SlideShare a Scribd company logo
1 of 41
Information Privacy
Table of Contents
โ€ข   Introduction
โ€ข   Technical Implications
โ€ข   Impact and Rationales
โ€ข   Organizational View
โ€ข   Online Data Privacy
โ€ข   Information Security
โ€ข What is going on?
  โ€“ The User Data walls are coming down across
    services.
           ยป Simplification
           ยป Unification
           ยป Services are now features not products
What is Information Privacy???
โ€ข Simply putโ€ฆ

  โ€“ Information privacy is the relationship between
    collection and dissemination of:
     โ€ข    Data
     โ€ข   Technology
     โ€ข   The public expectation of privacy
     โ€ข   Legal and political issues surrounding them
What does privacy mean in society???
โ€ข Older Generation: Privacy is about secrecy.
โ€ข Younger Generation: Privacy is about control.

  People's relationship with privacy is socially
                  complicated
Identity
โ€ข Personally Identifiable Information (PII)
  โ€“ Name, IP Address, Face, Fingerprint, Genetic
    Information
โ€ข Non-Personally Identifiable Information
  โ€“ Behaviors on website
โ€ข Information privacy concern exists wherever
  those information is collected or stored in
  digital form or otherwise.
Four Primary Concerns

  โ€“ Collection: The very act of data collection. Legal or
    illegal.
  โ€“ Unauthorized secondary use
  โ€“ Improper access
  โ€“ Errors
Double-edged Sword

  โ€“ Used carefully under proper safeguards, increase
    public utility trough:
     โ€ข Each new service is backed by a database, and that
       database is vulnerable
     โ€ข Data makes services better
     โ€ข Free is Cheap
     โ€ข Shared data makes individual experiences better
  โ€“ Abuse can lead to invasion of information privacy.
Technical Implications
Information:
        Content Range
โ€ข   Healthcare records
โ€ข   Criminal justice investigations and proceedings
โ€ข   Financial institutions and transactions
โ€ข   Biological traits, such as genetic material
โ€ข   Residence and geographic records
โ€ข   Invisible Traces of our presence
    โ€“   Data trails
    โ€“   Credit Card Databases
    โ€“   Phone Company Databases
    โ€“   ISP Databases
    โ€“   Relationship Management Database
Web Data Collection
โ€ข Personal information-Profile
โ€ข Other information
  โ€“ Device information
  โ€“ Cookies
  โ€“ Log information
  โ€“ User communications
  โ€“ Location data
Devices/Tools
โ€ข Hardware
   โ€“   Security tokens :Physical access + PIN
   โ€“   Data Centers /Servers
   โ€“   Biometric Technology
   โ€“   Device Fingerprinting

โ€ข Software(Encryption)
   โ€“   GNU Privacy Guard (GPG)
   โ€“   Portable Firefox
   โ€“   Pretty Good Privacy (PGP)
   โ€“   Secure Shell (SSH)
   โ€“   I2P - The Anonymous Network
   โ€“   Tor (anonymity network)
General Cost Items for
                     Information Privacy Management
โ€ข   Government/Legal:
     โ€“ Bill C-30: Canadian governmentโ€™s invasive and warrantless online spying scheme $80 million
     โ€“ Privacy of bill of right in U.S.: cooperation of many different agencies over years

โ€ข   Company:
     โ€“   Data collection
     โ€“   Personnel Costs
     โ€“   Protect usersโ€™ data from outside hacking
     โ€“   Expertise to safeguard the service-remote storage service โ€œCloudโ€
     โ€“   โ€œDo not track barโ€ in to Browser: Google and Microsoft

โ€ข   Consumer:
     โ€“ Time to learn
     โ€“ Switch cost between different browser
           โ€ข   Limit the ability to correlate behavior
           โ€ข   Malicious criminal activity.



           All Costs Related to Scale
Impact & Rationales
Why Do Industries Invest?
โ€ข   Provides security for all users
โ€ข   Keeps information internal, not external
โ€ข   Helps protect against lawsuits
โ€ข   Heavy Investments from the
    Healthcare, Military and IT Industries.
Concerns for the Future
โ€ข What is considered โ€œprivateโ€ information
โ€ข How to make information more accessible
โ€ข How to evolve systems to prevent breaches
Facebook
โ€ข   Full Name
โ€ข   Birthday
โ€ข   Address
โ€ข   Photos
โ€ข   Education Locations
โ€ข   Family Members
How it applies country to country
โ€œNo one shall be subjected to arbitrary
interference with his privacy, family, home or
correspondence, nor to attacks upon his honor
and reputation. Everyone has the right to the
protection of the law against such interference
or attacks.โ€
โ€”Universal Declaration of Human Rights, Article
12
Laws by Countries
โ€ข US
  โ€“ HIPAA
  โ€“ Electronic Communications Privacy Act
  โ€“ PATROIT Act
  โ€“ The Childrenโ€™s Online Privacy Protection Act
  โ€“ โ€œSafe Harborโ€
โ€ข European Union
  โ€“ Data Protection Directive
  โ€“ European Data Protection Regulation
Organizational View
Who enforces the Health Insurance Portability
         and Accountability Act (HIPAA)?
โ€ข The Office of E-Health Standards and Services (OESS)
   โ€“ Transactions
   โ€“ Code Sets
   โ€“ National Identifiers (Employer and Provider identifiers)
     regulation




