Insights on commercial use of data
|
|
|
- Stanley Greer
- 10 years ago
- Views:
Transcription
1
2 Insights on commercial use of data Deloitte s Privacy with a view II 13 November 2014, OCEANDIVA Amsterdam Rence Damming Privacy Officer
3 About me Occupation: Privacy Officer of, since April 1st 2011 Works in Telecommunications for almost 15 years Studied Economics, started career as music professional Experienced on: Data protection, Legislation, Contract management, Legal Interception and Security Past jobs include: Head of Security Telfort, Manager Legal Intercept, IT Project Manager and various positions in Customer Operations
4 Roadmap for today - Big Data opportunities - Experiences & restrictions - Conclusions
5 Big Data: everybody s talking about it
6 What do you mean commercial use of data??
7 In the last years we gained some new insights on the way personal data should be processed 6
8 The search for opportunity 7
9 We prefer trust over short time benefits. 8
10 : Guide in big data as a business - And yes, we are cautious. Determine course, positioning & risks Ophalen Opslaan Transporteren Ontsluiting / Presentatie Verrijken gather store transport present Enrich? Want to know more? Feel free to contact: [email protected]
11 10
12 and Big Data positioning Big Data analyses for data improvement and effictively deliver our services Big Data for value added services (creating new business) Big Data Consulting Data with consent and aggregated for billing and network management Only with customer s explicit permission given at forehand Helping our (business) customers with solutions and maintaining trust
13 Big Data Mission Statement: It s all about permission and clarity All (internal and external) big data initiatives will be assessed and must comply to the strict rules and principles provided in our mission statement: Everything you do with customer data could affect customer privacy All data processed and gathered from our core services can only be used for other purposes with explicit, clear approval from the data-subject Approval is only valid when (1) explicitly given (2) in advance by the datasubject based on (3) a clear explanation by the data-controller (company) about the (4) specific purpose for which the data will be used. Data-subject s approval can be withdrawn at any time
14 and Big Data: Building Trust Trust = Reliability +Delight.
15 Building Trust: Delight? New Privacy Officer (work in progress)
16 Building Trust: Reliability?
17 Is correlatable data anonymous? Is it possible to single-out one person? Could lead to mistrust
18 Communicate internally! Make your employees aware of where to put their ideas to maintain trust All ideas on the big data subject can be sent to the Taskforce Big Data Through: All ideas on sales, propositions on technical infrastructure can be sent to: All questions on privacy and our company strategy, can be sent to:
19 and Big Data: Building Trust Our Strategy Breaking down our privacy strategy: Clarity, reliability and choice
20 Appendix
21 Big Data and Telecommunications Golden Rules for Processing Telco (traffic) Data Following presentation created by: Marloes Koppelaars-Stubbe 2014, HQ, Den Haag 20
22 Golden Rules We have captured recent insights gained from supervisory authorities in a set of Golden Rules 21
23 Golden Rule 1: Everything you do with customer data could affect customer privacy It doesn t matter if you actually use or look at data or not (example: traffic filtering through spam filter is processing of customer data) It is not relevant whether or not the individual can be recognized. As soon as data is correlated with a unique identity (this can be an encrypted number) privacy is at stake. 22
24 Golden Rule 2: Anonimised data is not personal data and can be freely used For Telco s and the processing of location related information, Data is considered anonimised when BOTH of the following conditions are met: It is impossible to trace the data to an individual. The anonimization is irreversible It has become impossible to distinguish one person from another. (if you encrypt, don t use the same key over a longer period, 24h seems to be the absolute maximum) Anonimization can take place on network element level or on customer profiles (segmentation) Chinese walls are not considered a means to anonimise. Be aware of indirect recognition. 23
25 Golden Rule 3: Do not collect more customer data or store data longer than required Never collect more data than is strictly needed to fullfil the purpose of the intended activities. Always minimize the amount of data needed. Never store data longer than is strictly needed to fullfil the purpose of the intended activities. Always minimize the amount of time needed. (example: don t store data for 30 days if one day storage could be enough) 24
26 Golden Rule 4: Use traffic and content data only for marketing or analytics with explicit approval of the customer r Without explicit approval traffic data may only be used for: The provision of telecommunication services: billing and invoicing payment of granted access, traffic control processing of service requests on behalf of the customer, fraude detection execution of a regulatory activity or court order. Without explicit approval content data may only be used for: If required to: preserve the integrity and the security of the networks to safeguard the quality of services rendered to the customer to transfer information via the networks and services of the customer to execute a regulatory activity or court order. 25
27 Golden Rule 5: Approval of the customer is only valid if it is (1) based on detail information, (2) given explicitly and (3) given beforehand 26
Connected car, big data, big brother?
