Privacy by Design: What s Been Happening? Ken Anderson
|
|
|
- Madlyn Sims
- 10 years ago
- Views:
Transcription
1 Privacy by Design: What s Been Happening? Ken Anderson Assistant Commissioner (Privacy) Ontario Hong Kong June 13, 2012 Key Definitions Information privacy refers to the right or ability of individuals to exercise control over the collection, use and disclosure by others of their personal information Personally-identifiable information ( PII ) can be biographical, biological, genealogical, historical, transactional, locational, relational, computational, vocational or reputational, and is the stuff that makes up our modern identity Personal information must be managed responsibly. When it is not, accountability is undermined and confidence in our evolving information society is eroded. 1
2 What Privacy is Not Privacy Security Security = Privacy and Security: The Difference Authentication Data Integrity Confidentiality Non-repudiation Organizational control of information through information systems Information Privacy = personal control 2
3 The Future of Privacy We Need a Paradigm Shift 3
4 The Future of Privacy Change the Paradigm to Positive-Sum, NOT Zero-Sum Positive-Sum Paradigm A Zero-Sum Paradigm describes a concept or situation in which one party s gains are balanced by another party s losses win/lose; either/or; enhancing security often comes at the expense of privacy the more you have of one, the less you can have of the other; A Positive-Sum Paradigm, in contrast, describes a situation in which all participants may mutually gain together (win-win); To achieve a positive-sum model, privacy must be proactively built into the system so that privacy protections are engineered directly into the technology, right from the outset; As a result, the unnecessary collection and use of personal data is minimized while increasing data security and allowing greater individual control; By applying the positive-sum paradigm to new privacy-invasive technologies, we can achieve both security and privacy resulting in a win-win scenario. 4
5 Positive-Sum Model Change the paradigm from a zero-sum to a positive-sum model: Create a win-win scenario, not an either/or (vs.) involving unnecessary trade-offs and false dichotomies replace the vs. with and Privacy by Design: The Trilogy of Applications Information Technology Accountable Business Practices Physical Design & Networked Infrastructure 5
6 Privacy by Design: The 7 Foundational Principles 1. Proactive not Reactive; 2. Privacy as the Default setting; 3. Privacy Embedded into Design; 4. Full Functionality: Positive-Sum, not Zero-Sum; 5. End-to-End Security: Full Lifecycle Protection; 6. Visibility and Transparency: Keep it Open; 7. Respect for User Privacy: Keep it User- Centric
7 Adoption of Privacy by Design as an International Standard Landmark Resolution Passed to Preserve the Future of Privacy By Anna Ohlden October 29th JERUSALEM, October 29, 2010 A landmark Resolution by Ontario's Information and Privacy Commissioner, Dr. Ann Cavoukian, was approved by international Data Protection and Privacy Commissioners in Jerusalem today at their annual conference. The resolution recognizes Commissioner Cavoukian's concept of Privacy by Design - which ensures that privacy is embedded into new technologies and business practices, right from the outset - as an essential component of fundamental privacy protection. Full Article: Privacy by Design: Proactive in 25 Languages! 1.English 2.French 3.German 4.Spanish 5.Italian 6.Czech 7.Dutch 8.Estonian 9.Hebrew 10. Hindi 11.Chinese 12.Japanese 13.Arabic 14.Armenian 15.Ukrainian 16.Korean 17.Russian 18.Romanian 19. Greek 20.Portuguese 21.Maltese 22.Macedonian 23.Bulgarian 24.Polish 25.Croatian 7
8 Privacy by Design Highlights: 2010/2012 Autumn 2010 October Regulators from around the world gathered in Jerusalem, unanimously passing a Resolution recognizing Privacy by Design as an essential component of privacy protection; November European Commission released its report: Comprehensive Approach on Personal Data Protection in the European Union, pointing out the important role that Privacy by Design will play in ensuring data controllers meet their responsibilities; December The U.S. Federal Trade Commission issued, Protecting Consumer Privacy in an Era of Rapid Change, citing Privacy by Design as one of three recommendations. 8
