Privacy by Design Practical aspects. Jaap-Henk Hoepman Radboud University Nijmegen
|
|
- Toby Morris
- 7 years ago
- Views:
Transcription
1 Privacy by Design Practical aspects Jaap-Henk Hoepman Radboud University Nijmegen
2 2
3 Dank u voor uw aandacht 3
4 PI.lab Collaboration between: Radboud Universiteit ICIS Tilburg Universiteit TILT TNO Security; Strategy & Policy Scientific director Jaap-Henk Hoepman Business director Marc van Lieshout 4
5 About me Associate professor Radboud Universiteit Privacy enhancing technologies Applied cryptography Internet of Things Blogger 5
6 Government surveillance 6
7 Commercial surveillance 7
8 Privacy definities The right to be let alone [Warren & Brandeis, 1890] Informationeel zelfbeschikkingsrecht: Het recht om zelf te beslissen wanneer, hoe en in welke mate persoonlijke informatie met anderen wordt gedeeld. [Westin, 1967] Vrijheid van onredelijke beperkingen om je eigen identiteit te construeren. [Agre & Rottenberg, 2001] Contextuele integriteit: het recht om te voorkomen dat informatie uit een bepaalde context gebruikt wordt in een andere context. [Nissenbaum, 2004] 8
9 Een metafoor voor het belang van privacy orwell / big brother chandler / little sister kafka / the trial 9
10 Different types of data/information Volunteered What you reveal explicitly when asked Observed What you reveal implicitly by your behaviour Inferred What is derived from other data about you Transfer [World Economic Forum Report Personal Data: The Emergence of a New Asset Class] 10
11 Privacy by design Protect privacy during technology development: From conception to realisation. Throughout the system development lifecycle 11
12 Software development cycle Concept Development 12 Implementation Privacy enhancing technologies
13 Impact assessment & strategies Privacy Impact Assessment Concept Development Analysis Privacy Design Strategies 13
14 Individuals Database tables Attributes minimise separate aggregate hide 14
15 Acht privacy design strategiën 15
16 What is Data Processing Action Relevant GDPR Personal Data Processing Examples Operate Adaptation; Alteration; Retrieval; Consultation; Use; Alignment; Combination Organisation; Structuring; Storage Store Retain Collect Share Change Breach opposite to (Erasure; Destruction) Collection; Recording Transmission; Dissemination; Making Available; opposite to (Restriction; Blocking) unauthorised third party (Adaptation; Alteration; Use; Alignment; Combination) unauthorised third party (Retrieval; Consultation) 16
17 preventing limiting as much as possible by providing storage, or operation on as abundant as possible for collection, retention, sharing, ensuring changes, breaches personal data, in a timely manner, within the constraints of the agreed upon purposes. The 8 privacy design strategies in detail Strategy Underlying Goals Effects on Actions Regarding Personal Data ENFORCE DEMONSTRATE commitment evidence creating, maintaining and upholding on policies and technical testing, auditing, logging, and reporting controls regarding CONTROL means consenting to, choosing, updating, and retracting From INFORM clarity providing, explaining, and notifying On sharing MINIMISE usage excluding, selecting, stripping, or destroying retention AGGREGATE detail summarising or grouping SEPARATE correlation distributing or isolating Any collection HIDE exposure mixing, obfuscating, dissociating, or restricting access to sharing 17
18 Examples EXAMPLES 18
19 Social networks Centralised Peer to peer 19
20 Cloud Cloud provider has the key Only user has the key 20
21 eid: traditional Security and privacy risks User All parties are on line Identity Provider attributes Relying Party 21
22 eid: ABC based : Issuing User Credential Issuer Relying Party 22
23 eid: ABC based : showing User unlinkable Has certificate granting access to attributes Credential Issuer Relying Party 23
24 Zero knowledge 24
25 Discussie 25 [Monty Python s Argument Clinic sketch]
Can we save our online freedom?
