Lunch & Learn: Big Data Analytics
|
|
- Stanley Pierce
- 8 years ago
- Views:
Transcription
1 Lunch & Learn: Big Data Analytics 13 April 2015 Sue McLean Alex van der Wolk 2015 Morrison & Foerster (UK) LLP All Rights Reserved mofo.com
2 Lunch & Learn 2 nd Monday of each month 45 minutes via webinar Unaccredited CPD points Next session: Monday, 11 May 2015 EU Antitrust Law - Recent Highlights and Current Trends Speakers: Tom McQuail and Andreas Gruenwald 2
3 Today Questions at the end. Or by afterwards. Phones are muted to reduce background noise We ll unmute at the end 3
4 Overview 1. Where are we with Big Data and what does it mean for business? 2. Data privacy issues raised by Big Data 3. Other issues raised by Big Data 4. Practice tips 5. Q/A 4
5 What is Big Data? IBM: 90% of the digital data that exists today created in last 2 yrs Big Data is just data just more of it and we can do more with it! Gartner: 80% of all corporate data is unstructured 5
6 Big Data Benefits Many potential benefits: better understanding of business & customers help companies forecast help companies make better decisions inform business strategy help tailor products drive productivity, savings and efficiencies improve agility grow existing business create new revenue streams deliver competitive advantage But also challenges 6
7 Big Data and the EU EU is aware of the economic potential of Big Data EU s Big Data Strategy: accelerated innovation productivity growth increased competitiveness in data across EU and global market with Europe as key player. Joint investment by EU and data industry of EUR 2.5 billion EUR 500 million to come from EU Individual countries are also focusing on big data e.g., UK has ambitions to be world leader (initiatives include creation of 42million Turing Institute for Data Science, 231million investment) 7
8 The European Framework Data Protection Directive 95/46/EC WP29 Opinion on Purpose Limitation WP29 Opinion on Anonymisation WP29 Opinion on Legitimate Interest Country-Specific Guidance 8
9 Directive - Basic Principles Personal data may be collected if there is a ground, such as legitimate interest or consent Purpose limitation Personal data must be collected for specific, explicit and legitimate purposes and Not be further processed in a way incompatible with those purposes Personal data must be adequate, relevant and not excessive in relation to the purposes for which collected and/or further processed 9
10 Article 29 Working Party Statement on impact of Big Data on privacy of individuals (September 2014) Individuals should also benefit from Big Data Current data protection principles (notably the Directive) need to be complied with WP Opinions on Purpose Limitation, Legitimate Interest and Anonymisation apply 10
11 WP29 Opinion on Legitimate Interest Often overlooked Opinion in context of Big Data WP29: consent is not always suitable and in some cases legitimate interest ground may be better suited "An appropriate assessment of the balance under Article 7(f), often with an opportunity to opt-out of the processing, may in some cases be a valid alternative to inappropriate use of, for instance, the ground of 'consent' or necessary for the performance of a contract" 11
12 Legitimate Interest Take into account number of factors Interest of data controller Privacy impact of individual Nature of data Status of data controller Nature of relationship with data controller Interest is not only cost but also benefit is otherwise in the public interest, or benefits from social, cultural or legal/regulatory recognition in the community concerned Balancing test is contextual (reasonable expectations of data subject) 12
13 Legitimate Interest If outcome of balancing test is in favour of individual: apply mitigating measures, e.g. Data minimisation Anonymisation / pseudonymisation (note: Opinion on Anonymisation) Enhanced control (e.g. dashboard) instead of access Transparency for choices made (+ document choices) Functional separation DPIA: "data subject is entitled to have all categories of interests to be taken into account and weighed against those of the controller or third party" (also ethical considerations) If outcome cannot be balanced: consent 13
14 Purpose Limitation and Secondary Use Specific Explicit Legitimate If dataset was not originally acquired (also) for the purpose of Big Data analytics: question of compatibility Compatibility must be assessed on case-by-case basis New purpose not automatically incompatible 14
15 ICO Guidance Transparency Big Data is not a game Condition for processing played by different rules Using third party data sets Purpose limitation Anonymisation Minimisation and Retention of Data Security Ethical Approach 15
16 Looking Ahead - Regulation Draft Regulation will impact use of big data analytics EU politicians voicing stronger opinions Big data needs big rights Profiling Regulation contains definition on Profiling If has legal effects/or significantly affects rights and interests permitted only with explicit consent Some flexibility for processing pseudonymous data but only if identification impossible Human intervention needed for decisions affecting individuals Restrictions on profiling special categories of data (e.g. sensitive data, data of children, etc.) 16
17 The Creep Factor Just because you can do it, doesn t mean you should! 17
18 Privacy as differentiator Privacy by design is not zero sum game 18
