Cyberspace Privacy Considerations Arthur Shay, Esq. Shay & Partners, Taipei, Taiwan February 25, 2008 Partnership towards IGF in Asia.

Slides:



Advertisements
Similar presentations
EU Privacy Directive. What is a directive? A piece of European legislation, passed by bureaucrats, addressed to member states Member states must ensure.
Advertisements

Thematic Discussion on Human Rights & Resolution 1373 Counter-Terrorism Committee Executive Directorate (CTED) United Nations New York, 7 October 2010.
EU Development Cooperation Sven Grimm Overseas Development Institute.
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL DATA PROTECTION AND PRIVACY COMMISSIONERS.
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY.
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY.
European Commission policy and actions on human rights and business Berlin, February 20, 2013.
Electronic commerce EDI (8 decade) – base of EC – “Netscape” – propose SSL (Secure Sockets Layer) 1995 – “Amazon.com” “eBay.com” 1998 – DSL (Digital.
UN Guiding Principles on Business and Human Rights
Proposed Regional Cooperation Framework To be taken forward through the Bali Process on People Smuggling, Trafficking in Persons and related Transnational.
Financial Services and Consumer redress Unit DG SANCO The Commission‘s initiative on Collective Redress.
The Geopolitics of Personal Data and the Governance of Privacy Colin J. Bennett Department of Political Science University of Victoria BC, Canada
A European View of Privacy Protection John Woulds Director of Operations UK Data Protection Commissioner National Conference on Privacy, Technology & Criminal.
High Technology Cooperation Group: Data Privacy The Indo-U.S. High Technology Cooperation Group November 18, Privacy and Cyber Security:
Anomalous Aspects of Transfer of Personal Data from the E.U. to the U.S. Stephen R. Bell Willkie Farr & Gallagher ABA Section of International Law New.
Data Protection: International. Data Protection: a Human Right Part of Right to Personal Privacy Personal Privacy : necessary in a Democratic Society.
An overview of the Data Protection Act Legal framework The Data Protection Act 1998 came into force in March 2001, replacing the Data Protection.
Data Protection and Cybercrime The dilemma of Internet Service Providers CEENET Workshop 22 September 2002 Joe McNamee Regulatory Affairs Manager, EuroISPA.
LegalTech Asia DATA PRIVACY LAWS UPDATE Edward Chatterton 4 March 2013.
) Linked2Safety Project (FP7-ICT – 5.3 ) A NEXT-GENERATION, SECURE LINKED DATA MEDICAL INFORMATION SPACE FOR SEMANTICALLY-INTERCONNECTING ELECTRONIC.
1 Prague, 26 February 2009 Ministerial conference “ Strengthening EU competitiveness – potential of migrants on the labour market” Towards a single European.
© 2007 The MITRE Corporation. MITRE Privacy Practice W3C Government Linked Data Working Group Michael Aisenberg, Esq. 29 June 2011 Predicate for Privacy.
Outsourcing Louis P. Piergeti VP, IIROC March 29, 2011.
Privacy Codes of Conduct as a self- regulatory approach to cope with restrictions on transborder data flow Dr. Anja Miedbrodt Exemplified with the help.
What is UN Global Compact?
WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Identity and Privacy: the.
A Perspective: Data Flow Governance in Asia Pacific & APEC Framework Martin Abrams October 21, 2008.
By: Ada van Krimpen Director International Statistical Institute (ISI) 8 October 2014.
1 n June 2005European Commission KTC Seminar Seoul – 2 June 2004 The fight against counterfeiting and piracy: The fight against counterfeiting and piracy:
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
European Data Protection Supervisor Pharmaceutical Regulatory & Compliance Congress, Brussels, 7 June 2007 European Privacy and Data Protection Policy.
International Law- Facilitating Transboundary Water Cooperation By Patricia Wouters.
Technology Transfer, Technology Dumping Computer Freedom and Privacy Conference, Berkeley, April 20-23, 2004 Jagdish Parikh Human Rights Watch, New York.
