Making sense of data whether big or small

Size: px
Start display at page:

Download "Making sense of data whether big or small"

Transcription

1 Making sense of data whether big or small PROF SHARM MANWANI OLIVER LEWIS PAUL HINTON NICOLA FULFORD ALEKS KROTOSKI 25/06/2014

2 Making sense of data whether big or small Devices that can access, create, transmit and store data Prevalence of Internet and access to services Cloud ease and cost of storing data gone down enormously Vast increase in the amount of stored data Our understanding and management of that data is poor The stone age was marked by man's clever use of crude tools; the information age, to date, has been marked by man's crude use of clever tools.

3 Making sense of data whether big or small What is new? Software, hardware and cloud which can search vast volumes of structured and unstructured data quickly New techniques for analysing data algorithims New awareness of the potential and value of data analysis Big Data Knowing a great deal is not the same as being smart; intelligence is not information alone but also judgment, the manner in which information is collected and used

4 Making sense of data data potential

5 Making sense of data risks Plans Change

6 Exploiting data whilst remaining compliant and ensuring customer buy-in exploit data remain compliant Customer buy-in allow data subjects control provide value to data subjects non-compliance going too far being found out customer perception lack of trust bad PR loss of business

7 The Big Data Analytical Horizontal Model Input Data Big Data Factory Output Data Social Media Live data feed Internal structured data Third party review Third Party Data Transaction data Data Storage Platform Cloud? Algorithm Search engine database Question Regular Report Internal unstructured Data Public domain, market data, social media, personal data, confidential data, licensed data, government data, employee data, self generated and/or derived Third party apps systems and cloud? Algorithms, pan-enterprise search, one view of information, information re-purposing Internal use Product development, CRM, sales/marketing, product development, External use

8 The vertical model for the data-centric world Information Management Data Regulation Generic: data protection, communications Sector specific: financial services, healthcare, aviation Competition law: Articles 101 & 102 Contracting for Data IP Rights in Data Copyright, database right, confidentiality, patents, trade marks Data Security Data architecture (Structure, schemas, strategies, methods) Platform infrastructure (software) (operating system, database, transaction processing, comms) Platform infrastructure (equipment) (processing, storage, comms and connectivity

9 The vertical model for the data-centric world Information Management Data Regulation Generic: data protection, communications Sector specific: financial services, healthcare, aviation Competition law: Articles 101 & 102 Contracting for Data IP Rights in Data Copyright, database right, confidentiality, patents, trade marks Data Security Data architecture (Structure, schemas, strategies, methods Platform infrastructure (software) (operating system, database, transaction processing, comms) Platform infrastructure (equipment) (processing, storage, comms and connectivity

10 Making sense of data whether big or small Potential and harnessing of Big Data - Prof. Sharm Manwani Making sense of data - Oliver Lewis, General Counsel, Weve Data Protection - Nicola Fulford Legal Role: Information management - Paul Hinton Panel discussion and questions

11 Data Potential and How to Manage It PROF. SHARM MANWANI

12 Potential and Harnessing of Big Data Highlight researched frameworks that can help: map the Potential for Big Data assess e-leaders who champion cross-departmental projects create a Business Change process from Strategy to Benefits Professor Sharm Manwani, Henley Business School KEMP LITTLE CONFERENCE, June 2014 Insert footer on Slide Master

13 Profile Experience contributing to insights on Big Data and e-leadership PROFESSOR PROFESSIONAL EUROPEAN CIO Insights AUTHOR Professor Sharm Manwani - June

14 Potential of Big Data PERFORMANCE The more data-driven, the better they performed on financial and operational results. Companies in the top third of their industry in the use of data-driven decision making were, on average, 5% more productive and 6% more profitable than their competitors. Is Your Company Ready for Big Data? by Erik Brynjolfsson and Andy McAfee (HBR) Professor Sharm Manwani - June

15 Challenges of Big Data Professor Sharm Manwani - June

16 Information Management Dimensions Changing focus of information technology Structured Unstructured Exploitation Control Source: Prof. Sharm Manwani, Henley Business School Professor Sharm Manwani - June 2014

17 Information Management Model Four different worlds of information management Structured Business Unstructured Knowledge IM Group Exploitation Intelligence Management Metropolitan Police Service MoD Yell Control Operational Document British Computer Society Data & Content CILIP Gartner Henley Business School Professor Sharm Manwani - June 2014

18 Scope of Information Management Influencing SKILLS FRAMEWORK FOR THE INFORMATION AGE (SFIA) Structured Unstructured The overall management of the use of all types of information, Exploitation Business Intelligence Knowledge Management structured and unstructured, whether produced internally or externally, to support decision-making and business processes. Encompasses development and promotion of the strategy and BIG DATA policies covering the design of information structures and taxonomies, the setting of policies for the sourcing and Control Operational Document maintenance of the data content, and the development of policies, procedures, working practices and training to promote Data & Content compliance with legislation regulating the management of records, and all aspects of holding, use and disclosure of data. Professor Sharm Manwani - June 2014 Source: SFIA 5 - IRMG

19 Mapping Potential of Big Data Big Data is helping to connect the four different worlds We re changing our company to be much more of a real-time digital enterprise, said the CTO Structured Unstructured Exploitation Business Intelligence Knowledge Management BIG DATA Control Operational Data Document & Content Source: Prof. Sharm Manwani, Henley Business School Professor Sharm Manwani - June 2014

20 Information Management Evaluation Evaluating the potential of big data Structured Unstructured Exploitation Business Intelligence Knowledge Management BIG DATA Control Operational Data Document & Content On a scale of 1 (very low) to 10 (very high) how would you separately rate your Control and Exploitation of Information Source: Prof. Sharm Manwani, Henley Business School Professor Sharm Manwani - June 2014

21 e-leadership Research European e-leadership research and dissemination IT Business Leadership Professor Sharm Manwani - June

22 e-leadership e-leaders have a different focus TRADITIONAL CIO IT DIGITAL STRATEGIST Their top activities are improving IT operations, deploying new systems and These CIOs drive business innovation, cultivating partnerships and developing controlling IT costs. Business Leadership strategy. Anyone who works for Barclays can become a digital eagle, as long as they re willing to help customers with technology. Barclays personal and corporate banking chief Professor Sharm Manwani - June

