Developing and Implementing Data Protection Law: Malaysia and Beyond
|
|
- Gerard Nicholson
- 5 years ago
- Views:
Transcription
1 Developing and Implementing Data Protection Law: Malaysia and Beyond Professor Abu Bakar Munir Faculty of Law, University of Malaya Malaysia K&K Advocates - Expert Panel Discussion on Data Protection Jakarta, 28 March Some of my Books & Latest Works on ICT & Data Protection Law Cyber Law: Policies and Challenges Butterworths Asia (1999) Privacy and Data Protection Sweet & Maxwell (2002) z Internet Banking: Law and Practice LexisNexis UK (2004) Information & Communication Technology Law Legal & Regulatory Challenges Thomson Reuters (2010)
2 Cont Protection in Malaysia Sweet & Maxwell (2010) Data Protection Law In Singapore Singapore Academy of Law (2014) Data Protection Law in Asia Sweet & Maxwell (2014) Second Edition (April )
3
4 Recent speaking engagements (invitations) Securing the digital economy - Trust, Privacy and Transparency, New Delhi, India, February Data Protection Regulation in Asia: A Comparative Analysis, NUS, Singapore, 9 February Invited Guest Lecture, Bangor Law, University of Bangor, United Kingdom, 25 January. Asia - Europe Dialogue on Growing the Digital Economy, Washington, D.C, 6-7 November International Conference on Law and Governance in Global Context (LGGC), University of Indonesia, Jakarta, 1-2 November Seminar on Big Data: Dealing with the New Oil in the Digital Economy, University of Atmajaya, Jakarta, 31 October International Institute of Communications Annual Conference, Brussels, October UN Conference, Asian Perspectives for Privacy as a Global Human Right, University of Hong Kong, September th International Conference of Data Protection and Privacy Commissioners ( ICDPPC ), Shang-ri La Hong Kong, September 2017 Asian Privacy Scholars Network International Conference, University of Hong Kong, 27 September International Seminar on Academic Network on Competition Policy, Building Knowledge Hub and Regional Expertise Towards the Harmonisation of Competition Policy in East Asian Region, Bali, 6 September Research & Consultancy Developed the National Human Rights Action Plan for Malaysia (RM 3.3 million) Legal and Regulatory Aspects of Blockchain Technology (QRC International RM 300,000 ) Cross-Boarder Data Transfer (ABLI Singapore) Data Protection Law in Asia (2 nd Edition, Thomson Reuters Hong Kong) Developing the Data Breach Notification Rules and Guidelines for the Department of Protection, Malaysia.
5 Data Protection Law: WHY? Human Right Consumer protection To make countries more competitive outsourcing centre, big data hub, smart nation, etc. International business Consumer demand International/ Regional Instruments OECD Guidelines 1980 Council of Europe Convention 1985 APEC Privacy Framework 1995 EU Data Protection Directive 2004 EU General Data Protection Regulation (May )
6 Hong Kong Some Recent Developments in Asia EU Adequacy Ruling on Japan Expected Singapore joins APEC CBPR March South Korea in the Pipeline for Adequacy Decision Indonesia s New Regulation on Personal Data Protection Strengthening the data protection ecosystem in Singapore through the work of PDPC Malaysia publishes draft "White List" for personal data exports
7 India's Supreme Court Recognises The Right to Privacy. Principle Petitioner Justice KS Puttaswamy 547 page judgement Asian Laws: A comparative overview Malaysia 2010 Taiwan 2010 Singapore 2012 Philippines Data Privacy Act 2012 Japan Personal Information 2003 Hong Kong (Privacy) Ordinance 1995 Korea Personal Information 2011 Indonesia Draft law Thailand Draft law Data Protection Principles?? Rights of Data Subjects?? Special enforcement entity X?? Exemption to public agency X X X X X??
8 Malaysia 2010 Taiwan 2010 Singapore 2012 Philippines Data Protection Act 2012 Japan Personal Information 2003 Hong Kong (Privacy) Ordinance 1995 Korea Personal Information 2011 Indonesia Draft law Thailand Draft law Mandatory data breach notification to the Data Subject X X X X (encouraged)?? Mandatory reporting to the Authority X X X X X (encouraged)?? Differentiate personal data & sensitive data X?? Mediation to resolve dispute X X X X X?? Organisation must designate someone to take charge (DPO) X X X X (encouraged)?? Malaysia 2010 Taiwan 2010 Singapore 2012 Philippines Data Protection Act 2012 Japan Personal Information 2003 Hong Kong (Privacy) Ordinance 1995 Korea Personal Information 2011 Indonesia Draft law Thailand Draft Law Registration X X X X X X?? Civil and criminal remedies X?? Data Protection Impact Assessment X X X X X X?? Financial penalty by Regulator X X X X X??
