Management of Sensitive Data

Size: px
Start display at page:

Download "Management of Sensitive Data"

Transcription

1 Management of Sensitive Data Daryl L. Superio Southeast Asian Fisheries Development Center, Aquaculture Dept. IOC/IIOE2-OTGA and IORA Joint Training Course: Research Data Management May 2016: Kuala Terengganu, Malaysia Hosted by: Government of Malaysia and Malaysian Ocean Teacher Global Academy (OTGA) Regional Training Centre (RTC), INOS, UMT Supported by: Australian Aid, UNESCO/IOC Perth Programme Office, UNESCO/IOC Project Office for International Oceanographic Data and Information Exchange (IODE) and the Indian Ocean Rim Association (IORA)

2 Learning Outcomes At the end of the session you will: identify sensitive data know some data privacy laws learn how to keep your research data secure

3 Sensitive Data Defined Australian National Data Service are data that can be used to identify an individual, species, object, or location that introduces a risk of discrimination, harm, or unwanted attention major, familiar categories of sensitive data are: human health/medical and personal data, including information about secret or sacred practices; or ecological data that may place vulnerable species at risk.

4 List of Data Breaches Source: List of data breaches. (2016). Retrieved 10 May 2016 from

5 Research Data Breach at University of North Carolina at Chapel Hill Source: Chronlology of data breaches. (2016). San Diego, CA: Privacy Rights Clearinghouse. Retrieved 10 May 2016 from

6 2015 Cost of Data Breach Ponenom Institute, companies in 11 countries $3.79 million is the average total cost of data breach 23% increase in total cost of data breach since 2013 $154 is the average cost per lost or stolen record

7 Types of Sensitive Data Briney, 2015 research data containing personally identifiable information research data containing information that could cause harm if publicly released research data leading to patents and other intellectual property

8 National Data Privacy Laws DLA Piper, 2016 Laws governing how sensitive data should be handled vary from country to country o Australia data privacy/protection in Australia is currently made up of a mix of Federal and State/Territory legislation The Federal Privacy Act 1988 (Privacy Act) and its Australian Privacy Principles (APPs) apply to private sector entities Australian States and Territories (except for Western Australia and South Australia) each have their own data protection legislation applying to State Government agencies (and private businesses' interaction with them). These acts are:» Information Privacy Act 2014 (Australian Capital Territory)» Information Act 2002 (Northern Territory)» Privacy and Personal Information Protection Act 1998 (New South Wales)» Information Privacy Act 2009 (Queensland)» Personal Information Protection Act 2004 (Tasmania)» Privacy and Data Protection Act 2014 (Victoria) more details at:

9 National Data Privacy Laws DLA Piper, 2016 o India no specific legislation on privacy and data protection Information Technology Act, 2000 (the Act ) contains specific provisions intended to protect electronic data (including non-electronic records or information that have been, are currently or are intended to be processed electronically) the Privacy Rules, which took effect in 2011, require corporate entities collecting, processing and storing personal data, including sensitive personal information to comply with certain procedures. more details at:

10 National Data Privacy Laws DLA Piper, 2016 o Indonesia no general law on data protection however, there are certain regulations concerning the use of electronic data Electronic Information and Trasactions ( EIT Law ) Government Regulation No. 82 of 2012 more details at: aw-section/c1_id

11 National Data Privacy Laws DLA Piper, 2016 o Malaysia Malaysia s first comprehensive personal data protection legislation, the Personal Data Protection Act 2010 ('PDPA'), was passed by the Malaysian Parliament on 2 June 2010 and came into force on 15 November more details at: aw-section/c1_my

12 National Data Privacy Laws DLA Piper, 2016 o Seychelles The Data Protection Act (the 'Act') was enacted in 2003 (Act No. 9 of 2003) with the aim of protecting the fundamental privacy rights of individuals against the use of data concerning them without their informed consent. more details at: aw-section/c1_sc

13 National Data Privacy Laws DLA Piper, 2016 o South Africa The Constitution of the Republic of South Africa guarantees the right to privacy. Certain provisions within the Electronic Communications and Transactions Act regulate the electronic collection of personal information, although compliance with these provisions is voluntary. more details at: aw-section/c1_za

14 National Data Privacy Laws DLA Piper, 2016 o Thailand Does not have any general statutory law governing data protection or privacy. However, the Constitution does recognize the protection of privacy rights. In addition, statutory laws in some specific areas (such as telecommunications, banking and financial businesses (Specific Businesses) as well as other nonbusiness related laws, such as certain provisions under Thai Penal Code and the Child Protection Act B.E (2003), do provide a certain level of protection against any unauthorised collection, processing, disclosure and transfer of personal data. more details at:

15 National Data Privacy Laws UK Data Protection Act 1998 (Research Data Management Support Services, UK Data Service, 2014) Personal data: o relates to living individual o individual can be identified from those data or from those data and other information o include any expression of opinion about the individual

16 National Data Privacy Laws UK Data Protection Act 1998 (Research Data Management Support Services, UK Data Service, 2014) Requirements for handling personal data o processed fairly and lawfully o obtained and processed for a specified purpose o adequate, relevant and not excessive for the purpose o accurate o processed in accordance with the rights of data subjects, e.g. informed about how data will be used, stored, processed, transferred, destroyed, kept secure and no kept longer than necessary o not transferred abroad without adequate protection Personal data can be disclosed only with consent