23 e-leadership Skills e-leadership requires integrated, multi-disciplinary skills IT (Exploit technology) BIG Business (New models) DATA Leadership (Innovation culture) On a scale of 1 (very low) to 10 (very high) how would you rate the quality of e-leadership in your environment Professor Sharm Manwani - June

24 State of the CIO Survey 2014 e-leaders are scarce TRADITIONAL CIO DIGITAL STRATEGIST 48 percent of CIOs acknowledge that their IT groups are viewed by fellow employees as a cost center or service provider. 25 percent report that the IT group is perceived by colleagues as a true business peer--or even a game-changer--that can create and launch new products and open new markets. Their top activities are improving IT operations, deploying new systems and controlling IT costs. These first-class CIOs identify their top activities as driving business innovation, cultivating partnerships and developing business strategy CIOs Professor Sharm Manwani - June

25 Process of Business Change Implementing Big Data is a Business Change Project Understand Potential of Big Data Develop Change Programmes For Big Data Unlock Value of Big Data Align Business & IT Goals Define Business Improvement Design Business Change Implement Business Change Deliver Benefits Direction Of Travel Professor Sharm Manwani - June 2014

26 Business Change Lifecycle Evaluating Business Change Capability Understand Potential of Big Data Develop Change Programmes For Big Data Unlock Value of Big Data Align Business & IT Goals Define Business Improvement Design Business Change Implement Business Change Deliver Benefits Direction Of Travel On a scale of 1 (very low) to 10 (very high) how capable is your organisation in managing business change Professor Sharm Manwani - June 2014

27 Summary Big Data Potential Important to take an integrated Exploitation Structured Business Intelligence Unstructured Knowledge Management approach BIG DATA Control Operational Data Document & Content e-leader Skills Development Need to develop e-leaders who IT can exploit big data BIG DATA Business Leadership Process Treat Big Data projects as Understand Potential of Big Data Develop Change Programmes For Big Data Unlock Value of Big Data Business Change Align Business & IT Goals Define Business Improvement Design Business Change Implement Business Change Deliver Benefits Direction Of Travel Contact Professor Sharm Manwani - June

28 Making sense of data OLIVER LEWIS, WEVE

29 Making sense of data whether big or small Oliver Lewis General Counsel - Weve June 2014

30 Weve reaches 80% of UK mobile customers Backed by three major shareholders 22 million consent based consumers

31 Mobile advertising and usage is growing YOY with mobile growing at a faster rate than online The mobile share of digital UK ad spend Consumer behaviour is changing in terms of time spent 13.4% % 19.4% 19.2% Smartphone ownership reached over two thirds (68%) of the UK population in June 2013 Mobile Desktop *econsultancy.com/uk/blog/63534-mobile-adspend-up-127-to-429m-in-first-half-of-2013

32 Myths about Big Data Big data is like teenage sex: everyone talks about it, nobody really knows how to do it, everyone thinks everyone else is doing it, so everyone claims they are doing it. Data is the foundation of our business, not the business itself.

33 Weve s data foundation supports all our products Display Messaging Location Sync M commerce

34 This data is combined to build our scaled robust targetable segments E.g. Travellers This segment may for e.g. includes travellers who have activated roaming in at least 3 of the last 12 months and shown interest in travel websites. Social grade BARB region Sports Travel Finance Supermarkets Demographic Entertainment Automotive

35 Getting it right for brands AND the consumer is critical Consumer proposition Consent based If we don t, they opt out and we don t have a business. This means gaining their consent, respecting their wishes and being careful with their data. Easy and speedy opt out To unsubscribe text STOP to XXXXX Data hashing and security

36 Meet user X

37 We can provide targeted ads that are effective for brands AND relevant to the consumer

38 We won t spam consumers or show them things they don t want this is not what brands want

39 We aren t Big Brother, our ads won t creep out consumers this just alienates consumers and brands lose customers

40 Privacy consumers in control Privacy laws often feel vague and fail to keep up with new technology and consumer concerns. The online and mobile industry is searching for ways to facilitate privacy compliance in a world of fast-changing technology Clearly displayed Adchoices logo on ads served by Weve User can easily find out why they have been shown an ad Simple click-through to opt out Opt out given immediate effect Clear instructions provided Works across both rich media and static ads Opt out persistent (vastly more reliable that cookie based system)

41 Weve s core underlying principles For brands and consumers, our services will always be: Smart Relevant Valuable BUT The consumer always has the right to say NO

42 Thank you

43 Big Data Data Protection Implications NICOLA FULFORD Privacy & Data Protection Partner

44 Data Protection Refresher What is data protection in a nutshell? Imposes obligations on those who control the processing of personal data (principles) Confers rights on individuals whose data is processed Regulated and enforced by the ICO (fines up to 500k) Key legislation in the UK is the Data Protection Act 1998 (DPA) implementation of European Directive.

45 What is personal data? Data Protection Act 1998: Data which relate to a living individual who can be identified [or identifiable] from those data or from other information in the [controller s] possession including opinions about or intentions in respect of that person It is not: just name and contact details dependent upon being confidential Personal data is being processed where information is collected and analysed with the intention of distinguishing one individual from another and to take a particular action in respect of an individual even if no obvious identifiers, such as names or addresses, are held Information Commissioner s Office Guidance

46 And sensitive personal data? Commission / alleged commission of an offence or related court proceedings Sexual life Racial / ethnic origin Physical or mental health Personal data consisting of information as to Political opinions Membership of a trade union Religious beliefs must satisfy one of the conditions for sensitive processing and take additional security steps

47 Examples of personal data in a data-centric world There is a lot of personal data out there: location tracking (eg mobiles) call recordings facial recognition communications meta data wearables supermarket loyalty schemes social media cookies fitness apps smart meters hospital outcomes YouTube etc. videos the Internet of Things CCTV / ANPR Beware many of these are likely to also include sensitive personal data

48 Compliance with the DP principles Adequate protection outside EEA Fair & lawful Kept secure Purpose limitation Big Data Comply with subjects rights Adequate, relevant & not excessive Retention limits Accurate & up to date

49 Big Data: Compliance with the first principle Personal data must be fairly and lawfully processed (including compliance with a schedule 2 (and 3) condition) - Consent - Legitimate interests AND - Explicit consent - Deliberately made the information public I consent to [complex algorithms being applied to co-mingled data sets about me to derive information that can tell you all sorts of things about me that neither of us would be expecting] Please tick if you agree Meaning of Consent?

