Grant Agreement No.: UCN. D 5.1a: Preliminary UCN Use Cases and Applications - Supplement. Submission date:

Size: px
Start display at page:

Download "Grant Agreement No.: 611001 UCN. D 5.1a: Preliminary UCN Use Cases and Applications - Supplement. Submission date: 25.09.2015"

Transcription

1 Grant Agreement No.: Instrument: Call Identifier: Objective 1.6: Collaborative Project FP7-ICT Connected and Social Media D 5.1a: Preliminary Use Cases and Applications - Supplement Submission date: Note: this document complements D5.1 Start date of project: October 1 st 2013 Duration: 36 months Project Manager: Henk HEIJNEN - Technicolor TRDF Author(s): Fraunhofer FOKUS Intamac Technicolor NICTA University of Nottingham University of Cambridge Portugal Telecom Editor: Fraunhofer FOKUS Revision: v.1.0 Abstract This deliverable contains case studies based on the demo scenarios due to be implemented in the projects. It supplements the earlier 5.1 deliverable, which was based on a number of more generic application scenarios that might utilize the platform.

2 D 5.1a: Preliminary Use Cases and Applications Supplement Project co-funded by the European Commission in the 7 th Framework Programme ( ) Dissemination Level PU Public ü PP Restricted to other programme participants (including the Commission Services) RE Restricted to a group specified by the consortium (including the Commission Services) CO Confidential, only for members of the consortium (including the Commission Services) 1

3 D 5.1a: Preliminary Use Cases and Applications Supplement Table of Contents 1 INTRODUCTION PURPOSE OF THIS DOCUMENT USE CASES USE CASE: SMART TV MOVIE RECOMMENDATION USE CASE: ASSISTED LIVING SERVICES USE CASE: HOME NETWORK MONITORING AND DIAGNOSIS USE CASE: POPULATION PRESENCE ESTIMATION CONCLUSIONS AND OUTLOOK

4 D 5.1a: Preliminary Use Cases and Applications Supplement 1 INTRODUCTION 1.1. PURPOSE OF THIS DOCUMENT The deliverable 5.1 covered user expectations and generic use cases. The user expectations were based on interviews with users about their knowledge, concerns and expectations about handling of privacy relevant data. As these were open-form interviews, users often did express their needs and requirements in unspecific terms, which weren t always applicable to or addressable by the project. The interviews, however, provided a good representation of the mood of the general public concerning privacy and user-centric issues and served to determine a problem space to be addressed by the project, even though they didn t lead to specific, implementable requirements. Based on the interviews, typical (existing and in-development) smart home and TV usage scenarios involving privacy and user-centric themes were selected and described, leading to a set of more detailed set of requirements and a better understanding of the problem scape. As a result, a set of applications were defined to be developed in the project with the purpose to test and showcase the platform. The applications are intended to have a typical and representative set of requirements and demonstrate that the platform is able to support these. The purpose of this supplement to the original 5.1 deliverable is to describe the scenarios embodied by the demonstrator applications and list the requirements of these scenarios, where these are relevant to the scope of the project. 3

5 D 5.1a: Preliminary Use Cases and Applications Supplement 2 USE CASES 2.1 USE CASE: SMART TV MOVIE RECOMMENDATION An IPTV recommendation system that is capable of working with different levels of knowledge about the user preferences and user context. BACKGROUND: Recommendation can generally be improved by utilizing increasingly detailed information about the user s behaviour. In increasing order of available information, some possible basis for providing recommendations are: Advertisement payment based recommendation If the movie summary contains certain keywords, one of a selection of paid for movie advertisements is suggested e.g., for all sci-fi selections, the Marvel movie is suggested, for all action movies the current Movie metadata based recommendation E.g. if a user watches a movie with Arnold Schwarzenegger, other available movies with the same actor are recommended Bond movie Initial assessment based recommendation I.e. the user goes through an initial assessment and provides an order of preference for a number of well-known movies. Based on that initial assessment, viewing behaviour of users with a similar preference is used to provide the recommendation. Viewing behaviour based recommendation The viewing behaviour of a user is matched to other users with a similar viewing pattern and their viewings are used for recommendation. Rating based recommendation The user provides more feedback regarding the movies watched, such as direct rating by the movie or implied ratings, based on behaviour, such as skipping, fast forward or repeat viewing. Additional context based recommendation In addition to the information available on the recommendation target system (such as the VOD provider) itself, additional behaviour and interest information are used for recommendations, like movies watched on television or using other services and devices. Information about the viewing situation (watching alone, with friends, with family) and information from external sources (Facebook, Twitter) can be evaluated as well. Depending on the recommendation method use, they require different level of information from and about the user, raising privacy concerns for many users. DESCRIPTION: The recommender demonstrated in is capable of utilizing different levels of knowledge about the user movie preferences and the user context, giving the user more control about the amount of privacy related information to be provided. 4

6 D 5.1a: Preliminary Use Cases and Applications Supplement Data about the user s behaviour from multiple sources is stored in the PIH. This not only includes movies watched and the ratings provided by the user, but also additional context information.. Based on the information that the user is willing to share with the service, the service is able to deliver better movie recommendations taking into account both the user s preferences and their current context. The user controls what information is provided by the PIH to the recommendation service. For the demonstrator, it is currently envisioned to provide three methods to handle user specific information. 1. No additional user specific information If the user provides no access to the data, the system will provide generic recommendations based on public databases (such as IMDB) and available movie reviews to provide movies with similar metadata to a movie just watched by the user. 2. Information handling in the cloud This is currently the most common scenario. The user provides a specific service access to all data regarding movie consumptions and ratings. These are securely transferred to a service provider (encrypted before leaving the PIH) and then used to provide recommendations. 3. Local information processing The user provides data available, including contextual data like activity logs, but the handling of the data is performed local to the user. This requires the provision of storage and computing facilities by the user, either on the PIH or an authorized device, but ensures that user specific data does not leave the user s private domain. STAKEHOLDER ISSUES: The user does wants recommendations of movies that match the viewer s interest at the time, but is concerned about providing information to the recommendation service. The VoD provider wants to give sufficiently good recommendation to keep the user interested in coming back to the portal and watching more movies. For the purpose of movie recommendation, the VoD provider is not necessarily interested in specific customers and their behaviour. However providing information about the user to other interested parties (such as advertisement agencies) can provide additional sources or revenue. An advertisement company wants to put targeted advertisements on the VoD portals navigation screens. The ad agency is interested to match the ad banners as closely as possible to the customer s preferences to increase chances of the customer reacting to the advertisement. REQUIREMENTS: The scenario results in the following specific requirements: The PIH must be able to identify a cloud service and securely exchange data with it. 5

