Thinking small about big data: Privacy considerations for the public sector Shaun Brown Partner, nnovation LLP
|
|
|
- Phoebe Marsh
- 9 years ago
- Views:
Transcription
1 Thinking small about big data: Privacy considerations for the public sector Shaun Brown Partner, nnovation LLP March 30, 2016
2 Thinking small about big data: objectives Consider big data as a concept Focus on predictive analytics Emphasize practical over policy Understand the legal landscape (Privacy Act) Key takeaways: Three step analytical framework Practical considerations when using predictive analytics 2
3 What is big data? The three Vs : High-Volume High-Velocity High-Variety About linking datasets and identifying patterns Fueled by ICTs, cheap storage, applications that create digital exhaust 3
4 What is big data? A problem to be solved: a term for data sets that are so large or complex that traditional data processing applications are inadequate. Challenges include analysis, capture, data curation, search, sharing, storage, transfer, visualization, querying and information privacy (Wikipedia) 4
5 What is big data? (Business) Opportunity: information assets that demand cost-effective, innovative forms of information processing that enable enhanced insight, decision making, and process automation. (Gartner) 5
6 What is big data? Our worst nightmare? Systematic discrimination Loss of autonomy Rise of the machines Difficult policy issues about regulation of technology 6
7 Predictive Analytics Predictive Analytics: thinking a bit smaller statistical techniques from predictive modeling, machine learning, and data mining that analyze current and historical facts to make predictions about future or otherwise unknown events (Wikipedia) 7
8 Predictive Analytics It is already everywhere: Credit scoring Online behavioural advertising (OBA) Recommendation engines (e.g., Amazon, Netflix) Human resources: employability and retention Crime prevention and anti-terrorism: predict when and where crime is likely to happen. 8
9 Legal landscape: Privacy Act Applies to the collection, use and disclosure of Personal Information (PI) by federal government institutions (departments, ministries, parent Crown Corporations) PI very broadly defined: Information about an identifiable individual in any form Information will be about an identifiable individual where there is a serious possibility that an individual could be identified through the use of that information, alone or in combination with other available information. (Gordon v. Canada, Federal Court) Includes things such as internet protocol address 9
10 Legal landscape: Privacy Act Authority: Can only collect PI if it relates directly to an operating program or activity Contrast to private sector which relies on consent & reasonableness Identify Purposes: individuals must be informed of purpose for collection (some exceptions) 10
11 Legal landscape: Privacy Act Additional requirements where PI used for an Administrative Purpose : Decision making process that directly affects an individual Direct Collection: PI collected for administrative purpose must be collected directly from individual (some exceptions) Retention: PI used for administrative purpose must be retained long enough for individual to access (minimum 2 years) Accuracy: Must take reasonable steps to ensure PI used for administrative purpose is as accurate and up-to-date as possible 11
12 Legal landscape: Privacy Act PI can only be used for the purpose for which it was collected or a consistent purpose (some exceptions) PI can only be disclosed with consent (some exceptions) Access Requirements: PI and non-pi is subject to access under Privacy Act and Access to Information Act, respectively 12
13 Understanding PA: three step framework 1. Collect Data Apply Models to Individuals 2. Analyze and Develop Models Highly simplified understanding of most common applications Applies to public sector orgs. looking to apply predictive analytics to a database of individuals Case study: Beware Threat Rating System used by Law Enforcement Agencies (LEAs)