9 Spring 2011 February Debate in the Dutch Senate on data protection and privacy, consistently referred to the need for Privacy by Design. February GSMA published, Mobile Privacy Principles, with a framework for a Privacy by Design approach to mobile devices; April European Union announced the Privacy and Data Protection Impact Assessment Framework for RFID Applications a milestone agreement to put consumers privacy at the centre of smart tag technology (using a Privacy by Design solution) and to make sure privacy concerns are addressed before products go on the market; April U.S. Senators John Kerry and John McCain cited Privacy by Design in their Commercial Privacy Bill of Rights; Summer 2011 July Government of Qatar asked for comments regarding the inclusion of Privacy by Design as a key legislative principle; July California Public Utility Commission recognized that, the Privacy by Design methodology offers a promising approach to ensuring that data practices promote privacy, not just in the FIP of data minimization, but in all aspects of privacy planning.; August The Czech Data Protection Authority endorsed EU privacy reforms, which will be characterized by Privacy by Design, responsibility and accountability; August The New Zealand Law Commissioner, John Burrows, recommended that Privacy Commissioner, Marie Shroff, establish several expert panels which would advise on technical matters, including Privacy by Design; August The Israeli Law, Information and Technology Authority (ILITA) made Privacy by Design one of its principal conditions for Google s operation of its Street View cars in Israel. 9
10 Autumn 2011 September Ontario IPC joint paper with Berlin DPA on Privacy by Design and Smart Metering: Minimize Personal Information to Maintain Privacy Data Minimization at its Best; October San Diego Gas & Electric partnered with Ontario IPC to embed Privacy by Design into their Smart Meter Dynamic Pricing system. January 2012 European Union Directive Privacy by Design and Privacy as the Default are specifically mentioned - Data controllers/processors must implement technical and organizational measures having regard to PbD; Independent Supervisory Authorities with investigative/order making powers may impose sanctions of up to 2% of a company s annual revenue; Data Breach Notification- data controllers must notify Supervisory Authority within 24 hours of a data breach (where feasible) and individuals (without undue delay) where data is not encrypted. 10
11 The Year of the Engineer Engaging Engineers Technische Universitä t Berlin 11
12 Privacy by Design and the Internet Engineering Task Force (IETF) The concept of Privacy by Design has gotten a lot of attention over the past few years and within the IETF we have tried to investigate how we can consider privacy in the design of protocols and architectures in a more systematic way in protocols and architectural designs. We have started to shed more light on privacy in the IETF by organizing a privacy workshop to solicit input from the technically minded privacy community, to create an IETF privacy directorate, and to start the work on a number of documents to offer more guidance to engineers. Privacy Considerations for Internet Protocols, Internet Engineering Task Force (IETF), Embedding Privacy at the Design Stage: The Obvious Route Cost-effective Proactive User-centric It s all about control preserving personal control and freedom of choice over one s data flows 12
13 Privacy by ReDesign PbRD 1. Rethink: review existing risk mitigation strategies and systems, considering alternatives that will be more privacy protective; 2. ReDesign: develop and enable improvements in the system that will deliver original function and privacy in a doubly-enabling, positive-sum manner; 3. Revive: re-launch the newly improved, more privacy protective system. 13
14 Identifying potential targets for Privacy by ReDesign; Practical framework for implementing Privacy by ReDesign; Laying the foundations for success; A road map towards proactive data protection. Rise of the Privacy Economy A wave of startups are creating a new business model for the use personal data; Rather than cookies tracking consumers' movements online, their alternative model would allow individuals to control their own data, and perhaps even profit by selling access to it; Some advocates predict the rise of a privacy economy, where Internet companies would provide services that allow people to discover what information exists about them online, to counter false information, and even allow people to control and share their personal information when it benefits them. Reputation.com Personal Data Ecosystem Consortium Consider Personal Singly 14
15 Respect Network The World's First Personal Cloud Network Drummond Reed Co-Founder & Chairman Respect Network Corporation Respect Network Corporation Executive Summary This presentation will explain how Respect Network Corporation is creating the world's first personal cloud network based on the award-winning Respect Trust Framework, and how this ethical business model for personal data will enable the leap from CRM to VRM (Vendor Relationship Management) Respect Network Corporation 30 15
16 CRM (Customer Relationship Management) systems are used by vendors to manage their relationships with customers CRM Vendor Cloud All logos depicted are hypothetical Respect Network Corporation 31 Social CRM tries to make CRM smarter by listening to what customers are sharing with their social networks All logos depicted are hypothetical Respect Network Corporation 32 16
