Data Governance: Addressing the Big Data Challenge IT.CAN 2015 Information Technology Law Spring Forum May 4, 2015 Adam Kardash Partner, Privacy & Data.

Slides:



Advertisements
Similar presentations
NCVHS: Privacy and Confidentiality Leslie P. Francis, Ph.D., J.D. Distinguished Professor of Law and Philosophy Alfred C. Emery Professor of Law University.
Advertisements

Chapter 10 Accounting Information Systems and Internal Controls
Listening to the Future Presented by Larry Johnson and Kristi Nelson Transforming Lives, Education, and Knowledge.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
© 2003 IBM Corporation Preparing for Privacy Society of Internet Professionals January 19, 2004 Nigel Brown Senior Privacy.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
What’s Next What We believe Who We Are Cloud Computing Big data Mobility Social Enterprise.
1 Federal Communications Commission Public Safety and Homeland Security Bureau NARUC Summer Committee Meetings Dallas, Texas July 13, 2014 Clete D. Johnson.
© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Privacy Management for a Global Enterprise.
On Privacy-aware Information Lifecycle Management (ILM) in Enterprises: Setting the Context Marco Casassa Mont Hewlett-Packard.
STANDARDS FOR SCHOOL LEADERS DR. Robert Buchanan Southeast Missouri State University.
The Role of Security & Privacy in EA Program
© 2007 IBM Corporation © 2009 IBM Corporation 1 Tran Viet Huan, PhD CTO, IBM Vietnam IBM Research Global Technology Outlook.
Information Security for the Data Management Professional Micheline Casey Chief Data Officer Federal Reserve Board.
Practicing the Art of Leadership: A Problem Based Approach to Implementing the ISLLC Standards, 4e © 2013, 2009, 2005, 2001 Pearson Education, Inc. All.
Information Technology Audit
Internal Auditing and Outsourcing
Why Information Governance….instead of Records & Information Management? Angela Fares, RHIA, CRM, CISA, CGEIT, CRISC, CISM or
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter 1 Course Orientation. Outline Definition of data source management Definition of data source management Importance data source management to organization.
12 Enterprise and Global Management of e-Business Technology.
EMU Strategic Planning Strategic Planning Material Mission/Vision/Values Goals and Objectives January 10, 2014.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
University of Nevada, Reno Data-Driven Organization Governance 1 Governing a data-driven organization (4/24/2014)  Define governance within organizations.
WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Identity and Privacy: the.
AIAA’s Publications Business Publications New Initiatives Subcommittee Wednesday, 9 January 2008 Rodger Williams.
1 Efficient, Transparent and Strategic Management Presented by: Prof. Venansius Baryamureeba Acting Vice Chancellor, Makerere University, Kampala, UGANDA.
CHALLENGING BOUNDARIES Rhodia way, The way we do business.
Ggim.un.org. The United Nations initiative on Global Geospatial Information Management A formal mechanism under UN protocol to discuss, enhance and coordinate.
+ Regulation and Compliance Summary “ Making Great Ideas Become Reality”
Privacy Project Framework & Structure HIPAA Summit Brent Saunders
National Standards of Excellence for Head teachers January 2015 Margaret Colley SSIA.
Enterprise and Global Management of e-Business Technology
Privacy & How IT Will Help JEFF NORTHROP, CTO
Bank Audit. Internal Audit Internal audit is an independent, objective assurance activity and can give valuable insight in providing assurance that major.
PUTTING MANAGED FILE TRANSFER IN PERSPECTIVE May 2015 Derek E. Brink, CISSP, Vice President and Research Fellow IT Security and IT GRC.
What Keeps Your Board Up at Night? Sylvia Kerrigan, Exec. VP, General Counsel & Secretary – Marathon Oil Sean Gorman, Partner – Bracewell & Giuliani.
ITU CoE/ARB 11 th Annual Meeting of the Arab Network for Human Resources 16 – 18 December 2003; Khartoum - Sudan 1 The content is based on New OECD Guidelines.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
The Future of Veterinary Services. VS is evolving to meet the needs of 21 st century animal health.
Enterprise Cybersecurity Strategy
© 2009 IBM Corporation Smarter Decisions for Optimized Performance IBM Global Executive Forum Panel Discussion Business Analytics and Optimization Fred.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Risk Management for Small & Medium Sized Enterprises
Alberta Association of Immigrant Serving Agencies 8 th Biennial Settlement Conference The Future of Labour Market Integration Gosia Cichy-Weclaw Alberta.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
John Weigelt, MEng, PEng, CISSP, CISM National Technology Officer Microsoft Canada November 2005 Fighting Fraud Through Data Governance.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
A Solution Perspective An Open Source Collaborative and Foundational Solution Targeted at Non-OECD Member Countries February 9, 2016.
Castlebridge associates | | Castlebridge changing how people think about information How to Implement the.
ISACA: 2016 AND BEYOND MATT LOEB (CGEIT, CAE) ISACA CHIEF EXECUTIVE OFFICER.
Ethical Issues in the Big Data Industry Martin - June 2015 Page 1/22 This article analyzes Big Data as an industry, not a technology, and identifies the.
1Third Party Assurance Optimization and Control RationalizationCopyright © 2016 Deloitte Development LLC. All rights reserved. Third-Party Assurance (TPA)
ILP model- Montenegro OSCE Annual Police Experts Meeting
Privacy on the Internet
Principles of Good Governance
Supervision of Insurance Market Conduct in Canada
Issues need harmonization
Attention CFOs How to tighten your belt and still survive May 18, 2017.
LEGAL & ETHICAL ISSUES InsurTech & Health Insurance Providers
INTRODUCTION TO ISO 9001:2015 FOR IMPLEMENTATION Varinder Kumar CISA, ISO27001 LA, ISO 9001 LA, ITIL, CEH, MEPGP IT, Certificate course in PII & Privacy.
Making Information Security Manageable with GRC
Bob Siegel President Privacy Ref, Inc.
Enterprise Cybersecurity Upgrade Initiation Department of Information Technology Maria Sanchez, Acting State CIO November 13, 2018.
Information technologies/NBIC and Big data
Healthcare Privacy: The Perspective of a Privacy Advocate
The General Data Protection Regulation: Are You Ready?
Managing IT Risk in a digital Transformation AGE
I4.0 in Action The importance of people and culture in the Industry 4.0 transformation journey Industry 4.0 Industry 3.0 Industry 2.0 Industry 1.0 Cyber.
Presentation transcript:

Data Governance: Addressing the Big Data Challenge IT.CAN 2015 Information Technology Law Spring Forum May 4, 2015 Adam Kardash Partner, Privacy & Data Management Osler, Hoskin & Harcourt LLP

2 Understanding Big Data  Multiple definitions emerging from government entities, privacy regulatory authorities, “thought leaders”, and academics.  No single universally-accepted articulation of the Big Data concept.

3 Understanding Big Data  Common Themes in Definitions: Qualitative change in data arena  Massive (incalculable) volume of data  Unstructured data sets  Data ubiquity  High velocity (and increasing volume of) data “transactions”  Hyper-connectivity Proliferation of multi-stakeholder platforms “Internet of Things”

4 Understanding Big Data  Common Themes in Definitions (Cont’d.): Proliferation of advanced, affordable analytics processes Conversion of data into knowledge New and enhanced insights Infinite potential for innovative creation of value Profound societal change

5 Data Challenges to Fair Information Practices  Cited challenges posed by Big Data process Expanding application of data regulation Accountability stressors Impracticality of traditional consent models Reconciling purpose identification with search for unknown Data minimization of vast, instructed data sets Ensuring processing is “reasonable”/”legitimate” Transparency of complex data flows and processes Evolving safeguarding threat Access rights Data integrity of algorithms/inferences Retention Discrimination resulting from automated decision- making

6 Data Governance Framework to Address Big Data Challenge  Key thematic trend in Practice: Board/Senior Management focus on Data  Help us leverage data holdings for beneficial purposes  Help us proactively address cybersecurity threat New data governance model emerging.

7 Framework for Addressing the Big Data Challenge  Application and Scope Addresses lifecycle of data (including personal information) Umbrella integration of privacy governance, information security governance with enterprise risk framework.  Core Features Powered by values Data stewardship

8 Framework for Addressing the Big Data Challenge  Data Values Operationalization of stated corporate values in data context. Values for ethical use of data  Example of data values: Beneficial Progressive Sustainable Respectful  Abrams, Marty (The Information Accountability Foundation). A Unified Ethical Frame for Big Data Analysis (2014). “Privacy by Design” as an operationalized value  PBD expressly recognized by data protection authorities globally.

9 Framework for Addressing the Big Data Challenge  Data Stewardship Multi-stakeholder/cross enterprise involvement  Cross-functional skillset critical. Institutionalizing ownership of data use and risks in business lines/processes/units  Individuals designated as responsible. Accountable processes  Meaningfully embraced by Board/Senior management  Reporting mechanisms  Documented policies, protocols and controls  Risk assessment  Training and awareness  Incident response  Vendor management  Ongoing assessment, improvement Automated and manual assessments  Appropriate skillset of personnel