โ€ข Office for Civil Rights OCR
   โ€“ The HIPAA Privacy and Security Rules
HIPPA Secure Hosting for Protected
                Data
โ€ข HIPAA Compliance Data Center
  โ€“ Stores Protected Health Information (PHI)


โ€ข Security Measures
  โ€“   A Virtual or Dedicated Private Firewall Services
  โ€“   Advanced Encryption Standard
  โ€“   SSL Certificates & HTTPS
  โ€“   Remote VPN Access
  โ€“   Disaster Recovery
Information Privacy in Organizations
        Internal Implications
โ€ข Information Privacy is:
  โ€“ Associated with creative performance
  โ€“ Associated with psychological empowerment
  โ€“ Context specific




โ€ข Control initiatives may undermine employee:
     โ€ข Perceptions of fairness and privacy
Organizational Leadership
        C-level executives vs. IT Teams
โ€“ There is a measurable understanding gap
   โ€ข C-level executives focus on driving the business.
      โ€“ Long-Term view
   โ€ข IT team is thinking and deploying its resources to
     protect.
      โ€“ Near-term view
Business Priorities as Interpreted by IT
What Takes Priority with IT Teams?
Online Data Privacy
Consumer Data
โ€ข In 1996 E-commerce revenue in 1996: $600M
โ€ข In 2013 E-commerce revenue expected to
  reach 2013: $963B
Expectations
โ€ข Consumers should expect reasonable measures:
   โ€“ Technical
   โ€“ Physical
   โ€“ Administrative.




โ€ข Privacy Professionals in organizations handle compliance
  with privacy promises

โ€ข No such thing as Perfect Privacy, just acceptable levels
  of risk
Govt. Searching Standards
โ€ข Constitutional Standard
  โ€“ Preventing Unreasonable Search & Seizure
     โ€ข 4th Amendment protections
     โ€ข Applies to In-House โ€œData in the homeโ€


โ€ข Statutory Standard
  โ€“ Jurisprudence Define Legality
     โ€ข Warshack vs. USA
     โ€ข Applies Out-of-House โ€œCloud Dataโ€


โ€ข Privacy Act
  โ€“ Right to see records held about you
Federal Trade Commission
โ€ข Federal Trade Commission Principals
  1.   Notice/Awareness
  2.   Choice/Consent
  3.   Access/Participation
  4.   Integrity/Security
  5.   Enforcement/Redress
โ€ข Power of โ€œPrivacy Auditsโ€
Growth Outpacing Regulation
โ€ข The FTC 1st established guidelines in a 1998.




                    SELF-REGULATION IS ESTABLISHED
   โ€œThe commission believes that legislation to address online privacy is not
                         appropriate at this timeโ€


   Burden of Privacy Protection largely on the Website
                      User or You!
Information Security
Information Security (cont...)
โ€ข Corporate Policy
  โ€“ Processes/Policies are needed to encourage responsible information
    handling within organizations

  โ€“ Importance of security measures taken to
      ensure customer/employee privacy

  โ€“ Example policies:
      โ€ข Storing sensitive information on secure
      or disconnected servers
      โ€ข Requiring all employees to install
      antivirus or firewall software
Information Security (contโ€ฆ)
โ€ข International Standards
  โ€“ Generally Accepted Privacy Principles (GAPP)

  โ€“ ISO/IEC 27002
     โ€ข IS standard โ€“ best practice recommendations for those
       โ€œinitiating, implementing, or maintaining Information Security
       Management Systems (ISMS)
         โ€“   Risk Assessment
         โ€“   Security Policy
         โ€“   Asset Management
         โ€“   Physical/Environmental Security
         โ€“   Access Control
         โ€“   Etc.
Breach Cases
2011
โ€ข Sonyโ€™s PlayStation Network
    โ€“ Size: 101 million user accounts
    โ€“ Type of Data: name, home and e-mail addresses, login credentials, some credit
      card information
    โ€“ Consequence: Identity theft, class-action law-suits

โ€ข Epsilon, Alliance Data Systems
    โ€“ Size: Unknown; 60 million estimated e-mail addresses
    โ€“ Type of Data: e-mail addresses, some names
    โ€“ Consequence: Exposed confidential customer lists, loss of business
Breach Cases (Contโ€ฆ)
2011
โ€ข University of South Carolina
   โ€“ Size: 31,000
   โ€“ Type of Data: names, addresses, health records, financial data, Social
     Security numbers
   โ€“ Consequence: Identity theft, loss of business

โ€ข RSA Security
   โ€“ Size: Unknown
   โ€“ Type of Data: "information related to SecurID technologyโ€œ
   โ€“ Consequence: Compromised enterprises and govt. agencies that rely on
     SecurID security technology
Lessons Learned


โ€ข Need to have IS policies, procedures, and technologies in place
  to prevent and deal with Information Privacy issues

โ€ข Negligence in IS and maintaining PII can have damaging
  effects on the customer and employee relationship
Relationship Management Benefits of
               IS and IP
โ€ข Increased usage of online services by existing customers and
  increased number of new customers due to:
   โ€“ Fulfillment of the need for privacy of customers (Some customers may
     only use the service if their privacy needs are fulfilled, other may use
     the service more often.)

