Connected car, big data, big brother?
|
|
|
- Amberly Sherman
- 10 years ago
- Views:
Transcription
1 Connected car, big data, big brother? Using geolocation in a trustworthy and compliant way [email protected]
2 Trends that threaten trust 2
3 Connected cars with downloadable apps Location services, cloud, internet-of-thing, big data 3
4 Privacy, security, safety How it fits together Topic Is about Key notions Privacy Data Privacy / Data Protection Information Security Safety, physical security Self determination, non-interference Proper & fair use of information about an individual Protecting/securing information Being free from effects of errors, accidents, incidents, violence etc. Freedom, Liberty, Dignity, Honor Collection & use limitation, Data quality, Purpose specification, Security safeguards, Openness, Accountability Confidentiality, Integrity, Availability Ownership, integrity, reliability, perimeter 4
5 Revolutionising navigation In 4 steps 4. TomTom HD Traffic 3. IQ Routes 2. Map Share 1. Base maps 4. TomTom HD Traffic 3. IQ Routes 2. Map Share 1. Base maps 4. TomTom HD Traffic 3. IQ Routes 2. Map Share 1. Base maps 4. TomTom HD Traffic 3. IQ Routes 2. Map Share 1. Base maps 5
6 TomToms trip archive Anonymous location and speed information from the TomTom user community 5 billion (10E9) speed measurements per day 5 trillion (10E12) speed measurements to date! by customers driving 50 billion kilometres and visiting every spot over 1,000 times
7 Creating TomTom HD Traffic: data sources Range of high-quality real-time data sources 7
8 In-car location services under scrutiny 8
9 Main GAO findings 10 companies were questioned Disclosure: all tell, 9 in broad terms, 5 omit purposes for sharing Consent & controls: all seek consent in some way, all offer some control, none who retain allow deletion Safeguards & retention: all take steps, but in different ways at different levels of de-identification and deletion 9 Accountability: all take steps to protect location data and have accountability policies, be it internal only
10 Main GAO findings: room for improvement 10 companies were questioned Disclosure: all tell, 9 in broad terms, 5 omit purposes for sharing Consent & controls: all seek consent in some way, all offer some control, none who retain allow deletion Safeguards & retention: all take steps, but in different ways at different levels of de-identification and deletion 10 Accountability: all take steps to protect location data and have accountability policies, be it internal only
11 Location privacy is top of mind With bloggers, press, regulators, enforcers, legislators and many users alike TomTom investigated by leading European Data Protection Authority in 2011 TomTom s use of location data is in accordance with EU Data Protection Laws Processing and delivery to third parties 100% OK Informing users needed to be more explicit, including opt-in 11
12 Drivers, police & TomTom An explosive mixture 12
13 Community input with permission We profile roads, not people 13
14 TomTom & Privacy Vision: Community input (crowd sourcing) is strategic Privacy helps to realize business objectives by ensuring trust Privacy is integral part of business continuity above and beyond legal compliance Principles: 1. Avoid unpleasant surprises: Customer insight is paramount Be open and explain hesitation is an omen Keep it simple 2. The customer remains in control of his personal data: we have it on a license 14
15 Key elements of EU data protection laws Challenging the potential of Big Data 1. Personal data broad(ening) definition 2. Pre-defined purposes only 3. Volume and time limitations 4. Understandable explanation 5. Consent, legal obligation or balance of legitimate interests must apply 6. Right to view, correct and object 7. Protect confidentiality, integrity & availability 15
16 Privacy, amongst others, is about the protection of personal data Personal data: Contains (whatever) information relating to a natural ( real ) person That person could be identified, directly or indirectly Typically: data attached to unique identifiers Anonymous only: When no reasonable way exists to identify ( single out ) a person Even when requiring correlation with other data sources (e.g. maps and phonebooks) By anyone with the right resources 16
17 But: do not forget EU cookie law Much broader scope than you may think Any data stored on or retrieved from a device connected to a public telecom network requires 1. Understandable explanation 2. Unambiguous consent Unless the data is strictly necessary for the services offered to the user or for a purely technical purpose. 17