7 D 5.1a: Preliminary Use Cases and Applications Supplement The PIH must be able to collect and store information about user behaviour, comprising of user initiated information (movie selection, rating) and automatically gathered or derived information (location, devices, number of people present). The PIH must be able to provide a secure and constrained execution environment for external application, either on the PIH itself or a locally connected resource. The PIH must directly or indirectly provide an interface that allows a user to state and modify privacy preferences in a simple manner. STAKEHOLDER BENEFITS: The primary benefit of applying concepts is obviously the user, who has more control over the use of the data. The user is now able to strike a balance, according to personal preferences, between providing more data to a recommendation service in exchange for more accurate and useful recommendation. The user can also select a method where no sensitive data leaves the local network. The benefits for VoD and advertisement providers are less obvious. But beyond the potential political benefits of providing a system that concedes more control to the user, allowing a more finely grained control of the data than either providing no data at all (akin to disallowing the use of cookies in browsers) or providing full access to data, may lead to a larger number of users that allow at least limited access to personal data, who would otherwise have opted out of giving information completely. 6

8 D 5.1a: Preliminary Use Cases and Applications Supplement 2.2 USE CASE: ASSISTED LIVING SERVICES This application will help elderly and people with chronic illness to monitor their health status frequently. DESCRIPTION: The application will demonstrate how an assisted living (AL) system can be supported b providing different interested parties clearly defined access rights to users biometrics. As such data is particularly sensitive, the PIH encrypt the date before sending it for storage to a private cloud, which runs middleware where external services can subscribe to the user s medical and health data. Access control policies will filter the kind of information available for each service/consumer. Filtering will not only be based on the type of health data, but also allow specification of notifications based on derived data, such as exceeding a given threshold or having a value that significantly differs from preceding values. The health data will cover information from a range of sensors, such as weight, blood sugar, blood pressure and pulse. STAKEHOLDER ISSUES: As health data is particularly sensitive, user require a higher amount of confidence in the secure handling of and restricted access to the data than for any other kind of personal information. While the user will typically be willing to provide full access to all health relevant information to his physician, the user wants to be sure that the data is no longer accessible to the physician once he changes the family doctor. Beyond that, there are often only subsets of the data that a user is willing to provide to other data consumers. For example, a user might subscribe to a weight loss programme and be willing to provide daily updates on weight and body mass and some index denoting the amount and relative strength of daily physical activity, but may not be willing to provide specific information about the specific times of that activities or even the exact pules rates measured. Similarly, a user is likely to appreciate the automatic or semi-automatic alert of emergency services in case of lifethreatening medical conditions, but be generally unwilling to provide information to such services when he is of normal health. For data consumers it is currently an issue that there is a wide variety of sensors available, but in often the data is collected in a number of separate silos and most data consumers only have access to data from devices that they provided to the consumer themselves. Securely storing all available data at an access site that provides a well-defined, fine grained access system to the sensitive date, which is under control of the user, can help to encourager users to pool their sensor data at one site and provide more fit for purpose combination sets of sensor based data than currently available to health agencies and other consumer of medical data. REQUIREMENTS: The scenario results in the following specific requirements: 7

9 D 5.1a: Preliminary Use Cases and Applications Supplement The PIH must be able to collect data from a wide variety of health and medical sensors. The data exchanges within the home network should already be secure and encrypted. The PIH must be able to identify a cloud service and securely exchange data with it. The PIH must directly or indirectly provide an interface that allows a user to state, modify and revoke privacy preferences in a simple manner. The cloud service needs to be capable of providing a (limited) set of processing of the data, such as calculating derived values (BMI) or determining trends in the data and significant deviations from them, as well as data or groups of date exceeding pre-set threshold values. STAKEHOLDER BENEFITS: The user remains in control of his health data, but with a trusted system to distribute that data or specific subsets to physicians and other health monitoring organizations, is will benefit from better medical support and ultimately by better health. The system also provides a better chance of fast and appropriate reaction to medical emergencies, especially for elderly people or those with known health risks. The benefit for medical and health services is a central go-to-point for a more health related sensor data than currently provided by most manufacturer specific solutions and a high grade of assurance that such a service can be certified and will be in line with legal requirements regarding the handling of personal data than this is currently the case with provider ad-hoc solutions. 8

10 D 5.1a: Preliminary Use Cases and Applications Supplement 2.3 USE CASE: HOME NETWORK MONITORING AND DIAGNOSIS The goal of this application is to assist users and their ISPs in diagnosing network performance problems in the home. DESCRIPTION: Most users are not experts in networking and consequently are helpless when applications utilizing the network perform poorly. In many cases, their resort is to call their ISP. Without adequate and detailed information, the ISP can often only provide generalized solutions to the user s problem. Installing tools to inspect data flow and IP packets on a low level can help ISPs to determine where the performance degradation occurs. Such tools can indicate whether the problem is within the user s local network, the connection to the ISP or caused by a specific device or application within the network. However, the implementation of this scenario requires access to potentially privacy sensitive user data (e.g., applications running on the users device, packet headers). The use case will demonstrate how utilize the PIH to store data safely and securely can preserve the user s privacy in such a scenario. The PIH will host applications that process data collected from the user devices and home gateway to: o infer the user activity; o predict user satisfaction with application performance and automatically identify when users are dissatisfied with application performance; o to help users identify whether performance problems lie in the home wireless network or the access link The first two applications require training of models of user activity and satisfaction. The training can be done locally on the PIH (limited to user or household specific models), or in the cloud using data from multiple users. Access to the raw data for training is controlled by the PIH. Users can access a dashboard on the PIH to get more information about the network status and identified performance problems. Moreover, users can give access to limited data about their home network usage to the network operator. The operator will then analyse the data per home and across homes through a visualization interface to further diagnose the problems STAKEHOLDER ISSUES: The primary interests of the home user are a well-tuned and efficient home network, a quick response from his ISP if problems occur and the protection of personal and privacy sensitive data from external access. To reduce cost and time spent on customer support, network service and maintenance, the ISP requires in-depth information about the data flow in the user s network. Without such 9