17 VRM (Vendor Relationship Management) is the inverse of CRM : the idea that customers can have their own relationship management system that is a peer of the vendor s Respect Network Corporation 33 Although VRM is still an emerging segment, over 20 companies and open source projects already produce VRM software, services, and standards Respect Network Corporation 34 17
18 Such a trust framework already exists: the Respect Trust Framework was listed with OIX (Open Identity Exchange) and won the Privacy Award at the European Identity Conference in May 2011 Respect Network Corporation 35 18
19 At a Crossroads: Personhood and Digital Identity in the Information Society 1. Data Protection in the IDM-Enabled Ubiquitous Information Environment 2. Data Protection and User Control 3. Market Demand for User Control 4. The Properties of Identity 5. The Properties of Identity and Data Protection 6. The Properties of Identity for Policy Makers and Software Developers 7. Current Conceptions of IDM 8. Decisions and Constraints Identity and Privacy Crisis Growing ID requirements pose privacy problems: Fraud and security concerns are inhibiting confidence, trust, and the growth of e-commerce, e-government Fears of surveillance and excessive collection, use and disclosure of identity information by others are also diminishing confidence and use Lack of individual user empowerment and control over one s own personal data is diminishing confidence and use Function creep, power asymmetries, discrimination, harm Needed: improved user control, data minimization techniques, architectures of privacy, stronger security, trusted devices and credible assurances. 19
20 Privacy-Embedded Laws of Identity Building User-Centric Privacy into an Identity Metasystem Emergence of Identity Metasystem a profound development strategic time to ensure that privacy interests are built into the new global architecture of identity Supporters of 7 Laws of Identity and Identity Metasystem call this the Identity Big Bang to enable ubiquitous intelligent services and a true marketplace for portable identities Since we noticed many parallels between the 7 Laws of Identity and Fair Information Practices, the two sets of principles being fundamentally complementary, we decided to embed privacy directly into them 20
21 Privacy-Embedded 7 Laws of Identity 1. Personal Control and Consent: Technical identity systems must only reveal information identifying a user with the user s consent 2. Minimal Disclosure For Limited Use: Data Minimization The Identity Metasystem must disclose the least identifying information possible. This is the most stable, long-term solution. It is also the most privacy protective solution 3. Justifiable Parties: Need To Know Access Identity systems must be designed so the disclosure of identifying information is limited to parties having a necessary and justifiable place in a given identity relationship Privacy-Embedded 7 Laws of Identity 4. Directed Identity: Protection and Accountability A universal Identity Metasystem must be capable of supporting a range of identifiers with varying degrees of observability and privacy 5. Pluralism of Operators and Technologies: Minimizing Surveillance The interoperability of different identity technologies and their providers must be enabled by a universal Identity Metasystem 6. The Human Face: Understanding Is Key Users must figure prominently in any system, integrated through clear human-machine communications, offering strong protection against identity attacks 7. Consistent Experience Across Contexts: Enhanced User Control The unifying Identity Metasystem must guarantee its users a simple, consistent experience while enabling separation of contexts through multiple operators and technologies 21
22 Implications for Users The 7 Privacy-Embedded Laws of Identity offer: Easier and more direct control over one s personal information when online Embedded ability to minimize the amount of identifying data revealed online Embedded ability to minimize the linkage between different identities and online activities Embedded ability to detect fraudulent messages and web sites (less spam, phishing, pharming, online fraud). 22
23 Privacy in the Clouds The 21 st Century Privacy Challenge Creating a User-Centric Identity Management Infrastructure Technology Building Blocks Call to Action 23
24 Creating A User-Centric Identity Management Infrastructure Adequate tools to manage personal information on all devices Infrastructure allowing unified user experience with all devices System with a clear framework of agreed upon rules Sticky policies that travel with the information and ensure proper use in accordance with policy Infrastructure that supports cross-system interaction as well as interoperation and delegation Open standards and community-driven interoperability Policies, mechanisms, and technologies that use only the amount of personal information necessary Diversity in identity management systems Cloud Technology Building Blocks Open source and proprietary identity software based on open standards Federated identity Multiple and partial identities Data-centred policies Audit tools 24
