Privacy Evaluation Framework Overview TCAB Privacy Subcommittee Meeting February 21, 2014.

Slides:



Advertisements
Similar presentations
Data Privacy and Security in the Cloud Presented by Robert J. Scott Managing Partner Scott & Scott, LLP
Advertisements

Privacy Today Privacy Day January 28, 2008 International Association of Privacy Professionals.
1 NAESB Data Privacy Task Force February 16, 2011.
National Forum on Education Statistics sponsored by the National Cooperative Education Statistics System and the National Center for Education Statistics.
The Law of Privacy Prof. Michael Madison – University of Pittsburgh School of Law – January 22, 2004 [1] What is privacy? [2] What law regulates privacy?
ETHICS. Business Conduct  The Agent agrees to conform to all applicable federal, state and local laws in conducting business under this agreement.
Big Data - Ethical Data Use Kimberlin Cranford. Ethical Use in the Era of Big Data  Landscape has Changed  Attitudes about Big Data  PII, Anonymous,
Data Protection Information Management / Jody McKenzie.
COLLECTION HOT TOPICS WV HMFA Winter Educational Conference January 15, 2015.
Tri-Council Policy Statement 2010 Ethical Conduct for Research Involving Humans.
Privacy Evaluation Methodology (PEM) v1.0 Overview IDESG Privacy Committee James R. Elste Dr. Stuart Shapiro February 2013.
Mapping Privacy Jacqueline D Lipton, Ph.D. Case Western Reserve University School of Law.
Security Controls – What Works
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Data Retention LIS 550 Winter 2010 Unsworth Tuesday, March 02, 2010.
5.1 © 2006 by Prentice Hall Ethical and Social Issues in the Digital Firm.
The role of the Office of the Privacy Commissioner in telecommunications Andrew Solomon Director, Policy.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 History and.
1 CPSC156: The Internet Co-Evolution of Technology and Society Lectures 16 and 17: March 27 and 29, 2007 Solove’s taxonomy of privacy.
Information Commissioner’s Office: data protection Judith Jones Senior Policy Officer Strategic Liaison – public security 16 November 2011.
“Privacy Implications of RFID Technology in Health Care Settings” Marc Rotenberg President EPIC Dept. of Health & Human Services Washington, DC 11 January.
HIPAA Training +: Beyond Compliance to Culture Change Lois C. Ambash, PhD John Mack, M.A., M. Phil. The Internet Healthcare Coalition e-Health Quality.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style A TAXONOMY OF PRIVACY Paper by DANIEL J. SOLOVE Presented.
Privacy and Security Risks in Higher Education
11 – E-Commerce 1. What is Electronic Commerce? 2. What is a contract? 3. Elements of an enforceable contract 4. Standard terms of a contract 5. Form and.
Formal Methods for Privacy Formal Methods 2009 Eindhoven, The Netherlands November 4, 2009 Jeannette M. Wing Assistant Director Computer and Information.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
Trust Through Transparency Policy for Success Example of ACDI/VOCA Frontiers- Kyrgyzstan SEEP October 2005.
Compliance Management Platform ™. Compliance Management Platform Compliance is the New Marketing – Position yourself to thrive in the new regulatory and.
Privacy of Home Energy Usage Data Jim Williams June 26, 2012 Jim Williams June 26, 2012.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Electricity Infrastructure Workshop Brussels, 13 February 2007 The framework for a Single European Electricity Market Mrs Asta Sihvonen-Punkka, CEER EWG.
Financial Services Privacy - the interaction of the privacy and financial services regulatory systems Chris Connolly Financial Services Consumer Policy.
The New EU Directives Oftel Forum 25/04/02 Heather Clayton.
The right item, right place, right time. DLA Privacy Act Code of Fair Information Principles.
As defined in the Generally Accepted Privacy Principles, “privacy” refers to the rights and obligations of individuals and organizations with respect to.