   โ€“ Increased public image and trust (especially if the privacy friendly
     attitude is advertised)

   โ€“ Competitive advantage (if the competition doesn't have a similar offer)

   โ€“ Increased customer retention (Customers appreciate the privacy
     enhancing functions of the service and don't like the idea of not finding
     them with competing services.)
Questions?

More Related Content

What's hot

Information classification
Information classificationInformation classification
Information classificationJyothsna Sridhar
ย 
Data protection
Data protectionData protection
Data protectionLewis Silkin
ย 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippinesian_oguis
ย 
Information Assurance And Security - Chapter 2 - Lesson 1
Information Assurance And Security - Chapter 2 - Lesson 1Information Assurance And Security - Chapter 2 - Lesson 1
Information Assurance And Security - Chapter 2 - Lesson 1MLG College of Learning, Inc
ย 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal informationUc Man
ย 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentationmlw32785
ย 
Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1MLG College of Learning, Inc
ย 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologiessidra batool
ย 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays worldSibghatullah Khattak
ย 
โ€œPrivacy Todayโ€ Slide Presentation
โ€œPrivacy Todayโ€ Slide Presentation โ€œPrivacy Todayโ€ Slide Presentation
โ€œPrivacy Todayโ€ Slide Presentation tomasztopa
ย 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacyvinyas87
ย 
Professional Ethics of IT
Professional Ethics of ITProfessional Ethics of IT
Professional Ethics of ITMaria Stella Solon
ย 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
ย 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptxGulnurAzat
ย 
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptxMarvenParay
ย 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal lawZaheer Irshad
ย 
Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2MLG College of Learning, Inc
ย 
Chapter 1 powerpoint
Chapter 1 powerpointChapter 1 powerpoint
Chapter 1 powerpointstanbridge
ย 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Actmrmwood
ย 

What's hot (20)

Information classification
Information classificationInformation classification
Information classification
ย 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
ย 
Data protection
Data protectionData protection
Data protection
ย 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
ย 
Information Assurance And Security - Chapter 2 - Lesson 1
Information Assurance And Security - Chapter 2 - Lesson 1Information Assurance And Security - Chapter 2 - Lesson 1
Information Assurance And Security - Chapter 2 - Lesson 1
ย 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
ย 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
ย 
Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1
ย 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
ย 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
ย 
โ€œPrivacy Todayโ€ Slide Presentation
โ€œPrivacy Todayโ€ Slide Presentation โ€œPrivacy Todayโ€ Slide Presentation
โ€œPrivacy Todayโ€ Slide Presentation
ย 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
ย 
Professional Ethics of IT
Professional Ethics of ITProfessional Ethics of IT
Professional Ethics of IT
ย 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
ย 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptx
ย 
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
ย 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
ย 
Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2
ย 
Chapter 1 powerpoint
Chapter 1 powerpointChapter 1 powerpoint
Chapter 1 powerpoint
ย 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
ย 

Similar to Presentation on Information Privacy

74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16Glenn E. Davis
ย 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11pdewitte
ย 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a bytelgcdcpas
ย 
2011 hildebrandt institute cio forum data privacy and security presentation...
2011 hildebrandt institute cio forum   data privacy and security presentation...2011 hildebrandt institute cio forum   data privacy and security presentation...
2011 hildebrandt institute cio forum data privacy and security presentation...David Cunningham
ย 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfSecureCurve
ย 
DPA seminar presentation
DPA seminar presentationDPA seminar presentation
DPA seminar presentationRodonoghue72
ย 
Ethics and Politics of Big Data
Ethics and Politics of Big DataEthics and Politics of Big Data
Ethics and Politics of Big Datarobkitchin
ย 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation Technology Society Nepal
ย 
005. Ethics, Privacy and Security
005. Ethics, Privacy and Security005. Ethics, Privacy and Security
005. Ethics, Privacy and SecurityArianto Muditomo
ย 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingRebecca Leitch
ย 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingSecurity Innovation
ย 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...Financial Poise
ย 
Kevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram
ย 
Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOAPeter Henley
ย 
Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Asad Zaman
ย 
Session4807.ppt
Session4807.pptSession4807.ppt
Session4807.ppttalkaton
ย 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible DataTom Walker
ย 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...Cengage Learning
ย 
CBC GDPR The Physics
CBC GDPR The PhysicsCBC GDPR The Physics
CBC GDPR The PhysicsJason Chapman
ย 

Similar to Presentation on Information Privacy (20)

74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16
ย 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
ย 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a byte
ย 
2011 hildebrandt institute cio forum data privacy and security presentation...
2011 hildebrandt institute cio forum   data privacy and security presentation...2011 hildebrandt institute cio forum   data privacy and security presentation...
2011 hildebrandt institute cio forum data privacy and security presentation...
ย 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
ย 
DPA seminar presentation
DPA seminar presentationDPA seminar presentation
DPA seminar presentation
ย 
Ethics and Politics of Big Data
Ethics and Politics of Big DataEthics and Politics of Big Data
Ethics and Politics of Big Data
ย 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
ย 
005. Ethics, Privacy and Security
005. Ethics, Privacy and Security005. Ethics, Privacy and Security
005. Ethics, Privacy and Security
ย 
Chapter 3
Chapter 3Chapter 3
Chapter 3
ย 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be Telling
ย 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be Telling
ย 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
ย 
Kevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram Security Summit
Kevin Wharram Security Summit
ย 
Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOA
ย 
Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1
ย 
Session4807.ppt
Session4807.pptSession4807.ppt
Session4807.ppt
ย 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible Data
ย 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
ย 
CBC GDPR The Physics
CBC GDPR The PhysicsCBC GDPR The Physics
CBC GDPR The Physics
ย 