25 Through the Clouds Transforming Web 2.0 Technologies of Identity: What you need to do Preserve and promote user privacy through: Enhanced user controls; Data minimization; Improved safeguards. Develop user-centric identity technologies that are: Interoperable and easy to use; Based upon free and open standards; Trustworthy and accountable. There is a need and opportunity to engineer privacy, security and trust into new emergent Internet and web architectures: Privacy by Design Meets the Cloud Interoperable identity metasystems; Cloud-based services, platforms and infrastructures; The "Internet of Things; The programmable web, or "WebOS." 25
26 Cloud Computing Architecture and Privacy Cloud Delivery Models Deployment Models Cloud Stack Data in the Cloud Blurred Security Perimeter PbD Cloud Computing Protecting Privacy and Maintaining Access Protecting Privacy and Data Integrity 26
27 More Resources: Federated PIA Develop and codify a Federation s privacy policies; Demonstrate that defined privacy policies will be met; Demonstrate that an appropriate technological architecture is in place to prevent, to the extent possible, accidental or malicious violations of privacy policies. Cloud Security Checklist 1.Discover How many projects you already have in the cloud; 2.Establish a cloud IT team and limit their administrative rights; 3.Don t skip the evaluation stage; 4.Do a thorough risk assessment; 5.Begin classifying data and identifying what can be moved to the cloud and what shouuld reside on-premise behind security layers; 6.Find a cloud-appropriate system for user authentication and access; 7.Scrutinize SLAs and ask: What are the data privacy and retention policies? Where is information stored? If you terminate your service, how long will it take to get your data back and in what form will you get it? Jeff Vance, How Checklists Can Improve Cloud Security, Forbes, April 4, What is the disaster recovery plan? 27
28 Privacy by Design Meets the Cloud: Outsourcing Cloud computing services present similar privacy challenges to outsourcing: Where is the personal data? Which jurisdiction and laws apply? Who is accountable for the data and its uses? Is there effective oversight? Some things to consider: Conduct a Privacy Impact Assessment; Only use identifying information when necessary; Identify and minimize privacy and security risks; Use privacy enhancing technological tools; Exercise due diligence; Ensure transparency, notice, education & awareness; Develop a privacy breach management plan; Create and enforce contractual clauses. 28
29 Contractual Provisions to Consider when Outsourcing to Other Jurisdictions Require the service provider to agree not to use personal information to which it has access except as necessary in the course of providing services; Require the service provider to agree not to disclose personal information to which it has access in the course of providing services; Set out the administrative, technical and physical safeguards that must be employed by the service provider to ensure that records of personal information are retained, transferred and disposed of in a secure manner; Require the service provider to notify the organization, at the first reasonable opportunity, of any summons, order or similar requirement to compel production of the information issued outside Canada; Require the service provider to notify the organization, at the first reasonable opportunity, if the personal information is stolen, lost or accessed by unauthorized persons; Require the establishment of an oversight and monitoring program, including audits of the service provider s compliance with the terms of the agreement; and Prohibit the service provider from permitting its employees or any person acting on its behalf from having access to the personal information unless the employee or person acting on its behalf agrees to comply with the restrictions set out in the agreement. 29
30 You can outsource services but you can t outsource accountability. You always remain accountable. Announcing: Privacy by Design in the Age of Big Data The Big Difference with Big Data; Sensemaking Systems; Privacy by Design in the Age of Big Data; The Creation of a Big Data Sensemaking System through PbD. 30
31 Questions? Comments???? How to Contact Us Ken Anderson Office of the Information & Privacy Commissioner of Ontario Toronto, Ontario, Canada M4W 1A8 Phone: (416) / Web: [email protected] 31
Maximize the Value of Your Data and the Ability to Protect Privacy, by Design
Maximize the Value of Your Data and the Ability to Protect Privacy, by Design Ann Cavoukian, Ph.D. Executive Director Privacy and Big Data Institute Ryerson University Ontario University Registrar s Association
Ann Cavoukian, Ph.D.
Data, Data Everywhere The Need for BIG Privacy in a World of Big Data Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario, Canada Future of Consumer Intelligence Universal City, California
The 7 Foundational Principles. Implementation and Mapping of Fair Information Practices. Ann Cavoukian, Ph.D.