9 Enforcement in Malaysia and Singapore Malaysia - Subsidiary Legislations Determination of the effective date of enforcement Appointment of commissioner Protection of personal data (data user group) Rules of personal data protection Regulations protection of personal data (user registration data) Rules of personal data protection (fees) Personal data protection standard Rules on compounding of offences
10 Code of Practice PDP Code of Practice for the Banking and Financial Sector PDP Code of Practice for the Utility Sector (Electricity) PDP Code for the Insurance and Takaful Industry PDP Code for Licensees under the CMA 1998 (Telcos and Multimedia Companies) Complaints received
11 Complaints in Communication Education Financial ector Direct Marketing Insurance Services Health Real Estate Utility No. SECTOR OFFENCES PENALTY 1 Tourism ( HOTEL ) 1.Section 16(4) Processing personal data without authorisation of the Commissioner 2.Section 5(2) Processing personal data without consent of data subject Fine of RM 8 Months Imprisonment Fine of RM 8 Months Imprisonment 2 Education ( IPTS ) 1.Section 16(4) Processing personal data without authorisation of the Commissioner Fine of RM 10, or 3 Months Imprisonment 3 Services ( Employment Agency ) 1.Section 16(4) Processing personal data without authorisation of the Commissioner Fine of RM 10,000.00
12 Singapore Advisory Guidelines Advisory Guidelines on Key Concepts in the (revised on 27 July 2017) Advisory Guidelines on the for Selected Topics (revised on 28 March 2017) Advisory Guidelines on the Do Not Call Provisions (revised on 27 July 2017) Advisory Guidelines on Requiring Consent for Marketing Purposes (published on 8 May 2015) Advisory Guidelines on Enforcement of Data Protection Provisions (published 21 April 2016) Advisory Guidelines on Application of PDPA to Election Activities (published 8 August 2017) Sector Specific Guidelines Advisory Guidelines for the Telecommunication Sector (published on 16 May 2014) Advisory Guidelines for the Real Estate Agency Sector (published on 16 May 2014) Advisory Guidelines for the Education Sector (published on 11 Sep 2014) Advisory Guidelines for the Healthcare Sector (updated on 28 March 2017) Industry led guidelines LIA Code of Practice for Life Insurers on the Singapore Protection Act (published on 1 Apr 2015) LIA Code of Conduct for Tied Agents of Life Insurers on the Singapore Personal Data (published on 1 Apr 2015)
13 Other Guides Guide to Notification (published on 11 Sep 2014) Guide to Securing in Electronic Medium (updated on 20 January 2017) Guide to Managing Data Breaches (published on 8 May 2015) Guide on Building Websites for SMEs (updated on 20 January 2017) Guide to Disposal of on Physical Medium (updated on 20 January 2017) Guide to Preventing Accidental Disclosure When Processing and Sending (published 20 January 2017) Guide to Data Sharing (revised on 1 February ) Guide to Developing a Data Protection Management Programme (published on 1 November 2017) Guide to Data Protection Impact Assessments (published on 1 November 2017) Guide to Basic Data Anonymisation Techniques (published on 25 January ) Enforcement Complaints Received
14 Office: Mobile:
Hong Kong s Personal Data (Privacy) Ordinance
Asia Privacy Bridge Forum 11 May 2016 Hong Kong s Personal Data (Privacy) Ordinance Fanny Wong Deputy Privacy Commissioner for Personal Data Hong Kong, China The Personal Data Landscape in Asia 2011 2003
More informationData and Cyber Crisis how to manage a crisis and reduce loss. Melissa Russell Special Counsel February 2016
Data and Cyber Crisis how to manage a crisis and reduce loss Melissa Russell Special Counsel February 2016 Introduction cyber risks Most commonly reported types of economic crime from PwC The causes and
More informationTechnology and data privacy Global perspectives
Technology and data privacy Global perspectives Anna Gamvros, Partner, Hong Kong Barbara Li, Partner, Beijing Ryan Berger, Partner, Vancouver 13 September 2018 Agenda Asia privacy developments HK and China
More informationDevelopments in Global Data Protection & Transfer: How They Impact Third-Party Contracts
Developments in Global Data Protection & Transfer: How They Impact Third-Party Contracts Rebecca Eisner Partner +1 312 701 8577 reisner@mayerbrown.com Mark Prinsley Partner +44 20 3130 3900] mprinsley@mayerbrown.com
More information20/09/2013. Global Privacy and Data Protection: Practical Risk Assessment and Governance. Topics
Global Privacy and Data Protection: Practical Risk Assessment and Governance 9 October 2013 Robert Bond, BA, CCEP, HonMIEx Head of Data Protection and Info Security, Speechly Bircham Marti Arvin, CHC-F,
More informationA Modern European Data Protection Framework