17 Best Practices for Legal Compliance (Research Data Management Support Services, UK Data Service, 2014) Investigate early which laws apply to your data Do not collect personal or sensitive data if not essential to your research Seek advice from you research office Plan early in research If you must deal with personal or sensitive data inform participants about how their data will be used remember: not all research data are personal (e.g. anonymised data are not personal)

18 Ethics and Sensitive Data Briney, 2015 When there is no law or policy specifically governing the handling and retention of research data, research ethics require researchers to securely maintain data containing things like human subject information A researcher entrusted with personal data has an obligation to the research subject to protect the subject s information

19 Keeping Data Secure (Cont.) Briney, 2015 Basic computer security Access Encryption Destroying data Personnel Security plan

20 Keeping Data Secure (Cont.) Briney, 2015 Basic computer security o Software regularly update OS, browsers, anti-virus, and other software that protects the computer from intrusion o Practice safe usage practice safe behavior when using the computer stick to known sites when browsing the web if the source is unknown, do not click the link, download the file, or install the software

21 Keeping Data Secure (Cont.) Briney, 2015 o Passwords use strong passwords use mixture of letter (both upper-and lowercase), numbers and characters at least eight characters long non-obvious» 12345; qwerty; monkey; password; abc123 not a dictionary word not a proper name

22 Access Keeping Data Secure (Cont.) Briney, 2015 o maintain a secure storage environment entails both physical and electronic methods of preventing access entails avoiding storage options that are easily accessible o controlling access block outsiders but keep track of those who are allowed to use the data

23 Encryption Keeping Data Secure (Cont.) Briney, 2015 o the process of converting data contained in a message into a secret code prior to transmission via public telecommunication channels to make the content incomprehensible to all but authorized recipient o is a security measure taken to protect confidential information, such as credit card numbers used in online business transactions and to ensure that only those who have paid for a fee-based service can obtain it (Reitz, 2014)

24 Keeping Data Secure (Cont.) Briney, 2015 Destroying data o securing data at the end of the life of a dataset by destroying after it is no longer needed o can t be achieved by simply deleting, specialized type of software is required to truly delete data from a hard drive o data from flash media, CDs and DVDs can be destroyed by physically destroying the media o paper-based information can be destroyed by shredding

25 Personnel Keeping Data Secure (Cont.) Briney, 2015 o provide access to sensitive data to people you trust to prevent sabotage or other untoward incidents Training and keeping a security plan o the final part of keeping data secure o everyone who comes into contact with the data knows the security procedure systematize security practices in a written document review security plan on a regular basis regular training for the entire research group

26 Anonymization Anonymizing Data Briney, 2015 the process of transforming sensitive data into non-sensitive data the process of de-identifying sensitive data while preserving its format and data type (Raghunathan, 2013) two types: data masking data de-identification

27 Anonymizing Data (Cont.) Briney, 2015 Data masking removing or obscuring the identifiable information in a dataset three techniques: suppression- involves removing, leaving blank, or setting to null all the fields that contain personally identifiable information in a data set randomization-replacing identifiable content with random values pseudonymization- replacing identifiable information with consistent pseudonyms

28 Anonymizing Data (Cont.) Briney, 2015 Data de-identification balances the risk of re-identification with preserving as much information in a dataset as possible generalization- making data point less specific, ex. changing birth date to birth year or replacing a specific address with the more general state or province the goal is to use the data but not include specific information that can identify someone

29 Dos and Don ts for Maintaining Data Security Briney, 2015 Do keep your operating system and software patched and up to date Do use anti-virus, a firewall, and anti-malware software Don t visit unknown sites on the internet Don t open suspicious attachments or click on suspicious links in s Don t browse the web on the computer you use for sensitive data storage and analysis Do use strong passwords Don t repeat passwords Don t share your passwords with others Don t collect sensitive data unless you have to Do encrypt your sensitive data

30 Dos and Don ts for Maintaining Data Security (Cont.) Briney, 2015 Don t move sensitive data outside of its secure storage environment Don t store sensitive data without using both physical and electronic safeguards Don t put sensitive data on the internet, in the cloud or in Do plan how you will safely move sensitive data before you collect data in a secondary location Don t move unencrypted, identified data Do use logs to monitor access to sensitive data Do cut off access someone leaves the group Do destroy sensitive data once it is no longer needed Don t provide someone with access to sensitive data if you do not trust them Do hire competent technical support Do make a security plan and frequently review it with others

31 Publishing Sensitive Data Australian National Data Service Publishing your data, or just a description of your data, means that others can discover it, reuse it and cite it o sensitive data that has been confidentialised can be openly published and shared example of de-identified dataset: o you can publish a description (i.e. the metadata) of your data without making the data itself openly accessible, which enables you to place conditions around access to the data

32 Publishing Sensitive Data (Cont.) Australian National Data Service

33 References Australian National Data Service. (n.d.). Sharing sensitive data. Retrieved May 2016 from: Briney, K. (2015). Data management for researchers: Organize, maintain and share your data for research success. UK: Pelagic Publishing. List of data breaches. (2016). Retrieved May 2016 from Ponemon Institute. (2015) Cost of Data Breach Study: Global Analysis. Retrieved May 2016 from /2015-Cost-of-Data-Breach-Study.PDF

It s still very important that you take some steps to help keep up security when you re online:

It s still very important that you take some steps to help keep up security when you re online: PRIVACY & SECURITY The protection and privacy of your personal information is a priority to us. Privacy & Security The protection and privacy of your personal information is a priority to us. This means

More information

UKIP needs to gather and use certain information about individuals.

