Overview. Data Mining Algorithms. Going Through Loops. The CRISP-DM Model. Six Steps. Business Understanding. Data Mining End to End.
|
|
|
- Ernest Todd Barrett
- 10 years ago
- Views:
Transcription
1 Overview Data Mining Algorithms Data Mining End to End Graham Williams Principal Data Miner, ATO Adjunct Associate Professor, ANU 1 Process CRISP-DM 2 Hot Spots NRMA Medicare 3 Evaluation and Communication Communicating Performance 4 Privacy Protecting Privacy Copyright c 26, Graham J Williams 1/48/1 Copyright c 26, Graham J Williams 3/4 The CRISP-DM Model Going Through Loops Cyclic nature of data mining: Cross Industry Standard Process for Data Mining Developed by NCR, Daimler-Benz, ISL, OHRA Define and validate a Data Mining Process Model applicable in diverse industry sectors industry and tool neutral large data mining projects executed faster, cheaper, more reliably and more manageably Life cycle of six (iterative) phases Every step of a data mining process can lead to revisiting any one of the previous steps A DM process continues after a solution has been deployed The lessons learnt can trigger new, often more focused business questions Subsequent data mining processes benefit from experiences of previous ones Copyright c 26, Graham J Williams 4/48/3 Copyright c 26, Graham J Williams 5/4 Six Steps Business Understanding 1 Business Understanding (25%) 2 Data Understanding (2%) 3 Data Preparation (25%) 4 Modelling (1%) 5 Evaluation (2%) 6 Deployment 4 Analysis 1% 1 Find Objectives 2% 3 Data Mining 1% 2 Data Preparation 6% We had better make sure we are addressing a real business problem Initial phase focuses on understanding project objectives and requirements from a business perspective This knowledge is converted into a data mining problem definition Develop a preliminary plan designed to achieve the objectives Copyright c 26, Graham J Williams 6/48/5 Copyright c 26, Graham J Williams 7/4
2 Data Understanding Data Preparation Understand what data is available and its semantics Initial data collection Familiarisation with the data identify data quality problems discover first insights into the data detect interesting subsets to form hypotheses for hidden information Bring together the data get it into shape for mining Construct the mining dataset Derived from the initial raw dataset(s) Data preparation tasks: table, record, and attribute selection generation of derived features data transformation data cleaning Copyright c 26, Graham J Williams 8/48/7 Copyright c 26, Graham J Williams 9/4 Preparing to Mine Modelling Issues to be dealt with include: Data Quality missing data noisy data lead to inconsistent or too general/specific discoveries Data Cleaning duplicates inconsistencies identify and merge the same entities Now the data mining begins!!! Select various modelling techniques Apply and calibrate modelling techniques Typically there are several techniques for the same data mining problem Some techniques have specific requirements on the form of data and require stepping back to the data preparation phase Copyright c 26, Graham J Williams 1/48/9 Copyright c 26, Graham J Williams 11/ Evaluation Deployment How do we know we have a useful outcome? Evaluate the model and review the steps executed to construct the model Does the model properly achieve the business objectives? Is there some important business issue that has not been sufficiently considered? Decide on the use of the data mining results No point to data mining unless we action the outcomes Deployment may be: Generate a report of the discoveries made Implement changes in the processes of the organisation Implement a repeatable data mining process For successful deployment the customer must understand the actions to be carried out in order to actually make use of the created models Copyright c 26, Graham J Williams 12/48/11 Copyright c 26, Graham J Williams 13/