A Modern European Data Protection Framework India, March 2018 Ralf Sauer European Commission, DG Justice Outline 1) 1. The new EU data protection framework 2) 2. The transition period 3) 3. GDPR: trust,
More information2014 Luxury & Fashion Industry Conference for Multinationals
2014 Luxury & Fashion Industry Conference for Multinationals Privacy, Data Protection, and the Impact of Social Media and Online Behavioral Advertising on the Industry Anna Gamvros, Hong Kong Francesca
More informationLaw & Policy Meets Data in the Cloud: Data Sovereignty Across Asia. Bernie Trudel Chairman, Asia Cloud Computing Association
Law & Policy Meets Data in the Cloud: Data Sovereignty Across Asia Bernie Trudel Chairman, Asia Cloud Computing Association 1 Data, Regulation, Jurisdiction and Cloud: A New Geography Lesson Cloud Data
More informationRegulating Cyber: the UK s plans for the NIS Directive
Regulating Cyber: the UK s plans for the NIS Directive September 2017 If you are a digital service provider or operate an essential service then new security and breach notification obligations may soon
More informationData Protection System of Georgia. Nina Sarishvili Head of International Relations Department
Data Protection System of Georgia Nina Sarishvili Head of International Relations Department 14/12/2016 Legal Framework INTERNATIONAL INSTRUMENTS CoE 108 Convention AP on Supervisory Authorities and Trans-
More informationGlobal Privacy and Data Protection Risk:
Global Privacy and Data Protection Risk: Implementing Best Practices Now to Comply with Impending Regulatory Changes 15 September 2014 Robert Bond, CCEP Partner and Notary Public Kristy Grant-Hart, CCEP-I
More informationLiechtenstein. General I Data Protection Laws. Contributed by Wanger Advokaturbüro. National Legislation. National Regulatory Authority.
Contributed by Wanger Advokaturbüro General I Data Protection Laws National Legislation General data protection laws The Data Protection Act (the DPA ) dated 14 March 2002 and the relevant Ordinance on
More informationContributed by Djingov, Gouginski, Kyutchukov & Velichkov
Contributed by Djingov, Gouginski, Kyutchukov & Velichkov General I Data Protection Laws National Legislation General data protection laws The Personal Data Protection Act implemented the Data Protection
More informationIntroduction to the Personal Data (Privacy) Ordinance
Introduction to the Personal Data (Privacy) Ordinance 1 Personal Data (Privacy) Ordinance Legislative Background Personal Data (Privacy) Ordinance came into effect on 20 December 1996 Amendment of the
More informationDisruptive Technologies Legal and Regulatory Aspects. 16 May 2017 Investment Summit - Swiss Gobal Enterprise
Disruptive Technologies Legal and Regulatory Aspects 16 May 2017 Investment Summit - Swiss Gobal Enterprise Legal and Regulatory Framework in Switzerland Legal and regulatory Framework: no laws or provisions
More informationITU-ACMA Asia Pacific Regulators Roundtable July 2014
ITU-ACMA Asia Pacific Regulators Roundtable 2014 21-22 July 2014 Session 2: Evolution of the Regulator Addressing International Concerns Content Page Cyber Security Cross-border Data Flow Interoperability
More informationForum. Ningbo, China 25 February
2014/SOM1/SCE-COW/014 Agenda Item: 4 Telecommunications and Inform ation Working Group Strategic Plan Purpose: Consideration Submitted by: TEL Chair Forum Doc. No.: 2013/SOM3/SCE/017 SOM Steering Committee
More informationIntroduction to the Personal Data (Privacy) Ordinance
Introduction to the Personal Data (Privacy) Ordinance Personal Data (Privacy) Ordinance Legislative Background Personal Data (Privacy) Ordinance came into effect on 20 December 1996 Amendment of the Ordinance
More informationA Regulator s Perspective on Accountability and How to Incentivise It
Centre for Information Policy Leadership (CIPL) Workshop in collaboration with the Singapore Personal Data Protection Commission Implementing Accountability 26 July 2018 A Regulator s Perspective on Accountability
More informationIntroduction to the Personal Data (Privacy) Ordinance
Introduction to the Personal Data (Privacy) Ordinance Personal Data (Privacy) Ordinance Legislative Background Personal Data (Privacy) Ordinance came into effect on 20 December 1996 Amendment of the Ordinance
More informationUniversity Privacy Campaign. Introduction to the Personal Data (Privacy) Ordinance
University Privacy Campaign Introduction to the Personal Data (Privacy) Ordinance 1 Personal Data (Privacy) Ordinance Legislative Background Personal Data (Privacy) Ordinance came into effect on 20 December
More informationAs set out in the Hong Kong ID card, or any relevant identification document referred to in 1(g) above.
