Privacy Requirements Scoping
|
|
- Horatio Hopkins
- 5 years ago
- Views:
Transcription
1
2 DEVNET-2016 Privacy Requirements Scoping Jonathan Fox, Director, Privacy Engineering, Cisco Lisa Bobbitt, Privacy Architect, Cisco
3 Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile App 2. Click Join the Discussion 3. Install Spark or go directly to the space 4. Enter messages/questions in the space cs.co/ciscolivebot#devnet Cisco and/or its affiliates. All rights reserved. Cisco Public
4 Agenda Privacy and Privacy Engineering Privacy Requirements Scoping Workshops Context Diagrams and Use Cases Privacy Requirements Mini Privacy Requirements Scoping Workshop Report Out
5 Privacy and Privacy Engineering
6 Technology and Innovation Presenting Challenges to Privacy is Not New Printing Press Camera Database DEVNET Cisco and/or its affiliates. All rights reserved. Cisco Public 6
7 Personally Identifiable Information? Individual s name Individual s phone number National or tax identification number Information about an individual s mental or health conditions Financial information and records Information related to offenses or criminal convictions Racial or ethnic origin Religious or philosophical beliefs A street address PII: If for an individual Not PII: If for a business GEO location PII: If data is the GPS of an end user (i.e., an individual) Not PII: If data is derived from an IP address (i.e., at a large geographical area that is not specific to an individual IP address PII: If for an end user s (i.e., an individual s) device Not PII: If for a system in a rack at a data center Note: The Cisco Data Protection and Privacy Policy defines PII as any information or collection of data that enables identification of an individual. DEVNET Cisco and/or its affiliates. All rights reserved. Cisco Public 7
8 Privacy engineering is today s answer Process Innovation Data-centricity DEVNET Cisco and/or its affiliates. All rights reserved. Cisco Public 8
9 A Requirement of What? System Requirement Data Requirement Business Requirement 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
10 Privacy it s a loaded word Personally Identifiable Information Any information associated with a unique human being. Anything that identifies or can be used to contact an individual, or is reasonably linked to an individual s device Elements of non-personal information, when combined with other information to identify an individual, becomes personal data. Data Privacy Fair and legitimate processing of Personally Identifiable Information (PII) Processing Includes collection, storage, use, organization, recording, alignment, combination, disclosure by transmission, consultation, erasure, destruction, alteration, and so on Fair Information Principles Collection Security limitation Safeguards Data quality Openness Purpose Individual specification participation Use limitation Accountability Legitimate Consent Performance of a contract Compliance with a regulatory obligation Protection the vital interests Public interest or exercise of official, state authority Legitimate interest DEVNET Cisco and/or its affiliates. All rights reserved. Cisco Public 10
11 Privacy Requirements Scoping Workshops
12 Privacy requirements workshops are part of the scoping process User Interface Prototype Scoping Develop Class / Data Models Design Solution Construct Solution Quality Assurance Roll Out Solution Develop Requirements Use Cases Project Initiation DEVNET Cisco and/or its affiliates. All rights reserved. Cisco Public 12
13 Scoping Deliverables Scope of the enterprise List of triggering events List of business drivers List of information flows Scoping mission statement List of business classes Context diagram List of business processes List of context drivers List of potential privacy requirements List of action locations Use case schedule using identified subject matter experts DEVNET Cisco and/or its affiliates. All rights reserved. Cisco Public 13
14 Context Diagrams and Use Cases
15 Develop the Context Diagram The Enterprise Is the Process Actors Information/Control Flows What Event Triggers the Flow? Participant Actor Ultimate Customer In support of Ultimate Customer Where located? System Interface What Information/Material/ Control does user/system supply us? What Information/Material/ Control do we supply to user/system? What system? Where located? DEVNET Cisco and/or its affiliates. All rights reserved. Cisco Public 15
