SlideShare a Scribd company logo
1 of 13
Preventing crimes related to
Personal Data
Steve Falk
President, Prime Data
Why do I know anything
about personal data
issues?
20 years of building businesses that provide
data-driven marketing services
Personal Data
in life and business
● carrying a cell phone, passwords, bank
cards, USB drives, etc
● at work - employee data, mailing lists,
email lists, spreadsheets, cloud-based
apps and software, tablets and wireless
access, mobile device access, paper
docs, passwords
What is personal data?
● it can be a spreadsheet with client names
● it could be a printout of that sheet
● it could be copies of invoices or reports
● it does not have to have VISA or SIN
● it could contain list of recent purchases, birth
dates, moved address information
● side note on US personal data - much richer
A real life example:
what can happen?
Elections Canada - USB sticks lost
2 jobs lost
Small biz concerns
● dentist
● health clinic
● chiropractor
● VISA numbers at auto repair
● email lists to clients
● lists of donors at a charity
Everything’s in Beta
● protecting technology security, legal
compliance, workplace issues,
● individual responsibility
● from paper based to cloud-based storage
● understanding security and privacy is a
moving target. Just as you understand it,
new information and threats develop
● even bill C51 for anti-terrorism touches on it
The Privacy Commissioner
● PIPEDA (personal information and electronic
documents act)
● An online FREE online Assessment
● #OPC (Tweets from the Commision)
● reporting a breach - Organization
● filing a complaint - an individual
Personal Data - leaks, breaches, loss
Sometimes it is malicious and other times its
just carelessness or misunderstanding
● securely shred paper documents (by
photocopier, for instance)
● transport data securely - ftp, DROPBOX,
encrypted
● firewalls at a business help deter breaches
Careful with your email - CASL
Canadian Anti-Spam Legislation
$1,000,000 fine to CompuFinder - unsolicited email
Takeaways
● understand the potential damage to your
organization if there is a breach
● Train staff and continually reinforce security
practices
● you must report loss of personal data if you
are an organization (Privacy Commissioner)
● Take the FREE Privacy Commissioner
business assessment
● password protect your cell phone
● don’t use one pwd for everything
● don’t save personal information on USB
sticks and transport them unsecurely
● use updated browsers, malware software
and virus protection software
● securely destroy hard drives on computers,
phones (certificates or destruction avail)
thank you

More Related Content

What's hot

Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
Barry Caplin
 

What's hot (8)

Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
 
Health Data Encryption: The Seven Principals of Privacy
Health Data Encryption: The Seven Principals of PrivacyHealth Data Encryption: The Seven Principals of Privacy
Health Data Encryption: The Seven Principals of Privacy
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
 
Embracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG SecurityEmbracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG Security
 
Data Protection Presentation
Data Protection PresentationData Protection Presentation
Data Protection Presentation
 
brian resume 2
brian resume 2brian resume 2
brian resume 2
 
Chapter4 issues with ict2016
Chapter4 issues with ict2016Chapter4 issues with ict2016
Chapter4 issues with ict2016
 
Harshit security
Harshit securityHarshit security
Harshit security
 

Viewers also liked

XLIFF2_forTC37SC5
XLIFF2_forTC37SC5XLIFF2_forTC37SC5
XLIFF2_forTC37SC5
David Filip
 
Endorphin. Making sense of social data
Endorphin. Making sense of social dataEndorphin. Making sense of social data
Endorphin. Making sense of social data
Artem Zavyalov
 
Building Healthier Communities via Mobile || Social Cops
Building Healthier Communities via Mobile || Social CopsBuilding Healthier Communities via Mobile || Social Cops
Building Healthier Communities via Mobile || Social Cops
Vikas Plakkot
 

Viewers also liked (19)

Crown eco capital management/Renewable Energy: The Vision And A Dose Of Reali...
Crown eco capital management/Renewable Energy: The Vision And A Dose Of Reali...Crown eco capital management/Renewable Energy: The Vision And A Dose Of Reali...
Crown eco capital management/Renewable Energy: The Vision And A Dose Of Reali...
 
EUROPEAN CONSORTIUM LEONARDO
EUROPEAN CONSORTIUM LEONARDOEUROPEAN CONSORTIUM LEONARDO
EUROPEAN CONSORTIUM LEONARDO
 
Just For Kicks: Everyone Plays
Just For Kicks: Everyone PlaysJust For Kicks: Everyone Plays
Just For Kicks: Everyone Plays
 
XLIFF2_forTC37SC5
XLIFF2_forTC37SC5XLIFF2_forTC37SC5
XLIFF2_forTC37SC5
 
Esportare in cina Food and Wine
Esportare in cina Food and WineEsportare in cina Food and Wine
Esportare in cina Food and Wine
 
Export manager Uniti - IN CINA - CHINA
Export manager Uniti - IN CINA - CHINAExport manager Uniti - IN CINA - CHINA
Export manager Uniti - IN CINA - CHINA
 
Italian Mosaic company
Italian Mosaic companyItalian Mosaic company
Italian Mosaic company
 
Project contract interna world
Project contract interna worldProject contract interna world
Project contract interna world
 
Shangri la paris
Shangri la parisShangri la paris
Shangri la paris
 
Crystal sculptures in artistic glass plates
Crystal sculptures in artistic glass platesCrystal sculptures in artistic glass plates
Crystal sculptures in artistic glass plates
 
Leadership quotes
Leadership quotesLeadership quotes
Leadership quotes
 
20130708 avviso incoming_host
20130708 avviso incoming_host20130708 avviso incoming_host
20130708 avviso incoming_host
 
The Intellectual Property of the Fourth of July by IPfolio
The Intellectual Property of the Fourth of July by IPfolioThe Intellectual Property of the Fourth of July by IPfolio
The Intellectual Property of the Fourth of July by IPfolio
 
Endorphin Platform - Social Scoring Platform.
Endorphin Platform - Social Scoring Platform.Endorphin Platform - Social Scoring Platform.
Endorphin Platform - Social Scoring Platform.
 
