Overview. Data Mining Algorithms. Going Through Loops. The CRISP-DM Model. Six Steps. Business Understanding. Data Mining End to End.

Size: px
Start display at page:

Download "Overview. Data Mining Algorithms. Going Through Loops. The CRISP-DM Model. Six Steps. Business Understanding. Data Mining End to End."

Transcription

1 Overview Data Mining Algorithms Data Mining End to End Graham Williams Principal Data Miner, ATO Adjunct Associate Professor, ANU 1 Process CRISP-DM 2 Hot Spots NRMA Medicare 3 Evaluation and Communication Communicating Performance 4 Privacy Protecting Privacy Copyright c 26, Graham J Williams 1/48/1 Copyright c 26, Graham J Williams 3/4 The CRISP-DM Model Going Through Loops Cyclic nature of data mining: Cross Industry Standard Process for Data Mining Developed by NCR, Daimler-Benz, ISL, OHRA Define and validate a Data Mining Process Model applicable in diverse industry sectors industry and tool neutral large data mining projects executed faster, cheaper, more reliably and more manageably Life cycle of six (iterative) phases Every step of a data mining process can lead to revisiting any one of the previous steps A DM process continues after a solution has been deployed The lessons learnt can trigger new, often more focused business questions Subsequent data mining processes benefit from experiences of previous ones Copyright c 26, Graham J Williams 4/48/3 Copyright c 26, Graham J Williams 5/4 Six Steps Business Understanding 1 Business Understanding (25%) 2 Data Understanding (2%) 3 Data Preparation (25%) 4 Modelling (1%) 5 Evaluation (2%) 6 Deployment 4 Analysis 1% 1 Find Objectives 2% 3 Data Mining 1% 2 Data Preparation 6% We had better make sure we are addressing a real business problem Initial phase focuses on understanding project objectives and requirements from a business perspective This knowledge is converted into a data mining problem definition Develop a preliminary plan designed to achieve the objectives Copyright c 26, Graham J Williams 6/48/5 Copyright c 26, Graham J Williams 7/4

2 Data Understanding Data Preparation Understand what data is available and its semantics Initial data collection Familiarisation with the data identify data quality problems discover first insights into the data detect interesting subsets to form hypotheses for hidden information Bring together the data get it into shape for mining Construct the mining dataset Derived from the initial raw dataset(s) Data preparation tasks: table, record, and attribute selection generation of derived features data transformation data cleaning Copyright c 26, Graham J Williams 8/48/7 Copyright c 26, Graham J Williams 9/4 Preparing to Mine Modelling Issues to be dealt with include: Data Quality missing data noisy data lead to inconsistent or too general/specific discoveries Data Cleaning duplicates inconsistencies identify and merge the same entities Now the data mining begins!!! Select various modelling techniques Apply and calibrate modelling techniques Typically there are several techniques for the same data mining problem Some techniques have specific requirements on the form of data and require stepping back to the data preparation phase Copyright c 26, Graham J Williams 1/48/9 Copyright c 26, Graham J Williams 11/ Evaluation Deployment How do we know we have a useful outcome? Evaluate the model and review the steps executed to construct the model Does the model properly achieve the business objectives? Is there some important business issue that has not been sufficiently considered? Decide on the use of the data mining results No point to data mining unless we action the outcomes Deployment may be: Generate a report of the discoveries made Implement changes in the processes of the organisation Implement a repeatable data mining process For successful deployment the customer must understand the actions to be carried out in order to actually make use of the created models Copyright c 26, Graham J Williams 12/48/11 Copyright c 26, Graham J Williams 13/

3 Summary Overview The KDD Process Interative process requiring multiple loops Time consuming Mining is one small step Data issues are crucial to success 1 Process CRISP-DM 2 Hot Spots NRMA Medicare 3 Evaluation and Communication Communicating Performance 4 Privacy Protecting Privacy Copyright c 26, Graham J Williams 14/48/13 Copyright c 26, Graham J Williams 15/ Motor Vehicle Insurance Cluster then Describe then Measure Insurance premium setting and risk rating Actuaries study data and domain for general understanding of risk Several million transactions annually Consider more than the traditional small number of factors Data mining can explore very large collections of data both entities and features The Hot Spots methodology combines Cluster Analysis and Decision Trees to symbolically identify candidate regions of a dataset ClaimCost $695 SumRqst $15, C1 Cost = $95, Model [holden, ford] ClmType 6 C2 Postcode 2949 C3 C2 Cubic 24 C4 C1 C3 Cost = $158, Copyright c 26, Graham J Williams 16/48/15 Copyright c 26, Graham J Williams 17/ Find the Interesting Groups Finding the Interesting Groups Rule 1 Rule 23 NCB < 6 and Age 24 and Address is Urban Age > 57 and Vehicle {Utility, Station Wagon} Evaluate the large collection of groups (or Hot Spots) to find those that are important to the core business Nugget Claims Total Proportion Average Cost Total Cost , , , , , , , ,8, All ,, Nugget By Claims By Proportion By Average Cost 2 Y 3 Y 19 Y 24 Y 34 Y Y Y 35 Y Y 36 Y 4 Y Y Copyright c 26, Graham J Williams 18/48/17 Copyright c 26, Graham J Williams 19/

