SlideShare a Scribd company logo
1 of 18
Data Protection
    THE TOP TEN CONCERNS


HISI CONFERENCE, DUBLIN

W E D N E S D A Y , N O V 1 6 TH, 2 0 1 1
Introduction

 The Data Protection Rules


 Areas for Concern
   The Global Village
   Obligation to Notify
   What to prioritise?



 Protecting Privacy


 Capability and Compliance
The Data Protection Rules

 Personal Data must be…
   Obtained Fairly

   Processed for a Specified Purpose

   Processed in a Compatible Manner

   Kept Safe and Secure

   Kept Accurate and Up-to-date

   Processed adequately, not excessively

   Retained only for as long as necessary

   Stored to enable easy retrieval
The Data Protection Rules

           Obtained Fairly

  Processed for a Specified Purpose

 Processed in a Compatible Manner

        Kept Safe and Secure

   Kept Accurate and Up-to-date

Processed adequately, not excessively

Retained only for as long as necessary

   Stored to enable easy retrieval
Challenge 1 – Safe and Secure


Increased access to                                 Increased Risk of
data & information                                  Breach, Leakage, Theft

         Improved service provision      Reputational damage
          More timely interventions     „Brand‟ damage
          More appropriate response      Breakdown in trust
 Better management of Risk to clients    Impact on Commercial Performance




           Billing and Account Data most at risk
Challenge 1 – Safe and Secure


Challenge is …
 Technical

 Physical

 Emotional
Challenge 2 – Breach Notification

 “… an incident giving rise to a risk of unauthorised
    disclosure, loss, destruction or alteration of personal data“


 “Must give immediate consideration to notifying the
    data subjects”
   Intended to redress the balance of control
   Some discretion is left to the Data Controller
   Reputational, Commercial, Professional impact
   „Doing Nothing‟ no longer an option
Fewer than 50 of breaches are detected
           50%
(Ponemon)



Fewer than 40 of these are reported
           40%
(Ponemon)


Corollary:

Up to 80% are off management‟s radar
Challenge 3 – Ambassadors and Assassins


                                                         Biggest Data
   Biggest Data
                                                            threat
   „Customers‟


Champions for “new ways of working”      52% of breaches caused by
Drive ROI on investment in tools         unintentional actions (Ponemon)
Help drive the agenda re: use of data.
                                         10% were „intentional, non-
                                         malicious‟ (Ponemon)




   Will institutions pursue their „star‟ practitioners?
Challenge 4 – How to Prioritise?

People who believe automation increases risk of data loss or theft 92%




      % of issues blamed on inadequate resourcing     71%




<3%    % of budget allocated to data security



Challenge: Increased demands on reduced budgets
Challenge 5 – How to value data?

 Cost to acquire?
   Value placed on accuracy? Integrity?

   Tolerance for duplication? Obsolescence?



 Cost if lost?
   Average cost per lost record - €107k

   Average data lost per incident – 1769 records

   Costs between $6.5m and $15m where media cover the loss



 Penalty clauses in Data Processor contracts?
Challenge 6 – Quality of Data?

 Multiple Sources, opportunity for error


 Multiple system interfaces, data mapping


 Assessment of data integrity, completeness


 New phenomenon of „facilitated‟ data


 77% cannot control physical access to stored data
Challenge 7 – The Temptation to Share

 Outsourcing of all aspects of data management
   Acquisition
   Processing
   Analysis
   Evaluation
   Security
   Storage

 Non-prescriptive Processor contract
 Adequacy of protection at overseas destination
 Undermined reputation of Safe Harbor
 „Trust … but verify!‟
Challenge 8 – The Cloud – opportunity or threat?

 Fastest growing new sector


 Significant savings in maintenance, resource and
 licensing

 Super-jurisdictional processing, storage


 Different from historical supported models


 Ultimate onus remains with Data Controller
Challenge 9 – Who has our data?

 Imbalance of Sensitive Personal Data


 Multiple channels for data transfer


 Status of third-party and sub-contracts


 How and when to anonymise
Challenge 10 – Should it stay or should it go?

 Retain for duration of specified purpose


 The temptation to retain indefinitely


 Possibility of „undefined future use‟


 Storage costs no longer a decision driver


 Verifiable destruction?
When is enough enough?