Connected car, big data, big brother? Using geolocation in a trustworthy and compliant way [email protected] Trends that threaten trust 2 Connected cars with downloadable apps Location services, cloud,
ESOMAR PRACTICAL GUIDE ON COOKIES JULY 2012
ESOMAR PRACTICAL GUIDE ON COOKIES JULY 2012 Copyright ESOMAR 2012 TABLE OF CONTENTS 2 Objectives 2 Introduction 3 Definitions 4 SECTION 1: APPLICABLE LAW 4 SECTION 2: WHAT YOU NEED TO KNOW SOME FAQs 5
APPMACHINE MOBILE PRIVACY STATEMENT. Version, May 29, 2015
APPMACHINE MOBILE PRIVACY STATEMENT Version, May 29, 2015 The privacy of all of our Users is very important to AppMachine and the AppMachine App-builders (hereto referred to as App-owner). When you, as
ESTRO PRIVACY AND DATA SECURITY NOTICE
ESTRO PRIVACY AND DATA SECURITY NOTICE This Data Privacy and Security Policy is a dynamic document, which will reflect our continuing vigilance to properly handle and secure information that we are trusted
South Australia Police POSITION INFORMATION DOCUMENT
South Australia Police POSITION INFORMATION DOCUMENT Stream : Administrative Services Career Group : Financial Related Discipline : Financial Services Classification : ASO-6 Service : Crime Service Position
We will not collect, use or disclose your personal information without your consent, except where required or permitted by law.
HSBC Privacy Notice HSBC's Privacy Principles HSBC Bank Canada is a subsidiary of HSBC Holdings plc which, together with its subsidiaries and affiliates, is one of the world s largest banking and financial
INERTIA ETHICS MANUAL
SEVENTH FRAMEWORK PROGRAMME Smart Energy Grids Project Title: Integrating Active, Flexible and Responsive Tertiary INERTIA Grant Agreement No: 318216 Collaborative Project INERTIA ETHICS MANUAL Responsible
Maximum Global Business Online Privacy Statement
Maximum Global Business Online Privacy Statement Last Updated: June 24, 2008. Maximum Global Business is committed to protecting your privacy. Please read the Maximum Global Business Online Privacy Statement
Protecting your privacy
Protecting your privacy Table of Contents Answering your questions about privacy Your privacy... 1 Your consent... 1 Answering your questions about privacy... 2 About cookies... 9 Behavioural Advertising/Online
We ask that you contact our Privacy Officer in the event you have any questions or concerns regarding this Code or its implementation.