11 D 5.1a: Preliminary Use Cases and Applications Supplement information, remote customer support is usually limited to providing vague, general recommendations ( Turn the router off and on again. ). In most cases, the ISP does not need to have access to the content part of IP packets, but only needs access to the packet headers and routing information. REQUIREMENTS: The scenario results in the following specific requirements: The PIH must be able to collect and store non-trivial amounts of data (estimated ~50GB per year) from data collectors running on end-user devices and on the home gateway. The PIH must be capable of allowing access to the stored data by local analysis tools The PIH must directly or indirectly provide an interface that allows a user to state and modify privacy preferences in regard of giving access to the ISP or other 3 rd party cloud service to parts of the stored data or to accessing the live data flow on the network (e.g. access to packet headers only, but not to the content itself). STAKEHOLDER BENEFITS: The benefit for the user is a faster and more accurate response from the ISP to any network problems (home-network or external connection), while at the same time not exposing privacy relevant information to an external party. This is of special interest to the user, as data sent on the home network can contain highly private or sensitive content, which is not intended for any form of outside access or consumption. The benefit to the ISP lies in the capability to provide faster and more accurate help to their customers, reducing service costs and increasing customer satisfaction. At the same time, a set of tools that decouples gathering of information on a home network from the access to subsets of routing and networking data under the control of the user, will reduce concerns of users regarding the use of their data by external data consumers. Such concerns are increasingly common (most notably recently in the reporting by non-technical newspapers regarding the Windows 10 default privacy settings). Use of a platform that reduces exposure of usage data to external parties (in this case the ISP) can be seen as a feature in favour of an ISP provider and attract customers. 10

12 D 5.1a: Preliminary Use Cases and Applications Supplement 2.4 USE CASE: POPULATION PRESENCE ESTIMATION The goal of this demonstrator is to showcase the use of privacy preserving arithmetic functions. DESCRIPTION: Most scenarios assume that the consumer of data needs to have at least read access to the individual data sets of all data providers (users) to provide a useful service. Most privacy protection use cases therefore focus on the authentication of both sides of the communication and the secure transfer between these two stakeholders. It is implicitly assumed that the consumer of the data will decrypt the information at some point and that this date will be handled securely and responsibly by that service provider, using adequate internal handling of the data. In some cases, however, the service provider may not require information about the individual users and aggregated data for a group of customers will be sufficient to provide a service. In such cases, especially if the underlying data is highly sensitive in the regard of privacy and personal risks, the use of privacy preserving arithmetic functions can be an option. Privacy preserving arithmetic functions allow the calculation of simple arithmetic functions (such as calculating a sum) over encrypted operands, revealing only the result of the operation, without exposing access to the individual input values. In the scenario, individual households in a community provide information about whether someone is currently present in the house. Such information is obviously highly sensitive and house owners might not be willing to provide such information to an external service due to the fear of misuse for criminal purposes. On the other hand, generalized information about the average number of empty houses in a neighbourhood can help the police or private security services to increase the number of patrols in some areas, without the need to know which specific houses are currently empty. STAKEHOLDER ISSUES: The primary interests of the home owner is to provide a high level of security against criminal activities, while not giving out information that may ultimately decrease security if handled improperly by an external service. A service may not need data that is mapable to individual customers to perform a service. In a number of cases, it is sufficient if summary or average value can be calculated. In such cases, in cases where information is leaked somewhere, it might be advantageous for liability reasons if the service provider can demonstrate that no access to individual user existed. Ot also reduces the data security and protection requirements on the service provider s side, if no user specific data is ever handled in unencrypted form 11

13 D 5.1a: Preliminary Use Cases and Applications Supplement REQUIREMENTS: The scenario results in the following specific requirements: The PIH must be able to identify a cloud service and securely exchange data with it. The service provider should never have a key that enables him to decrypt the original data. The service provider needs to be able to perform simple operations (in this use case: addition) on the user data sets without access to the original data and without sending the user data to a third party. STAKEHOLDER BENEFITS: The user can more freely provide data to interested parties when knowing that his individual data cannot be read by an external party. This is especially relevant for data that has security or legal implications. While the current use case is only concerned with security applications, there are also possible scenarios where users provide GPS based speed data to allow the improvement of traffic flow, but do not want external parties to trace any cases of speeding back to the individual car. One benefit for the data consumer is, as already stated, the lack of requirement to be able to handle sensitive data in-house in unencrypted form. In addition, users are likely to be more willing to provide data to external data consumers when they can be sure that the individual source data cannot be read by data consumers unknown to or not fully trusted by the users. For example, users might not be willing to provide income data to an Internet survey performed by a university department or unknown survey agency, due to security or misuse concerns. With privacy preserving arithmetic functions, the user only needs to have trust in the key provider and can, as long as the key provider acts responsibly, be sure that only accumulated data will be available to a third party. 12

14 D 5.1a: Preliminary Use Cases and Applications Supplement 7 CONCLUSIONS Determining the needs and requirements for a platform is always a challenge, as it is often difficult to separate the requirements for applications utilizing the platform from the requirements that need to be fulfilled by the platform itself. While the purpose and function of an individual application can largely be defined in advance, a platform must be capable of not only supporting needs of current applications, but also support future applications, where the requirements cannot be clearly defined in advance. Defining a set of showcase and demonstrator applications, if they are selected to cover a reasonably wide span of needs in the current and estimated future use in the field can provide a set of more specific requirements. These will not comprise a complete set of platform requirement, but serve to set a basic threshold of concrete and testable requirements the platform needs to support and give confidence in its applicability for use by future applications. 13

Collaborative Open Market to Place Objects at your Service

Collaborative Open Market to Place Objects at your Service Collaborative Open Market to Place Objects at your Service D6.2.1 Developer SDK First Version D6.2.2 Developer IDE First Version D6.3.1 Cross-platform GUI for end-user Fist Version Project Acronym Project

More information

D 8.2 Application Definition - Water Management

D 8.2 Application Definition - Water Management (FP7 609081) Date 31st July 2014 Version [1.0] Published by the Almanac Consortium Dissemination Level: Public Project co-funded by the European Commission within the 7 th Framework Programme Objective

More information

SEVENTH FRAMEWORK PROGRAMME THEME ICT -1-4.1 Digital libraries and technology-enhanced learning