4 pina pinb pinc Find the Interesting Groups Operationalise Rule 1 Rule 23 NCB < 6 and Age 24 and Address is Urban Age > 57 and Vehicle {Utility, Station Wagon} Nugget Claims Total Proportion Average Cost Total Cost , , , , , , , ,8, All ,, Identify groups that are: High Risk Very high dollars per claim Large percentage of claims in the group Low Risk Very few claims from the group Claims are low in dollars Copyright c 26, Graham J Williams 2/48/19 Copyright c 26, Graham J Williams 21/ Health Insurance Commission Cluster/Describe/Measure Universal Health Coverage Terabytes of patient claims since the inception of Medicare Inappropriate Provider practices an ongoing focus Exploration of public fraud (including doctor shoppers) Exploration of the practise of pathology ClaimCost $695 SumRqst $15, C1 Cost = $95, Model [holden, ford] ClmType 6 C2 Postcode 2949 C3 C2 Cubic 24 C4 C1 C3 Cost = $158, Copyright c 26, Graham J Williams 22/48/21 Copyright c 26, Graham J Williams 23/ Cluster/Describe/Deliver Claim Hoarders Rule 1 Age is between 28 and 35 and Weeks 5 Rule 2 Weeks < 1 and Benefits > $35 Nugget Size Age Gender Services Benefits Weeks Hoard Regular F F M F M M F All 4, A distinct group of behaviour identified as Claim Hoarders But there may be many millions of these individuals Copyright c 26, Graham J Williams 24/48/23 Copyright c 26, Graham J Williams 25/

5 Medicare Regulars Operationalise Group of patients with very regular activity: 3 pinad 45 pind The fraud identified was investigated and appropriate action taken Perpetrators prosecuted Funds recovered Processes improved to cross validate data Remove non-cash payments!!! Copyright c 26, Graham J Williams 26/48/25 Copyright c 26, Graham J Williams 27/ Overview The Importance of Communication 1 Process CRISP-DM 2 Hot Spots NRMA Medicare 3 Evaluation and Communication Communicating Performance 4 Privacy Protecting Privacy Selling the story to management Do we present the model or the outcomes? Senior management in something like the ATO is necessarily cautious, protecting the integrity of the countries revenue system Need to demonstrate and prove the performance and robustness of models before deployment Copyright c 26, Graham J Williams 28/48/27 Copyright c 26, Graham J Williams 29/ Options in Rattle: Confusion Matrix A simple instrument to convey predictive performance But quite a blunt instrument Confusion matrix rpart model on auditcsv [test] (counts): Actual Predicted Confusion matrix rpart model on auditcsv [test] (%): Options in Rattle: Risk Charts Developed specifically for the ATO Capture both the score exhibited through probability, and the size of the Risk associated with each case! Often, it is the Risk that is of most interest Actual Predicted Copyright c 26, Graham J Williams 3/48/29 Copyright c 26, Graham J Williams 31/

6 Risk Chart: RPart Risk Chart: RF Copyright c 26, Graham J Williams 32/48/31 Copyright c 26, Graham J Williams 33/ Risk Chart: SVM Risk Chart: Textual Comparison The area under the Risk and Recall curves for rpart model Area under the Risk (red) curve: 79% (79) Area under the Recall (green) curve: 76% (762) The area under the Risk and Recall curves for rf model Area under the Risk (red) curve: 78% (78) Area under the Recall (green) curve: 78% (779) The area under the Risk and Recall curves for ksvm model Area under the Risk (red) curve: 78% (777) Area under the Recall (green) curve: 77% (774) Which is best? Copyright c 26, Graham J Williams 34/48/33 Copyright c 26, Graham J Williams 35/ Overview Privacy and Data Mining 1 Process CRISP-DM 2 Hot Spots NRMA Medicare 3 Evaluation and Communication Communicating Performance 4 Privacy Protecting Privacy Laws in many countries directly affect Data Mining and it is worth being aware of them penalties are often severe The OECD Principles of Data Collection were drafted in 198 They embody guiding principles for governments Revised for APEC 23 as part of the Asia-Pacific Privacy Charter Initiative Data mining by the Australian Taxation Office is governed by data matching and privacy protocols, and independently overseen by Privacy Commissioner, ANAO, and others Copyright c 26, Graham J Williams 36/48/35 Copyright c 26, Graham J Williams 37/