14 Step 1: Data Collection What is feeding the machine? Remember the three Vs (volume, velocity and variety) Are predictive models based on data collected in the past (or from other sources)? e.g., credit scoring systems Is your data feeding the machine? If so: Who has access to data? Is it being used by the vendor? Other customers of the vendor? Remember restrictions on disclosure of PI Data should be rendered so it is not PI (e.g., de-identified) whenever possible 14
15 Step 1: Data Collection Beware Crawls billions of records in commercial and public databases Social media and other internet chatter Court documents (for records of criminal convictions)? Data provided by LEAs? 15
16 Step 2: Analyze Data and Develop Models Have models already been created? Is your PI being used to develop models? If so: Are the research questions and goals clearly defined? Openended exploratory research involving PI should be avoided Is research for or consistent with purpose for which PI was originally collected? 16
17 Step 2: Analyze Data and Develop Models Beware: Threat rating system uses proprietary algorithm to predict threat based on available information Threat rating formula not publicly disclosed Presumably cross-references incidents of criminal behaviour with various other information about an individual Feedback from LEAs would be helpful in validating and improving models 17
18 Step 3: Apply Predictive Models Individuals are scored, rated, categorized and treated accordingly Involves collection and use of PI about an individual Need PI to feed the model The score is new PI that is created 18
19 Step 3: Apply Predictive Models Beware: LEA enters name, address and/or cell no. of individual into app (on computer or mobile device) Beware analyzes all available data about that individual Applies model to give a threat rating Do ratings already exist? Created in real-time? 19
20 Step 3: Impact on individuals Does it result in or contribute to an administrative decision? If so, how can we verify accuracy? Is information retained long enough (2 years)? Does the outcome become part of a permanent record? Who might see this in the future? Does it discriminate, either directly or indirectly? Is the final decision made by a human (e.g., model is merely for filtering purposes)? 20
21 Summary and Practical Considerations The Privacy Act imposes few restrictions on which applications can be used Predictive Analytics require information about real people: is your data being used? De-identification is crucial Predictive Analytics is much more than a data collection issue: can result in uses, disclosures, and administrative decisions 21
22 Summary and Practical Considerations Predictive Analytics can be complex: you need to understand what is happening and the privacy impacts Do not be afraid to push back on vendors for more information How will the public be informed? Privacy Impact Assessments are essential: Identify and mitigate privacy-related risks Documenting business processes data flows About more than just privacy: Must consider human rights issues (s. 15 of the Charter right to equal treatment without discrimination) Sometimes it can be just plain creepy (Target) 22
23 Resources Tene, Polonetsky, Judged by the Tin Man: Individual Rights in the Age of Big Data, TBS Standard on Privacy and Web Analytics: Privacy Commissioner Policy Position on OBA: Cavoukian & El Emam, De-identification Protocols: Essential for Protecting Privacy, Jun. 25, 2014: Beware: 23
24 About nnovation LLP Ottawa-based, boutique firm that specializes in regulatory matters, including privacy, access to information, advertising, and competition law Our clients include many government institutions at the federal and provincial levels, in addition to private sector companies, not-for-profit entities and industry associations We regularly provide a variety of services to public sector clients, either as consultants or legal counsel, including: Privacy Impact Assessments (over 150 completed) Privacy Management Frameworks Legal opinions Draft outsourcing agreements Advise on and assist with specific privacy and access to information-related matters on an as-needed basis 24
25 Shaun Brown
A Q&A with the Commissioner: Big Data and Privacy Health Research: Big Data, Health Research Yes! Personal Data No!