UKIP needs to gather and use certain information about individuals. UKIP Data Protection Policy Context and overview Key details Policy Update Prepared by: D. Dennemarck / S. Turner Update approved by Management on: November 6, 2015 Policy update became operational on:

More information

Data protection policy

Data protection policy Data protection policy Context and overview Introduction The ASHA Centre needs to gather and use certain information about individuals. These can include customers, suppliers, business contacts, employees

More information

HF Markets SA (Pty) Ltd Protection of Personal Information Policy

HF Markets SA (Pty) Ltd Protection of Personal Information Policy Protection of Personal Information Policy Protection of Personal Information Policy This privacy statement covers the website www.hotforex.co.za, and all its related subdomains that are registered and

More information

Enviro Technology Services Ltd Data Protection Policy

Enviro Technology Services Ltd Data Protection Policy Enviro Technology Services Ltd Data Protection Policy 1. CONTEXT AND OVERVIEW 1.1 Key details Rev 1.0 Policy prepared by: Duncan Mounsor. Approved by board on: 23/03/2016 Policy became operational on:

More information

Policy & Procedure Privacy Policy

Policy & Procedure Privacy Policy NUMBER POL 050 PAGES 12 VERSION V3.8 CREATED: LAST MODIFIED: REVISION: 05/11/2009 06/06/2018 06/06/2019 DOCUMENTS: Authority to Exchange Information Media Authority Student Staff Privacy Agreement REFERENCES:

More information

ADMA Briefing Summary March

ADMA Briefing Summary March ADMA Briefing Summary March 2013 www.adma.com.au Privacy issues are being reviewed globally. In most cases, technological changes are driving the demand for reforms and Australia is no exception. From

More information

Data protection. 3 April 2018

Data protection. 3 April 2018 Data protection 3 April 2018 Policy prepared by: Ltd Approved by the Directors on: 3rd April 2018 Next review date: 31st March 2019 Data Protection Registration Number (ico.): Z2184271 Introduction Ltd

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Status: Released Page 2 of 7 Introduction Our Data Protection policy indicates that we are dedicated to and responsible of processing the information of our employees, customers,

More information

Security Awareness Training June 2016

Security Awareness Training June 2016 Security Awareness Training June 2016 What is Information Security Awareness? The University of North Carolina at Chapel Hill protects its data network from thousands of daily intrusion attempts, but technical

More information

TERMS AND CONDITIONS FOR THE USE OF THE WEBSITE AND PRIVACY POLICY

TERMS AND CONDITIONS FOR THE USE OF THE WEBSITE AND PRIVACY POLICY TERMS AND CONDITIONS FOR THE USE OF THE WEBSITE AND PRIVACY POLICY Trademarks-Intellectual Property Rights Xtrade BLZ (hereinafter called the Company or we or us) is the owner of the Copyright in the pages

More information

A Homeopath Registered Homeopath

A Homeopath Registered Homeopath A Homeopath Registered Homeopath DATA PROTECTION POLICY Scope of the policy This policy applies to the work of homeopath A Homeopath (hereafter referred to as AH ). The policy sets out the requirements

More information

How the GDPR will impact your software delivery processes

How the GDPR will impact your software delivery processes How the GDPR will impact your software delivery processes About Redgate 230 17 202,000 2m Redgaters and counting years old customers SQL Server Central and Simple Talk users 91% of the Fortune 100 use

More information

Policy Objectives (the Association) Privacy Act APPs Policy Application ACTU The Police Association Website

Policy Objectives (the Association) Privacy Act APPs Policy Application ACTU The Police Association Website Privacy Policy 1. Policy Objectives 1.1 The Police Association Victoria (the Association) is the organisation representing sworn police officers at all ranks, protective services officers, police reservists

More information

An Overview of the Gramm-Leach-Bliley (GLB) Act and the Safeguards Rule

An Overview of the Gramm-Leach-Bliley (GLB) Act and the Safeguards Rule An Overview of the Gramm-Leach-Bliley (GLB) Act and the Safeguards Rule Legal Disclaimer: This overview is not intended as legal advice and should not be taken as such. We recommend that you consult legal

More information

Maritime Union of Australia. Privacy Policy 2014

Maritime Union of Australia. Privacy Policy 2014 Maritime Union of Australia Privacy Policy 2014 Introduction The Maritime Union of Australia (Union) is the Union representing persons employed in diving, ferries, offshore oil and gas, port services,

More information

TERMS & CONDITIONS PLEASE READ THESE TERMS AND CONDITIONS CAREFULLY BEFORE USING THE SITE

TERMS & CONDITIONS PLEASE READ THESE TERMS AND CONDITIONS CAREFULLY BEFORE USING THE SITE TERMS & CONDITIONS PLEASE READ THESE TERMS AND CONDITIONS CAREFULLY BEFORE USING THE SITE 1. General The term PPS refers to: Professional Provident Society Holdings Trust, (The Holding Trust); Professional

More information

You can find a brief summary of this Privacy Policy in the chart below.

