Aspects of Identity. IGF November BCS Security Community of Expertise
|
|
- Juniper Welch
- 5 years ago
- Views:
Transcription
1 Aspects of Identity IGF November 2012 BCS Security Community of Expertise
2 Representatives Dr. Louise Bennett FBCS CITP Chair of the BCS Security Community of Expertise Mirza Asrar Baig Executive Director, IT Matrix, Saudi Arabia Andy Smith MSc CEng FBCS CITP FSyI CSyP Member BCS SCoE and Digital Policy Alliance (EURIM) John Bullard Global Ambassador, IdenTrust Ian Fish FBCS CITP Member BCS SCoE Remote Moderator 2
3 Agenda Introduction Louise Bennett Outlines of issues 3 Topics Commercialisation of the Internet (West view): Commercialisation of the Internet (East view): Governance of Identity on the Internet: Security v. Privacy and openness: NO Questions Save for discussion Panel Session Wrap-Up 5 minutes 25 minutes Louise Bennett Asrar Baig John Bullard Andy Smith 50 minutes 5 minutes 3
4 Points of Admin In case of a fire Try to keep up This session is being recorded under the Chatham House Rule to allow the talks and Feedback to be transcribed. The recordings may be published on the website in which case all names and affiliations will be removed. 4
5 Introduction Who is BCS, The Chartered Institute for IT? Formerly British Computer Society International organisation 70,000+ members worldwide Remote Moderation 5
6 Last Year Workshops at UN-IGF, EuroDIG, InfoSec, UK Pictfor, BCS/EEMA conference Produced Aspects of Identity Started with a set of questions Got some surprising answers and changes in direction Fundamental finding Proportionality between security & privacy / anonymity culturally and context sensitive but also very hard to define and emotive New Questions for 2012 InfoSec
7 This Year Developing a dialogue on: The commercialisation of Identity Legal Frameworks Effect on economic development of the Internet Better use of identity for access to online resources and services Dynamic Coalition InfoSec
8 Commercialisation of the Internet Western View Dr. Louise Bennett
9 Is it a real e-commerce site? InfoSec
10 Aggregation & Data Mining Where is my personal Information? InfoSec
11 Are all Identities the same? InfoSec
12 Questions 1. Is identity legitimate currency to fund the Internet? 2. Can individuals have any control over aggregating / data mining on the Internet? 3. Do business and things need the same types of identities as individuals on the Internet? 12
13 Commercialisation of the Internet Eastern View Mirza Asrar Baig
14 Eastern view of Internet Commerce Challenges: Product Transaction in Ecommerce Physical presence is still preferred Delivery Infrastructure issues Lacking Legal framework to protect consumer Thereby what is working partially over Ecommerce Airline tickets / Hotel bookings E-banking / Utility Bills Government services InfoSec
15 Eastern view of Internet Commerce Challenges: TRUST on FACE VALUE User awareness about digital security is very low in comparison to the west If it is on the internet it must be true! Prevention??? Not part of culture InfoSec
16 Eastern view of Internet Commerce Acceptance: Privacy not so private Being monitored closely is normal Challenging authority is not so thinkable Lacking legal framework to define privacy rights Expects Government Authority to define, manage and control Internet identities InfoSec
17 Questions 1. How privacy advocates would not go over board in pushing the eastern societies to be more aware of their rights? 2. How internet identity framework can become e-business enabler for the masses in the east? 3. What boundaries of Internet Identity would advocates of Anonymous accept? 17
18 Governance of Identity on the Internet John G Bullard Global Ambassador
19 What, exactly, do we mean by trusted e-identity? Having absolute certainty of who you are interacting with Being able to check/validate that this is, indeed, the case Knowing who guarantees the identity of the individual person Being a real name, not just a number Having complete trust to act on their instructions Having a complete & transparent audit trail of who did what, and when Seeing eid as a key component to limiting liability and external exposures In the online world, trusted identity management is an Operational Risk Management Issue, not just a Technology issue
20 Vital for Business, Govts, Citizens and Banks Buyer Find Trading Partner Bid/ Selection Obtain Credit Contracts/ Purchase Order einvoicing Logistics Pay / Settle Online Trust is essential at each stage for commerce to flourish globally Seller Find Trading Partner Offer/ Accept Assess Credit Contracts/ Purchase Order einvoicing Logistics Pay / Settle Having established the identities of the two trading parties, bits & bytes representing money move between the parties
21 Level of Effort/Complexity Level of Effort/Complexity Two distinct issues for trusted e-id / e Signatures 1. What aspects of Identity will be managed? 2. Who will be covered by the identity management solution? Policy Multiple Communities of Interest Often spanning Multiple legal jurisdictions Legal & Liability Multiple Communities of Interest Operations A Community of Interest Tech Internal