3 Summary Overview The KDD Process Interative process requiring multiple loops Time consuming Mining is one small step Data issues are crucial to success 1 Process CRISP-DM 2 Hot Spots NRMA Medicare 3 Evaluation and Communication Communicating Performance 4 Privacy Protecting Privacy Copyright c 26, Graham J Williams 14/48/13 Copyright c 26, Graham J Williams 15/ Motor Vehicle Insurance Cluster then Describe then Measure Insurance premium setting and risk rating Actuaries study data and domain for general understanding of risk Several million transactions annually Consider more than the traditional small number of factors Data mining can explore very large collections of data both entities and features The Hot Spots methodology combines Cluster Analysis and Decision Trees to symbolically identify candidate regions of a dataset ClaimCost $695 SumRqst $15, C1 Cost = $95, Model [holden, ford] ClmType 6 C2 Postcode 2949 C3 C2 Cubic 24 C4 C1 C3 Cost = $158, Copyright c 26, Graham J Williams 16/48/15 Copyright c 26, Graham J Williams 17/ Find the Interesting Groups Finding the Interesting Groups Rule 1 Rule 23 NCB < 6 and Age 24 and Address is Urban Age > 57 and Vehicle {Utility, Station Wagon} Evaluate the large collection of groups (or Hot Spots) to find those that are important to the core business Nugget Claims Total Proportion Average Cost Total Cost , , , , , , , ,8, All ,, Nugget By Claims By Proportion By Average Cost 2 Y 3 Y 19 Y 24 Y 34 Y Y Y 35 Y Y 36 Y 4 Y Y Copyright c 26, Graham J Williams 18/48/17 Copyright c 26, Graham J Williams 19/
4 pina pinb pinc Find the Interesting Groups Operationalise Rule 1 Rule 23 NCB < 6 and Age 24 and Address is Urban Age > 57 and Vehicle {Utility, Station Wagon} Nugget Claims Total Proportion Average Cost Total Cost , , , , , , , ,8, All ,, Identify groups that are: High Risk Very high dollars per claim Large percentage of claims in the group Low Risk Very few claims from the group Claims are low in dollars Copyright c 26, Graham J Williams 2/48/19 Copyright c 26, Graham J Williams 21/ Health Insurance Commission Cluster/Describe/Measure Universal Health Coverage Terabytes of patient claims since the inception of Medicare Inappropriate Provider practices an ongoing focus Exploration of public fraud (including doctor shoppers) Exploration of the practise of pathology ClaimCost $695 SumRqst $15, C1 Cost = $95, Model [holden, ford] ClmType 6 C2 Postcode 2949 C3 C2 Cubic 24 C4 C1 C3 Cost = $158, Copyright c 26, Graham J Williams 22/48/21 Copyright c 26, Graham J Williams 23/ Cluster/Describe/Deliver Claim Hoarders Rule 1 Age is between 28 and 35 and Weeks 5 Rule 2 Weeks < 1 and Benefits > $35 Nugget Size Age Gender Services Benefits Weeks Hoard Regular F F M F M M F All 4, A distinct group of behaviour identified as Claim Hoarders But there may be many millions of these individuals Copyright c 26, Graham J Williams 24/48/23 Copyright c 26, Graham J Williams 25/
5 Medicare Regulars Operationalise Group of patients with very regular activity: 3 pinad 45 pind The fraud identified was investigated and appropriate action taken Perpetrators prosecuted Funds recovered Processes improved to cross validate data Remove non-cash payments!!! Copyright c 26, Graham J Williams 26/48/25 Copyright c 26, Graham J Williams 27/ Overview The Importance of Communication 1 Process CRISP-DM 2 Hot Spots NRMA Medicare 3 Evaluation and Communication Communicating Performance 4 Privacy Protecting Privacy Selling the story to management Do we present the model or the outcomes? Senior management in something like the ATO is necessarily cautious, protecting the integrity of the countries revenue system Need to demonstrate and prove the performance and robustness of models before deployment Copyright c 26, Graham J Williams 28/48/27 Copyright c 26, Graham J Williams 29/ Options in Rattle: Confusion Matrix A simple instrument to convey predictive performance But quite a blunt instrument Confusion matrix rpart model on auditcsv [test] (counts): Actual Predicted Confusion matrix rpart model on auditcsv [test] (%): Options in Rattle: Risk Charts Developed specifically for the ATO Capture both the score exhibited through probability, and the size of the Risk associated with each case! Often, it is the Risk that is of most interest Actual Predicted Copyright c 26, Graham J Williams 3/48/29 Copyright c 26, Graham J Williams 31/
6 Risk Chart: RPart Risk Chart: RF Copyright c 26, Graham J Williams 32/48/31 Copyright c 26, Graham J Williams 33/ Risk Chart: SVM Risk Chart: Textual Comparison The area under the Risk and Recall curves for rpart model Area under the Risk (red) curve: 79% (79) Area under the Recall (green) curve: 76% (762) The area under the Risk and Recall curves for rf model Area under the Risk (red) curve: 78% (78) Area under the Recall (green) curve: 78% (779) The area under the Risk and Recall curves for ksvm model Area under the Risk (red) curve: 78% (777) Area under the Recall (green) curve: 77% (774) Which is best? Copyright c 26, Graham J Williams 34/48/33 Copyright c 26, Graham J Williams 35/ Overview