How To Build Privacy Into Information Technology
|
|
|
- Arthur Felix Lynch
- 5 years ago
- Views:
Transcription
1 Transformative Technologies Deliver Both Security and Privacy: Think Positive-Sum, Not Zero-Sum March 2009
2 Transformative Technologies Deliver Both Security and Privacy Transformative Technologies Deliver Both Security and Privacy: Think Positive-Sum, Not Zero-Sum Privacy, in the form of informational privacy, refers to an individual s ability to exercise personal control over the collection, use and disclosure of one s recorded information. Thus far, a zero-sum approach has prevailed over the relationship between surveillance technologies and privacy. A zero-sum paradigm describes a concept or situation in which one party s gains are balanced by another party s losses win/lose. In a zero-sum paradigm, enhancing surveillance and security would necessarily come at the expense of privacy; conversely, adding user privacy controls would be viewed as detracting from system performance. I am deeply opposed to this viewpoint that privacy must be viewed as an obstacle to achieving other technical objectives. Similarly, it is unacceptable for the privacy community to reject all forms of technology possessing any surveillance capacity and overlook their growing applications. Rather than adopting a zero-sum approach, I believe that a positive-sum paradigm is both desirable and achievable, whereby adding privacy measures to surveillance systems need not weaken security or functionality but rather, could in fact enhance the overall design. A positive-sum (win-win) paradigm describes a situation in which participants may all gain or lose together, depending on the choices made. To achieve a positive-sum model, privacy must be proactively built into the system (I have called this privacy by design ), so that privacy protections are engineered directly into the technology, right from the outset. The effect is to minimize the unnecessary collection and uses of personal data by the system, strengthen data security, and empower individuals to exercise greater control over their own information. The result would be a technology that achieves strong security and privacy, with a win-win outcome. By adopting a positive-sum paradigm and applying a privacy-enhancing technology to a surveillance technology, you develop, what I am now calling, transformative technologies. Among other things, transformative technologies can literally transform technologies normally associated with surveillance into ones that are no longer privacy-invasive, serving to minimize the unnecessary collection, use and disclosure of personal data, and to promote public confidence and trust in data governance structures. Positive-Sum Paradigm + Privacy-Enhancing Technology (Applied to Surveillance Technology) = Transformative Technology 51
3 Privacy by Design Surveillance Technologies Whether real-time or offline, we are all increasingly under surveillance as we go about our daily lives. Surveillance control technologies generally include (typical objectives): Public and private video surveillance (public safety) Employee monitoring and surveillance (corporate data security) Network monitoring, profiling and database analytics (network forensics, marketing) Device location tracking (safety, resource allocation, marketing) Whole of customer transaction aggregation (customer service) Creation and uses of enriched profiles to identify, verify and evaluate (security) Creation and uses of interoperable biometric databases (access control/ security) Like hidden one-way mirrors, surveillance reflects and reinforces power asymmetries that are prone to misuse. By monitoring and tracking individuals, surveillors can learn many new things about them and use that knowledge to their own advantage, potentially making discriminatory decisions affecting the individual. The objectives of monitoring and surveillance, however, may be quite justifiable and beneficial. The basic proposition of many surveillance systems is that usersubjects must necessarily give up some of their privacy in order to benefit from improved system security and functionalities. In this way, privacy is often trumped by more pressing social, legal, and economic imperatives; adding privacy to the system means subtracting something else. This is the classic zero-sum thinking. Zero-Sum Security? I am deeply opposed to the common view that privacy is necessarily opposed to, or an obstacle to, achieving other desirable business, technical or social objectives. For example: Privacy versus security (which security? informational, personal or public/ national?) Privacy versus information system functionality Privacy versus operational or programmatic efficiency Privacy versus organizational control and accountability Privacy versus usability 52
4 Transformative Technologies Deliver Both Security and Privacy The zero-sum mentality manifests itself in the arguments of technology developers and proponents, vendors and integrators, business executives and program managers that individual privacy must give way to more compelling social, business, or operational objectives. At the same time, defenders or advocates of privacy are often cast, variably, as Luddites, technological alarmists, or pressure groups largely out of touch with complex technological requirements and organizational imperatives. Because of this prevailing zero-sum mentality, a proliferation of surveillance and control technologies are being deployed, without appropriate privacy checks and balances. I am making the case for building privacy into information technology systems at any early stage, not only because failing to do so can trigger a public backlash and a lose-lose scenario, but because doing so will generate