A Q&A with the Commissioner: Big Data and Privacy Health Research: Big Data, Health Research Yes! Personal Data No! Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario, Canada THE AGE OF
Big Data, Not Big Brother: Best Practices for Data Analytics Peter Leonard Gilbert + Tobin Lawyers
Big Data, Not Big Brother: Best Practices for Data Analytics Peter Leonard Gilbert + Tobin Lawyers March 2013 How Target Knew a High School Girl Was Pregnant Before Her Parents Did just because you can,
HIPAA and Big Data Twenty Third National HIPAA Summit. March 17, 2015 Mitchell W. Granberg, Optum Chief Privacy Officer
HIPAA and Big Data Twenty Third National HIPAA Summit March 17, 2015 Mitchell W. Granberg, Optum Chief Privacy Officer Overview HIPAA and Big Data Big Data Definitions Big Data and Health Care Benefits
Big Data Analytics. Prof. Dr. Lars Schmidt-Thieme
Big Data Analytics Prof. Dr. Lars Schmidt-Thieme Information Systems and Machine Learning Lab (ISMLL) Institute of Computer Science University of Hildesheim, Germany 33. Sitzung des Arbeitskreises Informationstechnologie,
MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY
MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY Page 1 of 16 Contents Policy Information 3 Introduction 4 Responsibilities 7 Confidentiality 9 Data recording and storage 11 Subject Access 12 Transparency
How To Respond To The Nti'S Request For Comment On Big Data And Privacy
Submission to the National Telecommunications and Information Administration (NTIA), U.S. Department of Commerce Docket No. 140514424 4424 01 RIN 0660 XC010 Comments of the Information Technology Industry
PRIVACY POLICY. comply with the Australian Privacy Principles ("APPs"); ensure that we manage your personal information openly and transparently;
PRIVACY POLICY Our Privacy Commitment Glo Light Pty Ltd A.C.N. 099 730 177 trading as "Lighting Partners Australia of 16 Palmer Parade, Cremorne, Victoria 3121, ( LPA ) is committed to managing your personal
MEMORANDUM. I. Accurate Framing of Communications Privacy Policy Should Acknowledge Full Range of Threats to Consumer Privacy
MEMORANDUM To: Interested Persons From: Claire Gartland, Khaliah Barnes, and Marc Rotenberg, Electronic Privacy Information Center (EPIC) Re: FCC Communications Privacy Rulemaking Date: EPIC is circulating
The CPS incorporates RCPO. CPS Data Protection Policy
The CPS incorporates RCPO CPS Data Protection Policy Contents Introduction 3 Scope 4 Roles and Responsibilities 4 Processing Criminal Cases 4 Information Asset Owners 5 Information Asset Register 5 Information
Westpac Privacy Policy. Our privacy commitment to you
Westpac Privacy Policy Our privacy commitment to you 12 March 2014 Contents About this policy... 3 What is personal information?... 3 What kinds of personal information do we collect and hold?... 3 For
RAMS Privacy Policy. When you trust us with your personal information, you expect us to protect it and keep it safe.
When you trust us with your personal information, you expect us to protect it and keep it safe. We are bound by the Privacy Act 1988 (Cth) ( Privacy Act ) and will protect your personal information in
Privacy & Big Data: Enable Big Data Analytics with Privacy by Design. Datenschutz-Vereinigung von Luxemburg Ronald Koorn DRAFT VERSION 8 March 2014
Privacy & Big Data: Enable Big Data Analytics with Privacy by Design Datenschutz-Vereinigung von Luxemburg Ronald Koorn DRAFT VERSION 8 March 2014 Agenda? What is 'Big Data'? Privacy Implications Privacy
Policies & Procedures
DMG Financial Planning Pty Ltd Policies & Procedures Web: www.dmgfinancial.com.au e-mail: [email protected] Policy Name: Privacy Policy Date of Policy: March 2014 Next Review: March 2015 Privacy Policy
PRIVACY AND CREDIT REPORTING POLICY
PRIVACY AND CREDIT REPORTING POLICY 12 March 2014 CONTENTS What is personal information?...3 Information we may collect, use and disclose about you...4 Collection of sensitive information...6 How personal
Big Data and Complex Networks Analytics. Timos Sellis, CSIT Kathy Horadam, MGS
Big Data and Complex Networks Analytics Timos Sellis, CSIT Kathy Horadam, MGS Big Data What is it? Most commonly accepted definition, by Gartner (the 3 Vs) Big data is high-volume, high-velocity and high-variety
Program Overview. CDP is a registered certification designed and administered by Identity Management Institute (IMI).