Can we save our online freedom? Jaap-Henk Hoepman TNO, Groningen, the Netherlands jaap-henk.hoepman@tno.nl Digital Security (DS) Radboud University Nijmegen, the Netherlands jhh@cs.ru.nl / www.cs.ru.nl/~jhh
More informationPrivacy by Design. Strategies & Patterns. Jaap-Henk Hoepman. Digital Security (DS) Radboud University Nijmegen, the Netherlands
Privacy by Design Strategies & Patterns Jaap-Henk Hoepman Digital Security (DS) Radboud University Nijmegen, the Netherlands @xotoxot // jhh@cs.ru.nl // www.cs.ru.nl/~jhh Introduction Security Privacy
More informationAssuring the Cloud. Hans Bootsma Deloitte Risk Services hbootsma@deloitte.nl +31 (0)6 1098 0182
Assuring the Cloud Hans Bootsma Deloitte Risk Services hbootsma@deloitte.nl +31 (0)6 1098 0182 Need for Assurance in Cloud Computing Demand Fast go to market Support innovation Lower costs Access everywhere
More informationData Protection Policy
Data Protection Policy September 2015 Contents 1. Scope 2. Purpose 3. Data protection roles 4. Staff training and guidance 5. About the Data Protection Act 1998 6. Policy 7. The Information Commissioner's
More informationUvA college Governance and Portfolio Management
UvA college Han Verniers Principal Consultant Han.Verniers@LogicaCMG.com Programma Governance IT Governance, wat is dat? Governance: structuren, processen, instrumenten Portfolio Management Portfolio Management,
More informationISACA Roundtable. Cobit and Grab@Pizza 7 september 2015
1 ISACA Roundtable 7 september 2015 ISACA Roundtable Cobit and Grab@Pizza 7 september 2015 2015 KPN Corporate Market B.V. ISACA, is a registered trademark of the Information Systems Audit and Control Association
More informationData protection policy
Data protection policy Introduction 1 This document is the data protection policy for the Nursing and Midwifery Council (NMC). 2 The Data Protection Act 1998 (DPA) governs the processing of personal data
More informationOversight Management: een zinvolle aanvulling!
Oversight Management: een zinvolle aanvulling! Houfhoff Pension Fund Academy Christiaan Tromp info@fiduciaryservices.eu April 2012 1 Agenda The Fiduciary Management promise The evolution of Pension Fund
More informationCorporate Policy and Procedure
Page Page 1 of 9 TAB: SECTION: SUBJECT: ROADS AND TRAFFIC TRAFFIC OPERATIONS CLOSED CIRCUIT TELEVISION (CCTV) TRAFFIC MONITORING SYSTEMS POLICY STATEMENT POLICY PURPOSE The City of Mississauga may install
More informationEEN HUIS BESTUREN ALS EEN FABRIEK,
EEN HUIS BESTUREN ALS EEN FABRIEK, HOE DOE JE DAT? Henk Akkermans World Class Maintenance & Tilburg University Lezing HomeLab 2050, KIVI, 6 oktober, 2015 The opportunity: an industrial revolution is happening
More informationlegal & ethical data sharing prof.dr. Ronald Leenes r.e.leenes@uvt.nl TILT - Tilburg Institute for Law, Technology, and Society
legal & ethical data sharing prof.dr. Ronald Leenes r.e.leenes@uvt.nl TILT - Tilburg Institute for Law, Technology, and Society overview the problem revisited secondary use data protection regulation Data
More informationPrivacy & data protection in big data: Fact or Fiction?
