A Pragmatic Guide to Big Data & Meaningful Privacy. kpmg.be
|
|
|
- Patricia Jade Potter
- 10 years ago
- Views:
Transcription
1 A Pragmatic Guide to Big Data & Meaningful Privacy kpmg.be
2 From predicting criminal behavior to medical breakthroughs, from location-based restaurant recommendations to customer churn predictions, the benefits of Big Data in everyday life are increasingly self-evident. Organizations similarly see advantages in implementing Big Data programs as part of a strategic business model. There is opportunity to gain a competitive advantage, know their customer better and identify new business areas. However, concerns about Big Data are also growing. Customers are increasingly wary of the use and potential abuse, of personal information. Regulators are passing and enforcing laws that conflict with its widespread use. How can your organization balance these demands? The characteristics of Big Data Companies have collected data for years, and the volume has increased with the technical capacity. In our age of inexpensive processing equipment, the size of the datasets involved are difficult to comprehend. For example, it was reported in 2012, that 90% of all available data was created in the previous two years.1 To better understand this constantly expanding range, Big Data is commonly defined by three characteristics: 1. Volume: data size 2. Velocity: speed of change 3. Variety: different forms of data sources Additionally, Big Data understanding may be supplemented by two additional concepts: 1. Veracity: referring to the truthfulness of data 2. Value: the business case for using the data. Due to these characteristics, Big Data sets are too large and rapidly changing to be analyzed using traditional database techniques or commonly used software tools. 1 2 A Pragmatic Guide to Big Data & Meaningful Privacy Big Data : turning conceptual thinking into powerful results. KPMG NL (2013). A Pragmatic Guide to Big Data & Meaningful Privacy 3
3 Big Data: Big risks Big Data is transforming major industries Big Data is not confined to a single industry. KPMG in Belgium (KPMG) clients across all industries recognize Big Data s potential value and seek to harness its capabilities. Utility companies, for example, have implemented Smart Grid and Smart Metering technology throughout Europe and globally, resulting in improvements in Outage Response, Renewable Reliability and Load Forecasting, as well as improved maintenance and planning. Retail organizations use Big Data to improve not only supply chains, but services and products through obtaining a better understanding of their customer behavior and preferences via customer analytics and segmentation. Governments are starting to use Big Data and analytics to gain insight into citizen matters and requirements, detect fraud or abuse of services and better allocate government resources. Financial institutions are using Big Data to better identify their customer s markets and assess risk, including creditworthiness, default rates and fraud detection, as well as increasing new product development, and understanding and improving channel usage. As Big Data continues to transform industries, organizations face a growing demand for talent to help them take advantage of Big Data s opportunities. As a recent KPMG study demonstrates, organizations which benefit from Big Data & Analytics will have a competitive edge when it comes to better and faster business decisions. Big Data carries significant informational and business risks that only grow with the data collected. KPMG believes that organizations must find an appropriate balance to opportunities and challenges as they build their Big Data governance programs to enhance Big Data s benefits. We recognize that adopting Big Data requires addressing a number of challenges, including developing a Big Data governance strategy and program to support implementation in manageable steps, while maintaining the larger innovative vision. Meeting these challenges requires integrating the necessary competences, platforms, partnerships and informational changes holistically throughout the organization. Our approach builds compliance issues and social concerns into this ongoing process. The following sections will focus specifically on the Data Protection risks associated with Big Data programs. Regulatory compliance and information governance While Big Data concerns stem from familiar complexities, they also face new issues. A prime challenge with Big Data is compliance with existing laws when the data complexity has increased multifold. Regulatory agencies have demonstrated concern about the consequences of Big Data accountable as the risk of consumer injury increases as the volume and sensitivity of data grows. 2 They will hold companies responsible and accountable for non-compliance, therefore companies face the challenge of correctly interpreting current regulations and anticipating future regulations. The European regulatory privacy landscape is evolving as the European Commission is in the process of implementing Data Protection reform to replace the existing EU Data Protection Directive. Among other requirements, the Data Protection Directive and Regulation demand: A Right to erasure requires personal information previously provided to be removed, including use of this data by third parties. This is a challenge in the Big Data context because multiple forms and copies of data exist, and anonymization is often incomplete. Data minimization, as a general principle, is in conflict with Big Data s emphasis on processing and analyzing all possible data. Fair processing, including transparency in data collection, is difficult when data sets are combined from numerous sources and change rapidly. Maintaining the original purpose (intent) of the data, which may significantly reduce the value of Big Data analytics to reuse data for new and innovative secondary purposes. Safeguarding the data is always a challenge but is made more difficult when the data is in the form of a valuable and centralized target. 