18 Privacy Policies, Standards & Guidelines 7 key objectives 1. We assess our intended use of PD early to drive requirements 2. We document PD: purpose, legitimate ground, retention, access, jurisdiction(s) 3. We ensure we have obtained or will obtain informed user consent, if applicable 4. We minimize the amount of PD (volume and time) and who has access: we de-personalize or destroy PD as soon as possible 5. We keep ensuring adequate security measures based on risk assessment of confidentiality, integrity and availability 6. We do not expose PD to any third party, unless the third party contractually agrees to comply to our policies (or law forces us) 7. We enable the user to exercise his rights (information, access/download, correction, deletion) 18
19 The 6 privacy questions 1. What personal data are we processing? in categories, groups, examples 2. Why are we processing personal data? clear (multiple) purposes 3. When can we destroy the personal data? automatically or user triggered 4. Who will have access and will be accountable? including third parties 5. Where will we process and store the personal data? transfer outside of the EU requires agreements 6. Will we have a legitimate basis for processing? 19
20 Typical personal data misconceptions very often present in technology companies We do not identify the user while using the data, so we have no issues with privacy law We only use the serial number of the users device, so the data is anonymous and we have no issues with privacy law We encrypt the data, so we are no longer using/receiving/sending personal data We use hashes to replace all serial numbers, so the data is now anonymous and we have no issues with privacy law We anonimize the data, so we are not using personal data We can use the users data for anything we want, as long as we keep the data to ourselves Look: big name companies are doing the same, so we are OK 20
21 provide a specific location-based service, such as real-time traffic information. Companies may also choose to contract with third-parties that provide all location-based services on their behalf; among our selected companies, this is most common among the auto manufacturers. 6 (See fig. 2.) Location data in a car context In the EU to be regarded as sensitive personal data Figure 2: How Location Data Are Transmitted to Provide In-Car Location-Based Services Source: GAO Note: While companies use cellular networks to transmit location data, we excluded telecommunications companies that provide these networks from this review because they were included in our 2012 report on mobile devices. See GAO Requires prior, informed, explicit consent separate, not in T&C s! 21 The in-car location-based services industry continues to change and evolve: new partnerships are emerging in the marketplace, existing
22 Can location data be anonymous? Research indicates: hardly ever 22
23 Avoiding re-identification is key TomTom has a strict code of conduct to adhere to privacy laws 1 month 1 day Historic trip archive only to be used for road, traffic and related purposes No access to raw data outside TomTom, ever TomTom performs processing TomTom ensures reidentification is impossible e.g. through sufficient aggregation 23
24 GAO on reducing risks to privacy Step by step reducing the potential to identify the user Figure 3: Examples of De-Identification Methods and Privacy Risk Source: GAO 24 Although location data that are coupled with personal information, such as a name, pose the greatest privacy risk to consumers, company representatives told us that in some cases, they need such data to provide certain services. For example, one auto manufacturer we met
25 Recommendations Incorporate data protection requirements from the start Take a multi-disciplinary approach: it is about your license to operate in the information society Embed privacy by design into development processes Document your data: what, why, when, who, where Appoint a privacy czar in your organization 25
AlixPartners, LLP. General Data Protection Statement
AlixPartners, LLP General Data Protection Statement GENERAL DATA PROTECTION STATEMENT 1. INTRODUCTION 1.1 AlixPartners, LLP ( AlixPartners ) is committed to fulfilling its obligations under the data protection
ACEA PRINCIPLES OF DATA PROTECTION IN RELATION TO CONNECTED VEHICLES AND SERVICES
ACEA PRINCIPLES OF DATA PROTECTION IN RELATION TO CONNECTED VEHICLES AND SERVICES September 2015 INTRODUCTION We, the member companies of ACEA, are committed to providing our customers with a high level
PRIVACY POLICY. The Policy is incorporated into Terms of Use and is subject to the terms laid down therein.
