ROBERT HORVITZ Big Data for PPDR: Ethical & Privacy Challenges Critical Communications World Amsterdam, 1 June 2016
|
|
- Katrina Shepherd
- 5 years ago
- Views:
Transcription
1 ROBERT HORVITZ Big Data for PPDR: Ethical & Privacy Challenges Critical Communications World Amsterdam, 1 June 2016
2 Big Data refers to the exponential growth both in the availability & automated use of information by corporations, governments & other large organisations --- Big Data & Smart Devices & their Impact on Privacy, study for the EuroParliament s LIBE Committee (2015)
3 Not only data is big Global public safety & security market worth $393 billion in 2016* PPDR spending on ICT services & equipment = $ billion in 2015 Predicted to reach $ billion in 2020 = 10.9% CAGR** * Markets&Markets estimate ** Homeland Security Research estimate
4 Law enforcement databases in EU Member States Not reported in the European Sourcebook of Crime and Criminal Justice Statistics (HEUNI, 2014) 78 single-country crime-related databases found by RAND Europe in 2011* RAND noted the absence of a more comprehensive listing & problem of deciding what to include. They did not include smart aggregations [dataset fusions with automated search or AI] * RAND Europe, Development of a European Crime Report (for DG HOME)
5 Schengen Information System II (SIS II) Managed now by eu-lisa Believed to be Europe s largest law enforcement database (~50 million records) Facial recognition data recently added Eu-LISA also provides access to Eurodac fingerprint database for asylum seekers (~2.8 million records)
6 SIS II the addition of new functions (in the case of SIS II) and new purposes (both for SIS II and Eurodac), and the features of forthcoming databases (EES and RTP), have blurred the distinction between border control, counter terrorism, the fight against transnational crimes and migration management The original collection of data for a well-defined and narrow purpose has been combined with further storage for new purposes --- Profiling: Protecting citizens rights, fighting illicit profiling (study for DG JUSTICE)
7 US Police Data Initiative Launched by the White House in 2015 Promotes public release of data related to law enforcement ~2,400 datasets released so far Mainly statistics, annual reports, lessons learned out of ~10,000 maintained by law enforcement agencies, nationally & locally
8
9 Transparency Difficult to balance data subjects rights with the need to protect crime investigations BUT IT MUST BE DONE Because the evolution of surveillance technology & growth of analytical capabilities are shifting power toward state
10 One cannot demand all personal activities & assets to be transparent while arguing the need for state activities & assets to be opaque
11
12
13 , Statistics in focus 18/2013
14 If crime is trending downward, what is driving law enforcement data set growth? Proliferating use of video & real-time sensors Picture quality improvements (migration from B/W slowscan to color-hd to 4K to THz) Spread of body-cams, road-cams, car-cams, public space surveillance nets Paperwork becoming digital/electronic Internet of Things making environmental impacts of individual behaviours easier to monitor, record and attribute.
15 Because a growing number of human activities leave traces in the environment which can be automatically sensed, the distinction between personal data & Internet of Things data is becoming uncertain Obtaining informed consent of data subjects is difficult when the data is collected automatically by sensors that are not specifically targetted and subjects are not aware of being sensed Several broad derogations for law enforcement in new EU Directive 2016/680 but conditions for applying them need deeper analysis and probably evaluation by ECHR and EDPC
16 A study of anonymised credit card transactions by 1.1 million people in 10,000 stores found that an average of 4 random pieces of information were enough to re-identify 90% of card users unambiguously The old model of anonymity doesn t seem to be the right model when we are talking about large-scale metadata. ---Yves-Alexandre de Montjoye The study s lead author quoted in Natasha Singer, With a Few Bits of Data, Researchers Identify Anonymous People, New York Times, 29 January 2015
17 In the context of Big Data, it is crucial to note that the processing of non-sensitive data can lead, through data mining, to the generation of data that reveals sensitive information. --- Big Data and Smart Devices and their Impact on Privacy, study for the EuroParliament s LIBE Committee (2015)
18 Biometric data: increasingly fit for purpose Automated fingerprint algorithms [for matching & identification] have improved by an order of magnitude in the past ten years... Identification based on facial recognition is accurate in controlled conditions in 99 cases out of A clear trend towards increasing fusion of such biometric modalities to improve performance and accuracy is emerging In terms of law enforcement, the prevailing trend is towards multibiometrics ---Biometrics in Large-scale IT, eu-lisa (2015) - e-scale%20it.pdf
19 Is big data personal data? More often than not, yes. It is personal data. Businesses and governments want to know what people are doing Even better, they want to anticipate their behaviour. Ideally, they would like to change their behaviour. --- Giovanni Buttarelli European Data Protection Supervisor Living in a future Big Data world: can prosperity, freedom and fundamental rights be reconciled? speech delivered on 27 February 2016
20 Privacy protection considerations EU requirements for handing personal data Personal data according to Directive 95/46/EC is any information relating to an identified or identifiable natural person ('data subject') Particularly for data controllers, different requirements apply to the handling of personal data than to nonpersonal data
21 What drives dataset growth? Shrinking cost & size of electronic sensors, processors, recorders & storage Hard drive cost per gigabyte Processor cost per MIPS Average price of image sensors & accelerometers RAM price per MB
22 There s a conundrum here The decreasing cost of storage & processing encourages retention of useless & obsolete data, because the relative cost of discarding data that could someday prove useful grows ever larger. Thus the relevance & reliability (the quality ) of stored data gradually decreases as the quantity increases.