 Core set of policies and procedures

 Integrated processes – „joined-up thinking‟

 Staff awareness

 Consistent Policies across faculties, departments

 Appropriate templates

 Regular audit / review

 Data Controller‟s best endeavours
Data Protection – Inhibitor or Enabler?

 Improved awareness of data quality, integrity


 Increased accuracy of data


 Reliability of analysis and decision-making


 Heightened awareness of Data Subjects‟ rights


 Protects brand, reputation, credibility, trust

More Related Content

What's hot

Priming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive eraPriming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive eraLuke Farrell
 
Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Bianca Mueller, LL.M.
 
Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...
Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...
Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...Positive Hack Days
 
Take back your security infrastructure
Take back your security infrastructureTake back your security infrastructure
Take back your security infrastructureAnton Chuvakin
 
CounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat ManagementCounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat ManagementMighty Guides, Inc.
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceEnergySec
 
Deral Heiland - Fail Now So I Don't Fail Later
Deral Heiland - Fail Now So I Don't Fail LaterDeral Heiland - Fail Now So I Don't Fail Later
Deral Heiland - Fail Now So I Don't Fail Latercentralohioissa
 
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the WarGary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the Warcentralohioissa
 
Human factors in cybersecurity: Needs assessment
Human factors in cybersecurity: Needs assessment Human factors in cybersecurity: Needs assessment
Human factors in cybersecurity: Needs assessment Rick van der Kleij
 
NESCO Town Hall Workforce Development Presentation
NESCO Town Hall Workforce Development PresentationNESCO Town Hall Workforce Development Presentation
NESCO Town Hall Workforce Development PresentationEnergySec
 
Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analyticsChristian Have
 
Haystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence PlatformHaystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence PlatformHaystax Technology
 
Managing Insider Threat
Managing Insider Threat Managing Insider Threat
Managing Insider Threat iris_cheung
 
IT Security Management -- People, Procedures and Tools
IT Security Management -- People, Procedures and ToolsIT Security Management -- People, Procedures and Tools
IT Security Management -- People, Procedures and ToolsAndrew S. Baker (ASB)
 
Digital Security
Digital SecurityDigital Security
Digital SecurityKoshy Tk
 
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins44CON
 
How to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's ClothingHow to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's ClothingThinAir
 

What's hot (20)

Priming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive eraPriming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive era
 
Opi cyber talk for executives
Opi cyber talk for executivesOpi cyber talk for executives
Opi cyber talk for executives
 
Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data?
 
Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...
Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...
Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...
 
Take back your security infrastructure
Take back your security infrastructureTake back your security infrastructure
Take back your security infrastructure
 
CounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat ManagementCounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat Management
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond Compliance
 
Deral Heiland - Fail Now So I Don't Fail Later
Deral Heiland - Fail Now So I Don't Fail LaterDeral Heiland - Fail Now So I Don't Fail Later
Deral Heiland - Fail Now So I Don't Fail Later
 
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the WarGary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
 
when minutes counts
when minutes countswhen minutes counts
when minutes counts
 
Human factors in cybersecurity: Needs assessment
Human factors in cybersecurity: Needs assessment Human factors in cybersecurity: Needs assessment
Human factors in cybersecurity: Needs assessment
 
NESCO Town Hall Workforce Development Presentation
NESCO Town Hall Workforce Development PresentationNESCO Town Hall Workforce Development Presentation
NESCO Town Hall Workforce Development Presentation
 
Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analytics
 
Haystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence PlatformHaystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence Platform
 
Managing Insider Threat
Managing Insider Threat Managing Insider Threat
Managing Insider Threat
 
IT Security Management -- People, Procedures and Tools
IT Security Management -- People, Procedures and ToolsIT Security Management -- People, Procedures and Tools
IT Security Management -- People, Procedures and Tools
 
Digital Security
Digital SecurityDigital Security
Digital Security
 
Rogers eBook Security
Rogers eBook SecurityRogers eBook Security
Rogers eBook Security
 
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
 
How to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's ClothingHow to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's Clothing
 

Similar to Data Protection Top Ten Concerns

Data security in a big data environment sweden
Data security in a big data environment   swedenData security in a big data environment   sweden
Data security in a big data environment swedenIBM Sverige
 
Don't risk it presentation
Don't risk it presentationDon't risk it presentation
Don't risk it presentationVincent Kwon
 
