Zaštita ličnih podataka Iskustva iz Republike Slovenije Podgorica, 7.2.2010 Nataša Pirc Musar Information Commissioner.

Slides:



Advertisements
Similar presentations
Scotland, 5th of June, 2009 Access to Public Information in Slovenia Nataša Pirc Musar, Information Commissioner.
Advertisements

photo credit: dbarefootdbarefoot Social Media is Consumer generated media It is media that is designed to be shared, sharing means that it is easy to.
Confidentiality and HIPAA
1 Allan Chiang, S.B.S. Privacy Commissioner for Personal Data 8 July 2013 Asian Privacy Scholars Network Conference Balance between Access to Public Domain.
VIU Workshop: Creating a Culture of Privacy Awareness June 12, 2013 By Justin Hodkinson OIPC Policy Analyst/Investigator Office of the Information & Privacy.
Commissioner for Personal Data Protection
1 PRIVACY ISSUES IN THE U.S. – CANADA CROSS BORDER BUSINESS CONTEXT Presented by: Anneli LeGault ACC Greater New York Chapter Compliance Seminar May 19,
PRIVACY: What does it mean?? Molly, Julia, Erin and Andrew Project.
The role of the Office of the Privacy Commissioner in telecommunications Andrew Solomon Director, Policy.
Lecture to Carleton University, Center for European Studies, December 1, 2010.
Business Law Unit 1 Law, Justice, and You
Online Marketing is Changing the Game for Local Businesses. Here’s how your company can adapt and grow. Strategic Business Solutions (SBS) | Contact Us.
A European View of Privacy Protection John Woulds Director of Operations UK Data Protection Commissioner National Conference on Privacy, Technology & Criminal.
Personal Data Privacy and The Internet by Stephen Lau Privacy Commissioner for Personal Data, Hong Kong SAR at the Joint Conference of the OECD, HCOPIL,
Taking Steps to Protect Privacy A presentation to Hamilton-area Physiotherapy Managers by Bob Spence Communications Co-ordinator Office of the Ontario.
Information Commissioner’s Office: data protection Judith Jones Senior Policy Officer Strategic Liaison – public security 16 November 2011.
Public Awareness and Data Protection Nataša Pirc Musar, Information commissioner, Republic of Slovenia Brussels, 20th of May, 2009.
Tina Kraigher and Milena Podjed-Fabjančič 18 April 2010 Processing of Telephone Traffic Data of Employees ( a Case Study )
How It Applies In A Virtual World
Business Marketing B2B Communications Strategies & Sales Management Issues November 3, 2011 Dawne Martin, Ph.D.
Stacy Snyder, Aspiring Teacher FIRED Stacy Snyder, “Drunken Pirate”
First steps for a data protection commissioner: Some suggestions from New Zealand Katrine Evans Assistant Commissioner (Legal and Policy) Kuala Lumpur,
Freedom of Information Workshop & Briefing 5 th March 2014 Welcome.
“ The Albanian Commissioner for Personal Data Protection Office” “ The Albanian Commissioner for Personal Data Protection Office” ” 3 rd International.
PRIVACY. In pairs Work out a definition of the word PRIVACY that you think makes sense You’ve got about 7 minutes...
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
Data Protection and You Your Rights & The Law Registration Basics Other Activities Disclaimer: This presentation only provides an introductory info. Please.
1.8 vs. 5.3 Benefits and Risks of Social Media in Healthcare Andy Malinoski Director of Risk Management Andy Malinoski Director of Risk Management.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Healthy Relationships and Social Media (Part 2 of 2) Grade 8.
Mi-Gyeong Gwak, Christian Vargas, Jonathan Vinson
Criticism Of Google By: Kyle Singler. Privacy Policies One of the main concerns regarding online search is that an individual’s information is kept private.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Unit 2 Lesson 2.05 Social Networking Ethics & Responsibility.
Investment recommendations by journalists: The German legal framework Trziste Novca Conference | Opatija | Disclaimer:
Identity Crisis: Global Challenges of Identity Protection in a Networked World Alison Knight.
Privacy Technologies (H09L2A) Claudia Diaz ESAT / COSIC.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
Kristen Lockhart COMPUTER PRIVACY & PERSONAL INFORMATION What types of information do companies have and share about YOU?
Law, IT and personal data protection - legislative framework lags behind the IT development Nataša Pirc Musar Information Commissioner, Republic of Slovenia.
Privacy in Romania Today’s Challenges Bogdan Manolea A.B.U.S.E.
Data protection and European citizens’ initiatives
1 Office of the Privacy Commissioner for Personal Data Hong Kong SAR Tony LAM Deputy Privacy Commissioner for Personal Data Briefing to Asian Data Privacy.
My Digital Footprint By Alanya Davignon.
Online Safety and Privacy Understanding online privacy and how your information is shared.
Monitoring and Supervision. June 15, Rotterdam 1 MONITORING ELECTRONIC COMMUNICATIONS: PRIVACY ISSUES Prof. Rimantas Petrauskas, Assoc.
Presentation to the Local Authorities Revenue Management Association – October 2012 The role of the Office of the Information Commissioner.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Collaborative Working & Best Practice A Seminar by the Public Services Ombudsman for Wales.
Your Code of Conduct: Data Protection & Compliance Your Code of Conduct: Data Protection & Compliance for Charities.
Tonyfish www linkedin skype twitter facebook CEO and Founder
REPUBLIC OF LATVIA PUBLIC UTILITIES COMMISSION Līga Daugaviete Senior Legal Adviser of Energy Division October 26, 2005 Customer Complaints and Dispute.
Federal Public Service Economy, SMEs, Self-employed and Energy Pieter Van Vaerenbergh DG Enforcement and Mediation Belgium Enforcement Regulation 2006/2004.
 FAN ADS World’s #1 Social Media Monetization Platform.
Identity and Access Management
What does your digital footprint say about you?
Chapter 10 Cyberlaw, Social Media, and Privacy
THE NEW GENERAL DATA PROTECTION REGULATION: A EUROPEAN OR A GLOBAL STANDARD? Bart van der Sloot Senior Researcher Tilburg Institute for Law, Technology,
Privacy principles Individual written policies
Ireland’s transition towards the GDPR
Closing Remarks and Next Steps
Collaborative Working & Best Practice
MAR316 Last Points Dr. Elmos Konis.
Government Data Practices & Open Meeting Law Overview
Collaborative Working & Best Practice
Government Data Practices & Open Meeting Law Overview
PRESENTATION OF MONTENEGRO
Pennsylvania NewsMedia Association March 21, 2017
New tasks of the National Labour Inspectorate in Poland related to inspections of legality of employment.
Presentation transcript:

Zaštita ličnih podataka Iskustva iz Republike Slovenije Podgorica, Nataša Pirc Musar Information Commissioner

Access to public information v. Data protection Can one body handel both?

Situation in Slovenia What we do and how we do it?

Trust in the Information Commissioner (public poll Jan 2010)

Trust in supervisory authorities (public poll Oct 2010) INFORMATION COMMISSIONER OMBUDSMAN POLICE GEN. DIRECTOR STATE PROSECUTOR DOES NOT TRUST / TRUSTS

Situation in Slovenia Formal supervisory procedures

Informacijski povjerenik Poverenica, 3 zamjenika i vođa inspektora 32 zaposlenih  18 na zaštiti osobnih podataka, 10 na pristupu informacijama, 4 u administraciji 9 (11) inspektora Aktivan od (ujedinjenje Poverenika i Inspekcije za lične podatke)  Snažne komeptencije po Zakonu o inspekcijskom nadzoru  Predlog za zatvaranje rukovalaca (ako ne plate kaznu),  Novčane kazne,  Podnošenje prijave krivičnog djela,  Ulaz u kancelarije, pregled kompjutera...

Inspection procedures

Structure of procedures ( )

Misdemeanour procedures (2009)

2009: 163 violation procedures –Public sector: 41 –Private sector: 70 –Natural persons: warnings 93 decisions –67 cautions –26 fines 12 payment orders 21 appeals to the court Fines: –Legal person.: to EUR –Responsible person: 830 to EUR  Largest fine: – EUR for data controller – EUR for responsible person

Data subject’s access 2009: 70 demands –2008: 43 demands Some interesting cases, e.g. access to retained traffic data on telephone calls Number of requests (complaints) for access to individual’s own data

Situation in Slovenia Awareness raising toolbox

Opinions 2009: 1334 requests for opinion –2008: 853 requests for opinion On-line publication ( opinions) Main areas: –Offcial procedures – judicial, administrative and police procedures (67), –Employment relationships (64), –Transfer of personal data between data controllers(45), –Internet related(43), –Health data (33),

Guidelines

Identity theft – self assesment test adapted from NOR DPA original

Facebook profile

Data protection The challenges

Data protection challenges –Location privacy Google Street View, Google Earth – what is next? –Probably other angles between vertical and horizontal pictures, higher frequency and perhaps “real-time view-it-all?” Drivers’ privacy –Electronic toll collection and other location-based services –Personal profiles and behavioural marketing Personalized, customized ads All media covered: internet, print, (digital TV)! Smart videosurveillance, audience measurement… –Changing attitudes towards privacy DPA’s awareness raising toolbox Can we influence it al all? –REAL concern when statemets are made such as: “Privacy as a social norm is a matter of past!” by____, CEO of______ “If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place.” by____, CEO of______

Data protection challenges cont. –Worklapce privacy Many complaints Draft bill prepared –Identity theft Abuse of publicly available data Abuse of private data –Data business Interconnection of databases Outsourcing of personal data / cloud computing –Digital dataveillance e.g. automated analysis of computer and telephone network traffic (i.e. Data retention...) Creation of extensive personal profiles and activity histories; can be used for many reasons – can lead to errosion of privacy –Let’s have a closer look at some of them …

“The problem with the nothing to hide argument is with its underlying assumption that privacy is about hiding bad things.“ Daniel Solove

Thank you for your attention! IC website in English