50 Big Data regulation: examples of regulatory guidance ICO: Code of Practice on Anonymisation Article 29 Working Party: Opinions on (i) Anonymisation and (ii) Purpose Limitation European Data Protection Supervisor: Opinion on privacy and competitiveness in the age of Big Data Federal Trade Commission: Investigation into data brokers.but: comments by European Digital Chief Neelie Kroes in March 2014 gold rush

51 Big Data: Is anonymisation the answer? Personal data or anonymous data? ICO Code of Practice Anonymisation ensures the availability of rich data resources, whilst protecting individuals personal data EC2V 6BJ IP address: Cookie ID: ce2123a969 IMEI: Device fingerprint Good practice: methods, governance, risk analysis, restrictions on disclosure Identifiable by means reasonably likely to be used / motivated intruder test Article 29 Working Party Opinion 05/2014 Analysis of anonymisation techniques Pseudonymised data?

52 And the proposed General Data Protection Regulation? Current status? Commission and Parliament have each agreed their own positions and texts Council is still negotiating its position: nothing will be agreed until everything is agreed Next steps: trialogue negotiations May be agreed end 2014?? / in force from 2017???

53 The GDP Regulation key themes for Big Data One law for all member states Profiling restricted Right to be forgotten One stop shop regulator Explicit Consent / Transparency Binding on processors too Accountability Cookies / IP address = personal data Fines up to 100m or 5% w/w turnover

54 Processing Big Data in accordance with data protection laws: Conclusions Consider what personal data may be involved in your big data project Consider whether this may constitute sensitive personal data Consider whether the data can be anonymised Ensure you have a schedule 2/3 condition for processing Check compliance with the other data protection principles in particular purpose limitation Future-proofing will this still be OK under the [GDP Regulation]? Review project over time. and don t assume you only have to do this once. In the world of Big Data nothing stays the same for long..

55 The Legal view of Information Management Navigating the gap PAUL HINTON COMMERCIAL TECHNOLOGY PARTNER

56 The Legal view of Information Management 1. Traditional legal role of ensuring compliance and/or assessing risk 2. Potentially broader role in defining the strategic approach to data We are all faced with a series of great opportunities brilliantly disguised as impossible situations.

57 The traditional legal analysis Input Data Data Factory Output Data Social Media Live data feed Internal structured data Third party review Third Party Data Transaction data Data Storage Platform Cloud? Algorithm Search engine database Question Regular Report Internal unstructured Data Public domain, market data, social media, personal data, confidential data, licensed data, government data, employee data, self generated and/or derived Third party apps systems and cloud? Algorithms, pan-enterprise search, one view of information, information re-purposing Internal use Product development, CRM, sales/marketing, product development, External use

58 Data Input Stage Information Management Data Regulation Generic: data protection, communications Sector specific: financial services, healthcare, aviation Competition law: Articles 101 & 102 Contracting for Data IP Rights in Data Copyright, database right, confidentiality, patents, trade marks Data Security Data architecture (Structure, schemas, strategies, methods Platform infrastructure (software) (operating system, database, transaction processing, comms) Platform infrastructure (equipment) (processing, storage, comms and connectivity

59 Data Input Stage Clear and consistent process NO Regulation? Contract? Intellectual Property Right? Can it be put into database? YES Will limits apply?

60 Data Factory Stage Information Management Data Regulation Generic: data protection, communications Sector specific: financial services, healthcare, aviation Competition law: Articles 101 & 102 Contracting for Data IP Rights in Data Copyright, database right, confidentiality, patents, trade marks Data Security Data architecture (Structure, schemas, strategies, methods Platform infrastructure (software) (operating system, database, transaction processing, comms) Platform infrastructure (equipment) (processing, storage, comms and connectivity

61 Data Factory Stage must ensure ongoing compliance and deal with change 1. Record input data attributes 4. Track and record changes to data 2. Ensure output data compliance 3. Track and record changes to law and regulation

62 Output Data Stage Information Management Data Regulation Generic: data protection, communications Sector specific: financial services, healthcare, aviation Competition law: Articles 101 & 102 Contracting for Data IP Rights in Data Copyright, database right, confidentiality, patents, trade marks Data Security Data architecture (Structure, schemas, strategies, methods Platform infrastructure (software) (operating system, database, transaction processing, comms) Platform infrastructure (equipment) (processing, storage, comms and connectivity

63 Output Data - Metered Access key terms Reflect Input Data Terms Contract is King Contract licence limited, reserve rights, refer to external documents to ensure flexible Explicitly terminate licence on termination

64 Legal Strategic Role: Strategy, Planning, Process and Procedure Cross team Compliance Multiskillset Project management Lawyer Senior buy-in Process procedure Strategy

65 Legal Strategic Role: Strategy, Planning, Process and Procedure The more highly regulated/contracted the input data the more complex the strategy, database and policies The database may need an IT solution to simply manage the data and implement strategy/policy There are a number of IT data methodologies for storing, tracking and managing data, e.g.: - DAMA (Data Management Association International) - MIKE2.0. Method for an Integrated Knowledge Environment - Enterprise Data Management Council Data

66 Legal Strategic Role: Strategy, Planning, Process and Procedure Legal strategic role taking a lead in developing and implementing: - High level data strategy: what does the business want to do with data now and in 3/5 years? what is the ethical business stance? E.g. creepy test - Policy statement: Key responsible people identified day-to day implementation - Processes, procedures and training: actionable guidelines applicable to all staff part of employment contract