You can find a brief summary of this Privacy Policy in the chart below. In this policy Shine TV Limited with registered office at Shepherds Building Central, Charecroft Way, Shepherds Bush, London, W14 0EE, UK (Company or we) informs you about how we collect, use and disclose

More information

It applies to personal information for individuals that are external to us such as donors, clients and suppliers (you, your).

It applies to personal information for individuals that are external to us such as donors, clients and suppliers (you, your). Our Privacy Policy 1 Purpose Mission Australia is required by law to comply with the Privacy Act 1988 (Cth) (the Act), including the Australian Privacy Principles (APPs). We take our privacy obligations

More information

Website and Marketing Privacy Policy

Website and Marketing Privacy Policy Website and Marketing Privacy Policy In this policy Endemol Shine UK and its group of companies (Company or we) informs you about how we collect, use and disclose personal data from and about you and your

More information

Islam21c.com Data Protection and Privacy Policy

Islam21c.com Data Protection and Privacy Policy Islam21c.com Data Protection and Privacy Policy Purpose of this policy The purpose of this policy is to communicate to staff, volunteers, donors, non-donors, supporters and clients of Islam21c the approach

More information

POMONA EUROPE ADVISORS LIMITED

POMONA EUROPE ADVISORS LIMITED POMONA EUROPE ADVISORS LIMITED Personal Information Notice Pomona Europe Advisors Limited (Pomona, we/us/our) wants you to be familiar with how we collect, use and disclose personal information. This Personal

More information

Data Protection policy (GDPR)

Data Protection policy (GDPR) Data Protection policy (GDPR) This is the statement of general policy and arrangements for: Overall and final responsibility for health and safety is that of: Day-to-day responsibility for ensuring this

More information

Little Blue Studio. Data Protection and Security Policy. Updated May 2018

Little Blue Studio. Data Protection and Security Policy. Updated May 2018 Little Blue Studio Data Protection and Security Policy Updated May 2018 Contents Introduction... 3 Purpose... 3 Application... 3 General Data Protection Regulation (GDPR)... 3 Handling personal information,

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Addressing the General Data Protection Regulation (GDPR) 2018 [EU] and the Data Protection Act (DPA) 2018 [UK] For information on this Policy or to request Subject Access please

More information

NWQ Capital Management Pty Ltd. Privacy Policy. March 2017 v2

NWQ Capital Management Pty Ltd. Privacy Policy. March 2017 v2 NWQ Capital Management Pty Ltd Privacy Policy March 2017 Page 1 of 8 Privacy and Spam Policy NWQ Capital Management Pty Ltd s Commitment NWQ Capital Management Pty Ltd (NWQ) is committed to providing you

More information

A practical guide to IT security

A practical guide to IT security Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or

More information

The Australian Privacy Act An overview of the Australian Privacy Principles (APPs) Author: Paul Green

The Australian Privacy Act An overview of the Australian Privacy Principles (APPs) Author: Paul Green The Australian Privacy Act An overview of the Australian Privacy Principles (APPs) Author: Paul Green INTRODUCTION If you are collecting or processing personal information then you are likely to be required

More information

This policy also applies to personal information about you that the Federation collects from any other third party.

This policy also applies to personal information about you that the Federation collects from any other third party. ANMF Policy Privacy The Australian Nursing and Midwifery Federation (the Federation) is an organisation of employees (ie a trade union) registered under Commonwealth industrial laws. The Federation is

More information

CURTIS BANKS LIMITED. Privacy Information Notice. curtisbanks.co.uk

CURTIS BANKS LIMITED. Privacy Information Notice. curtisbanks.co.uk CURTIS BANKS LIMITED Privacy Information Notice curtisbanks.co.uk Contents Section Page 1 Who we are 3 2 Why we need to collect, use and process personal information 3 3 The information we may collect,

More information

Employee Security Awareness Training

Employee Security Awareness Training Employee Security Awareness Training September 2016 Purpose Employees have access to sensitive data through the work they perform for York. Examples of sensitive data include social security numbers, medical

More information

Element Finance Solutions Ltd Data Protection Policy

Element Finance Solutions Ltd Data Protection Policy Element Finance Solutions Ltd Data Protection Policy CONTENTS Section Title 1 Introduction 2 Why this Policy Exists 3 Data Protection Law 4 Responsibilities 5 6 7 8 9 10 Data Protection Impact Assessments

More information

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information Privacy Statement Introduction Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information about how IT Support (UK) Ltd handle personal information.

More information

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS?

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS? FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? Financial companies choose how they share your personal information. Federal law gives consumers the right to limit

More information

KIN GROUP PTY LTD PRIVACY POLICY

KIN GROUP PTY LTD PRIVACY POLICY KIN GROUP PTY LTD PRIVACY POLICY 1. Purpose of this policy The Group respects the privacy of the personal information you may provide to it when it deals with you. The way the Group manages your personal

More information

Polemic is a business involved in the collection of personal data in the course of its business activities and on behalf of its clients.