19 Not just a privacy issue! For example: Compliance with applicable laws & regulation Intellectual Property Rights Third Party Data Cyber-security Liability Competition 19
20 Compliance with laws & regulation Industryspecific Consumer Protection Employment 20
21 Intellectual Property Rights Who owns the IPR in the data? IPRs Copyright Database right Moral rights Trade marks Trade secrets, confidential information Data Sources Proprietary data Open data Big data analytics involves copying and processing data Key question: Are your ownership & license rights wide enough to cover the intended use? 21
22 Third Party Data Third party licensed data Open data Web scraping IPR infringement Breach of website terms and conditions Breach of applicable law e.g. CMA Ryanair v PR Aviation BV 22
23 Cyber-security Not just privacy issue confidential information / trade secrets / systems Analytics - increased reliance on external hosting/cloud computing solutions and third party service providers Treat cyber risks as strategic business risks Good practice, e.g.: Risk assessment and governance Employees Security by design Testing Insurance Third party providers 23
24 Liability Do not be seduced by Big Data s false charms! Liability risks if the data provided is erroneous/unreliable Reliability of raw data or results Correlation v causation Google Flu Trends Still needs to be regulated by humans Third party data back to back liability may be limited protection Insurance 24
25 Competition Risks Companies that are data rich acquiring other data rich companies could trigger merger control/abuse of dominant position concerns Google & DoubleClick, Facebook & WhatsApp Company holds data that other companies need and company is asked to provide third party access to that data EDPS 2014 report on "the interplay between data protection, competition law and consumer protection in the digital economy UK - CMA Call for Information The Commercial Use of Consumer Data 25
26 Managing Big Data Projects 26
27 Practice Tips (1) Start with the basics: what is the aim of the project what is the business issue the data will help solve? what data do we need for the project? is the data personal data? where is the data stored or processed? what rights do we have to process the data? Data Lifecycle Third party players Qualified resources Consider legal compliance from day 1 27
28 Practice Tips (2) Consider whether you need to use personal data at all, or whether you could use anonymised data Are you using analytics to identify general trends or make decisions that affect individuals? Identify and manage responsibilities If using data sets obtained from third parties, check the source and integrity Ensure appropriate contractual arrangements with third parties Ensure legal basis Demonstrate that collection is necessary to achieve purposes and that least privacy-intrusive methods are used Consider whether analysis is possible based on legitimate interest or whether consent needs to be sought 28
29 Practice Tips (3) If re-purposing consider whether the new purpose is incompatible with the original purpose or whether new consent is required Be specific Explain purposes, implications and benefits Avoid descriptions that are too vague or too general Break down general purposes Provide granular information to ensure all of the different purposes are sufficiently clear Include more details where purposes cannot be clearly derived from context Use layered notices Present information in a concise and user-friendly manner, while more detailed information should be accessible via links 29
30 Practice Tips (4) Be mindful of the non-privacy risks and issues too! Consider relevant law & regulation Ensure that you own the data or have the rights you need Have appropriate third party protections in place Address the cyber-security risks Beware the dictatorship of data Identify where analytics activity is happening Create a Big Data policy/checklist and training 30
31 Any questions? 31
32 Contacts Alex van der Wolk Partner, Berlin Susan McLean Of Counsel, London uk.linkedin.com/in/suemcleanmofo/ 32
Lunch & Learn: Legal Issues For Mobile Apps 09 June 2014 Presented By Chris Coulter
Lunch & Learn: Legal Issues For Mobile Apps 09 June 2014 Presented By Chris Coulter 2014 Morrison & Foerster (UK) LLP All Rights Reserved mofo.com Lunch & Learn 2 nd Monday of each month 45 minutes via
More informationThe U.K. Information Commissioner s Office Report on Big Data and Data Protection
reau of National Affairs, Inc. (800-372-1033) http://www.bna.com WORLD DATA PROTECTION REPORT >>> News and analysis of data protection developments around the world. For the latest updates, visit www.bna.com
More informationContract Law Highlights of 2014
Lunch & Learn 2014 Christmas Special 246660 Contract Law Highlights of 2014 8 December 2014 Alistair Maughan, Sue McLean, Amy Collins 2014 Morrison & Foerster (UK) LLP All Rights Reserved mofo.com Lunch
More informationObservations on international efforts to develop frameworks to enhance privacy while realising big data s benefits
Big Data, Key Challenges: Privacy Protection & Cooperation Observations on international efforts to develop frameworks to enhance privacy while realising big data s benefits Seminar arranged by the Office
More informationMulti-Jurisdictional Study: Cloud Computing Legal Requirements. Julien Debussche Associate January 2015
Multi-Jurisdictional Study: Cloud Computing Legal Requirements Julien Debussche Associate January 2015 Content 1. General Legal Framework 2. Data Protection Legal Framework 3. Security Requirements 4.
