establish measures to provide effective guarantees (identification, access...). It is worth mentioning that, in this case, there is an authority which is responsible for defining and implementing the "aire de partage" and keeping it operational while providing full safeguards. The case of social networks is different. There is no authority that can define, implement and maintain an "aire de partage". The purpose of this information space changes dynamically as do the access lists. They are maintained by the users themselves, and it is very easy to obtain data. The information space grows and it is difficult to foresee in which direction or purpose. The space continues to grow as users provide new content, new relationships, connections, access... This is why the previous "aires de partage" solution seems to run into difficulties in social networks. Pierre Trudel recognizes that much still needs to be done to characterize these spaces under the control of the citizen. However, new solutions that effectively protect privacy (and which, in turn, enable the development of social networks) are urgently needed. Although this is a complex issue, the first steps have already been taken: The European Commission has started work and has announced its intention to set regulations in this field. Other recent actions include a self-regulatory code for social network providers, presented in 2009 (February 10) or the Recommendation of the Commission (12 May 2009) on the implementation of privacy and data protection principles in applications supported by radio-frequency identification C(2009) But even more activities can be carried out. New players have appeared: individuals. They must be involved in the process so that privacy protection is effective. Spanish Law 1/1982 on civil protection of the right to honour, to personal and family privacy, and one s own image, states that the protection of an individual is defined by laws and social customs. Thus, the scope is that which the individual sets for him or herself, according to that individual s acts. Individuals must therefore consciously design the framework of privacy they want for themselves. Thus, if an Internet user uses Twitter to communicate what he or she is doing at every moment, if he or she constantly publishes photos on Flickr, and uploads his or her videos 42 UPGRADE Vol. XI, No. 1, February 2010 Novática

7 on YouTube, the "private domain" of this individual will be more limited, so it will be difficult to avoid some kind of interference from third parties. It is therefore important for social network users to be aware of the information published, and educated/skilled in "Web 2.0" services. This might prevent the disclosure of certain information they wish to maintain for a more intimate or family sphere. Every individual can publish their own information, which will have an impact on the delimitation of their intimate and other spheres. Individuals can also publish information about others not necessarily social network users (photos, videos, opinions...). Applying a principle of consent to manage these cases of data treatment does not seem very natural. Any new legislation should define the rights and duties of individuals in relation to social networks. According to Alamillo Domingo, I. (2008), "...we must give citizens back control over their data." Thus, in the new legislation, individuals should have the right to protect their personal data and be "cautious" when releasing them on the network. Yet, they should also be obliged to treat the personal data of others with care, using a set of standards and guidelines for action, regardless of whether or not they have the consent of the parties affected. Warning and reporting mechanisms should be simple, rapid and effective to enable online reputation management. Finally, effort in training/education is necessary. The divide in this case becomes extremely dangerous because it affects people s fundamental rights resulting in their being exposed and not knowing how to react. Bibliography P. Trudel. "Améliorer la protection de la vie privée dans l administration électronique : pistes afin d ajuster le droit aux réalités de l État en réseau". Report for the Canadian Ministry of Relationships with Cizitens and Immigration, < egvt/egouvmrci23-06.pdf>. P. Trudel. "État de droit et effectivité de la protection de la vie privée dans les réseaux du e-gouvernement". Paper for the Canadian National Conference on "Technologies, vie privée et justice" organised by the Institut Canadien d Administration de la Justice (ICAJ). Toronto, 28-30/09/2005. < activites/icajviepriv.fr.pdf>. P. Trudel. "Administración electrónica e interconexión de ficheros administrativos en el Estado en red" (egovernment and network interconnections of Public Administrations databases). Revista catalana de dret públic, núm. 35, 2007, < eapc_revistadret/revistes/revista/article /es/at_download/adjunt>. I. Alamillo Domingo. "Identidad en la Red" (Identity in the Net). Revista Investigación y Ciencia: 386, Nov Lluis Torrens. "L estratègia de sistemes d informació del Departament de Salut"." (The Strategy on Health Information Systems Strategy of the Public Health Dept.). Regional Government of Catalonia Public Health Dept. Revista de Sistemes d Informació en Salut, special issue on Shared Clinic Files, < / Social Network Providers et al. "The Safer Social Networking Principles for the EU" (2009). < ec.europa.eu/information_society/activities/social_ networking/docs/sn_principles.pdf>. Spanish Institute of Communications Technologies/ Spanish Data Protection Agency (Inteco/APD). "Study on the Privacy of Personal Data and on the Security of Information in Social Networks". Feb < fcgs9zbyoaq>. Regional Government of Catalonia Public Health Dept. "Shared Clinic Files in Catalonia" ( ). < Universal McCann. "Power to the people Social media tracker. Wave 3" (2008). < share.net/mickstravellin/universal-mccann-international-social-media-research-wave-3>. Commission Recommendation of 12 May 2009 on the implementation of privacy and data protection principles in applications supported by radio- frequency identification. C (2009) < LexUriServ.do?uri=OJ:L:2009:122:0047:0051:EN:PDF>. Spanish Constitution (1978) (namely art. 18). < / Congreso/Informacion/Normas/const_espa_texto_ ingles_0.pdf>. General Assembly of the United Nations (1948). "Universal Declaration of Human Rights". < Novática UPGRADE Vol. XI, No. 1, February