22 Contract-based liability framework for global trusted e-id Global Legal Interoperability is possible only in a Contractual System governing Subscribing Customer Customer Agreement- per each country jurisdiction Issuing Participant (Locally Regulated) Global Scheme Operating Rules (contractual) IdenTrust Root CA Relying Customer Customer Agreement per each country jurisdiction Relying Participant (Locally Regulated) Liability and Recourse Among All Parties - Operating Rules bind all players - Customer Agreements bind customers to contractual liability limitations Legal Recognition of Digital Signatures Contract Formation Electronically - Signed OCSP validation assures every Relying Party is bound to a customer agreement - Legal effect of digital signatures authenticated by validated certificates provided by contract, globally Dispute Resolution over Signature Validity - Dispute Resolution Procedures provide private forum (London Court of Arbitrage) Technical Standards - Ensures compatibility across the Network - Reduces cost through vendor competition for standard component elements
23 Questions 1. To what extent does Identity help fund the Internet? 2. Are there transactions where Identity is not needed? 3. Do Devices need Identities? 23
24 Security v. Privacy & Openness Andy Smith
25 Balancing Act InfoSec
26 Security v. Privacy Very Emotive InfoSec
27 How good is good enough? InfoSec
28 Questions 1. How do you protect the naïve from themselves? 2. Will we ever be able to balance the need for security with the right to privacy? 3. How do you gain assurance in remote identities for the context its needed? 28
29
30 Conclusion This is an ongoing piece of work and an important subject Identities are critical to success of the Internet, they are different for individuals and things. It is vital to have the right level of Identity assurance for the context of a transaction over the Internet 30
31 Dynamic Coalition We strongly feel that ongoing dialogue about identity assurance over the Internet is important and we need as many stakeholders to be involved as possible. Please contact to join the Dynamic Coalition More information 31
32 What Next?? Draw conclusions from the work this year and publish a new Yearbook Revise the question set for next year InfoSec 2013, IGF Get the Dynamic Coalition working with a multistakeholder group including Government, Industry, financial institutions and legal profession Continue engagement on Identity Assurance online with UN-IGF and adding a Cyber Security dimension to evolving treaties and legislation 32
33 Visit the website at: EURIM Digital Policy Alliance IdenTrust IT Matrix
34 Question Sets 1. To what extent does Identity help fund the Internet? 2. Are there transactions where Identity is not needed? 3. Do Devices need Identities? 4. How do you identify someone remotely? 5. What is an acceptable False accept / reject rate? 6. How can you rely on / trust an online identity? 7. How much do we care about Fraud? 8. How does Trust vary with Context? 9. How do you protect the Naive from themselves? 10. How do you know who is Liable? For what? 11. In what situations is Redress essential? 12. Can you withdraw Consent? 13. Is Identity legitimate Currency? 14. Can the individual have any control over Aggregation / Data Mining? 15. What is the Risk Reward balance? 1. Question 1: What impact can security and governance issues have on the Internet and human rights? In this case the right to privacy 2. Question 3: What risks can Internet fragmentation pose to security, privacy and openness? If identity governance becomes fragmented and requirements change what impact does this have? 3. Question 5: What risks do law enforcement, information suppression and surveillance have on security, privacy and openness? Identity information can be used as a tool by state and law enforcement both for good and bad reasons, how do you strike a balance? 4. Question 6: What measures can be taken to ensure freedom of expression, access to knowledge and privacy, including for children? Can anonymity really be possible on the Internet and does this have implications on providing a tool for criminal and terrorist organisations? 1. To look at the governance of identity on the internet and its impacts on security and privacy. 2. Look at the use of identity in commercialisation of the Internet with particular regard to legal frameworks and economic development. 3. To look at the balance between privacy and openness, in the context of user norms and behaviour, including how to protect the naïve from themselves, and how to enable better use of identity for access to information resources and online services. InfoSec
Aspects of Identity. InfoSec April BCS Security Community of Expertise
Aspects of Identity InfoSec April 2011 BCS Security Community of Expertise SCoE Representatives Dr. Louise Bennett FBCS CITP Chair of the BCS Security Community of Expertise Ian Fish FBCS BCS Information