More informationUser tracking: Scope and Implementation eprivacy Directive Article 5(3)
User tracking: Scope and Implementation eprivacy Directive Article 5(3) Email Sender & Provider Coalition April 3, 2012 Presented By Karin Retzer 2012 Morrison & Foerster LLP All Rights Reserved mofo.com
More information"Bring Your Own Device" Brings its Own Challenges
6 June 2012 "Bring Your Own Device" Brings its Own Challenges By Susan McLean and Alistair Maughan The consumerisation of IT is the growing trend for information technology to emerge first in the consumer
More informationBIG DATA AND THE INTERNET OF THINGS
BIG DATA AND THE INTERNET OF THINGS 12 September 2013 Robert Bond Partner and Notary Public Janine Regan Solicitor Tughan Thuraisingam Paralegal Our team Speechly Bircham is an ambitious, full-service
More information1. Understanding Big Data
Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview Erik Luysterborg Partner, Deloitte EMEA Data Protection & Privacy leader Prague, SCCE, March 22 nd 2016 1. 2016 Deloitte
More informationPrivacy Challenges in the Internet of Things (IoT) a European Perspective
Privacy Challenges in the Internet of Things (IoT) a European Perspective Alicja Gniewek, PhD Student Interdisciplinary Centre for Security, Reliability and Trust Weicker Building, Université du Luxembourg
More informationAntitrust, Privacy & Big Data Seminar
Antitrust, Privacy & Big Data Seminar Concurrences Law & Economics Seminar Cadwalader, Wickersham & Taft LLP Brussels, Belgium February 3, 2015 Pamela Jones Harbour, SVP & Legal Officer Global Member Compliance
More informationAN INSIDE VIEW FROM THE EU EXPERT GROUP ON CLOUD COMPUTING
AN INSIDE VIEW FROM THE EU EXPERT GROUP ON CLOUD COMPUTING 1. Overview and Background On 27 September 2012, the European Commission adopted a strategy for "Unleashing the potential of cloud computing in
More informationSocial Media Marketing Best Practices
Social Media Marketing Best Practices Distributed at Igniting Opportunities: Measuring and Monetizing Social Media Presented by The Council of PR Firms and The Social Media Society Hosted by Davis & Gilbert
More informationValue of the EU Data Protection Reform against the Big Data challenges. Keynote address 5th European Data Protection Days Berlin, 4.5.
Value of the EU Data Protection Reform against the Big Data challenges Keynote address 5th European Data Protection Days Berlin, 4.5.2015 Giovanni Buttarelli European Data Protection Supervisor (Check
More informationSummary of feedback on Big data and data protection and ICO response
Summary of feedback on Big data and data protection and ICO response Contents Introduction... 2 Question 1... 3 Impacts and benefits; privacy impact assessments (PIAs)... 3 New approaches to data protection...
More informationAMENDMENTS TO THE DRAFT DATA PROTECTION REGULATION PROPOSED BY BITS OF FREEDOM
AMENDMENTS TO THE DRAFT DATA PROTECTION REGULATION PROPOSED BY BITS OF FREEDOM On 25 January 2012, the European Commission published a proposal to reform the European data protection legal regime. One
More informationMitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
More informationlegal & ethical data sharing prof.dr. Ronald Leenes r.e.leenes@uvt.nl TILT - Tilburg Institute for Law, Technology, and Society
legal & ethical data sharing prof.dr. Ronald Leenes r.e.leenes@uvt.nl TILT - Tilburg Institute for Law, Technology, and Society overview the problem revisited secondary use data protection regulation Data
More informationESRC Research Data Policy
ESRC Research Data Policy Introduction... 2 Definitions... 2 ESRC Research Data Policy Principles... 3 Principle 1... 3 Principle 2... 3 Principle 3... 3 Principle 4... 3 Principle 5... 3 Principle 6...