16 Again, stick figures are fine Internet User Call Center Handle Customer Call <<extends>> <<extends>> Handle Internet Sign-on <<actor>> Credit System Collect Initial Profile Information Collect Preference/Profile <<uses>> Shopper/Recommender <<actor>> Product Mgt <<uses>> Information-only Fullfillment <<extends>> Sale Fullfillment <<actor>> Logistics System <<actor>> Purchasing <<actor>> Manufacturing System Order Mgt (UML Use Case) SA/2001 Mon Oct 01, :26 Comment DEVNET Cisco and/or its affiliates. All rights reserved. Cisco Public 16
17 Privacy Requirements
18 Think of Privacy Notices as Meta Use Case Requirements Realistic technology capabilities and limitations Ethical obligations Enforceability and compliance Economic pressure to create value through efficient sharing / relationship building Usability, access and availability for end users of information systems Industry standards Brand identity Permission marketing / customer relationship management / business intelligence Privacy Policy Local and international legal, jurisdictional and regulatory necessities Organization / business requirements DEVNET Cisco and/or its affiliates. All rights reserved. Cisco Public 18
19 Privacy engineering = setting and executing on privacy requirements Data: What data is involved? Are they sensitive? Purpose: How and why is the data being processed? Means of collection: How is the data being gathered? Notice: Where was notice presented? What was in the notice? Choice/consent: What kind of choice is the owner of the data given? Transfer: Is it possible to transfer the data to third parties or another system? Access, correction, deletion: How can data be corrected or removed? Security: How is the data being kept from unauthorized access? Minimization: Is the data collected the minimum necessary to achieve the intended purpose? Proportionality: Is the processing of the data proportional to the need, purpose, and sensitivity of the data? Retention: Is the deletion strategy defined and enforced within the system or the enterprise? If so, how? Third parties: If third parties are involved, what is the relationship? Accountability: Are responsibilities defined and the internal enforcement mechanisms in place? What are they? Who owns the program? How is it managed? DEVNET Cisco and/or its affiliates. All rights reserved. Cisco Public 19
20 We use use cases to gather requirements! A use case is a complete course of events initiated by an actor Actors are people, functional roles, or interfacing systems that interact with the enterprise. Develop one or more use cases for each actor. Use cases allow business people to define requirements in business terms (business people can write use cases) Use cases specify interactions between the actor and business processes (automated or not). Use to begin to understand system interfaces. DEVNET Cisco and/or its affiliates. All rights reserved. Cisco Public 20
21 Time for a Mini Privacy Requirements Scoping Workshop
22 Methodology Example Supermarket App Supermarket App Goal Design a privacy sensitive supermarket app that creates shopping lists based on shopping history, maps a user s path in the supermarket to make it more efficient for you to shop, and directs users to bargains (i.e., ties into user s supermarket s affinity program). DEVNET Cisco and/or its affiliates. All rights reserved. Cisco Public 22
23 Supermarket App Context Diagram Data Steward Marketing/ Sales Team Business Stakeholders Biz Analyst Data Analyst Geo- Location Service Backend Shoppers App Data Subject (Shopper) DEVNET Cisco and/or its affiliates. All rights reserved. Cisco Public 23
24 In this the Scoping Workshop we will focus on User Experience What PII is needed? What kinds of choices and controls will the shopper be given? How will how will notice and consent be managed? 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
25 Report Out
26 -All of the data? -Shopper specifics? -Trends? -All of the data? -Shopper specifics? -Trends? -All of the data? -Shopper specifics? -Trends? -All of the data? -All of the data? -Prescriptions? -Credit Cards? Data Steward Marketing/ Sales Team Business Stakeholders Biz Analyst -Prescriptions? -Credit Cards? Data Analyst -In Store? -Out of Store? Geo- Location Service Backend Shoppers App Shopper -All his or her data? -What is all? -To what degree? DEVNET Cisco and/or its affiliates. All rights reserved. Cisco Public 26
27 Congratulations! You have started on your way to be Privacy Engineers 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
28 Privacy Engineering Based on Privacy Engineer s Manifesto DEVNET Cisco and/or its affiliates. All rights reserved. Cisco Public 28