Polemic is a business involved in the collection of personal data in the course of its business activities and on behalf of its clients. Privacy policy 1 Background This document sets out the policy of Polemic Forensic ABN 60 392 752 759 ( Polemic ) relating to the protection of the privacy of personal information. Polemic is a business

More information

Subject: Kier Group plc Data Protection Policy

Subject: Kier Group plc Data Protection Policy Kier Group plc Data Protection Policy Subject: Kier Group plc Data Protection Policy Author: Compliance Document type: Policy Authorised by: Kier General Counsel & Company Secretary Version 3 Effective

More information

STATE OF NEW JERSEY. ASSEMBLY, No th LEGISLATURE. Sponsored by: Assemblywoman ANNETTE QUIJANO District 20 (Union)

STATE OF NEW JERSEY. ASSEMBLY, No th LEGISLATURE. Sponsored by: Assemblywoman ANNETTE QUIJANO District 20 (Union) ASSEMBLY, No. 0 STATE OF NEW JERSEY th LEGISLATURE INTRODUCED NOVEMBER 0, 0 Sponsored by: Assemblywoman ANNETTE QUIJANO District 0 (Union) SYNOPSIS Requires certain persons and business entities to maintain

More information

DATA PROTECTION LAWS OF THE WORLD. Bahrain

DATA PROTECTION LAWS OF THE WORLD. Bahrain DATA PROTECTION LAWS OF THE WORLD Bahrain Downloaded: 7 April 2018 BAHRAIN Last modified 25 January 2017 LAW There is currently no standalone data protection law in Bahrain. A draft is being reviewed before

More information

Latest version, please translate and adapt accordingly!

Latest version, please translate and adapt accordingly! Latest version, please translate and adapt accordingly! EDM Website Privacy Notice template Ford.xx Short Website Privacy Notice This Short Website Privacy Notice summarizes the terms and conditions of

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Data Protection Policy Version 3.00 May 2018 For more information, please contact: Technical Team T: 01903 228100 / 01903 550242 E: info@24x.com Page 1 The Data Protection Law...

More information

Beam Technologies Inc. Privacy Policy

Beam Technologies Inc. Privacy Policy Beam Technologies Inc. Privacy Policy Introduction Beam Technologies Inc., Beam Dental Insurance Services LLC, Beam Insurance Administrators LLC, Beam Perks LLC, and Beam Insurance Services LLC, (collectively,

More information

Privacy Policy. Revisions to this Policy. What Information we collect. How do we collect Information?

Privacy Policy. Revisions to this Policy. What Information we collect. How do we collect Information? Privacy Policy Construction Supply & Service Last Updated May 2014. Construction Supply & Service ABN 16 010 489 326 ("CSS/us/we/our") respects the privacy of individuals. This Policy sets out the way

More information

Data Protection. Policy

Data Protection. Policy Data Protection Policy Policy adopted: April 2016 Policy review date: April 2018 OAT Model Policy 1 Contents 1. Policy statement and principles... 3 1.1 Policy aims and principles... 3 1.2 Data protection

More information

Privacy Statement of Taiwan Cooperative Bank

Privacy Statement of Taiwan Cooperative Bank Privacy Statement of Taiwan Cooperative Bank Your privacy is important to us. At Taiwan Cooperative Bank we recognize the importance of personal information entrusted to us. It is one of our fundamental

More information

Data Compromise Notice Procedure Summary and Guide

Data Compromise Notice Procedure Summary and Guide Data Compromise Notice Procedure Summary and Guide Various federal and state laws require notification of the breach of security or compromise of personally identifiable data. No single federal law or

More information

Upcoming PIPEDA Changes What is changing and what to do about it

Upcoming PIPEDA Changes What is changing and what to do about it Upcoming PIPEDA Changes What is changing and what to do about it Danny Pehar Global Television Cyber Security Expert 02 Danny Pehar Put Text Here This slide is 100% editable. Adapt it to your needs and

More information

COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2

COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2 COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September 2018 Table of Contents 1. Scope, Purpose and Application to Employees 2 2. Reference Documents 2 3. Definitions 3 4. Data Protection Principles

More information

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Introduction The Criminal Justice Information Security (CJIS) Policy is a publically accessible document that contains

More information

UWC International Data Protection Policy

UWC International Data Protection Policy UWC International Data Protection Policy 1. Introduction This policy sets out UWC International s organisational approach to data protection. UWC International is committed to protecting the privacy of

More information

St Bernard s Primary School Data Protection Policy

St Bernard s Primary School Data Protection Policy St Bernard s Primary School Data Protection Policy St Bernard s RC Primary School, A Voluntary Academy Approved by Governors: 11.11.2015 Review date: Autumn 2016 St Bernard s Data Protection Policy General

More information

1. Security of your personal information collected and/or processed through AmFIRST REIT s Web Portal; and

1. Security of your personal information collected and/or processed through AmFIRST REIT s Web Portal; and Security Statement About this Security Statement This AmFIRST Real Estate Investment Trust s ( AmFIRST REIT ) Web Portal Security Statement ( Security Statement ) applies to AmFIRST REIT s website at www.amfirstreit.com.my.