More informationAspects of Identity. InfoSec April BCS Security Community of Expertise
Aspects of Identity InfoSec April 2011 BCS Security Community of Expertise SCoE Representatives Dr. Louise Bennett FBCS CITP Chair of the BCS Security Community of Expertise Ian Fish FBCS BCS Information
More informationTrusted Identities That Drive Global Commerce
Trusted Identities That Drive Global Commerce For information of the BCS/EEMA Community A truly Federated Trust Network - Building upon core competences of the worlds banks & payments systems Governance
More informationATHLETICS WORLD CUP PRIVACY NOTICE
ATHLETICS WORLD CUP PRIVACY NOTICE This Privacy Notice explains how Athletics World Cup ("AWC") collects, uses and shares the personal information that you provide to us either when using this website
More informationCyber Security Strategy
Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from
More informationBIOEVENTS PRIVACY POLICY
BIOEVENTS PRIVACY POLICY At Bioevents, your privacy is important. Below you will find our privacy policy, which covers all personally identifiable data shared through Bioevents websites. Our privacy policy
More informationAt Electronics Watch, we re committed to protecting and respecting your privacy
Privacy Policy At Electronics Watch, we re committed to protecting and respecting your privacy This Policy sets out our data collection and processing practices, the conditions under which we may disclose
More informationCommonwealth Cyber Declaration
Commonwealth Cyber Declaration Recognising that the development of cyberspace has made a powerful contribution to the economic, social, cultural and political life of the Commonwealth; Underlining that
More informationMOBILE.NET PRIVACY POLICY
MOBILE.NET PRIVACY POLICY As the operator of the Mobile.net website (https://mobile.net.ltd/) (Website), ADX Labs, LLC. (Company, we or us) is committed to protecting and respecting your privacy. The data
More informationTIA. Privacy Policy and Cookie Policy 5/25/18
TIA Privacy Policy and Cookie Policy 5/25/18 Background: TIA understands that your privacy is important to you and that you care about how your information is used and shared online. We respect and value
More informationOur Data Protection Officer is Andrew Garrett, Operations Manager
Construction Youth Trust Privacy Notice We are committed to protecting your personal information Construction Youth Trust is committed to respecting and keeping safe any personal information you share
More informationBend Mailing Services, LLC, dba BMS Technologies ( us, we, or our ) operates the website (the Service ).
Privacy Policy online-billpay.com Effective date: May 18, 2018 Bend Mailing Services, LLC, dba BMS Technologies ( us, we, or our ) operates the https://www.online-billpay.com/ website (the Service ). This
More informationGDPR Compliant. Privacy Policy. Updated 24/05/2018
GDPR Compliant Privacy Policy Updated 24/05/2018 Overview This privacy policy is in compliance with the General Data Protection Act which aims to empower all EU citizens data privacy and to reshape the
More informationInternet Governance and the World Summit on the Information Society (WSIS)
Internet Governance and the World Summit on the Information Society (WSIS) Dr Tim Kelly, Head, Strategy and Policy Unit, ITU & Secretary, Content Sub-Committees, WSIS Internet Governance Workshop, Bangkok,
More informationPRIVACY COMMITMENT. Information We Collect and How We Use It. Effective Date: July 2, 2018
Effective Date: July 2, 2018 PRIVACY COMMITMENT Protecting your privacy is very important to Prosci and this privacy policy is our way of providing you with details about the types of information we collect
More information1 Privacy Statement INDEX
INDEX 1 Privacy Statement Mphasis is committed to protecting the personal information of its customers, employees, suppliers, contractors and business associates. Personal information includes data related
More informationMUTUAL RECOGNITION MECHANISMS. Tahseen Ahmad Khan
MUTUAL RECOGNITION MECHANISMS Tahseen Ahmad Khan TABLE OF CONTENTS Background: Why Mutual Recognition is important? Electronic Data and its inherent nature Scope of mutual recognition, need to go beyond
More informationGDPR: A QUICK OVERVIEW
GDPR: A QUICK OVERVIEW 2018 Get ready now. 29 June 2017 Presenters Charles Barley Director, Risk Advisory Services Charles Barley, Jr. is responsible for the delivery of governance, risk and compliance
More informationRobert Bond. Respecting Privacy, Securing Data and Enabling Trust a view from Europe
Respecting Privacy, Securing Data and Enabling Trust a view from Europe Robert Bond, Partner & Notary Public Robert Bond Robert Bond has nearly 40 years' experience in advising national and international
More informationProject Better Energy Limited s registered office is Witan Gate House, Witan Gate West, Milton Keynes, Buckinghamshire, MK9 1SH
PRIVACY NOTICE Curv360 is a part of the Project Better Energy Limited group of companies and is a controller of any personal data you provide. We respect your data and your privacy is important to us.