29 Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile App 2. Click Join the Discussion 3. Install Spark or go directly to the space 4. Enter messages/questions in the space cs.co/ciscolivebot#devnet Cisco and/or its affiliates. All rights reserved. Cisco Public
30 Please complete your Online Session Evaluations after each session Complete 4 Session Evaluations & the Overall Conference Evaluation (available from Thursday) to receive your Cisco Live T-shirt All surveys can be completed via the Cisco Live Mobile App or the Communication Stations Complete Your Online Session Evaluation Don t forget: Cisco Live sessions will be available for viewing on-demand after the event at Cisco and/or its affiliates. All rights reserved. Cisco Public
31 Continue Your Education Demos in the Cisco campus Walk-in Self-Paced Labs Tech Circle Meet the Engineer 1:1 meetings Related sessions DEVNET Cisco and/or its affiliates. All rights reserved. Cisco Public 31
32 Thank you
33
NXOS in the Real World Using NX-API REST
NXOS in the Real World Using NX-API REST Adrian Iliesiu Corporate Development Engineer Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session
More informationYour API Toolbelt Tools and techniques for testing, monitoring, and troubleshooting REST API requests
DEVNET-1631 Your API Toolbelt Tools and techniques for testing, monitoring, and troubleshooting REST API requests Adam Kalsey, Spark Developer Relations Cisco Spark How Questions? Use Cisco Spark to communicate
More informationBGP in the Enterprise for Fun and (fake) Profit: A Hands-On Lab
BGP in the Enterprise for Fun and (fake) Profit: A Hands-On Lab Michael Kowal, Principal Systems Engineer, @ciscomk Dash Thompson, Systems Engineer, @dash_thompson Abel Ramirez, Systems Engineer, @ramirezabel21
More informationCOMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2
COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September 2018 Table of Contents 1. Scope, Purpose and Application to Employees 2 2. Reference Documents 2 3. Definitions 3 4. Data Protection Principles
More informationGet Hands On With DNA Center APIs for Managing Intent
DEVNET-3620 Get Hands On With DNA Center APIs for Managing Intent Adam Radford Distinguished Systems Engineer Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session
More informationCisco Spark Messaging APIs - Integration Platforms as a Service Real World Use-Cases
DEVNET-2023 Cisco Spark Messaging APIs - Integration Platforms as a Service Real World Use-Cases David Staudt DevNet Developer Evangelist / Principal Engineer Cisco Spark How Questions? Use Cisco Spark
More informationDevNet Workshop-Hands-on with CloudCenter and Jenkins
DevNet Workshop-Hands-on with CloudCenter and Jenkins Tuan Nguyen, Technical Marketing Engineer, CPSG Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find
More informationCloudCenter for Developers
DEVNET-1198 CloudCenter for Developers Conor Murphy, Systems Engineer Data Centre Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the
More informationCisco Enterprise Agreement
PSODGT-1076 Cisco Enterprise Agreement John Marshall, Global Director: Cisco Enterprise Agreement strategy Vinay Nichani, WW Software Sales Cisco Spark How Questions? Use Cisco Spark to communicate with
More informationDEVNET Introduction to Git. Ashley Roach Principal Engineer Evangelist
DEVNET-1080 Introduction to Git Ashley Roach Principal Engineer Evangelist Twitter: @aroach Email: asroach@cisco.com Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the
More informationThis Policy has been prepared with due regard to the General Data Protection Regulation (EU Regulation 2016/679) ( GDPR ).
PRIVACY POLICY Data Protection Policy 1. Introduction This Data Protection Policy (this Policy ) sets out how Brital Foods Limited ( we, us, our ) handle the Personal Data we Process in the course of our
More informationHands On Exploration of NETCONF and YANG
Hands On Exploration of NETCONF and YANG Bryan Byrne, CCIE 25607 (R/S) Technical Solutions Architect Enterprise Networks @bryan25607 Agenda Introduction Module 1 YANG Data Modeling Module 2 Introduction
More informationMotorola Mobility Binding Corporate Rules (BCRs)
Motorola Mobility Binding Corporate Rules (BCRs) Introduction These Binding Privacy Rules ( Rules ) explain how the Motorola Mobility group ( Motorola Mobility ) respects the privacy rights of its customers,
More informationMagical Chatbots with Cisco Spark and IBM Watson
DEVNET-2321 Magical Chatbots with Cisco Spark and IBM Watson Lauren Ramgattie, Technical Marketing Engineer Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session
More informationGit, Atom, virtualenv, oh my! Learn about dev tools to live by!