Information security trends and concerns
Information security trends and concernsInformation security trends and concerns
Information security trends and concernsJohn Napier
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from SymantecArrow ECS UK
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud IBM Security
 
Pre-PostBreach_Are_Your_Ready
Pre-PostBreach_Are_Your_ReadyPre-PostBreach_Are_Your_Ready
Pre-PostBreach_Are_Your_ReadyPete Pouridis
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckNetIQ
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentationShariyaz Abdeen
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?IBM Security
 
Data Security For Compliance 2
Data Security For Compliance 2Data Security For Compliance 2
Data Security For Compliance 2Flaskdata.io
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceJeff Lemmermann
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataIBM Security
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessJoel Cardella
 
The Easy WAy to Accept & Protect Credit Card Data
The Easy WAy to Accept & Protect Credit Card DataThe Easy WAy to Accept & Protect Credit Card Data
The Easy WAy to Accept & Protect Credit Card DataTyler Hannan
 
DAMA Ireland - GDPR
DAMA Ireland - GDPRDAMA Ireland - GDPR
DAMA Ireland - GDPRDAMA Ireland
 
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideDLT Solutions
 

Similar to Data Protection Top Ten Concerns (20)

Data security in a big data environment sweden
Data security in a big data environment   swedenData security in a big data environment   sweden
Data security in a big data environment sweden
 
Don't risk it presentation
Don't risk it presentationDon't risk it presentation
Don't risk it presentation
 
Information security trends and concerns
Information security trends and concernsInformation security trends and concerns
Information security trends and concerns
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
Data Loss During Downsizing
Data Loss During DownsizingData Loss During Downsizing
Data Loss During Downsizing
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
Pre-PostBreach_Are_Your_Ready
Pre-PostBreach_Are_Your_ReadyPre-PostBreach_Are_Your_Ready
Pre-PostBreach_Are_Your_Ready
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?
 
Data Security For Compliance 2
Data Security For Compliance 2Data Security For Compliance 2
Data Security For Compliance 2
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
The Easy WAy to Accept & Protect Credit Card Data
The Easy WAy to Accept & Protect Credit Card DataThe Easy WAy to Accept & Protect Credit Card Data
The Easy WAy to Accept & Protect Credit Card Data
 
DAMA Ireland - GDPR
DAMA Ireland - GDPRDAMA Ireland - GDPR
DAMA Ireland - GDPR
 
Cas cyber prez
Cas cyber prezCas cyber prez
Cas cyber prez
 
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the Outside
 
Internal Audit
Internal AuditInternal Audit
Internal Audit
 

More from healthcareisi

Gerard Hurl - Industry Presentation 26-04-12
Gerard Hurl - Industry Presentation 26-04-12Gerard Hurl - Industry Presentation 26-04-12
Gerard Hurl - Industry Presentation 26-04-12healthcareisi
 
Using Technology To Help People - Ilana Rozannes
Using Technology To Help People - Ilana RozannesUsing Technology To Help People - Ilana Rozannes
Using Technology To Help People - Ilana Rozanneshealthcareisi
 
The Electronic Medical Record - David Beausang
The Electronic Medical Record - David BeausangThe Electronic Medical Record - David Beausang
The Electronic Medical Record - David Beausanghealthcareisi
 
The Effects Of Ischemia On The Estimation Accuracy Of A Reduced Lead System ...
The  Effects Of Ischemia On The Estimation Accuracy Of A Reduced Lead System ...The  Effects Of Ischemia On The Estimation Accuracy Of A Reduced Lead System ...
The Effects Of Ischemia On The Estimation Accuracy Of A Reduced Lead System ...healthcareisi
 
Telehealth In Southampton - C Webb
Telehealth In Southampton - C WebbTelehealth In Southampton - C Webb
Telehealth In Southampton - C Webbhealthcareisi
 
Stroke Teleconsultation - Paul McCullagh
Stroke Teleconsultation - Paul McCullaghStroke Teleconsultation - Paul McCullagh
Stroke Teleconsultation - Paul McCullaghhealthcareisi
 
Software As Device - Frank Maxwell
Software As Device - Frank MaxwellSoftware As Device - Frank Maxwell
Software As Device - Frank Maxwellhealthcareisi
 
Real Life In Real Time - Shimmer Research
Real Life In Real Time - Shimmer ResearchReal Life In Real Time - Shimmer Research
Real Life In Real Time - Shimmer Researchhealthcareisi
 