More informationDISCLOSURE ON THE PROCESSING OF PERSONAL DATA LAST REVISION DATE: 25 MAY 2018
DISCLOSURE ON THE PROCESSING OF PERSONAL DATA LAST REVISION DATE: 25 MAY 2018 Introduction This disclosure on the processing of personal data (hereinafter, the "Disclosure") is provided pursuant to Art.
More informationAfrican Theatre Association (AfTA) PRIVACY POLICY
African Theatre Association (AfTA) PRIVACY POLICY 1. Our Privacy Pledge We store your personal data safely. We won't share your details with anyone else. You can change your preferences or opt out from
More information1. Muscat & Co Mortgage Solutions Ltd - Privacy Notice
1. This Muscat & Co Mortgage Solutions Ltd privacy notice provides information on how we and any of our subsidiaries, and any 3 rd party providers collect, use, secure, transfer and share your information.
More informationWhat is the website's privacy policy?
What is the website's privacy policy? BEST FRIEND LIMITED t/a The Fleece Hotel CUSTOMER PRIVACY POLICY Best Friend Limited (BF) Limited is a company registered in England and Wales (collectively referred
More informationWhen do we collect information about you? What type of information is collected from you?
Albertine Privacy Policy Data protection We will never share your information with another organisation for their own marketing purposes and we will never sell your information for any reason whatsoever.
More informationPlan a Pragmatic Approach to the new EU Data Privacy Regulation
AmChamDenmark event: EU Compliant & Cyber Resistant Plan a Pragmatic Approach to the new EU Data Privacy Regulation Janus Friis Bindslev, Partner Cyber Risk Services, Deloitte 4 February 2016 Agenda General
More informationTHE TRUSTED NETWORK POWERING GLOBAL SUPPLY CHAINS AND THEIR COMMUNITIES APPROVED EDUCATION PROVIDER INFORMATION PACK
GAIN RECOGNITION AS AN APPROVED PROVIDER UNDER ISO/IEC 17024 AND JOIN OUR NETWORK OF TRUSTED PROVIDERS THE TRUSTED NETWORK POWERING GLOBAL SUPPLY CHAINS AND THEIR COMMUNITIES APPROVED EDUCATION PROVIDER
More informationOverview of Akamai s Personal Data Processing Activities and Role
Overview of Akamai s Personal Data Processing Activities and Role Last Updated: April 2018 This document is maintained by the Akamai Global Data Protection Office 1 Introduction Akamai is a global leader
More informationEmsi Privacy Shield Policy
Emsi Privacy Shield Policy Scope The Emsi Privacy Shield Policy ( Policy ) applies to the collection and processing of Personal Data that Emsi obtains from Data Subjects located in the European Union (
More informationPrivacy policy NTI AG
Privacy policy NTI AG NTI AG / LinMot Dok-Nr. Privacy Policy_NTI_AG_180607 Content 1 Privacy policy... 3 2 Who are we?... 3 3 What is Personal Information?... 3 4 What Personal Information does NTI AG
More informationPrivacy Policy. Information about us. What personal data do we collect and how do we use it?
This privacy policy sets out the way in which your personal data is handled by Leeds Bradford Airport Limited (referred to as "we", "us" and "our") whether collected through one of the websites we operate,
More informationSingapore s National Digital Identity (NDI):
Singapore s National Digital Identity (NDI): Leaving no one behind Kwok Quek Sin Director, National Digital Identity Programme Government Technology Agency PART 1 INTRODUCTION TO NDI Better Living For
More informationUsing Blockchain for Consent and Access to Private and Sensitive Data in the GDPR Environment
Using Blockchain for Consent and Access to Private and Sensitive Data in the GDPR Environment Gary Leeming, Chief Technology Officer Connected Health Cities, University of Manchester 1 Connected Health
More informationPrivacy Policy May 2018
Privacy Policy May 2018 Laser Surveys Ltd T/A Open Space Rooms Laser Surveys operates a privacy first approach to all our business activities and will only require the minimum information to perform our
More informationElectronic Commerce Working Group report
RESTRICTED CEFACT/ECAWG/97N012 4 December 1997 Electronic Commerce Ad hoc Working Group (ECAWG) Electronic Commerce Working Group report SOURCE: 10 th ICT Standards Board, Sophia Antipolis, 4 th November
More informationPRIVACY. YOUR DATA. YOUR TRUST.