3 Additionally, the European Union is increasing the consequences of non-compliance with a Data Protection law. The proposed Regulation may include fines of up to 5% of corporate global turnover. The scope of the law will include all companies processing the personal data of EU residents, not only companies operating in Europe. Reputational, ethical and social challenges The volume and sensitivity of Big Data sets also creates a need to consider the impact of the analysis conducted. As it becomes integrated into daily life, this Big Data has greater impact on customers and other data subjects and increases awareness of the inherent benefits and dangers. This leads to a reputational risk for companies undertaking Big Data analysis. The more Big Data is relied upon, the more significant is the resulting analysis. This benefit carries ethical and social weight, as there is an obligation to ensure that the data and the decisions based on it are accurate and fair. It is the responsibility of companies to be socially and ethically aware when using Big Data, or face the reputational risk. Organizations that attempt to implement Big Data initiatives without a strong governance regime in place risk placing themselves in ethical dilemmas without set processes and guidelines to follow. Some challenges include: 2 Ramirez, Edith, FTC Chairwoman, Technology Policy Institute Aspen Forum (Aug 19, 2013). 3 UK Information Commissioners Officer, Big Data and Data Protection (28 July, 2014) 4 A Pragmatic Guide to Big Data & Meaningful Privacy A Pragmatic Guide to Big Data & Meaningful Privacy 5
4 KPMG s approach to Big Data security and privacy KPMG has a two-pronged approach to building a Big Data Privacy and Security Program. We believe that both the technical and governance layers are essential to success. We have identified eight high-risk focus areas and offer guidance based on an augmented Information Governance life cycle and a Big Data platform to assist organizations in minimizing risk and maximizing control over Big Data. A strong Big Data Privacy and Security program requires two complementary approaches. First there must be strong Governance Processes in place to determine data usage. Second, these processes must rely on a Big Data Platform that is capable of maintaining the privacy and security requirements of the program. The eight areas highlighted below align with one or both of Governance or Platform. This program begins with a clear organizational structure around data governance (Who owns the data? Who is responsible for protecting the data?), followed by additional key components such as policies, standards and procedures including data monitoring and data retention. 2. Compliance Governance Data-based decision-making As data collection and processing ability grow, more decisions are made automatically, without human input. Organizations must decide for which decisions this is appropriate. Behavioral targeting The use of information about an individual s past behavior (e.g., web-based searches) or combining offline and online behavior, to select advertisements to display can bring many benefits. If non-transparent it can be invasive or context inappropriate. Data breaches and leaks The potential damage of a data breach is multiplied with Big Data, as greater data stores are affected, including data created about a person. Data Duplication Duplication is essential to efficient big data processing, however it challenges total information modification or deletion, such as the right to be forgotten. Dataset Combination Increased value can be obtained from data by combining it with other data sets. Yet such a combination may reveal unwanted or intrusive information about data subjects. Re-identification risk Fully anonymized data removes the risks associated with personal data. However, incomplete anonymization may result in compromised privacy as the data is combined with previously collected, complex data sets including geo-location, image recognition and behavioral tracking. Sharing Data with Third Parties Data sharing may greatly increase the data value for all parties. However, the security and privacy data protections in place at all third-parties must be adequate to protect the combined data. 1. Data governance and retention Governance As the foundation for any Big Data program, a data governance program must be established that provides clear direction for how the data is handled and protected by the organization. This program which includes a strong ethical code, along with process, training, people, and metrics is imperative to govern what organizations can do within a Big Data program. ANONYMIZATION ACCESS MANAGEMENT DATA SHARING/ 3 RD PARTY MANAGEMENT SECURITY DATA GOVERNANCE COMPLIANCE Organizations must identify and understand the security and privacy regulations that apply to the data they store, process, and transmit. Similarly, they are also responsible for compliance with the contractual provisions contained within their agreements with third parties and other service providers, as well as their own privacy policy. Therefore, it is essential that organizations establish a Big Data compliance program that provides the necessary oversight to monitor compliance with their regulatory and contractual commitments. Compliance requires developing a comprehensive control framework and risk-based road map for implementation. Companies can take advantage of automated controls and transition from manual efforts to ensure ongoing compliance. 3. Data use cases and data feed approval Governance Organizations must manage their Big Data usage through the identification of potential use cases for the data. Once an organization understands the potential use cases, it can mature its Big Data program through the implementation of a formal use-case approval process, which includes formal risk assessments prior to the adoption of new data feeds. CONSENT MANAGEMENT DATA USAGE A key consideration in the adoption of any new data feed is that the potential risk for re-identification increases when existing data feeds are combined with new data feeds. 6 A Pragmatic Guide to Big Data & Meaningful Privacy A Pragmatic Guide to Big Data & Meaningful Privacy 7