More informationAn open source software project that enables the distributed processing of very large data sets across multiple servers Basically:
Big Data, Fine Print Business and Legal Considerations for Companies Dealing in Data Rachel Tarko Hudson, Technology Transactions Team & Privacy Team Sheppard Mullin Richter & Hampton LLP 2015 What is
More informationLunch & Learn: Direct & Indirect Damages: How the Difference Affects Contract Drafting 12 May 2014 Presented By Alistair Maughan
Lunch & Learn: Direct & Indirect Damages: How the Difference Affects Contract Drafting 12 May 2014 Presented By Alistair Maughan 2012 Morrison & Foerster (UK) LLP All Rights Reserved mofo.com Lunch & Learn
More informationBig Data, Not Big Brother: Best Practices for Data Analytics Peter Leonard Gilbert + Tobin Lawyers
Big Data, Not Big Brother: Best Practices for Data Analytics Peter Leonard Gilbert + Tobin Lawyers March 2013 How Target Knew a High School Girl Was Pregnant Before Her Parents Did just because you can,
More informationDraft Code of Conduct on privacy for mobile health applications
Draft Code of Conduct on privacy for mobile health applications I. About this Code 1) Introduction To be drafted as a last step, when the rest of the Code is more or less stable Ed. 2) Purpose The purpose
More informationTrusted Personal Data Management A User-Centric Approach
GRUPPO TELECOM ITALIA Future Cloud Seminar Oulu, August 13th 2014 A User-Centric Approach SKIL Lab, Trento - Italy Why are we talking about #privacy and #personaldata today? 3 Our data footprint Every
More informationYou re hired! Privacy issues when onboarding new employees. Ann Bevitt, Morrison & Foerster. John Gevertz, ADP. 19 April 2013 Presented By
2012 Morrison & Foerster (UK) LLP All Rights Reserved mofo.com You re hired! Privacy issues when onboarding new employees Ann Bevitt, Morrison & Foerster 19 April 2013 Presented By John Gevertz, ADP Agenda
More informationLegal Aspects of the MonIKA-Project - Privacy meets Cybersecurity
Legal Aspects of the MonIKA-Project - Privacy meets Cybersecurity Sebastian Meissner Security Incident Information Sharing Workshop Berlin, 26.07.2013 Introduction Opening question Privacy & cybersecurity:
More informationLunch & Learn: Recent Challenges for International Technology Companies in China 19 January 2015 Presented By Paul McKenzie and Gordon Milner
Lunch & Learn: Recent Challenges for International Technology Companies in China 19 January 2015 Presented By Paul McKenzie and Gordon Milner mofo.com Lunch & Learn 2 nd Monday of each month 45 minutes
More informationAcquia Comments on EU Recommendations for Data Processing in the Cloud
Acquia Comments on EU Recommendations for Data Processing in the Cloud Executive Summary On July 1, 2012, European Union (EU) data protection regulators provided guidelines for service providers processing
More informationPrivacy & Big Data: Enable Big Data Analytics with Privacy by Design. Datenschutz-Vereinigung von Luxemburg Ronald Koorn DRAFT VERSION 8 March 2014
Privacy & Big Data: Enable Big Data Analytics with Privacy by Design Datenschutz-Vereinigung von Luxemburg Ronald Koorn DRAFT VERSION 8 March 2014 Agenda? What is 'Big Data'? Privacy Implications Privacy
More informationArticle 29 Working Party Issues Opinion on Cloud Computing
Client Alert Global Regulatory Enforcement If you have questions or would like additional information on the material covered in this Alert, please contact one of the authors: Cynthia O Donoghue Partner,
More informationThe Data Protection Landscape. Before and after GDPR: General Data Protection Regulation
The Data Protection Landscape Before and after GDPR: General Data Protection Regulation Data Protection regulations across Europe Current regulations & guidance European Directives 95/46/EC (Data Protection)
More informationTracking Compliance: Data Protection Risks and Remedies for Retail Janine Regan. charlesrussellspeechlys.com
Tracking Compliance: Data Protection Risks and Remedies for Retail Janine Regan charlesrussellspeechlys.com Janine Regan Associate +44 (0)20 7427 6798 janine.regan@crsblaw.com Janine has extensive experience
More informationCloud computing Alessandro Galtieri Pavel Klimov Severin Loeffler
Cloud computing Alessandro Galtieri, Senior Lawyer, Colt Technology Services, London, UK Pavel Klimov, General Counsel EMEA, Unisys, London, UK Severin Loeffler, Assistant General Counsel, Central Eastern
More informationSecuring business data. CNS White Paper. Cloud for Enterprise. Effective Management of Data Security
Securing business data CNS White Paper Cloud for Enterprise Effective Management of Data Security Jeff Finch, Head of Business Development, CNS Mosaic 2nd July 2015 Contents 1 Non-Disclosure Statement...