SEVENTH FRAMEWORK PROGRAMME THEME ICT -1-4.1 Digital libraries and technology-enhanced learning Briefing paper: Value of software agents in digital preservation Ver 1.0 Dissemination Level: Public Lead Editor: NAE 2010-08-10 Status: Draft SEVENTH FRAMEWORK PROGRAMME THEME ICT -1-4.1 Digital libraries

More information

Healthcare Delivery. Transforming. through Mobility Solutions. A Solution White Paper - version 1.0

Healthcare Delivery. Transforming. through Mobility Solutions. A Solution White Paper - version 1.0 Transforming Healthcare Delivery through Mobility Solutions A Solution White Paper - version 1.0 HTC Global Services HTC Towers, No. 41, GST Road, Guindy, Chennai - 600 032, India. Ph: +91 44 4345 3500

More information

ARRIS WHOLE HOME SOLUTION PRIVACY POLICY AND CALIFORNIA PRIVACY RIGHTS STATEMENT

ARRIS WHOLE HOME SOLUTION PRIVACY POLICY AND CALIFORNIA PRIVACY RIGHTS STATEMENT ARRIS WHOLE HOME SOLUTION PRIVACY POLICY AND CALIFORNIA PRIVACY RIGHTS STATEMENT INTRODUCTION ARRIS may collect and receive information from you through its websites 1 as well as through the Moxi User

More information

In the pursuit of becoming smart

In the pursuit of becoming smart WHITE PAPER In the pursuit of becoming smart The business insight into Comarch IoT Platform Introduction Businesses around the world are seeking the direction for the future, trying to find the right solution

More information

File: IJNDC-1 WEBSITE PRIVACY POLICY

File: IJNDC-1 WEBSITE PRIVACY POLICY File: IJNDC-1 WEBSITE PRIVACY POLICY The following policy applies only to the use of the Cambridge School Committee and Cambridge Public Schools websites. As users navigate the Cambridge School Committee

More information

A guide to affilinet s tracking technology

A guide to affilinet s tracking technology A guide to affilinet s tracking technology Content Introduction 1 What s covered in this Paper? 1 1. Why does affilinet use cookies? 1 Figure 1 the Commercial Model for Performance Marketing 1 2. How does

More information

Towards Supporting Contextual Privacy in Body Sensor Networks for Health Monitoring Service

Towards Supporting Contextual Privacy in Body Sensor Networks for Health Monitoring Service Towards Supporting Contextual Privacy in Body Sensor Networks for Health Monitoring Service Fuming Shih 1 and Mi Zhang 2 1 MIT CSAIL, Cambridge Massachusetts, USA 2 Department of Electrical Engineering

More information

Opinion 04/2012 on Cookie Consent Exemption

Opinion 04/2012 on Cookie Consent Exemption ARTICLE 29 DATA PROTECTION WORKING PARTY 00879/12/EN WP 194 Opinion 04/2012 on Cookie Consent Exemption Adopted on 7 June 2012 This Working Party was set up under Article 29 of Directive 95/46/EC. It is

More information

DARTFISH PRIVACY POLICY

DARTFISH PRIVACY POLICY OUR COMMITMENT TO PRIVACY DARTFISH PRIVACY POLICY Our Privacy Policy was developed as an extension of our commitment to combine the highestquality products and services with the highest level of integrity

More information

Thank you for visiting this website, which is owned by Essendant Co.

Thank you for visiting this website, which is owned by Essendant Co. Essendant Online Privacy Policy Thank you for visiting this website, which is owned by Essendant Co. Please take a few minutes to review this Policy. It describes how we will collect, use, and share information

More information

Rise Broadband Networks, Inc. Privacy Policy and Customer California Privacy Rights. Effective date: January, 2016

Rise Broadband Networks, Inc. Privacy Policy and Customer California Privacy Rights. Effective date: January, 2016 Networks, Inc. Privacy Policy and Customer California Privacy Rights Effective date: January, 2016 knows Customers care about how their personally identifiable information ( Personal Information ) is used

More information

INDEX PRIVACY POLICY...2

INDEX PRIVACY POLICY...2 INDEX PRIVACY POLICY...2 WHAT PERSONAL INFORMATION DOES RENTINGCARZ GATHER FROM ME AND HOW IS THIS INFORMATION USED?...2 MAKING A PURCHASE...2 NEWSLETTERS...2 ONLINE SURVEYS...2 PROMOTIONS & SWEEPSTAKES...3

More information

Integration of Learning Management Systems with Social Networking Platforms

Integration of Learning Management Systems with Social Networking Platforms Integration of Learning Management Systems with Social Networking Platforms E-learning in a Facebook supported environment Jernej Rožac 1, Matevž Pogačnik 2, Andrej Kos 3 Faculty of Electrical engineering

More information

Facebook Smart Card FB 121211_1800

Facebook Smart Card FB 121211_1800 Facebook Smart Card FB 121211_1800 Social Networks - Do s and Don ts Only establish and maintain connections with people you know and trust. Review your connections often. Assume that ANYONE can see any

More information

Alcatel-Lucent 8920 Service Quality Manager for IPTV Business Intelligence

Alcatel-Lucent 8920 Service Quality Manager for IPTV Business Intelligence Alcatel-Lucent 8920 Service Quality Manager for IPTV Business Intelligence IPTV service intelligence solution for marketing, programming, internal ad sales and external partners The solution is based on

More information

HTTPS Inspection with Cisco CWS

HTTPS Inspection with Cisco CWS White Paper HTTPS Inspection with Cisco CWS What is HTTPS? Hyper Text Transfer Protocol Secure (HTTPS) is a secure version of the Hyper Text Transfer Protocol (HTTP). It is a combination of HTTP and a

More information

Self-completion surveys via mobile phones

Self-completion surveys via mobile phones Self-completion surveys via mobile phones Content Global mobile phone penetration statistics Methods of collecting survey data via mobile phones The advantages and limitations of mobile phone research

More information

Vyve Broadband Website Privacy Policy. What Information About Me Is Collected and Stored?