7 What are we trying to protect? Protect, amongst others: Religious freedom Freedom from racial discrimination Personal medical records Employment history Political freedom Centrelink and Privacy Breaches In August 26 CentreLink (Australian Social Security Agency) announced it had identified over 5 privacy breaches committed by staff Identified by monitoring and mining database access logs Activities looking at own personal records looking at family, friends, neighbours obtaining information to be sold changing information for financial gain Consequences counselling reduced pay/position lose job Copyright c 26, Graham J Williams 38/48/37 Copyright c 26, Graham J Williams 39/ AOL Privacy Breech Criminal Intent or Research AOL researchers thought to release anonimised web query logs for researchers (August 26) Covered 25, users and 2 million queries (Compare with US DoJ demand that Google, AOL, etc, supply such data for them to monitor their citizens) Usernames converted to numeric IDs But, aggregate queries for a single numeric ID enough to identify individuals multiple queries paint a picture private financial situation: property and bank loan enquiries indication of criminal activity or research for a book? health: pregnancy, home loan, dog vomit + uncooked pasta This was a screw-up and we re angry and upset about it AOL Would we use the following to investigate someone? how to change brake pads on scion xb 25 us open cup florida state champions how to get revenge on a ex how to get revenge on a ex girlfriend how to get revenge on a friend who you over replacement bumper for scion xb florida department of law enforcement crime stoppers florida Perhaps someone researching a novel! Copyright c 26, Graham J Williams 4/48/39 Copyright c 26, Graham J Williams 41/ A Distressed Victim? Privacy is Important A quite distressing example from the AOL disclosure: casey middle school surgical help for depression can you adopt after a suicide attempt gynecology oncologists in new york city Fishman David Dr 16 E 34th St, New York, 116 how to tell your family you re a victim of incest how long will the swelling last after my tummy tuck teaching positions in denver colorado divorce laws in ohio Privacy is important to ensure freedom from oppression Privacy can be breached either accidentally or purposefully How much should we allow our governments breach our privacy what is the right trade off? Copyright c 26, Graham J Williams 42/48/41 Copyright c 26, Graham J Williams 43/

8 Principles of Data Collection Principles of Data Collection 1 Collection Limitation: There should be limits to the collection of personal data and any such data should be obtained by lawful and fair means and, where appropriate, with the knowledge or consent of the data subject 2 Data Quality: Personal data should be relevant to the purposes for which they are to be used, and, to the extent necessary for those purposes, should be accurate, compete and kept up-to-date 3 Purpose Specification: The purposes for which personal data are collected should be specified not later than at the time of collection and the subsequent use limited to the fulfilment of those purposes or such others as are not incompatible with those purposes and as are specified on each occasion of change of purpose 4 Use limitation: Personal data should not be disclosed, made available or otherwise used for purposes other than those specified in accordance with [Principle 3] except: with the consent of the data subject; or by the authority of law Copyright c 26, Graham J Williams 44/48/43 Copyright c 26, Graham J Williams 45/ Principles of Data Collection Principles of Data Collection 5 Security Safeguards: Personal data should be protected by reasonable security safeguards against such risks as loss or unauthorised access, destruction, use, modification or disclosure of data 6 Openness: There should be a general policy of openness about developments, practices and policies with respect to personal data Means should be readily available of establishing the existence and nature of personal data, and the main purposes of their use, as well as the identity and usual residence of the data controller 7 Individual Participation: An individual should have the right to obtain confirmation of whether or not a data controller has data relating to them, and to have access to that data within a reasonable time and cost, and to be able to challenge any denial, and to be able to challenge data relating to themselves and, if the challenge is successful, to have the data erased, rectified, completed or amended 8 Accountability: A data controller should be accountable for complying with measures giving effect to these principles Copyright c 26, Graham J Williams 46/48/45 Copyright c 26, Graham J Williams 47/ Thank You Copyright c 26, Graham J Williams 48/48/47

Information Governance Policy

Information Governance Policy Information Governance Policy 1 Introduction Healthwatch Rutland (HWR) needs to collect and use certain types of information about the Data Subjects who come into contact with it in order to carry on its

More information

ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY

ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY Originated by: Data Protection Working Group: November 2008 Impact Assessment: (to be confirmed) Recommended by Senate: 28 January 2009 Approved by Council:

More information

How To Know What You Can And Can'T Do At The University Of England Students Union

How To Know What You Can And Can'T Do At The University Of England Students Union HOW WE USE YOUR INFORMATION This privacy notice tells you what to expect when University of Essex Students Union (referred to as the SU herein) collects personal information. It applies to information

More information

Corporate ICT & Data Management. Data Protection Policy

Corporate ICT & Data Management. Data Protection Policy 90 Corporate ICT & Data Management Data Protection Policy Classification: Unclassified Date Created: January 2012 Date Reviewed January Version: 2.0 Author: Owner: Data Protection Policy V2 1 Version Control

More information

HIPSSA Project. Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Second Mission -Namibia

HIPSSA Project. Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Second Mission -Namibia HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Second Mission -Namibia PRESENTATION OF THE DRAFT DATA PROTECTION POLICY FOR NAMIBIA Pria Chetty, ITU International Legal

More information

How To Understand The Data Protection Act

How To Understand The Data Protection Act DATA PROTECTION ACT 2002 The Basics Purpose of the Act Balance the rights of an individual with an organisation s legitimate need to process personal data Promote openness and transparency Establish and

More information

Little Marlow Parish Council Registration Number for ICO Z3112320

Little Marlow Parish Council Registration Number for ICO Z3112320 Data Protection Policy Little Marlow Parish Council Registration Number for ICO Z3112320 Adopted 2012 Reviewed 23 rd February 2016 Introduction The Parish Council is fully committed to compliance with

