SlideShare a Scribd company logo
1 of 52
ITHI: Identifier Technologies Heath Indicators
Alain Durand, ITHI, APNIC43, February 2017
| 2
What is ITHI? Why Should You be Interested?
ITHI, or Identifier Technologies Health Indicators is a new
ICANN initiative to “measure” the “health” of the
“identifiers” that “ICANN helps coordinate”.
The goal is to produce a set of indicators that will be
measured and tracked over time that will help determine
if the set of identifiers is overall doing better or worse.
This is a long term project, expected to run for many years.
We are at the beginning, and it is important to get the
community involved in the definition phase of the project.
| 3
What is the Scope of ITHI?
The scope of ITHI is all the unique Identifiers ICANN helps
coordinate. It includes:
- DNS names
- IP addresses
This presentation will focus on the name track. The NRO
has demanded to be in charge of the number track.
At some point, both tracks will be converged.
| 4
ICANN Strategic Plan 2016-2020
2.1 Foster and coordinate a healthy, secure,
stable, and resilient identifier ecosystem.
KEY SUCCESS FACTORS (OUTCOMES)
- Increased collaboration with the global community that improves the
security, stability and resiliency of the unique identifier ecosystem (including
updates of the root zone, Internet numbers registries, and protocol
parameter registries, operation of the “L” root server, and other operational
infrastructure supporting the identifier ecosystem).
- Ecosystem is able to withstand attacks or other events without loss of
confidence in the operation of the unique identifier system.
- Unquestionable, globally recognized legitimacy as coordinator of unique
identifiers.
- Reduction of government/industry/other stakeholders’ concerns regarding
availability of IP addresses.
- …
https://www.icann.org/en/system/files/files/strategic-plan-2016-2020-10oct14-en.pdf
| 5
ITHI Project Timeline
http://www.icann.org/ithi
Mailing list: ithi@icann.org
March 2016: ITHI kick-off at ICANN55
Number community, through the NRO,
joined the ITHI project but demanded to drive
their own component.
September 2016: ITHI workshop at ICANN DC office
October 2016: ITHI workshop with M3AAWG, Paris
November 2016: ITHI session at ICANN57
January 2017: ITHI 1st public comment period closed
| 6
ITHI: Methodology
1) Define Health
2) Define Metrics to measure health
3) Get data to compute above metrics
Status: - We are at step 1: defining health.
- We want to go to step 2, defining metrics
from the above definitions
| 7
Heath: Definition
health |helTH|
noun
the state of being free from illness or injury
- Merriam Webster Dictionary
In the context of ITHI, we will look
at “health” through the prism of
known “Problem Areas” that
we will try to measure.
| 8
Describing Diseases: the Mayo Clinic Example
| 9
Definition of Terms
Symptoms
Causes
Risk Factors
Complications
Impact
Potential
Treatment
A statement of the exact meaning of a word
A sign of the existence of something, especially of an
undesirable situation
A person or thing that gives rise to an action,
phenomenon, or condition
A risk factor is any attribute, characteristic or exposure that
increases the likelihood of developing a disease or injury.
A secondary disease or condition aggravating an
already existing one
The effect or influence of one person, thing, or action,
on another
Treatment: medical care given to a patient for an illness
or injury
Definition
| 10
5 Problem Areas
In the first phase of the name track of ITHI, we will focus on
5 problem areas:
q Bad Data
q Abuse
q Excessive Traffic
q Leakage
q Lies
Over time, new problem areas could be defined, and/or
some could removed.
Bad Data
| 12
Bad Data
Definition
Symptoms
Causes
Risk Factors
Complications
Impact
Potential
Treatment
Registrations contain either
incomplete, inaccurate or
fraudulent data.
| 13
Bad Data
Definition
Symptoms
Causes
Risk Factors
Complications
Impact
Potential
Treatment
• Contact information
points to erroneous
or non-existing locations
or persons
• Large numbers of
registrations with similarly
incomplete, inaccurate or
fraudulent information
(often indicative of a
spam campaign)
| 14
Bad Data
Definition
Symptoms
Causes
Risk Factors
Complications
Impact
Potential
Treatment
• Some registrants don't
supply accurate Whois.