BRKDEV-2633 Git, Atom, virtualenv, oh my! Learn about dev tools to live by! Ashley Roach, Principal Engineer Evangelist Agenda Introduction Why are developer tools useful? What s in the toolbelt? Tool
More informationINNOVENT LEASING LIMITED. Privacy Notice
INNOVENT LEASING LIMITED Privacy Notice Table of Contents Topic Page number KEY SUMMARY 2 ABOUT US AND THIS NOTICE 3 USEFUL WORDS AND PHRASES 4 WHAT INFORMATION DO WE COLLECT? 4 WHY DO WE PROCESS YOUR
More informationWithin the meanings of applicable data protection law (in particular EU Regulation 2016/679, the GDPR ):
Privacy Policy Introduction Ikano S.A. ( Ikano ) respects your privacy and is committed to protect your Personal Data by being compliant with this privacy policy ( Policy ). In addition to Ikano, this
More informationTechnical Requirements of the GDPR
Technical Requirements of the GDPR Purpose The purpose of this white paper is to list in detail all the technological requirements mandated by the new General Data Protection Regulation (GDPR) laws with
More informationFinesse APIs: Getting started with the REST APIs and XMPP events
Finesse APIs: Getting started with the REST APIs and XMPP events Denise Kwan, Software Engineer @ DevNet Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1.
More informationCloud Mobility: Meraki Wireless & EMM
BRKEWN-2002 Cloud Mobility: Meraki Wireless & EMM Emily Sporl Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile
More informationOrange: Cisco & Orange: a human touch for a digital experience
BRKPAR-4667 Orange: Cisco & Orange: a human touch for a digital experience Pierre louis Biaggi, SVP Head of Connectivity Business Unit, Orange Business Services Eric Masseboeuf, Collaboration Head of Business
More informationDeploying Cloud-Agnostic Applications with Cisco CloudCenter
LTRCLD-2303 Deploying Cloud-Agnostic Applications with Cisco CloudCenter Zack Kielich CloudCenter Product Manager Vince Motto Sr. Technical Leader Andrew Horrigan Consulting Engineer Matt Tarkington Consulting
More informationIslam21c.com Data Protection and Privacy Policy
Islam21c.com Data Protection and Privacy Policy Purpose of this policy The purpose of this policy is to communicate to staff, volunteers, donors, non-donors, supporters and clients of Islam21c the approach
More informationAn Introduction to Developing for Cisco Kinetic
An Introduction to Developing for Cisco Kinetic Krishna Chengavalli Technical Marketing Engineer IoT Software Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session
More informationCisco Spark. Questions? Use Cisco Spark to communicate with the speaker after the session. How
Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile App 2. Click Join the Discussion 3. Install Spark or go directly
More informationWho wants to be a millionaire? A class in creating your own cryptocurrency
DEVNET-3626 Who wants to be a millionaire? A class in creating your own cryptocurrency Tom Davies, Sr. Manager, DevNet Sandbox Vallard Benincosa, Software Engineer Cisco Spark How Questions? Use Cisco
More informationThis article will explain how your club can lawfully process personal data and show steps you can take to ensure that your club is GDPR compliant.
GDPR and BMC Clubs Lawful basis for Processing Personal Data This article will explain how your club can lawfully process personal data and show steps you can take to ensure that your club is GDPR compliant.
More informationNetBrain Technologies: Achieving Agile Network Operations: How Automation Can Improve Visibility Across Hybrid Infrastructures
BRKPAR - 2509 NetBrain Technologies: Achieving Agile Network Operations: How Automation Can Improve Visibility Across Hybrid Infrastructures Jason Baudreau Achieving Agile Network Operations How Automation
More informationEuropean DevNet Pros Panel
DEVNET-2399 European DevNet Pros Panel Erik Tiengo, CTO @Neratech Stefano Linari, CEO @Allentia Paola Mancini, Software Engineer @Italtel Jean-Luc Darbonnel, Project Lead @Orange Tobias Lensker, Sales
More informationManaging Cisco UCS with the Python SDK
DEVNET-2060 Managing Cisco UCS with the Python SDK John McDonough, Technical Leader Developer Evangelist Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1.
More informationDNA Automation Services Offerings
DNA Automation Services Offerings Jamie Owen, Solutions Architect, Cisco Advanced Services Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session
More informationCustomer s journey into the private cloud with Cisco Enterprise Cloud Suite
Customer s journey into the private cloud with Cisco Enterprise Cloud Suite Peter Charpentier, Senior Solution Architect, Cisco AS Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker
More information1 Privacy Statement INDEX
INDEX 1 Privacy Statement Mphasis is committed to protecting the personal information of its customers, employees, suppliers, contractors and business associates. Personal information includes data related
More information2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Cisco ACI App Center Fabrice Servais, Software Engineer, Data Center Networking, Cisco Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session
More informationAutomation with Meraki Provisioning API
DEVNET-2120 Automation with Meraki Provisioning API Courtney M. Batiste, Solutions Architect- Cisco Meraki Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1.