Vyve Broadband Website Privacy Policy. What Information About Me Is Collected and Stored? Vyve Broadband Website Privacy Policy Effective: July 31, 2015 Vyve Broadband ( Vyve, we, us, our ) is committed to letting you know how we will collect and use your information. This Website Privacy Policy

More information

Trusted Personal Data Management A User-Centric Approach

Trusted Personal Data Management A User-Centric Approach GRUPPO TELECOM ITALIA Future Cloud Seminar Oulu, August 13th 2014 A User-Centric Approach SKIL Lab, Trento - Italy Why are we talking about #privacy and #personaldata today? 3 Our data footprint Every

More information

SiteCelerate white paper

SiteCelerate white paper SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance

More information

ROHIT GROUP OF COMPANIES PRIVACY POLICY This privacy policy is subject to change without notice. It was last updated on July 23, 2014.

ROHIT GROUP OF COMPANIES PRIVACY POLICY This privacy policy is subject to change without notice. It was last updated on July 23, 2014. ROHIT GROUP OF COMPANIES PRIVACY POLICY This privacy policy is subject to change without notice. It was last updated on July 23, 2014. The Rohit Group of Companies ( Rohit Group, Company, our, we ) understands

More information

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential Best Practices for Smartphone Apps A smartphone is basically a computer that you can carry in the palm of your hand. Like computers, smartphones have operating systems that are often called platforms.

More information

Fleet Management Solution

Fleet Management Solution Fleet Management Solution Control your costs with FleetLynx Flexible Mobile Tracking System Utilize fleets more efficiently, reduce waste and ultimately improve your company s bottom line Are you able

More information

Remote Vendor Monitoring

Remote Vendor Monitoring ` Remote Vendor Monitoring How to Record All Remote Access (via SSL VPN Gateway Sessions) An ObserveIT Whitepaper Daniel Petri March 2008 Copyright 2008 ObserveIT Ltd. 2 Table of Contents Executive Summary...

More information

Application Performance Monitoring (APM) Technical Whitepaper

Application Performance Monitoring (APM) Technical Whitepaper Application Performance Monitoring (APM) Technical Whitepaper Table of Contents Introduction... 3 Detect Application Performance Issues Before Your Customer Does... 3 Challenge of IT Manager... 3 Best

More information

Collaborative Open Market to Place Objects at your Service

Collaborative Open Market to Place Objects at your Service Collaborative Open Market to Place Objects at your Service D8.2.3.2 Training actions report Project Acronym Project Title COMPOSE Project Number 317862 Work Package WP8 Dissemination, Training, and Stakeholders

More information

An Architecture for Home-Oriented IPTV Service Platform on Residential Gateway

An Architecture for Home-Oriented IPTV Service Platform on Residential Gateway J Inf Process Syst, Vol.9, No.3, September 2013 pissn 1976-913X eissn 2092-805X http://dx.doi.org/10.3745/jips.2013.9.3.425 An Architecture for Home-Oriented IPTV Service Platform on Residential Gateway

More information

Trust areas: a security paradigm for the Future Internet

Trust areas: a security paradigm for the Future Internet Trust areas: a security paradigm for the Future Internet Carsten Rudolph Fraunhofer Institute for Secure Information Technology SIT Rheinstrasse 75, Darmstadt, Germany Carsten.Rudolph@sit.fraunhofer.de

More information

Beasley Broadcast Group, Inc. Privacy Policy

Beasley Broadcast Group, Inc. Privacy Policy Beasley Broadcast Group, Inc. Privacy Policy Last Updated and Effective December 31, 2015 This Privacy Policy has been updated to include a section regarding your California privacy rights if you are a

More information

Social Innovation through Utilization of Big Data

Social Innovation through Utilization of Big Data Social Innovation through Utilization of Big Data Hitachi Review Vol. 62 (2013), No. 7 384 Shuntaro Hitomi Keiro Muro OVERVIEW: The analysis and utilization of large amounts of actual operational data

More information

Situational Awareness Through Network Visualization

Situational Awareness Through Network Visualization CYBER SECURITY DIVISION 2014 R&D SHOWCASE AND TECHNICAL WORKSHOP Situational Awareness Through Network Visualization Pacific Northwest National Laboratory Daniel M. Best Bryan Olsen 11/25/2014 Introduction

More information

DISCLOSURES WEB PRIVACY POLICY

DISCLOSURES WEB PRIVACY POLICY DISCLOSURES WEB PRIVACY POLICY This Privacy Policy governs your use of this website and any content, products or services made available from or through this website including any sub domains thereof ("Website").

More information

Privacy & data protection in big data: Fact or Fiction?

Privacy & data protection in big data: Fact or Fiction? Privacy & data protection in big data: Fact or Fiction? Athena Bourka ENISA ISACA Athens Conference 24.11.2015 European Union Agency for Network and Information Security Agenda 1 Privacy challenges in

More information

DentalTek Privacy Statement

DentalTek Privacy Statement DentalTek Privacy Statement DentalTek (the Company ) is committed to protecting the privacy of individuals who visit the Sites ( Visitors ), individuals who register to use the Services (as defined below)

More information

CUSTOMER INFORMATION COMMZOOM, LLC PRIVACY POLICY. For additional and updated information, please visit our website at www.commzoom.com.

CUSTOMER INFORMATION COMMZOOM, LLC PRIVACY POLICY. For additional and updated information, please visit our website at www.commzoom.com. CUSTOMER INFORMATION COMMZOOM, LLC PRIVACY POLICY YOUR PRIVACY AS A COMMZOOM CUSTOMER As a customer of commzoom, LLC, you are entitled to know what we do with personal information about you that we receive.

More information

ConteGoView, Inc. Privacy Policy Last Updated on July 28, 2015

ConteGoView, Inc. Privacy Policy Last Updated on July 28, 2015 CONTEGOVIEW, INC. PRIVACY POLICY 1 ConteGoView, Inc. Privacy Policy Last Updated on July 28, 2015 This Privacy Policy discloses the privacy practices for ConteGoView, Inc. and its services and products.