• Out of scope: registrants
who use privacy/proxy
services
• Registrant/registrar
Whois accuracy
obligations and registrar
verification/validation
obligations not enforced
or not consistent.
| 15
Bad Data
Definition
Symptoms
Causes
Risk Factors
Complications
Impact
Potential
Treatment
• Lack of agreed upon definition
of accuracy
• Data
accuracy/verification/validatio
n is not enforced
(or not enforceable)
or not consistent
• National laws may be in
conflict with getting access to
accurate data (conflict of
interest between accuracy
and privacy)
• Data may exist but not
accessible.
| 16
Bad Data
Definition
Symptoms
Causes
Risk Factors
Complications
Impact
Potential
Treatment
• Registrant fraud:
• Unauthorized domain
name transfers
• Loss of contactability
• Can escalate to Abusitis
| 17
Bad Data
Definition
Symptoms
Causes
Risk Factors
Complications
Impact
Potential
Treatment
Public safety, technical, or
business communities
have difficulties
identifying those responsible
for domain names.
| 18
Bad Data
Definition
Symptoms
Causes
Risk Factors
Complications
Impact
Potential
Treatment
• Contract enforcement:
RAA/Registration
Agreements,
Terms & Conditions
• Acceptable Use Policies
that prohibit abuse and
misuse of domain names
• National laws may force
data accuracy checks
Abuse
| 20
Abuse
Definition
Symptoms
Causes
Risk Factors
Complications
Impact
Potential
Treatment
Domain name abuse is the
registration or use of a
domain name with the
capability to cause spam,
phishing, malware
distribution or command &
control of botnets.
| 21
Abuse
Definition
Symptoms
Causes
Risk Factors
Complications
Impact
Potential
Treatment
Domain names are involved
in spam or phishing,
and/or are critical to the use
of botnet command &
control, and/or in the
distribution of malware and
other nefarious activities.
| 22
Abuse
Definition
Symptoms
Causes
Risk Factors
Complications
Impact
Potential
Treatment
• Abusive and/or harmful
activities facilitated by the
registration and use of
domain names.
• Contractual & operational
weaknesses or poor
contractual enforcement
in domain name
registration process and
life cycle.
| 23
Abuse
Definition
Symptoms
Causes
Risk Factors
Complications
Impact
Potential
Treatment
• Nefarious intent of the
registrant may not be
discovered at the time of
registration
• Use of privacy/proxy
services
• Incompetent, complacent
or complicit behavior of
registries/registrars.
• ICANN compliance
department rendered
ineffective
| 24
Abuse
Definition
Symptoms
Causes
Risk Factors
Complications
Impact
Potential
Treatment
Abuse or criminal activities
including but not limited to:
• Phishing
• Botnet Command and
Control
• Malware Distribution
• Spam
• …
| 25
Abuse
Definition
Symptoms
Causes
Risk Factors
Complications
Impact
Potential
Treatment
• Domain names associated
with abuse may appear in
anti-abuse lists.
• Large economical impact for
merchants and
consumers/damage to brand
• Erosion of consumer
confidence
• Erosion of confidence in the
DNS system
• Fragmentation of the DNS
| 26
Abuse
Definition
Symptoms
Causes
Risk Factors
Complications
Impact
Potential
Treatment
• Pre-registration automatic
screening
• Post registration
anti-abuse responses
• Where possible,
accelerated procedure for
take down
• Common
registry/registrar
contractual anti-abuse
provisions
• Universal minimum price
Excessive Traffic
| 28
Excessive Traffic
Definition
Symptoms
Causes
Risk Factors
Complications
Impact
Potential
Treatment
Higher volume of traffic than
should be observed in an
ideal* world hits DNS
servers.
*ideal: no more than a few
queries per name per
network for the duration of
the TTL
| 29
Excessive Traffic
Definition
Symptoms
Causes
Risk Factors
Complications
Impact
Potential
Treatment
• Monitoring systems
detect higher than normal
traffic
• DNS servers start
dropping traffic.
| 30
Excessive Traffic
Definition
Symptoms
Causes
Risk Factors
Complications
Impact
Potential
Treatment
• Many queries are often
sent at rapid intervals for
the same questions,
ignoring TTLs.
• A large number of queries
are seen for non-existent
names.
• DDOS attacks
exacerbate the problem.
| 31
Excessive Traffic
Definition
Symptoms
Causes
Risk Factors
Complications
Impact
Potential
Treatment
• Prevalent existence of
poorly managed open
resolvers
• Proliferation of
misconfigured or buggy
DNS resolvers