23 Integrating diverse datasets & applying machine-learning/neuralnet algorithms can show patterns & relationships not evident in individual datasets. But it can also add knowledge of uncertain validity, based on unknown rules & variables, enlarging the scope for speculation, suspicion & false positive identifications.
24 Machine Learning Complex and often inscrutable, even at times to their programmers, machine learning models are starting to be used in areas such as credit offers, entrepreneurial funding or hiring. As these methods continue to advance, it may become more difficult to explain or account for the decisions machines make through this process unless mechanisms are built into their designs to ensure accountability. ---Office of the US President, Big Data: A Report on Algorithmic Systems, Opportunity & Civil Rights (May 2016), microsites/ostp/2016_0504_data_discrimination.pdf
25 From Spurious Correlations by Tyler Vigen
26 4 May 2016: New EU Data Protection General Regulation 2016/679 published in Official Journal To be implemented by Member States by 25 May 2018 (2-year transition period) Does not apply to the processing of personal data for national security or prevention, investigation, detection or prosecution of criminal offences or prevention of threats to public security These are covered by Directive 2016/680, also published on 4 May EU Member States must adopt it by 6 May 2018
27 EU Directive 2016/680 - Protection of personal data in the context of law enforcement & criminal justice Replaces Framework Decision 2008/977/JHA Probably the most important change is the further harmonisation of privacy protection rules so country of origin no longer determines which rules apply Also important that the European Data Protection Supervisor s office is expanding to an independent board and replacing the Article 29 Working Group
28 Data management challenges Data subject rights vs data possessor capabilities When is identity knowable? Common vs heterogeneous, application specific & proprietary data standards Metadata tags to regulate processor access, use and re-use? Fairness & privacy protection by design
29 Thanks for your time! Robert Horvitz Senior Consultant SCF Associates Ltd
OPINION ON THE DEVELOPMENT OF SIS II
OPINION ON THE DEVELOPMENT OF SIS II 1 Introduction In an attempt to ensure that the second-generation Schengen information system SIS II complies with the highest standards of data protection, the Joint
More informationA comprehensive approach on personal data protection in the European Union
A comprehensive approach on personal data protection in the Justice Date 1 Main legal instruments on EU level Data Protection Directive 95/46/EC Directive 2002/58/EC on privacy and electronic communications
More informationLIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150
COUNCIL OF THE EUROPEAN UNION Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150 NOTE from : Presidency to : Working Party on Police Cooperation No. prev. doc.: 11784/08
More informationThe European Union approach to Biometrics
The European Union approach to Biometrics gerald.santucci@cec.eu.int Head of Unit Trust & Security European Commission Directorate General Information Society The Biometric Consortium Conference 2003 1
More informationHorizon 2020 Secure Societies WP 2017 Border Security and External Security (BES)
Horizon 2020 Secure Societies WP 2017 Border Security and External Security (BES) DG Migration and Home Affairs Paolo Salieri Border Security and External Security Development of technologies, capabilities
More informationetning_2015_web.pdf
DPA: Datatilsynet (Denmark) TITLE: Datatilsynets årsberetning 2015 DATE: July 2016 KEY WORDS: annual report, international cooperation WEBSITE LINK: https://www.datatilsynet.dk/fileadmin/user_upload/dokumenter/aarsberetninger/datatilsynets_arsber
More informationTO INSPIRE, CONNECT AND EMPOWER TO TURN BACK CRIME
INTERPOL FOUNDATION TO INSPIRE, CONNECT AND EMPOWER TO TURN BACK CRIME TOGETHER WE CAN MAKE THE WORLD SAFER Every age is defined by the innovations it brings, the way in which it responds to the major