More information

Agency manager roles & responsibilities

Agency manager roles & responsibilities Part 1 Agency manager roles & responsibilities Anyone with level 3 security can see and manage agency screens in VITA as well as any action items. With different subscriptions come different options within

More information

Application Note. Intelligent Application Gateway with SA server using AD password and OTP

Application Note. Intelligent Application Gateway with SA server using AD password and OTP Application Note Intelligent Application Gateway with SA server using AD password and OTP ii Preface All information herein is either public information or is the property of and owned solely by Gemalto

More information

dotmailer for Dynamics Frequently Asked Questions v 6,0

dotmailer for Dynamics Frequently Asked Questions v 6,0 for Dynamics Frequently Asked Questions v 6,0 Page 1 Contents Introduction... 2 Why should I use the Microsoft Dynamics CRM Connector for dotmailer?... 3 What software needs to be installed?... 3 Can I

More information

D9.1 Project Website

D9.1 Project Website H2020 FOF 09 2015 Innovation Action Smart integrated immersive and symbiotic human-robot collaboration system controlled by Internet of Things based dynamic manufacturing processes with emphasis on worker

More information

TERMS OF USE AGREEMENT

TERMS OF USE AGREEMENT TERMS OF USE AGREEMENT Last Updated: October 20, 2010 PLEASE READ THIS TERMS CAREFULLY BEFORE ACCESSING THE WEBSITE I GENERAL 1) The Web Portal MEGA BRAZIL TV is a part of the MEGA LOPES, LLC family of

More information

Patient-Generated Health Data and its Impact on Health Information Management

Patient-Generated Health Data and its Impact on Health Information Management WHITE PAPER Patient-Generated Health Data and its Impact on Health Information Management HealthPort. 2015 All Rights Reserved. VN031015 FN3500 www.healthport.com 800.737.2585 Patient engagement is a growing

More information

Many cloud service providers are interested in supporting resellers as tenants within their cloud.

Many cloud service providers are interested in supporting resellers as tenants within their cloud. Reseller Functionality Checklist White Paper Many cloud service providers are interested in supporting resellers as tenants within their cloud. This document provides an overview of the key functionality

More information

Portal Administration. Administrator Guide

Portal Administration. Administrator Guide Portal Administration Administrator Guide Portal Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Attitudes to Use of Social Networks in the Workplace and Protection of Personal Data

Attitudes to Use of Social Networks in the Workplace and Protection of Personal Data Attitudes to Use of Social Networks in the Workplace and Protection of Personal Data David Haynes, City University, School of Informatics, Department of Information Science August 2011 Background Two surveys

More information

How To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser)

How To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser) 1110 Cool Things Your Firewall Should Do Extend beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application

More information

ALM 271 From End-User Experience Monitoring to Management Dashboards and Reporting Stefan Lahr, SAP Active Global Support September, 2011

ALM 271 From End-User Experience Monitoring to Management Dashboards and Reporting Stefan Lahr, SAP Active Global Support September, 2011 ALM 271 From End-User Experience Monitoring to Management Dashboards and Reporting Stefan Lahr, SAP Active Global Support September, 2011 Disclaimer This presentation outlines our general product direction

More information

Who Needs Parental Controls?

Who Needs Parental Controls? A Survey Of Awareness, Attitudes, And Use Of Online Parental Controls Findings From A National Survey Among Parents Supported by: A Survey Of Awareness, Attitudes, And Use Of Online Parental Controls Findings

More information

Regulated Documents. A concept solution for SharePoint that enables FDA 21CFR part 11 compliance when working with digital documents

Regulated Documents. A concept solution for SharePoint that enables FDA 21CFR part 11 compliance when working with digital documents Regulated Documents A concept solution for SharePoint that enables FDA 21CFR part 11 compliance when working with digital documents Contents Life science industry challenges Regulated Documents our service

More information

Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.

Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com

More information

PaperClip Incorporated 3/7/06; Rev 9/18/09. PaperClip Compliant Email Service Whitepaper

PaperClip Incorporated 3/7/06; Rev 9/18/09. PaperClip Compliant Email Service Whitepaper Incorporated 3/7/06; Rev 9/18/09 PaperClip Compliant Email Service Whitepaper Overview The FTC Safeguard Rules require Financial, Insurance and Medical providers to protect their customer s private information

More information

Privacy Policy GetYou

Privacy Policy GetYou Privacy Policy GetYou How We Use and Manage Your Data Key Information GetYou respects your right to privacy in the on-line world when you use our service and communicate electronically with us. We put

More information

Data Sharing. Matching and Routing THOUGHT LEADERSHIP. Delivering Transformation. Together.

Data Sharing. Matching and Routing THOUGHT LEADERSHIP. Delivering Transformation. Together. THOUGHT LEADERSHIP Data Sharing Matching and Routing Delivering Transformation. Together. Introduction There are many reasons why data needs to be shared in the public sector, and in reality there are

More information

The Benefits of SSL Content Inspection ABSTRACT

The Benefits of SSL Content Inspection ABSTRACT The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic

More information

IPv4 address exhaustion: Issues and Solutions for Service Providers

IPv4 address exhaustion: Issues and Solutions for Service Providers Study Report IPv4 address exhaustion: Issues and Solutions for Service Providers D2bis: P1952 Eurescom study results summary Editor: Pierre Levis, France Telecom Abstract The P1952 Eurescom study has investigated

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

TNS UK PRIVACY & COOKIE POLICY FOR SURVEYS ( Policy )

TNS UK PRIVACY & COOKIE POLICY FOR SURVEYS ( Policy ) TNS UK PRIVACY & COOKIE POLICY FOR SURVEYS ( Policy ) Introduction Market and survey research serves an important function in society. Businesses and governments are able to make informed decisions through

More information

Big Data + Smart City = Weak Privacy + Weak Security?

Big Data + Smart City = Weak Privacy + Weak Security? Big Data + Smart City = Weak Privacy + Weak Security? Professor John Bacon-Shone Director, Social Sciences Research Centre The University of Hong Kong Benefits and Risks Is it an inevitable consequence

More information

Cookie Policy. Introduction About Cookies

Cookie Policy. Introduction About Cookies Introduction About Cookies Cookie Policy Most websites you visit will use in order to improve your user experience by enabling that website to remember you, either for the duration of your visit (using

More information

Deliverable D7.2: The project website

Deliverable D7.2: The project website Project acronym: TRACE Project title: Trafficking as A Criminal Enterprise Grant number: 607669 Programme: Seventh Framework Programme Security Research Objective: SEC-2013.6.1-3 Contract type: Coordination

More information

Harnessing the Data Flood: Oracle s Visionary Platform from Device to Data Center. Chris Baker Senior Vice President Worldwide ISV/OEM Java Sales

Harnessing the Data Flood: Oracle s Visionary Platform from Device to Data Center. Chris Baker Senior Vice President Worldwide ISV/OEM Java Sales Harnessing the Data Flood: Oracle s Visionary Platform from Device to Data Center Chris Baker Senior Vice President Worldwide ISV/OEM Java Sales Canvas Lumber Compass Sextant 1851 America s Cup The oldest