Recently uploaded

CHEAP Call Girls in Malviya Nagar, (-DELHI )๐Ÿ” 9953056974๐Ÿ”(=)/CALL GIRLS SERVICE
CHEAP Call Girls in  Malviya Nagar, (-DELHI )๐Ÿ” 9953056974๐Ÿ”(=)/CALL GIRLS SERVICECHEAP Call Girls in  Malviya Nagar, (-DELHI )๐Ÿ” 9953056974๐Ÿ”(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Malviya Nagar, (-DELHI )๐Ÿ” 9953056974๐Ÿ”(=)/CALL GIRLS SERVICE9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
Model Call Girls In Pazhavanthangal WhatsApp Booking 7427069034 call girl ser...
Model Call Girls In Pazhavanthangal WhatsApp Booking 7427069034 call girl ser...Model Call Girls In Pazhavanthangal WhatsApp Booking 7427069034 call girl ser...
Model Call Girls In Pazhavanthangal WhatsApp Booking 7427069034 call girl ser... Shivani Pandey
ย 
Model Call Girls In Ariyalur WhatsApp Booking 7427069034 call girl service 24...
Model Call Girls In Ariyalur WhatsApp Booking 7427069034 call girl service 24...Model Call Girls In Ariyalur WhatsApp Booking 7427069034 call girl service 24...
Model Call Girls In Ariyalur WhatsApp Booking 7427069034 call girl service 24... Shivani Pandey
ย 
Dum Dum ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi Ready...
Dum Dum ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi Ready...Dum Dum ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi Ready...
Dum Dum ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi Ready...ritikasharma
ย 
๐“€คCall On 6297143586 ๐“€ค Ultadanga Call Girls In All Kolkata 24/7 Provide Call W...
๐“€คCall On 6297143586 ๐“€ค Ultadanga Call Girls In All Kolkata 24/7 Provide Call W...๐“€คCall On 6297143586 ๐“€ค Ultadanga Call Girls In All Kolkata 24/7 Provide Call W...
๐“€คCall On 6297143586 ๐“€ค Ultadanga Call Girls In All Kolkata 24/7 Provide Call W...rahim quresi
ย 
Navsari Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girl...
Navsari Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girl...Navsari Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girl...
Navsari Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girl...mriyagarg453
ย 
Book Sex Workers Available Kolkata Call Girls Service Airport Kolkata โœ” 62971...
Book Sex Workers Available Kolkata Call Girls Service Airport Kolkata โœ” 62971...Book Sex Workers Available Kolkata Call Girls Service Airport Kolkata โœ” 62971...
Book Sex Workers Available Kolkata Call Girls Service Airport Kolkata โœ” 62971...ritikasharma
ย 
Verified Trusted Call Girls Singaperumal Koil Chennai โœ”โœ”7427069034 Independe...
Verified Trusted Call Girls Singaperumal Koil Chennai โœ”โœ”7427069034  Independe...Verified Trusted Call Girls Singaperumal Koil Chennai โœ”โœ”7427069034  Independe...
Verified Trusted Call Girls Singaperumal Koil Chennai โœ”โœ”7427069034 Independe... Shivani Pandey
ย 
Sonagachi ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi Rea...
Sonagachi ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi Rea...Sonagachi ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi Rea...
Sonagachi ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi Rea...rahim quresi
ย 
Jodhpur Park ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi ...
Jodhpur Park ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi ...Jodhpur Park ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi ...
Jodhpur Park ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi ...ritikasharma
ย 
Top Rated Pune Call Girls Dhayari โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls Dhayari โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls Dhayari โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls Dhayari โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Ser...Call Girls in Nagpur High Profile
ย 
Top Rated Kolkata Call Girls Dum Dum โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex S...
Top Rated Kolkata Call Girls Dum Dum โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex S...Top Rated Kolkata Call Girls Dum Dum โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex S...
Top Rated Kolkata Call Girls Dum Dum โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex S...ritikasharma
ย 
VIP Model Call Girls Koregaon Park ( Pune ) Call ON 8005736733 Starting From ...
VIP Model Call Girls Koregaon Park ( Pune ) Call ON 8005736733 Starting From ...VIP Model Call Girls Koregaon Park ( Pune ) Call ON 8005736733 Starting From ...
VIP Model Call Girls Koregaon Park ( Pune ) Call ON 8005736733 Starting From ...SUHANI PANDEY
ย 
Hotel And Home Service Available Kolkata Call Girls Sonagachi โœ” 6297143586 โœ”C...
Hotel And Home Service Available Kolkata Call Girls Sonagachi โœ” 6297143586 โœ”C...Hotel And Home Service Available Kolkata Call Girls Sonagachi โœ” 6297143586 โœ”C...
Hotel And Home Service Available Kolkata Call Girls Sonagachi โœ” 6297143586 โœ”C...ritikasharma
ย 
Verified Trusted Call Girls Tambaram Chennai โœ”โœ”7427069034 Independent Chenna...
Verified Trusted Call Girls Tambaram Chennai โœ”โœ”7427069034  Independent Chenna...Verified Trusted Call Girls Tambaram Chennai โœ”โœ”7427069034  Independent Chenna...
Verified Trusted Call Girls Tambaram Chennai โœ”โœ”7427069034 Independent Chenna... Shivani Pandey
ย 
๐Ÿ“ž Contact Number 8617697112 VIP East Sikkim Call Girls
๐Ÿ“ž Contact Number 8617697112 VIP East Sikkim Call Girls๐Ÿ“ž Contact Number 8617697112 VIP East Sikkim Call Girls
๐Ÿ“ž Contact Number 8617697112 VIP East Sikkim Call GirlsNitya salvi
ย 
College Call Girls Pune 8617697112 Short 1500 Night 6000 Best call girls Service
College Call Girls Pune 8617697112 Short 1500 Night 6000 Best call girls ServiceCollege Call Girls Pune 8617697112 Short 1500 Night 6000 Best call girls Service
College Call Girls Pune 8617697112 Short 1500 Night 6000 Best call girls ServiceNitya salvi
ย 
Borum Call Girls Service โ˜Ž ๏ธ93326-06886 โค๏ธโ€๐Ÿ”ฅ Enjoy 24/7 Escortย Service
Borum Call Girls Service โ˜Ž ๏ธ93326-06886 โค๏ธโ€๐Ÿ”ฅ Enjoy 24/7 Escortย ServiceBorum Call Girls Service โ˜Ž ๏ธ93326-06886 โค๏ธโ€๐Ÿ”ฅ Enjoy 24/7 Escortย Service
Borum Call Girls Service โ˜Ž ๏ธ93326-06886 โค๏ธโ€๐Ÿ”ฅ Enjoy 24/7 Escortย ServiceDamini Dixit
ย 
โคPersonal Whatsapp Number Keylong Call Girls 8617697112 ๐Ÿ’ฆโœ….
โคPersonal Whatsapp Number Keylong Call Girls 8617697112 ๐Ÿ’ฆโœ….โคPersonal Whatsapp Number Keylong Call Girls 8617697112 ๐Ÿ’ฆโœ….
โคPersonal Whatsapp Number Keylong Call Girls 8617697112 ๐Ÿ’ฆโœ….Nitya salvi
ย 
Behala ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi Ready ...
Behala ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi Ready ...Behala ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi Ready ...
Behala ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi Ready ...ritikasharma
ย 