PRIVACY AND ANTI-SPAM CODE FOR OUR DENTAL OFFICE Please refer to Appendix A for a glossary of defined terms. INTRODUCTION The Personal Health Information Act (PHIA) came into effect on December 11, 1997,
Iowa Student Loan Online Privacy Statement
Iowa Student Loan Online Privacy Statement Revision date: Jan.6, 2014 Iowa Student Loan Liquidity Corporation ("Iowa Student Loan") understands that you are concerned about the privacy and security of
At Cambrian, Your Privacy is Our Priority. Regardless of how you deal with us on the phone, online, or in person we have strict security measures
Privacy Policy At Cambrian, Your Privacy is Our Priority At Cambrian Credit Union, we know our members are concerned about the confidentiality and security of their personal information. This Policy ensures
South Australia Police POSITION INFORMATION DOCUMENT
South Australia Police POSITION INFORMATION DOCUMENT Stream : Administrative Services Career Group : Financial Related Discipline : Financial Services Classification : ASO-7 Service : Crime Service Position
AlixPartners, LLP. General Data Protection Statement
AlixPartners, LLP General Data Protection Statement GENERAL DATA PROTECTION STATEMENT 1. INTRODUCTION 1.1 AlixPartners, LLP ( AlixPartners ) is committed to fulfilling its obligations under the data protection
Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012
Monitoring and Logging Policy Document Status Security Classification Version 1.0 Level 1 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Change History
DATA ANALYTICS@DT. Dr. Jan Krancke, VP Regulatory Strategy & Projects CERRE Expert Workshop, Brussels. re3rerererewr
DATA ANALYTICS@DT Dr. Jan Krancke, VP Regulatory Strategy & Projects CERRE Expert Workshop, Brussels re3rerererewr SMART DATA MARKET SMART DATA BENEFITS ECONOMY AS A WHOLE Use Case Spectrum Enterprise
M&T BANK CANADIAN PRIVACY POLICY
M&T BANK CANADIAN PRIVACY POLICY At M&T Bank, we are committed to safeguarding your personal information and maintaining your privacy. This has always been a priority for us and this is why M&T Bank (
This TEPL Data Protection Policy is effective from 2 July 2014. Updated on 31 Jul 2015
Telecom Equipment Pte Ltd ( TEPL ) Data Protection Policy Dash is a mobile money service created by Singtel and Standard Chartered. Payment services are provided by Telecom Equipment Pte Ltd ( TEPL ) and
3Degrees Group, Inc. Privacy Policy
3Degrees Group, Inc. Privacy Policy Your privacy is important to 3Degrees Group, Inc. ( 3Degrees ). The following Privacy Policy discloses the information practices followed by 3Degrees with respect to
DARTFISH PRIVACY POLICY
OUR COMMITMENT TO PRIVACY DARTFISH PRIVACY POLICY Our Privacy Policy was developed as an extension of our commitment to combine the highestquality products and services with the highest level of integrity
Trusted Personal Data Management A User-Centric Approach
GRUPPO TELECOM ITALIA Future Cloud Seminar Oulu, August 13th 2014 A User-Centric Approach SKIL Lab, Trento - Italy Why are we talking about #privacy and #personaldata today? 3 Our data footprint Every
DailyMailz may collect and process the following personal information about you:
Privacy Policy DailyMailz is committed to preserving the privacy of all visitors to its website www.dailymailz.nl ("Website"). This privacy policy along with DailyMailz s terms and conditions of use and
STATUTORY INSTRUMENTS. S.I. No. 336 of 2011
STATUTORY INSTRUMENTS. S.I. No. 336 of 2011 EUROPEAN COMMUNITIES (ELECTRONIC COMMUNICATIONS NETWORKS AND SERVICES) (PRIVACY AND ELECTRONIC COMMUNICATIONS) REGULATIONS 2011 (Prn. A11/1165) 2 [336] S.I.
What Personally Identifiable Information does EducationDynamics collect?