More informationData Privacy & Security: Essential Questions Every Business Must Ask
Data Privacy & Security: Essential Questions Every Business Must Ask Presented by: Riddell Williams P.S. Riddell Williams P.S. May 6, 2015 #4841-4703-9779 Innocent? 2 Overview 3 basic questions every business
More informationHOW TO HANDLE A WHISTLEBLOWER REPORT IN THE EU
HOW TO HANDLE A WHISTLEBLOWER REPORT IN THE EU 10 April 2014 Monica Salgado Advogada registered with the Portuguese Ordem dos Advogados Registered European Lawyer with the SRA Kirsti Laird Solicitor, (qualified
More informationOpen Scholarship A legal perspective
Open Scholarship A legal perspective Data and computing infrastructures for open scholarship 22 September 2015 CNAM, Paris Dr. Thomas Margoni - Assistant Professor of Law, University of Stirling, UK Open
More informationBig Data better business benefits
Big Data better business benefits Paul Edwards, HouseMark 2 December 2014 What I ll cover.. Explain what big data is Uses for Big Data and the potential for social housing What Big Data means for HouseMark
More informationPrivacy in the electronic communication sector: insights from the ISP industry
Privacy in the electronic communication sector: insights from the ISP industry Innocenzo Genna Genna Cabinet Bruxelles FIA Conference Ghent, 16 November 2010 The opinions expressed in this presentation
More informationPresentation by: Dr. Nathalie Moreno Partner. Cloud Computing and Data Protection: an Update 4 October 2012
Presentation by: Dr. Nathalie Moreno Partner Cloud Computing and Data Protection: an Update 4 October 2012 Our team Speechly Bircham is an ambitious, international mid-size fullservice law firm head-quartered
More informationISO/IEC 27018 Safeguarding Personal Information in the Cloud. Whitepaper
ISO/IEC 27018 Safeguarding Personal Information in the Cloud Whitepaper Summary The protection of private information has never been a higher priority. Many national and international bodies, including
More informationElectronic Palliative Care Co-Ordination Systems: Information Governance Guidance
QIPP Digital Technology Electronic Palliative Care Co-Ordination Systems: Information Governance Guidance Author: Adam Hatherly Date: 26 th March 2013 Version: 1.1 Crown Copyright 2013 Page 1 of 19 Amendment
More informationCorporate Compliance: A Global Perspective
Corporate Compliance: A Global Perspective 6/27/2012 37 Offices in 18 Countries Current Compliance Environment Ever-intensifying regulatory burden new areas of regulation existing regulations becoming
More informationEthical issues in accessing and using big data
Ethical issues in accessing and using big data Libby Bishop Research Data Management Team UK Data Service University of Essex Big Data and Analytics Summer School BD014 Secure Access Protocols for Big
More informationTowards a data-driven economy in Europe
Towards a data-driven economy in Europe Trusting Big Data Trust in the Digital World Conference 26 February 2015 Dr. Márta NAGY-ROTHENGASS Head of Unit CNECT.G3 (Data Value Chain) Why is data-driven economy
More informationData management plan
FACILITATE OPEN SCIENCE TRAINING FOR EUROPEAN RESEARCH 612425 Data management plan Course for Doctoral Students at ECPR Summer School 2015 Faculty of Social Sciences, University of Ljubljana, Slovenia
More informationINFORMATION GOVERNANCE STRATEGY NO.CG02
INFORMATION GOVERNANCE STRATEGY NO.CG02 Applies to: All NHS LA employees, Non-Executive Directors, secondees and consultants, and/or any other parties who will carry out duties on behalf of the NHS LA.
More informationCreating a Data Management Plan for your Research
Creating a Data Management Plan for your Research EPFL Workshop Lausaunne, 28 Oct 2014 Robin Rice, Laine Ruus EDINA and Data Library Course content What is a Data Management Plan? Benefits and drivers
More informationData Protection & Cyber Security Law Update 1 st October 2015
Data Protection & Cyber Security Law Update 1 st October 2015 Robert Bond, Partner Janine Regan, Associate Viktoria Protokova, Data Protection Executive charlesrussellspeechlys.com Brief introduction to
More informationLegal compliance for developers. Training materials (prepared by Tilburg University)
Legal compliance for developers using FI-STAR ehealth platform Training materials (prepared by Tilburg University) Target audience: Target audience and objectives developers & other potential users of
More informationINFORMATION SECURITY MANAGEMENT POLICY
INFORMATION SECURITY MANAGEMENT POLICY Security Classification Level 4 - PUBLIC Version 1.3 Status APPROVED Approval SMT: 27 th April 2010 ISC: 28 th April 2010 Senate: 9 th June 2010 Council: 23 rd June
More informationEUROPEAN PARLIAMENT 2009-2014. Committee on Industry, Research and Energy. of the Committee on Industry, Research and Energy
EUROPEAN PARLIAMT 2009-2014 Committee on Industry, Research and Energy 2012/0011(COD) 26.02.2013 OPINION of the Committee on Industry, Research and Energy for the Committee on Civil Liberties, Justice
More informationDemystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature
Demystifying Cyber Insurance Jamie Monck-Mason & Andrew Hill Introduction What is cyber? Nomenclature 1 What specific risks does cyber insurance cover? First party risks - losses arising from a data breach
More informationCHEAT SHEET Stay abreast of local intellectual property laws. The explosion of the market for big data and associated analytics has been mirrored by
CHEAT SHEET Stay abreast of local intellectual property laws. The explosion of the market for big data and associated analytics has been mirrored by a proliferation of laws and regulations, based on the
More informationCompetency Requirements for Executive Director Candidates
Competency Requirements for Executive Director Candidates There are nine (9) domains of competency for association executives, based on research conducted by the American Society for Association Executives
More informationPrivacy Update for Australian Government Agencies. What we've seen in the first 12 months of the new APPs and what's next!