Privacy & data protection in big data: Fact or Fiction? Athena Bourka ENISA ISACA Athens Conference 24.11.2015 European Union Agency for Network and Information Security Agenda 1 Privacy challenges in
More informationData Processing Agreement for Oracle Cloud Services
Data Processing Agreement for Oracle Cloud Services Version December 1, 2013 1. Scope and order of precedence This is an agreement concerning the Processing of Personal Data as part of Oracle s Cloud Services
More informationData Governance Policy. Staff Only Students Only Staff and Students. Vice-Chancellor
Name of Policy Description of Policy Policy applies to Data Governance Policy To establish proper standards to assure the quality and integrity of University data. This policy also defines the roles and
More informationHow To Understand The Data Protection Act
DATA PROTECTION ACT 2002 The Basics Purpose of the Act Balance the rights of an individual with an organisation s legitimate need to process personal data Promote openness and transparency Establish and
More informationLast updated: 30 May 2016. Credit Suisse Privacy Policy
Last updated: 30 May 2016 Credit Suisse Please read this privacy policy (the ) as it describes how we intend to collect, use, store, share, and safeguard your information. By accessing, visiting or using
More informationOverview. Data protection in a swirl of change 28.03.2014. Cloud computing. Software as a service. Infrastructure as a service. Platform as a service
Data protection in a swirl of change Overview 1 Data protection issues in cloud computing 2 Consent for mobile applications Security Seminar 2014: Privacy Radboud University Nijmegen 3 The WhatsApp case
More informationGUIDE TO THE ISLE OF MAN DATA PROTECTION ACT. CONTENTS PREFACE 1 1. Background 2 2. Data Protections Principles 3 3. Notification Requirements 4
GUIDE TO THE ISLE OF MAN DATA PROTECTION ACT CONTENTS PREFACE 1 1. Background 2 2. Data Protections Principles 3 3. Notification Requirements 4 PREFACE The following provides general guidance on data protection
More informationIT-waardeketen management op basis van eeuwenoude supply chain kennis
IT-waardeketen management op basis van eeuwenoude supply chain kennis Hans van Aken / November 28, 2012 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject
More informationCouncil Policy. Records & Information Management
Council Policy Records & Information Management COUNCIL POLICY RECORDS AND INFORMATION MANAGEMENT Policy Number: GOV-13 Responsible Department(s): Information Systems Relevant Delegations: None Other Relevant
More informationRisk-Based Monitoring
Risk-Based Monitoring Evolutions in monitoring approaches Voorkomen is beter dan genezen! Roelf Zondag 1 wat is Risk-Based Monitoring? en waarom doen we het? en doen we het al? en wat is lastig hieraan?
More informationFIRST DATA CORPORATION PROCESSOR DATA PROTECTION STANDARDS
FIRST DATA CORPORATION PROCESSOR DATA PROTECTION STANDARDS As a world leader in electronic commerce and payment services, First Data Corporation and its subsidiaries ( First Data entity or entities ),
More informationProtecting Official Records as Evidence in the Cloud Environment. Anne Thurston
Protecting Official Records as Evidence in the Cloud Environment Anne Thurston Introduction In a cloud computing environment, government records are held in virtual storage. A service provider looks after
More informationUsing AWS in the context of Australian Privacy Considerations October 2015
Using AWS in the context of Australian Privacy Considerations October 2015 (Please consult https://aws.amazon.com/compliance/aws-whitepapers/for the latest version of this paper) Page 1 of 13 Overview
More informationwhat can we do with botnet data?
what can we do with botnet data? prof.dr. Ronald Leenes r.e.leenes@uvt.nl TILT - Tilburg Institute for Law, Technology, and Society background SURFnet (Dutch NREN) was offered 700 GB of data obtained from
More information1. Introduction. 2. Sectoral Areas Affected. 3. Data Security. 4. Data Breach Requirements. 5. Traffic Data
1. Introduction Special data protection rules apply to the protection of Personal Data by Data Controllers in the electronic communications sector. These are in addition to the general obligations that
More informationPrivacy by Design. Ian Brown, Prof. of Information Security and Privacy Oxford Internet Institute, University of Oxford @IanBrownOII
Privacy by Design Ian Brown, Prof. of Information Security and Privacy Oxford Internet Institute, University of Oxford @IanBrownOII Privacy by Design principles 1. Proactive not Reactive; Preventative
More informationMIS Privacy Statement. Our Privacy Commitments