67 Panel Discussion & Questions

68 Panel members Professor Sharm Manwani Executive Professor of IT Leadership, Henley Business School Oliver Lewis General Counsel, Weve Aleks Krotoski Leading academic, TV and Radio presenter and journalist Paul Hinton Commercial Partner Nicola Fulford Commercial Partner

How To Protect Your Data From Being Used For Profit

How To Protect Your Data From Being Used For Profit There s data and then there s big data Paul Hinton Nicola Fulford Jeremy Harris Chris Wray CCF 2 APRIL 2014 US National Intelligence Council s December 2012 Report Global Trends 2030: Alternative Worlds

More information

Merthyr Tydfil County Borough Council. Data Protection Policy

Merthyr Tydfil County Borough Council. Data Protection Policy Merthyr Tydfil County Borough Council Data Protection Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of the

More information

Data protection policy

Data protection policy Data protection policy Introduction 1 This document is the data protection policy for the Nursing and Midwifery Council (NMC). 2 The Data Protection Act 1998 (DPA) governs the processing of personal data

More information

Data Protection and Information Security. Procedure for reporting a breach of data security. April 2013

Data Protection and Information Security. Procedure for reporting a breach of data security. April 2013 Data Protection and Information Security Procedure for reporting a breach of data security April 2013 Page 1 of 6 Created on: 01/04/2009 Contents 1 Introduction... 3 2 Data Classification... 3 3 What Is

More information

Big Data for Law Firms DAMIAN BLACKBURN

Big Data for Law Firms DAMIAN BLACKBURN Big Data for Law Firms DAMIAN BLACKBURN PUBLISHED BY IN ASSOCIATION WITH Big data means big business By Simon Briskman, partner, technology & outsourcing group, Field Fisher Waterhouse LLP BIG DATA is

More information

Data Protection Act. Privacy & Security in the Information Age. April 26, 2013. Ministry of Communications, Ghana

Data Protection Act. Privacy & Security in the Information Age. April 26, 2013. Ministry of Communications, Ghana Data Protection Act Privacy & Security in the Information Age April 26, 2013 Agenda Privacy in The Information Age The right to privacy Why We Need Legislation Purpose of the Act The Data Protection Act

More information

The EDGE 2014 User Conference Information Governance Workshop

The EDGE 2014 User Conference Information Governance Workshop The EDGE 2014 User Conference Information Governance Workshop Monday 17 th March 2014 Debbie Terry Agenda What is Information Governance? New developments in legislation Your questions answered Caldicott

More information

dma How to guide Email and cookies legislation Published by The DMA Email Marketing Council and the IAB Email Marketing Council we are the

dma How to guide Email and cookies legislation Published by The DMA Email Marketing Council and the IAB Email Marketing Council we are the dma we are the How to guide Email and cookies legislation Published by The DMA Email Marketing Council and the IAB Email Marketing Council First edition, April 2012 Contents Acknowledgements...2 Introduction...3

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Responsible Officer Author Date effective from July 2009 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance Manager Date last amended December 2012 Review

More information

Data Protection Good Practice Note

Data Protection Good Practice Note Data Protection Good Practice Note This explanatory document explains what charities and voluntary organisations need to do to comply with the Data Protection Act 1988 as amended by the Data Protection

More information

Privacy Policy for Data Collected by Blue State Digital

Privacy Policy for Data Collected by Blue State Digital Privacy Policy for Data Collected by Blue State Digital Overview Blue State Digital LLC. ( Blue State Digital, BSD or we ) provides various services to non- profit entities and other related businesses

More information

DESTINATION MELBOURNE PRIVACY POLICY

DESTINATION MELBOURNE PRIVACY POLICY DESTINATION MELBOURNE PRIVACY POLICY 2 Destination Melbourne Privacy Policy Statement Regarding Privacy Policy Destination Melbourne Limited recognises the importance of protecting the privacy of personally

More information

Buckinghamshire County Council Transport for Buckinghamshire ANPR Code of Practice

Buckinghamshire County Council Transport for Buckinghamshire ANPR Code of Practice Buckinghamshire County Council Transport for Buckinghamshire ANPR Code of Practice 1 Introduction 1.1 Buckinghamshire County Council (BCC) Transportation Service has Automatic Number Plate Recognition

More information

Index. Definitions. What is Data Protection? Rights of Individuals. The 8 Principles of Data Protection

Index. Definitions. What is Data Protection? Rights of Individuals. The 8 Principles of Data Protection Data Protection Awareness Based on DIT s Data Protection Policy, the Data Protection Acts, 1988 & 2003 and guidance from the Office of the Data Protection Commissioner Index Definitions What is Data Protection?

More information

Hampstead Parochial CofE Primary School Data Protection Policy Spring 2015

Hampstead Parochial CofE Primary School Data Protection Policy Spring 2015 Hampstead Parochial CofE Primary School Data Protection Policy Spring 2015 1. Introduction and Scope 1.1 The Data Protection Act 1998 is the law that protects personal privacy and applies to any school

More information

ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY

ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY Originated by: Data Protection Working Group: November 2008 Impact Assessment: (to be confirmed) Recommended by Senate: 28 January 2009 Approved by Council:

More information

Policy and Procedure for approving, monitoring and reviewing personal data processing agreements

Policy and Procedure for approving, monitoring and reviewing personal data processing agreements Policy and Procedure for approving, monitoring and reviewing personal data processing agreements 1 Personal data processing by external suppliers, contractors, agents and partners Policy and Procedure

More information

Five Strategies to Build a Successful Email Marketing Campaign

Five Strategies to Build a Successful Email Marketing Campaign Five Strategies to Build a Successful Email Marketing Campaign David Daniels, CEO & Co-Founder - The Relevancy Group, LLC Christopher Nash, Senior Business Optimization Consultant Sitecore Reminders for

More information

ESOMAR PRACTICAL GUIDE ON COOKIES JULY 2012

ESOMAR PRACTICAL GUIDE ON COOKIES JULY 2012 ESOMAR PRACTICAL GUIDE ON COOKIES JULY 2012 Copyright ESOMAR 2012 TABLE OF CONTENTS 2 Objectives 2 Introduction 3 Definitions 4 SECTION 1: APPLICABLE LAW 4 SECTION 2: WHAT YOU NEED TO KNOW SOME FAQs 5