Privacy and Data Mining 1 Process CRISP-DM 2 Hot Spots NRMA Medicare 3 Evaluation and Communication Communicating Performance 4 Privacy Protecting Privacy Laws in many countries directly affect Data Mining and it is worth being aware of them penalties are often severe The OECD Principles of Data Collection were drafted in 198 They embody guiding principles for governments Revised for APEC 23 as part of the Asia-Pacific Privacy Charter Initiative Data mining by the Australian Taxation Office is governed by data matching and privacy protocols, and independently overseen by Privacy Commissioner, ANAO, and others Copyright c 26, Graham J Williams 36/48/35 Copyright c 26, Graham J Williams 37/
7 What are we trying to protect? Protect, amongst others: Religious freedom Freedom from racial discrimination Personal medical records Employment history Political freedom Centrelink and Privacy Breaches In August 26 CentreLink (Australian Social Security Agency) announced it had identified over 5 privacy breaches committed by staff Identified by monitoring and mining database access logs Activities looking at own personal records looking at family, friends, neighbours obtaining information to be sold changing information for financial gain Consequences counselling reduced pay/position lose job Copyright c 26, Graham J Williams 38/48/37 Copyright c 26, Graham J Williams 39/ AOL Privacy Breech Criminal Intent or Research AOL researchers thought to release anonimised web query logs for researchers (August 26) Covered 25, users and 2 million queries (Compare with US DoJ demand that Google, AOL, etc, supply such data for them to monitor their citizens) Usernames converted to numeric IDs But, aggregate queries for a single numeric ID enough to identify individuals multiple queries paint a picture private financial situation: property and bank loan enquiries indication of criminal activity or research for a book? health: pregnancy, home loan, dog vomit + uncooked pasta This was a screw-up and we re angry and upset about it AOL Would we use the following to investigate someone? how to change brake pads on scion xb 25 us open cup florida state champions how to get revenge on a ex how to get revenge on a ex girlfriend how to get revenge on a friend who you over replacement bumper for scion xb florida department of law enforcement crime stoppers florida Perhaps someone researching a novel! Copyright c 26, Graham J Williams 4/48/39 Copyright c 26, Graham J Williams 41/ A Distressed Victim? Privacy is Important A quite distressing example from the AOL disclosure: casey middle school surgical help for depression can you adopt after a suicide attempt gynecology oncologists in new york city Fishman David Dr 16 E 34th St, New York, 116 how to tell your family you re a victim of incest how long will the swelling last after my tummy tuck teaching positions in denver colorado divorce laws in ohio Privacy is important to ensure freedom from oppression Privacy can be breached either accidentally or purposefully How much should we allow our governments breach our privacy what is the right trade off? Copyright c 26, Graham J Williams 42/48/41 Copyright c 26, Graham J Williams 43/
8 Principles of Data Collection Principles of Data Collection 1 Collection Limitation: There should be limits to the collection of personal data and any such data should be obtained by lawful and fair means and, where appropriate, with the knowledge or consent of the data subject 2 Data Quality: Personal data should be relevant to the purposes for which they are to be used, and, to the extent necessary for those purposes, should be accurate, compete and kept up-to-date 3 Purpose Specification: The purposes for which personal data are collected should be specified not later than at the time of collection and the subsequent use limited to the fulfilment of those purposes or such others as are not incompatible with those purposes and as are specified on each occasion of change of purpose 4 Use limitation: Personal data should not be disclosed, made available or otherwise used for purposes other than those specified in accordance with [Principle 3] except: with the consent of the data subject; or by the authority of law Copyright c 26, Graham J Williams 44/48/43 Copyright c 26, Graham J Williams 45/ Principles of Data Collection Principles of Data Collection 5 Security Safeguards: Personal data should be protected by reasonable security safeguards against such risks as loss or