• Lack of deployment of
BCP38 (ingress filtering)
• Compromised IoT
devices
| 32
Excessive Traffic
Definition
Symptoms
Causes
Risk Factors
Complications
Impact
Potential
Treatment
• Unreachability
of name servers
• In extreme cases, names
will not resolve
| 33
Excessive Traffic
Definition
Symptoms
Causes
Risk Factors
Complications
Impact
Potential
Treatment
DNS server operators have
to build a infrastructure with
larger capacity than
otherwise.
| 34
Excessive Traffic
Definition
Symptoms
Causes
Risk Factors
Complications
Impact
Potential
Treatment
• DDOS mitigation
• Excessive query
suppression
• Capacity adaptation
LEAKAGE
| 36
LEAKAGE
Definition
Symptoms
Causes
Risk Factors
Complications
Impact
Potential
Treatment
Leakage of private
names into the public
namespace
| 37
LEAKAGE
Definition
Symptoms
Causes
Risk Factors
Complications
Impact
Potential
Treatment
Attempts to resolve private
names are observed in the
public DNS resolution
system
(e.g. .corp, .mail,
.home,
.wpad, .onion)
| 38
LEAKAGE
Definition
Symptoms
Causes
Risk Factors
Complications
Impact
Potential
Treatment
• Misconfigured software
• Poor or inaccurate
guidance from vendors
regarding use of private
TLDs
• “Bring your laptop at
home”/connection
attempts before VPN is
active
| 39
LEAKAGE
Definition
Symptoms
Causes
Risk Factors
Complications
Impact
Potential
Treatment
• Confusion or lack of
awareness of name
collision problem
• Unwillingness to
change, apathy
• Difficult-to-upgrade
(legacy) equipment that
embeds private names
• Low cost devices with
buggy software using
private names
| 40
LEAKAGE
Definition
Symptoms
Causes
Risk Factors
Complications
Impact
Potential
Treatment
Private topology information
leaked
(may lead to social
engineering attacks)
| 41
LEAKAGE
Definition
Symptoms
Causes
Risk Factors
Complications
Impact
Potential
Treatment
• Privately chosen suffix
may become unusable in
the global DNS.
• Issue of whether suffix
should be made a
reserved string
| 42
LEAKAGE
Definition
Symptoms
Causes
Risk Factors
Complications
Impact
Potential
Treatment
Unknown
LIES
| 44
Lies
Definition
Symptoms
Causes
Risk Factors
Complications
Impact
Potential
Treatment
Responses from DNS
resolvers to DNS queries
contain
unauthorized/forged/tamp
ered data.
Note: This does not
include access blocking
by regulators or parental
control
| 45
Lies
Definition
Symptoms
Causes
Risk Factors
Complications
Impact
Potential
Treatment
URLs are re-directed away
from intended servers,
e.g., to a competitor,
malware distribution,
phishing, or defacement
site.
| 46
Lies
Definition
Symptoms
Causes
Risk Factors
Complications
Impact
Potential
Treatment
• Cache poisoning or
DNS hijacking
• Error resolution service
providers (See SAC 032,
DNS response
modification)
| 47
Lies
Definition
Symptoms
Causes
Risk Factors
Complications
Impact
Potential
Treatment
Incompetent, Complacent
or Complicit ISPs:
• Services based on
name error
resolution deployed
despite known
adverse
consequences
• …
| 48
Lies
Definition
Symptoms
Causes
Risk Factors
Complications
Impact
Potential
Treatment
Abuse or criminal activities
including but not limited to:
• Malware Distribution
• Phishing, fraud,
defacement,
hacktivism, DNS or
search traffic theft
• Interference with
network monitoring or
administration (name
errors are important to
admins!)
| 49
Lies
Definition
Symptoms
Causes
Risk Factors
Complications
Impact
Potential
Treatment
• Loss of business
• Financial loss (from
phishing or from
response modification
that directs revenue-
potential traffic to
competitor)
• Loss of confidence in the
DNS system.
| 50
Lies
Definition
Symptoms
Causes
Risk Factors
Complications
Impact
Potential
Treatment
Local DNSSEC validation
(indirect effect: if DNSSEC
validation was ubiquitous,
such attacks would not be
possible)
IP Address Problem Areas
Work in Progress,
Done by the RIRs Registry Services
| 52
Call for Action
The ICANN ITHI project will soon be working on metrics
derived from the problem areas presented in this deck.
We would like to invite DNS experts to work with us to
define those metrics.
It is important to get community participation in the early
stages of this project to make sure we get this right.
Resources:
Web: http://www.icann.org/ithi
Mailing list: ithi@icann.org
Subscription Page:
https://mm.icann.org/mailman/listinfo/ithi