More information

Data Security and Extranet

Data Security and Extranet Data Security and Extranet Derek Crabtree Schools ICT Support Manager derek.crabtree@merton.gov.uk Target Operating Model 2011 Merton Audit Organisation name: London Borough of Merton Periodic plan date:

More information

MRS Guidelines for Business-to-Business Research. October 2011

MRS Guidelines for Business-to-Business Research. October 2011 MRS Guidelines for Business-to-Business Research October 2011 Updated September 2014 MRS is the world s largest association for people and organisations that provide or use market, social and opinion research,

More information

Data protection compliance checklist

Data protection compliance checklist Data protection compliance checklist What is this checklist for? This checklist is drawn up on the basis of analysis of the relevant provisions of European law. Although European law aims at harmonizing

More information

How to Get Ahead in Advertising: staying ahead and realising value in adtech and martech

How to Get Ahead in Advertising: staying ahead and realising value in adtech and martech How to Get Ahead in Advertising: staying ahead and realising value in adtech and martech ANDY MOSEBY MAHISHA RUPAN NICOLA FULFORD CALUM MURRAY 14 October 2015 Agenda The M&A landscape: convergence equals

More information

So the security measures you put in place should seek to ensure that:

So the security measures you put in place should seek to ensure that: Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.

More information

University of Limerick Data Protection Compliance Regulations June 2015

University of Limerick Data Protection Compliance Regulations June 2015 University of Limerick Data Protection Compliance Regulations June 2015 1. Purpose of Data Protection Compliance Regulations 1.1 The purpose of these Compliance Regulations is to assist University of Limerick

More information

2. Scope 2.1 This policy covers all the activities and processes of the University that uses personal information in whatever format.

2. Scope 2.1 This policy covers all the activities and processes of the University that uses personal information in whatever format. University of Westminster Personal Data Protection Policy For Compliance with the Data Protection Act 1998 1. Background 1.1 The Data Protection Act 1998 (DPA) defines personal data as data and information

More information

John Leggott College. Data Protection Policy. Introduction

John Leggott College. Data Protection Policy. Introduction John Leggott College Data Protection Policy Introduction The College needs to keep certain information about its employees, students and other users to allow it to monitor performance, achievements, and

More information

Data Compliance. And. Your Obligations

Data Compliance. And. Your Obligations Information Booklet Data Compliance And Your Obligations What is Data Protection? It is the safeguarding of the privacy rights of individuals in relation to the processing of personal data. The Data Protection

More information

Trusted Personal Data Management A User-Centric Approach

Trusted Personal Data Management A User-Centric Approach GRUPPO TELECOM ITALIA Future Cloud Seminar Oulu, August 13th 2014 A User-Centric Approach SKIL Lab, Trento - Italy Why are we talking about #privacy and #personaldata today? 3 Our data footprint Every

More information

Communications with the Public by Text and Social Media Policy London Borough of Barnet

Communications with the Public by Text and Social Media Policy London Borough of Barnet Communications with the Public by Text and Social Media Policy London Borough of Barnet POLICY NAME Document Description Communications with the public by text and social media policy. Policy which provides

More information

GUIDE TO THE ISLE OF MAN DATA PROTECTION ACT. CONTENTS PREFACE 1 1. Background 2 2. Data Protections Principles 3 3. Notification Requirements 4

GUIDE TO THE ISLE OF MAN DATA PROTECTION ACT. CONTENTS PREFACE 1 1. Background 2 2. Data Protections Principles 3 3. Notification Requirements 4 GUIDE TO THE ISLE OF MAN DATA PROTECTION ACT CONTENTS PREFACE 1 1. Background 2 2. Data Protections Principles 3 3. Notification Requirements 4 PREFACE The following provides general guidance on data protection

More information

10 Critical Requirements for Cloud Applications:

10 Critical Requirements for Cloud Applications: 10 Critical Requirements for Cloud Applications: How to Recognise Cloud Providers and Applications that Deliver Real Value 10 Critical Requirements for Cloud Applications: How to Recognise Cloud Providers

More information

Data controllers and data processors: what the difference is and what the governance implications are

Data controllers and data processors: what the difference is and what the governance implications are ICO lo : what the difference is and what the governance implications are Data Protection Act Contents Introduction... 3 Overview... 3 Section 1 - What is the difference between a data controller and a

More information

Guidelines on Data Protection. Draft. Version 3.1. Published by

Guidelines on Data Protection. Draft. Version 3.1. Published by Guidelines on Data Protection Draft Version 3.1 Published by National Information Technology Development Agency (NITDA) September 2013 Table of Contents Section One... 2 1.1 Preamble... 2 1.2 Authority...

More information

Scottish Rowing Data Protection Policy

Scottish Rowing Data Protection Policy Revision Approved by the Board August 2010 1. Introduction As individuals, we want to know that personal information about ourselves is handled properly, and we and others have specific rights in this

More information

Data Protection Act a more detailed guide

Data Protection Act a more detailed guide Data Protection Act a more detailed guide What does the Act do? The Data Protection Act 1998 places considerable duties on organisations which process personal data; increases the rights of access by data

More information

Privacy Policy for Data Collected by Blue State Digital s Clients

Privacy Policy for Data Collected by Blue State Digital s Clients Privacy Policy for Data Collected by Blue State Digital s Clients Blue State Digital LLC. ("Blue State Digital", BSD or "we") provides various services to nonprofits and business entities ("Clients"),

More information

10 DATABASE PRACTICE

10 DATABASE PRACTICE 10 DATABASE PRACTICE Background Marketers must comply with all relevant data protection legislation. Guidance on that legislation is available from the Information Commissioner's Office. Although data

More information

Cookies Compliance Advisory

Cookies Compliance Advisory Cookies Compliance Advisory Note: this is an advisory notice that summarises the current position of the Article 29 Working Group and makes suggestions as to how organisations might practically achieve