Privacy by Design The 7 Foundational Principles Implementation and Mapping of Fair Information Practices Ann Cavoukian, Ph.D. Information & Privacy Commissioner Ontario, Canada Purpose: This document provides
Privacy by Design The 7 Foundational Principles Implementation and Mapping of Fair Information Practices
Privacy by Design The 7 Foundational Principles Implementation and Mapping of Fair Information Practices Ann Cavoukian, Ph.D. Information & Privacy Commissioner, Ontario, Canada Purpose: This document
Brave New World or Old Problems? Privacy, Security and Big Data: Beware of Unintended Consequences
Brave New World or Old Problems? Privacy, Security and Big Data: Beware of Unintended Consequences A nn C avouk ian, P h.d. E x ecut ive D ir ect or P r ivacy and B ig D at a Inst it ut e R yer son U niver
Ann Cavoukian, Ph.D.
Protecting Privacy in an Era of Electronic Health Records Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario Barrie and Community Family Health Team Royal Victoria Hospital Georgian College
A Q&A with the Commissioner: Big Data and Privacy Health Research: Big Data, Health Research Yes! Personal Data No!
A Q&A with the Commissioner: Big Data and Privacy Health Research: Big Data, Health Research Yes! Personal Data No! Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario, Canada THE AGE OF
Ann Cavoukian, Ph.D.
Data, Data Everywhere The Need for Big Privacy in a World of Big Data Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario, Canada 15 th Annual Privacy and Security Conference February 6,
Article 29 Working Party Issues Opinion on Cloud Computing
Client Alert Global Regulatory Enforcement If you have questions or would like additional information on the material covered in this Alert, please contact one of the authors: Cynthia O Donoghue Partner,
INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013
INFORMATION SECURITY GUIDE Cloud Computing Outsourcing Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Background...2 2. Legislative and Policy Requirements...3 3.
The potential legal consequences of a personal data breach
The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.
Cloud Computing: Legal Risks and Best Practices
Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent
Ann Cavoukian, Ph.D.
School Psychologists: What You Should Know about the Personal Health Information Protection Act Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario Psychological Services Northeast Toronto
Privacy by Design Setting a new standard for privacy certification
Privacy by Design Setting a new standard for privacy certification Privacy by Design is a framework based on proactively embedding privacy into the design and operation of IT systems, networked infrastructure,
Privacy Guidelines for RFID Information Systems (RFID Privacy Guidelines)
Privacy Guidelines for RFID Information Systems (RFID Privacy Guidelines) Information and Privacy Ann Cavoukian, Ph.D. Commissioner June 2006 Commissioner Ann Cavoukian gratefully acknowledges the work
White Paper on Financial Institution Vendor Management
White Paper on Financial Institution Vendor Management Virtually every organization in the modern economy relies to some extent on third-party vendors that facilitate business operations in a wide variety
Policy Brief: Protecting Privacy in Cloud-Based Genomic Research
Policy Brief: Protecting Privacy in Cloud-Based Genomic Research Version 1.0 July 21 st, 2015 Suggested Citation: Adrian Thorogood, Howard Simkevitz, Mark Phillips, Edward S Dove & Yann Joly, Policy Brief:
Privacy Law Basics and Best Practices
Privacy Law Basics and Best Practices Information Privacy in a Digital World Stephanie Skaff [email protected] What Is Information Privacy? Your name? Your phone number or home address? Your email address?