More informationPS Mailing Services Ltd Data Protection Policy May 2018
PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Limited is a registered data controller: ICO registration no. Z9106387 (www.ico.org.uk 1. Introduction 1.1. Background We collect
More informationData Protection Policy
Data Protection Policy Introduction Stewart Watt & Co. is law firm and provides legal advice and assistance to its clients. It is regulated by the Law Society of Scotland. The personal data that Stewart
More informationThe British Museum. Data Protection Code of Practise. 1 Introduction
The Data Protection Code of Practice 1 Introduction 1.1 The 1998 Data Protection Act is aimed at ensuring a balance between individuals rights to privacy and the lawful processing of personal data undertaken
More informationEmpower your testing with Cisco Test Automation Solution Featuring pyats & Genie
Empower your testing with Cisco Test Automation Solution Featuring pyats & Genie Siming Yuan, Technical Leader, Engineering, Cisco Jean-Benoit Aubin, Engineer, Software Engineering, Cisco Sedy Yadollahi,
More informationCisco UCS Agentless Configuration Management Ansible or Microsoft DSC
DEVNET-2916 Cisco UCS Agentless Configuration Management Ansible or Microsoft DSC John McDonough, Technical Leader Developer Evangelist Cisco Spark How Questions? Use Cisco Spark to communicate with the
More informationCreating a custom gadget using the Finesse JavaScript Library API
Creating a custom gadget using the Finesse JavaScript Library API Denise Kwan, Software Engineer @ DevNet Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1.
More informationGeneral Data Protection Regulation Frequently Asked Questions (FAQ) General Questions
General Data Protection Regulation Frequently Asked Questions (FAQ) This document addresses some of the frequently asked questions regarding the General Data Protection Regulation (GDPR), which goes into
More informationAdkin s Privacy Information Notice for Clients, Contractors, Suppliers and Business Contacts
Adkin s Privacy Information Notice for Clients, Contractors, Suppliers and Business Contacts POLICY STATEMENT Adkin is committed to protecting and respecting the privacy of all of our clients. This Policy
More informationWhat is GDPR? https://www.eugdpr.org/ Editorial: The Guardian: August 7th, EU Charter of Fundamental Rights, 2000
GDPR: The basics What is GDPR? The EU General Data Protection Regulation (GDPR) is the biggest European shake-up of data protection in a generation. It s the culmination of two decades of experience of
More informationKährs Group s Privacy Policy
Purpose and Scope Kährs Group is committed to protecting the privacy of individuals and in this policy we explain how the Kährs Group collects and uses personal data. It also describes the rights of the
More informationDEPARTMENT OF JUSTICE AND EQUALITY. Data Protection Policy
DEPARTMENT OF JUSTICE AND EQUALITY Data Protection Policy May 2018 Contents Page 1. Introduction 3 2. Scope 3 3. Data Protection Principles 4 4. GDPR - Rights of data subjects 6 5. Responsibilities of
More informationPrivacy Policy... 1 EU-U.S. Privacy Shield Policy... 2
Privacy Policy... 1 EU-U.S. Privacy Shield Policy... 2 Privacy Policy knows that your privacy is important to you. Below is our privacy policy for collecting, using, securing, protecting and sharing your
More informationMBNL Landlord Privacy Notice. This notice sets out how we handle landlord personal data as part of our General Data Protection policies (GDPR).
MBNL Landlord Privacy Notice This notice sets out how we handle landlord personal data as part of our General Data Protection policies (GDPR). SUMMARY This Privacy Notice applies to: users of our website
More informationDATA PROTECTION ISACA MALTA CHAPTER BIENNIAL CONFERENCE Saviour Cachia Commissioner for Information and Data Protection
DATA PROTECTION ISACA MALTA CHAPTER BIENNIAL CONFERENCE 2016 Saviour Cachia Commissioner for Information and Data Protection Conception of DPA Council of Europe ETS 108 Convention on the protection of
More informationGovernment-issued identification numbers (e.g., tax identification numbers)
Privacy Policy This Privacy Policy explains how the ACMI collects, uses, shares and safeguards Personal Data and Non- Personal Data on www.acmiart.org, mobile websites, microsites, mobile applications,
More informationADMA Briefing Summary March
ADMA Briefing Summary March 2013 www.adma.com.au Privacy issues are being reviewed globally. In most cases, technological changes are driving the demand for reforms and Australia is no exception. From
More informationNetDevOps Style Configuration Management for the Network
DEVNET-3616 NetDevOps Style Configuration Management for the Network Hank Preston, NetDevOps Evangelist ccie 38336, R/S @hfpreston Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker
More informationHands-On with IoT Standards & Protocols
DEVNET-3623 Hands-On with IoT Standards & Protocols Casey Bleeker, Developer Evangelist @geekbleek Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this
More informationThe Role of the Data Protection Officer
The Role of the Data Protection Officer Adrian Ross LLB (Hons), MBA GRC Consultant IT Governance Ltd 28 July 2016 www.itgovernance.co.uk Introduction Adrian Ross GRC consultant Infrastructure services
More informationUSER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy.