More information

1. Understanding Big Data

1. Understanding Big Data Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview Erik Luysterborg Partner, Deloitte EMEA Data Protection & Privacy leader Prague, SCCE, March 22 nd 2016 1. 2016 Deloitte

More information

work Privacy Your Your right to Rights Know

work Privacy Your Your right to Rights Know Your right to Privacy Know Your Rights www.worksmart.org.uk at work Everyone has the right to a private life even when they re at work. But new technology is making it easier than ever for employers to

More information

ETHICAL AND LEGAL ISSUES IN DATA SHARING - OVERVIEW

ETHICAL AND LEGAL ISSUES IN DATA SHARING - OVERVIEW ETHICAL AND LEGAL ISSUES IN DATA SHARING - OVERVIEW.... LIBBY BISHOP UNIVERSITY OF ESSEX.... LOOKING AFTER AND MANAGING YOUR RESEARCH DATA (GOING DIGITAL AND ESRC ATN EVENTS), COLCHESTER, 24-25 APRIL 2013

More information

10 Critical Requirements for Cloud Applications. How to Recognize Cloud Providers and Applications that Deliver Real Value

10 Critical Requirements for Cloud Applications. How to Recognize Cloud Providers and Applications that Deliver Real Value 10 Critical Requirements for Cloud Applications How to Recognize Cloud Providers and Applications that Deliver Real Value 1 10 Critical Requirements for Cloud Applications How to Recognize Cloud Providers

More information

The big data dilemma an inquiry by the House of Commons Select Committee on Science and Technology

The big data dilemma an inquiry by the House of Commons Select Committee on Science and Technology The big data dilemma an inquiry by the House of Commons Select Committee on Science and Technology Evidence from the UK Computing Research Committee Definitive. 1 September 2015 The UK Computing Research

More information

CORK INSTITUTE OF TECHNOLOGY

CORK INSTITUTE OF TECHNOLOGY CORK INSTITUTE OF TECHNOLOGY DATA PROTECTION POLICY APPROVED BY GOVERNING BODY ON 30 APRIL 2009 INTRODUCTION Cork Institute of Technology is committed to a policy of protecting the rights and privacy of

More information

Data Protection for the Guidance Counsellor. Issues To Plan For

Data Protection for the Guidance Counsellor. Issues To Plan For Data Protection for the Guidance Counsellor Issues To Plan For Author: Hugh Jones Data Protection Specialist Longstone Management Ltd. Published by the National Centre for Guidance in Education (NCGE)

More information

Information Governance

Information Governance WHITE PAPER Information Governance Irrelevant, overhead or central to survival? Setting the information governance agenda Table of Contents Introduction... 1 Defining the importance of information governance...

More information

Data Protection Policy June 2014

Data Protection Policy June 2014 Data Protection Policy June 2014 Approving authority: Consultation via: Court Audit and Risk Committee, University Executive, Secretary's Board, Information Governance and Security Group Approval date:

More information

Dublin City University

Dublin City University Dublin City University Data Protection Policy Data Protection Policy Contents Purpose... 1 Scope... 1 Data Protection Principles... 1 Disclosure of Personal Data... 2 Summary of Responsibilities... 3 Rights

More information

Better Together Whitepaper

Better Together Whitepaper Better Together Whitepaper The Importance of Aligning All Your Data Components PERMISSIONED MARKETING THE NEW CLIMATE 1. Permissioned Marketing - The New Climate When the DPA was created, the Internet

More information

Procedures for obtaining informed consent for recordings and images of people to support Data Protection Policy

Procedures for obtaining informed consent for recordings and images of people to support Data Protection Policy Procedures for obtaining informed consent for recordings and images of people to support Data Protection Policy Heriot-Watt Procedures for responding to requests for personal data; to support Data Protection

More information

BIG DATA AND THE INTERNET OF THINGS

BIG DATA AND THE INTERNET OF THINGS BIG DATA AND THE INTERNET OF THINGS 12 September 2013 Robert Bond Partner and Notary Public Janine Regan Solicitor Tughan Thuraisingam Paralegal Our team Speechly Bircham is an ambitious, full-service

More information

Information Management

Information Management G i Information Management Information Management Planning March 2005 Produced by Information Management Branch Open Government Service Alberta 3 rd Floor, Commerce Place 10155 102 Street Edmonton, Alberta,

More information

Data Protection Act 1998. Guidance on the use of cloud computing

Data Protection Act 1998. Guidance on the use of cloud computing Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered

More information

INFORMATION MANAGEMENT STRATEGIC FRAMEWORK GENERAL NAT 11852-08.2004 OVERVIEW

INFORMATION MANAGEMENT STRATEGIC FRAMEWORK GENERAL NAT 11852-08.2004 OVERVIEW GENERAL OVERVIEW NAT 11852-08.2004 SEGMENT FORMAT PRODUCT ID INFORMATION MANAGEMENT STRATEGIC FRAMEWORK In the context of the Information Management Strategic Framework, information is defined as: information

More information

Data Protection Act. Conducting privacy impact assessments code of practice

Data Protection Act. Conducting privacy impact assessments code of practice Data Protection Act Conducting privacy impact assessments code of practice 1 Conducting privacy impact assessments code of practice Data Protection Act Contents Information Commissioner s foreword... 3

More information

DATA AND PAYMENT SECURITY PART 1

DATA AND PAYMENT SECURITY PART 1 STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of

More information

Data protection registration: nature of work descriptions

Data protection registration: nature of work descriptions Data protection registration: nature of work descriptions Telecoms and ISPs We use these descriptions to help us process your registration: Internet Service Provider Networking Site Telecommunications

More information

Key issues in data protection: a pan-european view

Key issues in data protection: a pan-european view Key issues in data protection: a pan-european view 19 th March 2014 Nicola Fulford, Kemp Little LLP, UK Andreas Peschel-Mehner, SKW Schwarz, Germany Marco Bellezza, Portolano Cavallo, Italy Emmanuel Schulte,