What to do When Faced With a Privacy Breach: Guidelines for the Health Sector ANN CAVOUKIAN, PH.D. COMMISSIONER
What to do When Faced With a Privacy Breach: Guidelines for the Health Sector ANN CAVOUKIAN, PH.D. COMMISSIONER INFORMATION AND PRIVACY COMMISSIONER/ONTARIO Table of Contents What is a privacy breach?...1
TABLE OF CONTENTS. Maintaining the Quality and Integrity of Information. Notification of an Information Security Incident
AGREEMENT BETWEEN THE UNITED STATES OF AMERICA AND THE EUROPEAN UNION ON THE PROTECTION OF PERSONAL INFORMATION RELATING TO THE PREVENTION, INVESTIGATION, DETECTION, AND PROSECUTION OF CRIMINAL OFFENSES
How To Ensure Health Information Is Protected
pic pic CIHI Submission: 2011 Prescribed Entity Review October 2011 Who We Are Established in 1994, CIHI is an independent, not-for-profit corporation that provides essential information on Canada s health
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential
Privacy & Big Data: Enable Big Data Analytics with Privacy by Design. Datenschutz-Vereinigung von Luxemburg Ronald Koorn DRAFT VERSION 8 March 2014
Privacy & Big Data: Enable Big Data Analytics with Privacy by Design Datenschutz-Vereinigung von Luxemburg Ronald Koorn DRAFT VERSION 8 March 2014 Agenda? What is 'Big Data'? Privacy Implications Privacy
The Ontario Health Study s Assessment Centres: A Case Study for Privacy by Design
The Ontario Health Study s Assessment Centres: A Case Study for Privacy by Design Ann Cavoukian, Ph.D. Information & Privacy Commissioner Ontario, Canada and Pamela C. Spencer Cancer Care Ontario VP Corporate
Privacy by Design. Ian Brown, Prof. of Information Security and Privacy Oxford Internet Institute, University of Oxford @IanBrownOII
Privacy by Design Ian Brown, Prof. of Information Security and Privacy Oxford Internet Institute, University of Oxford @IanBrownOII Privacy by Design principles 1. Proactive not Reactive; Preventative
How To Build Privacy Into Information Technology
Transformative Technologies Deliver Both Security and Privacy: Think Positive-Sum, Not Zero-Sum March 2009 Transformative Technologies Deliver Both Security and Privacy Transformative Technologies Deliver
Cloud Computing and Privacy Toolkit. Protecting Privacy Online. May 2016 CLOUD COMPUTING AND PRIVACY TOOLKIT 1
Cloud Computing and Privacy Toolkit Protecting Privacy Online May 2016 CLOUD COMPUTING AND PRIVACY TOOLKIT 1 Table of Contents ABOUT THIS TOOLKIT... 4 What is this Toolkit?... 4 Purpose of this Toolkit...
Acquia Comments on EU Recommendations for Data Processing in the Cloud
Acquia Comments on EU Recommendations for Data Processing in the Cloud Executive Summary On July 1, 2012, European Union (EU) data protection regulators provided guidelines for service providers processing
Privacy Breach Protocol
& Privacy Breach Protocol Guidelines for Government Organizations www.ipc.on.ca Table of Contents What is a privacy breach? 1 Guidelines on what government organizations should do 2 What happens when the
CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS. White Paper
CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS White Paper Table of Contents Addressing compliance with privacy laws for cloud-based services through persistent encryption and key ownership... Section
PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES
PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES TECHNICAL COMMITTEE OF THE INTERNATIONAL ORGANIZATION OF SECURITIES COMMISSIONS FEBRUARY 2005 Preamble The IOSCO Technical Committee
National Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
Privacy by Design: Effective Privacy Management in the Victorian Public Sector
Privacy by Design: Effective Privacy Management in the Victorian public sector Release date: October 2014 The Commissioner for Privacy and Data Protection (CPDP) has formally adopted Privacy by Design
Cloud Computing: Privacy and Other Risks
December 2013 Cloud Computing: Privacy and Other Risks by George Waggott, Michael Reid and Mitch Koczerginski, McMillan LLP Introduction While the benefits of outsourcing organizational data storage to
Cloud Computing: Contracting and Compliance Issues for In-House Counsel
International In-house Counsel Journal Vol. 6, No. 23, Spring 2013, 1 Cloud Computing: Contracting and Compliance Issues for In-House Counsel SHAHAB AHMED Director Legal and Corporate Affairs, Microsoft,
Procedure for Managing a Privacy Breach
Procedure for Managing a Privacy Breach (From the Privacy Policy and Procedures available at: http://www.mun.ca/policy/site/view/index.php?privacy ) A privacy breach occurs when there is unauthorized access
MICROSOFT OFFICE 365 PRIVACY IMPACT ASSESSMENT. Western Student E-Communications Outsourcing
MICROSOFT OFFICE 365 PRIVACY IMPACT ASSESSMENT Western Student E-Communications Outsourcing Paul Eluchok - University Privacy Officer David Ghantous - Associate Director of Technical Services Dated: August