PRIVACY POLICY This Privacy Policy ( Policy ) applies to the website Creditseva.com which is an online internet portal ( Creditseva ), offering credit repair, credit monitoring and credit consulting services
DARTFISH PRIVACY POLICY
OUR COMMITMENT TO PRIVACY DARTFISH PRIVACY POLICY Our Privacy Policy was developed as an extension of our commitment to combine the highestquality products and services with the highest level of integrity
Privacy Policy. Effective Date: November 20, 2014
Privacy Policy Effective Date: November 20, 2014 Welcome to the American Born Moonshine website (this Site ). This policy describes the Privacy Policy (this Policy ) for this Site and describes how Windy
tell you about products and services and provide information to our third party marketing partners, subject to this policy;
WEBSITE PRIVACY POLICY FOR RUBE GOLDBERG As of 09-25-2012 Rube Goldberg has created this Privacy Policy in order to demonstrate our firm commitment to protecting personal information. The following discloses
Data Protection Act 1998. Bring your own device (BYOD)
Data Protection Act 1998 Bring your own device (BYOD) Contents Introduction... 3 Overview... 3 What the DPA says... 3 What is BYOD?... 4 What are the risks?... 4 What are the benefits?... 5 What to consider?...
Android Developer Applications
Android Developer Applications January 31, 2013 Contact Departmental Privacy Office U.S. Department of the Interior 1849 C Street NW Mail Stop MIB-7456 Washington, DC 20240 202-208-1605 [email protected]
Privacy & Big Data: Enable Big Data Analytics with Privacy by Design. Datenschutz-Vereinigung von Luxemburg Ronald Koorn DRAFT VERSION 8 March 2014
Privacy & Big Data: Enable Big Data Analytics with Privacy by Design Datenschutz-Vereinigung von Luxemburg Ronald Koorn DRAFT VERSION 8 March 2014 Agenda? What is 'Big Data'? Privacy Implications Privacy
Data Protection Policy.
Data Protection Policy. Data Protection Policy Foreword 2 Foreword Ladies and Gentlemen, In the information age, we offer customers the means to be always connected, even in their cars. This requires data
Big Data, Not Big Brother: Best Practices for Data Analytics Peter Leonard Gilbert + Tobin Lawyers
Big Data, Not Big Brother: Best Practices for Data Analytics Peter Leonard Gilbert + Tobin Lawyers March 2013 How Target Knew a High School Girl Was Pregnant Before Her Parents Did just because you can,
ONLINE PRIVACY POLICY
ONLINE PRIVACY POLICY The City of New Westminster is committed to protecting your privacy. Any personal information collected, used or disclosed by the City is in accordance with the Freedom of Information
Quorum Privacy Policy
Quorum Privacy Policy Quorum Analytics Inc. ( Quorum") has created this website (the "Website" or the "Site") to provide an online analytical tool that Subscribers can use to generate Derived Analytics
BRING YOUR OWN DEVICE
BRING YOUR OWN DEVICE Legal Analysis & Practical TIPs for an effective BYOD corporate Policy CONTENTS 1. What is BYOD? 2. Benefits and risks of BYOD in Europe 3. BYOD and existing Policies 4. Legal issues
Article 29 Working Party Issues Opinion on Cloud Computing
Client Alert Global Regulatory Enforcement If you have questions or would like additional information on the material covered in this Alert, please contact one of the authors: Cynthia O Donoghue Partner,
POLICIES AND REGULATIONS Policy #78
Peel District School Board POLICIES AND REGULATIONS Policy #78 DIGITAL CITIZENSHIP Digital Citizenship Digital citizenship is defined as the norms of responsible behaviour related to the appropriate use
Considerations for Outsourcing Records Storage to the Cloud
Considerations for Outsourcing Records Storage to the Cloud 2 Table of Contents PART I: Identifying the Challenges 1.0 Are we even allowed to move the records? 2.0 Maintaining Legal Control 3.0 From Storage
Using Big [Traffic] Data to help Drivers, Road Authorities and Businesses
Using Big [Traffic] Data to help Drivers, Road Authorities and Businesses Creating Traffic Information TomTom Traffic Car-centric Route Guidance Benefits for ALL TomTom s missions Traffic Management: Traditional