unauthorised access, destruction, use, modification or disclosure of data 6 Openness: There should be a general policy of openness about developments, practices and policies with respect to personal data Means should be readily available of establishing the existence and nature of personal data, and the main purposes of their use, as well as the identity and usual residence of the data controller 7 Individual Participation: An individual should have the right to obtain confirmation of whether or not a data controller has data relating to them, and to have access to that data within a reasonable time and cost, and to be able to challenge any denial, and to be able to challenge data relating to themselves and, if the challenge is successful, to have the data erased, rectified, completed or amended 8 Accountability: A data controller should be accountable for complying with measures giving effect to these principles Copyright c 26, Graham J Williams 46/48/45 Copyright c 26, Graham J Williams 47/ Thank You Copyright c 26, Graham J Williams 48/48/47
Information Governance Policy
Information Governance Policy 1 Introduction Healthwatch Rutland (HWR) needs to collect and use certain types of information about the Data Subjects who come into contact with it in order to carry on its
ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY
ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY Originated by: Data Protection Working Group: November 2008 Impact Assessment: (to be confirmed) Recommended by Senate: 28 January 2009 Approved by Council:
How To Know What You Can And Can'T Do At The University Of England Students Union
HOW WE USE YOUR INFORMATION This privacy notice tells you what to expect when University of Essex Students Union (referred to as the SU herein) collects personal information. It applies to information
Corporate ICT & Data Management. Data Protection Policy
90 Corporate ICT & Data Management Data Protection Policy Classification: Unclassified Date Created: January 2012 Date Reviewed January Version: 2.0 Author: Owner: Data Protection Policy V2 1 Version Control
HIPSSA Project. Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Second Mission -Namibia
HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Second Mission -Namibia PRESENTATION OF THE DRAFT DATA PROTECTION POLICY FOR NAMIBIA Pria Chetty, ITU International Legal
How To Understand The Data Protection Act
DATA PROTECTION ACT 2002 The Basics Purpose of the Act Balance the rights of an individual with an organisation s legitimate need to process personal data Promote openness and transparency Establish and
Little Marlow Parish Council Registration Number for ICO Z3112320
Data Protection Policy Little Marlow Parish Council Registration Number for ICO Z3112320 Adopted 2012 Reviewed 23 rd February 2016 Introduction The Parish Council is fully committed to compliance with
CRISP - DM. Data Mining Process. Process Standardization. Why Should There be a Standard Process? Cross-Industry Standard Process for Data Mining
Mining Process CRISP - DM Cross-Industry Standard Process for Mining (CRISP-DM) European Community funded effort to develop framework for data mining tasks Goals: Cross-Industry Standard Process for Mining
Data Protection Act a more detailed guide
Data Protection Act a more detailed guide What does the Act do? The Data Protection Act 1998 places considerable duties on organisations which process personal data; increases the rights of access by data
QUEENSLAND COUNTRY HEALTH FUND. privacy policy. Queensland Country Health Fund Ltd ABN 18 085 048 237. better health cover shouldn t hurt
QUEENSLAND COUNTRY HEALTH FUND privacy policy Queensland Country Health Fund Ltd ABN 18 085 048 237 better health cover shouldn t hurt 1 2 contents 1. Introduction 4 2. National Privacy Principles 5 3.
Policy Document Control Page
Policy Document Control Page Title Title: Data Protection Policy Version: 3 Reference Number: CO59 Keywords: Data, access, principles, protection, Act. Data Subject, Information Supersedes Supersedes:
Data Protection Act 1998 The Data Protection Policy for the Borough Council of King's Lynn & West Norfolk
Data Protection Act 1998 The for the Borough Council of King's Lynn & West Norfolk 1 Contents Introduction 3 1. Statement of Intent 4 2. Fair Obtaining I Processing 5 3. Data Uses and Processes 6 4. Data
The Privacy Act 1988 contains 10 National Privacy Principles (the NPPs) which specify how organisations should handle personal information.