More informationStrategic and operational threat analysis at Europol's EC3
Strategic and operational threat analysis at Europol's EC3 Dr. Philipp Amann, MSc Senior Strategic Analyst Team Leader Strategy & Development ENISA Workshop on EU Threat Landscape Europol Unclassified
More informationBig Data - Security with Privacy
Big Data - Security with Privacy Elisa Bertino CS Department, Cyber Center, and CERIAS Purdue University Cyber Center Today we have technologies for Acquiring and sensing data Transmitting data Storing,
More informationProject CyberSouth Cooperation on cybercrime in the Southern Neighbourhood
Project CyberSouth Cooperation on cybercrime in the Southern Neighbourhood Project concept 1 Version 1 July 2017 Project title / number (2017/DG1/JP/3692): CyberSouth Cooperation on cybercrime in the Southern
More informationSTATEMENT OF STRATEGY
STATEMENT OF STRATEGY 2014-2016 OUR MISSION OUR MANDATE ANALYSIS OF OUR ENVIRONMENT Opportunities Challenges HIGH-LEVEL GOALS STRATEGIES PERFORMANCE INDICATORS Our Mission To protect the individual s right
More information15412/16 RR/dk 1 DGD 1C
Council of the European Union Brussels, 12 December 2016 (OR. en) 15412/16 ENFOPOL 484 ENV 791 ENFOCUSTOM 235 OUTCOME OF PROCEEDINGS From: General Secretariat of the Council On: 8 December 2016 To: Delegations
More informationStatement of Chief Richard Beary President of the International Association of Chiefs of Police
Statement of Chief Richard Beary President of the International Association of Chiefs of Police Subcommittee on Counterterrorism and Intelligence Committee on Homeland Security United States of House of
More informationHigh-level expert group on information systems and interoperability. Third meeting 29 November Report
Ref. Ares(2017)256550-17/01/2017 EUROPEAN COMMISSION DIRECTORATE-GENERAL MIGRATION and HOME AFFAIRS Directorate B: Migration and Mobility Unit B.3: Information System for Borders and Security High-level
More informationNEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES
NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES Kristina Doda & Aleksandar Vanchoski Budapest, CEPOL conference 2017 New technologies - new social interactions and economic development - need
More informationThe commission communication "towards a general policy on the fight against cyber crime"
MEMO/07/199 Brussels, 22 May 2007 The commission communication "towards a general policy on the fight against cyber crime" The use of the term cyber crime in this communication There is no agreed definition
More informationPromoting Global Cybersecurity
Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures
More informationChina and International Governance of Cybercrime
China and International Governance of Cybercrime Prof. Dr. Shenkuo WU Law Professor of CCLS, Beijing Normal University Head of Research Centre of Internet Society of China Consultant of Supreme Court of
More informationPresented by: - Anselm Charles ICT Manager CARICOM IMPACS
Presented by: - Anselm Charles ICT Manager CARICOM IMPACS Outline Introduction to CARICOM IMPACS What is Cybersecurity? CARICOM & Cybersecurity CARICOM Cyber Security and Cybercrime Action Plan (CCSCAP)
More informationPUBLIC COUNCIL OF THE EUROPEAN UNION. Brussels, 26 May /03 LIMITE SIRIS 47 CATS 34 ASIM 31 COMIX 330
Conseil UE COUNCIL OF THE EUROPEAN UNION Brussels, 26 May 2003 9808/03 LIMITE PUBLIC SIRIS 47 CATS 34 ASIM 31 COMIX 330 NOTE from : Presidency to : COREPER/Member States meeting within the Council/Council
More informationCouncil of the European Union Brussels, 28 February 2019 (OR. en)
Council of the European Union Brussels, 28 February 2019 (OR. en) 6684/1/19 REV 1 LIMITE CT 16 COSI 33 COPS 51 ENFOPOL 99 COTER 25 SIRIS 39 FRONT 73 CATS 28 JAI 180 NOTE From: To: Subject: Presidency Permanent
More informationDepartment of Justice Policing and Victim Services BUSINESS PLAN
Policing and Victim Services BUSINESS PLAN 2004-2005 1. The Creation of a New Division The was created in 2001 by joining the former Divisions: Policing and Public Safety Services and Victims Services.