More information

Security for all: network-based protection for personal devices

Security for all: network-based protection for personal devices Security for all: network-based protection for personal devices Antonio Lioy Politecnico di Torino < lioy @ polito.it > Cybersecurity & Privacy Innovation Forum 2015 Brussels, 28/4/2015 Why SECURity at

More information

Transaction Monitoring Version 8.1.3 for AIX, Linux, and Windows. Reference IBM

Transaction Monitoring Version 8.1.3 for AIX, Linux, and Windows. Reference IBM Transaction Monitoring Version 8.1.3 for AIX, Linux, and Windows Reference IBM Note Before using this information and the product it supports, read the information in Notices. This edition applies to V8.1.3

More information

Security and Fraud Exceptions Under Do Not Track. Christopher Soghoian Center for Applied Cybersecurity Research, Indiana University

Security and Fraud Exceptions Under Do Not Track. Christopher Soghoian Center for Applied Cybersecurity Research, Indiana University Security and Fraud Exceptions Under Do Not Track Christopher Soghoian Center for Applied Cybersecurity Research, Indiana University Position Paper for W3C Workshop on Web Tracking and User Privacy 28/29

More information

Helping organizations secure and govern application services for SOA, Web and the Cloud

Helping organizations secure and govern application services for SOA, Web and the Cloud Helping organizations secure and govern application services for SOA, Web and the Cloud SOA WEB CLOUD layer7tech.com info@layer7tech.com @layer7 Layer 7 offers industry-leading XML security, runtime SOA

More information

Network Management, Performance Characteristics, and Commercial Terms Policy. (1) mispot's Terms of Service (TOS), viewable at mispot.net.

Network Management, Performance Characteristics, and Commercial Terms Policy. (1) mispot's Terms of Service (TOS), viewable at mispot.net. Network Management, Performance Characteristics, and Commercial Terms Policy Consistent with FCC regulations 1, Agri-Valley Broadband, Inc., d/b/a mispot (mispot) provides this information about our broadband

More information

Network Security Policy

Network Security Policy Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus

More information

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices. Data Loss Prevention Whitepaper When Mobile Device Management Isn t Enough Your Device Here. Good supports hundreds of devices. Contents Shifting Security Landscapes 3 Security Challenges to Enterprise

More information

Considerations on Audience Measurement Procedures for Digital Signage Service

Considerations on Audience Measurement Procedures for Digital Signage Service Considerations on Audience Measurement Procedures for Digital Signage Service Wook Hyun, MiYoung Huh, SeungHei Kim and ShinGak Kang Electronics and Telecommunications Research Institute Daejeon, Republic

More information

Measuring end-to-end application performance in an on-demand world. Shajeer Mohammed Enterprise Architect

Measuring end-to-end application performance in an on-demand world. Shajeer Mohammed Enterprise Architect Measuring end-to-end application performance in an on-demand world Shajeer Mohammed Enterprise Architect Agenda 1 Introduction to CA 2 Application Performance Management and its Need 3 How CA Solutions

More information

Proposal for cable operators on the implementation of IPTV systems «Net City TV»

Proposal for cable operators on the implementation of IPTV systems «Net City TV» Proposal for cable operators on the implementation of IPTV systems «Net City TV» «Ukrainian Computer Technologies» is the system integrator and developer of hotel and operator class IPTV systems. We are

More information

DOSarrest External MULTI-SENSOR ARRAY FOR ANALYSIS OF YOUR CDN'S PERFORMANCE IMMEDIATE DETECTION AND REPORTING OF OUTAGES AND / OR ISSUES

DOSarrest External MULTI-SENSOR ARRAY FOR ANALYSIS OF YOUR CDN'S PERFORMANCE IMMEDIATE DETECTION AND REPORTING OF OUTAGES AND / OR ISSUES .com DOSarrest External Monitoring S ystem (DEMS) User s Guide REAL BROWSER MONITORING OF YOUR WEBSITE MULTI-SENSOR ARRAY FOR ANALYSIS OF YOUR CDN'S PERFORMANCE IMMEDIATE DETECTION AND REPORTING OF OUTAGES

More information

What s New in Ifbyphone Version 3.2?

What s New in Ifbyphone Version 3.2? What s New in Ifbyphone Version 3.2? Ifbyphone Version 3.2 includes a variety of new and improved applications and features. We ve integrated your feedback into enhancements including new Home Page Dashboards,

More information

Evaluation of different Open Source Identity management Systems

Evaluation of different Open Source Identity management Systems Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems

More information

Operationalizing Data Governance through Data Policy Management

Operationalizing Data Governance through Data Policy Management Operationalizing Data Governance through Data Policy Management Prepared for alido by: David Loshin nowledge Integrity, Inc. June, 2010 2010 nowledge Integrity, Inc. Page 1 Introduction The increasing

More information

Content monitoring and maintenance includes, but is not limited to:

Content monitoring and maintenance includes, but is not limited to: Page 1 of 6 Glossary of web terms Accessibility Web accessibility refers to the practice of making websites usable by people of all abilities and disabilities. When sites are correctly designed, developed

More information

Computer/IT Project LIST. Contact: 9860171201 8796142757

Computer/IT Project LIST. Contact: 9860171201 8796142757 Computer/IT Project LIST Contact: 9860171201 8796142757 1. Detecting E Banking Phishing Websites Using Associative Classification 2. Vehicle Tracking Using Driver Mobile Gps Tracking 3. Sentiment Analysis

More information

Guidelines for Researching Potential Jurors: Minimizing The Risks Of Leaving Footprints Behind The Problem

Guidelines for Researching Potential Jurors: Minimizing The Risks Of Leaving Footprints Behind The Problem Guidelines for Researching Potential s: Minimizing The Risks Of Leaving Footprints Behind The Problem Introduction As technology evolves, new ways of communicating emerge that cause existing policies and

More information

ProjectWise and Project Web

ProjectWise and Project Web ProjectWise and Project Web Rimantas Varanavicius Product manager, ProjectWise Integration Server Agenda Connecting people and information using ProjectWise and SharePoint ProjectWise V8i and SharePoint