Privacy policy Abstract Page 1 Preamble The Privacy Act 1988 contains 10 National s (the NPPs) which specify how organisations should handle personal information. The Anglican Church Diocese of Sydney
Privacy Policy Draft
Introduction Privacy Policy Draft Please note this is a draft policy pending final approval Alzheimer s Australia values your privacy and takes reasonable steps to protect your personal information (that
HERTSMERE BOROUGH COUNCIL
HERTSMERE BOROUGH COUNCIL DATA PROTECTION POLICY October 2007 1 1. Introduction Hertsmere Borough Council ( the Council ) is fully committed to compliance with the requirements of the Data Protection Act
CORK INSTITUTE OF TECHNOLOGY
CORK INSTITUTE OF TECHNOLOGY DATA PROTECTION POLICY APPROVED BY GOVERNING BODY ON 30 APRIL 2009 INTRODUCTION Cork Institute of Technology is committed to a policy of protecting the rights and privacy of
DATA PROTECTION POLICY. Examples of personal data which TWM may require from clients include the following and for the reasons ascribed to each;
DATA PROTECTION POLICY Introduction TWM Solicitors maintain certain personal data about individuals for the purposes of satisfying operational and legal obligations. The Data Protection Act sets rules
UNIVERSITY OF SOUTHAMPTON DATA PROTECTION POLICY
UNIVERSITY OF SOUTHAMPTON DATA PROTECTION POLICY 1. Purpose 1.1 The Data Protection Act 1998 ( the Act ) has two principal purposes: i) to regulate the use by those (known as data controllers) who obtain,
Data Protection in Ireland
Data Protection in Ireland 0 Contents Data Protection in Ireland Introduction Page 2 Appointment of a Data Processor Page 2 Security Measures (onus on a data controller) Page 3 8 Principles Page 3 Fair
Database Marketing, Business Intelligence and Knowledge Discovery
Database Marketing, Business Intelligence and Knowledge Discovery Note: Using material from Tan / Steinbach / Kumar (2005) Introduction to Data Mining,, Addison Wesley; and Cios / Pedrycz / Swiniarski
Protection. Code of Practice. of Personal Data RPC001147_EN_WB_L_1
Protection of Personal Data RPC001147_EN_WB_L_1 Table of Contents Data Protection Rules Foreword From the Data Protection Commissioner Introduction From the Chairman Data Protection Responsibility of Employees
Data Protection and Information Security. Procedure for reporting a breach of data security. April 2013
Data Protection and Information Security Procedure for reporting a breach of data security April 2013 Page 1 of 6 Created on: 01/04/2009 Contents 1 Introduction... 3 2 Data Classification... 3 3 What Is
PERSONAL INJURIES ASSESSMENT BOARD DATA PROTECTION CODE OF PRACTICE
PERSONAL INJURIES ASSESSMENT BOARD DATA PROTECTION CODE OF PRACTICE ADOPTED ON 9 th January 2008 TABLE OF CONTENTS Page No. 1 Introduction...3 2 Glossary...3 3 Types of Personal Data held by Us...3 4 Obligations
DATA PROTECTION POLICY
Reference number Approved by Information Management and Technology Board Date approved 14 th May 2012 Version 1.1 Last revised N/A Review date May 2015 Category Information Assurance Owner Data Protection
DATA PROTECTION POLICY
DATA PROTECTION POLICY Version 1.3 April 2014 Contents 1 POLICY STATEMENT...2 2 PURPOSE....2 3 LEGAL CONTEXT AND DEFINITIONS...2 3.1 Data Protection Act 1998...2 3.2 Other related legislation.....4 3.3
Islington Data Protection Policy. A council-wide information policy Version 1.1 June 2014
A council-wide information policy Version 1.1 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document is distributed under the Creative Commons Attribution 2.5 license.
technical factsheet 176
technical factsheet 176 Data Protection CONTENTS 1. Introduction 1 2. Register with the Information Commissioner s Office 1 3. Period protection rights and duties remain effective 2 4. The data protection
Code of Practice on Data Protection for the Insurance Sector
Code of Practice on Data Protection for the Insurance Sector (Approved by the Data Protection Commissioner under Section 13 (2) of the Data Protection Acts, 1988 and 2003) Forward I am very happy to be
Data Protection Policy
Data Protection Policy September 2015 Contents 1. Scope 2. Purpose 3. Data protection roles 4. Staff training and guidance 5. About the Data Protection Act 1998 6. Policy 7. The Information Commissioner's
MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY
MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY Page 1 of 16 Contents Policy Information 3 Introduction 4 Responsibilities 7 Confidentiality 9 Data recording and storage 11 Subject Access 12 Transparency
PRIVACY POLICY. Last updated February 2, 2009 INTRODUCTION
PRIVACY POLICY Last updated February 2, 2009 INTRODUCTION This Privacy Policy explains how personal information about you may be collected, used, or disclosed by the Canadian Education and Research Institute
The kinds of personal information we collect and hold vary depending on the services we are providing, but generally can include:
ABN 47 001 768 190 AFSL 244526 Our Privacy Policy At Capital Insurance Brokers, we are committed to protecting your privacy in accordance with the Privacy Act 1988 (Cth) (Privacy Act) and the Australian
Protection. Code of Practice. of Personal Data RPC001147_EN_D_19
Protection of Personal Data RPC001147_EN_D_19 Table of Contents Data Protection Rules Foreword From the Data Protection Commissioner Introduction From the Chairman Data Protection Rules Responsibility
communications between us and your financial, legal or other adviser, or your broker or agent;
Privacy policy Updated: 25 June 2014 This Privacy Policy applies to information collected by 255 Finance Pty Ltd ABN 23 168 112 507 and its related bodies corporate ( 255 Finance or we ). This policy outlines
UNILEVER PRIVACY PRINCIPLES UNILEVER PRIVACY POLICY
UNILEVER PRIVACY PRINCIPLES Unilever takes privacy seriously. The following five principles underpin our approach to respecting your privacy: 1. We value the trust that you place in us by giving us your
Once more unto the breach... Dealing with Personal Data Security Breaches. Helen Williamson Information Governance Officer
Once more unto the breach... Dealing with Personal Data Security Breaches Helen Williamson Information Governance Officer Aims of the session What are we going to look at? What is a data security breach?