Recommendations For Unique Health Identifiers - Tracy O'Carroll
Recommendations For Unique Health Identifiers - Tracy O'CarrollRecommendations For Unique Health Identifiers - Tracy O'Carroll
Recommendations For Unique Health Identifiers - Tracy O'Carrollhealthcareisi
 
Recognising Human Factors In Evaluating User Interfaces In Healthcare - Bridg...
Recognising Human Factors In Evaluating User Interfaces In Healthcare - Bridg...Recognising Human Factors In Evaluating User Interfaces In Healthcare - Bridg...
Recognising Human Factors In Evaluating User Interfaces In Healthcare - Bridg...healthcareisi
 
Raising The Level Of ICT Knowledge and Skills In The HSC - Paul Comac
Raising The Level Of ICT Knowledge and Skills In The HSC - Paul ComacRaising The Level Of ICT Knowledge and Skills In The HSC - Paul Comac
Raising The Level Of ICT Knowledge and Skills In The HSC - Paul Comachealthcareisi
 
Progress With Professionalism - Jean Roberts
Progress With Professionalism - Jean RobertsProgress With Professionalism - Jean Roberts
Progress With Professionalism - Jean Robertshealthcareisi
 
Professional Development Of Health Informatics In Northern Ireland - Paul Mc ...
Professional Development Of Health Informatics In Northern Ireland - Paul Mc ...Professional Development Of Health Informatics In Northern Ireland - Paul Mc ...
Professional Development Of Health Informatics In Northern Ireland - Paul Mc ...healthcareisi
 
Patient Journey Record(pajr) - Jing Su
Patient Journey Record(pajr) - Jing SuPatient Journey Record(pajr) - Jing Su
Patient Journey Record(pajr) - Jing Suhealthcareisi
 
Nursing Clinical Informatics - Suzanne Brown
Nursing Clinical Informatics - Suzanne BrownNursing Clinical Informatics - Suzanne Brown
Nursing Clinical Informatics - Suzanne Brownhealthcareisi
 
NI Electronic Care Record - Des O'Loan
NI Electronic Care Record - Des O'LoanNI Electronic Care Record - Des O'Loan
NI Electronic Care Record - Des O'Loanhealthcareisi
 
NHS Scotland Ehealth Strategy - Alan Hyslop
NHS Scotland Ehealth Strategy - Alan HyslopNHS Scotland Ehealth Strategy - Alan Hyslop
NHS Scotland Ehealth Strategy - Alan Hyslophealthcareisi
 
Multidisciplinary Team Experience In The Incorporation Of Pacs And Realtime E...
Multidisciplinary Team Experience In The Incorporation Of Pacs And Realtime E...Multidisciplinary Team Experience In The Incorporation Of Pacs And Realtime E...
Multidisciplinary Team Experience In The Incorporation Of Pacs And Realtime E...healthcareisi
 
Medical Clinic - Daragh O Brien
Medical Clinic - Daragh O BrienMedical Clinic - Daragh O Brien
Medical Clinic - Daragh O Brienhealthcareisi
 
Making Sense Of Ubiquitous Health Information A Cross Generational Study - Ka...
Making Sense Of Ubiquitous Health Information A Cross Generational Study - Ka...Making Sense Of Ubiquitous Health Information A Cross Generational Study - Ka...
Making Sense Of Ubiquitous Health Information A Cross Generational Study - Ka...healthcareisi
 

More from healthcareisi (20)

Gerard Hurl - Industry Presentation 26-04-12
Gerard Hurl - Industry Presentation 26-04-12Gerard Hurl - Industry Presentation 26-04-12
Gerard Hurl - Industry Presentation 26-04-12
 
Using Technology To Help People - Ilana Rozannes
Using Technology To Help People - Ilana RozannesUsing Technology To Help People - Ilana Rozannes
Using Technology To Help People - Ilana Rozannes
 
The Electronic Medical Record - David Beausang
The Electronic Medical Record - David BeausangThe Electronic Medical Record - David Beausang
The Electronic Medical Record - David Beausang
 
The Effects Of Ischemia On The Estimation Accuracy Of A Reduced Lead System ...
The  Effects Of Ischemia On The Estimation Accuracy Of A Reduced Lead System ...The  Effects Of Ischemia On The Estimation Accuracy Of A Reduced Lead System ...
The Effects Of Ischemia On The Estimation Accuracy Of A Reduced Lead System ...
 