More informationCCTV Privacy Impact Assessment
CCTV Privacy Impact Assessment Camera No. DW_84 Date of Review: April 2019 Camera No.: DW_84 County: Powys Town: Welshpool Location: On the junction of Church Street and Severn Street Primary View Purpose:
More informationWhat is GDPR? https://www.eugdpr.org/ Editorial: The Guardian: August 7th, EU Charter of Fundamental Rights, 2000
GDPR: The basics What is GDPR? The EU General Data Protection Regulation (GDPR) is the biggest European shake-up of data protection in a generation. It s the culmination of two decades of experience of
More informationURBAN SECURITY. Protecting urban citizens
w w w. t h a l e s g r o u p. c o m 2 Growing urbanisation is a distinctive trait of the 21 st century: half of the Earth s current population of 7 billion lives in towns and cities; according to UN forecasts,
More informationPOMONA EUROPE ADVISORS LIMITED
POMONA EUROPE ADVISORS LIMITED Personal Information Notice Pomona Europe Advisors Limited (Pomona, we/us/our) wants you to be familiar with how we collect, use and disclose personal information. This Personal
More informationNetherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice
Netherlands Cyber Security Strategy Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice 1 Netherlands: small country, big time vulnerable #1 80% online banking 95% youth uses
More informationData Protection Regulations and International Data Flows: Implications for Trade and Development
Data Protection Regulations and International Data Flows: Implications for Trade and Development Cécile Barayre (cecile.barayre@unctad.org) Economic Affairs Officer, ICT Analysis Section Division on Technology
More informationAssistant Secretary-General Michèle Coninsx Executive Director, CTED
High-Level Conference of Heads of Counter-Terrorism Agencies Opportunities and challenges in strengthening international cooperation through the sharing of information, expertise and resources United Nations
More informationDISCLOSURE ON THE PROCESSING OF PERSONAL DATA LAST REVISION DATE: 25 MAY 2018
DISCLOSURE ON THE PROCESSING OF PERSONAL DATA LAST REVISION DATE: 25 MAY 2018 Introduction This disclosure on the processing of personal data (hereinafter, the "Disclosure") is provided pursuant to Art.
More informationRequirements on new data protection regulations and current changing needs from the view of the EDPS
Requirements on new data protection regulations and current changing needs from the view of the EDPS 10/11/2015, Berlin Wojciech Wiewiórowski ISSE 2015. Making Europe a safer place to do business M. Narojek
More informationPRIVACY IMPACT ASSESSMENT CONDUCTING A PRIVACY IMPACT ASSESSMENT ON SURVEILLANCE CAMERA SYSTEMS (CCTV)
PRIVACY IMPACT ASSESSMENT CONDUCTING A PRIVACY IMPACT ASSESSMENT ON SURVEILLANCE CAMERA SYSTEMS (CCTV) 1 Principle 2 of the surveillance camera code of practice states that the use of a surveillance camera
More informationCall for expression of interest in leadership roles for the Supergen Energy Networks Hub
Call for expression of interest in leadership roles for the Supergen Energy Networks Hub Call announced: 4 th September 2017 Deadline for applications: Midday 29 th September 2017 Provisional decision
More informationH2020-LEIT-ICT WP European Data Infrastructure ICT-13 Supporting the emergence of data markets and the data economy
H2020-LEIT-ICT WP2018-2020 European Data Infrastructure ICT-13 Supporting the emergence of data markets and the data economy Kimmo Rossi DG CNECT.G1 Data Policy and Innovation Unit Problem statement Sharing
More informationATA DRIVEN GLOBAL VISION CLOUD PLATFORM STRATEG N POWERFUL RELEVANT PERFORMANCE SOLUTION CLO IRTUAL BIG DATA SOLUTION ROI FLEXIBLE DATA DRIVEN V
ATA DRIVEN GLOBAL VISION CLOUD PLATFORM STRATEG N POWERFUL RELEVANT PERFORMANCE SOLUTION CLO IRTUAL BIG DATA SOLUTION ROI FLEXIBLE DATA DRIVEN V WHITE PAPER Create the Data Center of the Future Accelerate
More informationPrivacy by Design, Security by Design
Privacy by Design, Security by Design Dai Davis Chartered Engineer and Solicitor Percy Crow Davis & Co Session ID: PNG 302 Session Classification: General Interest Privacy by Design Original data protection
More informationCommonwealth Cyber Declaration
Commonwealth Cyber Declaration Recognising that the development of cyberspace has made a powerful contribution to the economic, social, cultural and political life of the Commonwealth; Underlining that
More informationH2020 & THE FRENCH SECURITY RESEARCH
H2020 & THE FRENCH SECURITY RESEARCH JANUARY 22, 2013 WISG 2013 / TROYES LUIGI REBUFFI CEO EUROPEAN ORGANISATION FOR SECURITY WWW.EOS EU.COM PRESIDENT CSOSG STEERING COMMITTEE European Organisation for
More informationDie Koordinierung der Frequenzpolitik und aktuelle Rechtsfragen der Roaming- Verordnung
Die Koordinierung der Frequenzpolitik und aktuelle Rechtsfragen der Roaming- Verordnung Peter Stuckmann*, Policy Coordinator Spectrum DG Communications Networks, Content and Technology (DG CONNECT) European
More informationPackage of initiatives on Cybersecurity