positive-sum benefits for everyone involved, in terms of improved compliance, user confidence and trust. Better still, building privacy into invasive information and communications surveillance technologies may be accomplished without sacrificing data security, system functionality, efficiency, usability, or accountability. Privacy-Enhancing Technologies (PETs) Privacy, and specifically information privacy technologies, can transform zero-sum scenarios into positive-sum win-win scenarios. The term Privacy-Enhancing Technologies (PETs) refers to coherent systems of information and communication technologies that strengthen the protection of individuals private life in an information system by preventing unnecessary or unlawful processing of personal data or by offering tools and controls to enhance the individual s control over his/her personal data. This concept also includes the design of the information systems architecture. Since 1995, when the IPC first coined the acronym, the concept and term have both entered into widespread vocabulary and use around the world. PETs express universal principles of fair information practices directly into information and communications technologies, and can be deployed with little or NO impact on information system functionality, performance, or accountability. Adoption of PETs increases user confidence, and makes it possible to apply new information and communication technologies in a way that achieves multiple objectives. When applied to technologies of surveillance, a PET becomes a transformative technology, which: 53
5 Privacy by Design Helps minimize unnecessary disclosure, collection, retention and use of personal data; Empowers individuals to participate in the management of their personal data; Enhances the security of personal data, wherever collected/used; Promotes public confidence and trust in (personal) data governance structures; Helps promote and facilitate widespread adoption of the technology. Examples of Transformative Technologies Biometric Encryption BE offers viable prospects for 1:1 on-card matching of biometric and privacy-enhanced verification of identity in a wide range of contexts, helping to defeat unwanted identification, correlation and profiling on the basis biometric images and templates, as well as 1:N comparisons. RFID The IBM clipped chip is a consumer PET which helps to defeat unwanted surveillance. Similar innovations in user-centric RFID PETs have far-reaching consequences and commercial potential for use in RFID-embedded identity documents, payment tokens, mobile authentication, and other authorization form factors (e.g., transit fare cards, loyalty cards). Private Digital Identity Credentica (now Microsoft) developed minimal-disclosure digital identity tokens that work with major IDM platforms and help defeat unwanted correlation of user activities by online identity providers, without diminishing transaction accountability or control. Video Surveillance The Toronto mass transit video surveillance system will investigate the potential to deploy a privacy-enhanced encryption solution to prevent the unnecessary identification of passengers (see below). Video Surveillance Cameras: An Innovative Privacy-Enhancing Approach At the University of Toronto, Canada Professor Kostas Plataniotis, and Karl Martin have developed a transformative privacy-enhancing approach to video surveillance. Their work, as described in Privacy Protected Surveillance Using Secure Visual Object Coding, 1 uses cryptographic techniques to secure a private object (personally identifiable information), so that it may only be viewed by designated persons of authority, by unlocking the encrypted object with a secret key. In other words, objects of interest (e.g., a face or body) are stored as completely separate 54 1 See Karl Martin and Konstantinos N. Plataniotis, Privacy protected surveillance using secure visual object coding, the Edward S. Rogers Sr. Dept. of Electrical and Computer Engineering, University of Toronto, Multimedia Lab Technical Report online:
6 Transformative Technologies Deliver Both Security and Privacy entities from the background surveillance frame, and efficiently encrypted. This approach represents a significant technological breakthrough because by using a secure object-based coding approach, both the texture (i.e., content) and the shape of the object (see Figure (b) below), or just the texture (see Figure (c) below) may be encrypted. Not only is this approach more flexible, but the encryption used is also more efficient than existing approaches that encrypt the entire content stream. This allows designated persons to monitor the footage for unauthorized activity while strongly protecting the privacy of any individuals caught on tape. Upon capture of an incident that requires further investigation (i.e., a crime scene), the proper authorities can then decrypt the object content in order to identify the subjects in question. The decryption can be performed either in real-time or on archived footage. Since the encryption is performed in conjunction with the initial coding of the objects, it may be performed during acquisition of the surveillance footage, thus reducing the risk of any circumvention. Figure (a): original content stream; Figure (b): both shape and texture have been encrypted and, despite attempts to hack into this with an incorrect key, objects of interest could not be decrypted; Figure (c): example where only the texture of the whole body (or face) is encrypted. The figure contains a photograph of one of the researchers. The researcher in the photograph consented to its publication in this Report. 55
The 7 Foundational Principles. Implementation and Mapping of Fair Information Practices. Ann Cavoukian, Ph.D.