Overview Certified in Data Protection (CDP) is a comprehensive global training and certification program which leverages international security standards and privacy laws to teach candidates on how to
2016 OCR AUDIT E-BOOK
!! 2016 OCR AUDIT E-BOOK About BlueOrange Compliance: We specialize in healthcare information privacy and security solutions. We understand that each organization is busy running its business and that
Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst
Clouds on the Horizon Cloud Security in Today s DoD Environment Bill Musson Security Analyst Agenda O Overview of Cloud architectures O Essential characteristics O Cloud service models O Cloud deployment
DATA PROTECTION POLICY
DATA PROTECTION POLICY The Hollandse School Limited (hereinafter HSL ) is an educational institution with a history of over 93 years, and is one of the largest Dutch language schools abroad where the International
Credit Reporting Privacy Policy of Baybrick Pty Ltd
Credit Reporting Privacy Policy of Baybrick Pty Ltd Introduction 1. This Credit Reporting Privacy Policy is the official privacy policy of Baybrick Pty Ltd and its subsidiaries which includes JBS Australia
ICG PRIVACY POLICY. Developed in compliance with applicable privacy legislation in each relevant ICG operational jurisdiction
ICG PRIVACY POLICY Developed in compliance with applicable privacy legislation in each relevant ICG operational jurisdiction Version 1.3, updated 5th May 2014 "Protecting the personal privacy interests
Re: Big Data Request for Information
March 31, 2014 Attn: Big Data Study Office of Science and Technology Policy Eisenhower Executive Office Building 1650 Pennsylvania Avenue NW Washington, D.C. 20502 Ladies and Gentlemen: Re: Big Data Request
Annex B. The Proposed Amendments AMENDMENTS TO NATIONAL INSTRUMENT 21-101 MARKETPLACE OPERATION
Annex B The Proposed Amendments AMENDMENTS TO NATIONAL INSTRUMENT 21-101 MARKETPLACE OPERATION 1. National Instrument 21-101 Marketplace Operation is amended by this Instrument. 2. National Instrument
Report of the Information & Privacy Commissioner/Ontario. Review of the Canadian Institute for Health Information:
Information and Privacy Commissioner of Ontario Report of the Information & Privacy Commissioner/Ontario Review of the Canadian Institute for Health Information: A Prescribed Entity under the Personal
Analytics, Big Data, & Threat Intelligence: How Security is Transforming
Analytics, Big Data, & Threat Intelligence: How Security is Transforming Jason Sloderbeck Director, Product Management RSA Web Threat Detection 1 Presentation Overview The Largest Threat How Can Big Data
The De-identification of Personally Identifiable Information
The De-identification of Personally Identifiable Information Khaled El Emam (PhD) www.privacyanalytics.ca 855.686.4781 [email protected] 251 Laurier Avenue W, Suite 200 Ottawa, ON Canada K1P 5J6
Best Practices for Protecting Individual Privacy in Conducting Survey Research
Best Practices for Protecting Individual Privacy in Conducting Survey Research CONTENTS Foreword... 1 Introduction... 2 Privacy Considerations at Each Stage of a Survey Research Project... 5 Stage 1: Issue
Legal Insight. Big Data Analytics Under HIPAA. Kevin Coy and Neil W. Hoffman, Ph.D. Applicability of HIPAA
Big Data Analytics Under HIPAA Kevin Coy and Neil W. Hoffman, Ph.D. Privacy laws and regulations such as the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule can have a significant
The Top Challenges in Big Data and Analytics
Big Data Leads to Insights, Improvements & Automation Over the past few years, there has been a tremendous amount of hype around Big Data data that doesn t work well in traditional BI systems and warehouses
Ann Cavoukian, Ph.D.