UPENET (UPGRADE European NETwork) CEPIS NEWS

UPENET (UPGRADE European NETwork) CEPIS NEWS CEPIS UPGRADE is the European Journal for the Informatics Professional, published bimonthly at Publisher CEPIS UPGRADE is published by CEPIS (Council of European Professional

More information

./.. Farewell Edition. 3 Editorial. CEPIS UPGRADE: A Proud Farewell Nello Scarabottolo, President of CEPIS

./.. Farewell Edition. 3 Editorial. CEPIS UPGRADE: A Proud Farewell Nello Scarabottolo, President of CEPIS CEPIS UPGRADE is the European Journal for the Informatics Professional, published bimonthly at Publisher CEPIS UPGRADE is published by CEPIS (Council of European Professional

More information

UPENET (UPGRADE European NETwork) CEPIS NEWS

UPENET (UPGRADE European NETwork) CEPIS NEWS UPGRADE is the European Journal for the Informatics Professional, published bimonthly at Publisher UPGRADE is published on behalf of CEPIS (Council of European Professional

More information

UPENET (UPGRADE European NETwork) CEPIS NEWS. 2 Editorial Social Networks Problems of Security and Data Privacy Statement

UPENET (UPGRADE European NETwork) CEPIS NEWS. 2 Editorial Social Networks Problems of Security and Data Privacy Statement UPGRADE is the European Journal for the Informatics Professional, published bimonthly at Publisher UPGRADE is published on behalf of CEPIS (Council of European Professional

More information

UPENET (UPGRADE European NETwork) CEPIS NEWS

UPENET (UPGRADE European NETwork) CEPIS NEWS CEPIS UPGRADE is the European Journal for the Informatics Professional, published bimonthly at Publisher CEPIS UPGRADE is published by CEPIS (Council of European Professional

More information

MOSAIC. UPENET (UPGRADE European NETwork)

MOSAIC. UPENET (UPGRADE European NETwork) UPGRADE is the European Journal for the Informatics Professional, published bimonthly at UPGRADE is the anchor point for UPENET (UPGRADE European NETwork), the network

More information

UPENET (UPGRADE European NETwork) CEPIS NEWS

UPENET (UPGRADE European NETwork) CEPIS NEWS CEPIS UPGRADE is the European Journal for the Informatics Professional, published bimonthly at Publisher CEPIS UPGRADE is published by CEPIS (Council of European Professional

More information

POLICY MANUAL. Policy No: 30.10 (Rev. 2) Supersedes: Social Media 30.10 (Nov. 16, 2012) Authority: Legislative Operational. Approval: Council CMT

POLICY MANUAL. Policy No: 30.10 (Rev. 2) Supersedes: Social Media 30.10 (Nov. 16, 2012) Authority: Legislative Operational. Approval: Council CMT POLICY MANUAL Title: Social Media Policy No: 30.10 (Rev. 2) Supersedes: Social Media 30.10 (Nov. 16, 2012) Authority: Legislative Operational Approval: Council CMT General Manager Effective Date: October

More information

Monograph: Experiences and Advances in Software. Quality (published jointly with Novática*) Guest Editors: Darren Dalcher and Luis Fernández-Sanz

Monograph: Experiences and Advances in Software. Quality (published jointly with Novática*) Guest Editors: Darren Dalcher and Luis Fernández-Sanz UPGRADE is the European Journal for the Informatics Professional, published bimonthly at Publisher UPGRADE is published on behalf of CEPIS (Council of European Professional

More information

SPANISH DATA AGENCY PROTECTION SPANISH DATA AGENCY PROTECTION

SPANISH DATA AGENCY PROTECTION SPANISH DATA AGENCY PROTECTION SPANISH THE SPANISH (AEPD in the Spanish acronym) is the public law authority overseeing compliance with the legal provisions on the protection of personal data, enjoying as such an absolute independence

More information

http://www.cepis.org CEPIS unites 37 professional informatics societies over 33 European countries, representing more than 400,000 ICT professionals.

http://www.cepis.org CEPIS unites 37 professional informatics societies over 33 European countries, representing more than 400,000 ICT professionals. http://www.cepis.org CEPIS, Council of European Professional Informatics Societies, is a non-profit organisation seeking to improve and promote high standards among informatics professionals in recognition

More information

Social Media Policy. Policies and Procedures. Social Media Policy

Social Media Policy. Policies and Procedures. Social Media Policy Policies and Procedures Social Media Policy 1 1. Introduction...3 2. Privacy settings and personal information.....3 3. Use of Social Media at Work.....4 4. Account Administrators and Login Details......4

More information

JAMAL EL-HINDI DEPUTY DIRECTOR FINANCIAL CRIMES ENFORCEMENT NETWORK

JAMAL EL-HINDI DEPUTY DIRECTOR FINANCIAL CRIMES ENFORCEMENT NETWORK JAMAL EL-HINDI DEPUTY DIRECTOR FINANCIAL CRIMES ENFORCEMENT NETWORK REMARKS AT THE PARLIAMENTARY INTELLIGENCE SECURITY FORUM JUNE 20, 2016 VIENNA, AUSTRIA Good morning. I would like to thank Congressman

More information

COPPA. How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online. The Children s Online Privacy Protection Act

COPPA. How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online. The Children s Online Privacy Protection Act The Children s Online Privacy Protection Act COPPA How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online A uknow White Paper by Tim Woda, co founder of uknow.com, Inc Overview