5 4. Consent management Governance & Platform Customer consent management is critical to the success implementation of any Big Data governance regime. Customer consent requires the following components: i. Transparency Organizations should provide its customers with a clear understanding of the information the organization collects and how it will be used. ii. Consistency Organizations should provide consistent consent mechanisms across all products, and capture Big Data preferences up front. iii. Granularity Organizations should allow customers to provide or withdraw their consent at the individual device level, not only at a larger account level. 5 Access management Governance & Platform The amplified size and scope of Big Data increases the significance of granting access to it. Organizations must control who has access to the data sets both internal and external to the organization. This requires a comprehensive access management regime of users including third parties and partners. All new user access requests should require approval, and access must be removed immediately when it is no longer required. Organizations should perform periodic reviews of internal and external existing user access, and adopt segregation of duties where access to systems is based on job function. Organizations can automate this process by leveraging policy engines or access management tools to implement Attribute Based Access Controls (ABAC). This will help them make dynamic access decisions and integrate with existing tools and directories for provisioning and certification. 6 Data sharing/third-party management Platform & Governance Big Data concerns amplify exponentially as the data is combined with additional data sets. Organizations maintain a responsibility to their customers as they share data with third parties. Effective third-party management requires the inclusion of specific Big Data provisions within contractual agreements. Additionally, organizations should limit their Big Data partner s access, and restrict combinations of data sets that are considered too sensitive. Organizations must include Big Data with the overall evaluation of thirdparty performance to ensure ongoing monitoring of compliance with data-sharing agreements. 7. Anonymization Platform Anonymization means processing data so that it is irreversibly de-identified, through the removal of identifying information. Data anonymization is critical to maintaining the privacy of the original data set when considering the long-term use of Big Data. Achieving true anonymization is complex and few companies reveal how they achieve full anonymization, organizations must take appropriate measures to avoid data re-identification. This requires monitoring of anonymization requirements and analyzing the risks of re-identification prior to the implementation of a particular anonymization technique, including information correlation across multiple data sets. 8. Security practices Governance & Platform Organizations should recognize the potential value of their combined data sets and work to make them less attractive targets to unauthorized parties i.e. hackers. This can be done by increasing security safeguards, storing information in such a way that its usefulness is minimized or outsourcing certain security risks to third parties. How KPMG can help Based on our assessment that Big Data programs rely both on strong Governance Process and appropriate Technical Platforms, KPMG finds that clients benefit from support aligned with these perspectives: Information governance processes: Big Data program development is predicated upon a strong sense of client requirement for their program and how to best implement it while complying with privacy and security requirements. KPMG supports clients in creating and implementing the appropriate policies and process while advising on third party management. Technical platform: KPMG advises our clients on the appropriate technical solutions for their needs, including various forms of anonymization and pseudo-anonymization, data models, third party partners, etc. Understanding our client s need to minimize the attractiveness of their Big Data sets to outsiders and outsource risk, KPMG has also developed a tailored privacy-enhancing processing platform, KAVE. For more information about this open source platform, please contact us. 8 A Pragmatic Guide to Big Data & Meaningful Privacy A Pragmatic Guide to Big Data & Meaningful Privacy 9
6 Case Study: Boosting Big Data with benchmarking Client: Global Telecom Company Challenge: Client sought to implement industry best practices for privacy and security as it began to operationalize its Big Data Program. Glossary Anonymization process to remove all personally identifiable information from a data set and permanently turn it into non-identifiable data. Data Governance the management and protection of company information assets throughout the information life cycle. Components include privacy, information life cycle management (ILM), data classification and data-flow analysis. Information life cycle Summary of work: KPMG used its Big Data Privacy and Security methodology to benchmark the client s existing Big Data Program capabilities. KPMG s assessment included both public and private benchmarking. The public benchmarking entailed research and compilation of publicly available information on Big Data privacy and security practices, policies and procedures. To conduct the private benchmarking, KPMG submitted a questionnaire to external enterprises comparable to the client to obtain a high-level overview of their Big Data organizations. At the end of the assessment, KPMG compared results from its Big Data research with the client s Big Data initiative to assist in prioritizing recommendations