Data Protection Policy
Internal Ref: NELC 16.60 Review date December 2016 Version No. V04 Data Protection Policy 1 Data Protection Statement Data Protection Policy 1.1 North East Lincolnshire Council recognises that in order
PRIVACY POLICY. comply with the Australian Privacy Principles ("APPs"); ensure that we manage your personal information openly and transparently;
PRIVACY POLICY Our Privacy Commitment Glo Light Pty Ltd A.C.N. 099 730 177 trading as "Lighting Partners Australia of 16 Palmer Parade, Cremorne, Victoria 3121, ( LPA ) is committed to managing your personal
John Leggott College. Data Protection Policy. Introduction
John Leggott College Data Protection Policy Introduction The College needs to keep certain information about its employees, students and other users to allow it to monitor performance, achievements, and
OBJECTS AND REASONS. (a) the regulation of the collection, keeping, processing, use or dissemination of personal data;
OBJECTS AND REASONS This Bill would provide for (a) the regulation of the collection, keeping, processing, use or dissemination of personal data; (b) the protection of the privacy of individuals in relation
PRIVACY POLICY Personal information and sensitive information Information we request from you
PRIVACY POLICY Business Chicks Pty Ltd A.C.N. 121 566 934 (we, us, our, or Business Chicks) recognises and values the protection of your privacy. We also understand that you want clarity about how we manage
Disclosure Scheme. The Domestic Violence. Keeping People Safe from Domestic Violence
The Domestic Violence Disclosure Scheme Keeping People Safe from Domestic Violence This leaflet is for you if you are in a relationship and you are worried that your partner may have been abusive in the
DESTINATION MELBOURNE PRIVACY POLICY
DESTINATION MELBOURNE PRIVACY POLICY 2 Destination Melbourne Privacy Policy Statement Regarding Privacy Policy Destination Melbourne Limited recognises the importance of protecting the privacy of personally
CCTV CODE OF PRACTICE
CCTV CODE OF PRACTICE Policy area: Operation of CCTV on University Premises Definitions CCTV means Closed Circuit Television. Control Room(s) means those Control Rooms manned by Security staff at the City,
CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION DIRECTIVE
Représentant les avocats d Europe Representing Europe s lawyers CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION DIRECTIVE CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION
CorporateGuard Comprehensive Crime Insurance
AIG Australia Limited Comprehensive Crime Insurance 1 of 13 Page Page 1 of 13 An Important Notice Your Duty of Disclosure Before you enter into an insurance contract, you have a duty to tell us anything
Derbyshire Constabulary GUIDANCE ON THE SAFE USE OF THE INTERNET AND SOCIAL MEDIA BY POLICE OFFICERS AND POLICE STAFF POLICY REFERENCE 09/268
Derbyshire Constabulary GUIDANCE ON THE SAFE USE OF THE INTERNET AND SOCIAL MEDIA BY POLICE OFFICERS AND POLICE STAFF POLICY REFERENCE 09/268 This guidance is suitable for Public Disclosure Owner of Doc:
DATA PROTECTION ACT 1998 COUNCIL POLICY
DATA PROTECTION ACT 1998 COUNCIL POLICY Page 1 of 5 POLICY STATEMENT Blackpool Council recognises the need to fully comply with the requirements of the Data Protection Act 1998 (DPA) and the obligations
Office of the Data Protection Commissioner of The Bahamas. Data Protection (Privacy of Personal Information) Act, 2003. A Guide for Data Controllers
Office of the Data Protection Commissioner of The Bahamas Data Protection (Privacy of Personal Information) Act, 2003 A Guide for Data Controllers 1 Acknowledgement Some of the information contained in
CRISP-DM: The life cicle of a data mining project. KDD Process
CRISP-DM: The life cicle of a data mining project KDD Process Business understanding the project objectives and requirements from a business perspective. then converting this knowledge into a data mining
Data Protection and Privacy Policy
Data Protection and Privacy Policy 1. General This policy outlines Conciliation Resources commitments to respect the privacy of people s personal information and observe the relevant data protection legislation.