Telehealth In Southampton - C Webb
Telehealth In Southampton - C WebbTelehealth In Southampton - C Webb
Telehealth In Southampton - C Webb
 
Stroke Teleconsultation - Paul McCullagh
Stroke Teleconsultation - Paul McCullaghStroke Teleconsultation - Paul McCullagh
Stroke Teleconsultation - Paul McCullagh
 
Software As Device - Frank Maxwell
Software As Device - Frank MaxwellSoftware As Device - Frank Maxwell
Software As Device - Frank Maxwell
 
Real Life In Real Time - Shimmer Research
Real Life In Real Time - Shimmer ResearchReal Life In Real Time - Shimmer Research
Real Life In Real Time - Shimmer Research
 
Recommendations For Unique Health Identifiers - Tracy O'Carroll
Recommendations For Unique Health Identifiers - Tracy O'CarrollRecommendations For Unique Health Identifiers - Tracy O'Carroll
Recommendations For Unique Health Identifiers - Tracy O'Carroll
 
Recognising Human Factors In Evaluating User Interfaces In Healthcare - Bridg...
Recognising Human Factors In Evaluating User Interfaces In Healthcare - Bridg...Recognising Human Factors In Evaluating User Interfaces In Healthcare - Bridg...
Recognising Human Factors In Evaluating User Interfaces In Healthcare - Bridg...
 
Raising The Level Of ICT Knowledge and Skills In The HSC - Paul Comac
Raising The Level Of ICT Knowledge and Skills In The HSC - Paul ComacRaising The Level Of ICT Knowledge and Skills In The HSC - Paul Comac
Raising The Level Of ICT Knowledge and Skills In The HSC - Paul Comac
 
Progress With Professionalism - Jean Roberts
Progress With Professionalism - Jean RobertsProgress With Professionalism - Jean Roberts
Progress With Professionalism - Jean Roberts
 
Professional Development Of Health Informatics In Northern Ireland - Paul Mc ...
Professional Development Of Health Informatics In Northern Ireland - Paul Mc ...Professional Development Of Health Informatics In Northern Ireland - Paul Mc ...
Professional Development Of Health Informatics In Northern Ireland - Paul Mc ...
 
Patient Journey Record(pajr) - Jing Su
Patient Journey Record(pajr) - Jing SuPatient Journey Record(pajr) - Jing Su
Patient Journey Record(pajr) - Jing Su
 
Nursing Clinical Informatics - Suzanne Brown
Nursing Clinical Informatics - Suzanne BrownNursing Clinical Informatics - Suzanne Brown
Nursing Clinical Informatics - Suzanne Brown
 
NI Electronic Care Record - Des O'Loan
NI Electronic Care Record - Des O'LoanNI Electronic Care Record - Des O'Loan
NI Electronic Care Record - Des O'Loan
 
NHS Scotland Ehealth Strategy - Alan Hyslop
NHS Scotland Ehealth Strategy - Alan HyslopNHS Scotland Ehealth Strategy - Alan Hyslop
NHS Scotland Ehealth Strategy - Alan Hyslop
 
Multidisciplinary Team Experience In The Incorporation Of Pacs And Realtime E...
Multidisciplinary Team Experience In The Incorporation Of Pacs And Realtime E...Multidisciplinary Team Experience In The Incorporation Of Pacs And Realtime E...
Multidisciplinary Team Experience In The Incorporation Of Pacs And Realtime E...
 
Medical Clinic - Daragh O Brien
Medical Clinic - Daragh O BrienMedical Clinic - Daragh O Brien
Medical Clinic - Daragh O Brien
 
Making Sense Of Ubiquitous Health Information A Cross Generational Study - Ka...
Making Sense Of Ubiquitous Health Information A Cross Generational Study - Ka...Making Sense Of Ubiquitous Health Information A Cross Generational Study - Ka...
Making Sense Of Ubiquitous Health Information A Cross Generational Study - Ka...
 