More Related Content

What's hot

What's hot (20)

Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...
 
GDPR From the Trenches - Real-world examples of how companies are approaching...
GDPR From the Trenches - Real-world examples of how companies are approaching...GDPR From the Trenches - Real-world examples of how companies are approaching...
GDPR From the Trenches - Real-world examples of how companies are approaching...
 
CyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRCyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPR
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
 
Ardoq in Edinburgh - Events - Building Resilience in a Post-GDPR World (14-au...
Ardoq in Edinburgh - Events - Building Resilience in a Post-GDPR World (14-au...Ardoq in Edinburgh - Events - Building Resilience in a Post-GDPR World (14-au...
Ardoq in Edinburgh - Events - Building Resilience in a Post-GDPR World (14-au...
 
NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...
 
The Future of the Modern Workplace Event 2019 - Data Security and Protection
The Future of the Modern Workplace Event 2019 - Data Security and ProtectionThe Future of the Modern Workplace Event 2019 - Data Security and Protection
The Future of the Modern Workplace Event 2019 - Data Security and Protection
 
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
 
Tyler Technology Expo
Tyler Technology ExpoTyler Technology Expo
Tyler Technology Expo
 
5 Signs Your Privacy Management Program is Not Working for You
5 Signs Your Privacy Management Program is Not Working for You5 Signs Your Privacy Management Program is Not Working for You
5 Signs Your Privacy Management Program is Not Working for You
 
EU's General Data Protection Regulation (GDPR)
EU's General Data Protection Regulation (GDPR)EU's General Data Protection Regulation (GDPR)
EU's General Data Protection Regulation (GDPR)
 
Everything you Need to Know about The Data Protection Officer Role
Everything you Need to Know about The Data Protection Officer Role Everything you Need to Know about The Data Protection Officer Role
Everything you Need to Know about The Data Protection Officer Role
 
How does GDPR affect your business?
How does GDPR affect your business?How does GDPR affect your business?
How does GDPR affect your business?
 
GDPR 11/1/2017
GDPR 11/1/2017GDPR 11/1/2017
GDPR 11/1/2017
 
Cloud Regulations and Security Standards by Ran Adler
Cloud Regulations and Security Standards by Ran AdlerCloud Regulations and Security Standards by Ran Adler
Cloud Regulations and Security Standards by Ran Adler
 
Revising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPRRevising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPR
 
7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data Governance7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data Governance
 
Flight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the LawFlight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the Law
 
Data transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRData transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPR
 

Viewers also liked

Viewers also liked (20)

BTNOG Update
BTNOG UpdateBTNOG Update
BTNOG Update
 
DNSSEC Deployment for .VN and share information of DNSSEC's plan in 2017
DNSSEC Deployment for .VN and share information of DNSSEC's plan in 2017DNSSEC Deployment for .VN and share information of DNSSEC's plan in 2017
DNSSEC Deployment for .VN and share information of DNSSEC's plan in 2017
 
APNIC Activity Report 2016
APNIC Activity Report 2016APNIC Activity Report 2016
APNIC Activity Report 2016
 
