As defined in the Generally Accepted Privacy Principles, “privacy” refers to the rights and obligations of individuals and organizations with respect to.

Slides:



Advertisements
Similar presentations
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY.
Advertisements

The data retention directive: data protection aspects Frank Robben General manager Crossroads Bank for Social Security Sint-Pieterssteenweg 375 B-1040.
Criteria For Approval 45 CFR CFR Minimized risks Reasonable risk/benefit ratio Equitable subject selection Informed consent process Informed.
BIOMETRICS, CCTV & DATA PROTECTION By Drudeisha Madhub Data Protection Commissioner Date:
CHAPTER 4 E-ENVIRONMENT
CHARTERED SECRETARIES AUSTRALIA New Privacy Laws 6 June 2013.
Identity Management In A Federated Environment Identity Protection and Management Conference Presented by Samuel P. Jenkins, Director Defense Privacy and.
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
Mark S. Hayes – Blake, Cassels & Graydon LLP Privacy and Security – Some Observations Mark S. Hayes, Blake, Cassels & Graydon LLP 7th CACR Privacy and.
6/1/2015MINISTRY OF ENERGY, COMMUNICATIONS AND MULTIMEDIA 1 PRESENTATION OF PERSONAL DATA PROTECTION BILL PRESENTATION OF PERSONAL DATA PROTECTION BILL.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Data Retention LIS 550 Winter 2010 Unsworth Tuesday, March 02, 2010.
Privacy in Ontario Brian Beamish Office of the Information and Privacy Commissioner/Ontario Presentation to Security Canada Central 2002 International.
Legislation Who governs e-commerce?. E-commerce is regulated by laws and guidelines. These aim to ensure that sites operate effectively and that online.
Geneva, Switzerland, 14 November 2014 Data Protection for Public Cloud (International Standard ISO 27018) Stéphane Guilloteau Engineer Expert, Orange Labs.
Employee privacy in a global company Sandra Kelman Privacy Manager (Asia Pacific) Privacy Issues Forum 30 March 2006.
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
Personal Data Privacy and The Internet by Stephen Lau Privacy Commissioner for Personal Data, Hong Kong SAR at the Joint Conference of the OECD, HCOPIL,
Copyright © 2015 Pearson Education, Inc. Confidentiality and Privacy Controls Chapter
Taking Steps to Protect Privacy A presentation to Hamilton-area Physiotherapy Managers by Bob Spence Communications Co-ordinator Office of the Ontario.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Personal Data (Privacy) Ordinance Hong Kong Personal Data (Privacy) Ordinance Hong Kong by Stephen Lau Privacy Commissioner for Personal Data Hong Kong.
Marketing - Best Practice from a Legal Point of View Yvonne Cunnane - Information Technology Law Group 30 November 2006.
DEFENSE PRIVACY & CIVIL LIBERTIES OFFICE Privacy Foundations Samuel P. Jenkins Director for Privacy Defense Privacy and Civil Liberties Office Identity.
Service Organization Control (SOC) Reporting Options and Information
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
Ethical principles Honesty – be honest in the way you communicate as well as how you act. Integrity – Earn the trust of others.
© 2008 Thomson, a part of the Thomson Corporation. Thomson, the Star logo, and Atomic Dog are trademarks used herein under license. All rights reserved.
The Significance and Evolution of End User Privacy Julie Earp College of Management North Carolina State University WISE 2010 Sponsored by TRUST June 21-24,
ESRC Datasets Policy and Qualitative Data Preparation Gill Backhouse Senior Acquisitions and Liaison Officer Qualidata.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
A Perspective: Data Flow Governance in Asia Pacific & APEC Framework Martin Abrams October 21, 2008.
Privacy BBA361 Business Ethics and Corporate Governance Lecture 4 Department of Business Administration Chapter 6, “Ethics and the Conduct of Business”,John.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
Fundamentals I: Accounting Information Systems McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Definitions of Business, E- Business, and Risk  Business: An organization involved in trade of goods and/or services to the consumers  E-Business: Application.
Privacy vs. Confidentiality.  IRB review of privacy and confidentiality protections is required under the Common Rule and the FDA regulations, as well.
BC Public Libraries November, 2008 Privacy Principles.
A.S. FlemingFall 2009 Acct 431 – Cost Management "Ethics in its broader sense, deals with human conduct in relation to what is morally good and bad, right.
Copyright © 2012 Brooks/Cole, a division of Cengage Learning, Inc. Professional Concerns Chapter Nine.
Chapter 20 Additional Assurance Services: Other Information McGraw-Hill/IrwinCopyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 9 – Protecting the Confidentiality and Privacy of Information Information Systems, First Edition John Wiley & Sons, Inc by France Belanger and.
Malcolm Crompton APEC Information Privacy Framework: review, impact, & progress APEC Symposium on Information Privacy Protection in E Government & E Commerce.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
CONTROLLING INFORMATION SYSTEMS
Privacy Practices.
Breakaway Session 2: Data Protection and The Role of the Data Protection Supervisor Michael Mingle Director, NTSS Solutions (UK) D ATA P ROTECTION C ONFERENCE.
APEC Privacy Framework “The lack of consumer trust and confidence in the privacy and security of online transactions and information networks is one element.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Introduction to the Australian Privacy Principles & the OAIC’s regulatory approach Privacy Awareness Week 2016.
The Health Information Protection Act. What is the Health Information Protection Act (HIPA)? HIPA is legislation that speaks to access to, and protection.
Key Knowledge Confidentiality Year 4 Medical Ethics and Law Thread Course The Ethox Centre, University of Oxford.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
The New Privacy Principles and Schools Charles Alexander Veronica Scott March2014 ME_ _3 (PPT)
Consumer Information Federal Trade Commission Act grants Federal Trade Commission (FTC) responsibility regarding unfair methods of competition and unfair.
Catee’s Interior Décor and Organizing Interior Decorating Business by Catina Goode Presented by Austin Lee and Sedra Anderson.
Director, Internet, Science, and Technology Research
Data Protection Officer’s Overview of the GDPR
Privacy principles Individual written policies
Issues of personal data protection in scientific research
GENERAL DATA PROTECTION REGULATION (GDPR)
Move this to online module slides 11-56
G.D.P.R General Data Protection Regulations
American Health Information Management Association
 How does GDPR impact your business? Pro Tip: Pro Tip: Pro Tip:
Mandatory Breach Reporting (isn’t *that* bad)
IAPP TRUSTe SYMPOSIUM 9-11 JUNE 2004
Legislative Response to Data Inferences
Data Protection What can I do? GDPR Principles General Data Protection
Presentation transcript:

As defined in the Generally Accepted Privacy Principles, “privacy” refers to the rights and obligations of individuals and organizations with respect to the collection, use, retention, disclosure, and destruction of personal information. This pertains to the Privacy of Personal Information, which comes to mind nowadays with the prevalence of on online threats to our privacy and identity. However, in a broader context, there are four aspects to privacy, as explained by the Information Commissioner’s Office (UK): Privacy of Personal Information --- data privacy, as explained above Privacy of Personal Communications --- the contents one’s communications Privacy of Personal Behavior --- the observation of what an individual does Privacy of the Person --- the integrity of an individual’s body What is Privacy? 2/15/2013

People expect their personal information to be safe with you. They trust you not to misuse it, scatter it, lose it, fail to maintain it, or take more than you need. You expect your business confidential information to be safe when you do business. Bad forces are out to steal and perform fraud --- Prepare for a breach in which privacy is jeopardized. Pay attention to the law. Unmanaged privacy risk will cost you money, hurt your reputation, and reduce consumer’s trust in you. Why Privacy Matters 2/15/2013

Fair Information Practice Principles (FIPPs) 1. Notice/Awareness Provide a privacy statement – who collects & receives what data how, and for what purpose. 2. Choice/Consent Obtain consent for secondary use, opt-in or opt-out, depending on requirements. 3. Access/Participation Permit individuals to view data from and about them; to contest the accuracy and possibly the completeness of that data. 4. Integrity/Security Ensure data quality – accuracy, and possibly completeness. Ensure data security – no data loss or unauthorized destruction, modification, disclosure, use. 5. Enforcement/Redress Follow industry self-regulation programs. Ensure compliance with government regulations. 2/15/2013