Договор Россия-ЕС о партнерстве: является ли членство России в ВТО прорывом? Russia’s Accession to the WTO: is it a breakthrough Russia’s Accession to.
Укрепление доверия в киберпространстве Trust and Confidence in Cyberspace.
International Authors Forum IAF Mats Lindberg – BUS Visual Arts Collecting Society – Sweden
Malcolm Crompton APEC Information Privacy Framework: review, impact, & progress APEC Symposium on Information Privacy Protection in E Government & E Commerce.
Privacy: An International Perspective Marty Abrams August 18, 2008.
INTERNATIONAL ENVIRONMENTAL LAW
Implementation Checklist ─ 2007 Child Support Convention Maja Groff Senior Legal Officer Recovery of Child Support and Family Maintenance in Asia-Pacific.
1 PARCC Data Privacy & Security Policy December 2013.
Recovery of Child Support and Family Maintenance in Asia-Pacific and Worldwide: National and Regional Systems and the Hague 2007 Convention and Protocol.
Sophie Kwasny 16 June 2011 Seminar: New challenges in the protection of individuals’ privacy and personal data Reykjavik, 19 October 2012 The contribution.
1 Copyright © International Security, Trust & Privacy Alliance -All Rights Reserved Making Privacy Operational International Security, Trust.
Highlights and Challenges of the TUDCN work Bangkok, 3 rd 4 th and 5 th of December.
Katrine Evans: Current issues Key themes in enquiries and complaints “Privacy at work” Neil Sanson: Risk Data breach guidelines Data encryption Combining.
APEC Engineers Workshop Legal Considerations - Central Register Sept 2015 Angela Frawley, General Counsel.
APEC Privacy Framework “The lack of consumer trust and confidence in the privacy and security of online transactions and information networks is one element.
Towards an IoT Good Practice Workshop organized by the DC IoT on 12 November 2015, 09:00 – 10:30, Joao Pessoa.
1 Ethics of Computing MONT 113G, Spring 2012 Session 31 Privacy as a value.
Key Points for a Privacy Programme for Multinationals Steve Coope.
BUSINESS ETHICS.  Understand and explain what is meant by business ethics.  Understand the role or regulators and regulation. OBJECTIVES.
Convention 108 and the EU framework: Differing while Converging
Data Protection: EU & International
Enhancing employers’ involvement in Social Protection policy debates
Decrypting Data Compliance in China
Non-Financial Corporate Disclosure & CSR Reporting: Setting the Scenes
GDPR Readiness Project
Information Governance and Data Privacy: A World of Risk
Procurement Law in Indonesia Legal Context
Bob Siegel President Privacy Ref, Inc.
Consumer Privacy An Introduction
Protection of Personal Information Bill: An International Perspective
Employee Privacy and Privacy of Employee Information
Lesson 1  7 Basic Components of an Effective Compliance Plan
IAPP TRUSTe SYMPOSIUM 9-11 JUNE 2004
Effective BTWC Implementation: the Case of the Philippines
Professor at Kyung Hee Univ.
European Commission proposals for data protection
Protection of Privacy Online CAIGF2017-Dushanbe, Tajikistan
Presentation transcript:

Cyberspace Privacy Considerations Arthur Shay, Esq. Shay & Partners, Taipei, Taiwan February 25, 2008 Partnership towards IGF in Asia

What are we talking about? Understanding Privacy  Is it a reality in our life?  Does it stay without change?  Does it exist in the public space?

What are we talking about? Edison Chan’s photo file  It is not just personal data.  A cross-border issue applied with different legal and ethic standards.  Who owes you an apology?

 The UN’s roles in global privacy protection.  Influence of the EU Data Protection Directive (95/46/EC)  The APEC Privacy Framework What are the international influences?

APEC ’ s 9 Privacy Principles  Preventing harm  Notice  Collection limitation  Uses of personal information  Choice

APEC ’ s 9 Privacy Principles  Integrity of personal information  Security safeguards  Access and correction  Accountability (includes due diligence in transfers)

A Light-handed approach for implementation of global privacy protection?  Self-certification & binding corporate rules  Bilateral and multilateral enforcement cooperation