Smart Grid and Privacy An International View
Smart Grid and Privacy An International View 27 November 2013 By: Nader Farah President ESTA International One US Consumer s Reaction in Texas! 2 Source: SmartGridNews.com July 20, 2012 ESTA International
What s New in Access, Privacy and Health Care. Brian Beamish Commissioner. Ontario Connections May 21, 2015
What s New in Access, Privacy and Health Care Brian Beamish Commissioner Ontario Connections May 21, 2015 The Three Acts The IPC ensures compliance with: o Freedom of Information and Protection of Privacy
Information Protection Framework: Data Security Compliance and Today s Healthcare Industry
Information Protection Framework: Data Security Compliance and Today s Healthcare Industry Executive Summary Today s Healthcare industry is facing complex privacy and data security requirements. The movement
GUIDANCE FOR MANAGING THIRD-PARTY RISK
GUIDANCE FOR MANAGING THIRD-PARTY RISK Introduction An institution s board of directors and senior management are ultimately responsible for managing activities conducted through third-party relationships,
Cloud Computing Contracts. October 11, 2012
Cloud Computing Contracts October 11, 2012 Lorene Novakowski Karam Bayrakal Covering Cloud Computing Cloud Computing Defined Models Manage Cloud Computing Risk Mitigation Strategy Privacy Contracts Best
EMBEDDING PRIVACY INTO ELECTRONIC HEALTH RECORDS. Manuela Di Re Associate Director of Legal Services Information and Privacy Commissioner of Ontario
EMBEDDING PRIVACY INTO ELECTRONIC HEALTH RECORDS Manuela Di Re Associate Director of Legal Services Information and Privacy Commissioner of Ontario Presentation Outline 1. Definitions 2. Need to Protect
Cloud Security Standardisation & Certification. Arjan de Jong Policy Advisor Information Security
Cloud Security Standardisation & Certification Arjan de Jong Policy Advisor Information Security Overview Economics of standardization and certification (EU) Legal requirements for (cloud) security International
Secure Enterprise Mobility Management. Cloud-Based Enterprise Mobility Management. White Paper: soti.net
Secure Enterprise Mobility Management White Paper: Cloud-Based Enterprise Mobility Management soti.net Background Facing a business environment of constant change and increasing complexity, enterprises
Personal data and cloud computing, the cloud now has a standard. by Luca Bolognini
Personal data and cloud computing, the cloud now has a standard by Luca Bolognini Lawyer, President of the Italian Institute for Privacy and Data Valorization, founding partner ICT Legal Consulting Last
Data Protection Act 1998. Guidance on the use of cloud computing
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
Managing General Agents (MGAs) Guideline
Managing General Agents (MGAs) Guideline JUNE 2013 DRAFT FOR COMMENT BC AUTHORIZED LIFE INSURERS www.fic.gov.bc.ca PURPOSE This draft guideline outlines best practices that the Financial Institutions Commission
Office 365 Data Processing Agreement with Model Clauses
Enrollment for Education Solutions Office 365 Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID Enrollment for Education Solutions number Microsoft to complete 7392924 GOLDS03081
Practical and ethical considerations on the use of cloud computing in accounting
Practical and ethical considerations on the use of cloud computing in accounting ABSTRACT Katherine Kinkela Iona College Cloud Computing promises cost cutting efficiencies to businesses and specifically
Overview. What are operational policies? Development, adoption, implementation
Practical Geospatial Policies: Resolving Operational Issues to Optimize Your SDI Ed Kennedy Hickling Arthurs Low Corporation and Cynthia Mitchell and Simon Riopel Division, Natural Resources Canada Overview
Securing the Cloud Infrastructure
EXECUTIVE STRATEGY BRIEF Microsoft recognizes that security and privacy protections are essential to building the necessary customer trust for cloud computing to reach its full potential. This strategy
Global Privacy and Data Security in the Cloud September 14, 2011 Miriam Wugmeister
2011 Morrison & Foerster LLP All Rights Reserved mofo.com Global Privacy and Data Security in the Cloud September 14, 2011 Miriam Wugmeister Presenter Miriam Wugmeister Morrison & Foerster LLP New York
Privacy and Security Framework, February 2010
Privacy and Security Framework, February 2010 Updated April 2014 Our Vision Better data. Better decisions. Healthier Canadians. Our Mandate To lead the development and maintenance of comprehensive and
Ten steps to develop a multilayered privacy notice
Ten steps to develop a multilayered privacy notice Prepared by leading lawyers and experts in privacy with The Center for Information Policy Leadership Foreword Experts agree that good privacy begins
This procedure is associated with BCIT policy 6700, Freedom of Information and Protection of Privacy.