As set out in the Hong Kong ID card, or any relevant identification document referred to in 1(g) above. B (1)B (2) * In the case of a non-hong Kong ID cardholder, state the passport number or any identification
More informationEU data security and privacy trends
EU data security and privacy trends Top issues for HR and global mobility 26 29 October 2014 Disclaimer EY refers to the global organization, and may refer to one or more, of the member firms of Ernst
More informationITU Asia-Pacific Centres of Excellence Training on Conformity and Interoperability. Session 2: Conformity Assessment Principles
ITU Asia-Pacific Centres of Excellence Training on Conformity and Interoperability Session 2: Conformity Assessment Principles 12-16 October 2015 Beijing, China Keith Mainwaring ITU Expert Agenda 1. Context
More informationDATA PROTECTION LAWS OF THE WORLD. Bahrain
DATA PROTECTION LAWS OF THE WORLD Bahrain Downloaded: 7 April 2018 BAHRAIN Last modified 25 January 2017 LAW There is currently no standalone data protection law in Bahrain. A draft is being reviewed before
More informationThe practice likely started out as a safeguard in case a visitor commits a crime or sabotage.
PROTECTION FOR YOUR PERSONAL DATA This is an interesting article from Singapore' Straits Times regarding the collection of personal data by building owners. Whether the Malaysian Personal Data Protection
More informationPROJECT BACKGROUND AND RATIONALE
PROJECT BACKGROUND AND RATIONALE The political agreement on the EU General Data Protection Regulation (GDPR) has been reached and the new Regulation will be on the books by the end of the first quarter
More informationLegal framework of ensuring of cyber security in the Republic of Azerbaijan
Legal framework of ensuring of cyber security in the Republic of Azerbaijan Bakhtiyar N.Mammadov Ministry of Communications and Information Technologies Head of Legal and HR Department ITU WSIS Thematic
More informationPrivacy Code of Conduct on mhealth apps the role of soft-law in enhancing trust ehealth Week 2016
Privacy Code of Conduct on mhealth apps the role of soft-law in enhancing trust ehealth Week 2016 Pēteris Zilgalvis, J.D., Head of Unit for Health and Well-Being, DG CONNECT Table of Contents 1. Context
More informationBuilding Trust in the Cloud Era - Protect, Respect Personal Data
Cloud Expo Asia 18 May 2016 Building Trust in the Cloud Era - Protect, Respect Personal Data Stephen Kai-yi Wong Privacy Commissioner for Personal Data, Hong Kong The Hong Kong Data Protection Law The
More informationData Breach Notification: what EU law means for your information security strategy
Data Breach Notification: what EU law means for your information security strategy Olivier Proust December 8, 2011 Hunton & Williams LLP Key points 1. Introduction 2. Overview of data breach requirements
More informationPresented by AI Yuxin, Programme Officer, CSAM
The 2nd Meeting of the Technical Working Groups of the Asian and Pacific Network for Testing of Agricultural Machinery (ANTAM) Presented by AI Yuxin, Programme Officer, CSAM Launched in Bangkok in 2013,
More informationPrivacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information
Privacy Statement Introduction Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information about how IT Support (UK) Ltd handle personal information.
More informationPlan a Pragmatic Approach to the new EU Data Privacy Regulation
AmChamDenmark event: EU Compliant & Cyber Resistant Plan a Pragmatic Approach to the new EU Data Privacy Regulation Janus Friis Bindslev, Partner Cyber Risk Services, Deloitte 4 February 2016 Agenda General
More informationSafeguards on Personal Data Privacy.
Safeguards on Personal Data Privacy. Peter Koo Partner, Enterprise Risk Services Deloitte Touche Tohmatsu Maverick Tam Associate Director, Enterprise Risk Services Deloitte Touche Tohmatsu Deloitte ERS
More information= = = = = = Promotion and Public Educaton
====== Promotion and Public Educaton 37!""# Annual Report 2001-2002 !==$ Report on Acivities Promotion and Public Education $ Promotion and Public Education &'()*+,-./%0 &'()*+,-./0 &'()*+,-./0 In the
More informationASEAN s Cyber Confidence Building Measures
ASEAN s Cyber Confidence Building Measures Presentation by the ASEAN Secretariat UNIDIR Cyber Stability Seminar: Preventing Cyber Conflict 10 February 2014, Geneva, Switzerland Outline ASEAN Mechanisms
More informationData Leak Protection legal framework and managing the challenges of a security breach
Data Leak Protection legal framework and managing the challenges of a security breach ACC Europe's Annual Conference 2009 June 7-9, 2009 Geneva Alexander Duisberg Partner, Bird & Bird LLP About Bird &
More informationENFORCEMENT POWERS. The EU Perspective. Olivier Proust. Associate Hunton & Williams LLP
ENFORCEMENT POWERS The EU Perspective Olivier Proust Associate Hunton & Williams LLP What is enforcement within the EU? Broad sense: Any action leading to better compliance Awareness raising activities
More informationRobert Bond. Respecting Privacy, Securing Data and Enabling Trust a view from Europe
Respecting Privacy, Securing Data and Enabling Trust a view from Europe Robert Bond, Partner & Notary Public Robert Bond Robert Bond has nearly 40 years' experience in advising national and international
More informationCanada s Anti-Spam Law ( CASL ): It s the Law on July 1, 2014 questions for directors to ask
Canada s Anti-Spam Law ( CASL ): It s the Law on July 1, 2014 questions for directors to ask Author: Jennifer Babe, LL.M, ICD.D Why Should I Read This Alert? a) despite its name, this Act covers much more
More informationThe GDPR and NIS Directive: Risk-based security measures and incident notification requirements
The GDPR and NIS Directive: Risk-based security measures and incident notification requirements Adrian Ross LLB (Hons), MBA GRC Consultant IT Governance Ltd 4 May 2017 Introduction Adrian Ross GRC consultant
More informationThe Role of the Data Protection Officer
The Role of the Data Protection Officer Adrian Ross LLB (Hons), MBA GRC Consultant IT Governance Ltd 28 July 2016 www.itgovernance.co.uk Introduction Adrian Ross GRC consultant Infrastructure services
More informationEU DATA PRIVACY COMPLIANCE FOR US DRIVEN PROJECTS
EU DATA PRIVACY COMPLIANCE FOR US DRIVEN PROJECTS 18 May 2014 Monica Salgado Portuguese Laywer (Advogada) / Registered European Lawyer Janine Regan Solicitor Monica Salgado Monica is a Portuguese qualified
More informationISACA National Cyber Security Conference 8 December 2017, National Bank of Romania
C-PROC Cybercrime Programme Office Council of Europe, Bucharest, Romania ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania The role of legislation in enhancing the cyber
More informationPrivacy by Design, Security by Design
Privacy by Design, Security by Design Dai Davis Chartered Engineer and Solicitor Percy Crow Davis & Co Session ID: PNG 302 Session Classification: General Interest Privacy by Design Original data protection
More informationCybersecurity & Spam after WSIS: How MAAWG can help
Cybersecurity & Spam after WSIS: How MAAWG can help MAAWG Brussels Meeting 27-29 June 2006 Robert Shaw Deputy Head ITU Strategy and Policy Unit International Telecommunication Union 28 June 2006 1 Setting
More informationSCCE ECEI 2014 EU DATA PRIVACY COMPLIANCE FOR US DRIVEN PROJECTS. Monica Salgado JANINE REGAN CIPP/E
EU DATA PRIVACY COMPLIANCE FOR US DRIVEN PROJECTS 18 May 2014 Monica Salgado Portuguese Laywer (Advogada) / Registered European Lawyer Janine Regan Solicitor Monica Salgado Monica is a Portuguese qualified
More informationEnterprise with Integrity
1 Competitiveness & Anti-Corruption June 28 th, 2016 By Dr.Bandid Nijathaworn, President & CEO of Thai Institute of Directors 2 Competitiveness is crucial for companies and the economy. 3 Public sector
More informationCountering Spam. ITU-T Study Group 17 Geneva, Switzerland 11 October 2005
Countering Spam ITU-T Study Group 17 Geneva, Switzerland 11 October 2005 Cristina Bueti Strategy and Policy Unit International Telecommunication Union world summit on the information society 1 What is
More informationTHE MADRID PROTOCOL. A single trademark registration supports regional economic integration. A Case Study
THE MADRID PROTOCOL A single trademark registration supports regional economic integration A Case Study The Madrid Protocol: Protecting brands globally The Madrid System for the International Registration
More informationJane Nishida and participants of Group D
International Workshop on EIA System and Implementation in Asia 24-26 February 2015, Tokyo, Japan GROUP DISCUSSION ON EMP AND MONITORING (GROUP D) Jane Nishida and participants of Group D 6 MAIN CHALLENGES
More informationKIN GROUP PTY LTD PRIVACY POLICY
KIN GROUP PTY LTD PRIVACY POLICY 1. Purpose of this policy The Group respects the privacy of the personal information you may provide to it when it deals with you. The way the Group manages your personal
More informationChina and International Governance of Cybercrime
China and International Governance of Cybercrime Prof. Dr. Shenkuo WU Law Professor of CCLS, Beijing Normal University Head of Research Centre of Internet Society of China Consultant of Supreme Court of
More informationKISH REMARKS APEC CBPR NOV 1 CYBER CONFERENCE KEIO Page 1 of 5 Revised 11/10/2016
Page 1 of 5 INTRODUCTION Jim, thank you for the kind introduction. It is an honor to join the panel. Congratulations to Dr. Murai and Dr. Tezuka for the success of the Keio Cybersecurity Center. Congratulations
More informationBenefits of Open Cross Border Data Flows
/SMEWG41/039 Agenda Item: 16.3 Benefits of Open Cross Border Data Flows Purpose: Information Submitted by: United States 41 st Small and Medium Enterprises Working Group Meeting Iloilo, Philippines 23-24
More informationREGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES
REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES Port of Spain 30 September 2015 David Satola Why combatting
More informationPackage of initiatives on Cybersecurity
Package of initiatives on Cybersecurity Presentation to Members of the IMCO Committee Claire Bury Deputy Director-General, DG CONNECT Brussels, 12 October 2017 Building EU Resilience to cyber attacks Creating
More informationDigital Opportunity Index. Michael Minges Telecommunications Management Group, Inc.
Digital Opportunity Index Michael Minges Telecommunications Management Group, Inc. Digital Opportunity Index (DOI) Why How Preliminary results Conclusions WSIS Plan of Action E. Follow-up and evaluation
More informationAction Plan Developed by. Institute of Certified Public Accountants of Uganda BACKGROUND NOTE ON ACTION PLANS
BACKGROUND NOTE ON ACTION PLANS Action Plans are developed by IFAC members and associates to address policy matters identified through their responses to the IFAC Compliance Self-Assessment Questionnaires.
More informationChanging times in Swiss Data Privacy: new opportunities? Microsoft Security Day 27 April 2017 Clara-Ann Gordon
Changing times in Swiss Data Privacy: new opportunities? Clara-Ann Gordon Which countries have Data Protection Laws? Source: https://www.taylorwessing.com/globaldatahub/risk_map.html Page 2 Different Data
More informationA comprehensive approach on personal data protection in the European Union
A comprehensive approach on personal data protection in the Justice Date 1 Main legal instruments on EU level Data Protection Directive 95/46/EC Directive 2002/58/EC on privacy and electronic communications
More informationThe United Nations Convention On the Use of Electronic Communication in International Contracts, 2005 and Electronic Transactions Law in Thailand
Establishing an Enabling Cross-Border Legal Environment for Regional Connectivity : The United Nations Convention On the Use of Electronic Communication in International Contracts, 2005 and Electronic
More informationU.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan
U.S. Japan Internet Economy Industry Forum Joint Statement 2013 October 2013 Keidanren The American Chamber of Commerce in Japan In June 2013, the Abe Administration with the support of industry leaders
More informationHEALTH INFORMATION INFRASTRUCTURE PROJECT: PROGRESS REPORT
HEALTH INFORMATION INFRASTRUCTURE PROJECT: PROGRESS REPORT HCQI Expert Group Meeting 7-8 November 2013 Agenda to improve health information infrastructure» In 2010, health ministers called for improvement
More informationMapping of the CVD models in Europe
Mapping of the CVD models in Europe TASK FORCE ON SW VULNERABILITY DISCLOSURE IN EUROPE Brussels, 29/11/2017 Gianluca Varisco Disclaimer This preliminary mapping has been put together by: reaching out
More informationCore Elements of HIPAA The Privacy Rule establishes individuals privacy rights and addresses the use and disclosure of protected health information ( PHI ) by covered entities and business associates The
More informationSingapore: Your Gateway to ASEAN*
Singapore: Your Gateway to ASEAN* Margaret Hanson Muse Regional Senior Commercial Officer March 2017 *Association of Southeast Asian Nations ASEAN Economic Community at a Glance ASEAN at a Glance Image:
More informationDo you handle EU residents personal data? The GDPR update is coming May 25, Are you ready?
European Union (EU) General Data Protection Regulation (GDPR) Do you handle EU residents personal data? The GDPR update is coming May 25, 2018. Are you ready? What do you need to do? Governance and Accountability
More informationMEMORANDUM OF COOPERATION BETWEEN THE INDUSTRIAL AND PRODUCT SAFETY POLICY GROUP OF THE MINISTRY OF ECONOMY, TRADE AND INDUSTRY OF JAPAN AND
MEMORANDUM OF COOPERATION BETWEEN THE INDUSTRIAL AND PRODUCT SAFETY POLICY GROUP OF THE MINISTRY OF ECONOMY, TRADE AND INDUSTRY OF JAPAN AND THE DEPARTMENT OF INDUSTRIAL WORKS and THE DEPARTMENT OF INDUSTRIAL
More informationPromoting Global Cybersecurity
Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures
More informationDATA PROTECTION BY DESIGN
DATA PROTECTION BY DESIGN Preparing for Europe s New Security Regulations Summary In 2018, the European Union will begin to enforce the provisions of the General Data Protection Regulation (GDPR), a new
More informationINNOVENT LEASING LIMITED. Privacy Notice
INNOVENT LEASING LIMITED Privacy Notice Table of Contents Topic Page number KEY SUMMARY 2 ABOUT US AND THIS NOTICE 3 USEFUL WORDS AND PHRASES 4 WHAT INFORMATION DO WE COLLECT? 4 WHY DO WE PROCESS YOUR
More informationIt applies to personal information for individuals that are external to us such as donors, clients and suppliers (you, your).
Our Privacy Policy 1 Purpose Mission Australia is required by law to comply with the Privacy Act 1988 (Cth) (the Act), including the Australian Privacy Principles (APPs). We take our privacy obligations
More informationIDENTITY ASSURANCE PRINCIPLES
IDENTITY ASSURANCE PRINCIPLES PRIVACY AND CONSUMER ADVISORY GROUP (PCAG) V3.1 17 th July 2014 CONTENTS 1. Introduction 3 2. The Context of the Principles 4 3. Definitions 6 4. The Nine Identity Assurance
More informationUNIFIED CARRIER LICENCE TELECOMMUNICATIONS ORDINANCE (Chapter 106)
Tariff No.: U0025-012-May2013-R Published on 14 May 2013 UNIFIED CARRIER LICENCE TELECOMMUNICATIONS ORDINANCE (Chapter 106) PCCW-HKT Telephone Limited ( PCCW-HKTC ) and Hong Kong Telecommunications (HKT)
More informationNetworking Session - A trusted cloud ecosystem How to help SMEs innovate in the Cloud
Networking Session - A trusted cloud ecosystem How to help SMEs innovate in the Cloud ICT2015, 21 October 2015 Lisbon, Portugal Dr. Paolo Balboni, Partner at ICT Legal Consulting & Scientific Director
More informationFLIPOUT Privacy Charter. We will handle any information we collect about you in accordance with our privacy Policy
Flip Out Trampoline Arena Franchises Pty Ltd Suite 9, 308 High Street, Penrith NSW 2750 PO Box 1850, Penrith 2751 1300 FLIP OUT FLIPOUT Privacy Charter We will handle any information we collect about you
More informationmr. sci. Suada Hadžović, dipl.ing.el. Communications Regulatory Agency Bosnia and Herzegovina Ohrid, Republic of Macedonia, May 24 26, 2017.
International Regulatory Conference The trend and regulatory issues in OTT mr. sci. Suada Hadžović, dipl.ing.el. Bosnia and Herzegovina,. Agenda 1. OTT definition and taxonomy 2. OTT - small companies
More informationWorkday s Robust Privacy Program
Workday s Robust Privacy Program Workday s Robust Privacy Program Introduction Workday is a leading provider of enterprise cloud applications for human resources and finance. Founded in 2005 by Dave Duffield
More informationIAEA Perspective: The Framework for the Security of Radioactive Material and Associated Facilities
59 th General Conference Senior Regulators Meeting Security Session 16 September 2015 IAEA Perspective: The Framework for the Security of Radioactive Material and Associated Facilities Khammar Mrabit Director,
More informationEuropean Cybersecurity cppp and ECSO. org.eu
European Cybersecurity cppp and ECSO www.ecs org.eu ABOUT THE EUROPEAN CYBERSECURITY PPP A EUROPEAN PPP ON CYBERSECURITY The European Commission has signed on July 2016 a PPP with the private sector for
More informationGeneral Data Protection Regulation April 3, Sarah Ackerman, Managing Director Ross Patz, Consultant
General Data Protection Regulation April 3, 2018 Sarah Ackerman, Managing Director Ross Patz, Consultant Introductions Sarah Ackerman, CISSP, CISA Managing Director, Cincinnati Responsible for overall
More informationSigned on December 22 nd, 2015 MINISTRY OF INDUSTRY MINISTRY OF ECONOMY, TRADE AND INDUSTRY
MEMORANDUM OF COOPERATION BETWEEN THE MINISTRY OF ECONOMY, TRADE AND INDUSTRY OF JAPAN AND THE DEPARTMENT OF INDUSTRIAL WORKS, MINISTRY OF INDUSTRY OF THAILAND ON STRENGTHENING THE RISK-BASED CHEMICAL
More informationGovernment data matching and the Privacy Act 1988 (Cth)
Government data matching and the Privacy Act 1988 (Cth) Dimitrios (Jim) Kormas Assistant Director Privacy Assessments 17 May 2018 Brief overview of the OAIC, Privacy Act and Australian Privacy Principles
More informationTHE NEW EU DATA PROTECTION REGULATION: WHAT IS IT AND WHAT DO WE NEED TO DO? KALLIOPI SPYRIDAKI CHIEF PRIVACY STRATEGIST, EUROPE
THE NEW EU DATA PROTECTION REGULATION: WHAT IS IT AND WHAT DO WE NEED TO DO? KALLIOPI SPYRIDAKI CHIEF PRIVACY STRATEGIST, EUROPE EU DATA PROTECTION REGULATION Kalliopi Spyridaki Chief Privacy Strategist,
More informationDeveloping Issues in Breach Notification and Privacy Regulations: Risk Managers Are you having the right conversation with the C Suite?
Developing Issues in Breach Notification and Privacy Regulations: Risk Managers Are you having the right conversation with the C Suite? Minnesota RIMS 39 th Annual Seminar Risk 2011-2012: Can You Hack
More informationConsumer Rights in the Digital Age
Consumer Rights in the Digital Age World Consumer Rights Day Forum Legal Regime for Consumers in the Digital Age 15 th March 2017 Institute for Policy Studies Jayantha Fernando Legal Advisor, ICTA & Chairman.LK
More informationGUIDELINES ON THE CONTINUING PROFESSIONAL DEVELOPMENT (CPD) HOURS. Appendix I. Guidelines on the Continuing Professional Development (CPD) Hours
Appendix I Guidelines on the Continuing Professional Development (CPD) Hours Table of Contents Document Revision Control... i 1. Introduction... 1 2. Objectives... 1 3. Applicability... 1 4. Definition
More informationCYBER INTELLIGENCE ASIA Combating Cybercrimes across the region Conference & Exhibition 20 th 22 nd March 2018 Singapore
6 th annual CYBER INTELLIGENCE ASIA Combating Cybercrimes across the region Conference & Exhibition 20 th 22 nd March 2018 Singapore Organised By: Event Schedule Tuesday 20 th March 2018 Full Day Workshop
More informationCapacity building in the IAEA Action Plan on Nuclear Safety
International Conference on Human Resource Development for Nuclear Power Programmes: Building and Sustaining Capacity 12 16 May 2014 Capacity building in the IAEA Action Plan on Nuclear Safety Gustavo
More informationCyber Crime Prosecution & Defence
Cyber Crime Prosecution & Defence www.asianlaws.org DID YOU KNOW? 5,035 cyber crime FIRs were registered in Bengaluru in 2018. Mumbai saw almost 3,000 cyber crime FIRs. Almost 16,000 Indian websites were
More informationInternational Legal Regulation of Cybersecurity U.S.-German Standards Panel 2018
International Legal Regulation of Cybersecurity U.S.-German Standards Panel 2018 Dr. Dennis-Kenji Kipker University of Bremen Washington DC, 10.04.2018 Gefördert vom FKZ: 16KIS0213 bis 16KIS0216 Slide
More informationRegional Initiative 5: Telecommunication/ICT policy and Regulation in the Asia-Pacific Region
Regional Initiative 5: Telecommunication/ICT policy and Regulation in the Asia-Pacific Region 21 August 2015 Bangkok, Thailand Aurora A. Rubio Head, ITU Area Office for South East Asia ITU: Asia Pacific
More informationProject CyberSouth Cooperation on cybercrime in the Southern Neighbourhood
Project CyberSouth Cooperation on cybercrime in the Southern Neighbourhood Project concept 1 Version 1 July 2017 Project title / number (2017/DG1/JP/3692): CyberSouth Cooperation on cybercrime in the Southern
More informationHarmonisation of Digital Markets in the EaP. Vassilis Kopanas European Commission, DG CONNECT
Harmonisation of Digital Markets in the EaP Vassilis Kopanas European Commission, DG CONNECT vassilis.kopanas@ec.europa.eu The cost of non-europe European Parliament Research Study, March 2014 Fully realising
More informationPolicy on Privacy and Management of Personal Information
Policy on Privacy and Management of Personal Information Purpose The purpose of this privacy policy is to: clearly communicate how SMA manages personal information; provide students, members, staff and
More informationUNODC tackling cybercrime in support of a safe and secure AP-IS
UNODC tackling cybercrime in support of a safe and secure AP-IS Mr. Alexandru CACIULOIU Cybercrime Project Coordinator South East Asia and the Pacific Second session of the Asia-Pacific Information Superhighway
More informationThe NIS Directive and Cybersecurity in
The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security
More informationThe prospects of data breach laws in 18 European countries
The prospects of data breach laws in 18 European countries Stewart Dresner, Chief Executive, Privacy Laws & Business 11:30 a. m.11:30 a.m. Privacy in Transition: The International Perspective THE PRIVACY
More information