Privacy Hot Topics Discussion August 18, 2011 The Corporate Privacy Forum Sharing practical solutions to today’s privacy challenges 1.

Slides:



Advertisements
Similar presentations
Data Privacy and Security in the Cloud Presented by Robert J. Scott Managing Partner Scott & Scott, LLP
Advertisements

The United States, Privacy, and Data Protection Peter P. Swire Dutch Embassy Presentation January 19, 2001.
Proprietary and Confidential June 13, 2012 Compliance Overview: Gift Card, Promotional Card, and Incentive Card Program National Restaurant Association.
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY.
How to do Action and Change. How to… A. Engage people in Action & Change B. Prepare for an Action & Change session C. Facilitate an Action & Change session.
Big Data - Ethical Data Use Kimberlin Cranford. Ethical Use in the Era of Big Data  Landscape has Changed  Attitudes about Big Data  PII, Anonymous,
INTERNATIONAL FOCUS PROGRAMME. International Focus Programme: Media Law The International Focus Programme (IFP) A focus on an internationally relevant.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
Institute Engagement in AIAA Event Model January 2013.
Silicon Valley Apps for Kids Meetup Laura D. Berger October 22, 2012 The views expressed herein are those of the speaker, and do not represent the views.
Welcome to your wellness program
Welcome TFDs Understanding Deforestation-Free Scoping Dialogue October 2014 New Haven, CT, USA #TFDdeforestationfree.
Economic Criteria for Transmission Planning in the ERCOT Region Public Utility Law Seminar DeAnn Walker August 3, 2012.
Canadian Geomatics Community Round Table Know Edge Limited Location Information Innovation Overview of Workshop Presented by: Ed Kennedy Hickling Arthurs.
September 5, 2013 Southern Region Break-Out NAAA Annual Convention.
NTIA Privacy Multistakeholder Meeting March 25, 2014 Amanda Koulousias, Attorney Division of Privacy and Identity Protection Federal Trade Commission FTC.
Why Privacy Now Goes Far Beyond Complying With Your Privacy Policy Peter Swire Facebook: June 3, 2015.
Co-op Development Training Program Starting September, 2011 Information Session July 8, 2011.
TILA-RESPA Integrated Disclosures Setting the Stage – Understanding Changes, Managing Expectations and Creating Opportunities.
NESCC Meeting March 28, Topics Accomplishments Since Last Meeting Program Management for NESCC Support to the NESCC Sponsor Committee Review and.
If Community Development is about achieving social justice for all – how can we make sure everyone benefits and contributes, regardless of protected characteristic?
Association of International Bank Auditors Anticipated Post-Election Changes in the Regulatory Environment Presentation by Professor John Alan James Executive.
“Privacy and the Future of Justice Statistics” Peter P. Swire Chief Counselor for Privacy OMB/OIRA National Conf.on Privacy, Technology & Criminal Justice.
Track II: Introduction and Overview of Financial Services and Information Technology Privacy Policy: Synthesizing Financial Services Industry Privacy David.
How Can We Deal with Risks from the Internet: Why Privacy Legislation Is Hot Right Now Professor Peter Swire Ohio State University/Center for American.
RISING DATA FLOW- OUT OF CONTROL? ARTHUR POBER, ED.D.
Enterprise data (decentralized control, data security and privacy) Incident Response: State and Federal Law Rodney Petersen Security Task Force Coordinator.
Technical Regulations – U.S. Procedures and Practices U.S.-Brazil Commercial Dialogue Digital Video Conference Series August 22, 2006 Mary Saunders Chief,
Arkansas State Law Which Governs Sensitive Information…… Part 3B
Legislative Policy Committee ISAC Board approved concept at their meeting in December.
DEPARTMENT OF COMMERCE MULTISTAKEHOLDER FORUM IMPROVING THE OPERATION OF THE DMCA NOTICE AND TAKEDOWN SYSTEM FIRST PUBLIC MEETING March 20, 2014.
© 2008 Brigham Young University–Idaho STUDENT RESEARCH USING HUMAN SUBJECTS Scott Bergstrom Institutional Research March 15,
IAPP KnowledgeNet Los Angeles “Thinking Outside the Cookie Jar” The Second Wave of Global Privacy Protection: Why This Year Is Different Peter Swire, Senior.
Lunch & Learn – PMO April 2014 Summary April 1 st April – 30 th June 2014.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
Personalisation and workforce issues November 2012.
Federal Trade Commission U.S. Rules on Privacy and Data Security Organization for International Investment General Counsel Conference October 16, 2009.
FIRMA April 2010 DATA BREACHES & PRIVACY Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
Recent Privacy Developments ISACA January 12, 2012 Keith A. Cheresko and Robert L. Rothman Principals, Privacy Associates International LLC.
WELCOME #AdvanceYourPotential. Red Chair Networking Milestones for Red Chair Networking: – 200 associates. 100 on Red Chair Networking. 100 on Meetup.
HITECH and HIPAA Presented by Rhonda Anderson, RHIA Anderson Health Information Systems, Inc
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall Legal Issues.
Managing your Institution-Specific HIPAA Compliance Policies and Procedures Cutting Edge Issues Thursday, December 13, 2007.
Employment Relations Quality Assurance ® Stuck in the 20th century? Employment Relations Quality Assurance is about ending the Cold War at work. It’s about.
Lecture 8 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS (continued) © Prentice Hall
Top 10 Series Changes to HIPAA Devon Bernard AOPA Reimbursement Services Coordinator.
Clean Air Act Section 111 WESTAR Meeting Presented by Lisa Conner U.S. Environmental Protection Agency Office of Air and Radiation November 6, 2013.
European Patients’ Academy on Therapeutic Innovation Aspects of pharmacovigilance: Public hearings.
Data Security in the Cloud and Data Breaches: Lawyer’s Perspective Dino Tsibouris Mehmet Munur
Safeguarding Sensitive Information. Agenda Overview Why are we here? Roles and responsibilities Information Security Guidelines Our Obligation Has This.
Special Meeting on Procedures for Information Exchange November 7, 2007 Geneva Session 1 Anne Meininger United States USA WTO TBT Enquiry Point.
AND CE-Prof, Inc. January 28, 2011 The Greater Chicago Dental Academy 1 Copyright CE-Prof, Inc
NET4 INDIA LTD. Top 5 Reasons Why You Should Register a Domain Name for your Business.
Welcome! Microsoft Dynamics gp user Group (Gpug)
All IT Staff Meeting September 18, 2013
Data access and sharing
Moving from what do we have to do to what Can we do Building a partnership with your University Attorney AHEAD 2016.
Welcome to CFMA’s Chapter PresidentS’ Orientation
Welcome! Microsoft Dynamics gp user Group (Gpug)
Chapter # 1 Overview of Ethics
5th Meeting of the ASEAN Spectrum Policy Forum (ASPF-5) "Workshop on re-farming 2G bands (800/900/1800MHz)", 18 March 2015
Data Privacy: Essentials for Payroll
Philanthropy & Partnerships Forum
Philanthropy & Partnerships Forum Invitation to join 2017
DATA BREACHES & PRIVACY Christine M
WARNING: Privacy and Data Breach
Welcome! Microsoft Dynamics gp user Group (Gpug)
Principle #1 – Appropriate Product Design and Delivery This presentation is made possible by the Smart Campaign   [Introductions of facilitator(s)
Feedback thought the little tests built in to the webinar were a good idea as it did check your understanding and interpretation of the guidance. Thought.
Presentation transcript:

Privacy Hot Topics Discussion August 18, 2011 The Corporate Privacy Forum Sharing practical solutions to today’s privacy challenges 1

Agenda Welcome – the CPF, How it works, and Rules of Engagement Introductions Questions posed in invitation Other questions/topics of interest Upcoming CPF sessions 2

3

Rules of Engagement This Forum is a means to share ideas in addressing commonly faced privacy issues. These simple rules govern discussions and are designed to foster a free flow of specific privacy-related discussion in an appropriate, lawful manner. Adherence to the rules is mandatory. 1. Discussion at Forum sessions is related exclusively to privacy issues with no competitive sensitivity. 2. Participation in Forum sessions is limited to registered participants. 3. “Chatham House Rule” applies. " When a meeting, or part thereof, is held under the Chatham House Rule, participants are free to use the information received, but neither the identity nor the affiliation of the speaker(s), nor that of any other participant, may be revealed". 4

Thought Starter Questions From Invitation How do you get the C-Suite interested and engaged? Is social media a good idea for financial institutions to use? Do the benefits of using social media outweigh the potential for becoming a hacker's target? What is the impact of pending US Federal legislation on data breach response processes? How will the new Consumer Financial Protection Bureau affect FCRA enforcement? Will the environment for behavioral tracking and self regulation change eCommerce? How is OFAC operationalized? What is social media’s role in hiring decisions? Will revisions to the FTC Dot com guidance require changes to online practices? Does anyone really get the proposed HIPAA accounting rule? How will HITECH impact business associates? Is safe harbor really working as promised? What is happening with India’s privacy rule? EU - cookies anyone? What is new in international privacy legislation? 5

Other Questions or Topics of Interest for Discussion This Forum is a means to share ideas in addressing commonly faced privacy issues. These simple rules govern discussions and are designed to foster a free flow of specific privacy-related discussion in an appropriate, lawful manner. Adherence to the rules is mandatory. 1. Discussion at Forum sessions is related exclusively to privacy issues with no competitive sensitivity. 2. Participation in Forum sessions is limited to registered participants. 3. “Chatham House Rule” applies. " When a meeting, or part thereof, is held under the Chatham House Rule, participants are free to use the information received, but neither the identity nor the affiliation of the speaker(s), nor that of any other participant, may be revealed". 6

Upcoming CPF Sessions Next Meeting Topic Suggestions? Tentative Dates: – January 19, 2012 – May 10, 2012 – September 13,

Contact Information 8