MIS Privacy Statement Our Privacy Commitments MIS Training Institute Holdings, Inc. (together "we") respect the privacy of every person who visits or registers with our websites ("you"), and are committed
More informationPrivacy Policy and Notice of Information Practices
Privacy Policy and Notice of Information Practices Effective Date: April 27, 2015 BioMarin Pharmaceutical Inc. ("BioMarin") respects the privacy of visitors to its websites and online services and values
More informationFINANCIAL SHARED SERVICES
FINANCIAL SHARED SERVICES Arie Geneugelijk, John Vervloet & Djimmy Zeijpveld 9-3-2016 Agenda Waarom bent u hier? Praktijkvoorbeeld Exact: Transitie naar shared service center Demonstratie Vragen? Waarom
More informationUNIVERSITY COLLEGE LONDON CCTV POLICY. Endorsed by the Security Working Group - 17 October 2012
UNIVERSITY COLLEGE LONDON CCTV POLICY Endorsed by the Security Working Group - 17 October 2012 Endorsed by the Infrastructure IT Services Strategy Group - 18 October 2012 Reviewed and endorsed (with one
More informationCorporate Security & Identity
ir. Yvan De Mesmaeker Secretary general ir. Yvan De Mesmaeker Secretary general of the European Corporate Security Association - ECSA Education: MSc in Engineering Professional responsibilities: Secretary
More informationCCG: IG06: Records Management Policy and Strategy
Corporate CCG: IG06: Records Management Policy and Strategy Version Number Date Issued Review Date V3 08/01/2016 01/01/2018 Prepared By: Consultation Process: Senior Governance Manager, NECS CCG Head of
More informationMarket Intelligence & Research Services. CRM Trends Overview. MarketCap International BV Januari 2011
Market Intelligence & Research Services CRM Trends Overview MarketCap International BV Januari 2011 Index 1. CRM Trends generiek 2. CRM & IT 3. CRM in Nederland 2011 2 Index 1. CRM Trends generiek 2. CRM
More informationNetwork Assessment Client Risk Report Demo
Network Assessment Client Risk Report Demo Prepared by: Henry Knoop Opmerking: Alle informatie in dit rapport is uitsluitend bestemd voor gebruik bij bovenvermelde client. Het kan vertrouwelijke en persoonlijke
More informationService Definition Document
Service Definition Document QinetiQ Secure Cloud Protective Monitoring Service (AWARE) QinetiQ Secure Cloud Protective Monitoring Service (DETER) Secure Multi-Tenant Protective Monitoring Service (AWARE)
More informationBig Data for Mutuals. Marc Dautlich 25 November 2013
Big Data for Mutuals Marc Dautlich 25 November 2013 Agenda BIG DATA What is it? OPPORTUNITIES What are they? LEGAL CHALLENGES How do we overcome them? LEGAL REFORM What can we do now to minimise impact?
More informationSECURITY ENCRYPTION DATA PROTECTION. The Complete Guide to Body Worn Camera Data Protection BODY WORN CAMERA STORAGE
SECURITY DATA PROTECTION ENCRYPTION BODY WORN CAMERA STORAGE The Complete Guide to Body Worn Camera Data Protection Overview Edesix has been providing technology solutions to organisations for over ten
More informationHet Secure Datacenter
Het Secure Datacenter If trust and reliability matters Michiel Steltman CTO Siennax Drivers voor IT Security Financiële aansprakelijkheid Sox, Basel II Persoonlijke aansprakelijkheid van managers Operationele
More informationHIPPO STUDY DG Education And Culture Study On The Cooperation Between HEIs And Public And Private Organisations In Europe. Valorisatie 9/26/2013
Valorisatie Hoe goed doen we het in Nederland en doet het HBO het anders dan universiteiten? Peter van der Sijde Todd Davey HIPPO STUDY DG Education And Culture Study On The Cooperation Between HEIs And
More informationData controllers and data processors: what the difference is and what the governance implications are
ICO lo : what the difference is and what the governance implications are Data Protection Act Contents Introduction... 3 Overview... 3 Section 1 - What is the difference between a data controller and a
More informationCLOUD COMPUTING FOR ehealth DATA PROTECTION ISSUES
CLOUD COMPUTING FOR ehealth DATA PROTECTION ISSUES GLOBAL FORUM 2009 ICT & The Future of the Internet - Monday, October 19 th 2009 paolo.balboni@bakernet.com Introduction & Structure ENISA Working Group
More informationFROM ENERGY SUPPLIER TO SMART SERVICES PROVIDER SMART GRID FLANDERS SUMMER SCHOOL 2012
FROM ENERGY SUPPLIER TO SMART SERVICES PROVIDER SMART GRID FLANDERS SUMMER SCHOOL 2012 1 The electricity sector has entered a major transition period The old world: Large centralized generation units (baseload,
More informationAuteur. Onderwerp. Datum
Auteur DLA PIPER Be Aware Employment, Pensions and Benefits www.dlapiper.com Onderwerp Does the employee who uses a company car (even only occasionally) to transport a colleague have to possess a certificate
More informationBasispatroon muts rounded top.