More information

E-Government Chair Research Project The use of social media for effective public engagement. Case Study - NZ Transport Agency: Drugged drivers

E-Government Chair Research Project The use of social media for effective public engagement. Case Study - NZ Transport Agency: Drugged drivers E-Government Chair Research Project The use of social media for effective public engagement Case Study - NZ Transport Agency: Drugged drivers Author: Summary New Zealand Transport Agency (NZTA) uses a

More information

Online Ads: A new challenge for privacy? Jörg Polakiewicz*

Online Ads: A new challenge for privacy? Jörg Polakiewicz* 31st International Conference of Data Protection and Privacy Commissioners, Madrid Thursday 5 November 2009, 15.00-16.30 Parallel Session A Smile! There s a camera behind the ad or Send it to a friend

More information

UPENET (UPGRADE European NETwork) CEPIS NEWS

UPENET (UPGRADE European NETwork) CEPIS NEWS CEPIS UPGRADE is the European Journal for the Informatics Professional, published bimonthly at Publisher CEPIS UPGRADE is published by CEPIS (Council of European Professional

More information

U & D COAL LIMITED A.C.N. 165 894 806 BOARD CHARTER

U & D COAL LIMITED A.C.N. 165 894 806 BOARD CHARTER U & D COAL LIMITED A.C.N. 165 894 806 BOARD CHARTER As at 31 March 2014 BOARD CHARTER Contents 1. Role of the Board... 4 2. Responsibilities of the Board... 4 2.1 Board responsibilities... 4 2.2 Executive

More information

Accesibility of Social Networking Services. Observatory on ICT Accessibility discapnet

Accesibility of Social Networking Services. Observatory on ICT Accessibility discapnet Observatory on ICT Accessibility discapnet Accessibility of Social Networking Services Abridged version December 2010 1 Introduction The emergence and spread of social networking services on Internet 1

More information

UPGRADE Advertising Information Pack

UPGRADE Advertising Information Pack UPGRADE Advertising Information Pack About UPGRADE... 2 Readership... 2 Schedule for 2009 and 2010... 3 Advertising Rates... 4 Technical specifications... 5 Contact details... 5 CEPIS 2009 Page 1 of 5

More information

BLACKPOOL COUNCIL Topic Social Media Policy

BLACKPOOL COUNCIL Topic Social Media Policy 1. Introduction 1.1 The widespread use of social media, particularly social networking sites, necessitates Blackpool has a policy in place to ensure that appropriate control mechanisms exist to minimise

More information

Social Media Guidelines

Social Media Guidelines MARKETING AND MEDIA RELATIONS Social Media Guidelines Emporia State University Last Updated: July 09, 2011 Introduction What is Social Media? Social media consists of web-based tools used to interact with

More information

Case Study 2 Learning though blogging: a case study with business Spanish students at Reykjavik University

Case Study 2 Learning though blogging: a case study with business Spanish students at Reykjavik University Case Study 2 Learning though blogging: a case study with business Spanish students at Reykjavik University Pilar Concheiro 1. Introduction In a knowledge society where competence domains are widened and

More information

Collection and Use of Information

Collection and Use of Information AVO Privacy Policy AVOapp, Inc. treat with responsibility for the safety of your personal data. Please read the following to be informed about our Privacy Policy ("Policy"). This Policy details how we

More information

EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics

EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics Frances CLEARY 1, Keith HOWKER 2, Fabio MASSACCI 3, Nick WAINWRIGHT 4, Nick PAPANIKOLAOU

More information

webinars creating blog posts customer quotes CONTENT MARKETING for MINISTRIES video tutorials lead strategy inform sharing A publication of

webinars creating blog posts customer quotes CONTENT MARKETING for MINISTRIES video tutorials lead strategy inform sharing A publication of creating webinars customer quotes blog posts CONTENT MARKETING for MINISTRIES 1 1 video tutorials lead strategy sharing inform A publication of Content Marketing 101 Whether you ve attended a webinar,

More information

Building Common Practice of Social Media Campaign for Public Awareness of Deposit Insurance Systems

Building Common Practice of Social Media Campaign for Public Awareness of Deposit Insurance Systems Building Common Practice of Social Media Campaign for Public Awareness of Deposit Insurance Systems Prof. Dr. Louis Chen Graduate Institute of IP National Taipei University of Technology 9 April 2013 Louis

More information

How Social Media will Change the Future of Banking Services

How Social Media will Change the Future of Banking Services DOI: 10.7763/IPEDR. 2013. V65. 1 How Social Media will Change the Future of Banking Services Iwa Kuchciak 1 1 University of Lodz Abstract. Parallel with the growth of importance of social media there is

More information

THE FORTY RECOMMENDATIONS OF THE FINANCIAL ACTION TASK FORCE ON MONEY LAUNDERING

THE FORTY RECOMMENDATIONS OF THE FINANCIAL ACTION TASK FORCE ON MONEY LAUNDERING THE FORTY RECOMMENDATIONS OF THE FINANCIAL ACTION TASK FORCE ON MONEY LAUNDERING 1990 A. GENERAL FRAMEWORK OF THE RECOMMENDATIONS 1. Each country should, without further delay, take steps to fully implement