Recently uploaded (20)

CHEAP Call Girls in Malviya Nagar, (-DELHI )๐Ÿ” 9953056974๐Ÿ”(=)/CALL GIRLS SERVICE
CHEAP Call Girls in  Malviya Nagar, (-DELHI )๐Ÿ” 9953056974๐Ÿ”(=)/CALL GIRLS SERVICECHEAP Call Girls in  Malviya Nagar, (-DELHI )๐Ÿ” 9953056974๐Ÿ”(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Malviya Nagar, (-DELHI )๐Ÿ” 9953056974๐Ÿ”(=)/CALL GIRLS SERVICE
ย 
Model Call Girls In Pazhavanthangal WhatsApp Booking 7427069034 call girl ser...
Model Call Girls In Pazhavanthangal WhatsApp Booking 7427069034 call girl ser...Model Call Girls In Pazhavanthangal WhatsApp Booking 7427069034 call girl ser...
Model Call Girls In Pazhavanthangal WhatsApp Booking 7427069034 call girl ser...
ย 
Model Call Girls In Ariyalur WhatsApp Booking 7427069034 call girl service 24...
Model Call Girls In Ariyalur WhatsApp Booking 7427069034 call girl service 24...Model Call Girls In Ariyalur WhatsApp Booking 7427069034 call girl service 24...
Model Call Girls In Ariyalur WhatsApp Booking 7427069034 call girl service 24...
ย 
Dum Dum ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi Ready...
Dum Dum ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi Ready...Dum Dum ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi Ready...
Dum Dum ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi Ready...
ย 
๐“€คCall On 6297143586 ๐“€ค Ultadanga Call Girls In All Kolkata 24/7 Provide Call W...
๐“€คCall On 6297143586 ๐“€ค Ultadanga Call Girls In All Kolkata 24/7 Provide Call W...๐“€คCall On 6297143586 ๐“€ค Ultadanga Call Girls In All Kolkata 24/7 Provide Call W...
๐“€คCall On 6297143586 ๐“€ค Ultadanga Call Girls In All Kolkata 24/7 Provide Call W...
ย 
Navsari Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girl...
Navsari Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girl...Navsari Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girl...
Navsari Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girl...
ย 
Book Sex Workers Available Kolkata Call Girls Service Airport Kolkata โœ” 62971...
Book Sex Workers Available Kolkata Call Girls Service Airport Kolkata โœ” 62971...Book Sex Workers Available Kolkata Call Girls Service Airport Kolkata โœ” 62971...
Book Sex Workers Available Kolkata Call Girls Service Airport Kolkata โœ” 62971...
ย 
Verified Trusted Call Girls Singaperumal Koil Chennai โœ”โœ”7427069034 Independe...
Verified Trusted Call Girls Singaperumal Koil Chennai โœ”โœ”7427069034  Independe...Verified Trusted Call Girls Singaperumal Koil Chennai โœ”โœ”7427069034  Independe...
Verified Trusted Call Girls Singaperumal Koil Chennai โœ”โœ”7427069034 Independe...
ย 
Sonagachi ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi Rea...
Sonagachi ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi Rea...Sonagachi ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi Rea...
Sonagachi ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi Rea...
ย 
Jodhpur Park ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi ...
Jodhpur Park ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi ...Jodhpur Park ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi ...
Jodhpur Park ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi ...
ย 
Top Rated Pune Call Girls Dhayari โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls Dhayari โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls Dhayari โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls Dhayari โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Ser...
ย 
Top Rated Kolkata Call Girls Dum Dum โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex S...
Top Rated Kolkata Call Girls Dum Dum โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex S...Top Rated Kolkata Call Girls Dum Dum โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex S...
Top Rated Kolkata Call Girls Dum Dum โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex S...
ย 
VIP Model Call Girls Koregaon Park ( Pune ) Call ON 8005736733 Starting From ...
VIP Model Call Girls Koregaon Park ( Pune ) Call ON 8005736733 Starting From ...VIP Model Call Girls Koregaon Park ( Pune ) Call ON 8005736733 Starting From ...
VIP Model Call Girls Koregaon Park ( Pune ) Call ON 8005736733 Starting From ...
ย 
Hotel And Home Service Available Kolkata Call Girls Sonagachi โœ” 6297143586 โœ”C...
Hotel And Home Service Available Kolkata Call Girls Sonagachi โœ” 6297143586 โœ”C...Hotel And Home Service Available Kolkata Call Girls Sonagachi โœ” 6297143586 โœ”C...
Hotel And Home Service Available Kolkata Call Girls Sonagachi โœ” 6297143586 โœ”C...
ย 
Verified Trusted Call Girls Tambaram Chennai โœ”โœ”7427069034 Independent Chenna...
Verified Trusted Call Girls Tambaram Chennai โœ”โœ”7427069034  Independent Chenna...Verified Trusted Call Girls Tambaram Chennai โœ”โœ”7427069034  Independent Chenna...
Verified Trusted Call Girls Tambaram Chennai โœ”โœ”7427069034 Independent Chenna...
ย 
๐Ÿ“ž Contact Number 8617697112 VIP East Sikkim Call Girls
๐Ÿ“ž Contact Number 8617697112 VIP East Sikkim Call Girls๐Ÿ“ž Contact Number 8617697112 VIP East Sikkim Call Girls
๐Ÿ“ž Contact Number 8617697112 VIP East Sikkim Call Girls
ย 
College Call Girls Pune 8617697112 Short 1500 Night 6000 Best call girls Service
College Call Girls Pune 8617697112 Short 1500 Night 6000 Best call girls ServiceCollege Call Girls Pune 8617697112 Short 1500 Night 6000 Best call girls Service
College Call Girls Pune 8617697112 Short 1500 Night 6000 Best call girls Service
ย 
Borum Call Girls Service โ˜Ž ๏ธ93326-06886 โค๏ธโ€๐Ÿ”ฅ Enjoy 24/7 Escortย Service
Borum Call Girls Service โ˜Ž ๏ธ93326-06886 โค๏ธโ€๐Ÿ”ฅ Enjoy 24/7 Escortย ServiceBorum Call Girls Service โ˜Ž ๏ธ93326-06886 โค๏ธโ€๐Ÿ”ฅ Enjoy 24/7 Escortย Service
Borum Call Girls Service โ˜Ž ๏ธ93326-06886 โค๏ธโ€๐Ÿ”ฅ Enjoy 24/7 Escortย Service
ย 
โคPersonal Whatsapp Number Keylong Call Girls 8617697112 ๐Ÿ’ฆโœ….
โคPersonal Whatsapp Number Keylong Call Girls 8617697112 ๐Ÿ’ฆโœ….โคPersonal Whatsapp Number Keylong Call Girls 8617697112 ๐Ÿ’ฆโœ….
โคPersonal Whatsapp Number Keylong Call Girls 8617697112 ๐Ÿ’ฆโœ….
ย 
Behala ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi Ready ...
Behala ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi Ready ...Behala ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi Ready ...
Behala ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi Ready ...
ย 