IDT Financial Services Limited. Prime Card Privacy Policy
IDT Financial Services Limited Prime Card Privacy Policy Effective and Updated April 7, 2014 General IDT Financial Services Limited and its affiliates ( IDT, us, we, our ) are committed to protecting the
Insights on commercial use of data
Insights on commercial use of data Deloitte s Privacy with a view II 13 November 2014, OCEANDIVA Amsterdam Rence Damming Privacy Officer About me Occupation: Privacy Officer of, since April 1st 2011 Works
Introduction PriorFX LTD Right to Privacy Information
Privacy Policy 1.Introduction 1.1 PriorFX LTD ( PriorFx or we ) is a Cyprus Investment Firm regulated by the Cyprus Securities and Exchange Commission (License No. 221/13). 1.2 PriorFX is operating under
Privacy Policy. PortfolioTrax, LLC. 2015 v1.0. PortfolioTrax, LLC Privacy Policy 2
Privacy Policy 2015 v1.0 Privacy Policy 2 Document Controls and Review This document is to be reviewed once every two quarters and updated to account for any changes in privacy practices that may not have
Merthyr Tydfil County Borough Council. Data Protection Policy
Merthyr Tydfil County Borough Council Data Protection Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of the
Cloud Service Contracts: An Issue of Trust
Cloud Service Contracts: An Issue of Trust Marie Demoulin Assistant Professor Université de Montréal École de Bibliothéconomie et des Sciences de l Information (EBSI) itrust 2d International Symposium,
Privacy and Electronic Communications Regulations
ICO lo Notification of PECR security breaches Privacy and Electronic Communications Regulations Contents Introduction... 2 Overview... 2 Relevant security breaches... 3 What is a service provider?... 3
Privacy in the Cloud Computing Era. A Microsoft Perspective
Privacy in the Cloud Computing Era A Microsoft Perspective November 2009 The information contained in this document represents the current view of Microsoft Corp. on the issues discussed as of the date
Security Considerations
Concord Fax Security Considerations For over 15 years, Concord s enterprise fax solutions have helped many banks, healthcare professionals, pharmaceutical companies, and legal professionals securely deliver
How to handle data privacy issues in the car industry
How to handle data privacy issues in the car industry Björn Kjellén Chief information security officer (CISO) introduction The Automotive industry is now delivering vehicles with connectivity for exchange
WEBSITE PRIVACY POLICY. Last modified 10/20/11
WEBSITE PRIVACY POLICY Last modified 10/20/11 1. Introduction 1.1 Questions. This website is owned and operated by. If you have any questions or concerns about our Privacy Policy, feel free to email us
PROTECTION OF PERSONAL INFORMATION
PROTECTION OF PERSONAL INFORMATION Definitions Privacy Officer - The person within the Goderich Community Credit Union Limited (GCCU) who is responsible for ensuring compliance with privacy obligations,
How Microsoft is taking Privacy by Design to Work. Alan Chan National Technology Officer Microsoft Hong Kong 7 May 2015
How Microsoft is taking Privacy by Design to Work Alan Chan National Technology Officer Microsoft Hong Kong 7 May 2015 Agenda Introducing the New Microsoft Microsoft privacy principle Protecting privacy
Zubi Advertising Privacy Policy
Zubi Advertising Privacy Policy This privacy policy applies to information collected by Zubi Advertising Services, Inc. ( Company, we or us ), on our Latino Emoji mobile application or via our Latino Emoji
Privacy and Cloud Computing for Australian Government Agencies
Privacy and Cloud Computing for Australian Government Agencies Better Practice Guide February 2013 Version 1.1 Introduction Despite common perceptions, cloud computing has the potential to enhance privacy
Privacy Policy. Peeptrade LLC ( Company or We ) respect your privacy and are committed to protecting it through our compliance with this policy.