to enhance or extend the existing information governance strategy and related privacy framework. KPMG s value proposition: Whether your organization is in the planning stages or has a mature Big Data program, KPMG can assist in navigating the Privacy and Security challenges posed across all phases of the life cycle. KPMG takes a multidisciplinary approach where different groups in the firm specialize in distinct areas across the Big Data life cycle and collaborate to provide insights to your organization. the full cycle of data within an enterprise that commences with collection, storage, usage, transfer, and destruction. Personal Data information about a person. It may uniquely identify a person or may be associat0ith many people. Pseudo-Anonymization data that is purposely not fully anonymized. Individuals cannot be identified from it in its current state but with additional information such as a key, re-identification is possible. A recommended approach to reducing the risk associated with data collection and analysis. Predictive Analysis a variety of statistical modeling and data mining that analyzes current and historical facts to make predictions about future events. Sensitive Data A sampling of our previous engagements includes: Big Data Analytics Enhancement: Provide additional capabilities and resources to an analytics platform to improve your Big Data insight development and program development. a subset of personal information that is subject to a higher level of privacy protection including racial or ethnic origin, political opinions & beliefs, religious beliefs and sexual orientation. Big Data Security and Privacy Program Assessments: Define and document current-state Big Data initiatives to identify the maturity of the program in all facets of the life cycle and identify gaps and opportunities for improvement. Big Data Security and Privacy Program Development: Develop future state road map to enable an organization s Big Data goals with critical security and privacy requirements. Third-Party/Vendor Assessments: Assess third parties and vendors for compliance with contractual and regulatory requirements for Big Data. Big Data Analytics Platform Assessment and Development: Assess the current Big Data analytics capabilities and identify opportunities for development and improvement 10 A Pragmatic Guide to Big Data & Meaningful Privacy A Pragmatic Guide to Big Data & Meaningful Privacy 11
7 Contact us To learn more about Information Protection and Data Analytics, contact one of the following KPMG professionals: Bart Meyer Partner, KPMG Advisory T E [email protected] Benny Bogaerts Director, KPMG Advisory T E [email protected] Peter van den Spiegel Senior Manager, KPMG Advisory T E [email protected] Sarah Pipes Data Protection Specialist, KPMG Advisory T E [email protected] The information contained herein is of a general nature and is not intended to address the circumstances of any particular individual or entity. Although we endeavor to provide accurate and timely information, there can be no guarantee that such information is accurate as of the date it is received or that it will continue to be accurate in the future. No one should act upon such information without appropriate professional advice after a thorough examination of the particular situation KPMG IT Advisory, a subdivision of KPMG Advisory, a Belgian civil CVBA/SCRL ( KPMG ) and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative ( KPMG International ), a Swiss entity. All rights reserved. Printed in Belgium.
Navigating Big Data s Privacy and Security Challenges. kpmg.com
Navigating Big Data s Privacy and Security Challenges kpmg.com Navigating Big Data s Privacy and Security Challenges 1 About the authors Greg Bell is a principal in the Atlanta office of KPMG LLP s (KPMG)
The Promise of Industrial Big Data
The Promise of Industrial Big Data Big Data Real Time Analytics Katherine Butler 1 st Annual Digital Economy Congress San Diego, CA Nov 14 th 15 th, 2013 Individual vs. Ecosystem What Happened When 1B
1. Understanding Big Data
Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview Erik Luysterborg Partner, Deloitte EMEA Data Protection & Privacy leader Prague, SCCE, March 22 nd 2016 1. 2016 Deloitte
Privacy & Big Data: Enable Big Data Analytics with Privacy by Design. Datenschutz-Vereinigung von Luxemburg Ronald Koorn DRAFT VERSION 8 March 2014
Privacy & Big Data: Enable Big Data Analytics with Privacy by Design Datenschutz-Vereinigung von Luxemburg Ronald Koorn DRAFT VERSION 8 March 2014 Agenda? What is 'Big Data'? Privacy Implications Privacy
2. What personal information do we collect and hold?
PRIVACY POLICY Conexus Financial Pty Ltd [ABN 51 120 292 257], (referred to as Conexus, us, we" or our"), are committed to protecting the privacy of the personal information that we collect and complying
Do you know your privacy risks? How new technologies, changing business models, and emerging regulations are changing the data-protection landscape
January 2013 Do you know your privacy risks? How new technologies, changing business models, and emerging regulations are changing the data-protection landscape At a glance Threats to data security both
Guidelines on Data Protection. Draft. Version 3.1. Published by
Guidelines on Data Protection Draft Version 3.1 Published by National Information Technology Development Agency (NITDA) September 2013 Table of Contents Section One... 2 1.1 Preamble... 2 1.2 Authority...
ASAE s Job Task Analysis Strategic Level Competencies
ASAE s Job Task Analysis Strategic Level Competencies During 2013, ASAE funded an extensive, psychometrically valid study to document the competencies essential to the practice of association management
DESTINATION MELBOURNE PRIVACY POLICY
DESTINATION MELBOURNE PRIVACY POLICY 2 Destination Melbourne Privacy Policy Statement Regarding Privacy Policy Destination Melbourne Limited recognises the importance of protecting the privacy of personally
Corporate Policy. Data Protection for Data of Customers & Partners.