More information

EUROPEAN ECONOMIC AREA JOINT PARLIAMENTARY COMMITTEE. REPORT on E-Commerce and EEA legislation

EUROPEAN ECONOMIC AREA JOINT PARLIAMENTARY COMMITTEE. REPORT on E-Commerce and EEA legislation EUROPEAN ECONOMIC AREA 30 November 2000 Brussels JOINT PARLIAMENTARY COMMITTEE REPORT on E-Commerce and EEA legislation Co-rapporteurs: Ms. Marjo Matikainen-Kallstöm (EPP-ED, Finland) Mr. Vilhjálmur Egilsson

More information

PRIVACY POLICY. comply with the Australian Privacy Principles ("APPs"); ensure that we manage your personal information openly and transparently;

PRIVACY POLICY. comply with the Australian Privacy Principles (APPs); ensure that we manage your personal information openly and transparently; PRIVACY POLICY Our Privacy Commitment Glo Light Pty Ltd A.C.N. 099 730 177 trading as "Lighting Partners Australia of 16 Palmer Parade, Cremorne, Victoria 3121, ( LPA ) is committed to managing your personal

More information

RECOMMENDATIONS HOW TO ATTRACT CLIENTS TO ROBOFOREX

RECOMMENDATIONS HOW TO ATTRACT CLIENTS TO ROBOFOREX 1 Recommendations how to attract clients to RoboForex s partners www.roboforex.com RECOMMENDATIONS HOW TO ATTRACT CLIENTS TO ROBOFOREX Your success as a partner directly depends on the number of attracted

More information

RULES AND REGULATIONS. of the UNION SPORTIVE INTERNATIONALE DES POLICES ( USIP )

RULES AND REGULATIONS. of the UNION SPORTIVE INTERNATIONALE DES POLICES ( USIP ) UNION SPORTIVE INTERNATIONALE DES POLICES المكتب الرئاسي لإلتحاد الدولي الرياضي للشرطة INTERNATIONAL POLICE SPORT UNION RECONNUE PARLE COMITE INTERNATIONAL OLYMPIQUE LE 15 JUNE 1995 RULES AND REGULATIONS

More information

Maria College Communications Policy

Maria College Communications Policy Maria College Communications Policy The Office of Maria College s Marketing and Communications (Maria Marcom) is responsible for telling the college s story and upholding its image and reputation, as expressed

More information

THIRD REGIONAL TRAINING WORKSHOP ON TAXATION. Brasilia, Brazil, December 3 5, 2002. Topic 4

THIRD REGIONAL TRAINING WORKSHOP ON TAXATION. Brasilia, Brazil, December 3 5, 2002. Topic 4 THIRD REGIONAL TRAINING WORKSHOP ON TAXATION Brasilia, Brazil, December 3 5, 2002 Topic 4 INFORMATION TECHNOLOGY IN SUPPORT OF THE TAX ADMINISTRATION FUNCTIONS AND TAXPAYER ASSISTANCE Nelson Gutierrez

More information

UTMB s Guide for Social Media Do s and Don ts

UTMB s Guide for Social Media Do s and Don ts UTMB s Guide for Social Media Do s and Don ts Introduction UTMB understands the role of social media as a way to facilitate communication amongst our university community and the world. Social media use

More information

Social Media Strategy

Social Media Strategy Social Media Strategy Tonbridge School Social Media Strategy We believe social media is important to the school and its communications. Tonbridge School should share messages about academic excellence,

More information

CIVIL SERVICE NATIONALITY RULES GUIDANCE ON CHECKING ELIGIBILITY

CIVIL SERVICE NATIONALITY RULES GUIDANCE ON CHECKING ELIGIBILITY CIVIL SERVICE NATIONALITY RULES GUIDANCE ON CHECKING ELIGIBILITY Employment Practice Division Civil Service Capability Group Cabinet Office November 2007 1 CIVIL SERVICE NATIONALITY RULES GUIDANCE ON CHECKING

More information

Navigating the Web: Are You Missing The Boat?

Navigating the Web: Are You Missing The Boat? Navigating the Web: Are You Missing The Boat? Laura Patterson, M.A. Senior Instructor, Professional and Technical Communication School of Engineering The University of British Columbia This Morning s Itinerary

More information

Social Networking Policy

Social Networking Policy Feltonfleet School Social Networking Policy Introduction Objectives This policy sets out Feltonfleet School s policy on social networking. New technologies are an integral part of our lives and are powerful

More information

Digital Marketing VS Internet Marketing: A Detailed Study

Digital Marketing VS Internet Marketing: A Detailed Study Digital Marketing VS Internet Marketing: A Detailed Study 1 ATSHAYA S, 2 SRISTY RUNGTA 1,2 Student- Management Studies Christ University, Bengaluru, Karnataka, India Abstract: The article talk about digital

More information

SPAIN. Written by Pedro Alemán Laín and Javier Martinez Bavière, Pedro Alemán Abogados. Trends and Hot Topics in the Spanish Media Law Market

SPAIN. Written by Pedro Alemán Laín and Javier Martinez Bavière, Pedro Alemán Abogados. Trends and Hot Topics in the Spanish Media Law Market SPAIN Written by Pedro Alemán Laín and Javier Martinez Bavière, Pedro Alemán Abogados Besides the difficult times that the music, film and television industry have been undergoing, we have seen clear signs

More information

Data protection issues

Data protection issues The current issue and full text archive of this journal is available at www.emeraldinsight.com/1750-6166.htm pertaining to social networking under EU law Eleni Kosta Interdisciplinary Centre for Law and

More information

BRING YOUR OWN DEVICE

BRING YOUR OWN DEVICE BRING YOUR OWN DEVICE Legal Analysis & Practical TIPs for an effective BYOD corporate Policy CONTENTS 1. What is BYOD? 2. Benefits and risks of BYOD in Europe 3. BYOD and existing Policies 4. Legal issues

More information

Referral fees, referral arrangements and fee sharing

Referral fees, referral arrangements and fee sharing Referral fees, referral arrangements and fee sharing This response to the consultation is prepared by Carter Law LLP. Our experience spans the RTA/PI sector and as such, any criminal advocacy questions

More information

Non-Official/Personal Use of Social Media and Social Networking. Availability of Information and Access to Persons Without Internet Access

Non-Official/Personal Use of Social Media and Social Networking. Availability of Information and Access to Persons Without Internet Access Department of the Interior Social Media Policy ~ 1 ~ Table of Contents Section 1: Social Media and Social Networking Policy Overview of Policy Official Use of Social Media and Social Networking at DOI

More information

Regulations on Administration of Internet-Based Audio-Video. Program Services

Regulations on Administration of Internet-Based Audio-Video. Program Services Regulations on Administration of Internet-Based Audio-Video Program Services 2007-12-20 Source:State Administration of Radio, Film and Television These Regulations on Administration of Internet-based Audio-Video

More information

Declaration of Internet Rights Preamble

Declaration of Internet Rights Preamble Declaration of Internet Rights Preamble The Internet has played a decisive role in redefining public and private space, structuring relationships between people and between people and institutions. It

More information

Summary Report Report # 1. Security Challenges of Cross-Border Use of Cloud Services under Special Consideration of ENISA s Contributions

Summary Report Report # 1. Security Challenges of Cross-Border Use of Cloud Services under Special Consideration of ENISA s Contributions Summary Report Report # 1 Security Challenges of Cross-Border Use of Cloud Services under Special Consideration of ENISA s Contributions COINS Summer School 2015 on Could Security Prepared by: Nabeel Ali

More information

INTERNATIONAL COOPERATION IN CRIMINAL MATTERS (Practical approach to certain issues which are not regulated by law and international treaties)

INTERNATIONAL COOPERATION IN CRIMINAL MATTERS (Practical approach to certain issues which are not regulated by law and international treaties) BOSNIA AND HERZEGOVINA REPUBLIKA SRPSKA Judicial and prosecutorial training center team INTERNATIONAL COOPERATION IN CRIMINAL MATTERS (Practical approach to certain issues which are not regulated by law

More information

We are the regulator: Our job is to check whether hospitals, care homes and care services are meeting essential standards.

We are the regulator: Our job is to check whether hospitals, care homes and care services are meeting essential standards. Inspection Report We are the regulator: Our job is to check whether hospitals, care homes and care services are meeting essential standards. Inglewood Nursing Home Deal Road, Redcar, TS10 2RG Date of Inspection:

More information

Internationalization, digitalization and crisis management the new challenges of corporate communication

Internationalization, digitalization and crisis management the new challenges of corporate communication Insights&Trends I44/2013 Communication Internationalization, crisis management the new challenges As the old saying goes, if you don t communicate, you don t exist. Today, in order to bring this idea up-to-date,

More information

GOVERNMENT OF THE REPUBLIC OF LITHUANIA

GOVERNMENT OF THE REPUBLIC OF LITHUANIA GOVERNMENT OF THE REPUBLIC OF LITHUANIA RESOLUTION NO 796 of 29 June 2011 ON THE APPROVAL OF THE PROGRAMME FOR THE DEVELOPMENT OF ELECTRONIC INFORMATION SECURITY (CYBER-SECURITY) FOR 20112019 Vilnius For

More information

International Working Group on Data Protection in Telecommunications

International Working Group on Data Protection in Telecommunications International Working Group on Data Protection in Telecommunications 675.42.10 4 April 2011 Working Paper Event Data Recorders (EDR) on Vehicles Privacy and data protection issues for governments and manufacturers

More information

ICG PRIVACY POLICY. Developed in compliance with applicable privacy legislation in each relevant ICG operational jurisdiction

ICG PRIVACY POLICY. Developed in compliance with applicable privacy legislation in each relevant ICG operational jurisdiction ICG PRIVACY POLICY Developed in compliance with applicable privacy legislation in each relevant ICG operational jurisdiction Version 1.3, updated 5th May 2014 "Protecting the personal privacy interests

More information

DIRECT MARKETING OF AGRO FOOD PRODUCTS ON VIRTUAL MARKET

DIRECT MARKETING OF AGRO FOOD PRODUCTS ON VIRTUAL MARKET Universitatea de Ştiinţe Agricole şi Medicină Veterinară Iaşi DIRECT MARKETING OF AGRO FOOD PRODUCTS ON VIRTUAL MARKET Al. L. SIPICĂ 1 1 University of Agricultural Sciences and Veterinary Medicine, Bucharest

More information

UPENET (UPGRADE European NETwork) CEPIS NEWS

UPENET (UPGRADE European NETwork) CEPIS NEWS UPGRADE is the European Journal for the Informatics Professional, published bimonthly at Publisher UPGRADE is published on behalf of CEPIS (Council of European Professional

More information

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE GENERAL STATEMENT TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE 1.1 The Council recognises the increasing importance of the Internet and email, offering opportunities for improving

More information

Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect.

Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect. PRIVACY POLICY 1. Introduction Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect. We will only collect information that

More information

Individual Electoral Registration Frequently asked questions

Individual Electoral Registration Frequently asked questions Individual Electoral Registration Frequently asked questions 1 Contents Contents... 2 About the change to individual electoral registration... 6 Has the registration system changed?... 6 Who is responsible

More information

European Federation of Pharmaceutical Industries and Associations (EFPIA) HCP/HCO Disclosure Transparency Requirements Methodology Note for Shire

European Federation of Pharmaceutical Industries and Associations (EFPIA) HCP/HCO Disclosure Transparency Requirements Methodology Note for Shire European Federation of Pharmaceutical Industries and Associations (EFPIA) HCP/HCO Disclosure Transparency Requirements Methodology Note for Shire Contents 1. Overview of the EFPIA Requirements... 3 2.

More information

Canadian Law 12 Negligence and Other Torts

Canadian Law 12 Negligence and Other Torts Canadian Law 12 Negligence and Other Torts What is Negligence? Someone who commits a careless act that creates harm to another person is negligent. Over the past several years, negligence has become the

More information

INTEGRATION OF PRISON HEALTH CARE: A CHALLENGE THAT WE MUST ALL TAKE ON

INTEGRATION OF PRISON HEALTH CARE: A CHALLENGE THAT WE MUST ALL TAKE ON Rev Esp Sanid Penit 2011; 13: 67-68 49 Junta Directiva de la Sociedad Española de Sanidad Penitenciaria Integration of prison health care: a challenge that we must all take on LETTERS TO THE EDITOR INTEGRATION

More information

WHAT EUROPEANS THINK ABOUT CONNECTED CARS

WHAT EUROPEANS THINK ABOUT CONNECTED CARS FEDERATION INTERNATIONALE DE L AUTOMOBILE REGION I - EUROPE, THE MIDDLE EAST AND AFRICA WHAT EUROPEANS THINK ABOUT CONNECTED CARS ww w.mycarmydata.eu #mycarmydata Table of Contents 01 EXECUTIVE SUMMARY

More information

Charter of Consumer Rights in the Digital World

Charter of Consumer Rights in the Digital World DOC No: INFOSOC 37 08 DATE ISSUED: MARCH 2008 Charter of Consumer Rights in the Digital World Digital technologies contribute to an improvement in the quality of people s lives in many ways. They create

More information

Social and Digital Media Policy

Social and Digital Media Policy Social and Digital Media Policy October 2012 Version 1.0 Statement of legislative compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010; Data

More information

Five Years of CAF 2006: From Adolescence to Maturity What Next?

Five Years of CAF 2006: From Adolescence to Maturity What Next? Five Years of CAF 2006: From Adolescence to Maturity What Next? A study on the use, the support and the future of the Common Assessment Framework Executive Summary Patrick Staes, Nick Thijs, Ann Stoffels

More information

ESRC Research Data Policy

ESRC Research Data Policy ESRC Research Data Policy Introduction... 2 Definitions... 2 ESRC Research Data Policy Principles... 3 Principle 1... 3 Principle 2... 3 Principle 3... 3 Principle 4... 3 Principle 5... 3 Principle 6...

More information

Lobbying: Sweet Smell of Success?

Lobbying: Sweet Smell of Success? Lobbying: Sweet Smell of Success? A case study on the transparency of lobbying around sugar regulation in the European Union and Spain 1. Introduction It is essential that government decision making be

More information

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES GERMANY September 2007 Kapitel 1 www.coe.int/gmt A. National policy 1. Is there a national policy

More information

WSI White Paper. Prepared by: Eric Cook Digital Marketing Consultant, WSI

WSI White Paper. Prepared by: Eric Cook Digital Marketing Consultant, WSI Blogging to Build a Reputation Online WSI White Paper Prepared by: Eric Cook Digital Marketing Consultant, WSI Introduction Dear Diary, you wouldn t believe what happened to me today... To some of you,

More information

Privacy Policy Version 1.0, 1 st of May 2016

Privacy Policy Version 1.0, 1 st of May 2016 Privacy Policy Version 1.0, 1 st of May 2016 THIS PRIVACY POLICY APPLIES TO PERSONAL INFORMATION COLLECTED BY GOCIETY SOLUTIONS FROM USERS OF THE GOCIETY SOLUTIONS APPLICATIONS (GoLivePhone and GoLiveAssist)

More information

FINANCIAL INCLUSION: ENSURING ACCESS TO A BASIC BANK ACCOUNT

FINANCIAL INCLUSION: ENSURING ACCESS TO A BASIC BANK ACCOUNT FINANCIAL INCLUSION: ENSURING ACCESS TO A BASIC BANK ACCOUNT CONSULTATION DOCUMENT - COMMON RESPONSE Question 1: Do you share the Commission's overall objective to ensure that, by a certain date, every

More information

GARANTE PER LA PROTEZIONE DEI DATI PERSONALI WHEREAS

GARANTE PER LA PROTEZIONE DEI DATI PERSONALI WHEREAS [doc. web n. 1589969] Spamming: How to Lawfully Email Advertising Messages GARANTE PER LA PROTEZIONE DEI DATI PERSONALI Prof. Stefano Rodotà, President, Prof. Giuseppe Santaniello, Vice-President, Prof.

More information

Data protection issues on an EU outsourcing

Data protection issues on an EU outsourcing Data protection issues on an EU outsourcing Saam Golshani, Alastair Gorrie and Diego Rigatti, Orrick Herrington & Sutcliffe www.practicallaw.com/8-380-8496 Outsourcing can mean subcontracting a process

More information

Social Influence Marketing The Opportunity for the Road Industry

Social Influence Marketing The Opportunity for the Road Industry Social Influence Marketing The Opportunity for the Road Industry Siobhan McKelvey Marketing Manager Nynas Bitumen IRF Lisbon Congress 26 th May 2010 Social Influence Marketing (SIM) What is SIM?

More information

ALMS TERMS OF USE / TERMS OF SERVICE Last Updated: 19 July 2013

ALMS TERMS OF USE / TERMS OF SERVICE Last Updated: 19 July 2013 ALMS TERMS OF USE / TERMS OF SERVICE Last Updated: 19 July 2013 Welcome to the Army Learning Management Service (ALMS), which is provided by the United States Army. These Terms of Use / Terms of Service

More information

Build Your Online Social Network & Your Business. 87% of homebuyers used the Internet to research their options

Build Your Online Social Network & Your Business. 87% of homebuyers used the Internet to research their options Are You Building Your Social Network Online? Your Clients and Competitors Are! Consider This: 87% of homebuyers used the Internet to research their options 90% of Internet homebuyers found their REALTOR

More information

HIPAA and Network Security Curriculum

HIPAA and Network Security Curriculum HIPAA and Network Security Curriculum This curriculum consists of an overview/syllabus and 11 lesson plans Week 1 Developed by NORTH SEATTLE COMMUNITY COLLEGE for the IT for Healthcare Short Certificate

More information

extreme Programming Guest Editor: Luis Fernández Sanz Joint issue with NOVÁTICA and INFORMATIK/INFORMATIQUE

extreme Programming Guest Editor: Luis Fernández Sanz Joint issue with NOVÁTICA and INFORMATIK/INFORMATIQUE The European Online Magazine for the IT Professional http://www.upgrade-cepis.org Vol. III, No. 2, April 2002 UPGRADE is the European Online Magazine for the Information Technology Professional, published

More information

PIPEDA and Online Backup White Paper

PIPEDA and Online Backup White Paper PIPEDA and Online Backup White Paper The cloud computing era has seen a phenomenal growth of the data backup service industry. Backup service providers, by nature of their business, are compelled to collect

More information

CLOUD COMPUTING - OPPORTUNITIES

CLOUD COMPUTING - OPPORTUNITIES CLOUD COMPUTING - OPPORTUNITIES White Paper Batoi Systems Pvt Ltd www.batoi.com BATOI SYSTEMS PVT LTD, 2016. Published by BATOI SYSTEMS (P) LIMITED of 421, Saheed Nagar, Bhubaneswar 751 007 (INDIA), registered

More information

THE ANTI-SPAM REGULATORY POLICY FRAMEWORK FOR THE KINGDOM OF SAUDI ARABIA

THE ANTI-SPAM REGULATORY POLICY FRAMEWORK FOR THE KINGDOM OF SAUDI ARABIA Communications and Information Technology Commission THE ANTI-SPAM REGULATORY POLICY FRAMEWORK FOR THE KINGDOM OF SAUDI ARABIA Final Version 23/02/2008 Submitted to: Submitted By: Acceptance of Deliverable

More information

Social Informatics Today and Tomorrow: Status, Problems and Prospects of Development of Complex Lines in the Field of Science and Education

Social Informatics Today and Tomorrow: Status, Problems and Prospects of Development of Complex Lines in the Field of Science and Education triplec 9(2): 460-465, 2011 ISSN 1726-670X http://www.triple-c.at Social Informatics Today and Tomorrow: Status, Problems and Prospects of Development of Complex Lines in the Field of Science and Education

More information

REPUBLIC OF PORTUGAL. MINISTRY OF PUBLIC WORKS, TRANSPORT AND COMMUNICATIONS The Minister's Office

REPUBLIC OF PORTUGAL. MINISTRY OF PUBLIC WORKS, TRANSPORT AND COMMUNICATIONS The Minister's Office ADDRESS GIVEN BY THE MINISTER FOR PUBLIC WORKS,TRANSPORT AND COMMUNICATIONS Mr Mário Lino at the Conference on The EU Internal Market for Postal Services Creating it Together Brussels, 24 June 2008, 11.20

More information

STAFF & GOVERNOR USE OF SOCIAL MEDIA AND INTERNET SITES POLICY

STAFF & GOVERNOR USE OF SOCIAL MEDIA AND INTERNET SITES POLICY Page 1 of 7 Alveston CofE Primary School has adopted this policy from the Local Authority. INTRODUCTION Social media includes online social forums such as Facebook, Twitter and LinkedIn, and websites such

More information

Professional Diploma. in Digital Marketing. www.ucenfotec.ac.cr. www.digitalmarketinginstitute.com

Professional Diploma. in Digital Marketing. www.ucenfotec.ac.cr. www.digitalmarketinginstitute.com 2014 Professional Diploma in Digital Marketing www.ucenfotec.ac.cr www.digitalmarketinginstitute.com Contents 2014 Professional Diploma in Digital Marketing 1. Welcome 2. Overview 3. Course Format 4. Course

More information

RECOMMENDATIONS by THE COMPANY LAW SLIM WORKING GROUP on THE SIMPLIFICATION OF THE FIRST AND SECOND COMPANY LAW DIRECTIVES

RECOMMENDATIONS by THE COMPANY LAW SLIM WORKING GROUP on THE SIMPLIFICATION OF THE FIRST AND SECOND COMPANY LAW DIRECTIVES RECOMMENDATIONS by THE COMPANY LAW SLIM WORKING GROUP on THE SIMPLIFICATION OF THE FIRST AND SECOND COMPANY LAW DIRECTIVES Conclusions submitted by the Company Law Slim Working Group I. FIRST COUNCIL DIRECTIVE

More information

Unleashing the Potential of Cloud Computing in Europe - What is it and what does it mean for me?

Unleashing the Potential of Cloud Computing in Europe - What is it and what does it mean for me? EUROPEAN COMMISSION MEMO Brussels, 27 September 2012 Unleashing the Potential of Cloud Computing in Europe - What is it and what does it mean for me? See also IP/12/1025 What is Cloud Computing? Cloud

More information

Cyber Security Recommendations October 29, 2002

Cyber Security Recommendations October 29, 2002 Cyber Security Recommendations October 29, 2002 Leading Co-Chair (Asia/Oceania) Co-Chair (Americas) Co-Chair (Europe/Africa) Dr. Hiroki Arakawa Executive Vice President NTT Data Corporation Richard Brown

More information

SOCIAL MEDIA & bet-at-home.com

SOCIAL MEDIA & bet-at-home.com SOCIAL MEDIA & bet-at-home.com 1 WHY IS THERE A GUIDELINE? The time when the internet was only used for sending e-mails and surfing the web has come and gone. Facebook, Twitter, YouTube and so on, have

More information

PRINCIPLES OF THE TRANSFER OF PERSONAL DATA TO A THIRD COUNTRY. Introduction

PRINCIPLES OF THE TRANSFER OF PERSONAL DATA TO A THIRD COUNTRY. Introduction PRINCIPLES OF THE TRANSFER OF PERSONAL DATA TO A THIRD COUNTRY Introduction The continuous globalization of the world economy influences the international transfer of personal data. The transfer of personal

More information

The British Academy of Management. Website and Social Media Policy

The British Academy of Management. Website and Social Media Policy The British Academy of Management s Website and Social Media Policy The creation of management knowledge through research and its dissemination through teaching and application The British Academy of Management

More information

Communications Strategy

Communications Strategy Communications Strategy 2014-2017 Classification: Internal/Stakeholder 1. Introduction Good communication is central to the perception of City Property (Glasgow) LLP and our credibility. It is at the core

More information

International Privacy and Data Security Requirements. Benedict Stanberry, LLB LLM MRIN Director, Centre for Law Ethics and Risk in Telemedicine

International Privacy and Data Security Requirements. Benedict Stanberry, LLB LLM MRIN Director, Centre for Law Ethics and Risk in Telemedicine International Privacy and Data Security Requirements Benedict Stanberry, LLB LLM MRIN Director, Centre for Law Ethics and Risk in Telemedicine Aims of this Presentation. To provide a brief overview of

More information

Politique de sécurité de l information Information Security Policy

Politique de sécurité de l information Information Security Policy Politique de sécurité de l information Information Security Policy Adoptée par le Conseil d administration Le 10 novembre 2011 Adopted by the Board of Directors on November 10, 2011 Table of contents FOREWORD

More information

The Indian Outbound Travel Market. with Special Insight into the Image of Europe as a Destination

The Indian Outbound Travel Market. with Special Insight into the Image of Europe as a Destination The Indian Outbound Travel Market with Special Insight into the Image of Europe as a Destination Copyright 2009 World Tourism Organization and European Travel Commission Cover photo: Copyright Melissa

More information

Anonymous CPS 182s 9/20/2003. ISP-3: The Rise of the Internet Service Providers

Anonymous CPS 182s 9/20/2003. ISP-3: The Rise of the Internet Service Providers Anonymous CPS 182s 9/20/2003 ISP-3: The Rise of the Internet Service Providers ISP-3: The Rise of the Internet Service Providers Special effects in movies have captivated audiences by growing exponentially

More information

Unsolicited Electronic Messages Act 2007

Unsolicited Electronic Messages Act 2007 Unsolicited Electronic Messages Act 2007 Prohibiting Spam and promoting good business practice This guide provides practical information so businesses can ensure they meet the requirements of the Unsolicited

More information

EXPLANATORY MEMORANDUM TO THE DATA RETENTION (EC DIRECTIVE) REGULATIONS 2007. 2007 No. 2199

EXPLANATORY MEMORANDUM TO THE DATA RETENTION (EC DIRECTIVE) REGULATIONS 2007. 2007 No. 2199 EXPLANATORY MEMORANDUM TO THE DATA RETENTION (EC DIRECTIVE) REGULATIONS 2007 2007 No. 2199 1. This explanatory memorandum has been prepared by the Home Office and is laid before Parliament by Command of

More information