Presentation on Information Privacy

  • 2. Table of Contents โ€ข Introduction โ€ข Technical Implications โ€ข Impact and Rationales โ€ข Organizational View โ€ข Online Data Privacy โ€ข Information Security
  • 3. โ€ข What is going on? โ€“ The User Data walls are coming down across services. ยป Simplification ยป Unification ยป Services are now features not products
  • 4. What is Information Privacy???
  • 5. โ€ข Simply putโ€ฆ โ€“ Information privacy is the relationship between collection and dissemination of: โ€ข Data โ€ข Technology โ€ข The public expectation of privacy โ€ข Legal and political issues surrounding them
  • 6. What does privacy mean in society??? โ€ข Older Generation: Privacy is about secrecy. โ€ข Younger Generation: Privacy is about control. People's relationship with privacy is socially complicated
  • 7. Identity โ€ข Personally Identifiable Information (PII) โ€“ Name, IP Address, Face, Fingerprint, Genetic Information โ€ข Non-Personally Identifiable Information โ€“ Behaviors on website โ€ข Information privacy concern exists wherever those information is collected or stored in digital form or otherwise.
  • 8. Four Primary Concerns โ€“ Collection: The very act of data collection. Legal or illegal. โ€“ Unauthorized secondary use โ€“ Improper access โ€“ Errors
  • 9. Double-edged Sword โ€“ Used carefully under proper safeguards, increase public utility trough: โ€ข Each new service is backed by a database, and that database is vulnerable โ€ข Data makes services better โ€ข Free is Cheap โ€ข Shared data makes individual experiences better โ€“ Abuse can lead to invasion of information privacy.
  • 11. Information: Content Range โ€ข Healthcare records โ€ข Criminal justice investigations and proceedings โ€ข Financial institutions and transactions โ€ข Biological traits, such as genetic material โ€ข Residence and geographic records โ€ข Invisible Traces of our presence โ€“ Data trails โ€“ Credit Card Databases โ€“ Phone Company Databases โ€“ ISP Databases โ€“ Relationship Management Database
  • 12. Web Data Collection โ€ข Personal information-Profile โ€ข Other information โ€“ Device information โ€“ Cookies โ€“ Log information โ€“ User communications โ€“ Location data
  • 13. Devices/Tools โ€ข Hardware โ€“ Security tokens :Physical access + PIN โ€“ Data Centers /Servers โ€“ Biometric Technology โ€“ Device Fingerprinting โ€ข Software(Encryption) โ€“ GNU Privacy Guard (GPG) โ€“ Portable Firefox โ€“ Pretty Good Privacy (PGP) โ€“ Secure Shell (SSH) โ€“ I2P - The Anonymous Network โ€“ Tor (anonymity network)
  • 14. General Cost Items for Information Privacy Management โ€ข Government/Legal: โ€“ Bill C-30: Canadian governmentโ€™s invasive and warrantless online spying scheme $80 million โ€“ Privacy of bill of right in U.S.: cooperation of many different agencies over years โ€ข Company: โ€“ Data collection โ€“ Personnel Costs โ€“ Protect usersโ€™ data from outside hacking โ€“ Expertise to safeguard the service-remote storage service โ€œCloudโ€ โ€“ โ€œDo not track barโ€ in to Browser: Google and Microsoft โ€ข Consumer: โ€“ Time to learn โ€“ Switch cost between different browser โ€ข Limit the ability to correlate behavior โ€ข Malicious criminal activity. All Costs Related to Scale
  • 16. Why Do Industries Invest? โ€ข Provides security for all users โ€ข Keeps information internal, not external โ€ข Helps protect against lawsuits โ€ข Heavy Investments from the Healthcare, Military and IT Industries.
  • 17. Concerns for the Future โ€ข What is considered โ€œprivateโ€ information โ€ข How to make information more accessible โ€ข How to evolve systems to prevent breaches
  • 18. Facebook โ€ข Full Name โ€ข Birthday โ€ข Address โ€ข Photos โ€ข Education Locations โ€ข Family Members
  • 19. How it applies country to country โ€œNo one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honor and reputation. Everyone has the right to the protection of the law against such interference or attacks.โ€ โ€”Universal Declaration of Human Rights, Article 12
  • 20. Laws by Countries โ€ข US โ€“ HIPAA โ€“ Electronic Communications Privacy Act โ€“ PATROIT Act โ€“ The Childrenโ€™s Online Privacy Protection Act โ€“ โ€œSafe Harborโ€ โ€ข European Union โ€“ Data Protection Directive โ€“ European Data Protection Regulation
  • 22. Who enforces the Health Insurance Portability and Accountability Act (HIPAA)? โ€ข The Office of E-Health Standards and Services (OESS) โ€“ Transactions โ€“ Code Sets โ€“ National Identifiers (Employer and Provider identifiers) regulation โ€ข Office for Civil Rights OCR โ€“ The HIPAA Privacy and Security Rules