Corporate Policy. Data Protection for Data of Customers & Partners. 02 Preamble Ladies and gentlemen, Dear employees, The electronic processing of virtually all sales procedures, globalization and growing
Compliance Risk Management Survey A Point of View
FINANCIAL SERVICES Compliance Risk Management Survey A Point of View July 2014 kpmg.com Compliance Risk Management Survey A Point of View 3 Introduction As the financial crisis unfolded, regulators looked
The College of New Jersey Enterprise Risk Management and Higher Education For Discussion Purposes Only January 2012
The College of New Jersey Enterprise Risk Management and Higher Education For Discussion Purposes Only Agenda Introduction Basic program components Recent trends in higher education risk management Why
The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II).
Page 1 of 7 The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II). Domain I provides a solid foundation for the governance of
The Changing IT Risk Landscape Understanding and managing existing and emerging risks
The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015
A NEW APPROACH TO CYBER SECURITY
A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively
Binding Corporate Rules ( BCR ) Summary of Third Party Rights
Binding Corporate Rules ( BCR ) Summary of Third Party Rights This document contains in its Sections 3 9 all provision of the Binding Corporate Rules (BCR) for Siemens Group Companies and Other Adopting
From Information Management to Information Governance: The New Paradigm
From Information Management to Information Governance: The New Paradigm By: Laurie Fischer Overview The explosive growth of information presents management challenges to every organization today. Retaining
THE STATE OF DATA SHARING FOR HEALTHCARE ANALYTICS 2015-2016: CHANGE, CHALLENGES AND CHOICE
THE STATE OF DATA SHARING FOR HEALTHCARE ANALYTICS 2015-2016: CHANGE, CHALLENGES AND CHOICE As demand for data sharing grows, healthcare organizations must move beyond data agreements and masking to achieve
The Future of Investment Compliance for Asset Owners: The Next Great Transformation
The Future of Investment Compliance for Asset Owners: The Next Great Transformation By: State Street Global Services Performance Services December 2014 STATE STREET CORPORATION 1 Contents Introduction
CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY
CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY INTRODUCTION Information security has evolved. As the landscape of threats increases and cyber security 1 management becomes
ADVISORY SERVICES. Risk management in an evolving world. Making the case for social media governance. kpmg.com
ADVISORY SERVICES Risk management in an evolving world Making the case for social media governance kpmg.com Risk management in an evolving world 3 Why good governance should be the foundation of your social
IDT Financial Services Limited. Prime Card Privacy Policy
IDT Financial Services Limited Prime Card Privacy Policy Effective and Updated April 7, 2014 General IDT Financial Services Limited and its affiliates ( IDT, us, we, our ) are committed to protecting the
An Executive Overview of GAPP. Generally Accepted Privacy Principles
An Executive Overview of GAPP Generally Accepted Privacy Principles Current Environment One of today s key business imperatives is maintaining the privacy of your customers personal information. As business
Hyper-Personalization with MNO Subscriber Data
Hyper-Personalization with MNO Subscriber Data Approaches and Recent Trends Regarding the Use of MNO Data for Hyper-Personalization By Zach Cohen, Shahzad Zia and Carly Christian Private and public-sector
Decisioning for Telecom Customer Intimacy. Experian Telecom Analytics
Decisioning for Telecom Customer Intimacy Experian Telecom Analytics Turning disruption into opportunity The traditional telecom business model is being disrupted by a variety of pressures. From heightened
Leveraging data analytics and continuous auditing processes for improved audit planning, effectiveness, and efficiency. kpmg.com
Leveraging data analytics and continuous auditing processes for improved audit planning, effectiveness, and efficiency kpmg.com Leveraging data analytics and continuous auditing processes 1 Executive
Competency Requirements for Executive Director Candidates
Competency Requirements for Executive Director Candidates There are nine (9) domains of competency for association executives, based on research conducted by the American Society for Association Executives
How To Ensure Financial Compliance
Evolving from Financial Compliance to Next Generation GRC Gary Prince Principal Solution Specialist - GRC Agenda Business Challenges Oracle s Leadership in Governance, Risk and Compliance Solution Overview
Johnson Controls Privacy Notice
Johnson Controls Privacy Notice Johnson Controls, Inc. and its affiliated companies (collectively Johnson Controls, we, us or our) care about your privacy and are committed to protecting your personal
Synapse Privacy Policy
Synapse Privacy Policy Last updated: April 10, 2014 Introduction Sage Bionetworks is driving a systems change in data-intensive healthcare research by enabling a collective approach to information sharing
A new paradigm for EHS information systems: The business case for moving to a managed services solution