EducationDynamics, LLC GradSchools.com Privacy Policy Thank you for visiting GradSchools.com (hereinafter referred to as the Site ), which is owned and/or operated, in whole or in part, by EducationDynamics,
SAP Splash Privacy Statement
SAP Splash Privacy Statement The SAP Splash Privacy Statement (this Privacy Statement ) applies to the use of this website, http://www.experiencesplash.com (the Website ) and any other subdomains or webpages
Optum Website Privacy Policy
Optum Website Privacy Policy 1 Privacy Website Privacy Policy Introduction We recognize that the privacy of your personal information is important. The purpose of this policy is to let you know how we
TargetingMantra Privacy Policy
Last Updated August 15 th, 2013 TargetingMantra Privacy Policy TargetingMantra allows its customers, to provide personalization widgets to their users (collectively, the TargetingMantra Service ). The
Declaration of Internet Rights Preamble
Declaration of Internet Rights Preamble The Internet has played a decisive role in redefining public and private space, structuring relationships between people and between people and institutions. It
WEBSITE PRIVACY POLICY. Last modified 10/20/11
WEBSITE PRIVACY POLICY Last modified 10/20/11 1. Introduction 1.1 Questions. This website is owned and operated by. If you have any questions or concerns about our Privacy Policy, feel free to email us
UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005
UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The
European Commission Per email: [email protected]
Post Bits of Freedom Bank 55 47 06 512 M +31(0)646282693 Postbus 10746 KvK 34 12 12 86 E [email protected] 1001 ES Amsterdam W https://www.bof.nl European Commission Per email: [email protected]
EUROPEAN UNION. Brussels, 12 July 2002 (OR. en) PE-CONS 3636/02 2000/0189 (COD) LEX 365 ECO 217 CODEC 778
EUROPEAN UNION THE EUROPEAN PARLIAMT THE COUNCIL Brussels, 12 July 2002 (OR. en) 2000/0189 (COD) LEX 365 PE-CONS 3636/02 ECO 217 CODEC 778 DIRECTIVE 2002/58/EC OF THE EUROPEAN PARLIAMT AND OF THE COUNCIL
E-PRIVACY DIRECTIVE: Personal Data Breach Notification
E-PRIVACY DIRECTIVE: Personal Data Breach Notification PUBLIC CONSULTATION BEUC Response Contact: Kostas Rossoglou [email protected] Ref.: X/2011/092-13/09/11 EC register for interest representatives: identification
By using our website, you agree that we can place these types of cookies on your device.
COOKIE NOTICE: We may employ cookie technology, web beacons, transparent GIF images, and similar devices to facilitate website administration and navigation, to better understand and improve the effectiveness
INCREASING PRODUCTIVITY. By Implementing A Non-Invasive Employee Surveillance Solution
INCREASING PRODUCTIVITY By Implementing A Non-Invasive Employee Surveillance Solution Introduction 3 Employee Monitoring 3 How It Works 4 Employee Activity 5 Internet Activity 5 Applications Used 5 Overtime
SECURITY MEASURES IN THE PERSONAL DATA PROTECTION RULES: TECHNOLOGICAL SOLUTIONS AND LEGAL ADAPTATION
SECURITY MEASURES IN THE PERSONAL DATA PROTECTION RULES: TECHNOLOGICAL SOLUTIONS AND LEGAL ADAPTATION Antonia Paniza-Fullana Civil Law University of Balearic Islands Abstract. Several practical issues
Recommendations for companies planning to use Cloud computing services
Recommendations for companies planning to use Cloud computing services From a legal standpoint, CNIL finds that Cloud computing raises a number of difficulties with regard to compliance with the legislation
Privacy Impact Assessment of Automated Loan Examination Review Tool
Privacy Impact Assessment of Automated Loan Examination Review Tool Program or application name: Automated Loan Examination Review Tool (ALERT) System Owner: Board of Governors of the Federal Reserve System
Privacy & Big Data: Enable Big Data Analytics with Privacy by Design. Datenschutz-Vereinigung von Luxemburg Ronald Koorn DRAFT VERSION 8 March 2014
Privacy & Big Data: Enable Big Data Analytics with Privacy by Design Datenschutz-Vereinigung von Luxemburg Ronald Koorn DRAFT VERSION 8 March 2014 Agenda? What is 'Big Data'? Privacy Implications Privacy
Green Pharm is committed to your privacy. We disclose our information practices below and we agree to notify you of:
Privacy Policy is committed to your privacy. We disclose our information practices below and we agree to notify you of: 1. What personally identifiable information of yours or third party personally identification
DRAFT BILL PROPOSITION
DRAFT BILL PROPOSITION Establishes principles, guarantees, rights and obligations related to the use of the Internet in Brazil. THE NATIONAL CONGRESS decrees: CHAPTER I PRELIMINAR PROVISIONS Article 1.