Endorphin. Making sense of social data
Endorphin. Making sense of social dataEndorphin. Making sense of social data
Endorphin. Making sense of social data
 
Building Healthier Communities via Mobile || Social Cops
Building Healthier Communities via Mobile || Social CopsBuilding Healthier Communities via Mobile || Social Cops
Building Healthier Communities via Mobile || Social Cops
 
Social Cops Field Data Collection
Social Cops Field Data CollectionSocial Cops Field Data Collection
Social Cops Field Data Collection
 
Swiss edilizia interni-4
Swiss edilizia interni-4Swiss edilizia interni-4
Swiss edilizia interni-4
 
Portfolio project / retail shop
Portfolio project / retail shop Portfolio project / retail shop
Portfolio project / retail shop
 

Similar to COCPA Central Ontario Crime Prevention Association presentation by Steve Falk

2010 12-03 a-lawyers_guidetodata
2010 12-03 a-lawyers_guidetodata2010 12-03 a-lawyers_guidetodata
2010 12-03 a-lawyers_guidetodata
Steph Cliche
 
Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2
David Dubree
 
DPA seminar presentation
DPA seminar presentationDPA seminar presentation
DPA seminar presentation
Rodonoghue72
 

Similar to COCPA Central Ontario Crime Prevention Association presentation by Steve Falk (20)

Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Presentation On Mass Data Privacy Law
Presentation On Mass Data Privacy LawPresentation On Mass Data Privacy Law
Presentation On Mass Data Privacy Law
 
Data Security for Nonprofits
Data Security for NonprofitsData Security for Nonprofits
Data Security for Nonprofits
 
Data Protection: We\'re In This Together
Data Protection: We\'re In This TogetherData Protection: We\'re In This Together
Data Protection: We\'re In This Together
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jackson
 
OSAC: Personal Digital Security Presentation
OSAC: Personal Digital Security PresentationOSAC: Personal Digital Security Presentation
OSAC: Personal Digital Security Presentation
 
2010 12-03 a-lawyers_guidetodata
2010 12-03 a-lawyers_guidetodata2010 12-03 a-lawyers_guidetodata
2010 12-03 a-lawyers_guidetodata
 
Dean carey - data loss-prevention - atlseccon2011
Dean carey - data loss-prevention - atlseccon2011Dean carey - data loss-prevention - atlseccon2011
Dean carey - data loss-prevention - atlseccon2011
 
Wipo smes ge_08_topic07
Wipo smes ge_08_topic07Wipo smes ge_08_topic07
Wipo smes ge_08_topic07
 
Information security overview
Information security overviewInformation security overview
Information security overview
 
Security and the Service Desk
Security and the Service DeskSecurity and the Service Desk
Security and the Service Desk
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2
 
Kevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram Security Summit
Kevin Wharram Security Summit
 
DPA seminar presentation
DPA seminar presentationDPA seminar presentation
DPA seminar presentation
 
You Will Be Breached
You Will Be BreachedYou Will Be Breached
You Will Be Breached
 
Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011
 
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

COCPA Central Ontario Crime Prevention Association presentation by Steve Falk

  • 1. Preventing crimes related to Personal Data Steve Falk President, Prime Data
  • 2. Why do I know anything about personal data issues? 20 years of building businesses that provide data-driven marketing services
  • 3. Personal Data in life and business ● carrying a cell phone, passwords, bank cards, USB drives, etc ● at work - employee data, mailing lists, email lists, spreadsheets, cloud-based apps and software, tablets and wireless access, mobile device access, paper docs, passwords
  • 4. What is personal data? ● it can be a spreadsheet with client names ● it could be a printout of that sheet ● it could be copies of invoices or reports ● it does not have to have VISA or SIN ● it could contain list of recent purchases, birth dates, moved address information ● side note on US personal data - much richer
  • 5. A real life example: what can happen? Elections Canada - USB sticks lost 2 jobs lost
  • 6. Small biz concerns ● dentist ● health clinic ● chiropractor ● VISA numbers at auto repair ● email lists to clients ● lists of donors at a charity
  • 7. Everything’s in Beta ● protecting technology security, legal compliance, workplace issues, ● individual responsibility ● from paper based to cloud-based storage ● understanding security and privacy is a moving target. Just as you understand it, new information and threats develop ● even bill C51 for anti-terrorism touches on it
  • 8. The Privacy Commissioner ● PIPEDA (personal information and electronic documents act) ● An online FREE online Assessment ● #OPC (Tweets from the Commision) ● reporting a breach - Organization ● filing a complaint - an individual
  • 9. Personal Data - leaks, breaches, loss Sometimes it is malicious and other times its just carelessness or misunderstanding ● securely shred paper documents (by photocopier, for instance) ● transport data securely - ftp, DROPBOX, encrypted ● firewalls at a business help deter breaches
  • 10. Careful with your email - CASL Canadian Anti-Spam Legislation $1,000,000 fine to CompuFinder - unsolicited email
  • 11. Takeaways ● understand the potential damage to your organization if there is a breach ● Train staff and continually reinforce security practices ● you must report loss of personal data if you are an organization (Privacy Commissioner) ● Take the FREE Privacy Commissioner business assessment
  • 12. ● password protect your cell phone ● don’t use one pwd for everything ● don’t save personal information on USB sticks and transport them unsecurely ● use updated browsers, malware software and virus protection software ● securely destroy hard drives on computers, phones (certificates or destruction avail)