White Paper A new paradigm for EHS information systems: The business case for moving to a managed services solution Business solutions through information technology TM Entire contents 2005 by CGI Group
OCC 98-3 OCC BULLETIN
To: Chief Executive Officers and Chief Information Officers of all National Banks, General Managers of Federal Branches and Agencies, Deputy Comptrollers, Department and Division Heads, and Examining Personnel
Enterprise Data Management for SAP. Gaining competitive advantage with holistic enterprise data management across the data lifecycle
Enterprise Data Management for SAP Gaining competitive advantage with holistic enterprise data management across the data lifecycle By having industry data management best practices, from strategy through
Implementing the value chain of the future
Implementing the value chain of the future KPMG s Operations Advisory Practice Our mission Our vision is to help member firms clients create breakthrough competitive advantage by designing and implementing
Transforming operations and technology
CAPITAL MARKETS Transforming operations and technology Positioning firms in the capital markets sector for long-term growth and success kpmg.com/capitalmarkets KPMG INTERNATIONAL 2 Transforming operations
VENDOR MANAGEMENT. General Overview
VENDOR MANAGEMENT General Overview With many organizations outsourcing services to other third-party entities, the issue of vendor management has become a noted topic in today s business world. Vendor
White Paper: The Seven Elements of an Effective Compliance and Ethics Program
White Paper: The Seven Elements of an Effective Compliance and Ethics Program Executive Summary Recently, the United States Sentencing Commission voted to modify the Federal Sentencing Guidelines, including
KPMG s Financial Management Practice. kpmg.com
KPMG s Financial Management Practice kpmg.com 1 KPMG s Financial Management Practice KPMG s Financial Management (FM) practice, within Advisory Management Consulting, supports the growing agenda and increased
Corporate Guidelines for Subsidiaries (in Third Countries ) *) for the Protection of Personal Data
Corporate Guidelines for Subsidiaries (in Third Countries ) *) for the Protection of Personal Data *) For the purposes of these Corporate Guidelines, Third Countries are all those countries, which do not
KPMG Internal Audit: Top 10 considerations in 2015 for technology companies. kpmg.com
KPMG Internal Audit: Top 10 considerations in 2015 for technology companies kpmg.com INTERNAL AUDIT TOP 10 CONSIDERATIONS IN 2015 1 Our annual compilation of Internal Audit considerations for technology
How To Protect Your Data In European Law
Corporate Data Protection Code of Conduct for the Protection of the Individual s Right to Privacy in the Handling of Personal Data within the Deutsche Telekom Group 2010 / 04 We make ICT strategies work
Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL
AU7087_C013.fm Page 173 Friday, April 28, 2006 9:45 AM 13 Access Control The Access Control clause is the second largest clause, containing 25 controls and 7 control objectives. This clause contains critical
Sarbanes-Oxley: Beyond. Using compliance requirements to boost business performance. An RIS White Paper Sponsored by:
Beyond Sarbanes-Oxley: Using compliance requirements to boost business performance The business regulatory environment in the United States has changed. Public companies have new obligations to report
Address C-level Cybersecurity issues to enable and secure Digital transformation
Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,
KPMG Advisory. Microsoft Dynamics CRM. Advisory, Design & Delivery Services. A KPMG Service for G-Cloud V. April 2014
KPMG Advisory Microsoft Dynamics CRM Advisory, Design & Delivery Services A KPMG Service for G-Cloud V April 2014 Table of Contents Service Definition Summary (What s the challenge?)... 3 Service Definition
Fraud Risk Management
RISK CONSULTING Fraud Risk Management A proactive approach to counter the risk of fraud and misconduct kpmg.ca/forensic 2014 KPMG LLP, a Canadian limited liability partnership and a member firm of the
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential
SHARED ASSESSMENTS PROGRAM STANDARDIZED INFORMATION GATHERING (SIG) QUESTIONNAIRE
SHARED ASSESSMENTS PROGRAM STANDARDIZED INFORMATION GATHERING (SIG) QUESTIONNAIRE The Shared Assessments Trust, But Verify Model The Shared Assessments Program Tools are used for managing the vendor risk
Supporting Effective Compliance Programs
October 2015 Supporting Effective Compliance Programs The Oversight Roles of the Board Audit and Risk Committees in Regulatory Compliance By Paul Osborne, CPA, CAMS, AMLP, and Peggy Sepp, CIA To be effective,
Vital Risk Insights kpmg.com
Vital Risk Insights kpmg.com KPMG INTERNATIONAL business Using intelligence software to monitor indicators of governance, risk and compliance Success in today s global marketplace demands that leading
Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
Data Compliance. And. Your Obligations
Information Booklet Data Compliance And Your Obligations What is Data Protection? It is the safeguarding of the privacy rights of individuals in relation to the processing of personal data. The Data Protection
Data Protection Policy.