Disclosure is the action of making new or secret information known.
/PURPOSE OF POLICY Pty Limited (Momentum) is required and committed to comply with the Australian Privacy Principles (APPs) in the Privacy Act 1998 (Cth) (Privacy Act). The APPs regulate the manner in
HIPAA Policy, Protection, and Pitfalls ARTHUR J. GALLAGHER & CO. BUSINESS WITHOUT BARRIERS
HIPAA Policy, Protection, and Pitfalls Overview HIPAA Privacy Basics What s covered by HIPAA privacy rules, and what isn t? Interlude on the Hands-Off Group Health Plan When does this exception apply,
Privacy Charter. Protecting Your Privacy
Privacy Charter Protecting Your Privacy 1 1. Introduction 3 2. Collection of personal information 3 What sort of personal information do we collect and hold? 3 Anonymity and Pseudonymity 3 Why do we collect
DISASTER RECOVERY INSTITUTE CANADA WEBSITE PRIVACY POLICY (DRIC) UPDATED APRIL 2004
DISASTER RECOVERY INSTITUTE CANADA (DRIC) UPDATED APRIL 2004 This website privacy policy is intended to provide DRIC website visitors with information about how DRIC treats private and personal information
Data Sharing Protocol
Data Sharing Protocol Agreement for Sharing Data Between Partners of the South Dublin Childrens Services Committee Version 0.4 Final Draft June 2009 Contents 1 Preface...3 2 Introduction & Overview...3
Using Data Mining to Detect Insurance Fraud
IBM SPSS Modeler Using Data Mining to Detect Insurance Fraud Improve accuracy and minimize loss Highlights: combines powerful analytical techniques with existing fraud detection and prevention efforts
THE PERSONAL INFORMATION PROTECTION AND ELECTRONIC DOCUMENTS ACT (PIPEDA) PERSONAL INFORMATION POLICY & PROCEDURE HANDBOOK
THE PERSONAL INFORMATION PROTECTION AND ELECTRONIC DOCUMENTS ACT (PIPEDA) PERSONAL INFORMATION POLICY & PROCEDURE HANDBOOK REVISED August 2004 PERSONAL INFORMATION POLICY & PROCEDURE HANDBOOK Introduction
The CPS incorporates RCPO. CPS Data Protection Policy
The CPS incorporates RCPO CPS Data Protection Policy Contents Introduction 3 Scope 4 Roles and Responsibilities 4 Processing Criminal Cases 4 Information Asset Owners 5 Information Asset Register 5 Information
Data Protection Act. Conducting privacy impact assessments code of practice
Data Protection Act Conducting privacy impact assessments code of practice 1 Conducting privacy impact assessments code of practice Data Protection Act Contents Information Commissioner s foreword... 3
Policy on Public and School Bus Closed Circuit Television Systems (CCTV)
DEPARTMENT OF TRANSPORT Policy on Public and School Bus Closed Circuit Television Systems (CCTV) Responsibility of: Public Transport Division TRIM File: DDPI2010/3680 Effective Date: July 2010 Version
1. Introduction. 2. Sectoral Areas Affected. 3. Data Security. 4. Data Breach Requirements. 5. Traffic Data
1. Introduction Special data protection rules apply to the protection of Personal Data by Data Controllers in the electronic communications sector. These are in addition to the general obligations that
UAB MY HEALTH REWARDS BIOMETRIC SCREENING PROGRAM NOTICE OF HEALTH INFORMATION PRACTICES
UAB MY HEALTH REWARDS BIOMETRIC SCREENING PROGRAM NOTICE OF HEALTH INFORMATION PRACTICES 1 Effective Date: January 26, 2015 THIS NOTICE APPLIES TO THE UAB MY HEALTH REWARDS BIOMETRIC SCREENING PROGRAM
AASA Online Privacy Policy CRP.020
Introduction Alzheimer s Australia SA Inc values your privacy and takes reasonable steps to protect your personal information (that is, information which identifies or may reasonably be used to identify
Information Governance Strategy & Policy
Information Governance Strategy & Policy March 2014 CONTENT Page 1 Introduction 1 2 Strategic Aims 1 3 Policy 2 4 Responsibilities 3 5 Information Governance Reporting Structure 4 6 Managing Information
Information Governance Framework. June 2015
Information Governance Framework June 2015 Information Security Framework Janice McNay June 2015 1 Company Thirteen Group Lead Manager Janice McNay Date of Final Draft and Version Number June 2015 Review