More information

CRISP - DM. Data Mining Process. Process Standardization. Why Should There be a Standard Process? Cross-Industry Standard Process for Data Mining

CRISP - DM. Data Mining Process. Process Standardization. Why Should There be a Standard Process? Cross-Industry Standard Process for Data Mining Mining Process CRISP - DM Cross-Industry Standard Process for Mining (CRISP-DM) European Community funded effort to develop framework for data mining tasks Goals: Cross-Industry Standard Process for Mining

More information

Data Protection Act a more detailed guide

Data Protection Act a more detailed guide Data Protection Act a more detailed guide What does the Act do? The Data Protection Act 1998 places considerable duties on organisations which process personal data; increases the rights of access by data

More information

QUEENSLAND COUNTRY HEALTH FUND. privacy policy. Queensland Country Health Fund Ltd ABN 18 085 048 237. better health cover shouldn t hurt

QUEENSLAND COUNTRY HEALTH FUND. privacy policy. Queensland Country Health Fund Ltd ABN 18 085 048 237. better health cover shouldn t hurt QUEENSLAND COUNTRY HEALTH FUND privacy policy Queensland Country Health Fund Ltd ABN 18 085 048 237 better health cover shouldn t hurt 1 2 contents 1. Introduction 4 2. National Privacy Principles 5 3.

More information

Policy Document Control Page

Policy Document Control Page Policy Document Control Page Title Title: Data Protection Policy Version: 3 Reference Number: CO59 Keywords: Data, access, principles, protection, Act. Data Subject, Information Supersedes Supersedes:

More information

Data Protection Act 1998 The Data Protection Policy for the Borough Council of King's Lynn & West Norfolk

Data Protection Act 1998 The Data Protection Policy for the Borough Council of King's Lynn & West Norfolk Data Protection Act 1998 The for the Borough Council of King's Lynn & West Norfolk 1 Contents Introduction 3 1. Statement of Intent 4 2. Fair Obtaining I Processing 5 3. Data Uses and Processes 6 4. Data

More information

The Privacy Act 1988 contains 10 National Privacy Principles (the NPPs) which specify how organisations should handle personal information.

The Privacy Act 1988 contains 10 National Privacy Principles (the NPPs) which specify how organisations should handle personal information. Privacy policy Abstract Page 1 Preamble The Privacy Act 1988 contains 10 National s (the NPPs) which specify how organisations should handle personal information. The Anglican Church Diocese of Sydney

More information

Privacy Policy Draft

Privacy Policy Draft Introduction Privacy Policy Draft Please note this is a draft policy pending final approval Alzheimer s Australia values your privacy and takes reasonable steps to protect your personal information (that

More information

HERTSMERE BOROUGH COUNCIL

HERTSMERE BOROUGH COUNCIL HERTSMERE BOROUGH COUNCIL DATA PROTECTION POLICY October 2007 1 1. Introduction Hertsmere Borough Council ( the Council ) is fully committed to compliance with the requirements of the Data Protection Act

More information

CORK INSTITUTE OF TECHNOLOGY

CORK INSTITUTE OF TECHNOLOGY CORK INSTITUTE OF TECHNOLOGY DATA PROTECTION POLICY APPROVED BY GOVERNING BODY ON 30 APRIL 2009 INTRODUCTION Cork Institute of Technology is committed to a policy of protecting the rights and privacy of

More information

DATA PROTECTION POLICY. Examples of personal data which TWM may require from clients include the following and for the reasons ascribed to each;

DATA PROTECTION POLICY. Examples of personal data which TWM may require from clients include the following and for the reasons ascribed to each; DATA PROTECTION POLICY Introduction TWM Solicitors maintain certain personal data about individuals for the purposes of satisfying operational and legal obligations. The Data Protection Act sets rules

More information

UNIVERSITY OF SOUTHAMPTON DATA PROTECTION POLICY

UNIVERSITY OF SOUTHAMPTON DATA PROTECTION POLICY UNIVERSITY OF SOUTHAMPTON DATA PROTECTION POLICY 1. Purpose 1.1 The Data Protection Act 1998 ( the Act ) has two principal purposes: i) to regulate the use by those (known as data controllers) who obtain,

More information

Data Protection in Ireland

Data Protection in Ireland Data Protection in Ireland 0 Contents Data Protection in Ireland Introduction Page 2 Appointment of a Data Processor Page 2 Security Measures (onus on a data controller) Page 3 8 Principles Page 3 Fair

More information

Database Marketing, Business Intelligence and Knowledge Discovery

Database Marketing, Business Intelligence and Knowledge Discovery Database Marketing, Business Intelligence and Knowledge Discovery Note: Using material from Tan / Steinbach / Kumar (2005) Introduction to Data Mining,, Addison Wesley; and Cios / Pedrycz / Swiniarski

More information

Protection. Code of Practice. of Personal Data RPC001147_EN_WB_L_1

Protection. Code of Practice. of Personal Data RPC001147_EN_WB_L_1 Protection of Personal Data RPC001147_EN_WB_L_1 Table of Contents Data Protection Rules Foreword From the Data Protection Commissioner Introduction From the Chairman Data Protection Responsibility of Employees