STUDENT JUDICIAL AFFAIRS Balancing the Principals of Natural Justice with Requirements of Privacy Legislation CCSJA March 23, 2006 Harry Davis Deborah.
CPS 82, Fall Privacy l Taxonomy of Privacy  Understanding Privacy, Daniel Solove, MIT Press 2008 l Information Processing  Aggregation  Identification.
Twelve Guiding Principles for the Regulation of Surveillance Camera Systems Presented by: Alastair Thomas Date: 23 rd October 2013.
M I N I S T R Y O F I N D U S T R Y, E M P L O Y M E N T A N D C O M M U N I C A T I O N S OECD Guidelines on Corporate Governance of State Owned Enterprises.
PRESENTED AT THE STAKEHOLDERS FORUM ON QUALITY OF SERVICE AND CONSUMER EXPERIENCE LAICO REGENCY HOTEL Creating Space for Consumer Rights in.
Privacy Advisory Services … … A Best Practices, Integrated Approach Insert Firm Name Here.
Державна служба статистики України Statistical confidentiality assurance framework in State Statistics Service of Ukraine Anton Tovchenko head of mathematical.
Implementation of Insurance Core Principles and FSAP Evaluations The Portuguese FSAP experience Gabriel Bernardino Instituto de Seguros de Portugal.
APEC Privacy Framework “The lack of consumer trust and confidence in the privacy and security of online transactions and information networks is one element.
Introduction to the Australian Privacy Principles & the OAIC’s regulatory approach Privacy Awareness Week 2016.
Federal Privacy Law Coverage and new requirements CLCNSW presentation 20 May 2014 Patrick Fair Partner Baker & McKenzie.
JOHN PRICE Commissioner, ASIC MARK ADAMS Senior Executive Leader, Strategic Intelligence and Co-Ordinator, Innovation Hub ASIC ASIC’S REGULATORY SANDBOX.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
JOHN M. HUFF NAIC PRESIDENT DIRECTOR, MISSOURI DEPARTMENT OF INSURANCE JUNE 16, 2016 NAIC CYBERSECURITY INITIATIVES.
Privacy, Discrimination and Review
2013 LBA Bank Counsel Conference
Privacy and Public Policy Implications of IoT
Employment and labor law of Russian federation
Surveillance. Public Health Approach Surveillance What is the Problem ? Problem Risk Factor Identification : What Is the Cause ? Intervention Evaluation.
Consumer Privacy An Introduction
Consumer Rights and Protections
Legal and Ethical Responsibilities
Data science and the law
Consumer Protection Online
Insurance Supervision Board Ministry of Treasury and Finance
WARNING: Privacy and Data Breach
SARBANES-OXLEY ACT OF 2002.
Building a Vertical Around Regulated Industries to Increase Your Business
Marketing Name _____________________ 5.2 Questions
Overview of the recommendations regarding approximation of the Law on personal data protection to the new EU General data protection regulation Valerija.
Compliance with Law CVO/Delegation
Chapter 1: The Nature and Sources of Law
Bell work What are 5 ways that the government has impacted your life this year? They can be large or small happen every day or just once.
STRUCTURE OF THE CHAPTER
Presentation transcript:

Privacy Evaluation Framework Overview TCAB Privacy Subcommittee Meeting February 21, 2014

4 Forces – Code 2.0 Social Norms Market Forces Technology Laws, Regulations & Policies Evaluation Framework

Solove’s Privacy Harms Breach of Confidence Disclosure Exposure Increased Accessibility Blackmail Appropriation Distortion Intrusion Decisional Interference Aggregation Identification Insecurity Secondary Use Exclusion Surveillance Interrogation Information Collection Information Processing Information Dissemination Invasions

Consumer Privacy Bill of Rights & Fair Information Practice Principles CPBR Individual ControlTransparencyRespect for ContextFocused CollectionAccess & AccuracySecurityAuditing FIPP Individual ParticipationTransparencyPurpose SpecificationData MinimizationUse LimitationData Quality & IntegritySecurityAccountability & Auditing

Hierarchy of Compensating Requirements Int’l Law Federal Law Nevada Statutes Regulatory Requirements Contractual Obligations

Gap Analysis Approach International LawFederal LawNV Law Fed. LawNV Law