Data Protection Policy. Data Protection Policy Foreword 2 Foreword Ladies and Gentlemen, In the information age, we offer customers the means to be always connected, even in their cars. This requires data
Drive to the top. The journey, lessons, and standards of global business services. kpmg.com
Drive to the top The journey, lessons, and standards of global business services kpmg.com The new normal for global enterprises is about doing more with less while at the same time driving the top line
KNOW YOUR THIRD PARTY
Thomson Reuters KNOW YOUR THIRD PARTY EXECUTIVE SUMMARY The drive to improve profitability and streamline operations motivates many organizations to collaborate with other businesses, increase outsourcing
IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE
IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE ABSTRACT Changing regulatory requirements, increased attack surfaces and a need to more efficiently deliver access to the business
Fortune 500 Medical Devices Company Addresses Unique Device Identification
Fortune 500 Medical Devices Company Addresses Unique Device Identification New FDA regulation was driver for new data governance and technology strategies that could be leveraged for enterprise-wide benefit
TAX MANAGEMENT CONSULTING. How can you be more efficient at managing tax?
TAX MANAGEMENT CONSULTING How can you be more efficient at managing tax? NEW HEAD OF TAX/CFO TAX TRANSPARENCY Business Case Dispute Resolution Finance Transformation Authority Interaction Compliance Delivery
ICD-10 Advantages Require Advanced Analytics
Cognizant 20-20 Insights ICD-10 Advantages Require Advanced Analytics Compliance alone will not deliver on ICD-10 s potential to improve quality of care, reduce costs and elevate efficiency. Organizations
The Power of Personalizing the Customer Experience
The Power of Personalizing the Customer Experience Creating a Relevant Customer Experience from Real-Time, Cross-Channel Interaction WHITE PAPER SAS White Paper Table of Contents The Marketplace Today....1
Engage your customers
Business white paper Engage your customers HP Autonomy s Customer Experience Management market offering Table of contents 3 Introduction 3 The customer experience includes every interaction 3 Leveraging
White Paper. Enterprise Information Governance. Date Released: September 2014. Author/s: Astral Consulting. www.astral.com.au.
White Paper Enterprise Information Governance Date Released: September 2014 Author/s: Astral Consulting Disclaimer This White Paper is published for general information purposes only. Nothing in the White
Vendor Risk Management in the New Regulatory Environment. kpmg.com
Vendor Risk Management in the New Regulatory Environment kpmg.com Vendor Risk Management in the New Regulatory Environment 2 Vendor Risk Management in the New Regulatory Environment Background Regulators
Information security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
How To Respond To The Nti'S Request For Comment On Big Data And Privacy
Submission to the National Telecommunications and Information Administration (NTIA), U.S. Department of Commerce Docket No. 140514424 4424 01 RIN 0660 XC010 Comments of the Information Technology Industry
Payment Systems: Regulatory Interest in Payment Processors, Faster Payments, and Related Consumer Protections
July 2015 RPL15-04 Payment Systems: Regulatory Interest in Payment Processors, Faster Payments, and Related Consumer Protections Executive Summary The expansion of the Internet and the growth in electronic
Data protection compliance checklist
Data protection compliance checklist What is this checklist for? This checklist is drawn up on the basis of analysis of the relevant provisions of European law. Although European law aims at harmonizing
PRIVACY POLICY Personal information and sensitive information Information we request from you
PRIVACY POLICY Business Chicks Pty Ltd A.C.N. 121 566 934 (we, us, our, or Business Chicks) recognises and values the protection of your privacy. We also understand that you want clarity about how we manage
Data Protection Act 1998. Guidance on the use of cloud computing
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
Transforming risk management into a competitive advantage kpmg.com
INSURANCE RISK MANAGEMENT ADVISORY SOLUTIONS Transforming risk management into a competitive advantage kpmg.com 2 Transforming risk management into a competitive advantage Assessing risk. Building value.
Driving Business Value. A closer look at ERP consolidations and upgrades
IT advisory SERVICES Driving Business Value A closer look at ERP consolidations and upgrades KPMG LLP Meaningful business decisions that help accomplish business goals and growth objectives may call for
Innovative & agile business solution for integrated utilities
Innovative & agile business solution for integrated utilities Smart flexibility. Delivered. 1 UMAX - The utility solution Certified by Microsoft, delivering smart flexibility UMAX is the answer for utilities
Copyright 2014 Nymity Inc. All Rights Reserved.