Privacy by Design The 7 Foundational Principles Implementation and Mapping of Fair Information Practices Ann Cavoukian, Ph.D. Information & Privacy Commissioner Ontario, Canada Purpose: This document provides
Privacy by Design The 7 Foundational Principles Implementation and Mapping of Fair Information Practices
Privacy by Design The 7 Foundational Principles Implementation and Mapping of Fair Information Practices Ann Cavoukian, Ph.D. Information & Privacy Commissioner, Ontario, Canada Purpose: This document
Big Data, Big Risk, Big Rewards. Hussein Syed
Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data
Maximize the Value of Your Data and the Ability to Protect Privacy, by Design
Maximize the Value of Your Data and the Ability to Protect Privacy, by Design Ann Cavoukian, Ph.D. Executive Director Privacy and Big Data Institute Ryerson University Ontario University Registrar s Association
Opinion and recommendations on challenges raised by biometric developments
Opinion and recommendations on challenges raised by biometric developments Position paper for the Science and Technology Committee (House of Commons) Participation to the inquiry on Current and future
Privacy by Design Setting a new standard for privacy certification
Privacy by Design Setting a new standard for privacy certification Privacy by Design is a framework based on proactively embedding privacy into the design and operation of IT systems, networked infrastructure,
Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council
Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity
CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS
CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS MARCH 2011 Acknowledgements This Viewpoint is based upon the Recommended Practice: Configuring and Managing Remote Access
Privacy by Design: What s Been Happening? Ken Anderson
Privacy by Design: What s Been Happening? Ken Anderson Assistant Commissioner (Privacy) Ontario Hong Kong June 13, 2012 Key Definitions Information privacy refers to the right or ability of individuals
QUESTIONS FOR COMMENT ON PROPOSED FRAMEWORK
QUESTIONS FOR COMMENT ON PROPOSED FRAMEWORK Scope Are there practical considerations that support excluding certain types of companies or businesses from the framework for example, businesses that collect,
Longmai Mobile PKI Solution
Longmai Mobile PKI Solution A quick Solution to External and Internal fraud in Insurance Industry Putting the client at the center of modernization Contents 1. INTRODUCTION... 3 1.1 Challenges... 3 1.2
SURVEILLANCE AND PRIVACY
info sheet 03.12 SURVEILLANCE AND PRIVACY Info Sheet 03.12 March 2012 This Information Sheet applies to Victorian state and local government organisations that are bound by the Information Privacy Act
I n t e r S y S t e m S W h I t e P a P e r F O R H E A L T H C A R E IT E X E C U T I V E S. In accountable care
I n t e r S y S t e m S W h I t e P a P e r F O R H E A L T H C A R E IT E X E C U T I V E S The Role of healthcare InfoRmaTIcs In accountable care I n t e r S y S t e m S W h I t e P a P e r F OR H E
FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES
FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES The implications for privacy and security in the emergence of HIEs The emergence of health information exchanges (HIE) is widely
IoT Security Platform
IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there
IDIM Privacy Enhancing Features Summary Identity Information Management Project (IDIM) Integration Infrastructure Program (IIP) Office of the CIO
IDIM Privacy Enhancing Features Summary Identity Information Management Project (IDIM) Integration Infrastructure Program (IIP) Contact: Peter Watkins Phone: 250 387-2184 Email: [email protected]
Privacy + Security + Integrity
Privacy + Security + Integrity Docufree Corporation Data Security Checklist Security by Design Docufree is very proud of our security record and our staff works diligently to maintain the greatest levels
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark
Do you have a private life at your workplace?