Big data The three-minute guide
Big data The three-minute guide Don t squint. Select the full-screen option to view at full size. Big Data The three-minute guide 1 2 What is big data? It s about insight Big data generally refers to datasets
PREPLY PRIVACY POLICY
PREPLY PRIVACY POLICY Effective Date: November 21, 2012. Welcome to Preply! This Privacy Policy discloses FindGuru, Inc. s ( Preply, we, us or our ) privacy practices and procedures in connection with
Bodywhys Privacy Policy
Bodywhys Privacy Policy Website Bodywhys respects the privacy of all visitors to our website. This website privacy statement outlines our policy concerning the use and collection of personal information
07/2013. Specific Terms and Conditions Mobile Device Management
07/2013 Specific Terms and Conditions Mobile Device Management GENERAL PROVISIONS 1. Offer and Agreement 1.1 The present contractual terms and conditions (hereinafter referred to as Terms and Conditions
Vyve Broadband Website Privacy Policy. What Information About Me Is Collected and Stored?
Vyve Broadband Website Privacy Policy Effective: July 31, 2015 Vyve Broadband ( Vyve, we, us, our ) is committed to letting you know how we will collect and use your information. This Website Privacy Policy
UNILEVER PRIVACY PRINCIPLES UNILEVER PRIVACY POLICY
UNILEVER PRIVACY PRINCIPLES Unilever takes privacy seriously. The following five principles underpin our approach to respecting your privacy: 1. We value the trust that you place in us by giving us your
GSA s Digital Analytics Program and FTC
Federal Trade Commission Privacy Impact Assessment Google Analytics Through GSA s Digital Analytics Program June 2014 1 SECTION 1.0 SPECIFIC PURPOSE OF THE FTC S PARTICIPATION IN GSA s DIGITAL ANALYTICS
RPM INTERNATIONAL INC. AND ITS SUBSIDIARIES AND OPERATING COMPANIES SAFE HARBOR PRIVACY NOTICE. EFFECTIVE AS OF: August 12, 2015
RPM INTERNATIONAL INC. AND ITS SUBSIDIARIES AND OPERATING COMPANIES SAFE HARBOR PRIVACY NOTICE EFFECTIVE AS OF: August 12, 2015 This Notice sets forth the principles followed by RPM International Inc.,
privacy and credit reporting policy.
privacy and credit reporting policy. ME, we, us or our refers to Members Equity Bank Ltd and its subsidiary ME Portfolio Management Ltd. about ME Every Australian deserves to get the most out of their
Risk Management of Outsourced Technology Services. November 28, 2000
Risk Management of Outsourced Technology Services November 28, 2000 Purpose and Background This statement focuses on the risk management process of identifying, measuring, monitoring, and controlling the
RezScore SM Privacy Policy
RezScore SM Privacy Policy Last updated: August 19, 2011 Thank you for using RezScore.com. We are committed to protecting your privacy and, for that reason, we have adopted this Privacy Policy to memorialize
Privacy Policy. Federal Insurance Company, Singapore Branch Singapore Personal Data Protection Privacy Policy. 1. Introduction
Privacy Policy 1. Introduction Federal Insurance Company, Singapore Branch ( we, our or us ) recognise the importance of protecting the privacy and the rights of individuals in relation to their personal
IDT Financial Services Limited. Prime Card Privacy Policy
IDT Financial Services Limited Prime Card Privacy Policy Effective and Updated April 7, 2014 General IDT Financial Services Limited and its affiliates ( IDT, us, we, our ) are committed to protecting the
Quorum Privacy Policy
Quorum Privacy Policy Quorum Analytics Inc. ( Quorum") has created this website (the "Website" or the "Site") to provide an online analytical tool that Subscribers can use to generate Derived Analytics
DATA PROTECTION IN DIRECT MARKETING
Document 1.1.2-1 DATA PROTECTION IN DIRECT MARKETING analysis of the legislation in direct marketing Component 1 Activity 1.1.2 Final version The content of this report is the sole responsibility of Human
Privacy Policy. Introduction. Scope of Privacy Policy. 1. Definitions
Privacy Policy Introduction This Privacy Policy explains what information TORO Limited and its related entities ("TORO") collect about you and why, what we do with that information, how we share it, and
-«Trustee Authority»: Entity that defines and regulates the conditions of assignment and use of Domain Names, applying to each particular Extension.