This sample Benchmarks Report represents a real-world example of Your Privacy Management Status Report based on a mature privacy program in a non-north American organization within the public sector. Copyright
I N D U S T R Y S P O T L I G H T. T h e Grow i n g Appeal of Ad va n c e d a n d P r e d i c ti ve Analytics f o r the Utility I n d u s t r y
(% of respondents) I N D U S T R Y S P O T L I G H T T h e Grow i n g Appeal of Ad va n c e d a n d P r e d i c ti ve Analytics f o r the Utility I n d u s t r y October 2014 Sponsored by SAP Advanced
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v8 2-25-14
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit (4:30-5:30) Draft v8 2-25-14 Common Myths 1. You have not been hacked. 2. Cyber security is about keeping the
Enterprise Risk Management in Colleges and Universities
Enterprise Risk Management in Colleges and Universities Cherry Bekaert & Holland, L.L.P. Neal Beggan, CISA, CRISC Shane Hester, CPA, CISA Cherry, Bekaert & Holland, L.L.P. The Firm of Choice. 1 Cherry,
Compliance Management Systems
Certification Scheme Y03 Compliance Management Systems ISO 19600 ONR 192050 Issue V2.1:2015-01-08 Austrian Standards plus GmbH Dr. Peter Jonas Heinestraße 38 A-1020 Vienna, Austria E-Mail: [email protected]
Privacy by Design Setting a new standard for privacy certification
Privacy by Design Setting a new standard for privacy certification Privacy by Design is a framework based on proactively embedding privacy into the design and operation of IT systems, networked infrastructure,
Business Continuity Trends and Risk Considerations Financial Executives International Portland Chapter June 12 2013
Business Continuity Trends and Risk Considerations Financial Executives International Portland Chapter June 12 2013 Chitra Gopalakrishnan Director KPMG LLP Agenda Introduction Business Continuity / Disaster
Big Data Challenges and Success Factors. Deloitte Analytics Your data, inside out
Big Data Challenges and Success Factors Deloitte Analytics Your data, inside out Big Data refers to the set of problems and subsequent technologies developed to solve them that are hard or expensive to
Information Security Managing The Risk
Information Technology Capability Maturity Model Information Security Managing The Risk Introduction Information Security continues to be business critical and is increasingly complex to manage for the
The Business Case for Using Big Data in Healthcare
SAP Thought Leadership Paper Healthcare and Big Data The Business Case for Using Big Data in Healthcare Exploring How Big Data and Analytics Can Help You Achieve Quality, Value-Based Care Table of Contents
Enterprise Risk Management
Cayman Islands Society of Professional Accountants Enterprise Risk Management March 19, 2015 Dr. Sandra B. Richtermeyer, CPA, CMA What is Risk Management? Risk management is a process, effected by an entity's
The problem of cloud data governance
The problem of cloud data governance Vasilis Tountopoulos, Athens Technology Center S.A. (ATC) CSP EU Forum 2014 - Thursday, 22 nd May, 2014 Focus on data protection in the cloud Why data governance in
Part A OVERVIEW...1. 1. Introduction...1. 2. Applicability...2. 3. Legal Provision...2. Part B SOUND DATA MANAGEMENT AND MIS PRACTICES...
Part A OVERVIEW...1 1. Introduction...1 2. Applicability...2 3. Legal Provision...2 Part B SOUND DATA MANAGEMENT AND MIS PRACTICES...3 4. Guiding Principles...3 Part C IMPLEMENTATION...13 5. Implementation
ATMD Bird & Bird. Singapore Personal Data Protection Policy
ATMD Bird & Bird Singapore Personal Data Protection Policy Contents 1. PURPOSE 1 2. SCOPE 1 3. COMMITMENT TO COMPLY WITH DATA PROTECTION LAWS 1 4. PERSONAL DATA PROTECTION SAFEGUARDS 3 5. ATMDBB EXCEPTIONS:
Provider considerations for delivering an outcome based contract. Croydon CCG and London Borough of Croydon
Provider considerations for delivering an outcome based contract Croydon CCG and London Borough of Croydon Contents Introduction and Background Introduction 4 Commissioning for Outcomes: Aims and Benefits
Align Technology. Data Protection Binding Corporate Rules Controller Policy. 2014 Align Technology, Inc. All rights reserved.
Align Technology Data Protection Binding Corporate Rules Controller Policy Contents INTRODUCTION 3 PART I: BACKGROUND AND ACTIONS 4 PART II: CONTROLLER OBLIGATIONS 6 PART III: APPENDICES 13 2 P a g e INTRODUCTION
Operations Excellence in Professional Services Firms
Operations Excellence in Professional Services Firms Published by KENNEDY KENNEDY Consulting Research Consulting Research & Advisory & Advisory Sponsored by Table of Contents Introduction... 3 Market Challenges
Planning, Building, and Commissioning Assets
Solution in Detail Oil and Gas Executive Summary Contact Us Planning, Building, and Commissioning Assets 2013 2014 SAP SE or an SAP affiliate company. Effective Management of Asset Development Managed