  • 23. HIPPA Secure Hosting for Protected Data โ€ข HIPAA Compliance Data Center โ€“ Stores Protected Health Information (PHI) โ€ข Security Measures โ€“ A Virtual or Dedicated Private Firewall Services โ€“ Advanced Encryption Standard โ€“ SSL Certificates & HTTPS โ€“ Remote VPN Access โ€“ Disaster Recovery
  • 24. Information Privacy in Organizations Internal Implications โ€ข Information Privacy is: โ€“ Associated with creative performance โ€“ Associated with psychological empowerment โ€“ Context specific โ€ข Control initiatives may undermine employee: โ€ข Perceptions of fairness and privacy
  • 25. Organizational Leadership C-level executives vs. IT Teams โ€“ There is a measurable understanding gap โ€ข C-level executives focus on driving the business. โ€“ Long-Term view โ€ข IT team is thinking and deploying its resources to protect. โ€“ Near-term view
  • 26. Business Priorities as Interpreted by IT
  • 27. What Takes Priority with IT Teams?
  • 29. Consumer Data โ€ข In 1996 E-commerce revenue in 1996: $600M โ€ข In 2013 E-commerce revenue expected to reach 2013: $963B
  • 30. Expectations โ€ข Consumers should expect reasonable measures: โ€“ Technical โ€“ Physical โ€“ Administrative. โ€ข Privacy Professionals in organizations handle compliance with privacy promises โ€ข No such thing as Perfect Privacy, just acceptable levels of risk
  • 31. Govt. Searching Standards โ€ข Constitutional Standard โ€“ Preventing Unreasonable Search & Seizure โ€ข 4th Amendment protections โ€ข Applies to In-House โ€œData in the homeโ€ โ€ข Statutory Standard โ€“ Jurisprudence Define Legality โ€ข Warshack vs. USA โ€ข Applies Out-of-House โ€œCloud Dataโ€ โ€ข Privacy Act โ€“ Right to see records held about you
  • 32. Federal Trade Commission โ€ข Federal Trade Commission Principals 1. Notice/Awareness 2. Choice/Consent 3. Access/Participation 4. Integrity/Security 5. Enforcement/Redress โ€ข Power of โ€œPrivacy Auditsโ€
  • 33. Growth Outpacing Regulation โ€ข The FTC 1st established guidelines in a 1998. SELF-REGULATION IS ESTABLISHED โ€œThe commission believes that legislation to address online privacy is not appropriate at this timeโ€ Burden of Privacy Protection largely on the Website User or You!
  • 35. Information Security (cont...) โ€ข Corporate Policy โ€“ Processes/Policies are needed to encourage responsible information handling within organizations โ€“ Importance of security measures taken to ensure customer/employee privacy โ€“ Example policies: โ€ข Storing sensitive information on secure or disconnected servers โ€ข Requiring all employees to install antivirus or firewall software
  • 36. Information Security (contโ€ฆ) โ€ข International Standards โ€“ Generally Accepted Privacy Principles (GAPP) โ€“ ISO/IEC 27002 โ€ข IS standard โ€“ best practice recommendations for those โ€œinitiating, implementing, or maintaining Information Security Management Systems (ISMS) โ€“ Risk Assessment โ€“ Security Policy โ€“ Asset Management โ€“ Physical/Environmental Security โ€“ Access Control โ€“ Etc.
  • 37. Breach Cases 2011 โ€ข Sonyโ€™s PlayStation Network โ€“ Size: 101 million user accounts โ€“ Type of Data: name, home and e-mail addresses, login credentials, some credit card information โ€“ Consequence: Identity theft, class-action law-suits โ€ข Epsilon, Alliance Data Systems โ€“ Size: Unknown; 60 million estimated e-mail addresses โ€“ Type of Data: e-mail addresses, some names โ€“ Consequence: Exposed confidential customer lists, loss of business
  • 38. Breach Cases (Contโ€ฆ) 2011 โ€ข University of South Carolina โ€“ Size: 31,000 โ€“ Type of Data: names, addresses, health records, financial data, Social Security numbers โ€“ Consequence: Identity theft, loss of business โ€ข RSA Security โ€“ Size: Unknown โ€“ Type of Data: "information related to SecurID technologyโ€œ โ€“ Consequence: Compromised enterprises and govt. agencies that rely on SecurID security technology
  • 39. Lessons Learned โ€ข Need to have IS policies, procedures, and technologies in place to prevent and deal with Information Privacy issues โ€ข Negligence in IS and maintaining PII can have damaging effects on the customer and employee relationship
  • 40. Relationship Management Benefits of IS and IP โ€ข Increased usage of online services by existing customers and increased number of new customers due to: โ€“ Fulfillment of the need for privacy of customers (Some customers may only use the service if their privacy needs are fulfilled, other may use the service more often.) โ€“ Increased public image and trust (especially if the privacy friendly attitude is advertised) โ€“ Competitive advantage (if the competition doesn't have a similar offer) โ€“ Increased customer retention (Customers appreciate the privacy enhancing functions of the service and don't like the idea of not finding them with competing services.)