Package of initiatives on Cybersecurity Presentation to Members of the IMCO Committee Claire Bury Deputy Director-General, DG CONNECT Brussels, 12 October 2017 Building EU Resilience to cyber attacks Creating
More informationThe 3 T s driving the global commercial security market technology, terrorism and theft
The Leading Trade Fair for Safety, Security & Fire Protection 22 24 January, 2017 Dubai, UAE The 3 T s driving the global commercial security market technology, terrorism and theft ABSTRACT Summarising
More informationcenter Guide to GDPR
Guide Emailcenter Guide to GDPR For Marketers Contents Introduction...3 What Is GDPR & Why Is This Happening?...4 What Is Going To Change?...5 How You Obtain Email Addresses...6 How You Store Personal
More informationESSA Q INTEGRITY REPORT
ESSA Q3 2017 INTEGRITY REPORT EDITORIAL ESSA held its first major event on sports betting and integrity at Lords Cricket ground in mid-october. It was fitting that the event took place at the home of cricket,
More informationCouncil of the European Union Brussels, 23 November 2016 (OR. en)
Conseil UE Council of the European Union Brussels, 23 November 2016 (OR. en) 13323/1/16 REV 1 LIMITE PUBLIC DAPIX 173 ENFOPOL 349 ENFOCUSTOM 163 COSI 156 GENVAL 107 AVIATION 210 NOTE From: To: Subject:
More informationFinancial information: Promoting Data Sharing
Financial information: Promoting Data Sharing Bruno Tissot Head of Statistics and Research Support, Bank for International Settlements (BIS) Secretary of the Irving Fisher Committee on Central Bank Statistics
More informationCOUNTER-TERRORISM. Future-oriented policing projects
COUNTER-TERRORISM Future-oriented policing projects In keeping with its consistent support of international organisations to strengthen the global community, the United Arab Emirates through the Interpol
More informationCOMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2
COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September 2018 Table of Contents 1. Scope, Purpose and Application to Employees 2 2. Reference Documents 2 3. Definitions 3 4. Data Protection Principles
More informationComprehensive Study on Cybercrime
Federal Ministry of Justice and 17 August 2016 Consumer Protection German Comments on the Comprehensive Study on Cybercrime (Draft February 2013) The United Nations Office on Drugs and Crime (UNODC) invited
More informationIssue I. Airport Communication Project
Issue I Airport Communication Project Recommendation 1 Governments are encouraged to continue their financial and technical support to the Airport Communication Project (AIRCOP) of the United Nations Office
More informationIMPORTANT GLOBAL CYBERLAW TRENDS 2017
IMPORTANT GLOBAL CYBERLAW TRENDS 2017 BY PAVAN DUGGAL ADVOCATE, SUPREME COURT OF INDIA PRESIDENT, CYBERLAWS.NET HEAD, PAVAN DUGGAL ASSOCIATES, ADVOCATES The year 2017 promises to be a year of tremendous
More informationThe University of Sheffield CCTV and Body worn cameras (BWC) Privacy Impact Assessment
The University of Sheffield CCTV and Body worn cameras (BWC) Privacy Impact Assessment 1. INTRODUCTION 1.1 This Privacy Impact Assessment (PIA) CCTV and BWC is recommended in The Surveillance Camera Code
More information13268/16 EB/dk 1 DGD 1C
Council of the European Union Brussels, 17 October 2016 (OR. en) 13268/16 OUTCOME OF PROCEEDINGS From: On: 13 October 2016 To: General Secretariat of the Council Delegations No. prev. doc.: 12583/16 Subject:
More informationLeading the Digital Transformation from the Centre of Government
37th Meeting of Senior Officials from Centres of Government Leading the Digital Transformation from the Centre of Government Dublin, Ireland, 8-9 November 2018 Agenda 2 GOV/PGC/MPM/A(2018)1/REV1 19.00
More informationLTE in Industry Verticals: Market Opportunities and Forecasts
LTE in Industry Verticals: Market Opportunities and Forecasts 2013 2018 January 2013 Overview: There is a rapidly growing demand for broadband-enabled data applications within certain vertical market segments
More informationCyber Security Strategy
Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from
More informationNational Communications Authority
National Communications Authority - Press Release The International Workshop on Criminal Justice Statistics on Cybercrime and Electronic Evidence Opens in Accra A three-day International Workshop on Criminal
More informationMotorola Mobility Binding Corporate Rules (BCRs)
Motorola Mobility Binding Corporate Rules (BCRs) Introduction These Binding Privacy Rules ( Rules ) explain how the Motorola Mobility group ( Motorola Mobility ) respects the privacy rights of its customers,
More informationA Modern European Data Protection Framework
A Modern European Data Protection Framework India, March 2018 Ralf Sauer European Commission, DG Justice Outline 1) 1. The new EU data protection framework 2) 2. The transition period 3) 3. GDPR: trust,
More information2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021
2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021 Paper development coordinated by Brian Pittack, DHS/Immigrations and Customs Enforcement This is a community-developed document.