Privacy Policy Introduction Peeptrade LLC ( Company or We ) respect your privacy and are committed to protecting it through our compliance with this policy. This policy describes the types of information
ESTRO PRIVACY AND DATA SECURITY NOTICE
ESTRO PRIVACY AND DATA SECURITY NOTICE This Data Privacy and Security Policy is a dynamic document, which will reflect our continuing vigilance to properly handle and secure information that we are trusted
DATA PROTECTION POLICY
DATA PROTECTION POLICY Approval date: June 2014 Approved by: Board Responsible Manager: Executive Director of Resources Next Review June 2016 Data Protection Policy 1. Introduction Data Protection Policy
Synapse Privacy Policy
Synapse Privacy Policy Last updated: April 10, 2014 Introduction Sage Bionetworks is driving a systems change in data-intensive healthcare research by enabling a collective approach to information sharing
ABC PRIVACY POLICY. The ABC is strongly committed to protecting your privacy when you interact with us, our content, products and services.
ABC PRIVACY POLICY The ABC is strongly committed to protecting your privacy when you interact with us, our content, products and services. Our goal is to provide you and your family with media experiences
Maximum Global Business Online Privacy Statement
Maximum Global Business Online Privacy Statement Last Updated: June 24, 2008. Maximum Global Business is committed to protecting your privacy. Please read the Maximum Global Business Online Privacy Statement
By Emily Hay and Jan Dhont, Data Privacy Department, Lorenz Brussels.
Getting a Clean Bill of Health for Privacy in Your Mobile App By Emily Hay and Jan Dhont, Data Privacy Department, Lorenz Brussels. I. Introduction to the legal regime and risks As the marketplace floods
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential
GUESTBOOK REWARDS, INC. Privacy Policy
GUESTBOOK REWARDS, INC. Privacy Policy Welcome to Guestbook Rewards, Inc. the online and mobile service of Guestbook Rewards, Inc. ( The Guestbook, we, or us ). Our Privacy Policy explains how we collect,
Privacy Charter. Protecting Your Privacy
Privacy Charter Protecting Your Privacy 1 1. Introduction 3 2. Collection of personal information 3 What sort of personal information do we collect and hold? 3 Anonymity and Pseudonymity 3 Why do we collect
We will not collect, use or disclose your personal information without your consent, except where required or permitted by law.
HSBC Privacy Notice HSBC's Privacy Principles HSBC Bank Canada is a subsidiary of HSBC Holdings plc which, together with its subsidiaries and affiliates, is one of the world s largest banking and financial
PRIVACY POLICY. Last updated February 2, 2009 INTRODUCTION
PRIVACY POLICY Last updated February 2, 2009 INTRODUCTION This Privacy Policy explains how personal information about you may be collected, used, or disclosed by the Canadian Education and Research Institute
Privacy Policy. If you have questions or complaints regarding our Privacy Policy or practices, please see Contact Us. Introduction
Privacy Policy This Privacy Policy will be effective from September 1 st, 2014. Please read Pelican Technologies Privacy Policy before using Pelican Technologies services because it will tell you how we
(4) THAMES VALLEY POLICE of Oxford Road, Kidlington, OX5 2NX ("Police Force"),
DATE OF INFORMATION SHARING AGREEMENT JULY 2015 PARTIES (1) LIVE NATION (MUSIC) UK LIMITED (Company Number 02409911) whose registered office is at 2 nd Floor, Regent Arcade House, 19-25 Argyll Street,
Policy Based Encryption Z. Administrator Guide
Policy Based Encryption Z Administrator Guide Policy Based Encryption Z Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
GSA s Digital Analytics Program and FTC
Federal Trade Commission Privacy Impact Assessment Google Analytics Through GSA s Digital Analytics Program June 2014 1 SECTION 1.0 SPECIFIC PURPOSE OF THE FTC S PARTICIPATION IN GSA s DIGITAL ANALYTICS