PRIVACY. YOUR DATA. YOUR TRUST. OUR COMMITMENT TO YOU You are at the heart of everything we do. Our goal is to maintain your trust and confidence by handling your personal information with respect and
More informationCHAPTER 13 ELECTRONIC COMMERCE
CHAPTER 13 ELECTRONIC COMMERCE Article 13.1: Definitions For the purposes of this Chapter: computing facilities means computer servers and storage devices for processing or storing information for commercial
More informationWhen and what information does Kantar Worldpanel collect?
Shoppix Privacy Policy [16 th march 2017] Kantar Worldpanel (herein referred to as we or us ) which operates Shoppix, recognises that your privacy is important and that you have the right to know what
More informationBeam Suntory Privacy Policy WEBSITE PRIVACY NOTICE
Beam Suntory Privacy Policy WEBSITE PRIVACY NOTICE Beam Suntory ("we"; "us"; "our") respects your privacy and is committed to protecting your personal information at all times in everything we do. We are
More information1. General provisions
FIBO Group Privacy Policy 1. General provisions The International Financial Holding FIBO Group (hereinafter referred to as FIBO Group ) highly appreciates the relationships with the existing and potential
More informationPrivacy Policy (with effect from 25 th May 2018)
Privacy Policy (with effect from 25 th May 2018) Ron Sammons Ltd t/a TECO Building Products, (company number 01398336), having a registered office at The Gables, Codmore Hill, Pulborough, West Sussex RH20
More informationPrivacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information
Privacy Statement Introduction Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information about how IT Support (UK) Ltd handle personal information.
More informationWorld Wide Jobs Ltd t/a Findmyexpert.com Privacy Policy 12 th April 2018
World Wide Jobs Ltd t/a Findmyexpert.com Privacy Policy 12 th April 2018 We understand that you are aware of and care about your own personal privacy interests and we take that seriously. This Privacy
More informationVERSION 1.3 MAY 1, 2018 SNOWFLY PRIVACY POLICY SNOWFLY PERFORMANCE INC. P.O. BOX 95254, SOUTH JORDAN, UT
VERSION 1.3 MAY 1, 2018 SNOWFLY PRIVACY POLICY SNOWFLY PERFORMANCE INC. P.O. BOX 95254, SOUTH JORDAN, UT 84095-9998 SNOWFLY PRIVACY POLICY This Privacy Policy describes Snowfly s practices regarding the
More informationBlue Alligator Company Privacy Notice (Last updated 21 May 2018)
Blue Alligator Company Privacy Notice (Last updated 21 May 2018) Who are we? Blue Alligator Company Limited (hereafter referred to as BAC ) is a company incorporated in England with company registration
More informationYou can contact us about any questions, comments or requests you may have regarding this privacy policy using the details below:
Your information will be held by Make It Cheaper Group Limited (Group), which trades as Make It Cheaper, Make It Cheaper Financial Services and UK Power. You can contact us about any questions, comments
More informationPAA PKI Mutual Recognition Framework. Copyright PAA, All Rights Reserved 1
PAA PKI Mutual Recognition Framework Copyright PAA, 2009. All Rights Reserved 1 Agenda Overview of the Framework Components of the Framework How It Works Other Considerations Questions and Answers Copyright
More informationITU Workshop on Security Aspects of Blockchain (Geneva, Switzerland, 21 March 2017) Blockchains risk or mitigation?
ITU Workshop on Security Aspects of Blockchain (Geneva, Switzerland, 21 March 2017) Blockchains risk or mitigation? Patrick Curry OBE CEng Director, BBFA: patrick.curry@bbfa.info Director, Kyckr; patrick.curry@kyckr.com
More informationCyber Security and Cyber Fraud
Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa
More informationProgram 1. THE USE OF CYBER ACTIVE DEFENSE BY THE PRIVATE SECTOR
Program The structure of the workshop will be fully participatory for each session. We will ask several participants to take the lead in some panels, and to present the main challenges or comment on certain
More informationMobile Financial Services: An Approach To AML/CTF For Mobile Money Transfer
Mobile Financial Services: An Approach To AML/CTF For Mobile Money Transfer World Bank Workshop June 2008 Bangkok Mike Rodin Associate General Counsel The Western Union Company 1 The Western Union Company
More informationOur Privacy Policy gives you detailed information on when and why we collect your personal information, how we use it and how we keep it secure.
