Big Data - Ethical Data Use Kimberlin Cranford. Ethical Use in the Era of Big Data  Landscape has Changed  Attitudes about Big Data  PII, Anonymous,

Slides:



Advertisements
Similar presentations
Tamtron Users Group April 2001 Preparing Your Laboratory for HIPAA Compliance.
Advertisements

Pentti Mäkinen Central Chamber of Commerce of Finland Benefits of low regulation environment Brussels
ITU Regional Seminar on E-commerce Bucharest, Romania May 2002 National E-commerce Strategies for Development Dr. Susanne Teltscher United Nations.
International partnership of law companies Customs & Corporate Lawyers, based on the principles of observance of high professional standards, mutual trust,
A brief for top management Prepared by the Institute of Quality Assurance Integrated Management Special Interest Group Future management is integrated.
MARKETING INFORMATION AND RESEARCH
Mobile Payments and the FTC Manas Mohapatra Director of Mobile Policy Mobile Technology Unit Federal Trade Commission The views expressed are not necessarily.
University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
© 2014 ACA International. All Rights Reserved. Obtaining Optimum Compliance Performance Foundational Training on ACA’s Professional Practices Management.
Silicon Valley Apps for Kids Meetup Laura D. Berger October 22, 2012 The views expressed herein are those of the speaker, and do not represent the views.
© 2014 Nelson Brown Hamilton & Krekstein LLC. All Rights Reserved PRIVACY & DATA SECURITY: A LEGAL FRAMEWORK MOLLY LANG, PARTNER, NELSON BROWN & CO.
What’s Next What We believe Who We Are Cloud Computing Big data Mobility Social Enterprise.
© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Privacy Management for a Global Enterprise.
Security Controls – What Works
WHY CHOOSE CEO-PE?  We employ International Association of Privacy Professionals (IAPP) Certified and Health Insurance Portability & Accountability Act.
Disclaimer This Presentation is provided “as is” without any express or implied warranty. This Presentation is for educational purposes only and does not.
NTIA Privacy Multistakeholder Meeting March 25, 2014 Amanda Koulousias, Attorney Division of Privacy and Identity Protection Federal Trade Commission FTC.
E-Commerce: Regulatory, Ethical, and Social Environments
© Experian CheetahMail All rights reserved. Confidential and proprietary. 1 © Experian Information Solutions, Inc All rights reserved. Confidential.
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
Trends in Corporate Social Responsibility Reporting
Saxson Global Services Outsourced Professional Services BPO Business Process Outsourcing Your Global Sourcing Partners.
ISO Richard Welford CSR Asia © CSR Asia 2011.
Privacy and Security Risks in Higher Education
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
LAW SEMINARS INTERNATIONAL New Developments in Internet Marketing & Selling November 13 & 14, 2006 San Francisco, California Moderator : Maureen A. Young.
11 – E-Commerce 1. What is Electronic Commerce? 2. What is a contract? 3. Elements of an enforceable contract 4. Standard terms of a contract 5. Form and.
Social Media Jeevan Kaur, Michael Mai, Jing Jiang.
Outsourcing Louis P. Piergeti VP, IIROC March 29, 2011.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Managing the Privacy Function at a Large Company Kimberly S. Gray, Esq., CIPP Chief Privacy Officer Highmark Inc.
Looking beyond the obvious!! HOW SECURE IS BANKS’ CORE DATA? Prashant Pande Head Professional Services IDBI Intech Ltd.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
10/19/2015 / 1 Electronic Commerce Branch UNCTAD - United Nations Conference on Trade and Development Dr. Susanne Teltscher United.
Europe's work in progress: quality of mHealth Pēteris Zilgalvis, J.D., Head of Unit, Health and Well-Being, DG CONNECT Voka Health Community 29 September.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Identity Crisis: Global Challenges of Identity Protection in a Networked World Alison Knight.
Regulatory Transparency and Efficiency in the Communications Industry in Australia Jennifer Bryant Office of Regulation Review Australia.
Cloud Computing, Policy Management and Standardization Europe Identity Conference 2011 John Sabo, Director Global Government Relations, CA Technologies.
ECT 455/HCI 513 ECT 4 55/HCI 513 E-Commerce Web Site Engineering Legal Issues.
CIBC Global Services © 2006, Echoworx Corporation Ubiquity of Security Compliance and Content Management Stephen Dodd Director – Enterprise Accounts.
1. The role of Privacy Risk Framework and Risk-Based Approach in Delivering Effective Privacy Compliance Bojana Bellamy.
1 Copyright © International Security, Trust & Privacy Alliance -All Rights Reserved Making Privacy Operational International Security, Trust.
Compliance is Pretty Important, I Guess Florida Gulf Coast ARMA Meeting.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Your Cyber Security: The scope of your risk is broad and growing To understand the nature of the risk landscape look at the presentations here today-begin.
Privacy and Security Considerations in Research and Clinical Trials February 28, 2013 Joanna K. Napp, J.D., M.P.H. Chief Privacy Officer and Compliance.
1 Privacy & Preference Committee Update Ensuring a healthy ecosystem via transparency & trust Date: January 13, 2009 Alan Chapell, President.
Draft - Enterprise Risk Management Risk Universe
Privacy and Public Policy Implications of IoT
Information Security Program
Regulatory Transparency and Efficiency in the Communications Industry in Australia Jennifer Bryant Office of Regulation Review Australia.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Page 1 Fundamentals of Information Systems.
E&O Risk Management: Meeting the Challenge of Change
Get The Job Done.
E-Commerce: Regulatory, Ethical, and Social Environments
General Counsel and Chief Privacy Officer
Consumer Privacy An Introduction
Sameer Sharma, ITU 7 August, 2018 Dhaka, Bangladesh.
HIPAA Policy & Procedure Strategies
Reiniger LLC.
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Colorado “Protections For Consumer Data Privacy” Law
Presentation transcript:

Big Data - Ethical Data Use Kimberlin Cranford

Ethical Use in the Era of Big Data  Landscape has Changed  Attitudes about Big Data  PII, Anonymous, De-identified  Sensitive Data Evolving  Governance of Big Data  Privacy by Design (Privacy Engineering)

Attitudes About Big Data Examples of Big Data individuals can understand… Search is Big Data for consumers. Digital Advertising is Big Data for consumers.

Big Data Benefits Corporate uses Fulfill a transaction Improve operational efficiency Develop new products/services Market and advertise products/services Satisfy a legal obligation Societal uses Research Free Speech

Risks of Big Data Traditional Harms Financial Physical New Harms Emotional Intrusion Reputation

Big Data Types Device Identifiable Information Anonymous Choice X De-Identified Information X Personally Identifiable Information Aggregate Information Pseudo - anonymous / / Personal Pseudo- anonymous PIIDII AGI De-ID SANI ANI PIISANI Covered Information Ease of Technical Re-identification 100% 0%

Sensitive Data Evolving Historically Sensitive Commercial Data  Identification  Financial  Medical  Children New Categories of Sensitive Commercial Data  Precise geo-location  At-risk populations (children & elderly)  Teens - raise the age for COPPA from under 13 to 18  Elderly over 60  Social network information (public & non-public)  Biometrics & Facial recognition  Modeled Data Finances Identification Medical Social Networks Biometrics At Risk Populations Facial Recognition Location

Governance for Big Data Federal Laws and Regulations General (FTC Title V) Sector Specific (GLBA, FCRA, HIPAA) Use Specific (CAN SPAM, TCPA, DNC) Data Specific (DPPA, COPPA, CPNI) State Laws and Regulations Consumer Protection Laws Do-Not-Call Laws Data Breach and Security Laws Website Disclosure Laws

Industry Groups and Self-Regulatory Groups w/ Codes of Conduct  International Association of Privacy Professionals (IAPP — a worldwide organization)  Direct Marketing Association  Digital Advertising Alliance  Interactive Advertising Bureau  Network Advertisers Initiative  Sender and Provider Coalition  Coalition for Sensible Public Record Access  Policy and Economic Research Council  National Business Coalition for Ecommerce & Privacy  US Chamber of Commerce  State Chambers of Commerce  Conference of Western Attorneys General  Mobile Marketing Association  Information Accountability Foundation

Privacy By Design / Privacy Engineering  Should be part of organizational strategy  Privacy and data protection: should be embedded throughout the enterprise and the life cycle of products and services  Google’s Red Team  Yahoo’s Paranoid Team  Apple’s App Review Team  MIT program, Harvard program  (computer) Code is Conduct “All of Acxiom’s products and services have been created based upon these key principles.”

Information Governance = Accountability & Measurement  Line of business accountability  Leadership required to be accountable for the operational compliance of their products, solutions, services  Client Credentialing: Legitimate entity, legitimate use  on-site inspection possible  Vendor Screening and Accountability Program  You are your vendor’s keeper  Privacy by Design/Privacy Impact Assessment  Understanding and applying the rules to business processes is complex – yet critical  Computer Code is the Conduct  Individual employee accountability & training  Achieve excellence - each employee accountable for applying rules, issue spot, report problems  Assurance Reviews  Internal audits on data products  Functional Area/Line of Business Audits 11

 First ever Consumer Access Portal – launched 9/4/13  Clear and public articulation of Acxiom’s ethical data use position  Internationalization: country by country approach to globalize ATD  In the works:  Adding more core data to the portal  Increase value for those participating AboutTheData

Launched 9/4/13  # of visitors: 630K  % returning users: 17%  % opt out: 2%  % creating accounts: 37%  % editing:11%

Big Data and Ethical Promise Media Policy Makers/ Regulators Consumers TRUST Expertise and Leadership Compliance and Leadership Hyper-Transparency Clients

Thank you!