PRIVACY REGULATIONS regarding the Web Health History ("W.H.H.") Service called LifepassportPRO provided by Meshpass SA
PRIVACY REGULATIONS regarding the Web Health History ("W.H.H.") Service called LifepassportPRO provided by Meshpass SA Updated: 20 Jun 2015 (substitutes previous versions) This Privacy Policy describes
ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY
ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY Originated by: Data Protection Working Group: November 2008 Impact Assessment: (to be confirmed) Recommended by Senate: 28 January 2009 Approved by Council:
Observations on international efforts to develop frameworks to enhance privacy while realising big data s benefits
Big Data, Key Challenges: Privacy Protection & Cooperation Observations on international efforts to develop frameworks to enhance privacy while realising big data s benefits Seminar arranged by the Office
BUSINESS CHICKS, INC. Privacy Policy
BUSINESS CHICKS, INC. Privacy Policy Welcome to businesschicks.com, the online and mobile service of Business Chicks, Inc. ( Company, we, or us ). Our Privacy Policy explains how we collect, use, disclose,
Credit Union Board of Directors Introduction, Resolution and Code for the Protection of Personal Information
Credit Union Board of Directors Introduction, Resolution and Code for the Protection of Personal Information INTRODUCTION Privacy legislation establishes legal privacy rights for individuals and sets enforceable
Declaration of Internet Rights Preamble
Declaration of Internet Rights Preamble The Internet has played a decisive role in redefining public and private space, structuring relationships between people and between people and institutions. It
Best Practices for Protecting Individual Privacy in Conducting Survey Research
Best Practices for Protecting Individual Privacy in Conducting Survey Research CONTENTS Foreword... 1 Introduction... 2 Privacy Considerations at Each Stage of a Survey Research Project... 5 Stage 1: Issue
Office 365 Data Processing Agreement with Model Clauses
Enrollment for Education Solutions Office 365 Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID Enrollment for Education Solutions number Microsoft to complete 7392924 GOLDS03081
Office of the Data Protection Commissioner of The Bahamas. Data Protection (Privacy of Personal Information) Act, 2003. A Guide for Data Controllers
Office of the Data Protection Commissioner of The Bahamas Data Protection (Privacy of Personal Information) Act, 2003 A Guide for Data Controllers 1 Acknowledgement Some of the information contained in
INFORMATION SECURITY MANAGEMENT POLICY
INFORMATION SECURITY MANAGEMENT POLICY Security Classification Level 4 - PUBLIC Version 1.3 Status APPROVED Approval SMT: 27 th April 2010 ISC: 28 th April 2010 Senate: 9 th June 2010 Council: 23 rd June
BBVA Wallet Application Privacy Policy
BBVA Wallet Application Privacy Policy Effective date: September 14, 2015 This Privacy Policy describes our practices related to the use, storage and disclosure of information we collect from or about
Data Privacy: What your nonprofit needs to know. Donna Balaguer and Ed Lavergne Washington, D.C. February 5, 2015
Data Privacy: What your nonprofit needs to know Donna Balaguer and Ed Lavergne Washington, D.C. February 5, 2015 Overview 2 Data privacy versus data security Privacy polices and best practices Data security
ChangeIt Privacy Policy - Canada
ChangeIt Privacy Policy - Canada 1. Policy on Privacy of Personal Information Formulating Change Inc. ( FCI, we, us or our ) is committed to protecting the privacy and security of your Personal Information
Protection. Code of Practice. of Personal Data RPC001147_EN_WB_L_1
Protection of Personal Data RPC001147_EN_WB_L_1 Table of Contents Data Protection Rules Foreword From the Data Protection Commissioner Introduction From the Chairman Data Protection Responsibility of Employees
If you have any questions about our privacy practices, please refer to the end of this privacy policy for information on how to contact us.