More information

Data Protection and Information Security. Procedure for reporting a breach of data security. April 2013

Data Protection and Information Security. Procedure for reporting a breach of data security. April 2013 Data Protection and Information Security Procedure for reporting a breach of data security April 2013 Page 1 of 6 Created on: 01/04/2009 Contents 1 Introduction... 3 2 Data Classification... 3 3 What Is

More information

PERSONAL INJURIES ASSESSMENT BOARD DATA PROTECTION CODE OF PRACTICE

PERSONAL INJURIES ASSESSMENT BOARD DATA PROTECTION CODE OF PRACTICE PERSONAL INJURIES ASSESSMENT BOARD DATA PROTECTION CODE OF PRACTICE ADOPTED ON 9 th January 2008 TABLE OF CONTENTS Page No. 1 Introduction...3 2 Glossary...3 3 Types of Personal Data held by Us...3 4 Obligations

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY Reference number Approved by Information Management and Technology Board Date approved 14 th May 2012 Version 1.1 Last revised N/A Review date May 2015 Category Information Assurance Owner Data Protection

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY DATA PROTECTION POLICY Version 1.3 April 2014 Contents 1 POLICY STATEMENT...2 2 PURPOSE....2 3 LEGAL CONTEXT AND DEFINITIONS...2 3.1 Data Protection Act 1998...2 3.2 Other related legislation.....4 3.3

More information

Islington Data Protection Policy. A council-wide information policy Version 1.1 June 2014

Islington Data Protection Policy. A council-wide information policy Version 1.1 June 2014 A council-wide information policy Version 1.1 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document is distributed under the Creative Commons Attribution 2.5 license.

More information

technical factsheet 176

technical factsheet 176 technical factsheet 176 Data Protection CONTENTS 1. Introduction 1 2. Register with the Information Commissioner s Office 1 3. Period protection rights and duties remain effective 2 4. The data protection

More information

Code of Practice on Data Protection for the Insurance Sector

Code of Practice on Data Protection for the Insurance Sector Code of Practice on Data Protection for the Insurance Sector (Approved by the Data Protection Commissioner under Section 13 (2) of the Data Protection Acts, 1988 and 2003) Forward I am very happy to be

More information

Data Protection Policy

Data Protection Policy Data Protection Policy September 2015 Contents 1. Scope 2. Purpose 3. Data protection roles 4. Staff training and guidance 5. About the Data Protection Act 1998 6. Policy 7. The Information Commissioner's

More information

MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY

MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY Page 1 of 16 Contents Policy Information 3 Introduction 4 Responsibilities 7 Confidentiality 9 Data recording and storage 11 Subject Access 12 Transparency

More information

PRIVACY POLICY. Last updated February 2, 2009 INTRODUCTION

PRIVACY POLICY. Last updated February 2, 2009 INTRODUCTION PRIVACY POLICY Last updated February 2, 2009 INTRODUCTION This Privacy Policy explains how personal information about you may be collected, used, or disclosed by the Canadian Education and Research Institute

More information

The kinds of personal information we collect and hold vary depending on the services we are providing, but generally can include:

The kinds of personal information we collect and hold vary depending on the services we are providing, but generally can include: ABN 47 001 768 190 AFSL 244526 Our Privacy Policy At Capital Insurance Brokers, we are committed to protecting your privacy in accordance with the Privacy Act 1988 (Cth) (Privacy Act) and the Australian

More information

Protection. Code of Practice. of Personal Data RPC001147_EN_D_19

Protection. Code of Practice. of Personal Data RPC001147_EN_D_19 Protection of Personal Data RPC001147_EN_D_19 Table of Contents Data Protection Rules Foreword From the Data Protection Commissioner Introduction From the Chairman Data Protection Rules Responsibility

More information

communications between us and your financial, legal or other adviser, or your broker or agent;

communications between us and your financial, legal or other adviser, or your broker or agent; Privacy policy Updated: 25 June 2014 This Privacy Policy applies to information collected by 255 Finance Pty Ltd ABN 23 168 112 507 and its related bodies corporate ( 255 Finance or we ). This policy outlines

More information

UNILEVER PRIVACY PRINCIPLES UNILEVER PRIVACY POLICY

UNILEVER PRIVACY PRINCIPLES UNILEVER PRIVACY POLICY UNILEVER PRIVACY PRINCIPLES Unilever takes privacy seriously. The following five principles underpin our approach to respecting your privacy: 1. We value the trust that you place in us by giving us your

More information

Once more unto the breach... Dealing with Personal Data Security Breaches. Helen Williamson Information Governance Officer

Once more unto the breach... Dealing with Personal Data Security Breaches. Helen Williamson Information Governance Officer Once more unto the breach... Dealing with Personal Data Security Breaches Helen Williamson Information Governance Officer Aims of the session What are we going to look at? What is a data security breach?