Protecting Privacy in an Era of Electronic Health Records Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario Barrie and Community Family Health Team Royal Victoria Hospital Georgian College
DESTINATION MELBOURNE PRIVACY POLICY
DESTINATION MELBOURNE PRIVACY POLICY 2 Destination Melbourne Privacy Policy Statement Regarding Privacy Policy Destination Melbourne Limited recognises the importance of protecting the privacy of personally
Big Data & Analytics. A boon under certain conditions. Dr. Christian Keller General Manager IBM Switzerland. 2014 IBM Corporation
Big Data & Analytics A boon under certain conditions Dr. Christian Keller General Manager IBM Switzerland Agenda IBM at a glance What is Big Data? 4Vs The IBM point of view BD&A Market Opportunities Challenges
Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Industrial Cyber Security Risk
Industrial Cyber Security Risk Manager Proactively Monitor, Measure and Manage Industrial Cyber Security Risk Industrial Attacks Continue to Increase in Frequency & Sophistication Today, industrial organizations
Data Compliance. And. Your Obligations
Information Booklet Data Compliance And Your Obligations What is Data Protection? It is the safeguarding of the privacy rights of individuals in relation to the processing of personal data. The Data Protection
BITKOM& NIK - Big Data Wo liegen die Chancen für den Mittelstand?
BITKOM& NIK - Big Data Wo liegen die Chancen für den Mittelstand? The Big Data Buzz big data is a collection of data sets so large and complex that it becomes difficult to process using on-hand database
Policy Brief: Protecting Privacy in Cloud-Based Genomic Research
Policy Brief: Protecting Privacy in Cloud-Based Genomic Research Version 1.0 July 21 st, 2015 Suggested Citation: Adrian Thorogood, Howard Simkevitz, Mark Phillips, Edward S Dove & Yann Joly, Policy Brief:
QUEENSLAND COUNTRY HEALTH FUND. privacy policy. Queensland Country Health Fund Ltd ABN 18 085 048 237. better health cover shouldn t hurt
QUEENSLAND COUNTRY HEALTH FUND privacy policy Queensland Country Health Fund Ltd ABN 18 085 048 237 better health cover shouldn t hurt 1 2 contents 1. Introduction 4 2. National Privacy Principles 5 3.
Digital Evidence meets the Charter: Peer-to-Peer (P2P) File-Sharing Networks
Volume 22, No. 1 September 2012 Criminal Justice Section Digital Evidence meets the Charter: Peer-to-Peer (P2P) File-Sharing Networks A case comment on R. v. Spencer and R. v. Trapp Brock Jones 1 A. Peer-to-Peer
Predictive Analytics
Predictive Analytics How many of you used predictive today? 2015 SAP SE. All rights reserved. 2 2015 SAP SE. All rights reserved. 3 How can you apply predictive to your business? Predictive Analytics is
Personal Information Protection and Electronic Documents Act
PIPEDA Self-Assessment Tool Personal Information Protection and Electronic Documents Act table of contents Why this tool is needed... 3 How to use this tool... 4 PART 1: Compliance Assessment Guide Principle
Loyalty program assessment: flybuys
Loyalty program assessment: flybuys Coles Supermarkets Australia Pty Ltd Summary report Australian Privacy Principles assessment Section 33C(1)(a) Privacy Act 1988 Assessment undertaken: November 2015
FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES
FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES The implications for privacy and security in the emergence of HIEs The emergence of health information exchanges (HIE) is widely
International Journal of Advanced Engineering Research and Applications (IJAERA) ISSN: 2454-2377 Vol. 1, Issue 6, October 2015. Big Data and Hadoop
ISSN: 2454-2377, October 2015 Big Data and Hadoop Simmi Bagga 1 Satinder Kaur 2 1 Assistant Professor, Sant Hira Dass Kanya MahaVidyalaya, Kala Sanghian, Distt Kpt. INDIA E-mail: [email protected]
Mr President, Ladies and Gentlemen Members of the Court, Mr Advocate. Thank you for inviting the European Data Protection Supervisor today.