More information

Cloud (educational apps) software services and the Data Protection Act

Cloud (educational apps) software services and the Data Protection Act Cloud (educational apps) software services and the Data Protection Act Departmental advice for local authorities, school leaders, school staff and governing bodies October 2014 Contents 1. Summary 3 About

More information

Office of the Data Protection Commissioner of The Bahamas. Data Protection (Privacy of Personal Information) Act, 2003. A Guide for Data Controllers

Office of the Data Protection Commissioner of The Bahamas. Data Protection (Privacy of Personal Information) Act, 2003. A Guide for Data Controllers Office of the Data Protection Commissioner of The Bahamas Data Protection (Privacy of Personal Information) Act, 2003 A Guide for Data Controllers 1 Acknowledgement Some of the information contained in

More information

Data Monetization in the Age of Big Data 1

Data Monetization in the Age of Big Data 1 Harnessing the potential of Big Data seems to be on the agenda of every mobile operator and rightly so. In today s climate of convergence, in which new technologies and networks are blurring industry lines,

More information

Getting the most from customer data a key asset for franchising growth

Getting the most from customer data a key asset for franchising growth Getting the most from customer data a key asset for franchising growth December 2013 1 Getting the most from customer data a key asset for franchising growth Introduction Increasingly in the future, when

More information

Connected car, big data, big brother?

Connected car, big data, big brother? Connected car, big data, big brother? Using geolocation in a trustworthy and compliant way Simon.Hania@tomtom.com Trends that threaten trust 2 Connected cars with downloadable apps Location services, cloud,

More information

Privacy Impact Assessment and Information Governance Checklist

Privacy Impact Assessment and Information Governance Checklist Privacy Impact Assessment and Information Governance Checklist Review and Amendment Log / Control Sheet Responsible Officer: Clinical Chief Officer Clinical Lead: Author: Dr. Dave Mitchell Medical Director/Caldicott

More information

How To Understand The Data Protection Act

How To Understand The Data Protection Act DATA PROTECTION ACT 2002 The Basics Purpose of the Act Balance the rights of an individual with an organisation s legitimate need to process personal data Promote openness and transparency Establish and

More information

IBM Software A Journey to Adaptive MDM

IBM Software A Journey to Adaptive MDM IBM Software A Journey to Adaptive MDM What is Master Data? Why is it Important? A Journey to Adaptive MDM Contents 2 MDM Business Drivers and Business Value 4 MDM is a Journey 7 IBM MDM Portfolio An Adaptive

More information

The Manitowoc Company, Inc.

The Manitowoc Company, Inc. The Manitowoc Company, Inc. DATA PROTECTION POLICY 11FitzPatrick & Associates 4/5/04 1 Proprietary Material Version 4.0 CONTENTS PART 1 - Policy Statement PART 2 - Processing Personal Data PART 3 - Organisational

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY DATA PROTECTION POLICY The information and guidelines within this Policy are important and apply to all members, Fellows and staff of the College 1. INTRODUCTION Like all educational establishments, the

More information

Lunch & Learn: Big Data Analytics

Lunch & Learn: Big Data Analytics 239767 Lunch & Learn: Big Data Analytics 13 April 2015 Sue McLean Alex van der Wolk 2015 Morrison & Foerster (UK) LLP All Rights Reserved mofo.com Lunch & Learn 2 nd Monday of each month 45 minutes via

More information

The potential legal consequences of a personal data breach

The potential legal consequences of a personal data breach The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.

More information

Human Resources and Data Protection

Human Resources and Data Protection Human Resources and Data Protection Contents 1. Policy Statement... 1 2. Scope... 2 3. What is personal data?... 2 4. Processing data... 3 5. The eight principles of the Data Protection Act... 4 6. Council

More information

Legal session: copyright status of statistical data, privacy issues

Legal session: copyright status of statistical data, privacy issues Legal session: copyright status of statistical data, privacy issues JISC Usage Statistics Workshop Pr o f. Dr. Mic h ael S ead l e 1 Statistics as Facts Copyright protects expression, not fact. Facts per

More information

Hyper-Personalization with MNO Subscriber Data

Hyper-Personalization with MNO Subscriber Data Hyper-Personalization with MNO Subscriber Data Approaches and Recent Trends Regarding the Use of MNO Data for Hyper-Personalization By Zach Cohen, Shahzad Zia and Carly Christian Private and public-sector

More information

Attitudes to Use of Social Networks in the Workplace and Protection of Personal Data

Attitudes to Use of Social Networks in the Workplace and Protection of Personal Data Attitudes to Use of Social Networks in the Workplace and Protection of Personal Data David Haynes, City University, School of Informatics, Department of Information Science August 2011 Background Two surveys

More information

Cookie Policy. Introduction About Cookies

Cookie Policy. Introduction About Cookies Introduction About Cookies Cookie Policy Most websites you visit will use in order to improve your user experience by enabling that website to remember you, either for the duration of your visit (using

More information

2. What personal information do we collect and hold?

2. What personal information do we collect and hold? PRIVACY POLICY Conexus Financial Pty Ltd [ABN 51 120 292 257], (referred to as Conexus, us, we" or our"), are committed to protecting the privacy of the personal information that we collect and complying

More information

to getting started with individual-level online data

to getting started with individual-level online data BEST PRACTICES 5 top tips Celebrus Technologies Ltd, formerly know as Speed-Trap to getting started with individual-level online data p1 Introduction Engaging customers in a meaningful dialogue which ultimately

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY MILNBANK HOUSING ASSOCIATION DATA PROTECTION POLICY LS/NOV.2011/REF.P14 1) INTRODUCTION Milnbank Housing Association recognises that the Data Protection Act 1998 is an important piece of legislation to

More information

BUILDING THE NEW BUSINESS CASE FOR ITAM

BUILDING THE NEW BUSINESS CASE FOR ITAM BEYOND TOOLS: BUSINESS INTELLIGENCE MEETS ANALYTICS BUILDING THE NEW BUSINESS CASE FOR ITAM Frank Venezia, Siwel Consulting, Inc. Steffani Lomax, Siwel Consulting, Inc. White Paper - November 2013 SM Building