Recently uploaded

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Data Protection Top Ten Concerns

  • 1. Data Protection THE TOP TEN CONCERNS HISI CONFERENCE, DUBLIN W E D N E S D A Y , N O V 1 6 TH, 2 0 1 1
  • 2. Introduction  The Data Protection Rules  Areas for Concern  The Global Village  Obligation to Notify  What to prioritise?  Protecting Privacy  Capability and Compliance
  • 3. The Data Protection Rules  Personal Data must be…  Obtained Fairly  Processed for a Specified Purpose  Processed in a Compatible Manner  Kept Safe and Secure  Kept Accurate and Up-to-date  Processed adequately, not excessively  Retained only for as long as necessary  Stored to enable easy retrieval
  • 4. The Data Protection Rules Obtained Fairly Processed for a Specified Purpose Processed in a Compatible Manner Kept Safe and Secure Kept Accurate and Up-to-date Processed adequately, not excessively Retained only for as long as necessary Stored to enable easy retrieval
  • 5. Challenge 1 – Safe and Secure Increased access to Increased Risk of data & information Breach, Leakage, Theft Improved service provision Reputational damage More timely interventions „Brand‟ damage More appropriate response Breakdown in trust Better management of Risk to clients Impact on Commercial Performance Billing and Account Data most at risk
  • 6. Challenge 1 – Safe and Secure Challenge is … Technical Physical Emotional
  • 7. Challenge 2 – Breach Notification  “… an incident giving rise to a risk of unauthorised disclosure, loss, destruction or alteration of personal data“  “Must give immediate consideration to notifying the data subjects”  Intended to redress the balance of control  Some discretion is left to the Data Controller  Reputational, Commercial, Professional impact  „Doing Nothing‟ no longer an option
  • 8. Fewer than 50 of breaches are detected 50% (Ponemon) Fewer than 40 of these are reported 40% (Ponemon) Corollary: Up to 80% are off management‟s radar
  • 9. Challenge 3 – Ambassadors and Assassins Biggest Data Biggest Data threat „Customers‟ Champions for “new ways of working” 52% of breaches caused by Drive ROI on investment in tools unintentional actions (Ponemon) Help drive the agenda re: use of data. 10% were „intentional, non- malicious‟ (Ponemon) Will institutions pursue their „star‟ practitioners?
  • 10. Challenge 4 – How to Prioritise? People who believe automation increases risk of data loss or theft 92% % of issues blamed on inadequate resourcing 71% <3% % of budget allocated to data security Challenge: Increased demands on reduced budgets
  • 11. Challenge 5 – How to value data?  Cost to acquire?  Value placed on accuracy? Integrity?  Tolerance for duplication? Obsolescence?  Cost if lost?  Average cost per lost record - €107k  Average data lost per incident – 1769 records  Costs between $6.5m and $15m where media cover the loss  Penalty clauses in Data Processor contracts?
  • 12. Challenge 6 – Quality of Data?  Multiple Sources, opportunity for error  Multiple system interfaces, data mapping  Assessment of data integrity, completeness  New phenomenon of „facilitated‟ data  77% cannot control physical access to stored data
  • 13. Challenge 7 – The Temptation to Share  Outsourcing of all aspects of data management  Acquisition  Processing  Analysis  Evaluation  Security  Storage  Non-prescriptive Processor contract  Adequacy of protection at overseas destination  Undermined reputation of Safe Harbor  „Trust … but verify!‟
  • 14. Challenge 8 – The Cloud – opportunity or threat?  Fastest growing new sector  Significant savings in maintenance, resource and licensing  Super-jurisdictional processing, storage  Different from historical supported models  Ultimate onus remains with Data Controller
  • 15. Challenge 9 – Who has our data?  Imbalance of Sensitive Personal Data  Multiple channels for data transfer  Status of third-party and sub-contracts  How and when to anonymise
  • 16. Challenge 10 – Should it stay or should it go?  Retain for duration of specified purpose  The temptation to retain indefinitely  Possibility of „undefined future use‟  Storage costs no longer a decision driver  Verifiable destruction?
  • 17. When is enough enough?  Core set of policies and procedures  Integrated processes – „joined-up thinking‟  Staff awareness  Consistent Policies across faculties, departments  Appropriate templates  Regular audit / review  Data Controller‟s best endeavours
  • 18. Data Protection – Inhibitor or Enabler?  Improved awareness of data quality, integrity  Increased accuracy of data  Reliability of analysis and decision-making  Heightened awareness of Data Subjects‟ rights  Protects brand, reputation, credibility, trust