Basispatroon muts rounded top. Breipatroon voor eenvoudige muts, gebruikte steken zijn recht / averecht op rondbreinaald en tweepunts naalden voor de top. De boord wordt 1r 1a of 2r 2a gebreid. Je kunt
More informationRecommendations for the PIA. Process for Enterprise Services Bus. Development
Recommendations for the PIA Process for Enterprise Services Bus Development A Report by the Data Privacy and Integrity Advisory Committee This report reflects the consensus recommendations provided by
More informationCorporate Data Protection Policy
Corporate Data Protection Policy September 2010 Records Management Policy RMP-09 GOLDEN RULE When you think about Data Protection remember that we are all data subjects. Think about how appropriately and
More information1. Understanding Big Data
Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview Erik Luysterborg Partner, Deloitte EMEA Data Protection & Privacy leader Prague, SCCE, March 22 nd 2016 1. 2016 Deloitte
More informationMRS Guidelines for Business-to-Business Research. October 2011
MRS Guidelines for Business-to-Business Research October 2011 Updated September 2014 MRS is the world s largest association for people and organisations that provide or use market, social and opinion research,
More informationATMD Bird & Bird. Singapore Personal Data Protection Policy
ATMD Bird & Bird Singapore Personal Data Protection Policy Contents 1. PURPOSE 1 2. SCOPE 1 3. COMMITMENT TO COMPLY WITH DATA PROTECTION LAWS 1 4. PERSONAL DATA PROTECTION SAFEGUARDS 3 5. ATMDBB EXCEPTIONS:
More informationHow To Know What You Can And Can'T Do At The University Of England Students Union
HOW WE USE YOUR INFORMATION This privacy notice tells you what to expect when University of Essex Students Union (referred to as the SU herein) collects personal information. It applies to information
More informationFalkirk Council Data Protection Guidelines
Falkirk Council Data Protection Guidelines Contents Contents 2 Objectives 3 What does the Data Protection Act 1998 do? 3 Who is who under the Data Protection Act 1998? 4 Definitions 4 The Eight Principles
More informationIT Works check. December 12th, 2012
IT Works check December 12th, 2012 RESOC RESOC-SERR Gent en rondom Gent RESOC Gent en rondom Gent = Committee for regional social-economic consultation Representatives of: City of Ghent + 9 municipalities
More informationPlatform voor Informatiebeveiliging IB Governance en management dashboards
Platform voor Informatiebeveiliging IB Governance en management dashboards Johan Bakker MSc CISSP ISSAP Principal Policy Advisor KPN Corporate Center Information Security Governance Agenda Drivers voor
More informationUw partner in system management oplossingen
Uw partner in system management oplossingen User Centric IT Bring your Own - Corporate Owned Onderzoek Forrester Welke applicatie gebruik je het meest op mobiele devices? Email 76% SMS 67% IM / Chat 48%
More informationHelp! Financiële planning PDF
Help! Financiële planning PDF ==>Download: Help! Financiële planning PDF ebook Help! Financiële planning PDF - Are you searching for Help! Financiële planning Books? Now, you will be happy that at this
More informationFirewall Administration and Management
Firewall Administration and Management Preventing unauthorised access and costly breaches G-Cloud 5 Service Definition CONTENTS Overview of Service... 2 Protects Systems and data... 2 Optimise firewall
More informationRecords and Information Management. General Manager Corporate Services
Title: Records and Information Management Policy No: 057 Adopted By: Chief Officers Group Next Review Date: 08/06/2014 Responsibility: General Manager Corporate Services Document Number: 2120044 Version
More informationHow To Design A 3D Model In A Computer Program