More information

Business to business promotions and comparative advertisements. A quick guide to the Business Protection from Misleading Marketing Regulations 2008

Business to business promotions and comparative advertisements. A quick guide to the Business Protection from Misleading Marketing Regulations 2008 Business to business promotions and comparative advertisements A quick guide to the Business Protection from Misleading Marketing Regulations 2008 This guidance provides an overview of the Business Protection

More information

Information Governance Checklist and Privacy Impact Assessments

Information Governance Checklist and Privacy Impact Assessments Information Governance Checklist and Privacy Impact Assessments Authorship: Committee Approved: Chris Wallace Information Governance Manager Quality and Clinical Governance Committee Approved date: 1 Feb

More information

Captain Compare Privacy Policy

Captain Compare Privacy Policy Captain Compare Privacy Policy This Privacy Policy contains important information about the type of personal information we collect from you on the Captain Compare website (www.captaincompare.com.au) (Website),

More information

Surveillance Camera Code of Practice. June 2013

Surveillance Camera Code of Practice. June 2013 Surveillance Camera Code of Practice June 2013 Surveillance Camera Code of Practice Presented to Parliament Pursuant to Section 30 (1) (a) of the Protection of Freedoms Act 2012 June 2013 London: The Stationery

More information

Mobile Marketing Survey. Looking at the use of mobile media, tactics and budgets, by Irish marketers in 2013 and 2014

Mobile Marketing Survey. Looking at the use of mobile media, tactics and budgets, by Irish marketers in 2013 and 2014 Mobile Marketing Survey Looking at the use of mobile media, tactics and budgets, by Irish marketers in 2013 and 2014 Paul Dalton 19/3/2014 SURVEY 2014 CONTENTS 1 INTRODUCTION 2 Forward by Tom Trainor CEO

More information

INFORMATION GOVERNANCE POLICY

INFORMATION GOVERNANCE POLICY INFORMATION GOVERNANCE POLICY Primary Intranet Location Information Management & Governance Version Number Next Review Year Next Review Month 7.0 2018 January Current Author Phil Cottis Author s Job Title

More information

Corporate websites, the cornerstone of your digital marketing strategy.

Corporate websites, the cornerstone of your digital marketing strategy. Corporate websites, the cornerstone of your digital marketing strategy. Never before have companies had so many different ways of reaching their target audience. Social networks, new technologies and the

More information

BLUE BADGE INSURANCE PTY LTD BLUE BADGE COMMUNITY AUSTRALIA PTY LTD PRIVACY POLICY

BLUE BADGE INSURANCE PTY LTD BLUE BADGE COMMUNITY AUSTRALIA PTY LTD PRIVACY POLICY BLUE BADGE INSURANCE PTY LTD BLUE BADGE COMMUNITY AUSTRALIA PTY LTD PRIVACY POLICY Version 1-1 1 July 2015 Blue Badge Insurance Australia Pty Ltd 2014 ABN 59 162 783 306 A.R. No. 438547 is an Authorised

More information

WEBSITE PRIVACY POLICY. Last modified 10/20/11

WEBSITE PRIVACY POLICY. Last modified 10/20/11 WEBSITE PRIVACY POLICY Last modified 10/20/11 1. Introduction 1.1 Questions. This website is owned and operated by. If you have any questions or concerns about our Privacy Policy, feel free to email us

More information

Harness the power of data to drive marketing ROI

Harness the power of data to drive marketing ROI Harness the power of data to drive marketing ROI I need to get better results from my marketing......and improve my return on investment. Are you directing spend where it ll have the greatest effect? MAKING

More information

A Future Without Secrets. A NetPay Whitepaper. www.netpay.co.uk www.netpay.ie. more for your money

A Future Without Secrets. A NetPay Whitepaper. www.netpay.co.uk www.netpay.ie. more for your money A Future Without Secrets A NetPay Whitepaper A Future Without Secrets The new business buzz word is Big Data - everyone who is anyone in business is talking about it, but is this terminology just another

More information

Building Equality, Diversity and Inclusion into the NHS Board Selection Process for Non Executives and Independent Directors March 2012 Edition

Building Equality, Diversity and Inclusion into the NHS Board Selection Process for Non Executives and Independent Directors March 2012 Edition Building Equality, Diversity and Inclusion into the NHS Board Selection Process for Non Executives and Independent Directors March 2012 Edition The NHS Leadership Academy s purpose is to develop outstanding

More information

15 Reasons to use Professional Web Developers

15 Reasons to use Professional Web Developers Web Content Pillar #1, January 2014 15 Reasons to use Professional Web Developers Your company s website is your shop window to the world. If you get your web design wrong in terms of its look, feel and

More information

Data Protection Avoiding Information Commissioner Fines. Caroline Egan 5 June 2014

Data Protection Avoiding Information Commissioner Fines. Caroline Egan 5 June 2014 Data Protection Avoiding Information Commissioner Fines Caroline Egan 5 June 2014 Why is data protection a hot topic in pensions? Pension schemes hold large amounts of personal data Individuals more aware

More information

INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK

INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Information Governance Strategic

More information

Information Governance Policy

Information Governance Policy Information Governance Policy UNIQUE REF NUMBER: AC/IG/013/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY

More information

A list of CIArb subsidiaries relevant to this notice and their activities is set out below.

A list of CIArb subsidiaries relevant to this notice and their activities is set out below. CHARTERED INSTITUTE OF ARBITRATORS DATA PRIVACY NOTICE INTRODUCTION This data protection notice explains what personal data will be collected by the Chartered Institute of Arbitrators and its subsidiary

More information

Information Governance Policy

Information Governance Policy Information Governance Policy Implementation date: 30 September 2014 Control schedule Approved by Corporate Policy and Strategy Committee Approval date 30 September 2014 Senior Responsible Officer Kirsty-Louise

More information

Elevate Customer Experience and Engagement in the New Digital World

Elevate Customer Experience and Engagement in the New Digital World Elevate Customer Experience and Engagement in the New Digital World John Chan CRM Solutions Lead, Microsoft Business Solutions Microsoft Asia Customer buying behavior has fundamentally changed therefore,

More information