More information

Achieving PCI Compliance Using F5 Products

Achieving PCI Compliance Using F5 Products Achieving PCI Compliance Using F5 Products Overview In April 2000, Visa launched its Cardholder Information Security Program (CISP) -- a set of mandates designed to protect its cardholders from identity

More information

Espial IPTV Middleware. Evo Solution Whitepaper. <Title> Delivering Interactive, Personalized 3-Screen Services

Espial IPTV Middleware. Evo Solution Whitepaper. <Title> Delivering Interactive, Personalized 3-Screen Services Espial IPTV Middleware Evo Solution Whitepaper Delivering Interactive, Personalized 3-Screen Services April 2010 Espial Group 1997-2010. All rights reserved The 3-Screen Challenge Differentiate

More information

Privacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction

Privacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction Privacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction Welcome! TripleFirrre, LLC, dba Just Seconds Apart knows that safeguarding your privacy is serious business. Your privacy

More information

Search Engine Optimization Glossary

Search Engine Optimization Glossary Search Engine Optimization Glossary A ALT Text/Tag or Attribute: A description of an image in your site's HTML. Unlike humans, search engines read only the ALT text of images, not the images themselves.

More information

Privacy Policy EMA Online

Privacy Policy EMA Online Privacy Policy EMA Online Thank you for visiting our Privacy Policy. We are committed to respecting the privacy rights of the users of www.emaonline.com ( Website ). We created this privacy policy (the

More information

Scalable End-User Access to Big Data http://www.optique-project.eu/ HELLENIC REPUBLIC National and Kapodistrian University of Athens

Scalable End-User Access to Big Data http://www.optique-project.eu/ HELLENIC REPUBLIC National and Kapodistrian University of Athens Scalable End-User Access to Big Data http://www.optique-project.eu/ HELLENIC REPUBLIC National and Kapodistrian University of Athens 1 Optique: Improving the competitiveness of European industry For many

More information

MYACCLAIM PRIVACY POLICY

MYACCLAIM PRIVACY POLICY MYACCLAIM PRIVACY POLICY 1. Introduction MyAcclaim is an online collaboration tool that allows users to annotate video. MyAcclaim s mission is to allow its users, with ease and simplicity, to unleash the

More information

KASPERSKY DDoS PROTECTION. Protecting your business against financial and reputational losses with Kaspersky DDoS Protection

KASPERSKY DDoS PROTECTION. Protecting your business against financial and reputational losses with Kaspersky DDoS Protection KASPERSKY DDoS PROTECTION Protecting your business against financial and reputational losses A Distributed Denial of Service (DDoS) attack is one of the most popular weapons in the cybercriminals arsenal.

More information

Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace

Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:

More information

DL.2009 Links Between Research and Experimentation: Use Case for FIRE Testbed

DL.2009 Links Between Research and Experimentation: Use Case for FIRE Testbed Networking for Communications Challenged Communities: Architecture, Test Beds and Innovative Alliances Contract no: 223994 DL.2009 Links Between Research and Experimentation: Use Case for FIRE Testbed

More information

WHITE PAPER. Creating your Intranet Checklist

WHITE PAPER. Creating your Intranet Checklist WHITE PAPER Creating your Intranet Checklist About this guide It can be overwhelming to run and manage an Intranet project. As a provider of Intranet software and services to small, medium and large organizations,

More information

Samsung SDS. Fast IDentity Online

Samsung SDS. Fast IDentity Online Samsung SDS Innovating User In the era of Digital Convergence In the coming era of digital convergence, user authentication is becoming increasingly important as a gateway to the digital world. Companies

More information

Account Restrictions Agreement [ARA] - Required by LuxSci HIPAA Accounts

Account Restrictions Agreement [ARA] - Required by LuxSci HIPAA Accounts Medical Privacy Version 2015.04.13 Account Restrictions Agreement [ARA] - Required by LuxSci HIPAA Accounts In order for Lux Scientiae, Incorporated (LuxSci) to ensure the security and privacy of all Electronic

More information

PRIVACY NOTICE. Last Updated: March 24, 2015

PRIVACY NOTICE. Last Updated: March 24, 2015 PRIVACY NOTICE Your access to and use of this website is governed by the TERMS OF WEBSITE USE and the following PRIVACY NOTICE. Please read them carefully as they constitute a legally binding agreement

More information

Segmented monitoring of 100Gbps data containing CDN video. Telesoft White Papers

Segmented monitoring of 100Gbps data containing CDN video. Telesoft White Papers Segmented monitoring of 100Gbps data containing CDN video Telesoft White Papers Steve Patton Senior Product Manager 23 rd April 2015 IP Video The Challenge The growth in internet traffic caused by increasing

More information

ETHICAL ELECTRIC PRIVACY POLICY. Last Revised: December 15, 2015

ETHICAL ELECTRIC PRIVACY POLICY. Last Revised: December 15, 2015 ETHICAL ELECTRIC PRIVACY POLICY Last Revised: December 15, 2015 This policy ("Policy") covers the privacy practices that Ethical Electric, Inc. ("Ethical Electric", "we" or "us") employs with respect to

More information

Last Updated: 08/27/2013. Measuring Social Media for Social Change A Guide for Search for Common Ground

Last Updated: 08/27/2013. Measuring Social Media for Social Change A Guide for Search for Common Ground Last Updated: 08/27/2013 Measuring Social Media for Social Change A Guide for Search for Common Ground Table of Contents What is Social Media?... 3 Structure of Paper... 4 Social Media Data... 4 Social

More information

IBM Software Group Thought Leadership Whitepaper. IBM Customer Experience Suite and Real-Time Web Analytics

IBM Software Group Thought Leadership Whitepaper. IBM Customer Experience Suite and Real-Time Web Analytics IBM Software Group Thought Leadership Whitepaper IBM Customer Experience Suite and Real-Time Web Analytics 2 IBM Customer Experience Suite and Real-Time Web Analytics Introduction IBM Customer Experience

More information

PRIVACY IMPLICATIONS FOR NEXT GENERATION SIEMs AND OTHER META-SYSTEMS

PRIVACY IMPLICATIONS FOR NEXT GENERATION SIEMs AND OTHER META-SYSTEMS PRIVACY IMPLICATIONS FOR NEXT GENERATION SIEMs AND OTHER META-SYSTEMS www.massif-project.eu Dr Andrew Hutchison T-Systems (andrew.hutchison@t-systems.com) MAanagement of Security information and events

More information