More informationBuilding a Europe of Knowledge. Towards the Seventh Framework Programme
Building a Europe of Knowledge Towards the Seventh Framework Programme 2007-2013 FP7 /1 EUROPEAN COMMISSION - Research DG - November 2005 EU research: the story so far 1952: ECSC treaty; first projects
More informationCardiff University Security & Portering Services (SECTY) CCTV Code of Practice
Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice Document history Author(s) Date S Gamlin 23/05/2018 Revision / Number Date Amendment Name Approved by BI annual revision Date
More informationIntroductory Speech to the Ramboll Event on the future of ENISA. Speech by ENISA s Executive Director, Prof. Dr. Udo Helmbrecht
Introductory Speech to the Ramboll Event on the future of ENISA Speech by ENISA s Executive Director, Prof. Dr. Udo Helmbrecht BRUSSELS 22 ND MARCH 2017 www.enisa.europa.eu European Union Agency For Network
More informationLAWGIX LAWYERS, LLC. External Privacy Policy Policy ID: 3214 Date Last Revised: January 16, Internal Use Only 1
LAWGIX LAWYERS, LLC External Privacy Policy Policy ID: 3214 Date Last Revised: January 16, 2019 1 Document Summary Policy Title: Procedure Owner: External Privacy Policy Steering Committee Effective Date:
More informationDo you handle EU residents personal data? The GDPR update is coming May 25, Are you ready?
European Union (EU) General Data Protection Regulation (GDPR) Do you handle EU residents personal data? The GDPR update is coming May 25, 2018. Are you ready? What do you need to do? Governance and Accountability
More informationPolicy recommendations. Technology fraud and online exploitation
Policy recommendations Technology fraud and online The opportunity Cloud computing is revolutionizing how people work, learn, interact, and play. Education is just one example as a new generation of cloud-based
More informationProposal for a Regulation on Privacy and Electronic Communications
Proposal for a Regulation on Privacy and Electronic Communications reinforcing trust and security in the Digital Single Market #eprivacy17 Brussels, January 2017 eprivacy European Commission proposal Agenda
More informationServiceable Luminaires in a Circular Economy - White Paper -
Serviceable Luminaires in a Circular Economy - White Paper - LIGHTINGEUROPE 1. Introduction scope and objective of this White Paper LightingEurope members have a long experience in dealing with aspects
More informationSecurity and resilience in Information Society: the European approach
Security and resilience in Information Society: the European approach Andrea Servida Deputy Head of Unit European Commission DG INFSO-A3 Andrea.servida@ec.europa.eu What s s ahead: mobile ubiquitous environments
More informationVersion 11
The Big Challenges Networked and Electronic Media European Technology Platform The birth of a new sector www.nem-initiative.org Version 11 1. NEM IN THE WORLD The main objective of the Networked and Electronic
More informationDECISION 09/2016/GB OF THE GOVERNING BOARD OF THE EUROPEAN POLICE COLLEGE ADOPTING THE LIST OF ACTIVITIES 2017
DECISION 09/2016/GB OF THE GOVERNING BOARD OF THE EUROPEAN POLICE COLLEGE ADOPTING THE LIST OF ACTIVITIES 2017 Adopted by the Governing Board on 24 May 2015 THE GOVERNING BOARD, Having regard to Council
More informationENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010
ENISA & Cybersecurity Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010 Agenda Some Definitions Some Statistics ENISA & Cybersecurity Conclusions
More informationAutomatic Number Plate Recognition (ANPR) ANPR Strategy Infrastructure Development
Automatic Number Plate Recognition (ANPR) ANPR Strategy 2016-2020 Infrastructure Development Version 1 July 2017 Document Control Change Control Version Date Change Author 0.1 1 June 2016 Initial draft
More informationHitachi Visualization Suite
The Problem and Solution Your single pane of glass for the Smart City Over the past few years, the majority of public and private organizations have implemented a diverse set of systems to protect their
More informationSeventh Framework Programme Security Research. Health Security Committee CBRN Section. 30 September by Clément Williamson
Seventh Framework Programme 2007-2013 Security Research Health Security Committee CBRN Section 30 September 2009 by Clément Williamson clement.williamson@ec.europa.eu Work programme 2009 Info Day European
More informationGeneral Data Protection Regulation: Knowing your data. Title. Prepared by: Paul Barks, Managing Consultant
General Data Protection Regulation: Knowing your data Title Prepared by: Paul Barks, Managing Consultant Table of Contents 1. Introduction... 3 2. The challenge... 4 3. Data mapping... 7 4. Conclusion...
More informationETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive)
ETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive) July 2013 Executive Summary ETNO supports the European Commission s global approach to cyber-security
More informationDevelopments in Global Data Protection & Transfer: How They Impact Third-Party Contracts
Developments in Global Data Protection & Transfer: How They Impact Third-Party Contracts Rebecca Eisner Partner +1 312 701 8577 reisner@mayerbrown.com Mark Prinsley Partner +44 20 3130 3900] mprinsley@mayerbrown.com
More informationSussex Police Business Crime Strategy
Sussex Police Business Crime Strategy 2014-2016 Sussex Police Serving Sussex www.sussex.police.uk Foreword Sussex Police recognise that businesses are a vital part of our local communities and are essential
More informationToward Horizon 2020: INSPIRE, PSI and other EU policies on data sharing and standardization
Toward Horizon 2020: INSPIRE, PSI and other EU policies on data sharing and standardization www.jrc.ec.europa.eu Serving society Stimulating innovation Supporting legislation The Mission of the Joint Research
More informationCyber Security Roadmap
Cyber Security Roadmap The Hague, 25 May 2011 Security: Developing a Secure Cyberspace Protecting the 5 th Domain As with land, sea, air and space, a safe Cyberspace is crucial for our societies. Different
More informationDifferentiating with services
KONE CMD 2017 Differentiating with services HUGUES DELVAL, EXECUTIVE VICE PRESIDENT, SERVICE BUSINESS SEPTEMBER 29, 2017 AGENDA STRONG PERFORMANCE IN SERVICES EXCELLENT GROWTH OPPORTUNITIES FURTHER IMPROVING
More informationRe: Special Publication Revision 4, Security Controls of Federal Information Systems and Organizations: Appendix J, Privacy Control Catalog
April 6, 2012 National Institute of Standards and Technology 100 Bureau Drive, Stop 1070 Gaithersburg, MD 20899-1070 Re: Special Publication 800-53 Revision 4, Security Controls of Federal Information
More informationGeneral Data Protection Regulation. May 25, 2018 DON T PANIC! PLAN!
General Data Protection Regulation May 25, 2018 DON T PANIC! PLAN! Protect the human behind the data record. On May 25, 2018 the General Data Protection Regulation (GDPR) is entering into force. It requires
More informationQBPC s Mission and Objectives
QBPC s Mission and Objectives Mission To make contributions to facilitate and promote continuous improvements in administrative and judicial protection for intellectual property in China; to enable the
More informationDevelopment of a renewed European Union Internal Security Strategy. Justice and Home affairs Council meeting Brussels, 4 December 2014
Council of the European Union PRESS EN COUNCIL CONCLUSIONS Brussels, 4 December 2014 Development of a renewed European Union Internal Security Strategy Justice and Home affairs Council meeting Brussels,
More informationExploring the European Commission s Network and Information Security Directive (NIS) What every CISO should know
Exploring the European Commission s Network and Information Security Directive (NIS) What every CISO should know Aristotelis Tzafalias Programme Officer, Trust and Security DG Communications Networks,
More information2. Taking into account the developments in the next five years, which are the actions to be launched at the EU level?
1. Which specific challenges need to be tackled by EU action in the coming five years regarding international crime, radicalisation and terrorism, cybercrime and cyber-attacks, natural and man-made disasters?