Concept Design Gert Landheer Mark van den Brink Koen van Boerdonk Content Richness of Data Concept Design Fast creation of rich data which eventually can be used to create a final model Creo Product Family
More informationCorporate ICT & Data Management. Data Protection Policy
90 Corporate ICT & Data Management Data Protection Policy Classification: Unclassified Date Created: January 2012 Date Reviewed January Version: 2.0 Author: Owner: Data Protection Policy V2 1 Version Control
More information(a) the kind of data and the harm that could result if any of those things should occur;
Cloud Computing This information leaflet aims to advise organisations on the factors they should take into account in considering engaging cloud computing. It explains the relevance of the Personal Data
More informationInformation Management: A common approach
Information Management: A common approach July 2013 Document Control Document history Date Version No. Description Author July 2013 1.0 Final Department of Finance and Services October 2013 1.1 Updated
More informationCloud Software Services for Schools
Request for information on the document re: cloud and secure storage posted on the DfE website, response provided by DfE and Schools Commercial team: The focus of the project is on data security/safety
More informationThe problem of cloud data governance
The problem of cloud data governance Vasilis Tountopoulos, Athens Technology Center S.A. (ATC) CSP EU Forum 2014 - Thursday, 22 nd May, 2014 Focus on data protection in the cloud Why data governance in
More informationUnited States Citizenship and Immigration Services (USCIS) Enterprise Service Bus (ESB)
for the United States Citizenship and Immigration Services (USCIS) June 22, 2007 Contact Point Harry Hopkins Office of Information Technology (OIT) (202) 272-8953 Reviewing Official Hugo Teufel III Chief
More informationINTERNATIONAL SOS. Data Protection Policy. Version 1.05
INTERNATIONAL SOS Data Protection Policy Document Owner: LCIS Division Document Manager: Group General Counsel Effective: December 2008 Revised: 2015 All copyright in these materials are reserved to AEA
More informationKA107 Mobility with partner countries Call 2016 2 nd round. 23 June 2016
KA107 Mobility with partner countries Call 2016 2 nd round 23 June 2016 Agenda Objectives KA107 in Erasmus+ Context of the International dimension HE Erasmus+ at the service of the EU policy (Europe 2020
More informationCHILDREN AND ADULTS SERVICE RESEARCH APPROVAL GROUP
DURHAM COUNTY COUNCIL CHILDREN AND ADULTS SERVICE RESEARCH APPROVAL GROUP INFORMATION PACK Children and Adults Service Version 4 October 2015 Children and Adults Service Research Approval Group Page 1
More informationAnton Wilsens. The LIRIS Academy 2010-2011 Keys to a successful mobile channel in the Financial Services Sector and beyond
LAC - "Architectuur voor nieuwe business modellen in de cloud" The LIRIS Academy 2010-2011 Keys to a successful mobile channel in the Financial Sector and beyond Anton Wilsens Mobile is coming no, wait
More informationStudent Records. 4. Data Security: Upper Yarra Community House Inc. will protect the personal information it
Student Records Objective To ensure that Upper Yarra Community House Inc. collects, uses, stores, retains, archives and destroys information in our student record files according to the requirements of
More informationData Protection Policy
Data Protection Policy Document Ref: DPA20100608-001 Version: 1.3 Classification: UNCLASSIFIED (IL 0) Status: ISSUED Prepared By: Ian Mason Effective From: 4 th January 2011 Contact: Governance Team ICT
More informationHIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
More informationESRC Research Data Policy
ESRC Research Data Policy Introduction... 2 Definitions... 2 ESRC Research Data Policy Principles... 3 Principle 1... 3 Principle 2... 3 Principle 3... 3 Principle 4... 3 Principle 5... 3 Principle 6...