These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy. I. OBJECTIVE ebay s goal is to apply uniform, adequate and global data protection
More informationCognizant Careers Portal Privacy Policy ( Policy )
Cognizant Careers Portal Privacy Policy ( Policy ) Date: 22 March 2017 Introduction This Careers Portal Privacy Policy ("Policy") applies to the Careers portal on the Cognizant website accessed via www.cognizant.com/careers
More informationTetration Hands-on Lab from Deployment to Operations Support
LTRACI-2184 Tetration Hands-on Lab from Deployment to Operations Support Furong Gisiger, Solutions Architect Lawrence Zhu, Sr. Solutions Architect Cisco Spark How Questions? Use Cisco Spark to communicate
More informationPrivacy Shield Policy
Privacy Shield Policy Catalyst Repository Systems, Inc. (Catalyst) has adopted this Privacy Shield Policy ("Policy") to establish and maintain an adequate level of Personal Data privacy protection. This
More informationGDPR Privacy Policy. The data protection policy of AlphaMed Press is based on the terms found in the GDPR.
GDPR Privacy Policy PRIVACY POLICY The privacy and security of data are a priority for AlphaMed Press and our management and staff. While accessing and using our website does not require your submission
More informationPrivacy Policy. In this data protection declaration, we use, inter alia, the following terms:
Last updated: 20/04/2018 Privacy Policy We are very delighted that you have shown interest in our enterprise. Data protection is of a particularly high priority for the management of VITO (Vlakwa). The
More informationStrasbourg, 21 December / décembre 2017
Strasbourg, 21 December / décembre 2017 T-PD(2017)20Rev CONSULTATIVE COMMITTEE OF THE CONVENTION FOR THE PROTECTION OF INDIVIDUALS WITH REGARD TO AUTOMATIC PROCESSING OF PERSONAL DATA COMITÉ CONSULTATIF
More informationAutomation and Programmability using Cisco Open NXOS and DevOps Tools
Automation and Programmability using Cisco Open NXOS and DevOps Tools Jeff Lester Sr. Solutions Integration Architect Matt Tarkington Consulting Engineer Services Cisco Spark How Questions? Use Cisco Spark
More informationGeneral Data Protection Regulation (GDPR) Key Facts & FAQ s
General Data Protection Regulation (GDPR) Key Facts & FAQ s GDPR comes into force on 25 May 2018 GDPR replaces the Data Protection Act 1998. The main principles are much the same as those in the current
More informationPRIVACY POLICY POLICY KEY DEFINITIONS: PROCESSING OF YOUR PERSONAL DATA
PRIVACY POLICY This privacy policy notice is for this website; www.aldlife.org and served by ALD Life, 45 Peckham High Street, London SE15 5EB and governs the privacy of those who use it. The purpose of
More informationGLOBAL DATA PROTECTION POLICY
GLOBAL DATA PROTECTION POLICY BRS UK Version 1.0 TABLE OF CONTENTS SCOPE 2 COLLECTION AND PROCESSING USE OF YOUR PERSONAL DATA 2 Compliance with the European data protection law and any additional applicable
More informationEU GDPR: The General Data Protection Regulation
EU GDPR: The General Data Protection Regulation A Brief Overview Duke Privacy The General Data Protection Regulation Became effective May 25, 2018. Formally codifies privacy as a fundamental right and
More informationAbout the information we collect We collect and process personal data including but not limited to:-
Privacy Policy About us TP Supported Accommodation is responsible for collecting, processing, storing and safe keeping of personal information as part of our business activities. We manage information
More informationSimplifying Collaboration Deployments with Prime Collaboration
Simplifying Collaboration Deployments with Prime Collaboration Jose Gregorio Linero Welcker, Technical Solutions Architect Latam MCO CCIE Collaboration # 24857 Cisco Spark How Questions? Use Cisco Spark
More informationData Privacy Notice. Madsen Advisory Limited ("Madsen") is committed to protecting and respecting your privacy.