Request for an Opinion by the European Parliament, draft EU-Canada PNR agreement (Opinion 1/15) Hearing of 5 April 2016 Pleading notes of the European Data Protection Supervisor (EDPS) Mr President, Ladies
YOUTH RECORDS - WHAT ARE THEY - WHO CAN GET THEM - FOR HOW LONG
YOUTH RECORDS - WHAT ARE THEY - WHO CAN GET THEM - FOR HOW LONG PROHIBITION TO ACCESS S. 118 YCJA Except as authorized by the YCJA, no person shall be given access to a record and no information contained
COMMENTARY Scope & Purpose Definitions I. Education. II. Transparency III. Consumer Control
CONTENTS: SUMMARY SELF REGULATORY PRINCIPLES FOR ONLINE BEHAVIORAL ADVERTISING Introduction Definitions I. Education II. Transparency III. Consumer Control IV. Data Security V. Material Changes to Existing
Privacy Policy Statement
Privacy Policy Statement Our Commitment While information is the foundation for providing you with superior service, protecting the privacy of your personal information is of the highest importance to
Information Privacy Policy
Information Privacy Policy pol-032 Version: 2.01 Last amendment: Oct 2014 Next Review: Aug 2017 Approved By: Council Date: 04 May 2005 Contact Officer: Director, Strategic Services and Governance INTRODUCTION
Buckinghamshire County Council Transport for Buckinghamshire ANPR Code of Practice
Buckinghamshire County Council Transport for Buckinghamshire ANPR Code of Practice 1 Introduction 1.1 Buckinghamshire County Council (BCC) Transportation Service has Automatic Number Plate Recognition
Demystifying Big Data Government Agencies & The Big Data Phenomenon
Demystifying Big Data Government Agencies & The Big Data Phenomenon Today s Discussion If you only remember four things 1 Intensifying business challenges coupled with an explosion in data have pushed
DEMYSTIFYING BIG DATA. What it is, what it isn t, and what it can do for you.
DEMYSTIFYING BIG DATA What it is, what it isn t, and what it can do for you. JAMES LUCK BIO James Luck is a Data Scientist with AT&T Consulting. He has 25+ years of experience in data analytics, in addition
Privacy and Cloud Computing for Australian Government Agencies
Privacy and Cloud Computing for Australian Government Agencies Better Practice Guide February 2013 Version 1.1 Introduction Despite common perceptions, cloud computing has the potential to enhance privacy
When HHS Calls, Will Your Plan Be HIPAA Compliant?
When HHS Calls, Will Your Plan Be HIPAA Compliant? Petula Workman, J.D., CEBS Division Vice President Compliance Counsel Gallagher Benefit Services, Inc., Sugar Land, Texas The opinions expressed in this
Risk management systems of responsible entities
Attachment to CP 263: Draft regulatory guide REGULATORY GUIDE 000 Risk management systems of responsible entities July 2016 About this guide This guide is for Australian financial services (AFS) licensees
Privacy Impact Assessment
DECEMBER 20, 2013 Privacy Impact Assessment MARKET ANALYSIS OF ADMINISTRATIVE DATA UNDER RESEARCH AUTHORITIES Contact Point: Claire Stapleton Chief Privacy Officer 1700 G Street, NW Washington, DC 20552
Transforming Insurance Risk Assessment with Big Data: Choosing the Best Path
Insurance the way we see it Transforming Insurance Risk Assessment with Big Data: Choosing the Best Path Table of Contents Introduction 3 1. The Big Data Benefits for Risk Assessment 4 2. The Roadblocks
Ausgrid Privacy Policy
Ausgrid Privacy Policy Ausgrid is responsible for the safe and reliable supply of electricity to homes and businesses throughout Sydney, the Hunter and the Central Coast. Its network is made up of more
PRIVACY POLICY. I. Introduction. II. Information We Collect
PRIVACY POLICY school2life, Inc. ( school2life ) Privacy Policy is designed to provide clarity about the information we collect and how we use it to provide a better social gaming experience. By accepting
A New Era Of Analytic
Penang egovernment Seminar 2014 A New Era Of Analytic Megat Anuar Idris Head, Project Delivery, Business Analytics & Big Data Agenda Overview of Big Data Case Studies on Big Data Big Data Technology Readiness
Real-Time Analytics on Large Datasets: Predictive Models for Online Targeted Advertising
Real-Time Analytics on Large Datasets: Predictive Models for Online Targeted Advertising Open Data Partners and AdReady April 2012 1 Executive Summary AdReady is working to develop and deploy sophisticated
Hit ratios are still very low for Security & Privacy coverage: What are companies waiting for?