More informationTHE RESEARCHER S GUIDE TO DATA PRIVACY
THE RESEARCHER S GUIDE TO DATA PRIVACY PAUL HANCOCK, ACCESS AND PRIVACY MANAGER, OFFICE OF THE UNIVERSITY COUNSEL KAITLYN GUTTERIDGE, LEAD PRIVACY, POLICY AND AGREEMENTS, POPULATION DATA BC Overview Introduction
More informationPLOT Showcase Nov. 23 rd 2011
PLOT Showcase Nov. 23 rd 2011 Accelerated Stress Testing Electronic Packaging and Interconnects Erik Veninga - TNO Technical Sciences 1 Contents TNO Technical Sciences Materials for Integrated Products
More informationManaging the Challenges of the Cloud Under the New EU General Data Protection Regulation
Managing the Challenges of the Cloud Under the New EU General Data Protection Regulation Introduction European Union data protection law requires organisations to take adequate measures to ensure the security
More informationNederlandse antiterrorismeregelgeving getoetst aan fundamentele rechten. Een analyse met meer bijzonder aandacht voor het EVRM
Nederlandse antiterrorismeregelgeving getoetst aan fundamentele rechten Een analyse met meer bijzonder aandacht voor het EVRM P.H.P.H.M.C. van Kempen & J. Van de Voort Summary Dutch antiterrorism legislation
More informationLIFE INSURANCE ASSOCIATION IRELAND LIMITED MEMBERSHIP TERMS AND CONDITIONS
LIFE INSURANCE ASSOCIATION IRELAND LIMITED MEMBERSHIP TERMS AND CONDITIONS 1. These Terms and Conditions are between you and Life Insurance Association Ireland Limited ( LIA ) and are governed by Irish
More informationInnoveren, dat kan je leren?!
Innoveren, dat kan je leren?! #waardecreatie #integratie #innovatie #heleketen #atypisch @BertVrijhoef Waardecreatie door integratie van zorg- 16 December 2015. Take home messages Als je innoveren niet
More informationIP-NBM. Copyright Capgemini 2012. All Rights Reserved
IP-NBM 1 De bescheidenheid van een schaker 2 Maar wat betekent dat nu 3 De drie elementen richting onsterfelijkheid Genomics Artifical Intelligence (nano)robotics 4 De impact van automatisering en robotisering
More informationWhat can Office 365 do for your organization? Cor Kroon
What can Office 365 do for your organization? Cor Kroon Ciber Knowledge Carrousel 2013 What can Office 365 do for your Organization? Cor Kroon Business Analyst / Senior Microsoft Professional cor.kroon@ciber.nl
More informationHow to manage Business Apps - Case for a Mobile Access Strategy -
How to manage Business Apps - Case for a Mobile Access Strategy - Hans Heising, Product Manager Gábor Vida, Manager Software Development RAM Mobile Data 2011 Content Introduction 2 Bring your own device
More informationCitrix Access Gateway: Implementing Enterprise Edition Feature 9.0
coursemonstercom/uk Citrix Access Gateway: Implementing Enterprise Edition Feature 90 View training dates» Overview Nederlands Deze cursus behandelt informatie die beheerders en andere IT-professionals
More informationINERTIA ETHICS MANUAL
SEVENTH FRAMEWORK PROGRAMME Smart Energy Grids Project Title: Integrating Active, Flexible and Responsive Tertiary INERTIA Grant Agreement No: 318216 Collaborative Project INERTIA ETHICS MANUAL Responsible
More informationLoad Balancing Lync 2013. Jaap Wesselius
Load Balancing Lync 2013 Jaap Wesselius Agenda Introductie Interne Load Balancing Externe Load Balancing Reverse Proxy Samenvatting & Best Practices Introductie Load Balancing Lync 2013 Waarom Load Balancing?