IDNOG Update
IDNOG UpdateIDNOG Update
IDNOG Update
 
APNIC EC Election Procedures
APNIC EC Election ProceduresAPNIC EC Election Procedures
APNIC EC Election Procedures
 
EC Election Candidate Speeches
EC Election Candidate SpeechesEC Election Candidate Speeches
EC Election Candidate Speeches
 
HKNOG Update
HKNOG UpdateHKNOG Update
HKNOG Update
 
A Review of Community Network Technological Platform
A Review of Community Network Technological PlatformA Review of Community Network Technological Platform
A Review of Community Network Technological Platform
 
NOG Reports
NOG ReportsNOG Reports
NOG Reports
 
Using ~300 Billion DNS Queries to Analyse the TLD Name Collision Problem
Using ~300 Billion DNS Queries to Analyse the TLD Name Collision ProblemUsing ~300 Billion DNS Queries to Analyse the TLD Name Collision Problem
Using ~300 Billion DNS Queries to Analyse the TLD Name Collision Problem
 
IPv6 Deployment Status in Bangladesh
IPv6 Deployment Status in BangladeshIPv6 Deployment Status in Bangladesh
IPv6 Deployment Status in Bangladesh
 
Taiwan IPv6 Measurement
Taiwan IPv6 MeasurementTaiwan IPv6 Measurement
Taiwan IPv6 Measurement
 
APIX Report
APIX ReportAPIX Report
APIX Report
 
NAT64/DNS64 experiments, warnings and one useful tool
NAT64/DNS64 experiments, warnings and one useful toolNAT64/DNS64 experiments, warnings and one useful tool
NAT64/DNS64 experiments, warnings and one useful tool
 
IPv6 Deployment: Case of Sudan/SudREN
IPv6 Deployment: Case of Sudan/SudRENIPv6 Deployment: Case of Sudan/SudREN
IPv6 Deployment: Case of Sudan/SudREN
 
APNIC 43 Vote of Thanks
APNIC 43 Vote of ThanksAPNIC 43 Vote of Thanks
APNIC 43 Vote of Thanks
 
EURO-IX BMC - Benchmarking
EURO-IX BMC - BenchmarkingEURO-IX BMC - Benchmarking
EURO-IX BMC - Benchmarking
 
The trend stats of routing table at JPIX route servers
The trend stats of routing table at JPIX route serversThe trend stats of routing table at JPIX route servers
The trend stats of routing table at JPIX route servers
 
APNIC 44 Update
APNIC 44 UpdateAPNIC 44 Update
APNIC 44 Update
 
Unknown Unicast Traffic and Ping Pollers
Unknown Unicast Traffic and Ping PollersUnknown Unicast Traffic and Ping Pollers
Unknown Unicast Traffic and Ping Pollers
 

Similar to ITHI: Identifier Technologies Health Indicators

Implementing And Managing A Multinational Privacy Program
Implementing And Managing A Multinational Privacy ProgramImplementing And Managing A Multinational Privacy Program
Implementing And Managing A Multinational Privacy Program
MSpadea
 
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxColorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
AkramAlqadasi1
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggoner
mihinpr
 
Data Quality Asia Pacific Award_v1.1_20100520
Data Quality Asia Pacific Award_v1.1_20100520Data Quality Asia Pacific Award_v1.1_20100520
Data Quality Asia Pacific Award_v1.1_20100520
Tatiana Stebakova
 

Similar to ITHI: Identifier Technologies Health Indicators (20)

3 Steps to Automate Compliance for Healthcare Organizations
3 Steps to Automate Compliance for Healthcare Organizations3 Steps to Automate Compliance for Healthcare Organizations
3 Steps to Automate Compliance for Healthcare Organizations
 
What Covered Entities Need to Know about OCR HIPAA Audit​s
What Covered Entities Need to Know about OCR HIPAA Audit​sWhat Covered Entities Need to Know about OCR HIPAA Audit​s
What Covered Entities Need to Know about OCR HIPAA Audit​s
 
GDPR Series Session 4
GDPR Series Session 4GDPR Series Session 4
GDPR Series Session 4
 