More information

VERSION 1.3 MAY 1, 2018 SNOWFLY PRIVACY POLICY SNOWFLY PERFORMANCE INC. P.O. BOX 95254, SOUTH JORDAN, UT

VERSION 1.3 MAY 1, 2018 SNOWFLY PRIVACY POLICY SNOWFLY PERFORMANCE INC. P.O. BOX 95254, SOUTH JORDAN, UT VERSION 1.3 MAY 1, 2018 SNOWFLY PRIVACY POLICY SNOWFLY PERFORMANCE INC. P.O. BOX 95254, SOUTH JORDAN, UT 84095-9998 SNOWFLY PRIVACY POLICY This Privacy Policy describes Snowfly s practices regarding the

More information

DATA SECURITY - DATA PROTECTION ACT

DATA SECURITY - DATA PROTECTION ACT DATA SECURITY - DATA PROTECTION ACT Data Security - Data Protection Act Many businesses are totally reliant on the data stored on their PCs, laptops, networks, mobile devices and in the cloud. Some of

More information

Ambition Training. Privacy Policy

Ambition Training. Privacy Policy Ambition Training Privacy Policy Privacy Protection Ambition Training is a Registered Training Organisation with responsibility for delivering vocational education and training. Ambition Training collects

More information

PS Mailing Services Ltd Data Protection Policy May 2018

PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Limited is a registered data controller: ICO registration no. Z9106387 (www.ico.org.uk 1. Introduction 1.1. Background We collect

More information

Privacy Policy Effective May 25 th 2018

Privacy Policy Effective May 25 th 2018 Privacy Policy Effective May 25 th 2018 1. General Information 1.1 This policy ( Privacy Policy ) explains what information Safety Management Systems, 2. Scope Inc. and its subsidiaries ( SMS ), it s brand

More information

DATA PRIVACY & PROTECTION POLICY POLICY INFORMATION WE COLLECT AND RECEIVE. Quality Management System

DATA PRIVACY & PROTECTION POLICY POLICY INFORMATION WE COLLECT AND RECEIVE. Quality Management System DATA PRIVACY & PROTECTION POLICY POLICY This Data Privacy & Protection Policy applies to ELMO Software Limited s Cloud HR & Payroll applications and platform (collectively, the Services ), elmosoftware.com.au

More information

POLICY FOR DATA AND INFORMATION SECURITY AT BMC IN LUND. October Table of Contents

POLICY FOR DATA AND INFORMATION SECURITY AT BMC IN LUND. October Table of Contents POLICY FOR DATA AND INFORMATION SECURITY AT BMC IN LUND October 2005 Table of Contents Introduction... 1 Purpose Of This Policy... 1 Responsibility... 1 General Policy... 2 Data Classification Policy...

More information

Shaw Privacy Policy. 1- Our commitment to you

Shaw Privacy Policy. 1- Our commitment to you Privacy Policy last revised on: Sept 16, 2016 Shaw Privacy Policy If you have any questions regarding Shaw s Privacy Policy please contact: privacy@shaw.ca or use the contact information shown on any of

More information

PRIVACY NOTICE: UK NARIC ANNUAL CONFERENCE

PRIVACY NOTICE: UK NARIC ANNUAL CONFERENCE PRIVACY NOTICE: UK NARIC ANNUAL CONFERENCE BACKGROUND: This Privacy Notice applies only to ECCTIS Limited s data processing related to the UK NARIC Annual Conference. For data processing related to other

More information

Electronic Communication of Personal Health Information

Electronic Communication of Personal Health Information Electronic Communication of Personal Health Information A presentation to the Porcupine Health Unit (Timmins, Ontario) May 11 th, 2017 Nicole Minutti, Health Policy Analyst Agenda 1. Protecting Privacy

More information

RADIAN6 SECURITY, PRIVACY, AND ARCHITECTURE

RADIAN6 SECURITY, PRIVACY, AND ARCHITECTURE ADIAN6 SECUITY, PIVACY, AND ACHITECTUE Last Updated: May 6, 2016 Salesforce s Corporate Trust Commitment Salesforce is committed to achieving and maintaining the trust of our customers. Integral to this

More information

About the information we collect We collect and process personal data including but not limited to:-

About the information we collect We collect and process personal data including but not limited to:- Privacy Policy About us TP Supported Accommodation is responsible for collecting, processing, storing and safe keeping of personal information as part of our business activities. We manage information

More information

Employee Security Awareness Training Program

Employee Security Awareness Training Program Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,

More information

DATA PROTECTION AND DATA SECURITY. Stephan Thommen, CEO Datamed

DATA PROTECTION AND DATA SECURITY. Stephan Thommen, CEO Datamed DATA PROTECTION AND DATA SECURITY Stephan Thommen, CEO Datamed Topics Definitions Legal Framework Data Protection and Data Security in ISO 15189:2014 Technology Outlook Conclusions Data Protection Use

More information

Data Protection policy

Data Protection policy DULWICH SYMPHONY ORCHESTRA Data Protection policy 1. Overview Policy prepared by: Dan Sullivan and Jeremy Crump Approved by committee on: 3 May 2018 Next review date: 1 May 2020 Introduction In order to