Privacy Breach No.: 6700 PR2 Policy Reference: 6700 Category: Information Management Department Responsible: Privacy and Records Management Current Approved Date: 2012 May 01 Objectives This procedure
A Best Practice Guide
A Best Practice Guide Contents Introduction [2] The Benefits of Implementing a Privacy Management Programme [3] Developing a Comprehensive Privacy Management Programme [3] Part A Baseline Fundamentals
Information Security Program Management Standard
State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES
How To Respond To The Nti'S Request For Comment On Big Data And Privacy
Submission to the National Telecommunications and Information Administration (NTIA), U.S. Department of Commerce Docket No. 140514424 4424 01 RIN 0660 XC010 Comments of the Information Technology Industry
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
Data Protection Policy
Data Protection Policy Responsible Officer Author Date effective from July 2009 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance Manager Date last amended December 2012 Review
Overview of the HIPAA Security Rule
Office of the Secretary Office for Civil Rights () Overview of the HIPAA Security Rule Office for Civil Rights Region IX Alicia Cornish, EOS Sheila Fischer, Supervisory EOS Topics Upon completion of this
Privacy Recommendations for the Use of Cloud Computing by Federal Departments and Agencies. Privacy Committee Web 2.0/Cloud Computing Subcommittee
Privacy Recommendations for the Use of Cloud Computing by Federal Departments and Agencies Privacy Committee Web 2.0/Cloud Computing Subcommittee August 2010 Introduction Good privacy practices are a key
THE MOBILE MAJORITY: BUILDING PRIVACY BY DESIGN INTO MOBILE APPS
THE MOBILE MAJORITY: BUILDING PRIVACY BY DESIGN INTO MOBILE APPS Clarissa Cerda, EVP, Chief Legal Officer and Secretary, LifeLock Kimberly Cilke, CIPP/US Deputy General Counsel, GoDaddy.com Timothy Sparapani
Securing the Microsoft Cloud
Securing the Microsoft Cloud Page 1 Securing the Microsoft Cloud Microsoft recognizes that trust is necessary for organizations and customers to fully embrace and benefit from cloud services. We are committed
Cisco Unified Presence Server 1.0
Cisco Unified Presence Server 1.0 The Cisco Unified Presence Server is a critical component for delivering the full value of a Cisco Unified Communications environment. It collects information about a
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP A Note discussing written information security programs (WISPs)
INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE
TITLE AND INFORMATION TECHNOLOGY RESOURCES DOCUMENT # 1107 APPROVAL LEVEL Alberta Health Services Executive Committee SPONSOR Legal & Privacy / Information Technology CATEGORY Information and Technology
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
Cloud Security Trust Cisco to Protect Your Data
Trust Cisco to Protect Your Data As cloud adoption accelerates, organizations are increasingly placing their trust in third-party cloud service providers (CSPs). But can you fully trust your most sensitive
Unofficial Consolidation January 1, 2015
This document is an unofficial consolidation of all amendments to National Instrument 21-101 Marketplace Operation, its Forms and its Companion Policy current to January 1, 201 This document is for reference
IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT)
Page 1 of 6 IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT) I. Understanding the need for privacy in the IT environment A. Evolving
Design of Database Security Policy In Enterprise Systems
Design of Database Security Policy In Enterprise Systems by Krishna R Singitam Database Architect Page 1 of 10 Table of Contents 1. Abstract... 3 2. Introduction... 3 2.1. Understanding the Necessity of
Privacy Impact Assessment Guidelines for the Ontario Personal Health Information Protection Act. Ann Cavoukian, Ph.D. Commissioner October 2005
Privacy Impact Assessment Guidelines for the Ontario Personal Health Information Protection Act Ann Cavoukian, Ph.D. Commissioner October 2005 Information and Privacy Commissioner/Ontario Privacy Impact
DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT
Advisor Article DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT By James R. Carroll, David S. Clancy and Christopher G. Clark* Skadden, Arps, Slate, Meagher & Flom Customer data security
Securing the Microsoft Cloud
Securing the Microsoft Cloud Securing the Microsoft Cloud Page 1 Securing the Microsoft Cloud Microsoft recognizes that trust is necessary for organizations and consumers to fully embrace and benefit from