Privacy Update for Australian Government Agencies What we've seen in the first 12 months of the new APPs and what's next! Presented by Sharon Rowe and Alec Christie Canberra, 31 March 2015 What we are
More informationAlign Technology. Data Protection Binding Corporate Rules Processor Policy. 2014 Align Technology, Inc. All rights reserved.
Align Technology Data Protection Binding Corporate Rules Processor Policy Confidential Contents INTRODUCTION TO THIS POLICY 3 PART I: BACKGROUND AND ACTIONS 4 PART II: PROCESSOR OBLIGATIONS 6 PART III:
More informationPrivacy & data protection in big data: Fact or Fiction?
Privacy & data protection in big data: Fact or Fiction? Athena Bourka ENISA ISACA Athens Conference 24.11.2015 European Union Agency for Network and Information Security Agenda 1 Privacy challenges in
More informationAlign Technology. Data Protection Binding Corporate Rules Controller Policy. 2014 Align Technology, Inc. All rights reserved.
Align Technology Data Protection Binding Corporate Rules Controller Policy Contents INTRODUCTION 3 PART I: BACKGROUND AND ACTIONS 4 PART II: CONTROLLER OBLIGATIONS 6 PART III: APPENDICES 13 2 P a g e INTRODUCTION
More informationData Protection Act. Conducting privacy impact assessments code of practice
Data Protection Act Conducting privacy impact assessments code of practice 1 Conducting privacy impact assessments code of practice Data Protection Act Contents Information Commissioner s foreword... 3
More informationBig Data for Law Firms DAMIAN BLACKBURN
Big Data for Law Firms DAMIAN BLACKBURN PUBLISHED BY IN ASSOCIATION WITH Big data means big business By Simon Briskman, partner, technology & outsourcing group, Field Fisher Waterhouse LLP BIG DATA is
More informationEU Regulatory Trends in Data Protection & Cybersecurity What should be on the industry s agenda?
EU Regulatory Trends in Data Protection & Cybersecurity What should be on the industry s agenda? Dr. Jörg Hladjk Counsel European Data Protection & Privacy Practice Hunton & Williams, Brussels Cyber Security
More informationWHY COMPLYING WITH COMPETITION LAW IS GOOD FOR YOUR BUSINESS
WHY COMPLYING WITH COMPETITION LAW IS GOOD FOR YOUR BUSINESS Practical tools for smaller businesses to improve compliance ICC SME TOOLKIT Prepared by the ICC Commission on Competition What has competition
More informationBIG DATA. WHAT S YOUR STRATEGY?
TMT Insight Autumn 2013 BIG DATA. WHAT S YOUR STRATEGY? BIG DATA: WHAT S YOUR STRATEGY? INTRODUCTION WE ARE WITNESSING A DATA EXPLOSION THAT IS HAVING AS PROFOUND AN IMPACT ON OUR WAY OF LIFE AS THE LAUNCH
More informationOffice of Fair Trading (OFT) Online Targeting of Advertising and Prices Market Study Response by the Internet Advertising Bureau
Office of Fair Trading (OFT) Online Targeting of Advertising and Prices Market Study Response by the Internet Advertising Bureau 1. Introduction The Internet Advertising Bureau (IAB) is the UK industry
More informationDue Diligence Request List: IP and IT
PLC Intellectual Property & Technology An intellectual property (IP) and information technology (IT) due diligence request list for use in connection with an M&A transaction. This request list is designed
More informationHelp! My Licensor/Licensee Has Gone Insolvent What Can I Do?