More information

BEST PRACTICES FOR PERSONAL Security

BEST PRACTICES FOR PERSONAL  Security BEST PRACTICES FOR PERSONAL Email Security Sometimes it feels that the world of email and internet communication is fraught with dangers: malware, viruses, cyber attacks and so on. There are some simple

More information

GLOBAL PAYMENTS AND CASH MANAGEMENT. Security

GLOBAL PAYMENTS AND CASH MANAGEMENT. Security GLOBAL PAYMENTS AND CASH MANAGEMENT Security The Bank aims to provide you with a robust, reliable and secure online environment in which to do business. We seek to achieve this through the adoption of

More information

Dealing with Security and Security Breaches

Dealing with Security and Security Breaches BEIJING BRUSSELS CHICAGO DALLAS FRANKFURT GENEVA HONG KONG LONDON LOS ANGELES NEW YORK PALO ALTO SAN FRANCISCO SHANGHAI SINGAPORE SYDNEY TOKYO WASHINGTON, D.C. Dealing with Security and Security Breaches

More information

Privacy Policy. Information about us. What personal data do we collect and how do we use it?

Privacy Policy. Information about us. What personal data do we collect and how do we use it? This privacy policy sets out the way in which your personal data is handled by Leeds Bradford Airport Limited (referred to as "we", "us" and "our") whether collected through one of the websites we operate,

More information

HELPFUL TIPS: MOBILE DEVICE SECURITY

HELPFUL TIPS: MOBILE DEVICE SECURITY HELPFUL TIPS: MOBILE DEVICE SECURITY Privacy tips for Public Bodies/Trustees using mobile devices This document is intended to provide general advice to organizations on how to protect personal information

More information

Data Protection Policy

Data Protection Policy The Worshipful Company of Framework Knitters Data Protection Policy Addressing the General Data Protection Regulation (GDPR) 2018 [EU] and the Data Protection Act 1998 (DPA) [UK] For information on this

More information

Privacy notice. Last updated: 25 May 2018

Privacy notice. Last updated: 25 May 2018 Privacy notice Last updated: 25 May 2018 www.courtprice.co.uk ('Website') is provided by Courtprice Limited ('we'/'us'/'our'). In doing so, we may be in a position to receive and process personal information

More information

Whitepaper on EU Data Protection October 2014

Whitepaper on EU Data Protection October 2014 Whitepaper on EU Data Protection October 2014 (Please see http://aws.amazon.com/compliance/aws-whitepapers/ for the latest version of this paper, and http://aws.amazon.com/de/data-protection/ for the German

More information

Privacy and Cookies Policy

Privacy and Cookies Policy Sohn Foundation London Privacy and Cookies Policy The Sohn Foundation London (company number: 08075575, charity number: 1148454) is a wholly owned subsidiary of The Ira Sohn Conference Foundation, Inc.

More information

Ulster University Standard Cover Sheet

Ulster University Standard Cover Sheet Ulster University Standard Cover Sheet Document Title Portable Devices Security Standard 1.5 Custodian Approving Committee Deputy Director of Finance and Information Services (Information Services) Information

More information

Creative Funding Solutions Limited Data Protection Policy

Creative Funding Solutions Limited Data Protection Policy Creative Funding Solutions Limited Data Protection Policy CONTENTS Section Title 1 Introduction 2 Why this Policy Exists 3 Data Protection Law 4 Responsibilities 5 6 7 8 9 10 Data Protection Impact Assessments

More information

Gramm Leach Bliley Act 15 U.S.C GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev.

Gramm Leach Bliley Act 15 U.S.C GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev. Gramm Leach Bliley Act 15 U.S.C. 6801-6809 GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev. 11/30/2016 1 Objectives for GLBA Training GLBA Overview Safeguards Rule

More information

CHAPTER 13 ELECTRONIC COMMERCE

CHAPTER 13 ELECTRONIC COMMERCE CHAPTER 13 ELECTRONIC COMMERCE Article 13.1: Definitions For the purposes of this Chapter: computing facilities means computer servers and storage devices for processing or storing information for commercial

More information

Developments in Global Data Protection & Transfer: How They Impact Third-Party Contracts

Developments in Global Data Protection & Transfer: How They Impact Third-Party Contracts Developments in Global Data Protection & Transfer: How They Impact Third-Party Contracts Rebecca Eisner Partner +1 312 701 8577 reisner@mayerbrown.com Mark Prinsley Partner +44 20 3130 3900] mprinsley@mayerbrown.com

More information

Baseline Information Security and Privacy Requirements for Suppliers

Baseline Information Security and Privacy Requirements for Suppliers Baseline Information Security and Privacy Requirements for Suppliers INSTRUCTION 1/00021-2849 Uen Rev H Ericsson AB 2017 All rights reserved. The information in this document is the property of Ericsson.