Iowa Student Loan Online Privacy Statement
Iowa Student Loan Online Privacy Statement Revision date: Jan.6, 2014 Iowa Student Loan Liquidity Corporation ("Iowa Student Loan") understands that you are concerned about the privacy and security of
Data protection policy
Data protection policy Introduction The College is required to keep certain information about employees, students and other users to allow it to monitor performance, achievements, health and safety, recruitment
Data Protection for the Guidance Counsellor. Issues To Plan For
Data Protection for the Guidance Counsellor Issues To Plan For Author: Hugh Jones Data Protection Specialist Longstone Management Ltd. Published by the National Centre for Guidance in Education (NCGE)
AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE
AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE This Notice of Privacy Practices describes the legal obligations of Ave Maria University, Inc. (the plan ) and your legal rights regarding your protected health
AlixPartners, LLP. General Data Protection Statement
AlixPartners, LLP General Data Protection Statement GENERAL DATA PROTECTION STATEMENT 1. INTRODUCTION 1.1 AlixPartners, LLP ( AlixPartners ) is committed to fulfilling its obligations under the data protection
Information Incident Management Policy
Information Incident Management Policy Change History Version Date Description 0.1 04/01/2013 Draft 0.2 26/02/2013 Replaced procedure details with broad principles 0.3 27/03/2013 Revised following audit
Evolutionary Hot Spots Data Mining. An Architecture for Exploring for Interesting Discoveries
Evolutionary Hot Spots Data Mining An Architecture for Exploring for Interesting Discoveries Graham J Williams CRC for Advanced Computational Systems, CSIRO Mathematical and Information Sciences, GPO Box
Data protection policy
Data protection policy Introduction 1 This document is the data protection policy for the Nursing and Midwifery Council (NMC). 2 The Data Protection Act 1998 (DPA) governs the processing of personal data
Trading Terms 1. Payment 2. Orders 3. Freight/Postage (GST Applicable) 4. Pricing Policy (GST Applicable) 5. Invoice Format
Trading Terms 1. Payment a) Payment for credit accounts is due 25 days from the end of month statement. b) Should an account become overdue and payment not received in our office by 30 days after the end
Data Science with R. Introducing Data Mining with Rattle and R. [email protected]
http: // togaware. com Copyright 2013, [email protected] 1/35 Data Science with R Introducing Data Mining with Rattle and R [email protected] Senior Director and Chief Data Miner,
Data Protection Good Practice Note
Data Protection Good Practice Note This explanatory document explains what charities and voluntary organisations need to do to comply with the Data Protection Act 1988 as amended by the Data Protection
Once you have submitted the online medical assessment you will receive an online reference number. ONLINE REFERENCE NUMBER Smartform number
To the medical practitioner, Please complete the online section of this form if you deem your patient to have a permanent and severe physical, intellectual, sensory or psychological disability that is
HIPAA Notice of Patient Privacy Practices
HIPAA Notice of Patient Privacy Practices Effective Date: January 1, 2014 THIS NOTICE DESCRIBES HOW PROTECTED HEALTH INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION.
Merthyr Tydfil County Borough Council. Data Protection Policy
Merthyr Tydfil County Borough Council Data Protection Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of the
HIPAA The Law Explained. Click here to view the HIPAA information.
HIPAA The Law Explained Click here to view the HIPAA information. HIPAA - Provisions 5 Major Provisions/Titles Title 1 Title 2 Title 3 Title 4 Title 5 More Information on Administrative Simplification