Junction.co.uk Privacy Policy www.junction.co.uk is owned and operated by Cambridge Junction. We are committed to safeguarding your privacy online and to this end have developed the following Privacy Policy
More informationGeneral Data Protection Regulation April 3, Sarah Ackerman, Managing Director Ross Patz, Consultant
General Data Protection Regulation April 3, 2018 Sarah Ackerman, Managing Director Ross Patz, Consultant Introductions Sarah Ackerman, CISSP, CISA Managing Director, Cincinnati Responsible for overall
More informationPrivacy Policy Effective May 25 th 2018
Privacy Policy Effective May 25 th 2018 1. General Information 1.1 This policy ( Privacy Policy ) explains what information Safety Management Systems, 2. Scope Inc. and its subsidiaries ( SMS ), it s brand
More informationChess Entries 4 All Website Privacy Policy
Chess Entries 4 All Website Privacy Policy Introduction This website is operated Mmes Billington-Phillips.co and we are a controller for the purposes of the Data Protection Act 1998 and the EU General
More informationIMPORTANT GLOBAL CYBERLAW TRENDS 2017
IMPORTANT GLOBAL CYBERLAW TRENDS 2017 BY PAVAN DUGGAL ADVOCATE, SUPREME COURT OF INDIA PRESIDENT, CYBERLAWS.NET HEAD, PAVAN DUGGAL ASSOCIATES, ADVOCATES The year 2017 promises to be a year of tremendous
More informationTechTarget, Inc. Privacy Policy
This Privacy Policy (the Policy ) is designed to inform users of TechTarget, Inc., and its affiliates (collectively TechTarget ) network of websites about how TechTarget gathers and uses information provided
More informationPRIVACY NOTICE. What Information Is Collected and How Is It Collected? Last Updated: May 21, 2018
PRIVACY NOTICE Last Updated: May 21, 2018 RCI Europe cares about privacy issues and wants you to be familiar with how we collect, disclose, and otherwise use ( Process ) information about you. This privacy
More informationCommunity Business Boost Programme Personal Statement
Community Business Boost Programme Personal Statement A SEPARATE FORM MUST BE COMPLETED FOR EACH OWNER, PARTNER, DIRECTOR, COMPANY SECRETARY AND DESIGNATED MEMBER LISTED AT SECTION 5 WITHIN THE APPLICATION
More informationFinancial Crime Data and Information Sharing Solution
July 2017 Financial Crime Data and Information Sharing Solution Proposed Approach and Outline Project Transfer Document V1.6 FINAL Document Context: This document was finalised in July 2017 as part of
More informationWhat kind of information do you collect, when and how?
Associated Telecom Solutions Privacy Policy Action- Tec Services Ltd T/A Associated Telecom Solutions collects business data in order to provide our services to our business customers. During the relationship
More informationCIPP/E CIPT. Data Protection Technologist (DPT) Training Bundle Official IAPP Training and Certification
CIPP/E CIPT Data Protection Technologist (DPT) Training Bundle Official IAPP Training and Certification The CIPP/E + CIPT credentials shows you ve got the knowledge to build your organization s privacy
More informationGDPR and the Privacy Shield
GDPR and the Privacy Shield Mark Prinsley Partner +44 20 3130 3900 mprinsley@mayerbrown.com Kendall Burman Counsel + 202 263 3210 kburman@mayerbrown.com Speakers Kendall Burman Counsel Washington DC Mark
More informationCYBER SECURITY AND DATA PROTECTION Theme: Securing Businesses and Public Transactions. Regional Headquarters, The University of the West Indies, Mona
2 nd National Conference on CYBER SECURITY AND DATA PROTECTION Theme: Securing Businesses and Public Transactions Regional Headquarters, The University of the West Indies, Mona November 20-21, 2014 Conference
More informationData Protection Regulations and International Data Flows: Implications for Trade and Development
Data Protection Regulations and International Data Flows: Implications for Trade and Development Cécile Barayre (cecile.barayre@unctad.org) Economic Affairs Officer, ICT Analysis Section Division on Technology
More informationPolicy recommendations. Technology fraud and online exploitation
Policy recommendations Technology fraud and online The opportunity Cloud computing is revolutionizing how people work, learn, interact, and play. Education is just one example as a new generation of cloud-based
More informationHF Markets SA (Pty) Ltd Protection of Personal Information Policy
Protection of Personal Information Policy Protection of Personal Information Policy This privacy statement covers the website www.hotforex.co.za, and all its related subdomains that are registered and