Data Privacy Notice 1.INTRODUCTION Madsen Advisory Limited ("Madsen") is committed to protecting and respecting your privacy. We pledge to handle your data fairly and legally at all times and are committed
More informationTRex Realistic Traffic Generator
DEVNET-1120 TRex Realistic Traffic Generator Hanoch Haim, Principal Engineer Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco
More informationPrivacy Policy GENERAL
Privacy Policy GENERAL This document sets out what information Springhill Care Group Ltd collects from visitors, how it uses the information, how it protects the information and your rights. Springhill
More informationCisco DNA Center and Italtel Netwrapper Evolution: Network and Applications come together
BRKPAR-4980 Cisco DNA Center and Italtel Netwrapper Evolution: Network and Applications come together Stefano Boero Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the
More informationCisco UCS Director and ACI Advanced Deployment Lab
Cisco UCS Director and ACI Advanced Deployment Lab Michael Zimmerman, TME Vishal Mehta, TME Agenda Introduction Cisco UCS Director ACI Integration and Key Concepts Cisco UCS Director Application Container
More informationGLOBAL DATA PROTECTION POLICY
GLOBAL DATA PROTECTION POLICY Last update: April 2nd, 2018 SCOPE 3 COLLECTION AND PROCESSING USE OF YOUR PERSONAL DATA 3 Compliance with the European Data Protection Law and any additional applicable data
More informationCisco Container Platform
Cisco Container Platform Pradnesh Patil Suhail Syed Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile App 2. Click
More informationGeorgia Institute of Technology EU GDPR Lawful Basis Form
Georgia Institute of Technology EU GDPR Lawful Basis Form Introduction Beginning May 25, 2018, some of Georgia Tech s activities will be subject to more stringent regulations governing the use of personal
More informationPrivacy Policy Effective May 25 th 2018
Privacy Policy Effective May 25 th 2018 1. General Information 1.1 This policy ( Privacy Policy ) explains what information Safety Management Systems, 2. Scope Inc. and its subsidiaries ( SMS ), it s brand
More informationIt applies to personal information for individuals that are external to us such as donors, clients and suppliers (you, your).
Our Privacy Policy 1 Purpose Mission Australia is required by law to comply with the Privacy Act 1988 (Cth) (the Act), including the Australian Privacy Principles (APPs). We take our privacy obligations
More informationATHLETICS WORLD CUP PRIVACY NOTICE
ATHLETICS WORLD CUP PRIVACY NOTICE This Privacy Notice explains how Athletics World Cup ("AWC") collects, uses and shares the personal information that you provide to us either when using this website
More informationManaging The Digital Network Workforce Transformation
ITM-1018 Managing The Digital Network Workforce Transformation Carine Bongaerts IT Manager Network Services Agenda Introduction New Skills and Mindset Change Operating Model Change - DevOps Delivery Model
More informationData Protection Policy
Data Protection Policy Data Protection Policy Version 3.00 May 2018 For more information, please contact: Technical Team T: 01903 228100 / 01903 550242 E: info@24x.com Page 1 The Data Protection Law...
More informationCisco SD-Access Hands-on Lab
LTRCRS-2810 Cisco SD-Access Hands-on Lab Larissa Overbey - Technical Marketing Engineer, Cisco Derek Huckaby - Technical Marketing Engineer, Cisco https://cisco.box.com/v/ltrcrs-2810-bcn2018 Password:
More informationGDPR. What is GDPR? GDPR is extraterritorial, meaning it applies to any company, processing EU resident data, irrespective of their location.
1 3 5 What is GDPR? The European Union s ( EU ) General Data Protection Regulation ( GDPR ) replaces the 1995 Data Protection Directive, and while the new requirement became effective May 25, 2018, Data
More informationthe processing of personal data relating to him or her.