More information

Data Protection Policy

Data Protection Policy Internal Ref: NELC 16.60 Review date December 2016 Version No. V04 Data Protection Policy 1 Data Protection Statement Data Protection Policy 1.1 North East Lincolnshire Council recognises that in order

More information

PRIVACY POLICY. comply with the Australian Privacy Principles ("APPs"); ensure that we manage your personal information openly and transparently;

PRIVACY POLICY. comply with the Australian Privacy Principles (APPs); ensure that we manage your personal information openly and transparently; PRIVACY POLICY Our Privacy Commitment Glo Light Pty Ltd A.C.N. 099 730 177 trading as "Lighting Partners Australia of 16 Palmer Parade, Cremorne, Victoria 3121, ( LPA ) is committed to managing your personal

More information

John Leggott College. Data Protection Policy. Introduction

John Leggott College. Data Protection Policy. Introduction John Leggott College Data Protection Policy Introduction The College needs to keep certain information about its employees, students and other users to allow it to monitor performance, achievements, and

More information

OBJECTS AND REASONS. (a) the regulation of the collection, keeping, processing, use or dissemination of personal data;

OBJECTS AND REASONS. (a) the regulation of the collection, keeping, processing, use or dissemination of personal data; OBJECTS AND REASONS This Bill would provide for (a) the regulation of the collection, keeping, processing, use or dissemination of personal data; (b) the protection of the privacy of individuals in relation

More information

PRIVACY POLICY Personal information and sensitive information Information we request from you

PRIVACY POLICY Personal information and sensitive information Information we request from you PRIVACY POLICY Business Chicks Pty Ltd A.C.N. 121 566 934 (we, us, our, or Business Chicks) recognises and values the protection of your privacy. We also understand that you want clarity about how we manage

More information

Disclosure Scheme. The Domestic Violence. Keeping People Safe from Domestic Violence

Disclosure Scheme. The Domestic Violence. Keeping People Safe from Domestic Violence The Domestic Violence Disclosure Scheme Keeping People Safe from Domestic Violence This leaflet is for you if you are in a relationship and you are worried that your partner may have been abusive in the

More information

DESTINATION MELBOURNE PRIVACY POLICY

DESTINATION MELBOURNE PRIVACY POLICY DESTINATION MELBOURNE PRIVACY POLICY 2 Destination Melbourne Privacy Policy Statement Regarding Privacy Policy Destination Melbourne Limited recognises the importance of protecting the privacy of personally

More information

CCTV CODE OF PRACTICE

CCTV CODE OF PRACTICE CCTV CODE OF PRACTICE Policy area: Operation of CCTV on University Premises Definitions CCTV means Closed Circuit Television. Control Room(s) means those Control Rooms manned by Security staff at the City,

More information

CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION DIRECTIVE

CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION DIRECTIVE Représentant les avocats d Europe Representing Europe s lawyers CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION DIRECTIVE CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION

More information

CorporateGuard Comprehensive Crime Insurance

CorporateGuard Comprehensive Crime Insurance AIG Australia Limited Comprehensive Crime Insurance 1 of 13 Page Page 1 of 13 An Important Notice Your Duty of Disclosure Before you enter into an insurance contract, you have a duty to tell us anything

More information

Derbyshire Constabulary GUIDANCE ON THE SAFE USE OF THE INTERNET AND SOCIAL MEDIA BY POLICE OFFICERS AND POLICE STAFF POLICY REFERENCE 09/268

Derbyshire Constabulary GUIDANCE ON THE SAFE USE OF THE INTERNET AND SOCIAL MEDIA BY POLICE OFFICERS AND POLICE STAFF POLICY REFERENCE 09/268 Derbyshire Constabulary GUIDANCE ON THE SAFE USE OF THE INTERNET AND SOCIAL MEDIA BY POLICE OFFICERS AND POLICE STAFF POLICY REFERENCE 09/268 This guidance is suitable for Public Disclosure Owner of Doc:

More information

DATA PROTECTION ACT 1998 COUNCIL POLICY

DATA PROTECTION ACT 1998 COUNCIL POLICY DATA PROTECTION ACT 1998 COUNCIL POLICY Page 1 of 5 POLICY STATEMENT Blackpool Council recognises the need to fully comply with the requirements of the Data Protection Act 1998 (DPA) and the obligations

More information

Office of the Data Protection Commissioner of The Bahamas. Data Protection (Privacy of Personal Information) Act, 2003. A Guide for Data Controllers

Office of the Data Protection Commissioner of The Bahamas. Data Protection (Privacy of Personal Information) Act, 2003. A Guide for Data Controllers Office of the Data Protection Commissioner of The Bahamas Data Protection (Privacy of Personal Information) Act, 2003 A Guide for Data Controllers 1 Acknowledgement Some of the information contained in

More information

CRISP-DM: The life cicle of a data mining project. KDD Process

CRISP-DM: The life cicle of a data mining project. KDD Process CRISP-DM: The life cicle of a data mining project KDD Process Business understanding the project objectives and requirements from a business perspective. then converting this knowledge into a data mining

More information

Data Protection and Privacy Policy

Data Protection and Privacy Policy Data Protection and Privacy Policy 1. General This policy outlines Conciliation Resources commitments to respect the privacy of people s personal information and observe the relevant data protection legislation.

