Security for processing and sharing of data at translation companies. Opportunities and risks. Pawel Walentynowicz



Similar documents
The Data Protection Landscape. Before and after GDPR: General Data Protection Regulation

Cloud Computing and the SME Prosper on the cloud. Wally Kowal, President and Founder Canadian Cloud Computing Inc.

1.2: DATA SHARING POLICY. PART OF THE OBI GOVERNANCE POLICY Available at:

The potential legal consequences of a personal data breach

Forthcoming EU Data Protection Law

Without prejudice to the generality of the foregoing paragraph, The Gallery Tattoo Studio does not warrant that:

1. In this Contract, except where the contrary intention is expressed, the following definitions are used:

Office 365 Data Processing Agreement with Model Clauses

<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129

Question template for interviews

(Short Form) Terms and Conditions. Version 1.2 dated 17 February Please note:

This Amendment consists of two parts. This is part 1 of 2 and must be accompanied by and signed with part 2 of 2 (Annex 1) to be valid.

NOTE: SERVICE AGREEMENTS WILL BE DRAFTED BY RISK SERVICES SERVICE AGREEMENT

Automated Multilingual Text Analysis in the Europe Media Monitor (EMM) Ralf Steinberger. European Commission Joint Research Centre (JRC)

Article 29 Working Party Issues Opinion on Cloud Computing

Who Controls Your Information in the Cloud?

Securing business data. CNS White Paper. Cloud for Enterprise. Effective Management of Data Security

Reducing Total Cost and Risk in Multilingual Litigation A VIA Legal Brief

Privacy, the Cloud and Data Breaches

Mitigating and managing cyber risk: ten issues to consider

Act CLXV of on Complaints and Public Interest Disclosures. 1. Complaint and public interest disclosure

PRIVACY POLICY. 1. Definitions and Interpretation In this Policy the following terms shall have the following meanings:

Data Protection, Software Licenses and other Legal Issues in the Cloud

Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES

Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10

HIPAA Compliance and the Protection of Patient Health Information

Cyber Threats: Exposures and Breach Costs

This agreement applies to all users of Historica Canada websites and other social media tools ( social media tools or social media channels ).

THE FUTURE OF CYBERSECURITY: STANDARDS AND REGULATION

Consulting Master Services Agreement

Prof. Dr. Klemens Waldhör Chief Architect

ESTRO PRIVACY AND DATA SECURITY NOTICE

Cloud Computing and Data Protection Compliance - Experiences from Norway

BHARTIYA SAMAJ OF CENTRAL FLORIDA ( WEBSITE TERMS AND CONDITIONS

Privacy in the cloud. DNB has indicated that it considers cloud computing a form of outsourcing.

U.S. BANK PREPAID ONLINE BANKING AGREEMENT

An Executive Overview of GAPP. Generally Accepted Privacy Principles

LICENSE AGREEMENT FOR USE & DISTRIBUTION OF CREATIVE PROPERTY:

Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) 2014: 245 incidents reported

Privacy and Data Breach Protection Modular application form

We may collect the following types of information during your visit on our Site:

The impact of the personal data security breach notification law

Cloud Computing Contracts. October 11, 2012

Compromises in Healthcare Privacy due to Data Breaches

SOFTWARE LICENSE AGREEMENT

Big Data workshop introduction

Introduction PriorFX LTD Right to Privacy Information

EXHIBIT 2. CityBridge Privacy Policy. Effective November 4, 2014

Processor Binding Corporate Rules (BCRs), for intra-group transfers of personal data to non EEA countries

Personal data and cloud computing, the cloud now has a standard. by Luca Bolognini

Compliance and Unified Communication

Data Protection in Clinical Studies Implications of the New EU General Data Protection Regulation

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS

CHANGES IN THE WORLD OF CLAIMS MANAGEMENT FROM DEBTORS TO CUSTOMERS

LOCAL SEARCH ENGINE OPTIMIZATION (SEO) TERMS: SECTION 1: DRIVEN DIGITAL S LOCAL SEO SERVICES WILL INCLUDE (BUT ARE NOT LIMITED TO):

Data Security and Breach in Outsourcing Agreements

Microsoft Online Services - Data Processing Agreement

Public Advisory Statement. The Personally-Controlled Electronic Health Record. Frequently Asked Questions by Consumers

Investigating the prevalence of unsecured financial, health and personally identifiable information in corporate data

AIRBUS GROUP BINDING CORPORATE RULES

MASTER SERVICES AGREEMENT - DIGITAL ADVERTISING SERVICES

74% 2014 SIEM Efficiency Survey Report. Hunting out IT changes with SIEM

Align Technology. Data Protection Binding Corporate Rules Processor Policy Align Technology, Inc. All rights reserved.

Panel 1. Greater Regulation of Special Threats to Privacy. Data Protection in the 21st Century

Align Technology. Data Protection Binding Corporate Rules Controller Policy Align Technology, Inc. All rights reserved.

Agent Elite, Inc. Terms & Conditions

LAUW Cyber erisks. SME Questionnaire.

Data Protection Working Group. Final Report on the Draft Data Protection Bill

OFFSHORE OUTSOURCING IN HEALTH CARE: PRIVACY AND SECURITY CONCERNS

Cyber Risks in Italian market

E. Specific requirements for innovation procurement (PCP/PPI) supported by Horizon 2020 grants

Corporate Policy. Data Protection for Data of Customers & Partners.

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

SOFTWARE LICENSE AGREEMENT

MTConnect Institute Public Comment and Evaluation License Agreement

Data controllers and data processors: what the difference is and what the governance implications are

Master Software Purchase Agreement

Terms of Submission In order to participate, you must be at least eighteen (18) years old.