OCR HIPAA Audits…Will You Be Prepared?
OCR HIPAA Audits…Will You Be Prepared?OCR HIPAA Audits…Will You Be Prepared?
OCR HIPAA Audits…Will You Be Prepared?
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
HIPAA compliance tuneup 2016
HIPAA compliance tuneup 2016HIPAA compliance tuneup 2016
HIPAA compliance tuneup 2016
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a byte
 
CXFIRE Brochure
CXFIRE Brochure CXFIRE Brochure
CXFIRE Brochure
 
Implementing And Managing A Multinational Privacy Program
Implementing And Managing A Multinational Privacy ProgramImplementing And Managing A Multinational Privacy Program
Implementing And Managing A Multinational Privacy Program
 
Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10) Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10)
 
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxColorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
 
Is it time for an IT Assessment?
Is it time for an IT Assessment?Is it time for an IT Assessment?
Is it time for an IT Assessment?
 
Webinar Next Week: Beyond Online Intake: Looking at Triage and Expert Systems
Webinar Next Week:  Beyond Online Intake: Looking at Triage and Expert SystemsWebinar Next Week:  Beyond Online Intake: Looking at Triage and Expert Systems
Webinar Next Week: Beyond Online Intake: Looking at Triage and Expert Systems
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
 
DATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docx
DATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docxDATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docx
DATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docx
 
Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10)
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggoner
 
Data Quality Asia Pacific Award_v1.1_20100520
Data Quality Asia Pacific Award_v1.1_20100520Data Quality Asia Pacific Award_v1.1_20100520
Data Quality Asia Pacific Award_v1.1_20100520
 
Avior Healthcare Security Compliance Webcast Final1
Avior Healthcare Security Compliance Webcast Final1Avior Healthcare Security Compliance Webcast Final1
Avior Healthcare Security Compliance Webcast Final1
 

More from APNIC

More from APNIC (20)

Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
 
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC Updates presented by Paul Wilson at  CaribNOG 27APNIC Updates presented by Paul Wilson at  CaribNOG 27
APNIC Updates presented by Paul Wilson at CaribNOG 27
 
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6
 

Recently uploaded

一比一原版美国北卡罗莱纳大学毕业证如何办理
一比一原版美国北卡罗莱纳大学毕业证如何办理一比一原版美国北卡罗莱纳大学毕业证如何办理
一比一原版美国北卡罗莱纳大学毕业证如何办理
A
 
一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书
F
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
c6eb683559b3
 
一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理
F
 
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
apekaom
 
原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样
AS
 
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
AS
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
F
 
一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理
SS
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
F
 
Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...
Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...
Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...
mikehavy0
 

Recently uploaded (20)

一比一原版美国北卡罗莱纳大学毕业证如何办理
一比一原版美国北卡罗莱纳大学毕业证如何办理一比一原版美国北卡罗莱纳大学毕业证如何办理
一比一原版美国北卡罗莱纳大学毕业证如何办理
 
一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
Lowongan Kerja LC Yogyakarta Terbaru 085746015303
Lowongan Kerja LC Yogyakarta Terbaru 085746015303Lowongan Kerja LC Yogyakarta Terbaru 085746015303
Lowongan Kerja LC Yogyakarta Terbaru 085746015303
 
Washington Football Commanders Redskins Feathers Shirt
Washington Football Commanders Redskins Feathers ShirtWashington Football Commanders Redskins Feathers Shirt
Washington Football Commanders Redskins Feathers Shirt
 
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
 
一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理
 
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
 
Loker Pemandu Lagu LC Semarang 085746015303
Loker Pemandu Lagu LC Semarang 085746015303Loker Pemandu Lagu LC Semarang 085746015303
Loker Pemandu Lagu LC Semarang 085746015303
 
[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon
[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon
[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon
 
一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
 
Nungambakkam (Chennai) Independent Escorts - 9632533318 100% genuine
Nungambakkam (Chennai) Independent Escorts - 9632533318 100% genuineNungambakkam (Chennai) Independent Escorts - 9632533318 100% genuine
Nungambakkam (Chennai) Independent Escorts - 9632533318 100% genuine
 
Down bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirts
 
Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...
Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...
Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...
 

ITHI: Identifier Technologies Health Indicators