More informationSyed Ismail Shah, PhD Chairman, PTA,
Preparing for the Changing Rules of the Game Syed Ismail Shah, PhD Chairman, PTA, e-mail: ismail@pta.gov.pk Sequence Presentation Outline 2 Paradigm Shift in Telecom Sector-OTT Services Difference Between
More informationFeasibility study and cost assessment of the establishment of a centralised ECRIS TCN solution
Feasibility study and cost assessment of the establishment of a centralised ECRIS TCN solution June 13, 2017 V5.00 Final Version This study was carried out for the European Commission Directorate-General
More informationSecurity Challenges with ITS : A law enforcement view
Security Challenges with ITS : A law enforcement view Central Observatory for Intelligent Transportation Systems FRENCH MINISTRY OF INTERIOR GENDARMERIE NATIONALE Colonel Franck MARESCAL franck.marescal@gendarmerie.interieur.gouv.fr
More informationCybersecurity & Digital Privacy in the Energy sector
ENERGY INFO DAYS Brussels, 25 October 2017 Cybersecurity & Digital Privacy in the Energy sector CNECT.H1 Cybersecurity & Digital Privacy, DG CNECT ENER.B3 - Retail markets; coal & oil, DG ENER European
More informationData Protection in Switzerland Update Following the Safe Harbor Decision. 21 October 2015 / 6 February 2016 Christian Wyss
Data Protection in Switzerland Update Following the Safe Harbor Decision 21 October 2015 / 6 February 2016 Christian Wyss Agenda Data Protection in Switzerland The Safe Harbor Decision How to Restore Compliance?
More informationScope of the Member State mechanism
FIRST MEETING OF THE MEMBER STATE MECHANISM ON SUBSTANDARD/SPURIOUS/FALSELY-LABELLED/ 2 November 2012 FALSIFIED/COUNTERFEIT MEDICAL PRODUCTS Provisional agenda item 4 Scope of the Member State mechanism
More informationΚΕΝΤΡΟ ΜΕΛΕΤΩΝ ΑΣΦΑΛΕΙΑΣ CENTER FOR SECURITY STUDIES
ΚΕΝΤΡΟ ΜΕΛΕΤΩΝ ΑΣΦΑΛΕΙΑΣ CENTER FOR SECURITY STUDIES Under which conditions is an investigation authorised/permitted? Which are the legal boundaries and the applicable operational rules? Is the Data Protection
More informationPOLYBIO Multibiometrics Database: Contents, description and interfacing platform
POLYBIO Multibiometrics Database: Contents, description and interfacing platform Anixi Antonakoudi 1, Anastasis Kounoudes 2 and Zenonas Theodosiou 3 1 Philips College, 4-6 Lamias str. 2001, P.O. Box 28008,
More information10007/16 MP/mj 1 DG D 2B
Council of the European Union Brussels, 9 June 2016 (OR. en) 10007/16 OUTCOME OF PROCEEDINGS From: On: 9 June 2016 To: General Secretariat of the Council Delegations No. prev. doc.: 9579/16 + COR 1 Subject:
More informationWorkshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats
Workshop on Cyber Security & Cyber Crime Policies Policies for African Diplomats ROLE OF INTERPOL IN FIGHTING CYBERCRIME IN AFRICA SRIAU Office Augusto de CARVALHO 12-13 APRIL 2018 ADDIS ABABA OVERVIEW
More informationMINISTRY OF INTERNAL AFFAIRS OF GEORGIA INTELLIGENCE-LED POLICING IN GEORGIA
MINISTRY OF INTERNAL AFFAIRS OF GEORGIA INTELLIGENCE-LED POLICING IN GEORGIA GEORGIA Location: South Caucasus Area: 69 700 km 2 Population: 3 729 500 (2015 census) GDP per capita: 3676 USD Prevailing religion:
More informationPROVIDING INVESTIGATIVE SOLUTIONS
PROVIDING INVESTIGATIVE SOLUTIONS Experienced Professionals Northeast Intelligence Group, Inc. (NEIG) has been helping clients meet challenges for more than twenty years. By providing meaningful and timely
More informationHEALTH INFORMATION INFRASTRUCTURE PROJECT: PROGRESS REPORT
HEALTH INFORMATION INFRASTRUCTURE PROJECT: PROGRESS REPORT HCQI Expert Group Meeting 7-8 November 2013 Agenda to improve health information infrastructure» In 2010, health ministers called for improvement
More information