Cloud Service Contracts: An Issue of Trust

MEDICAL-OBJECTS SOFTWARE LICENCE AGREEMENT

Cloudy Privacy Computing

CONTRIBUTION AGREEMENT VERSION 1.1

AGREEMENT FOR CONSULTING SERVICES EXECUTIVE IN RESIDENCE PROGRAM CCIT. JERSEY ECONOMIC DEVELOPMENT AUTHORITY (the "Authority or NJEDA"), having its

Terms and conditions of use

Reducing Cyber Risk in Your Organization

PRIVACY POLICY. 1. Definitions and Interpretation In this Policy the following terms shall have the following meanings:

Corporate websites, the cornerstone of your digital marketing strategy.

Clause 1. Definitions and Interpretation

CONTENT LICENSE & PHOTOGRAPER REPRENTATION AGREEMENT

Presented by: Matti Neustadt Storie Stoel Rives LLP. January 6, Dealing with the government is different than dealing with private parties.

Data Protection Breach Management Policy

HIPAA BUSINESS ASSOCIATE AGREEMENT

Privacy & data protection in big data: Fact or Fiction?

SOFTWARE LICENSE AGREEMENT

Services Agreement between Client and Provider

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:

Factsheet on the Right to be

Privacy Policy. If you have questions or complaints regarding our Privacy Policy or practices, please see Contact Us. Introduction

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

STANDARD TERMS AND CONDITIONS OF PURCHASE SCOTLAND 1. TERMS OF AGREEMENT

Transcription:

Security for processing and sharing of data at translation companies. Opportunities and risks Pawel Walentynowicz

T&C EXAMPLE - FREE ONLINE TRANSLATION TOOLS THREAT : google co-owns your content and can/will publish or use this content without restrictions. Chapter 11: Google Translate terms and conditions: By submitting, posting or displaying the content you give Google a perpetual, irrevocable, worldwide, royalty-free, and non-exclusive license to reproduce, adapt, modify, translate, publish, publicly perform, publicly display and distribute any Content which you submit, post or display on or through, the Services. Chapter 11.2: Google Translate terms and conditions: You agree that this license includes a right for Google to make such Content available to other companies, organizations or individuals with whom Google has relationships for the provision of syndicated services, and to use such Content in connection with the provision of those services

THE RISKS - FREE ONLINE TRANSLATION TOOLS By use of free online translation tools e.g. Google Translate, Bing Translator: You probably violate some confidentiality or non-disclosure agreement of your client. Your and your client s sensitive data is accessible to third parties and might became shared property. Data can be analysed: huge analytical power based on gathered metadata

SECURITY BREACHES (HACKING) THE FACTS. WHO ARE THE VICTIMS? (2013). 2013 data breach investigations report. doi: Verizon

VICTIMS PER SECTOR AND SIZE (2013). 2013 data breach investigations report. doi: Verizon

EU LAW Data protection Directive of 1995 (Directive 95/46/EC) needs and will be modernized to make it future-proof and fit for the digital age Consent: personal data should not be disclosed or shared with third parties without consent from its subject(s). New Regulation might mean high fines (2% or 5% annual global turnover) for the company and individuals have the right to personal compensation from both data controller and data processor.

CONSEQUENCES EU member states set up supervisory authorities whose job is to monitor data protection levels in that state. The reform will require businesses to be more responsible and accountable in the way they handle customer and client data, presenting challenges for the way they manage their documents and the security of the data within them.

PROBLEM: DATA SHARING WITH THIRD PARTIES (SUBCONTRACTORS OR MT) SOLUTION: SENSITIVE CONTENT PROTECTION SOFTWARE KEY FEATURES: Unique multilingual information masking tool The only tool to depersonalize and anonymize sensitive information and recover it in the foreign language Simple, internal tool, acting in accordance with data protection legislation and Non-Disclosure Agreements Protects your content from being submitted to third parties, losing ownership of the data (Google translate, Bing etc.) or from your subcontractors who might be badly protected against cyber-attacks and hacking (translation agencies, law firms) Software that can be hosted by your company and work as buffer between the text owner (company) and the third party, protecting the information by linguistic encryption

PROBLEM: NOT OPTIMAL TM LEVERAGE SOLUTION: LINGOTM CONVERTS 15% OF FUZZY MATCHES INTO FULL MATCHES, INCREASING OVERALL CONSISTENCY AND REDUCING TRANSLATION COSTS BY 3%. WHAT IS LINGOTM? Lingo TM is an application of Smart Match Technology that provides broader and more consistent Translation Memory matching TM storage and retrieval. It 'normalises' the contents of Translation Memory segments, replacing proper names, dates, numbers, etc. with standardised entities. It automatically re-inserts the normalised segments into the target language, taking care of translation and grammatical adaptation. LingoTM is available as a plug-in and integrates with several CAT Tools. LINGOTM THE IMMEDIATE BENEFITS: Improved quality of TM formatting: the tool increases consistency by detecting gaps and omissions in the existing TM segments. Increased TM leverage: this is achieved by processing new segments for translation before matching them against the normalised Translation Memory. Boosted profit: On average, 15% of the fuzzy matches are converted into full matches. Reduced translation time.

WHO WILL SUFFER FROM THE NEW REGULATION? HOW TO PROTECT YOUR TRANSLATION BUSINESS? HOW CAN THE EU REGULATION BE AN OPPORTUNITY FOR YOUR COMPANY?

THANK YOU FOR YOUR ATTENTION Paul Walentynowicz pw@transenter.com Telephone: +31 20 808 1509