Editor's Notes

  1. Google will combine user data from service like YouTube, Gmail and Google Search and create a single merged profile for each user of its service. A way to attract more users? Effective on Mar 1st, 201270 policies into one
  2. Just say it is viewed differently under different contexts and is hard to define.. Computational, Content, and Structural Viewsโ€ฆ Next slide
  3. ย In other words, the only reason privacy exists in the first place is because it was too much trouble for anyone to bother monitoring everything they would otherwise want to. Thereโ€™s no innate right to privacy, itโ€™s just that no one could be arsed to deprive you of it. Setting aside myย understanding of economics, this was a relatively jarring perspective for me (Iโ€™m a lot more accustomed to hearing privacy described as a right) and it gave me pause for thought.
  4. Free is Cheap: Data collection makes services free due to Add Revenue and this is a Plus for end users.Talk about why abuse is bad for the public utility
  5. Important content informations
  6. Compare more FB and Google with Infogrphic
  7. protected health information (PHI)ย are now stored and hosted online in accordance to HIPAA hosting standards
  8. The survey of 718 IT and IT security practitioners in the United Statesโ€”more than half of whom report directly to the CIOโ€”determined that the number one reason senior management funded data protection efforts was โ€œthe need to comply with regulations, laws, and other mandatesโ€ followed closely by โ€œresponse to a recent data breachโ€ (a response likely necessitated by a regulation). At the very bottom of the justification list is โ€œprotect the companyโ€™s good reputation.โ€http://www.datacenterjournal.com/it/business-first-thinking-for-it-security/
  9. ย Here, ITโ€™s top answer is intellectual property (IP). Customer, employee and consumer information (PII) occupy the bottom of the list.
  10. Viacom vs. Google
  11. Constitutional Standard:requires search warrant/ and โ€œprobable causeโ€.Statutory Standard: Police only need a court orderWarshackvs USA: First Case to attempt to establish constitutional protections for ISPPrivacy Act: Right to see rteccords from federal governemrnt