More information

Disclosure is the action of making new or secret information known.

Disclosure is the action of making new or secret information known. /PURPOSE OF POLICY Pty Limited (Momentum) is required and committed to comply with the Australian Privacy Principles (APPs) in the Privacy Act 1998 (Cth) (Privacy Act). The APPs regulate the manner in

More information

HIPAA Policy, Protection, and Pitfalls ARTHUR J. GALLAGHER & CO. BUSINESS WITHOUT BARRIERS

HIPAA Policy, Protection, and Pitfalls ARTHUR J. GALLAGHER & CO. BUSINESS WITHOUT BARRIERS HIPAA Policy, Protection, and Pitfalls Overview HIPAA Privacy Basics What s covered by HIPAA privacy rules, and what isn t? Interlude on the Hands-Off Group Health Plan When does this exception apply,

More information

Privacy Charter. Protecting Your Privacy

Privacy Charter. Protecting Your Privacy Privacy Charter Protecting Your Privacy 1 1. Introduction 3 2. Collection of personal information 3 What sort of personal information do we collect and hold? 3 Anonymity and Pseudonymity 3 Why do we collect

More information

DISASTER RECOVERY INSTITUTE CANADA WEBSITE PRIVACY POLICY (DRIC) UPDATED APRIL 2004

DISASTER RECOVERY INSTITUTE CANADA WEBSITE PRIVACY POLICY (DRIC) UPDATED APRIL 2004 DISASTER RECOVERY INSTITUTE CANADA (DRIC) UPDATED APRIL 2004 This website privacy policy is intended to provide DRIC website visitors with information about how DRIC treats private and personal information

More information

Data Sharing Protocol

Data Sharing Protocol Data Sharing Protocol Agreement for Sharing Data Between Partners of the South Dublin Childrens Services Committee Version 0.4 Final Draft June 2009 Contents 1 Preface...3 2 Introduction & Overview...3

More information

Using Data Mining to Detect Insurance Fraud

Using Data Mining to Detect Insurance Fraud IBM SPSS Modeler Using Data Mining to Detect Insurance Fraud Improve accuracy and minimize loss Highlights: combines powerful analytical techniques with existing fraud detection and prevention efforts

More information

THE PERSONAL INFORMATION PROTECTION AND ELECTRONIC DOCUMENTS ACT (PIPEDA) PERSONAL INFORMATION POLICY & PROCEDURE HANDBOOK

THE PERSONAL INFORMATION PROTECTION AND ELECTRONIC DOCUMENTS ACT (PIPEDA) PERSONAL INFORMATION POLICY & PROCEDURE HANDBOOK THE PERSONAL INFORMATION PROTECTION AND ELECTRONIC DOCUMENTS ACT (PIPEDA) PERSONAL INFORMATION POLICY & PROCEDURE HANDBOOK REVISED August 2004 PERSONAL INFORMATION POLICY & PROCEDURE HANDBOOK Introduction

More information

The CPS incorporates RCPO. CPS Data Protection Policy

The CPS incorporates RCPO. CPS Data Protection Policy The CPS incorporates RCPO CPS Data Protection Policy Contents Introduction 3 Scope 4 Roles and Responsibilities 4 Processing Criminal Cases 4 Information Asset Owners 5 Information Asset Register 5 Information

More information

Data Protection Act. Conducting privacy impact assessments code of practice

Data Protection Act. Conducting privacy impact assessments code of practice Data Protection Act Conducting privacy impact assessments code of practice 1 Conducting privacy impact assessments code of practice Data Protection Act Contents Information Commissioner s foreword... 3

More information

Policy on Public and School Bus Closed Circuit Television Systems (CCTV)

Policy on Public and School Bus Closed Circuit Television Systems (CCTV) DEPARTMENT OF TRANSPORT Policy on Public and School Bus Closed Circuit Television Systems (CCTV) Responsibility of: Public Transport Division TRIM File: DDPI2010/3680 Effective Date: July 2010 Version

More information

1. Introduction. 2. Sectoral Areas Affected. 3. Data Security. 4. Data Breach Requirements. 5. Traffic Data

1. Introduction. 2. Sectoral Areas Affected. 3. Data Security. 4. Data Breach Requirements. 5. Traffic Data 1. Introduction Special data protection rules apply to the protection of Personal Data by Data Controllers in the electronic communications sector. These are in addition to the general obligations that

More information

UAB MY HEALTH REWARDS BIOMETRIC SCREENING PROGRAM NOTICE OF HEALTH INFORMATION PRACTICES

UAB MY HEALTH REWARDS BIOMETRIC SCREENING PROGRAM NOTICE OF HEALTH INFORMATION PRACTICES UAB MY HEALTH REWARDS BIOMETRIC SCREENING PROGRAM NOTICE OF HEALTH INFORMATION PRACTICES 1 Effective Date: January 26, 2015 THIS NOTICE APPLIES TO THE UAB MY HEALTH REWARDS BIOMETRIC SCREENING PROGRAM

More information

AASA Online Privacy Policy CRP.020

AASA Online Privacy Policy CRP.020 Introduction Alzheimer s Australia SA Inc values your privacy and takes reasonable steps to protect your personal information (that is, information which identifies or may reasonably be used to identify