Hit ratios are still very low for Security & Privacy coverage: What are companies waiting for? Authored by Neeraj Sahni and Tim Stapleton Neeraj Sahni is Director, Insurance Channel at Kroll Cyber Investigations
SURVEILLANCE AND PRIVACY
info sheet 03.12 SURVEILLANCE AND PRIVACY Info Sheet 03.12 March 2012 This Information Sheet applies to Victorian state and local government organisations that are bound by the Information Privacy Act
Commonwealth of Pennsylvania Department of Banking and Securities Bureau of Securities Division of Licensing, Compliance and Examinations
Commonwealth of Pennsylvania Department of Banking and Securities Bureau of Securities Division of Licensing, Compliance and Examinations Investment Adviser Self-Inspection Checklist November 2015 Investment
Opportunities with Predictive Analytics. Greg Leflar, Vice President [email protected]
Opportunities with Predictive Analytics Greg Leflar, Vice President [email protected] Opportunities for Predictive Analytics We help you separate the Value from the Hype The field of predictive
RSA Adaptive Authentication For ecommerce
RSA Adaptive Authentication For ecommerce Risk-based 3D Secure for Credit Card Issuers SOLUTION BRIEF RSA FRAUD & RISK INTELLIGENCE The Threat of ecommerce Fraud ecommerce fraud is a threat to both issuers
SecTor 2009 October 6, 2009. Tracy Ann Kosa
SecTor 2009 October 6, 2009 Tracy Ann Kosa Privacy versus Security Un enforced Privacy Privacy Requirements that Work People Process Technology Territorial Privacy Setting boundaries on intrusion into
WHITE PAPER SPLUNK SOFTWARE AS A SIEM
SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to operate security operations centers (SOC) of any size (large, med, small)
Industry insight into FCRA-compliance and its benefits to healthcare organizations.
White Paper Industry insight into FCRA-compliance and its benefits to healthcare organizations. April 2012 LexisNexis Health Care Credentialing Excellent Certification in License to Practice, Malpractice
Data Protection Act. Conducting privacy impact assessments code of practice
Data Protection Act Conducting privacy impact assessments code of practice 1 Conducting privacy impact assessments code of practice Data Protection Act Contents Information Commissioner s foreword... 3
Align Technology. Data Protection Binding Corporate Rules Controller Policy. 2014 Align Technology, Inc. All rights reserved.
Align Technology Data Protection Binding Corporate Rules Controller Policy Contents INTRODUCTION 3 PART I: BACKGROUND AND ACTIONS 4 PART II: CONTROLLER OBLIGATIONS 6 PART III: APPENDICES 13 2 P a g e INTRODUCTION
Generally Accepted Recordkeeping Principles How Does Your Program Measure Up?
Generally Accepted Recordkeeping Principles How Does Your Program Measure Up? GARP Overview Creation Purpose GARP Overview Creation About ARMA International and the Generally Accepted Recordkeeping Principles
Verified Volunteers. A division of SterlingBackcheck. Privacy Policy. Last Updated: November 5, 2014
1 Verified Volunteers A division of SterlingBackcheck Privacy Policy Last Updated: November 5, 2014 Verified Volunteers, a division of Sterling Backcheck ( Company, we, us, or our ) provide this Privacy
technical factsheet 176
technical factsheet 176 Data Protection CONTENTS 1. Introduction 1 2. Register with the Information Commissioner s Office 1 3. Period protection rights and duties remain effective 2 4. The data protection
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential
