Personal Privacy in Ubiquitous Computing Tools and System Support. Marc Langheinrich

Size: px
Start display at page:

Download "Personal Privacy in Ubiquitous Computing Tools and System Support. Marc Langheinrich"

Transcription

1 Personal Privacy in Ubiquitous Computing Tools and System Support Marc Langheinrich

2 Ubiquitous Computing and Privacy Disappearing Computer Troubadour Project (10/02-05/03) Other People s Problem For [my colleague] it is more appropriate to think about privacy issues. It s not really the case in my case Privacy is Primarily a Security Problem All you need is really good firewalls It is All About Self-Regulation It's maybe about letting them find their own ways of cheating Incompatible with Ubiquitous Computing I think you can't think of privacy... it's impossible, because if I do it, I have troubles with finding [a] Ubicomp future November 3, 2005 Personal Privacy in Ubiquitous Computing 2

3 Ubiquitous Excuses? Computing and Privacy Disappearing Computer Troubadour Project (10/02-05/03) Other People s Problem For [my colleague] it is more appropriate to think about privacy issues. It s not really the case in my case Privacy is Primarily a Security Problem All you need is really good firewalls It is All About Self-Regulation It's maybe about letting them find their own ways of cheating Incompatible with Ubiquitous Computing I think you can't think of privacy... it's impossible, because if I do it, I have troubles with finding [a] Ubicomp future November 3, 2005 Personal Privacy in Ubiquitous Computing 3

4 The Vision of Ubiquitous Computing The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it. Mark Weiser ( ), XEROX PARC Basic Motivation of Ubiquitous Computing The computer as a tool for the everyday Things are aware of each other and the environment Integrating computers with intuitive user interfaces November 3, 2005 Personal Privacy in Ubiquitous Computing 4

5 Smart Toaster Gets weather forecast from the Internet Can remind you of important dates (from your electronic agenda) Quelle: November 3, 2005 Personal Privacy in Ubiquitous Computing 5

6 Instead of World inside the Computer... Not like this! World inside Computer would be Virtual Reality November 3, 2005 Personal Privacy in Ubiquitous Computing 6

7 Computer in the World! November 3, 2005 Personal Privacy in Ubiquitous Computing 7

8 Ubicomp Drivers (Technologies) Miniaturization Integration into everyday things New Materials Novel input/output capabilities Wireless Communication Simplifies communication Facilitates cooperation and coordination Sensors Smartness through context-awareness November 3, 2005 Personal Privacy in Ubiquitous Computing 8

9 Ubicomp Drivers (Society Trends) Higher Efficiency Lean production (Overproduction, Out-of-Stock) Targeted Sales (1-1 Marketing) More Convenience Finding your way (e.g., travel assistants) Lower TCO ( total cost of ownership ) w/ pay-per-use Increased Safety Homeland security (terrorism, drug trafficking, etc.) Petty crimes & negligence (e.g., traffic accidents, theft) November 3, 2005 Personal Privacy in Ubiquitous Computing 9

10 Example: Health Industry as Driving Factor for Ubiquitous Computing Higher Efficiency Localization system for medical personnel facilitates highly dynamic scheduling More Convenience Senior citizens can live independently with the help of a Smart Environment Increased Safety Electronically tagged blood packs and smart emergency room lower chances of mistakes November 3, 2005 Personal Privacy in Ubiquitous Computing 10

11 Today s Topics Analysis What is Privacy? How does Ubiquitous Computing affect it? Privacy Infrastructure (PawS) Privacy Beacons Privacy Proxies Privacy-Aware Database Real-World Example Privacy and RFID November 3, 2005 Personal Privacy in Ubiquitous Computing 11

12 Ubicomp Privacy Implications Data Collection Scale (everywhere, anytime) Manner (inconspicuous, invisible) Motivation (context!) Data Types Observational instead of factual data Data Access The Internet of Things November 3, 2005 Personal Privacy in Ubiquitous Computing 12

13 Ubicomp Privacy Implications Privacy is is not just other people s problem Privacy is is a core issue in in Ubicomp environments Data Collection Scale (everywhere, anytime) Manner (inconspicuous, invisible) Motivation (context!) Data Types Observational instead of factual data Data Access The Internet of Things November 3, 2005 Personal Privacy in Ubiquitous Computing 13

14 Why Privacy? Reasons for Privacy Free from Nuisance Louis D. Brandeis, The right to be let alone (1890) November 3, 2005 Personal Privacy in Ubiquitous Computing 14

15 Why Privacy? Reasons for Privacy Free from Nuisance Intimacy Erving M. Goffman, The Presentation of Self in Everyday Life (1959) November 3, 2005 Personal Privacy in Ubiquitous Computing 15

16 Why Privacy? Reasons for Privacy Free from Nuisance Intimacy Free to Decide for Oneself Beate Rössler Protecting the decisional autonomy in one s life (2001) November 3, 2005 Personal Privacy in Ubiquitous Computing 16

17 Why Privacy? Reasons for Privacy Free from Nuisance Intimacy Free to Decide for Oneself By Another Name... Data Protection Informational Self-Determination November 3, 2005 Personal Privacy in Ubiquitous Computing 17

18 Why Privacy? Privacy isn t just about keeping secrets data exchange and transparency are key issues! Reasons for Privacy Free from Nuisance Intimacy Free to Decide for Oneself By Another Name... Data Protection Informational Self-Determination November 3, 2005 Personal Privacy in Ubiquitous Computing 18

19 Solution Space Technology Social Norms & Habits Laws & Regulations November 3, 2005 Personal Privacy in Ubiquitous Computing 19

20 Fair Information Principles (FIP) Drawn up by the OECD, 1980 Organisation for economic cooperation and development Voluntary guidelines for member states Goal: ease transborder flow of goods (and information) Five Principles (simplified) 1. Openness 2. Data access and control 4. Collection Limitation 5. Data subject s consent 3. Data security Core principles of most modern privacy laws Implication: Technical solutions must support FIP November 3, 2005 Personal Privacy in Ubiquitous Computing 20

21 Fair Information Principles (FIP) Privacy is isnot just about self-regulation legal and social frameworks exist! Drawn up by the OECD, 1980 Organisation for economic cooperation and development Voluntary guidelines for member states Goal: ease transborder flow of goods (and information) Five Principles (simplified) 1. Openness 2. Data access and control 3. Data security 4. Collection Limitation 5. Data subject s consent Core principles of most modern privacy laws Implication: Technical solutions must support FIP November 3, 2005 Personal Privacy in Ubiquitous Computing 21

22 Technical Solution: P3P Platform for Privacy Preferences Project (W3C) Machine-readable data collection practices (Policy) Who collects and/or processes the data? What information is collected? For what purpose is this data collected? Basis-Dataschema Example: user.home.postal.street Web-Protocol For exchanging policies between server und browser Lorrie Cranor, Marc Langheinrich, Massimo Marchiori, Joseph Reagle: The Platform for Privacy Preferences 1.0 (P3P1.0) Specification. W3C Recommendation, April 16, November 3, 2005 Personal Privacy in Ubiquitous Computing 22

23 Technical Solution: P3P <POLICY xmlns=" entity= TheCoolCatalog, 123 Main Street, Seattle, WA 98103, USA"> <DISPUTES-GROUP> Platform <DISPUTES service=" for Privacy Preferences Project (W3C) resolution-type="independent" description="privacyseal, a third-party seal provider" image=" </DISPUTES-GROUP> Machine-readable data collection practices (Policy) <DISCLOSURE discuri=" access="none"/> <STATEMENT> <CONSEQUENCE-GROUP> <CONSEQUENCE>a Who collects site with clothes and/or you would processes appreciate</consequence> the data? </CONSEQUENCE-GROUP> <RECIPIENT><ours/></RECIPIENT> <RETENTION><indefinitely/></RETENTION> <PURPOSE><custom/><develop/></PURPOSE> <DATA-GROUP> What information is collected? <DATA For name="dynamic.cookies" what purpose category="state"/> is this data collected? <DATA name="user.gender"/> Basis-Dataschema <DATA name="dynamic.miscdata" category="preference"/> <DATA name="user.home." optional="yes"/> </DATA-GROUP> </STATEMENT> <STATEMENT> Example: user.home.postal.street <RECIPIENT><ours/></RECIPIENT> <PURPOSE><admin/><develop/></PURPOSE> <RETENTION><indefinitely/></RETENTION> Web-Protocol <DATA-GROUP> <DATA name="dynamic.clickstream.server"/> <DATA For name="dynamic.http.useragent"/> exchanging policies between server und browser </DATA-GROUP> </STATEMENT> </POLICY> Lorrie Cranor, Marc Langheinrich, Massimo Marchiori, Joseph Reagle: The Platform for Privacy Preferences 1.0 (P3P1.0) Specification. W3C Recommendation, April 16, November 3, 2005 Personal Privacy in Ubiquitous Computing 23

24 PawS A Privacy Awareness System Privacy Proxies Privacy Policy Accept / Decline Privacy Beacons Privacy DB November 3, 2005 Personal Privacy in Ubiquitous Computing 24

25 1. Privacy Beacons Announce (Unobtrusive) Data Collections Protocol Beacons integrated into communications protocol Stand-alone Beacons for video, audio, sensory data Detected by mobile Privacy Assistant (e.g., wristwatch) Describes Current/Potential Data Collection Format: machine-readable privacy policy ( P3P++ ) Extending it for Ubicomp-specific elements (e.g., sensor data) PA (Privacy Assistant) P3P policy Privacy Beacon November 3, 2005 Personal Privacy in Ubiquitous Computing 25

26 1. Privacy Beacons Announce (Unobtrusive) Data Collections Protocol Beacons integrated into communications protocol Stand-alone Beacons for video, audio, sensory data Detected by mobile Privacy Assistant (e.g., wristwatch) Describes Current/Potential Data Collection Format: machine-readable privacy policy ( P3P++ ) Privacy-Assistant Prototype Privacy-Beacon Prototype (IRREAL) Extending it for Ubicomp-specific elements (e.g., sensor data) PA (Privacy Assistant) P3P policy Privacy Beacon November 3, 2005 Personal Privacy in Ubiquitous Computing 26

27 2. Privacy Proxies Service Proxy Solicitates Consent (if Needed) User proxy compares user preferences with privacy policy of service provider Central Access Point for Data Management Supports updating and deleting data and contracts User Privacy Proxy Service Privacy Proxy Accept / Decline Privacy Policy Database Internet November 3, 2005 Personal Privacy in Ubiquitous Computing 27

28 2. Privacy Proxies Example of a user-initiated deletion request Service Proxy Solicitates Consent (if Needed) <DELETE> <DELETE> <DATA-GROUP> <DATA-GROUP> <DATA <DATA ref="#user.home-info.online. "/> ref="#user.home-info.online. "/> <DATA <DATA ref="#user.home-info.telecom.mobile"/> ref="#user.home-info.telecom.mobile"/>... User proxy compares user preferences with privacy policy of service provider... </DATA-GROUP> </DATA-GROUP> Central Access Point for Data Management </DELETE> </DELETE> Supports updating and deleting data and contracts User Privacy Proxy Service Privacy Proxy Accept / Decline Privacy Policy Database Internet November 3, 2005 Personal Privacy in Ubiquitous Computing 28

29 2. Privacy Proxies <QUERY> <QUERY> <DATA-GROUP> Example of a user-initiated deletion request Example of a service-initiated data update request <DATA-GROUP> Service <DATA <DATA Proxy ref="#user.location.submitted.symbolic.city"/> ref="#user.location.submitted.symbolic.city"/> Solicitates Consent (if Needed) <DELETE> <DELETE> <DATA <DATA-GROUP> <DATA ref="#user.location.submitted.symbolic.street"/> ref="#user.location.submitted.symbolic.street"/> <DATA-GROUP> </DATA-GROUP> <DATA User </DATA-GROUP> proxy compares user preferences with privacy <DATA ref="#user.home-info.online. "/> <INFO ref="#user.home-info.online. "/> <DATA <INFO discuri=" <DATA policy ref="#user.home-info.telecom.mobile"/> discuri=" We ref="#user.home-info.telecom.mobile"/> of service provider... We need need your your current current location location in order order to to provide provide you you with with... </DATA-GROUP> </DATA-GROUP> updated updated information information as as part part of of your your WHERE_AM_I(tm)-subscription. WHERE_AM_I(tm)-subscription. Central </INFO> Access Point for Data Management </DELETE> </INFO> </DELETE> </QUERY> </QUERY> Supports updating and deleting data and contracts User Privacy Proxy Service Privacy Proxy Accept / Decline Privacy Policy Database Internet November 3, 2005 Personal Privacy in Ubiquitous Computing 29

30 3. Privacy-Aware Database All Data is Stored Together With Privacy (P3P) Policy Data and policy (Metadata) form logical unit Each Data Access Needs Usage Policy Database compares allowed/announced and proposed usage Data with non-matching allowed usage is held back Each data access (who, why) is recorded (auditing) <last name> <first name> <birthdate> <address> Personal Data Usage Policy Individual Privacy Policy November 3, 2005 Personal Privacy in Ubiquitous Computing 30

31 3. Privacy-Aware Database All Data is Stored Together With Privacy (P3P) Policy Data and policy (Metadata) form logical unit Each Data Access Needs Usage Policy Database compares allowed/announced and proposed usage Data with non-matching allowed usage is held back Each data access (who, why) is recorded (auditing) Example Example result result of of a a policy-based policy-based query query <last name> <first name> <birthdate> <address> Personal Data Usage Policy Individual Privacy Policy November 3, 2005 Personal Privacy in Ubiquitous Computing 31

32 PawS Example Camera Proxy Printer Proxy User Privacy Proxy Privacy Policy Accept / Decline Privacy Beacon Devices PA (Privacy Assistant) November 3, 2005 Personal Privacy in Ubiquitous Computing 32

33 PawS Implementation Privacy Database Oracle 8i, Java interface (no direct table access) P3P policies cached for speed Privacy Proxies Web service (Apache Tomcat) SOAP, SSH, DSig Extended P3P Privacy Beacons IR Beacon (IRREAL) Palm Tungsten C (WLAN) Privacy Policy Accept / Decline November 3, 2005 Personal Privacy in Ubiquitous Computing 33

34 PawS Implementation Privacy is iscompatible with Ubiquitous Computing technical solutions can support FIP FIP in in Ubicomp Privacy Database Oracle 8i, Java interface (no direct table access) P3P policies cached for speed Privacy Proxies Web service (Apache Tomcat) SOAP, SSH, DSig Extended P3P Privacy Beacons IR Beacon (IRREAL) Palm Tungsten C (WLAN) Privacy Policy Accept / Decline November 3, 2005 Personal Privacy in Ubiquitous Computing 34

35 Today s Topics Analysis What is Privacy? How does Ubiquitous Computing affect it? Privacy Infrastructure (PawS) Privacy Beacons Privacy Proxies Privacy-Aware Database Real-World Example Privacy and RFID November 3, 2005 Personal Privacy in Ubiquitous Computing 35

36 Today s RFID Systems Original RFID-Man Artwork (c) 2006 Ari Juels, RSA Laboratories Privacy Policy The information we learn from customers helps us personalize and continually improve your shopping experience. ID ID ID All tags respond, please! ID ID ID ID Slide Courtesy of Roland Schneider November 3, 2005 ID Personal Privacy in Ubiquitous Computing 36 DB ID ID ID ID ID

37 RFID-PawS Goal: Fair Information Principles for RFID PawS and RFID Privacy Beacon: RFID-Reader Privacy Assistant: Watchdog-Tag Privacy Proxies & Privacy Database Requirements RFID-Standard compatibility Low bandwith Christian Floerkemeier, Roland Schneider, Marc Langheinrich: Scanning with a Purpose Supporting the Fair Information Principles in RFID protocols. UCS 2004, Tokyo, Japan, November November 3, 2005 Personal Privacy in Ubiquitous Computing 37

38 Example: Openness in RFID-PawS Protocol extension Init round all SUID flag Round size CRC-5 1 bit 6 bits 1 bit 3 bits 5 bits Init_Round Command in ISO Part 6 Defines start of reading cycle (Aloha-based anti-collision) Defines Anti-collision protocol parameters November 3, 2005 Personal Privacy in Ubiquitous Computing 38

39 Example: Openness in RFID-PawS Protocol extension Init round all SUID flag Round size CRC-5 RPID Purpose Collection type CRC-16 1 bit 6 bits 1 bit 3 bits 5 bits 96 bits 16 bits 2 bits 16 bits Init_Round Command in ISO Part 6 Defines start of reading cycle (Aloha-based anti-collision) Defines Anti-collision protocol parameters New: 130 Bits Privacy-Header Extension November 3, 2005 Personal Privacy in Ubiquitous Computing 39

40 Openness using the ReaderPolicyID Protocol extension Init round all SUID flag Round size CRC-5 RPID Purpose Collection type CRC-16 1 bit 6 bits 1 bit 3 bits 5 bits 96 bits 16 bits 2 bits 16 bits Header Data Collector Policy Reader 8 bits 28 bit 24 bits 36 bits 5F.4A886EC.8EC947.24A68E4F6 Each Read Request can be Associated with Data Collector Data collector, reader, and privacy policy identifiable Format follows EPC standard (facilitates implementation) November 3, 2005 Personal Privacy in Ubiquitous Computing 40

41 RFID-PawS and Fair Information Principles Principle Openness Data Access & Control Data Security Collection Limitation User Consent Supported by ReaderPolicyID PawDB (PawDB) Tag Selection Mask, Purpose Declaration Watchdog-Tag November 3, 2005 Personal Privacy in Ubiquitous Computing 41

42 Today s RFID Systems (with RFID-PawS) Original RFID-Man Artwork (c) 2006 Ari Juels, RSA Laboratories Privacy Policy The information we learn from customers helps us personalize and continually improve your shopping experience. ID Example Store, Smart Shelf 4: LocalAll Identification; tags Inventory; respond, All please! ID ID ID ID Openness ID Data DataAccess & Control Control ID PawDB ID ID ID ID ID Slide Courtesy of Roland Schneider November 3, 2005 ID Personal Privacy in Ubiquitous Computing 42

43 Tomorrow s RFID-Systems? Example Store, Smart Shelf 4: Local Identification; Inventory; All PawDB Original RFID-Man Artwork (c) 2006 Ari Juels, RSA Laboratories??? Collection Limitation ID ID ID User User Consent Openness Data DataAccess & Control Control ID ID ID Slide Courtesy of Roland Schneider November 3, 2005 Personal Privacy in Ubiquitous Computing 43

44 PawS: Limits and Open Issues Privacy Beacon Signal (Stand-alone Mode) Needs localization model when using wireless announcements (WLAN, Bluetooth, Zigbee) User Interface for Privacy Assistant Needs user study to assess practical usefulness Limited to Institutional Data Collections Not very useful for peer privacy (e.g., friend finder applications) Sensor Data? Anonymity? Location Privacy? November 3, 2005 Personal Privacy in Ubiquitous Computing 44

45 Summary Other Privacy People s Core Problems in Ubicomp Environments For Ubicomp [my colleague] significantly it is affects more appropriate privacy to think about privacy issues. Requires It s solutions not really on the multiple case in levels my case (collection & processing) Privacy is Primarily not Just About a Security Security Problem All Data you exchange need iswith reallyothers good firewalls just as important It Legal is All and About Social Self-Regulation Frameworks exist Basis: It's maybe Fair Information about letting Principles them find their own ways of cheating Incompatible Technical Privacy withinfrastructure Ubiquitous Computing Possible I Privacy think Beacons, you can't Privacy think of Assistants, privacy... it's Privacy impossible, Proxies, because Privacy if DBI do it, I have troubles with finding [a] Ubicomp future Embedded in legal and social mechanisms November 3, 2005 Personal Privacy in Ubiquitous Computing 45

46 Much Related Work Privacy Infrastructures Myles et al. 03, Aura 03, Confab Toolkit 04 User Interfaces CSCW (Bellotti/Sellen 93, Neustaedter/Greenberg 03) Peer Privacy (Aware Home Project, Confab Toolkit) Identity Management Borking s Identity Protector 96, Lederer s Faces 02 Privacy Databases k-anonymity 02, Hippocratic Databases 02, Enterprise P3P 02 Web Privacy, RFID Privacy, Location Privacy November 3, 2005 Personal Privacy in Ubiquitous Computing 46

P3P and Hippocratic Databases Privacy Metadata and its Implication for Data Management

P3P and Hippocratic Databases Privacy Metadata and its Implication for Data Management P3P and Hippocratic Databases Privacy Metadata and its Implication for Data Management Marc Langheinrich Institute for Pervasive Computing ETH Zurich Oct. 13, 2005 Unilever Research Colloquium 1 Today

More information

The Platform for Privacy Preferences

The Platform for Privacy Preferences The Platform for Privacy Preferences A user empowerment approach (P3P) February 2000 Update Marc Langheinrich P3P Preference Group Chair ETH Zurich Platform for Privacy Preferences Outline Policy Background

More information

Technical Solutions Novel Challenges to Privacy Privacy Enhancing Technologies Examples

Technical Solutions Novel Challenges to Privacy Privacy Enhancing Technologies Examples Muhammad Eka WIJAYA Technical Solutions Novel Challenges to Privacy Privacy Enhancing Technologies Examples How to Address Privacy in Ubiquitous Work Understand Application Define Problem Know Tools 2

More information

Page 1. Ubiquitous Computing: Beyond platforms, beyond screens; the invisible computer. Topics for Today. Ubiquitous Computing Fundamentals

Page 1. Ubiquitous Computing: Beyond platforms, beyond screens; the invisible computer. Topics for Today. Ubiquitous Computing Fundamentals Ubiquitous Computing: Beyond platforms, beyond screens; the invisible computer Shwetak N. Patel 2 Topics for Today Ubiquitous Computing Fundamentals Review the history of ubiquitous computing (ubicomp)

More information

Privacy and Security in Ubiquitous Personalized Applications

Privacy and Security in Ubiquitous Personalized Applications Privacy and Security in Ubiquitous Personalized Applications Ajay Brar, Judy Kay School of Information Technologies University of Sydney {abrar1, judy}@it.usyd.edu.au Abstract. Personalization systems

More information

Ubiquitous Computing. Ambient Intelligence

Ubiquitous Computing. Ambient Intelligence Ubiquitous Computing Ambient Intelligence CS4031 Introduction to Digital Media 2016 Computing Evolution Ubiquitous Computing Mark Weiser, Xerox PARC 1988 Ubiquitous computing enhances computer use by making

More information

The Platform for Privacy Preferences (P3P) A user empowerment approach. ETH Zurich. Marc Langheinrich APPEL Subgroup Chair P3P Working Group

The Platform for Privacy Preferences (P3P) A user empowerment approach. ETH Zurich. Marc Langheinrich APPEL Subgroup Chair P3P Working Group The Platform for Privacy Preferences A user empowerment approach (P3P) December 2000 Update Marc Langheinrich APPEL Subgroup Chair P3P Working Group ETH Zurich Platform for Privacy Preferences! What is

More information

Controlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes:

Controlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes: Page 1 of 6 I. Common Principles and Approaches to Privacy A. A Modern History of Privacy a. Descriptions, definitions and classes b. Historical and social origins B. Types of Information a. Personal information

More information

Some Computer Science Issues in

Some Computer Science Issues in Some Computer Science Issues in Ubiquitous Computing Communications of the ACM (CACM) Vol. 36, No.7, July 1993 M. Weiser Presented by Hwajung Kim (hkim@dcslab.snu.ac.kr) DCSLab, SNU Table of Contents Background

More information

Mobile and Ubiquitous Computing

Mobile and Ubiquitous Computing Mobile and Ubiquitous Computing Today l Mobile, pervasive and volatile systems l Association and Interoperation l Sensing context and adaptation RIP? How is mobility different Mobile elements are resource-poor

More information

System Challenges for Pervasive and Ubiquitous Computing

System Challenges for Pervasive and Ubiquitous Computing System Challenges for Pervasive and Ubiquitous Computing 18 th Roy Want Intel Research May 2005, ICSE 05 St. Louis th May 2005, ICSE What is Ubiquitous Computing? The most profound technologies are those

More information

Spontaneous Interaction using Mobile Phones and Short Text Messages

Spontaneous Interaction using Mobile Phones and Short Text Messages Spontaneous Interaction using Mobile Phones and Short Text Messages Frank Siegemund Distributed Systems Group, Department of Computer Science, Swiss Federal Institute of Technology (ETH) Zurich, 8092 Zurich,

More information

Unit 2: Technology Systems

Unit 2: Technology Systems Unit 2: Technology Systems Level: 1 and 2 Unit type: Core Guided learning hours: 30 Assessment type: External Unit introduction Technology systems are involved in many of the objects we use every day,

More information

A Very Short Introduction to Pervasive Computing

A Very Short Introduction to Pervasive Computing A Very Short Introduction to Pervasive Computing Nicola Dragoni Embedded Systems Engineering Section DTU Informatics Technical University of Denmark These slides have been found on the Web and adapted

More information

An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs)

An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs) An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs) Sekhar KONDEPUDI Ph.D. Vice Chair FG-SSC & Coordinator Working Group 1 ICT role and roadmap for

More information

3. How is technology used to serve our advertisements on other Sites that you visit and what choices do you have?

3. How is technology used to serve our advertisements on other Sites that you visit and what choices do you have? Privacy Policy for U.S. Websites Scope. This Privacy Policy applies to personal information collected online, used and disclosed by Stanley Black & Decker, Inc. s affiliates including but not limited to

More information

Acceptance. Changes to this Policy

Acceptance. Changes to this Policy Privacy Policy Last Updated: January 3, 2019 Thank you for visiting Etalia Foods! We work hard to provide you unforgettable and naturally gluten-free pizzas. We know that by choosing Etalia Foods for your

More information

Ubiquitous Computing Introduction

Ubiquitous Computing Introduction Ubiquitous Introduction University of Innsbruck WS 2010/2011 Prof. Dr. Thomas Strang thomas.strang@uibk.ac.at Where it all started The term Ubiquitous 1 goes back to the late Mark Weiser, who wrote 1991

More information

Machine Readability and P3P The Basics

Machine Readability and P3P The Basics Machine Readability and P3P The Basics Lorrie Faith Cranor P3P Specification Working Group Chair Carnegie Mellon University January 2004 http://lorrie.cranor.org/ P3P Basics Privacy policies Policies let

More information

The Good, the Bad and the Ugly: Privacy and Legal Implications of Internet of Things for Businesses

The Good, the Bad and the Ugly: Privacy and Legal Implications of Internet of Things for Businesses The Good, the Bad and the Ugly: Privacy and Legal Implications of Internet of Things for Businesses July 29, 2014 Presented by: Joshua B. Konvisser, Partner Catherine D. Meyer, Senior Counsel Pillsbury

More information

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights Secure Messaging Mobile App Privacy Policy Privacy Policy Highlights For ease of review, Everbridge provides these Privacy Policy highlights, which cover certain aspects of our Privacy Policy. Please review

More information

VETDATA PRIVACY POLICY

VETDATA PRIVACY POLICY Last Updated: April 20, 2018. VETDATA PRIVACY POLICY PLEASE READ THIS PRIVACY POLICY CAREFULLY. Direct Vet Marketing, Inc. and its consolidated affiliates (hereinafter, Vets First Choice, we, us, our )

More information

Security Challenges with ITS : A law enforcement view

Security Challenges with ITS : A law enforcement view Security Challenges with ITS : A law enforcement view Central Observatory for Intelligent Transportation Systems FRENCH MINISTRY OF INTERIOR GENDARMERIE NATIONALE Colonel Franck MARESCAL franck.marescal@gendarmerie.interieur.gouv.fr

More information

Regulation and the Internet of Things

Regulation and the Internet of Things Regulation and the Internet of Things 15 th Global Symposium for Regulators (GSR15) Prof. Ian Brown The views expressed in this presentation are those of the author and do not necessarily reflect the opinions

More information

As you review our policies, here are a few general principles to keep in mind:

As you review our policies, here are a few general principles to keep in mind: Your Privacy and Data Security are Very Important to Us Your privacy is important to us. This Comprehensive Privacy Policy explains how we collect, share, use, and protect information when you visit or

More information

Travelers Rest Festival Privacy Policy. Privacy Policy. PRIVACY POLICY LAST UPDATED: MAY

Travelers Rest Festival Privacy Policy. Privacy Policy.  PRIVACY POLICY LAST UPDATED: MAY Travelers Rest Festival Privacy Policy Privacy Policy http://travelersrestfest.com/ PRIVACY POLICY LAST UPDATED: MAY 24 2018 This Privacy Policy describes our policies on the collection, use and disclosure

More information

Version 11

Version 11 The Big Challenges Networked and Electronic Media European Technology Platform The birth of a new sector www.nem-initiative.org Version 11 1. NEM IN THE WORLD The main objective of the Networked and Electronic

More information

Critical Information Infrastructure Protection Law

Critical Information Infrastructure Protection Law Critical Information Infrastructure Protection Law CCD COE Training 8 September 2009 Tallinn, Estonia Maeve Dion Center for Infrastructure Protection George Mason University School of Law Arlington, Virginia.

More information

Ferrous Metal Transfer Privacy Policy

Ferrous Metal Transfer Privacy Policy Updated: March 13, 2018 Ferrous Metal Transfer Privacy Policy Ferrous Metal Transfer s Commitment to Privacy Ferrous Metal Transfer Co. ( FMT, we, our, and us ) respects your concerns about privacy, and

More information

Mobile Security Fall 2012

Mobile Security Fall 2012 Mobile Security 14-829 Fall 2012 Patrick Tague Class #9 The Internet of Things Partial slide credit to L. Zoia and Y. Zhang Announcements If you haven't signed up for a Survey presentation (two teams,

More information

Laws and Regulations & Data Governance

Laws and Regulations & Data Governance Executive Development Course: Digital Government for Transformation Towards Sustainable and Resilient Societies the Singapore Experience Laws and Regulations & Data Governance 2-6 April 2018 UNDP Global

More information

Multiple Dimensions in Convergence and Related Issues

Multiple Dimensions in Convergence and Related Issues Multiple Dimensions in Convergence and Related Issues S.R. Subramanya LG Electronics CDG Technology Forum Las Vegas, Oct. 7, 2005 LGE Mobile Research, USA Talk Outline Introduction» Convergence Layers

More information

YOUR PRIVACY RIGHTS Privacy Policy General Col ection and Use voluntarily

YOUR PRIVACY RIGHTS Privacy Policy General Col ection and Use voluntarily YOUR PRIVACY RIGHTS Privacy Policy The Travel Society (DBA The Travel Society, LLC ) (AKA: Company ) in addition to the Members (AKA: Affiliates ) of The Travel Society values your privacy. This Privacy

More information

Introduction to the Semantic Web

Introduction to the Semantic Web ITTALKS Introduction to the Web example applications ITTALKS is a database driven web site of IT related talks at UMC and other institutions. The database contains information on Seminar events http://ittalks.org/

More information

Browsing the World in the Sensors Continuum. Franco Zambonelli. Motivations. all our everyday objects all our everyday environments

Browsing the World in the Sensors Continuum. Franco Zambonelli. Motivations. all our everyday objects all our everyday environments Browsing the World in the Sensors Continuum Agents and Franco Zambonelli Agents and Motivations Agents and n Computer-based systems and sensors will be soon embedded in everywhere all our everyday objects

More information

Introduction. Angela Holzworth, RHIA, CISA, GSEC. Kimberly Gray, Esq., CIPP/US. Sr. IT Infrastructure Analyst

Introduction. Angela Holzworth, RHIA, CISA, GSEC. Kimberly Gray, Esq., CIPP/US. Sr. IT Infrastructure Analyst Introduction Angela Holzworth, RHIA, CISA, GSEC Sr. IT Infrastructure Analyst Kimberly Gray, Esq., CIPP/US Chief Privacy Officer, Global, IMS Health 1 Incorporating Privacy into the CSF: Approach and Benefits

More information

Network Communications Standards. Applied Information Technology

Network Communications Standards. Applied Information Technology Network Communications Standards Applied Information Technology Network Standards Why do we need network standards? Defined guidelines for how computers or networked devices communicate Think of it as

More information

Wireless Network Security Spring 2013

Wireless Network Security Spring 2013 Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #19 Location Privacy & Tracking Agenda Location privacy and tracking Implications / risks of location information Location privacy and anonymity

More information

PRIVACY POLICY QUICK GUIDE TO CONTENTS

PRIVACY POLICY QUICK GUIDE TO CONTENTS PRIVACY POLICY This privacy policy describes the policies and practices of Comodo Security Solutions, Inc. and Comodo Security Solutions Ltd. (collectively and individually referred to herein as "Comodo"),

More information

Wonderline Europe Zrt.

Wonderline Europe Zrt. Wonderline Europe Zrt. PRIVACY POLICY AND DATA PROTECTION REGULATION WWW.WONDERLINE.EU Accepted: 23. May, 2018. It is forbidden to make copies of this document in part or whole without the prior written

More information

The Ubiquitous Web. Dave Raggett, W3C Technical Plenary, March /14

The Ubiquitous Web. Dave Raggett, W3C Technical Plenary, March /14 The Ubiquitous Web Dave Raggett, W3C Technical Plenary, March 2005 1/14 Ubiquitous. [adj] 1. (seemingly) present everywhere simultaneously. 2. often encountered [Latin ubique everywhere] Oxford English

More information

MOBILE.NET PRIVACY POLICY

MOBILE.NET PRIVACY POLICY MOBILE.NET PRIVACY POLICY As the operator of the Mobile.net website (https://mobile.net.ltd/) (Website), ADX Labs, LLC. (Company, we or us) is committed to protecting and respecting your privacy. The data

More information

e180 Privacy Policy July 2018

e180 Privacy Policy July 2018 e180 Privacy Policy July 2018 We are e180, the creators of Braindate. We care deeply about protecting your personal information, so we ve outlined everything you need to know about it here. Last modified:

More information

What information do we collect online and how is it used?

What information do we collect online and how is it used? Thirty-One Gifts LLC - Privacy Policy This Privacy Policy is intended to assist you in understanding what personal information we gather about you when you visit Thirty-One Gifts online, how we use and

More information

2017 RIMS CYBER SURVEY

2017 RIMS CYBER SURVEY 2017 RIMS CYBER SURVEY This report marks the third year that RIMS has surveyed its membership about cyber risks and transfer practices. This is, of course, a topic that only continues to captivate the

More information

Information we collect about you: (Rewritten)

Information we collect about you: (Rewritten) Local Search Titan, LLC ( LST, "we", "us" or "our") respects the privacy of our users and has developed this Privacy Policy to demonstrate its commitment to protecting your privacy. The intention of this

More information

A Framework for Managing Crime and Fraud

A Framework for Managing Crime and Fraud A Framework for Managing Crime and Fraud ASIS International Asia Pacific Security Forum & Exhibition Macau, December 4, 2013 Torsten Wolf, CPP Head of Group Security Operations Agenda Introduction Economic

More information

Making Privacy Operational

Making Privacy Operational Making Privacy Operational Introduction to the Privacy Management Reference Model John Sabo Director, Global Government relations CA, Inc. and President, ISTPA john.t.sabo@ca.com Michael Willett President,

More information

Recruitment Privacy Notice

Recruitment Privacy Notice Rev. A May 22, 2018 Contents 1. About Us... 2 2. Collection... 2 3. Use of Personal Data... 3 4. Legal Basis... 3 5. Sharing of Personal Data... 4 5.1 Within Jacobs... 4 5.2 With Third Parties... 4 6.

More information

Information technology Security techniques Information security controls for the energy utility industry

Information technology Security techniques Information security controls for the energy utility industry INTERNATIONAL STANDARD ISO/IEC 27019 First edition 2017-10 Information technology Security techniques Information security controls for the energy utility industry Technologies de l'information Techniques

More information

Future-Proof Security & Privacy in IoT

Future-Proof Security & Privacy in IoT All rights reserved, Arthur s Legal B.V. Future-Proof Security & Privacy in IoT From State of Play, To State of The Art Arthur van der Wees, LLM Managing Director Arthur s Legal, the global tech-by-design

More information

Introduction to Distributed Systems

Introduction to Distributed Systems Introduction to Distributed Systems Other matters: review of the Bakery Algorithm: why can t we simply keep track of the last ticket taken and the next ticvket to be called? Ref: [Coulouris&al Ch 1, 2]

More information

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017 DHS Cybersecurity Election Infrastructure as Critical Infrastructure June 2017 Department of Homeland Security Safeguard the American People, Our Homeland, and Our Values Homeland Security Missions 1.

More information

PRIVACY POLICY OUR SERVICES. Last modified: November 29, 2015

PRIVACY POLICY OUR SERVICES. Last modified: November 29, 2015 PRIVACY POLICY Last modified: November 29, 2015 Thank you for using Creatubbles. Creatubbles PTE. LTD and its affiliates ( Creatubbles ) values your privacy, and we want you to know what information we

More information

How the European Commission is supporting innovation in mobile health technologies Nordic Mobile Healthcare Technology Congress 2015

How the European Commission is supporting innovation in mobile health technologies Nordic Mobile Healthcare Technology Congress 2015 How the European Commission is supporting innovation in mobile health technologies Nordic Mobile Healthcare Technology Congress 2015 Claudia Prettner, Unit for Health and Well-Being, DG CONNECT Table of

More information

A QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES

A QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES A QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES We are experts in, CODING SUPPORT FOR FINAL YEAR PROJECT JOURNAL PREPARATION

More information

Privacy Policy. Implemented on: November 2, 2017

Privacy Policy. Implemented on: November 2, 2017 Implemented on: November 2, 2017 Privacy Policy STH JAPAN K.K. (the "Company") will strictly control any personal information received from you (the "User(s)") via the website https://hospitality.rugbyworldcup.com/

More information

The West End Community Trust Privacy Policy

The West End Community Trust Privacy Policy The West End Community Trust Privacy Policy We are committed to protecting your personal information and being transparent about what we do with it, however you interact with us. We are therefore committed

More information

ITU Arab Forum on Emerging Technologies Algiers Algeria, Feb. 2018

ITU Arab Forum on Emerging Technologies Algiers Algeria, Feb. 2018 ITU Arab Forum on Emerging Technologies Algiers Algeria, 14-15 Feb. 2018 IOT AS THE NEXT MILESTONE FOR INNOVATIONS IN THE 21 ST CENTURY by: Osama Ghanim Nour Smart Solution 14 th Feb 2018 3 Time Attendance

More information

Leveraging Mobile Interaction with Sensor-Driven and Multimodal User Interfaces"

Leveraging Mobile Interaction with Sensor-Driven and Multimodal User Interfaces Leveraging Mobile Interaction with Sensor-Driven and Multimodal User Interfaces Andreas Möller Betreuer: Prof. Dr. Matthias Kranz Doktorandenseminar an der LMU München Institute for Media Technology My

More information

Ten lessons learned about Ubiquitous Computing. Roy Want Intel Research Dagstuhl, September 2001

Ten lessons learned about Ubiquitous Computing. Roy Want Intel Research Dagstuhl, September 2001 Ten lessons learned about Ubiquitous Computing Roy Want Intel Research Dagstuhl, September 2001 Ubiquitous Computing Olivetti 1988-1991 1991 Andy Hopper Pandora Active Badge Xerox PARC 1991-2000 Mark Weiser

More information

Profiles and Context Awareness for Mobile Users a Middleware Approach supporting Personal Security.

Profiles and Context Awareness for Mobile Users a Middleware Approach supporting Personal Security. Profiles and Context Awareness for Mobile Users a Middleware Approach supporting Personal Security. Security of Pervasive Communication, SPC 06 T-Systems Enterprise Services GmbH Technologiezentrum ENPS

More information

A Planet of Smarter Cities: Security and critical infrastructures impact

A Planet of Smarter Cities: Security and critical infrastructures impact A Planet of Smarter Cities: Security and critical infrastructures impact Alberto Barrientos Director of Public Sector IBM Smarter Cities Alberto.barrientos@es.ibm.com Urban population growth expected to

More information

November Integrating RFID with your Mainframe

November Integrating RFID with your Mainframe Integrating RFID with your Mainframe November 2004 Agenda RFID Review Integrating RFID The Lightyear Solution Demonstration Slide 2 RFID Timeline RFID developed in WWII to uniquely identify aircraft Wal-Mart

More information

The Value of Handhelds in Smart Environments

The Value of Handhelds in Smart Environments The Value of Handhelds in Smart Environments Frank Siegemund, Christian Floerkemeier, and Harald Vogt Institute for Pervasive Computing Department of Computer Science ETH Zurich, Switzerland {siegemund

More information

Beam Technologies Inc. Privacy Policy

Beam Technologies Inc. Privacy Policy Beam Technologies Inc. Privacy Policy Introduction Beam Technologies Inc., Beam Dental Insurance Services LLC, Beam Insurance Administrators LLC, Beam Perks LLC, and Beam Insurance Services LLC, (collectively,

More information

Mobile and Ubiquitous Computing

Mobile and Ubiquitous Computing Mobile and Ubiquitous Computing Today l Volatile systems l Association and Interoperation l Sensing context and adaptation Volatile systems " Mobile computing Exploiting the connectedness of devices as

More information

etouches, Inc. Privacy Policy

etouches, Inc. Privacy Policy etouches, Inc. Privacy Policy Effective Date: March 1, 2017 This privacy policy applies to etouches, Inc. ( etouches ) and covers the site, www.etouches.com corporate site and application(s) accessed via

More information

Privacy Policy. Last Updated: August 2017

Privacy Policy. Last Updated: August 2017 Privacy Policy Last Updated: August 2017 Here at ConsenSys we know how much you value privacy, and we realize that you care about what happens to the information you provide to us through our website,

More information

Conformity Assessment Schemes and Interoperability Testing (1) Keith Mainwaring ITU Telecommunication Standardization Bureau (TSB) Consultant

Conformity Assessment Schemes and Interoperability Testing (1) Keith Mainwaring ITU Telecommunication Standardization Bureau (TSB) Consultant Conformity Assessment Schemes and Interoperability Testing (1) Keith Mainwaring ITU Standardization Bureau (TSB) Consultant Moscow, 9-11 november 2011 Contents The benefits of conformity assessment Conformity

More information

SensorPlanet: a global test platform for mobile- centric wireless sensor network research

SensorPlanet: a global test platform for mobile- centric wireless sensor network research SensorPlanet: a global test platform for mobilecentric wireless sensor network research Owner: Contacts: Henry Tirri Barbara Heikkinen, Boda Péter 1 2006 Nokia SensorPlanet Nokia Research Center, Helsinki

More information

MEETING ISO STANDARDS

MEETING ISO STANDARDS WHITE PAPER MEETING ISO 27002 STANDARDS September 2018 SECURITY GUIDELINE COMPLIANCE Organizations have seen a rapid increase in malicious insider threats, sensitive data exfiltration, and other advanced

More information

Internet of Things. Sungkyunkwan University. Mobile Computing. Hyunseung Choo

Internet of Things. Sungkyunkwan University. Mobile Computing. Hyunseung Choo Sungkyunkwan University Internet of Things Mobile Computing Sungkyunkwan University Hyunseung Choo choo@skku.edu Mobile Computing Copyright 2000-2016 Networking Laboratory 1/32 Contents Introduction Characteristics

More information

Innovating with a Trillion Smart Objects

Innovating with a Trillion Smart Objects Bucharest April 2013 Innovating with a Trillion Smart Objects Ian Kennedy Senior Director, Cisco Europe, Middle East, Africa, Russia 2011 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect

More information

You may contact The Translation Network by at You may also call The Translation Network at

You may contact The Translation Network by  at You may also call The Translation Network at The Translation Network Privacy Policy This is a privacy policy for The Translation Network Group Inc. The Translation Network has created this privacy statement in order to demonstrate its firm commitment

More information

Online Privacy. Promise or Peril? Lorrie Faith Cranor AT&T Labs-Research

Online Privacy. Promise or Peril? Lorrie Faith Cranor AT&T Labs-Research Online Privacy Promise or Peril? Lorrie Faith Cranor AT&T Labs-Research http://lorrie.cranor.org/ Online privacy in the comics! Cathy February 25, 2000 2 Why is Cathy concerned? Cathy March 1, 2000 3 How

More information

Eagles Charitable Foundation Privacy Policy

Eagles Charitable Foundation Privacy Policy Eagles Charitable Foundation Privacy Policy Effective Date: 1/18/2018 The Eagles Charitable Foundation, Inc. ( Eagles Charitable Foundation, we, our, us ) respects your privacy and values your trust and

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO/IEC 29151 First edition 2017-08 Information technology Security techniques Code of practice for personally identifiable information protection Technologies de l'information Techniques

More information

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Charting the Course... Certified Information Systems Auditor (CISA) Course Summary Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business

More information

About the information we collect We collect and process personal data including but not limited to:-

About the information we collect We collect and process personal data including but not limited to:- Privacy Policy About us TP Supported Accommodation is responsible for collecting, processing, storing and safe keeping of personal information as part of our business activities. We manage information

More information

119 Ministries Privacy Policy v1.1 5/24/18. Full Policy

119 Ministries Privacy Policy v1.1 5/24/18. Full Policy 119 Ministries Privacy Policy v1.1 5/24/18 Full Policy This Privacy Policy discloses the privacy practices for the 119 Ministries, Inc. website (collectively, the Website located at www.119ministries.com).

More information

PRIVACY POLICY. 3.1 This policy does not apply to the collection, holding, use or disclosure of personal information that is an employee record.

PRIVACY POLICY. 3.1 This policy does not apply to the collection, holding, use or disclosure of personal information that is an employee record. 1. Introduction 1.1 From time to time Business & Risk Solutions Pty Ltd ("the Company") is required to collect, hold, use and/or disclose personal information relating to individuals (including, but not

More information

ITU Asia-Pacific Centres of Excellence Training on Conformity and Interoperability. Session 2: Conformity Assessment Principles

ITU Asia-Pacific Centres of Excellence Training on Conformity and Interoperability. Session 2: Conformity Assessment Principles ITU Asia-Pacific Centres of Excellence Training on Conformity and Interoperability Session 2: Conformity Assessment Principles 12-16 October 2015 Beijing, China Keith Mainwaring ITU Expert Agenda 1. Context

More information

Community Driven Development. Becomes Pervasive. Seminar Thesis Outline Andreas Herglotz

Community Driven Development. Becomes Pervasive. Seminar Thesis Outline Andreas Herglotz Community Driven Development and Social Networking Becomes Pervasive Seminar Thesis Outline Andreas Herglotz 18.01.2008 Agenda Different Aspects (Ubiquitous Computing, Social Networking, Community Driven

More information

Mobile and Ubiquitous Computing 2017/18 Fundamental Challenges and Problems

Mobile and Ubiquitous Computing 2017/18 Fundamental Challenges and Problems Mobile and Ubiquitous Computing 2017/18 Fundamental Challenges and Problems Based on materials by Prof. Paulo Ferreira Introduction Evolution Wheredo wewantto go? Challenges last class Basic Definitions

More information

Authenticating Pervasive Devices with Human Protocols

Authenticating Pervasive Devices with Human Protocols Authenticating Pervasive Devices with Human Protocols Presented by Xiaokun Mu Paper Authors: Ari Juels RSA Laboratories Stephen A. Weis Massachusetts Institute of Technology Authentication Problems It

More information

A full list of SaltWire Network Inc. publications is available by visiting saltwire.com.

A full list of SaltWire Network Inc. publications is available by visiting saltwire.com. Introduction Effective January 1, 2004, private sector organizations must follow a code for the protection of personal information in accordance with the Personal Information Protection and Electronic

More information

Cyber Security. Activities of an national insurance association based on the example of VVO

Cyber Security. Activities of an national insurance association based on the example of VVO Cyber Security Activities of an national insurance association based on the example of VVO Michael Brandstetter EU and International Affairs Austrian Insurance Association (VVO) IIF Insurance in the Digital

More information

enter into application on 25 May 2018

enter into application on 25 May 2018 General Data Protection Regulation What is GDPR? Is GDPR applicable for you? Which actions are required from you (and us)? Which rights do your clients have and which services can KBC Securities s provide

More information

Privacy Implications Guide. for. the CIS Critical Security Controls (Version 6)

Privacy Implications Guide. for. the CIS Critical Security Controls (Version 6) Privacy Implications Guide for the CIS Critical Security Controls (Version 6) Privacy Implications Guide for the CIS Critical Security Controls (Version 6) Acknowledgements: The Center for Internet Security

More information

An Introduction to the ISO Security Standards

An Introduction to the ISO Security Standards An Introduction to the ISO Security Standards Agenda Security vs Privacy Who or What is the ISO? ISO 27001:2013 ISO 27001/27002 domains Building Blocks of Security AVAILABILITY INTEGRITY CONFIDENTIALITY

More information

Unit 1: Introduction to Ubiquitous Services

Unit 1: Introduction to Ubiquitous Services Ubiquitous and Secure Networks and Services Redes y Servicios Ubicuos y Seguros Unit 1: Introduction to Ubiquitous Services Lourdes López Santidrián llopez@diatel.upm.es, lourdes.lopez@upm.es Lourdes López

More information

ngenius Products in a GDPR Compliant Environment

ngenius Products in a GDPR Compliant Environment l FAQ l ngenius Products in a GDPR Compliant Environment This document addresses questions from organizations that use ngenius Smart Data Core platform and application products and are evaluating their

More information

SAC PA Security Frameworks - FISMA and NIST

SAC PA Security Frameworks - FISMA and NIST SAC PA Security Frameworks - FISMA and NIST 800-171 June 23, 2017 SECURITY FRAMEWORKS Chris Seiders, CISSP Scott Weinman, CISSP, CISA Agenda Compliance standards FISMA NIST SP 800-171 Importance of Compliance

More information

IEI Smart Healthcare Solution

IEI Smart Healthcare Solution Population aging is becoming a worldwide phenomenon, and the requirements of health-caring are increasing. The World Health Organization (WHO) reports that 90% of seniors (US population) have at least

More information

1 Privacy Statement INDEX

1 Privacy Statement INDEX INDEX 1 Privacy Statement Mphasis is committed to protecting the personal information of its customers, employees, suppliers, contractors and business associates. Personal information includes data related

More information

Website Privacy Notice

Website Privacy Notice This privacy notice explains the processing of personal data on the website of Assurity Consulting Ltd (including the entity of Assurity Consulting Holdings Ltd). Assurity Consulting Ltd is committed to

More information

Policy-Based Context-Management for Mobile Solutions

Policy-Based Context-Management for Mobile Solutions Policy-Based Context-Management for Mobile Solutions Caroline Funk 1,Björn Schiemann 2 1 Ludwig-Maximilians-Universität München Oettingenstraße 67, 80538 München caroline.funk@nm.ifi.lmu.de 2 Siemens AG,

More information

Emergency Response: How dedicated short range communication will help in the future. Matthew Henchey and Tejswaroop Geetla, University at Buffalo

Emergency Response: How dedicated short range communication will help in the future. Matthew Henchey and Tejswaroop Geetla, University at Buffalo Emergency Response: How dedicated short range communication will help in the future. 1.0 Introduction Matthew Henchey and Tejswaroop Geetla, University at Buffalo Dedicated short range communication (DSRC)

More information

INFS 328 Systems Analysis and Design

INFS 328 Systems Analysis and Design INFS 328 Systems Analysis and Design Session 6 System Design Part 1 Lecturer: Prof. Ellis Edwin Badu, Dept. of Information Studies Contact Information: eebadu@ug.edu.gh College of Education School of Continuing

More information