More information

PRIVACY POLICY PRIVACY POLICY

PRIVACY POLICY PRIVACY POLICY PRIVACY POLICY 1 A. GENERAL PART 1.1. COLLECTION AND PROCESSING OF USER DATA Within the scope of the availability of the website hosted in www.alpinushotel.com and of the services and communications made

More information

UCL Policy on Electronic Mail ( )

UCL Policy on Electronic Mail ( ) LONDON S GLOBAL UNIVERSITY UCL Policy on Electronic Mail (EMAIL) Information Security Policy University College London Document Summary Document ID Status Information Classification Document Version TBD

More information

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT? NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT? What the new data regulations mean for your business, and how Brennan IT and Microsoft 365 can help. THE REGULATIONS: WHAT YOU NEED TO KNOW Australia:

More information

GENERAL PRIVACY POLICY

GENERAL PRIVACY POLICY GENERAL PRIVACY POLICY Introduction The Australian Association of Consultant Pharmacy Pty Ltd (ACN 057 706 064) (the AACP) is committed to protecting the privacy of your personal information. This privacy

More information

Strasbourg, 21 December / décembre 2017

Strasbourg, 21 December / décembre 2017 Strasbourg, 21 December / décembre 2017 T-PD(2017)20Rev CONSULTATIVE COMMITTEE OF THE CONVENTION FOR THE PROTECTION OF INDIVIDUALS WITH REGARD TO AUTOMATIC PROCESSING OF PERSONAL DATA COMITÉ CONSULTATIF

More information

Terms and Conditions 01 January 2016

Terms and Conditions 01 January 2016 Terms and Conditions 01 January 2016 thehealthsource: Terms and Conditions Page 1 of 7 This Agreement (the Agreement ) is entered into by and between thehealthsource (Pty) Ltd and the entity agreeing to

More information

AIRMIC ENTERPRISE RISK MANAGEMENT FORUM

AIRMIC ENTERPRISE RISK MANAGEMENT FORUM AIRMIC ENTERPRISE RISK MANAGEMENT FORUM Date 10 November 2016 Name Nick Gibbons Position, PARTNER BLM T: 0207 457 3567 E: Nick.Gibbons@blmlaw.com SUMMARY Cyber crime is now a daily reality Every business

More information

SURGICAL REVIEW CORPORATION Privacy Policy

SURGICAL REVIEW CORPORATION Privacy Policy SURGICAL REVIEW CORPORATION Privacy Policy Your privacy is very important to us. Please read below to see how Surgical Review Corporation ( SRC ) handles information. SRC respects your privacy and shares

More information

Sample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited.

Sample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited. Sample BYOD Policy Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited. SAMPLE BRING YOUR OWN DEVICE POLICY TERMS OF USE This Sample Bring

More information

FLIPOUT Privacy Charter. We will handle any information we collect about you in accordance with our privacy Policy

FLIPOUT Privacy Charter. We will handle any information we collect about you in accordance with our privacy Policy Flip Out Trampoline Arena Franchises Pty Ltd Suite 9, 308 High Street, Penrith NSW 2750 PO Box 1850, Penrith 2751 1300 FLIP OUT FLIPOUT Privacy Charter We will handle any information we collect about you

More information

Privacy Policy GENERAL

Privacy Policy GENERAL Privacy Policy GENERAL This document sets out what information Springhill Care Group Ltd collects from visitors, how it uses the information, how it protects the information and your rights. Springhill

More information

What is cloud computing? The enterprise is liable as data controller. Various forms of cloud computing. Data controller

What is cloud computing? The enterprise is liable as data controller. Various forms of cloud computing. Data controller A guide to CLOUD COMPUTING 2014 Cloud computing Businesses that make use of cloud computing are legally liable, and must ensure that personal data is processed in accordance with the relevant legislation

More information

Data Processing Clauses

Data Processing Clauses Data Processing Clauses The examples of processing clauses below are proposed pending the adoption of standard contractual clauses within the meaning of Article 28.8 of general data protection regulation.

More information

Privacy Policy. 1. Collection and Use of Your Personal Information

Privacy Policy. 1. Collection and Use of Your Personal Information Privacy Policy Vygo Pty Ltd ACN 609 658 531 ("Vygo" or "We") manages the information that We collect from you in accordance with all applicable privacy legislation in Australia. This Privacy Policy describes

More information

Checklist: Credit Union Information Security and Privacy Policies

Checklist: Credit Union Information Security and Privacy Policies Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC

More information

DATA PROTECTION IN RESEARCH

DATA PROTECTION IN RESEARCH DATA PROTECTION IN RESEARCH Document control Applicable to: All employees and research students Date first approved February 2006 Date first amended May 2015 Date last amended May 2015 Approved by Approval

More information

Mile Privacy Policy. Ticket payment platform with Blockchain. Airline mileage system utilizing Ethereum platform. Mileico.com

Mile Privacy Policy. Ticket payment platform with Blockchain. Airline mileage system utilizing Ethereum platform. Mileico.com Mile Privacy Policy Ticket payment platform with Blockchain Version 1.1 Feb 2018 [ Mile ] www.mileico.com Airline mileage system utilizing Ethereum platform Chapter 1 General Provisions Article_1 (Basic

More information

Content. Privacy Policy

Content. Privacy Policy Content 1. Introduction...2 2. Scope...2 3. Application...3 4. Information Required...3 5. The Use of Personal Information...3 6. Third Parties...4 7. Security...5 8. Updating Client s Information...5

More information