More informationTREND MICRO PRIVACY POLICY (Updated May 2012)
TREND MICRO PRIVACY POLICY (Updated May 2012) Trend Micro Incorporated and its subsidiaries and affiliates (collectively, "Trend Micro") are committed to protecting your privacy and ensuring you have a
More informationEmergency Nurses Association Privacy Policy
Emergency Nurses Association Privacy Policy The Emergency Nurses Association ( ENA, we, or us ) has created and posted this privacy policy in an effort to maintain efficient service while respecting your
More informationIncentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO
White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating
More informationLEGAL INFORMATION & PRIVACY STATEMENT Version: 17 May 2018
LEGAL INFORMATION & PRIVACY STATEMENT Version: 17 May 2018 Legal PDA Group GmbH Rennweg 1 6020 Innsbruck, Austria Tel/Fax: +43 512 56 09 70 office@pdagroup.net Required information, according to 5 ECG
More informationISAO SO Product Outline
Draft Document Request For Comment ISAO SO 2016 v0.2 ISAO Standards Organization Dr. Greg White, Executive Director Rick Lipsey, Deputy Director May 2, 2016 Copyright 2016, ISAO SO (Information Sharing
More informationTEL2813/IS2820 Security Management
TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management
More informationMASTERCARD PRICELESS SPECIALS INDIA PRIVACY POLICY
Effective Date: 12 September 2017 MASTERCARD PRICELESS SPECIALS INDIA PRIVACY POLICY Mastercard respects your privacy. This Privacy Policy describes how we process personal data, the types of personal
More informationDepending on the Services or information you request from us, we may ask you to provide the following personal information:
LINK HUNGARY PRIVACY POLICY PROTECTING YOUR DATA 1. Who are Link Asset Services and Link Hungary? Link Asset Services ( Link ) is a trading name of companies which offer a range of services, principally
More informationWEEE disposal and the creation of social value. Jon Selby Tier 1 Asset Management Ltd
WEEE disposal and the creation of social value Jon Selby Tier 1 Asset Management Ltd Why is Tier 1 here this evening? Every business needs to consider these Social Responsibility Data Security Cost Peace
More informationHarmonisation of Digital Markets in the EaP. Vassilis Kopanas European Commission, DG CONNECT
Harmonisation of Digital Markets in the EaP Vassilis Kopanas European Commission, DG CONNECT vassilis.kopanas@ec.europa.eu The cost of non-europe European Parliament Research Study, March 2014 Fully realising
More informationDATA PRIVACY & PROTECTION POLICY POLICY INFORMATION WE COLLECT AND RECEIVE. Quality Management System
DATA PRIVACY & PROTECTION POLICY POLICY This Data Privacy & Protection Policy applies to ELMO Software Limited s Cloud HR & Payroll applications and platform (collectively, the Services ), elmosoftware.com.au
More informationTelecoms Privacy Policy
Telecoms Privacy Policy This policy is to be read in conjunction with, and makes reference to the main Privacy Policy of Post Office Limited. This Telecoms Policy deals with the data processing activities
More informationNHS R&D Forum Privacy Policy: FINAL v0.1 May 25 th 2018
NHS R&D Forum Privacy Policy: FINAL v0.1 May 25 th 2018 This privacy policy is published to provide transparent information about how we use, share and store any personal information that you may provide
More informationVdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe
Author Date VdTÜV-WG Cybersecurity October, 3 rd 2015 VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe VdTÜV e.v. welcomes the Communication on a
More informationProgramme. Legal Instruments for the Internet Economy. Building Capacity and Implementing Regulation. Malta, 14 th to 19 th September, 2015
A MALTA COMMONWEALTH THIRD COUNTRY TRAINING PROGRAMME Programme Legal Instruments for the Internet Economy Building Capacity and Implementing Regulation Malta, 14 th to 19 th September, 2015 www.diplomacy.edu/courses/legalinstruments2015
More informationFor our services, the data controller (the company that s responsible for your privacy), is Rent a Van 365 Limited. Registered address:
Web Privacy Policy Rent a Van 365 Ltd is committed to protecting your personal information. This policy aims to help you to understand what information we may collect about you and how we use it. We are
More informationTravelers Rest Festival Privacy Policy. Privacy Policy. PRIVACY POLICY LAST UPDATED: MAY