More information

Information Governance Strategy & Policy

Information Governance Strategy & Policy Information Governance Strategy & Policy March 2014 CONTENT Page 1 Introduction 1 2 Strategic Aims 1 3 Policy 2 4 Responsibilities 3 5 Information Governance Reporting Structure 4 6 Managing Information

More information

Information Governance Framework. June 2015

Information Governance Framework. June 2015 Information Governance Framework June 2015 Information Security Framework Janice McNay June 2015 1 Company Thirteen Group Lead Manager Janice McNay Date of Final Draft and Version Number June 2015 Review

More information

Iowa Student Loan Online Privacy Statement

Iowa Student Loan Online Privacy Statement Iowa Student Loan Online Privacy Statement Revision date: Jan.6, 2014 Iowa Student Loan Liquidity Corporation ("Iowa Student Loan") understands that you are concerned about the privacy and security of

More information

Data protection policy

Data protection policy Data protection policy Introduction The College is required to keep certain information about employees, students and other users to allow it to monitor performance, achievements, health and safety, recruitment

More information

Data Protection for the Guidance Counsellor. Issues To Plan For

Data Protection for the Guidance Counsellor. Issues To Plan For Data Protection for the Guidance Counsellor Issues To Plan For Author: Hugh Jones Data Protection Specialist Longstone Management Ltd. Published by the National Centre for Guidance in Education (NCGE)

More information

AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE

AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE This Notice of Privacy Practices describes the legal obligations of Ave Maria University, Inc. (the plan ) and your legal rights regarding your protected health

More information

AlixPartners, LLP. General Data Protection Statement

AlixPartners, LLP. General Data Protection Statement AlixPartners, LLP General Data Protection Statement GENERAL DATA PROTECTION STATEMENT 1. INTRODUCTION 1.1 AlixPartners, LLP ( AlixPartners ) is committed to fulfilling its obligations under the data protection

More information

Information Incident Management Policy

Information Incident Management Policy Information Incident Management Policy Change History Version Date Description 0.1 04/01/2013 Draft 0.2 26/02/2013 Replaced procedure details with broad principles 0.3 27/03/2013 Revised following audit

More information

Evolutionary Hot Spots Data Mining. An Architecture for Exploring for Interesting Discoveries

Evolutionary Hot Spots Data Mining. An Architecture for Exploring for Interesting Discoveries Evolutionary Hot Spots Data Mining An Architecture for Exploring for Interesting Discoveries Graham J Williams CRC for Advanced Computational Systems, CSIRO Mathematical and Information Sciences, GPO Box

More information

Data protection policy

Data protection policy Data protection policy Introduction 1 This document is the data protection policy for the Nursing and Midwifery Council (NMC). 2 The Data Protection Act 1998 (DPA) governs the processing of personal data

More information

Trading Terms 1. Payment 2. Orders 3. Freight/Postage (GST Applicable) 4. Pricing Policy (GST Applicable) 5. Invoice Format

Trading Terms 1. Payment 2. Orders 3. Freight/Postage (GST Applicable) 4. Pricing Policy (GST Applicable) 5. Invoice Format Trading Terms 1. Payment a) Payment for credit accounts is due 25 days from the end of month statement. b) Should an account become overdue and payment not received in our office by 30 days after the end

More information

Data Science with R. Introducing Data Mining with Rattle and R. [email protected]

Data Science with R. Introducing Data Mining with Rattle and R. Graham.Williams@togaware.com http: // togaware. com Copyright 2013, [email protected] 1/35 Data Science with R Introducing Data Mining with Rattle and R [email protected] Senior Director and Chief Data Miner,

More information

Data Protection Good Practice Note

Data Protection Good Practice Note Data Protection Good Practice Note This explanatory document explains what charities and voluntary organisations need to do to comply with the Data Protection Act 1988 as amended by the Data Protection

More information

Once you have submitted the online medical assessment you will receive an online reference number. ONLINE REFERENCE NUMBER Smartform number

Once you have submitted the online medical assessment you will receive an online reference number. ONLINE REFERENCE NUMBER Smartform number To the medical practitioner, Please complete the online section of this form if you deem your patient to have a permanent and severe physical, intellectual, sensory or psychological disability that is

More information

HIPAA Notice of Patient Privacy Practices

HIPAA Notice of Patient Privacy Practices HIPAA Notice of Patient Privacy Practices Effective Date: January 1, 2014 THIS NOTICE DESCRIBES HOW PROTECTED HEALTH INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION.

More information

Merthyr Tydfil County Borough Council. Data Protection Policy

Merthyr Tydfil County Borough Council. Data Protection Policy Merthyr Tydfil County Borough Council Data Protection Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of the

More information

HIPAA The Law Explained. Click here to view the HIPAA information.

HIPAA The Law Explained. Click here to view the HIPAA information. HIPAA The Law Explained Click here to view the HIPAA information. HIPAA - Provisions 5 Major Provisions/Titles Title 1 Title 2 Title 3 Title 4 Title 5 More Information on Administrative Simplification

More information