c4m Privacy Policy Last Modified: July 20, 2015 Colbette II Ltd., Block 1, 195-197 Old Nicosia-Limassol Road, Dali Industrial Zone, Cyprus 2540 (hereinafter "c4m", Colbette we", "our" or "us") is always
Data protection compliance checklist
Data protection compliance checklist What is this checklist for? This checklist is drawn up on the basis of analysis of the relevant provisions of European law. Although European law aims at harmonizing
Information Governance Strategy
Information Governance Strategy To whom this document applies: All Trust staff, including agency and contractors Procedural Documents Approval Committee Issue Date: January 2010 Version 1 Document reference:
MEMORANDUM. I. Accurate Framing of Communications Privacy Policy Should Acknowledge Full Range of Threats to Consumer Privacy
MEMORANDUM To: Interested Persons From: Claire Gartland, Khaliah Barnes, and Marc Rotenberg, Electronic Privacy Information Center (EPIC) Re: FCC Communications Privacy Rulemaking Date: EPIC is circulating
CUSTOMER INFORMATION COMMZOOM, LLC PRIVACY POLICY. For additional and updated information, please visit our website at www.commzoom.com.
CUSTOMER INFORMATION COMMZOOM, LLC PRIVACY POLICY YOUR PRIVACY AS A COMMZOOM CUSTOMER As a customer of commzoom, LLC, you are entitled to know what we do with personal information about you that we receive.
Protecting your privacy
Protecting your privacy Table of Contents Answering your questions about privacy Your privacy... 1 Your consent... 1 Answering your questions about privacy... 2 About cookies... 9 Behavioural Advertising/Online
Beasley Broadcast Group, Inc. Privacy Policy
Beasley Broadcast Group, Inc. Privacy Policy Last Updated and Effective December 31, 2015 This Privacy Policy has been updated to include a section regarding your California privacy rights if you are a
Policy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
Policy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
Data Protection Policy June 2014
Data Protection Policy June 2014 Approving authority: Consultation via: Court Audit and Risk Committee, University Executive, Secretary's Board, Information Governance and Security Group Approval date:
Seizing Opportunity: Good Privacy Practices for Developing Mobile Apps
Seizing Opportunity: Good Privacy Practices for Developing Mobile Apps 1 2 Introduction Canada s privacy laws require all businesses to balance innovation and entrepreneurialism with effective privacy
Identifying and Managing Third Party Data Security Risk
Identifying and Managing Third Party Data Security Risk Legal Counsel to the Financial Services Industry Digital Commerce & Payments Series Webinar April 29, 2015 1 Introduction & Overview Today s discussion:
Report of findings. Official investigation by the CBP into the processing of geolocation data by TomTom N.V. PUBLIC VERSION
POSTAL ADDRESS Postbus 93374, 2509 AJ The Hague VISITING ADDRESS Juliana van Stolberglaan 4-10 TEL 070-88 88 500 FAX 070-88 88 501 INTERNET www.cbpweb.nl www.mijnprivacy.nl Report of findings Official
Last updated: 30 May 2016. Credit Suisse Privacy Policy
Last updated: 30 May 2016 Credit Suisse Please read this privacy policy (the ) as it describes how we intend to collect, use, store, share, and safeguard your information. By accessing, visiting or using
Cloud Security Trust Cisco to Protect Your Data
Trust Cisco to Protect Your Data As cloud adoption accelerates, organizations are increasingly placing their trust in third-party cloud service providers (CSPs). But can you fully trust your most sensitive
1. Applicant means a person or persons applying for any product or service offered by us;
Intermediaries Online Website and Introducer Conditions 1. General 1. It is important that you read and understand these conditions before you start to use this website. By confirming your acceptance you
M&T BANK CANADIAN PRIVACY POLICY
M&T BANK CANADIAN PRIVACY POLICY At M&T Bank, we are committed to safeguarding your personal information and maintaining your privacy. This has always been a priority for us and this is why M&T Bank (