Privacy Policy We are very delighted that you have shown interest in our enterprise. Data protection is of a particularly high priority for the management of the Hotel & Pensionat Björkelund. The use of
More informationElement Finance Solutions Ltd Data Protection Policy
Element Finance Solutions Ltd Data Protection Policy CONTENTS Section Title 1 Introduction 2 Why this Policy Exists 3 Data Protection Law 4 Responsibilities 5 6 7 8 9 10 Data Protection Impact Assessments
More informationSubject: Kier Group plc Data Protection Policy
Kier Group plc Data Protection Policy Subject: Kier Group plc Data Protection Policy Author: Compliance Document type: Policy Authorised by: Kier General Counsel & Company Secretary Version 3 Effective
More informationIMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES
IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES Introductions Agenda Overall data risk and benefit landscape / shifting risk and opportunity landscape and market expectations Looking at data
More informationInside Cisco IT: Automated end user services via Cisco Prime Service Catalog, Process Orchestrator and AppDynamics
Inside Cisco IT: Automated end user services via Cisco Prime Service Catalog, Process Orchestrator and AppDynamics Simon Power Sr Manager IT David Reed IT Service Manager Agenda The increasingly critical
More informationYou will see lots of references in the Checklist to the GDPR Pack if you would like to purchase this, go to
Suzanne Dibble 2018. Copyright in this document belongs to Suzanne Dibble. You may not copy or use it for any purpose unless you have purchased this template document from Suzanne Dibble. You may not allow
More informationAn Introduction to Monitoring Encrypted Network Traffic with "Joy"
An Introduction to Monitoring Encrypted Network Traffic with "Joy" Philip Perricone (SE) Bill Hudson (TL) Blake Anderson (TL) David McGrew (Fellow) Cisco Spark How Questions? Use Cisco Spark to communicate
More informationThis guide is for informational purposes only. Please do not treat it as a substitute of a professional legal
What is GDPR? GDPR (General Data Protection Regulation) is Europe s new privacy law. Adopted in April 2016, it replaces the 1995 Data Protection Directive and marks the biggest change in data protection
More informationTREND MICRO PRIVACY POLICY
TREND MICRO PRIVACY POLICY for the European Union, the European Economic Area (EEA) and the United Kingdom (March 2018) (Any references to the General Data Protection Regulation of the European Union of
More informationWhen this policy mentions WanderJaunt, we, us, or our, it refers to the WanderJaunt, Inc.
WanderJaunt Privacy Policy Last Updated: June 20, 2018 Thank you for using WanderJaunt! This Privacy Policy describes how we collect, use, process, and disclose your information, including personal information,
More informationWhen you provide personal information to us it will only be used in the ways described in this privacy policy.
Website Privacy Policy Overview Welcome to this Global Payroll Management Institute website, owned and produced by the Global Payroll Management Institute, Inc. (GPMI). Our website is available to all
More informationGRANDSTREAM PRIVACY STATEMENT
GRANDSTREAM PRIVACY STATEMENT This Privacy Statement governs how Grandstream Networks, Inc. and its affiliates ( Grandstream, us, our or we ) may collect, use, and disclose information that we obtain through
More informationData Protection Policy
Data Protection Policy Addressing the General Data Protection Regulation (GDPR) 2018 [EU] and the Data Protection Act (DPA) 2018 [UK] For information on this Policy or to request Subject Access please
More informationPSOACI Why ACI: An overview and a customer (BBVA) perspective. Technology Officer DC EMEAR Cisco
PSOACI-4592 Why ACI: An overview and a customer (BBVA) perspective TJ Bijlsma César Martinez Joaquin Crespo Technology Officer DC EMEAR Cisco Lead Architect BBVA Lead Architect BBVA Cisco Spark How Questions?
More informationMigrating Applications with CloudCenter
Migrating Applications with CloudCenter Tuan Nguyen, Technical Marketing Engineer, Insieme BU DEVNET-1179 Cisco Spark How Questions? Use Cisco Spark to chat with the speaker after the session 1. Find this
More informationCisco Spark Widgets Technical drill down
DEVNET-1891 Cisco Spark Widgets Technical drill down Adam Weeks, Engineer @CiscoSparkDev Stève Sfartz, API Evangelist @CiscoDevNet Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker
More informationIntroducing Cisco Network Assurance Engine
BRKACI-2403 Introducing Cisco Network Assurance Engine Intent Based Networking for Data Centers Sundar Iyer, Distinguished Engineer Head Cisco Network Assurance Engine Team Dhruv Jain, Director of Product
More information