Workshop: Information Infrastructuring for Disaster Risk Management

Slides:



Advertisements
Similar presentations
United Nations Spatial Data Infrastructure Dr Kristin Stock Social Change Online and Centre for Geospatial Science, University of Nottingham.
Advertisements

Identifying Data Protection Issues Developing Lifelong Learner Record Systems and ePortfolios in FE and HE: Planning for, and Coping with, Legal Issues.
CP Sub-Cluster Coordinator Training CP Sub-Cluster Coordinator Training 2010 The Role of the Coordinator in Information and Knowledge Management.
NIST Big Data Public Working Group Security and Privacy Subgroup Presentation September 30, 2013 Arnab Roy, Fujitsu Akhil Manchanda, GE Nancy Landreville,
Lecture 2b: Software Project Management CSCI102 - Introduction to Information Technology B ITCS905 - Fundamentals of Information Technology.
Department of Internal Affairs Cloud computing considerations John Roberts Director, Relationship Management CRI Records Managers 11 June 2015.
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
CROSS BORDER INFORMATION SHARING DRAFT FRAMEWORK 6 th Annual Conference of the African Dialogue on Consumer Protection September 2014 Crossroads.
Implementation of StatoilHydro Ethics Code of Conduct in Estonian business environment Conference “Promoting Business Ethics: Baltic Challenges, Nordic.
Overview Privacy Management Reference Model and Methodology (PMRM) John Sabo Co-Chair, PMRM TC.
Privacy Communication Privacy Confidentiality Access Policies Systems Crypto Enforced Computing on Encrypted Data Searching and Reporting Fully Homomorphic.
FEA DRM Management Strategy Presented by : Mary McCaffery, US EPA.
An NZFFBS Training Module.  Objective 1  State the purpose and principles of the Privacy Act and the Code of Ethics.  Objective 2  Apply the principles.
PMRM Revision Discussion Slides Illustrations/Figures 1-3 o Model, Methodology, “Scope” options Functions, Mechanisms and “Solutions” Accountability and.
Joint UNECE/Eurostat work session on statistical data confidentiality October 2015 Helsinki, Finland Circle of trust Maurice Brandt DESTATIS.
1 Overview of the Hub Concept & Prototype for Secure Method of Information Exchange (SMIE) April 2013 Prepared by NZ & USA.
Project: EaP countries cooperation for promoting quality assurance in higher education Maria Stratan European Institute for Political Studies of Moldova.
EMPLOYMENT EMPLOYEE FREELANCER ENTERPRENEUR. EMPLOYEE FIXED - TERM CONTRACT PERMANENT CONTRACT WORK REMUNERATION / WAGE.
Collaborative Decision Making (CDM) Saulo Da Silva
Electronic Records Management
Big Data Enterprise Patterns
GDPR (General Data Protection Regulation)
Mysale Information Classification 101
VIRTUALIZATION & CLOUD COMPUTING
Understanding EU GDPR from an Office 365 perspective
Viewing the GDPR Through a De-Identification Lens
The Application of Legal Principles in Business
Microsoft 365 Get help with regulatory compliance
Domain 2 – Asset Security
General Data Protection Regulation
Corporations and Trusts Law Chapter 3 Choosing a Business Structure
Nina Barakzai November 2017
Incentive Marketing Association And the GDPR
Chapter 10: Process Implementation with Executable Models
6 Principles of the GDPR and SQL Provision
Cumulative Effects Assessment and Marine Spatial Planning
Red Flags Rule An Introduction County College of Morris
Using the Checklist for SDMX Data Providers
GDPR and Health and Safety
State of the privacy union
G.D.P.R General Data Protection Regulations
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Ethical questions on the use of big data in official statistics
General Data Protection Regulation
Partnerships and networks
Data Protection What’s new about The General Data Protection Regulation (GDPR) May 2018? Call Kerry on Or .
2. An overview of SDMX (What is SDMX? Part I)
TRUST:Team for Research in Ubiquitous Secure Technologies
Securing a Connected Transportation System
Mysale Information Classification 101
Privacy and Transparency Interoperability, Standards and Vocabularies
2. An overview of SDMX (What is SDMX? Part I)
The activity of Art. 29. Working Party György Halmos
What is Interesting in the CCSP certification?
The General Data Protection Regulation: Are You Ready?
IAPP TRUSTe SYMPOSIUM 9-11 JUNE 2004
Welcome IITA Inbound Insider Webinar: An Introduction to GDPR
General Data Protection regulation (GDPR)
Dr Elizabeth Lomas The General Data Protection Regulation (GDPR): Changing the data protection landscape Dr Elizabeth Lomas
Neopay Practical Guides #2 PSD2 (Should I be worried?)
Data Mapping & Data Subject Rights
Outlook and Shared Drives
Successfully introduce cost-effective MCS tools
IASSIST 2007 Montreal, May , 2007 Session A2 Open Data and the Common Good Technology Solutions for Difficult Challenges Pascal Heus Open Data.
Handling information 14 Standard.
Data Privacy by Design Expanding Security for bepress Users
Make it real: Help your customers comply with the GDPR
Presented by: Steve Gerdes 26 January 2019
Distributed Digital Rights Management
Presentation transcript:

Workshop: Information Infrastructuring for Disaster Risk Management Lawful conduct in CIS Workshop: Information Infrastructuring for Disaster Risk Management

…but what if the partners don‘t use the same language and codes? The Problem …but what if the partners don‘t use the same language and codes? ELSI Workshop 2017 www.episecc.eu

The EPISECC Solution Goal: information systems from different DM stakeholders, domains and vendors shall exchange information. CIS: central place where services get in touch to exchange data Adaptors reduce complexity (one CIS adaptor instead of x interfaces per legacy systems) Semantic IO: Adaptors transform proprietary data to standard messages adopted in CIS (CAP, EMSI, MLP; EDXL DE message envelope) Syntactic IO: Mapping proprietary key concepts to standardised EPISCECC taxonomy and vice versa ELSI Workshop 2017 www.episecc.eu

Decentralised architecture Data ownership: information is fully controlled by the owning tools Tool owners are responsible for sharing what with whom no central data store no data processing encrypted messages ELSI Workshop 2017 www.episecc.eu

ELSI – Confidentiality & trust Cooperation Group Online Room (CGOR) – closed group within CIS invite CGOR member join CGOR CGOR-A create CGOR invite CGOR contract (invite-join) exchanges key Symmetric encryption inside a CGOR Sender’s adaptor selects CGOR dependent on message properties join CGOR-B ELSI Workshop 2017 www.episecc.eu

ELSI questions Defining (Joint) data controllership Logging (28 & 30 GDPR) Data breach (33 GDPR) Analogy with intermediary liability? Data subject rights Who do I turn to? Data retention (storage limitation 4 GDPR) More difficult to manage in a decentralised architecture ELSI Workshop 2017 www.episecc.eu

Other (L)ELSI‘s ELSI Workshop 2017 www.episecc.eu Design Use Ensure that the collection of personal data is lawful and you hold it long enough to fulfil your purpose in relation to this data. There is a need to be clear about the true purpose for which the data is being held. The rules can apply to a group but only if they share the same relevant characteristic/s Once the information is no longer necessary for its original purposes it should be deleted. When collating and analysing data do you take steps to ensure that you only access and store the minimum needed to achieve your purpose? When creating fields for data input or search the need to include the lowest possible level of data should be flagged within the system. Particular attention should be taken when the relevant data could be classified as sensitive.   When making choices about the data you need to access and collate to achieve your goal, what systems do you have in place to ensure that you are effectively paying attention to the nature of this data and whether or not it could be sensitive? Different rules may apply to different actors and different kinds of data. Map out all the possible data flows in order to identify which data about which persons are being communicated to who. Can information be exchanged between agencies of different Member States? While developing a CIS, attention should be paid to the existing bi- or multilateral cooperation agreements that authorise the such trans-border information exchange. ELSI Workshop 2017 www.episecc.eu

www.episecc.eu