Help! My Licensor/Licensee Has Gone Insolvent What Can I Do? Deborah Ruff druff@mayerbrown.com Sarah Byrt sbyrt@mayerbrown.com Dr. Constantin Rehaag crehaag@mayerbrown.com September 16, 2009 Mayer Brown
More informationThe Myth of Anonymization: Has Big Data Killed Anonymity? White Paper. by Jessica Santos, Ph.D. March 2015
White Paper Catalysts driving successful decisions in life sciences. The Myth of Anonymization: Has Big Data Killed Anonymity? by Jessica Santos, Ph.D. March 2015 www.kantarhealth.com Anonymization has
More informationGDPR & Cloud Providers Keynote Presentation
Cloudscape VII 9 March 2015 GDPR & Cloud Providers Keynote Presentation Kuan Hon Research Consultant, Cloud Legal Project & MCCRC Centre for Commercial Law Studies Queen Mary, University of London w.k.hon@qmul.ac.uk
More informationOpen Data Strategy 2013-2017. Department of Tourism, Major Events, Small Business and the Commonwealth Games. Page 1 of 14
Open Data Strategy 2013-2017 Department of Tourism, Major Events, Small Business and the Commonwealth Games Page 1 of 14 This publication has been compiled by Andrew Dungan, Small Business Division,, Department
More informationData, Privacy, Cookies and the FTC in 2013. Kevin Stark - ExactTarget Maltie Maraj - ExactTarget Nicholas Merker - Ice Miller
Data, Privacy, Cookies and the FTC in 2013 Kevin Stark - ExactTarget Maltie Maraj - ExactTarget Nicholas Merker - Ice Miller BIOS Kevin Stark: Product Manager at ExactTarget. Focused on data security,
More informationCloud Computing: Contracting and Compliance Issues for In-House Counsel
International In-house Counsel Journal Vol. 6, No. 23, Spring 2013, 1 Cloud Computing: Contracting and Compliance Issues for In-House Counsel SHAHAB AHMED Director Legal and Corporate Affairs, Microsoft,
More informationIP Considerations in Outsourcing Agreements
IP Considerations in Outsourcing Agreements Speakers: Moderator: Diana Mansour, Associate, Gardner Roberts LLP Mathew Snell, GTS Canada Senior Counsel, IBM Canada Ildiko Mehes, VP and General Counsel,
More informationESOMAR PRACTICAL GUIDE ON COOKIES JULY 2012
ESOMAR PRACTICAL GUIDE ON COOKIES JULY 2012 Copyright ESOMAR 2012 TABLE OF CONTENTS 2 Objectives 2 Introduction 3 Definitions 4 SECTION 1: APPLICABLE LAW 4 SECTION 2: WHAT YOU NEED TO KNOW SOME FAQs 5
More informationResearch Data Management Policy
Research Data Management Policy Version Number: 1.0 Effective from 06 January 2016 Author: Research Data Manager The Library Document Control Information Status and reason for development New as no previous
More informationContact: Kostas Rossoglou and Nuria Rodríguez digital@beuc.eu
Data Protection Proposal for a Regulation BEUC Position Paper Contact: Kostas Rossoglou and Nuria Rodríguez digital@beuc.eu Ref.: X/2012/039-27/07/2012 BUREAU EUROPÉEN DES UNIONS DE CONSOMMATEURS AISBL
More informationBig Data for Mutuals. Marc Dautlich 25 November 2013
Big Data for Mutuals Marc Dautlich 25 November 2013 Agenda BIG DATA What is it? OPPORTUNITIES What are they? LEGAL CHALLENGES How do we overcome them? LEGAL REFORM What can we do now to minimise impact?
More informationAutomotive Suppliers and Cybersecurity
Automotive Suppliers and Cybersecurity OEMs sometimes specify their security requirements in an incomplete or vague way, but that certainly doesn t mean that Tier 1 automotive suppliers (Tier 1s) should
More informationGuidance. Establishing a consortium agreement
EUROPEAN COMMISSION Directorate-General for Research & Innovation Guidance Establishing a consortium agreement Version 0.1 IMPORTANT NOTICE Disclaimer You remain fully responsible for your consortium agreement.
More informationIn which new or innovative ways do you think RPAS will be used in the future?