Travelers Rest Festival Privacy Policy Privacy Policy http://travelersrestfest.com/ PRIVACY POLICY LAST UPDATED: MAY 24 2018 This Privacy Policy describes our policies on the collection, use and disclosure
More informationCommonwealth Telecommunications Organisation Proposal for IGF Open Forum 2017
Commonwealth Telecommunications Organisation Proposal for IGF Open Forum 2017 Title: Facilitating Investment in Cybersecurity as a means of achieving the Sustainable Development Goals Description: Information
More informationBEST PRACTICES IN USE OF DIGITAL SIGNATURE. Presented by, Vicky Shah
BEST PRACTICES IN USE OF DIGITAL SIGNATURE Presented by, Vicky Shah AGENDA Issues in E-Contracts Concerns Myths and Reality Legal Recognition of Digital Signature Digital Certificate Digital Signature
More informationAmerican Dental Hygienists Association Privacy Policy
American Dental Hygienists Association Privacy Policy The American Dental Hygienists Association ( ADHA, we, or us ) has created and posted this privacy policy in an effort to maintain efficient service
More informationASEAN e-authentication Workshop Balwinder Sahota
ASEAN e-authentication Workshop Balwinder Sahota Agenda ASEAN Single Window (ASW) What is ATIGA Form D The information flow of ATIGA Form D and related documents Security Requirements Challenges in Implementation
More informationCruiseSmarter PRIVACY POLICY. I. Acceptance of Terms
I. Acceptance of Terms This Privacy Policy describes CRUISE SMARTER policies and procedures on the collection, use and disclosure of your information. CRUISE SMARTER LLC (hereinafter referred to as "we",
More informationIn Accountable IoT We Trust
In Accountable IoT We Trust AIOTI WG3 Security & Privacy-in-IoT Taskforces, and H2020 CSA CREATE-IoT & LSPs AG Trust in IoT Arthur van der Wees Managing Director Arthur s Legal, the global tech-by-design
More informationTREND MICRO PRIVACY POLICY (October 2016)
TREND MICRO PRIVACY POLICY (October 2016) Trend Micro Incorporated and its subsidiaries and affiliates (collectively, Trend Micro ) are committed to protecting your privacy and ensuring you have a positive
More informationElders Estates Privacy Notice
15A Bath Street, Ilkeston Derbyshire. DE7 8AH 01159 32 55 23 info@eldersestates.co.uk 31 Market Place, Ripley Derbyshire. DE5 3HA 01773 30 44 44 info@eldersestates.co.uk Elders Estates Privacy Notice Introduction
More informationeid Applications Cross Border Authentication
eid Applications Cross Border Authentication 07 November 2017 Mr. Gary Yeung, MH Hon Secretary Chairman, eid Committee Smart City Consortium Smart City Consortium Background What is Smart City Consortium?
More informationISSUES FOR RESPONSIBLE USER-CENTRIC IDENTITY
ISSUES FOR RESPONSIBLE USER-CENTRIC IDENTITY November 2009 Version 1.0 In light of the announcement of a series of federal pilots for federated identity providers, we have analyzed the governance and policy
More informationSpree Privacy Policy
Spree Privacy Policy Effective as at 21 November 2018 Introduction Spree respects your privacy and it is important to us that you have an enjoyable experience buying and selling with us but also that you
More informationWebsite Privacy Policy
Website Privacy Policy Last updated: May 12, 2016 This privacy policy (the Privacy Policy ) applies to this website and all services provided through this website, including any games or sweepstakes (collectively,
More informationELECTRONIC IMAGE AND TEXT DATA TRANSFER USING FILE TRANSFER PROTOCOL MEMORANDUM OF UNDERSTANDING
ELECTRONIC IMAGE AND TEXT DATA TRANSFER USING FILE TRANSFER PROTOCOL MEMORANDUM OF UNDERSTANDING THIS MEMORANDUM OF UNDERSTANDING is between Mary Louise Garcia, Tarrant County Clerk, ( CLERK ), Tarrant
More informationDriving Global Resilience
Driving Global Resilience Steve Mellish FBCI Chairman, The Business Continuity Institute Monday December 2nd, 2013 Business & IT Resilience Summit New Delhi, India Chairman of the Business Continuity Institute
More informationFive Ways that Privacy Shield is Different from Safe Harbor and Five Simple Steps Companies Can Take to Prepare for Certification
July 2016 Follow @Paul_Hastings Five Ways that Privacy Shield is Different from Safe Harbor and Five Simple Steps Companies Can Take to Prepare for Certification By Paul Hastings Global Privacy and Cybersecurity
More informationSYDNEY FESTIVAL PRIVACY POLICY
1. Level 5, 10 Hickson Road The Rocks Sydney NSW 2000 Australia Phone 61 2 8248 6500 Fax 61 2 8248 6599 sydneyfestival.org.au ABN 60 070 285 344 SYDNEY FESTIVAL PRIVACY POLICY Our Commitment to your Privacy
More information