Transformational technology and privacy

Slides:



Advertisements
Similar presentations
Danube region research and innovation fund Feasibility study Marián Cápay, Vladimír Kaštier 20. May 2014 Length: 15 minutes Main goal: Get them involved.
Advertisements

Deloitte UK screen 4:3 (19.05 cm x cm) © 2013 Deloitte LLP. All rights reserved. April 2013 Parameters of Competition for a Turkish International.
This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.
ΒΗΜΑ ΤΩΝ ΕΠΙΧΕΙΡΗΣΕΩΝ AUEB March 2015.
Financial structure, management, and IFRS Reporting Creating value for growth Presenter: John Robinson Partner.
Enhancing value for your company Preparing for an exit.
Intel’s Preferred Supplier Program: An Overview August 2006.
Global Summit 2015 May/2015. Global efforts in fighting corruption Current Scenario.
How Privacy Relates to Security Privacy Symposium Privacy Certificate Program Training August 2008.
EQUINOX. Connecting the world……. About EQUINOX. Equinox Business Solutions is a large global Business Process Outsourcing player, committed to delivering.
“ One Stop Shop Business Services” “Our clients receive the Best Service ” “A broad range of fully integrated services” “WE EMPHASISE STRONG CLIENT RELATIONSHIPS.
1 SCIP Africa Summit | 13 – 15 October 2014 The EY Africa competitive intelligence story: key lessons learned Sejabaledi Motsepa – Analyst, EY.
Operational Excellence and Sustainable Performance Improvement Date: 9 June, 2009.
Agenda Why is globalization important to the profession
Clicks, conversations and the candidate experience
KNR- Studiedag 25 september 2013 Btw-checklist. © 2013 Deloitte The Netherlands KNR Studiedag Btw-checklist 1.
Leading across borders Inclusive thinking in an interconnected world.
IAS 23 – Borrowing Costs. Academic Resource Center Long-term liabilities Page 2 Borrowing costs Borrowing costs primarily include interest on borrowings.
+ Regulation and Compliance Summary “ Making Great Ideas Become Reality”
Indexed content Migrate content Create links Content for future indexing.
Georgia Gateway– Integrated Eligibility System (IES)
1 Information Systems in a Changing Environment With thanks to Laudon & Laudon Session 1.
IAS 11 - Construction Contracts. Academic Resource Center Revenue recognition including construction contracts Page 2 Recognition before delivery – construction.
Transformational technology and privacy How emerging technology contributes to the Data Diaspora and challenges privacy management August 2008.
Tom Bernard October  This presentation is provided solely for the purpose of enhancing knowledge on tax matters. It does not provide tax advice.
INDIANA UNIVERSITY X 420 “POOP” SESSION September 6, 2001.
Service Organization Controls (SOC) Overview Shared Assessment Member Forum Presentation April 10, 2012.
© 2013 Deloitte Belgium DEF-Debate “Cyber Security – Risks and Opportunities for Europe’s Economy ” May 21 st 2014 Erik R. van Zuuren Director Deloitte.
Value Sharing in Queensland 21 March Page 2 Copyright © 2016 Ernst & Young Australia. All Rights Reserved. Liability limited by a scheme approved.
MIS 374 Christine Lyman, Sr. Manager Jan 2015 Root Cause Analysis.
ICAJ/PAB - Improving Compliance with International Standards on Auditing Planning an audit of financial statements 19 July 2014.
© 2013 Deloitte Global Services Limited Growing Markets for Social Impact September 16 th, 2014 Global Public SectorThinking people.
Industry Solutions Tom Ngo Chief Technology Officer.
GASB 77: Tax Abatement Disclosure and Required Governmental Considerations NASC Annual Conference Salt Lake City, Utah 17 March 2016 Presenter: Joe Huddleston.
Value Sharing in Queensland 21 March Page 2 Copyright © 2016 Ernst & Young Australia. All Rights Reserved. Liability limited by a scheme approved.
Database Principles: Fundamentals of Design, Implementation, and Management Chapter 1 The Database Approach.
Chapter 1 Market-Oriented Perspectives Underlie Successful Corporate, Business, and Marketing Strategies.
business disability international Charter:
The RAN ONE Advantage The Challenges of Owning a Business
What business really needs
THE PRMA INDUSTRY WOMEN CHAPTER VALUE PROPOSITION AND GOVERNANCE
University of Stellenbosch Business School
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Distribution Transformer Market share research by applications and regions.
Confidence to Transform
Modernizing compliance: Moving from value protection to value creation
Subsequent events.
Reducing Fraud Risks Through Effective Information Governance in the Tech Sector September 15, 2017 The Input area of the Beam is a shape with a picture.
Developing our skills & strengths
Turning Insights into Action
presentation to the ICC Commission on the Digital Economy
Developing our skills & strengths
DEF-Debate “Cyber Security – Risks and Opportunities for Europe’s Economy ” May 21st 2014 Erik R. van Zuuren Director Deloitte ERS BE Board Member EEMA.
VHA Annual Conference The Australian Digital Health Journey -where are we at? Richard Royle Partner – National Digital Helath Lead, PwC.
Tax Cuts and Jobs Act considerations for life actuaries
Structured Trade and Commodity Finance Advisory services
Supply Chain Transformation Highlights
Cloud adoption NECOOST Advisory | June 2017.
Confidence to Transform
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Future of Charities and Tax – a Māori Perspective
Transforming the way companies build wealth
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Gartner for Sales Leaders
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Professional services in papua new guinea
Know The Instances of Compliance Before Connecting Subject Matter Experts.
Presentation transcript:

Transformational technology and privacy How emerging technology contributes to the Data Diaspora and challenges privacy management August 2008

The Frequently Asked Question “So, what are my obligations?”

The Permeation of Devices Devices that process or otherwise contain personal information will be increasingly prevalent. Control over the devices will become a privacy principle.

The New Networked World These devices will be increasingly networked, resulting in the addressability of previously unconnected devices.

The Transformation of the Web “Things” The proliferation of repositories for personal information on the web, and of new ways to provide interconnectivity and interaction mean more personal information in more places under the control of more entities.

The Utility of Computing Utility computing affords new economies and efficiencies to information processing, but spreads the custody and control of personal information well beyond the organization.

The Transformation of the Business Process The business of information processing is also changing with the technology, and new ways of doing business foster new privacy challenges.

Managing through the Data Diaspora The Data Diaspora changes the custody and control over personal information, and therefore changes the way we manage privacy.

 brian.tretick@ey.com  +1-703-747-0901 Questions Contact us  +1-703-747-0901

Assurance | Tax | Transactions | Advisory Ernst & Young Assurance | Tax | Transactions | Advisory About Ernst & Young Ernst & Young is a global leader in assurance, tax, transaction and advisory services. Worldwide, our 130,000 people are united by our shared values and an unwavering commitment to quality. We make a difference by helping our people, our clients and our wider communities achieve potential. About Ernst & Young’s Technology Risk and Security Services Information technology is one of the key enablers for modern organizations to compete. It gives the opportunity to get closer, more focused and faster in responding to customers, and can redefine both the effectiveness and efficiency of operations. But as opportunity grows, so does risk. Effective information technology risk management helps you to improve the competitive advantage of your information technology operations, to make these operations more cost efficient and to manage down the risks related to running your systems. Our 6,000 information technology risk professionals draw on extensive personal experience to give you fresh perspectives and open, objective advice – wherever you are in the world. We work with you to develop an integrated, holistic approach to your information technology risk or to deal with a specific risk and security issue. And because we understand that, to achieve your potential, you need a tailored service as much as consistent methodologies, we work to give you the benefit of our broad sector experience, our deep subject matter knowledge and the latest insights from our work worldwide. It’s how Ernst & Young makes a difference. For more information, please visit www.ey.com. © 2008 EYGM Limited. All Rights Reserved. Proprietary and confidential. Do not distribute without written permission. Ernst & Young refers to the global organization of member firms of Ernst & Young Global Limited, each of which is a separate legal entity. Ernst & Young Global Limited, a UK company limited by guarantee, does not provide services to clients.