More informationArticle 29 Working Party Issues Opinion on Cloud Computing
Client Alert Global Regulatory Enforcement If you have questions or would like additional information on the material covered in this Alert, please contact one of the authors: Cynthia O Donoghue Partner,
More informationPRESIDENT S DECISION No. 40. of 27 August 2013. Regarding Data Protection at the European University Institute. (EUI Data Protection Policy)
PRESIDENT S DECISION No. 40 of 27 August 2013 Regarding Data Protection at the European University Institute (EUI Data Protection Policy) THE PRESIDENT OF THE EUROPEAN UNIVERSITY INSTITUTE, Having regard
More informationEuropean Commission initiatives on e- and mhealth
European Commission initiatives on e- and mhealth Fundamental Rights Forum, 22 June 2016 WG 24: E-health: improving rights fulfilment through innovation Claudia Prettner, Unit for Health and Well-Being,
More informationPRIVACY POLICY Personal information and sensitive information Information we request from you
PRIVACY POLICY Business Chicks Pty Ltd A.C.N. 121 566 934 (we, us, our, or Business Chicks) recognises and values the protection of your privacy. We also understand that you want clarity about how we manage
More informationWebinar Questions Local Government Data Security Help Improve Your Compliance, 30 July 2015
Webinar Questions Local Government Data Security Help Improve Your Compliance, 30 July 2015 Here are the answers to the questions we were asked during the webinar. There are a few questions we are still
More informationINFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
More informationACCESS CONTROL AND SERVICE-ORIENTED ARCHITECTURES
ACCESS CONTROL AND SERVICE-ORIENTED ARCHITECTURES PROEFSCHRIFT ter verkrijging van de graad van doctor aan de Universiteit van Tilburg, op gezag van de rector magnificus, prof.dr. F.A. van der Duyn Schouten,
More informationMijn spelen is mijn leren, dus speel ik computerspelletjes
De technologie van het leren Mijn spelen is mijn leren, dus speel ik computerspelletjes Jacob van Kokswijk CapGemini Professor in Virtualisation KU Leuven (BE) Universiteit Leuven, BioMedische school,
More informationProtection. Code of Practice. of Personal Data RPC001147_EN_D_19
Protection of Personal Data RPC001147_EN_D_19 Table of Contents Data Protection Rules Foreword From the Data Protection Commissioner Introduction From the Chairman Data Protection Rules Responsibility
More informationA view on governance. SharePoint Kennisdelingsdag. Nick Stuifbergen, consultant Nickstu@microsoft.com. 28 January 2011
A view on governance SharePoint Kennisdelingsdag Nick Stuifbergen, consultant Nickstu@microsoft.com 28 January 2011 Agenda Waar zie je de risico s A view on governance SharePoint landscape SharePoint life
More informationMatthias Hauss- SRC Security Research & Consulting GmbH October 2011. PCI DSS Requirements in the Context of European Data Protection Law
Matthias Hauss- SRC Security Research & Consulting GmbH October 2011 PCI DSS Requirements in the Context of European Data Protection Law About SRC Two pillars: Card-based Payment Systems and IT security
More informationTERRITORY RECORDS OFFICE BUSINESS SYSTEMS AND DIGITAL RECORDKEEPING FUNCTIONALITY ASSESSMENT TOOL
TERRITORY RECORDS OFFICE BUSINESS SYSTEMS AND DIGITAL RECORDKEEPING FUNCTIONALITY ASSESSMENT TOOL INTRODUCTION WHAT IS A RECORD? AS ISO 15489-2002 Records Management defines a record as information created,
More informationWelcome to part 2 of the HIPAA Security Administrative Safeguards presentation. This presentation covers information access management, security
Welcome to part 2 of the HIPAA Security Administrative Safeguards presentation. This presentation covers information access management, security awareness training, and security incident procedures. The
More informationCloud Service Contracts: An Issue of Trust
Cloud Service Contracts: An Issue of Trust Marie Demoulin Assistant Professor Université de Montréal École de Bibliothéconomie et des Sciences de l Information (EBSI) itrust 2d International Symposium,
More informationSTATUTORY INSTRUMENTS. S.I. No. 336 of 2011
STATUTORY INSTRUMENTS. S.I. No. 336 of 2011 EUROPEAN COMMUNITIES (ELECTRONIC COMMUNICATIONS NETWORKS AND SERVICES) (PRIVACY AND ELECTRONIC COMMUNICATIONS) REGULATIONS 2011 (Prn. A11/1165) 2 [336] S.I.
More information