Written evidence Submitted by Trilateral Research & Consulting On the House of Lords Select Committee on the European Union call for evidence on Civil use of remotely piloted aircraft systems (RPAS) in
More informationDistributor Liability Contract Risk Management THOMAS DOUGLASS APRIL 15, 2015
Distributor Liability Contract Risk Management THOMAS DOUGLASS APRIL 15, 2015 Today s Agenda What are we talking about today? What is Risk Evolution of risk management Understand the importance of Risk
More informationRESPONSE TO THE INFORMATION COMMISSIONER S OFFICE BIG DATA AND DATA PROTECTION PAPER 1. BACKGROUND
HUNTON & WILLIAMS 30 ST MARY AXE LONDON, EC3A 8EP TEL +44 (0)20 7220 5700 FAX +44 (0)20 7220 5772 BOJANA BELLAMY DIRECT DIAL: +44 (0)20 7220 5703 EMAIL: BBELLAMY@HUNTON.COM RESPONSE TO THE INFORMATION
More informationSTREAM Cyber Security
STREAM Cyber Security Management Software Governance, Risk Management & Compliance (GRC) Security Operations, Analytics & Reporting (SOAR) Fast, flexible, scalable, easy to use and affordable software
More informationData Protection in Clinical Studies Implications of the New EU General Data Protection Regulation
June 19, 2012 Practice Group(s): Health Care Life Sciences Data Protection in Clinical Studies Implications of the New EU General Data Protection Regulation By Mathias Schulze Steinen and Daniela Bohn
More informationOPEN DATA: ADOPTING A SECURITY-MINDED APPROACH
OFFICIAL OPEN DATA: ADOPTING A SECURITY-MINDED APPROACH November 2015 Disclaimer Reference to any specific commercial product, process or service by trade name, trademark, manufacturer, or otherwise, does
More informationHUMAN RESOURCES POLICIES & PROCEDURES
HUMAN RESOURCES POLICIES & PROCEDURES Policy title Application IT systems and social networking policy All employees and students CONTENTS PAGE Introduction and scope 2 General points 2 Authorisation to
More informationCHANGES IN THE WORLD OF CLAIMS MANAGEMENT FROM DEBTORS TO CUSTOMERS
CHANGES IN THE WORLD OF CLAIMS MANAGEMENT FROM DEBTORS TO CUSTOMERS Andreas Aumüller, President of FENCA Federation of European National Collection Associations CONSUMER CREDIT INDUSTRY Annual Convention
More informationE-COMMERCE GOES MOBILE: SEEKING COMPETITIVENESS THROUGH PRIVACY
E-COMMERCE GOES MOBILE: SEEKING COMPETITIVENESS THROUGH PRIVACY Oana Dolea 7 th Annual Leg@l.IT Conference March 26th, 2013 Montreal, Canada INTRODUCTION Mobile e-commerce vs. E-commerce Mobile e-commerce:
More information4-column document Net neutrality provisions (including recitals)
4-column document Net neutrality provisions (including recitals) [Text for technical discussions. It does not express any position of the Commission or its services] Proposal for a REGULATION OF THE EUROPEAN
More informationOpinion 03/2013 on purpose limitation
ARTICLE 29 DATA PROTECTION WORKING PARTY 00569/13/EN WP 203 Opinion 03/2013 on purpose limitation Adopted on 2 April 2013 This Working Party was set up under Article 29 of Directive 95/46/EC. It is an
More informationProtecting Privacy in a World of Big Data. Paper 1
Protecting Privacy in a World of Big Data Paper 1 DISCUSSION DRAFT 21 October 2015 The Role of Enhanced Accountability in Creating a Sustainable Data-driven Economy and Information Society Centre for Information
More informationInsurance Europe key messages on the European Commission's proposed General Data Protection Regulation
Position Paper Insurance Europe key messages on the European Commission's proposed General Data Protection Regulation Our reference: SMC-DAT-12-064 Date: 3 September 2012 Related documents: Proposal for
More informationUltimate Beneficial Ownership The Implications of Not Knowing
White Paper Ultimate Beneficial Ownership The Implications of Not Knowing September 2014 Ultimate Beneficial Ownership The Implications of Not Knowing Author: Ana Maria H. de Alba Beneficial ownership
More informationTesting the Security of your Applications
Home Safeguarding Business Critical Testing the of your Applications Safeguarding business critical systems and applications 2 Safeguarding business critical systems and applications Organizations are
More informationTesting the Security of your Applications
Home Safeguarding Business Critical Testing the of your Applications Safeguarding business critical systems and applications 2 Safeguarding business critical systems and applications Organizations are
More informationBig Data & The Law Will Landecker & John Rake
Big Data & The Law Will Landecker & John Rake Portland Eugene Salem harrang.com 800.315.4172 2014 Harrang Long Gary Rudnick P.C. Introduction Clients need data to solve problems or predict results. Attorneys
More informationData protection compliance checklist
Data protection compliance checklist What is this checklist for? This checklist is drawn up on the basis of analysis of the relevant provisions of European law. Although European law aims at harmonizing
More informationLower your cost income ratio in the Digital age
Advisory Lower your cost income ratio in the Digital age Operation find the money Ken van Ierlant Amsterdam All commodity businesses face the challenge of increasing C/I ratios ING experienced a strong
More informationREVIEWED BY Q&S COMMITTEE ON THE 4 TH JUNE 2015. Social Media Policy
Social Media Policy SOCIAL MEDIA POLICY This Policy applies to all academy staff regardless of their employment status. It is to be read in conjunction with the E Safety and Data Security Policy. This
More informationBig data: A lot to explore but little to share? Ways towards a regulatory regime for big data
September 2013 Big data: A lot to explore but little to share? Ways towards a regulatory regime for big data Gareth Quested and Sonia Sousa 1 The Big Innovation Centre is an initiative of The Work Foundation
More information