NETIM - GENERAL TERMS AND CONDITIONS OF DOMAIN NAMES CG-ND version 2.1-15 th November 2015 NETIM, limited liability company under french law, with head office located 165 avenue de bretagne 59000 LILLE
Behavioral Targeting Legal Developments in Europe and the Netherlands
1 Behavioral Targeting Legal Developments in Europe and the Netherlands Frederik Zuiderveen Borgesius Ph.D researcher, focusing on behavioral targeting and privacy law Institute for Information Law, University
Privacy policy. 1. Collecting Information We may collect Personal Data about you from a number of sources, including the following:
Privacy policy Protecting your personal details on our website. Last updated: 13 June 2013 Hartleys Skip Hire (registered number 01033645), whose registered office is at Draycott Cross Road Brookhouse
2. Scope 2.1 This policy covers all the activities and processes of the University that uses personal information in whatever format.
University of Westminster Personal Data Protection Policy For Compliance with the Data Protection Act 1998 1. Background 1.1 The Data Protection Act 1998 (DPA) defines personal data as data and information
Big Data, Big Risk, Big Rewards. Hussein Syed
Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data
Statement of responsibilities of auditors and audited small bodies
Statement of responsibilities of auditors and audited small bodies The Audit Commission is a public corporation set up in 1983 to protect the public purse. The Commission appoints auditors to councils,
Click here for Explanatory Memorandum
Click here for Explanatory Memorandum AN BILLE CUMARSÁIDE (SONRAÍ A CHOIMEÁD) 2009 COMMUNICATIONS (RETENTION OF DATA) BILL 2009 Section 1. Interpretation. Mar a tionscnaíodh As initiated ARRANGEMENT OF
AdvancedMD Online Privacy Statement
AdvancedMD Online Privacy Statement Effective date: September 1, 2015 This Privacy Statement explains how AdvancedMD uses and discloses personal information that we collect from people who visit our websites
Number 3 of 2011 COMMUNICATIONS (RETENTION OF DATA) ACT 2011 ARRANGEMENT OF SECTIONS
Number 3 of 2011 COMMUNICATIONS (RETENTION OF DATA) ACT 2011 ARRANGEMENT OF SECTIONS Section 1. Interpretation. 2. Non-application of Act. 3. Obligation to retain data. 4. Data security. 5. Access to data.
Privacy Impact Assessment
MAY 24, 2012 Privacy Impact Assessment matters management system Contact Point: Claire Stapleton Chief Privacy Officer 1700 G Street, NW Washington, DC 20552 202-435-7220 [email protected] DOCUMENT
NorthStar Alarm Services. Website Privacy Policy
NorthStar Alarm Services Website Privacy Policy NorthStar Alarm Services ( NorthStar ) values your privacy. To that end, we strive to provide a safe, secure online user experience for you. In this Privacy
Code of Practice on Data Protection for the Insurance Sector
Code of Practice on Data Protection for the Insurance Sector (Approved by the Data Protection Commissioner under Section 13 (2) of the Data Protection Acts, 1988 and 2003) Forward I am very happy to be
Information Governance Framework. June 2015
Information Governance Framework June 2015 Information Security Framework Janice McNay June 2015 1 Company Thirteen Group Lead Manager Janice McNay Date of Final Draft and Version Number June 2015 Review
ELECTRONIC TRADING FACILITIES SUPPLEMENTAL TERMS AND CONDITIONS OF TRADING
ELECTRONIC TRADING FACILITIES SUPPLEMENTAL TERMS AND CONDITIONS OF TRADING This Supplemental Terms and Conditions of Trading is supplemental to and forms part of the terms and conditions set out in the
We use such personal information collected through this Site for the purposes of:
PRIVACY POLICY Your privacy is important to Us. We treat it, and any information that you give to Us, with as much care as possible. Please read the following policy to understand what We do with your
Comeet Privacy Policy
Comeet Privacy Policy Comeet Technologies Inc. ( Comeet or us, our, we ) provides a solution for the management of the information and interviewing of candidates for employment (the Solution ). Comeet
HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT OF 1996 HIPAA
TRAINING MANUAL HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT OF 1996 HIPAA Table of Contents INTRODUCTION 3 What is HIPAA? Privacy Security Transactions and Code Sets What is covered ADMINISTRATIVE