Do you have a private life at your workplace? Privacy in the workplace in EC institutions and bodies Giovanni Buttarelli In the course of his supervisory activities, the EDPS has published positions on
1. Understanding Big Data
Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview Erik Luysterborg Partner, Deloitte EMEA Data Protection & Privacy leader Prague, SCCE, March 22 nd 2016 1. 2016 Deloitte
Synapse Privacy Policy
Synapse Privacy Policy Last updated: April 10, 2014 Introduction Sage Bionetworks is driving a systems change in data-intensive healthcare research by enabling a collective approach to information sharing
Cloud security architecture
ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide
BYOD Policies: A Litigation Perspective
General Counsel Panel Reveals the Real Deal BYOD Policies: A Litigation Perspective By Andrew Hinkes Reprinted with Permission BYOD Policies: A Litigation Perspective By Andrew Hinkes Bring-your-own-device
What is Cloud-Based Security? Cloud-based Security = Security Management + Cloud Computing.
What is Cloud-Based Security? Cloud-based Security = Security Management + Cloud Computing. What is Cloud-Based Security? Cloud computing is: IT services via the internet from an external service provider
VIDEO SURVEILLANCE GUIDELINES
VIDEO SURVEILLANCE GUIDELINES Introduction Surveillance of public spaces has increased rapidly over recent years. This growth is largely attributed to the significant advances in surveillance technology
What is an SSL Certificate?
Security is of the utmost importance when doing business on the Web. Your customers want to know that their information is protected when crossing data lines. A Thawte SSL Web Server Certificate or SuperCert
Statement National Strategy for Trusted Identities in Cybersecurity Creating Options for Enhanced Online Security and Privacy
Statement National Strategy for Trusted Identities in Cybersecurity Creating Options for Enhanced Online Security and Privacy We thank the administration for this valuable opportunity to engage in a national
The Ontario Health Study s Assessment Centres: A Case Study for Privacy by Design
The Ontario Health Study s Assessment Centres: A Case Study for Privacy by Design Ann Cavoukian, Ph.D. Information & Privacy Commissioner Ontario, Canada and Pamela C. Spencer Cancer Care Ontario VP Corporate
BACKGROUND CHECK POLICY
BACKGROUND CHECK POLICY Introduction: How to Use This Template Background checks are an invaluable element of a robust selection process. A well-developed background check process helps in validating employee
Secure Data Exchange Solution
Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
Security challenges for internet technologies on mobile devices
Security challenges for internet technologies on mobile devices - Geir Olsen [[email protected]], Senior Program Manager for Security Windows Mobile, Microsoft Corp. - Anil Dhawan [[email protected]],
Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE
Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE The District and its colleges are committed to enhancing the quality of life of the community by integrating
Recommendations for the PIA. Process for Enterprise Services Bus. Development
Recommendations for the PIA Process for Enterprise Services Bus Development A Report by the Data Privacy and Integrity Advisory Committee This report reflects the consensus recommendations provided by
Key Management Interoperability Protocol (KMIP)
(KMIP) Addressing the Need for Standardization in Enterprise Key Management Version 1.0, May 20, 2009 Copyright 2009 by the Organization for the Advancement of Structured Information Standards (OASIS).
Usable Multi-Factor Authentication and Risk-Based Authorization
CYBER SECURITY DIVISION 2013 PRINCIPAL INVESTIGATORS Usable Multi-Factor Authentication and Risk-Based Authorization IBM T. J. Watson Research Center Larry Koved, Research Staff Member 17 September 2013
KRS Chapter 61. Personal Information Security and Breach Investigations
KRS Chapter 61 Personal Information Security and Breach Investigations.931 Definitions for KRS 61.931 to 61.934. (Effective January 1, 2015).932 Personal information security and breach investigation procedures
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
IBM Software Universal Health Identifiers: Issues and Requirements for Successful Patient Information Exchange
IBM Software Universal Health Identifiers: Issues and Requirements for Successful Patient Information Exchange Lorraine Fernandes, RHIA Scott Schumacher, Ph.D. Universal Health Identifiers: Issues and
SecTor 2009 October 6, 2009. Tracy Ann Kosa
SecTor 2009 October 6, 2009 Tracy Ann Kosa Privacy versus Security Un enforced Privacy Privacy Requirements that Work People Process Technology Territorial Privacy Setting boundaries on intrusion into
Start building a trusted environment now... (before it s too late) IT Decision Makers
YOU CAN T got HAP Start building a trusted environment now... IT Decision Makers (before it s too late) HAP reference implementations and commercial solutions are available now in the HAP Developer Kit.
Information and Privacy Commissioner of Ontario. Guidelines for Using Video Surveillance Cameras in Schools
Information and Privacy Commissioner of Ontario Guidelines for Using Video Surveillance Cameras in Schools Ann Cavoukian, Ph.D. Commissioner Revised July 2009 This publication is an updated version of
NICE MULTI-CHANNEL INTERACTION ANALYTICS
NICE MULTI-CHANNEL INTERACTION ANALYTICS Revealing Customer Intent in Contact Center Communications CUSTOMER INTERACTIONS: The LIVE Voice of the Customer Every day, customer service departments handle
Integrated Physical Security and Incident Management
IT Enterprise Services Integrated Physical Security and Incident Management Every organisation needs to be confident about its physical security and its ability to respond to unexpected incidents. Protecting
EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients
EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients A Detailed Review EMC Information Infrastructure Solutions Abstract This white
HHSN316201200042W 1 QSSI - Quality Software Services, Inc
ARTICLE C.1. STATEMENT OF WORK This contract is designed to permit the Institutes and Centers (ICs) of NIH, the Department of Health and Human Services (DHHS), and all other federal agencies to acquire
Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions.
Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH White Paper February 2010 www.alvandsolutions.com Overview Today s increasing security threats and regulatory
Best Practices for Log File Management (Compliance, Security, Troubleshooting)
Log Management: Best Practices for Security and Compliance The Essentials Series Best Practices for Log File Management (Compliance, Security, Troubleshooting) sponsored by Introduction to Realtime Publishers
MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP)
MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP) 201 CMR 17.00 Standards for the Protection of Personal Information Of Residents of the Commonwealth of Massachusetts Revised April 28,
United States Visitor and Immigrant Status Indicator Technology Program (US-VISIT)
for the Conversion to 10-Fingerprint Collection for the United States Visitor and Immigrant Status Indicator Technology Program (US-VISIT) November 15, 2007 Contact Point Barbara M. Harrison, Acting Privacy
ByteMobile Insight. Subscriber-Centric Analytics for Mobile Operators
Subscriber-Centric Analytics for Mobile Operators ByteMobile Insight is a subscriber-centric analytics platform that provides mobile network operators with a comprehensive understanding of mobile data
Cisco Video Surveillance in Hospitals: Ten Ways to Save Money and Improve the Patient Experience
White Paper Cisco Video Surveillance in Hospitals: Ten Ways to Save Money and Improve the Patient Experience What You Will Learn Video surveillance in hospital settings can help provide high-quality, affordable
Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)
Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Executive Summary...3 Background...4 Internet Growth in the Pharmaceutical Industries...4 The Need for Security...4
Privacy Guidelines for RFID Information Systems (RFID Privacy Guidelines)
Privacy Guidelines for RFID Information Systems (RFID Privacy Guidelines) Information and Privacy Ann Cavoukian, Ph.D. Commissioner June 2006 Commissioner Ann Cavoukian gratefully acknowledges the work
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
CANADIAN PAYMENTS ASSOCIATION ASSOCIATION CANADIENNE DES PAIEMENTS RULE E1
CANADIAN PAYMENTS ASSOCIATION ASSOCIATION CANADIENNE DES PAIEMENTS RULE E1 EXCHANGE OF SHARED ELECTRONIC POINT-OF-SERVICE PAYMENT ITEMS FOR THE PURPOSE OF CLEARING AND SETTLEMENT 2015 CANADIAN PAYMENTS
Demystifying Big Data Government Agencies & The Big Data Phenomenon
Demystifying Big Data Government Agencies & The Big Data Phenomenon Today s Discussion If you only remember four things 1 Intensifying business challenges coupled with an explosion in data have pushed
SubmitedBy: Name Reg No Email Address. Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se
SubmitedBy: Name Reg No Email Address Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se Abid Hussain 780927-T039 abihus07 (at) student.hh.se Imran Ahmad Khan 770630-T053 imrakh07 (at) student.hh.se
4How Marketing Leaders Can Take Control of Data for Better
Steps to Achieve Better Marketing Results 4How Marketing Leaders Can Take Control of Data for Better Marketing Performance and Customer Interactions As a marketing leader, you rely heavily on data to inform
Is Cloud Backup good insurance for your brokerage?
Is Cloud Backup good insurance for your brokerage? Don Purchase is the Business Development Manager at Stage2- Data; Canada s Premiere Cloud Solutions Provider. Stage2Data is the Affinity Partner of the
SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS Next Generation Networks Security
International Telecommunication Union ITU-T Y.2740 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (01/2011) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS
DEA's New Proposed Regulations For E-Prescribing
Portfolio Media, Inc. 648 Broadway, Suite 200 New York, NY 10012 www.law360.com Phone: +1 212 537 6331 Fax: +1 212 537 6371 [email protected] DEA's New Proposed Regulations For E-Prescribing
Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare
CIO-SP 3 Task Areas Ten task areas constitute the technical scope of this contract: Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare The objective of this task area is
May 2010. For other information please contact:
access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: [email protected] www.bsia.co.uk Form No. 181.
Ann Cavoukian, Ph.D.
Data, Data Everywhere The Need for BIG Privacy in a World of Big Data Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario, Canada Future of Consumer Intelligence Universal City, California
Audio: This overview module contains an introduction, five lessons, and a conclusion.
Homeland Security Presidential Directive 12 (HSPD 12) Overview Audio: Welcome to the Homeland Security Presidential Directive 12 (HSPD 12) overview module, the first in a series of informational modules
US-VISIT Program, Increment 1 Privacy Impact Assessment
US-VISIT Program, Increment 1 Privacy Impact Assessment December 18, 2003 Contact Point Steve Yonkers US-VISIT Privacy Officer Department of Homeland Security (202) 298-5200 Reviewing Official Nuala O
An Electronic Voting System Based On Blind Signature Protocol
CSMR, VOL. 1, NO. 1 (2011) An Electronic Voting System Based On Blind Signature Protocol Marius Ion, Ionuţ Posea University POLITEHNICA of Bucharest Faculty of Automatic Control and Computers, Computer
Information and Privacy Commissioner of Ontario. Guidelines for the Use of Video Surveillance Cameras in Public Places
Information and Privacy Commissioner of Ontario Guidelines for the Use of Video Surveillance Cameras in Public Places Ann Cavoukian, Ph.D. Commissioner September 2007 Acknowledgements This publication
EVALUATION GUIDE. Evaluating a Self-Service Password Reset Tool. Usability. The password reality
EVALUATION GUIDE Evaluating a Self-Service Password Reset Tool This guide presents the criteria to consider when evaluating a self-service password reset solution and can be referenced for a new implementation
Estate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
CHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION 1.1 Introduction Cloud computing as a new paradigm of information technology that offers tremendous advantages in economic aspects such as reduced time to market, flexible computing
S Z E C S K A Y Ü g y v é d i
EMPLOYEE MONITORING FROM THE PERSPECTIVE OF HUNGARIAN DATA PROTECTION LAWS While employers oftentimes wish to monitor the behavior of their employees, which generally is a rightful intention, it is also
